- kernel-4.4.0-145.171 (ubuntu-xenial)
- 4.4.0-159.187
- 2019-09-18 14:33:21
- CVE CVE-2019-11810, CVSSv2 Score: 6.2
- Description:
scsi: megaraid_sas: return error when create DMA pool failed
- Patch: 4.4.0/CVE-2019-11810-scsi-megaraid_sas-return-error-when-create-DMA-pool-failed.patch
- From: 4.4.0-149.175
- CVE CVE-2019-11815, CVSSv2 Score: 8.1
- Description:
net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().
- Patch: 4.4.0/CVE-2019-11815-net-rds-force-to-destroy-connection-if-t_sock-is-NULL-in-rds_tcp_kill_sock.patch
- From: 4.4.0-149.175
- CVE CVE-2018-20510, CVSSv2 Score: 5.5
- Description:
binder: replace "%p" with "%pK"
- Patch: 4.4.0/CVE-2018-20510-binder-replace-p-with-pK.patch
- From: 4.4.0-155.182
- CVE CVE-2018-20836, CVSSv2 Score: 8.1
- Description:
scsi: libsas: fix a race condition when smp task timeout
- Patch: 4.4.0/CVE-2018-20836-scsi-libsas-fix-a-race-condition-when-smp-task-timeout.patch
- From: 4.4.0-155.182
- CVE CVE-2019-9503, CVSSv2 Score: 5.9
- Description:
brcmfmac: screening firmware event packet
- Patch: 4.4.0/CVE-2019-9503-brcmfmac-screening-firmware-event-packet.patch
- From: 4.4.0-155.182
- CVE CVE-2019-9503, CVSSv2 Score: 5.9
- Description:
brcmfmac: revise handling events in receive path
- Patch: 4.4.0/CVE-2019-9503-brcmfmac-revise-handling-events-in-receive-path.patch
- From: 4.4.0-155.182
- CVE CVE-2019-9503, CVSSv2 Score: 5.9
- Description:
brcmfmac: fix incorrect event channel deduction
- Patch: 4.4.0/CVE-2019-9503-brcmfmac-fix-incorrect-event-channel-deduction.patch
- From: 4.4.0-155.182
- CVE CVE-2019-9503, CVSSv2 Score: 5.9
- Description:
brcmfmac: add subtype check for event handling in data path
- Patch: 4.4.0/CVE-2019-9503-brcmfmac-assure-SSID-length-from-firmware-is-limited.patch
- From: 4.4.0-155.182
- CVE CVE-2019-11477, CVSSv2 Score:
- Description:
UBUNTU: SAUCE: tcp: limit payload size of sacked skbs
- Patch: 4.4.0/CVE-2019-11477-tcp-limit-payload-size-of-sacked-skbs.patch
- From: 4.4.0-151.178
- CVE CVE-2019-11478, CVSSv2 Score:
- Description:
UBUNTU: SAUCE: tcp: tcp_fragment() should apply sane memory limits
- Patch: 4.4.0/CVE-2019-11478-tcp-tcp_fragment-should-apply-sane-memory-limits.patch
- From: 4.4.0-151.178
- CVE CVE-2019-11479, CVSSv2 Score:
- Description:
tcp: add tcp_min_snd_mss sysctl
- Patch: 4.4.0/CVE-2019-11479-tcp-add-tcp_min_snd_mss-sysctl.patch
- From:
- CVE , CVSSv2 Score:
- Description:
- Patch: 4.4.0/CVE-2019-11479-tcp-add-tcp_min_snd_mss-sysctl-kpatch.patch
- From:
- CVE CVE-2019-11479, CVSSv2 Score:
- Description:
tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
- Patch: 4.4.0/CVE-2019-11479-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch
- From:
- CVE , CVSSv2 Score:
- Description:
- Patch: 4.4.0/CVE-2019-11479-tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing-kpatch.patch
- From:
- CVE CVE-2019-3846, CVSSv2 Score: 8.8
- Description:
mwifiex: Abort at too short BSS descriptor element
- Patch: 4.4.0/CVE-2019-3846-mwifiex-fix-possible-buffer-overflows-at-parsing-bss-descriptor.patch
- From: kernel-4.4.0-159.187
- CVE CVE-2019-10126, CVSSv2 Score: 9.8
- Description:
mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()
- Patch: 4.4.0/CVE-2019-10126-mwifiex-Fix-heap-overflow-in-mwifiex_uap_parse_tail_ies.patch
- From: kernel-4.4.0-159.187
- CVE CVE-2019-1125, CVSSv2 Score: 5.9
- Description:
x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations
- Patch: 4.4.0/CVE-2019-1125-x86-speculation-Prepare-entry-code-for-Spectre-v1-swapgs-mitigations.patch
- From: kernel-4.4.0-159.187
- CVE CVE-2019-11599, CVSSv2 Score: 7.0
- Description:
coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
- Patch: 4.4.0/CVE-2019-11599-coredump-fix-race-condition-between-mmget_not_zero-get_task_mm-and-core-dumping-154.patch
- From: kernel-4.4.0-159.187
- CVE CVE-2019-13272, CVSSv2 Score: 7.8
- Description:
ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME
- Patch: 4.4.0/CVE-2019-13272-ptrace-Fix-ptracer_cred-handling-for-PTRACE_TRACEME.patch
- From: kernel-4.4.0-159.187
- CVE , CVSSv2 Score:
- Description:
- Patch: 4.4.0/kaiser-mds-macro.patch
- From:
- CVE CVE-2019-14835, CVSSv2 Score: 7.2
- Description:
kvm: fix vhost_net log overflow
- Patch: 4.4.0/kvm-vhost_net-log-overflow.patch
- From: 4.4.0-159.187+
- CVE , CVSSv2 Score:
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- Patch: 4.4.0/proc-restrict-pagemap-access.patch
- From:
- CVE , CVSSv2 Score:
- Description:
- Patch: 4.4.0/kpatch-add-paravirt-asm-definitions.patch
- From:
- CVE , CVSSv2 Score:
- Description:
- Patch: 4.4.0/kpatch_map_kaiser_kp_text_kp_data.patch
- From: