Description
kernel: GSM multiplexing race condition leads to privilege escalation.
kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory.
kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks.
kernel: media: em28xx: initialize refcount before kref_get.
kernel: use-after-free after failed devlink reload in devlink_param_get.
kernel: net/packet: slab-out-of-bounds access in packet_recvmsg().
hw: cpu: arm64: Spectre-BHB.
kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c.
kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c.
kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query.
kernel: vmwgfx: use-after-free in vmw_cmd_res_check.
kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context.
kernel: sctp: fail if no bound addresses can be used for a given scope.
kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size.
kernel: KVM: nVMX: missing consistency checks for CR0 and CR4.
kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible.
kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c.
kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function.