- kernel-5.8.0-1035.37~20.04.1 (ubuntu-focal-aws-5.8-arm64)
- 5.8.0-1042.44~20.04.1
- 2021-12-05 15:02:41
- CVE CVE-2020-25670, CVSSv2 Score: 5.7
- Description:
nfc: fix refcount leak in llcp_sock_bind()
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2020-25670-nfc-fix-refcount-leak-in-llcp_sock_bind.patch
- From: 5.4.0-74.83
- CVE CVE-2020-25671, CVSSv2 Score: 5.7
- Description:
nfc: fix refcount leak in llcp_sock_connect()
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2020-25671-nfc-fix-refcount-leak-in-llcp_sock_connect.patch
- From: 5.4.0-74.83
- CVE CVE-2020-25672, CVSSv2 Score: 5.7
- Description:
nfc: fix memory leak in llcp_sock_connect()
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2020-25672-nfc-fix-memory-leak-in-llcp_sock_connect.patch
- From: 5.4.0-74.83
- CVE CVE-2020-25673, CVSSv2 Score: 6.3
- Description:
nfc: Avoid endless loops caused by repeated llcp_sock_connect()
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2020-25673-nfc-Avoid-endless-loops-caused-by-repeated-llcp_sock_connect.patch
- From: 5.4.0-74.83
- CVE CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Use correct permission flag for mixed signed bounds arithmetic
- Patch: 5.8.0/CVE-2021-29155-bpf-Use-correct-permission-flag-for-mixed-signed-bounds-arithmetic.patch
- From:
- CVE CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Ensure off_reg has no mixed signed bounds for all types
- Patch: 5.8.0/CVE-2021-29155-bpf-Ensure-off_reg-has-no-mixed-signed-bounds-for-all-types.patch
- From:
- CVE CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Move off_reg into sanitize_ptr_alu
- Patch: 5.8.0/CVE-2021-29155-bpf-Move-off_reg-into-sanitize_ptr_alu.patch
- From:
- CVE CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Rework ptr_limit into alu_limit and add common error path
- Patch: 5.8.0/CVE-2021-29155-bpf-Rework-ptr_limit-into-alu_limit-and-add-common-error-path.patch
- From:
- CVE CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Improve verifier error messages for users
- Patch: 5.8.0/CVE-2021-29155-bpf-Improve-verifier-error-messages-for-users.patch
- From:
- CVE CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Move sanitize_val_alu out of op switch
- Patch: 5.8.0/CVE-2021-29155-bpf-Move-sanitize_val_alu-out-of-op-switch.patch
- From:
- CVE CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Permits pointers on stack for helper calls
- Patch: 5.8.0/CVE-2021-29155-bpf-Permits-pointers-on-stack-for-helper-calls.patch
- From:
- CVE CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Refactor and streamline bounds check into helper
- Patch: 5.8.0/CVE-2021-29155-bpf-Refactor-and-streamline-bounds-check-into-helper.patch
- From:
- CVE CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Tighten speculative pointer arithmetic mask
- Patch: 5.8.0/CVE-2021-29155-bpf-Tighten-speculative-pointer-arithmetic-mask.patch
- From:
- CVE CVE-2021-23133, CVSSv2 Score: 7.0
- Description:
sctp: delay auto_asconf init until binding the first addr
- Patch: 5.8.0/CVE-2021-23133-sctp-delay-auto_asconf-init-until-binding-the-first-addr.patch
- From:
- CVE CVE-2021-31829, CVSSv2 Score: 5.5
- Description:
bpf: Fix masking negation logic upon negative dst register
- Patch: 5.8.0/CVE-2021-31829-bpf-Fix-masking-negation-logic-upon-negative-dst-register.patch
- From:
- CVE CVE-2021-31829, CVSSv2 Score: 5.5
- Description:
bpf: Fix leakage of uninitialized bpf stack under speculation
- Patch: 5.8.0/CVE-2021-31829-bpf-Fix-leakage-of-uninitialized-bpf-stack-under-speculation.patch
- From:
- CVE CVE-2020-26147, CVSSv2 Score: 5.4
- Description:
mac80211: assure all fragments are encrypted
- Patch: 5.8.0/CVE-2020-26147-mac80211-assure-all-fragments-are-encrypted.patch
- From:
- CVE CVE-2020-26141, CVSSv2 Score: 6.5
- Description:
ath10k: Fix TKIP Michael MIC verification for PCIe
- Patch: 5.8.0/CVE-2020-26141-ath10k-Fix-TKIP-Michael-MIC-verification-for-PCIe.patch
- From:
- CVE CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: add CCMP PN replay protection for fragmented frames for PCIe
- Patch: 5.8.0/CVE-2020-26145-ath10k-add-CCMP-PN-replay-protection-for-fragmented-frames-for-PCIe.patch
- From:
- CVE CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: drop fragments with multicast DA for SDIO
- Patch: 5.8.0/CVE-2020-26145-ath10k-drop-fragments-with-multicast-DA-for-SDIO.patch
- From:
- CVE CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: drop fragments with multicast DA for PCIe
- Patch: 5.8.0/CVE-2020-26145-ath10k-drop-fragments-with-multicast-DA-for-PCIe.patch
- From:
- CVE CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
ath10k: drop MPDU which has discard flag set by firmware for SDIO
- Patch: 5.8.0/CVE-2020-24588-ath10k-drop-MPDU-which-has-discard-flag-set-by-firmware-for-SDIO.patch
- From:
- CVE CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
mac80211: drop A-MSDUs on old ciphers
- Patch: 5.8.0/CVE-2020-24588-mac80211-drop-A-MSDUs-on-old-ciphers.patch
- From:
- CVE CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
cfg80211: mitigate A-MSDU aggregation attacks
- Patch: 5.8.0/CVE-2020-24588-cfg80211-mitigate-A-MSDU-aggregation-attacks.patch
- From:
- CVE CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
mac80211: properly handle A-MSDUs that start with an RFC 1042 header
- Patch: 5.8.0/CVE-2020-24588-mac80211-properly-handle-A-MSDUs-that-start-with-an-RFC-1042-header.patch
- From:
- CVE CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks
- Patch: 5.8.0/CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks.patch
- From: 5.8.0-59.66
- CVE CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks (adaptation)
- Patch: 5.8.0/CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks-kpatch.patch
- From: 5.8.0-59.66
- CVE CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent attacks on TKIP/WEP as well
- Patch: 5.8.0/CVE-2020-24587-mac80211-prevent-attacks-on-TKIP-WEP-as-well.patch
- From: 5.8.0-59.66
- CVE CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: extend protection against mixed key and fragment cache attacks
- Patch: 5.8.0/CVE-2020-24587-mac80211-extend-protection-against-mixed-key-and-fragment-cache-attacks.patch
- From: 5.8.0-59.66
- CVE CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
ath11k: Clear the fragment cache during key install
- Patch: 5.8.0/CVE-2020-24587-ath11k-Clear-the-fragment-cache-during-key-install.patch
- From: 5.8.0-59.66
- CVE CVE-2020-26139, CVSSv2 Score: 5.3
- Description:
mac80211: do not accept/forward invalid EAPOL frames
- Patch: 5.8.0/CVE-2020-26139-mac80211-do-not-accept-forward-invalid-EAPOL-frames.patch
- From:
- CVE CVE-2021-31440, CVSSv2 Score: 7.0
- Description:
bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds
- Patch: 5.8.0/CVE-2021-31440-bpf-Fix-propagation-of-32-bit-unsigned-bounds-from-64-bit-bounds.patch
- From:
- CVE CVE-2021-3609, CVSSv2 Score: 7.0
- Description:
UBUNTU: SAUCE: can: bcm: delay release of struct bcm_op after synchronize_rcu
- Patch: 5.8.0/CVE-2021-3609-UBUNTU-SAUCE-can-bcm-delay-release-of-struct-bcm_op-after-synchronize_rcu.patch
- From:
- CVE CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: add fragment cache to sta_info
- Patch: 5.8.0/CVE-2020-24586-mac80211-add-fragment-cache-to-sta_info-kpatch.patch
- From: kernel-5.8.0-59.66
- CVE CVE-2021-33200, CVSSv2 Score: 7.8
- Description:
bpf: Wrap aux data inside bpf_sanitize_info container
- Patch: 5.8.0/CVE-2021-33200-bpf-Wrap-aux-data-inside-bpf_sanitize_info-container.patch
- From:
- CVE CVE-2021-33200, CVSSv2 Score: 7.8
- Description:
bpf: No need to simulate speculative domain for immediates
- Patch: 5.8.0/CVE-2021-33200-bpf-No-need-to-simulate-speculative-domain-for-immediates.patch
- From:
- CVE CVE-2021-33200, CVSSv2 Score: 7.8
- Description:
bpf: Fix mask direction swap upon off reg sign change
- Patch: 5.8.0/CVE-2021-33200-bpf-Fix-mask-direction-swap-upon-off-reg-sign-change.patch
- From:
- CVE CVE-2021-23134, CVSSv2 Score: 7.8
- Description:
net/nfc: fix use-after-free llcp_sock_bind/connect
- Patch: 5.8.0/CVE-2021-23134-net-nfc-fix-use-after-free-llcp_sock_bind-connect.patch
- From:
- CVE CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition when removing the HCI controller
- Patch: 5.8.0/CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-when-removing-the-HCI-controller.patch
- From:
- CVE CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- Patch: 5.8.0/CVE-2021-33034-Bluetooth-verify-AMP-hci_chan-before-amp_destroy.patch
- From:
- CVE CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- Patch: 5.4.0/CVE-2021-33034-kpatch.patch
- From:
- CVE CVE-2021-3506, CVSSv2 Score: 7.1
- Description:
f2fs: fix to avoid out-of-bounds memory access
- Patch: 5.8.0/CVE-2021-3506-f2fs-fix-to-avoid-out-of-bounds-memory-access.patch
- From:
- CVE CVE-2021-33909, CVSSv2 Score: 7.0
- Description:
seq_file: Disallow extremely large seq buffer allocations
- Patch: ubuntu-focal/5.4.0-77.86/CVE-2021-33909.patch
- From: >5.4.0-80.90
- CVE CVE-2021-38208, CVSSv2 Score: 5.5
- Description:
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
- Patch: 5.8.0/CVE-2021-38208-nfc-fix-NULL-ptr-dereference-in-llcp_sock_getname-after-failed-connect.patch
- From: 5.8.0-5.8.0-64.72
- CVE CVE-2021-0129 CVE-2020-26558, CVSSv2 Score: 5.7
- Description:
Bluetooth: SMP: Fail if remote and local public keys are identical
- Patch: 5.4.0/CVE-2020-26558-Bluetooth-SMP-Fail-if-remote-and-local-public-keys-are-identical.patch
- From: kernel-5.4.0-77.86
- CVE CVE-2021-28691, CVSSv2 Score: 7.8
- Description:
xen-netback: take a reference to the RX task thread
- Patch: 5.8.0/CVE-2021-28691-xen-netback-take-a-reference-to-the-RX-task-thread.patch
- From: 5.8.0-5.8.0-64.72
- CVE CVE-2021-3573, CVSSv2 Score: 7.8
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- Patch: ubuntu-focal/5.4.0-81.91/0001-CVE-2021-3573-Bluetooth-use-correct-lock-to-prevent-UAF-of-hdev-ob.patch
- From: 5.4.0-81.91
- CVE CVE-2021-3564, CVSSv2 Score: 5.5
- Description:
Bluetooth: fix the erroneous flush_work() order
- Patch: ubuntu-focal/5.4.0-81.91/CVE-2021-3564-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: 5.4.0-81.91