- kernel-5.4.0-1068.72 (ubuntu-focal-aws)
- 5.4.0-1148.158
- 2025-08-26 17:38:16
- 2025-08-27 11:01:46
- K20250826_10
- CVE-2022-0435
- Description:
remote stack overflow in Linux kernel
- CVE: https://ubuntu.com/security/CVE-2022-0435
- Patch: 5.4.0/CVE-2022-0435.patch
- From: kernel-5.4.0-105.119
- CVE-2022-0847
- Description:
lib/iov_iter: initialize "flags" in new pipe_buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-0847
- Patch: 4.18.0/CVE-2022-0847-lib-iov_iter-initialize-flags-in-new-pipe_buffer.patch
- From: >kernel-4.18.0-348.12.2.el8_5
- CVE-2021-4135
- Description:
netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2011-4315
- Patch: 5.10.0/CVE-2021-4135-netdevsim-Zero-initialize-memory-for-new-maps-value-in-function-nsim_bpf_map_alloc.patch
- From: kernel-5.10.92-1
- CVE-2021-43976
- Description:
mwifiex: Fix skb_over_panic in mwifiex_usb_recv()
- CVE: https://access.redhat.com/security/cve/CVE-2021-43976
- Patch: 4.5.0/CVE-2021-43976-mwifiex-fix-skb-over-panic-in-mwifiex-usb-recv.patch
- From: 5.4.0-105.119
- CVE-2021-44733
- Description:
- CVE: https://access.redhat.com/security/cve/CVE-2021-44733
- Patch: 5.4.17/CVE-2021-44733-tee-handle-lookup-of-shm-with-reference-count.patch
- From: kernel-uek-5.4.17-2136.304.4.1
- CVE-2021-44733
- Description:
- CVE: https://access.redhat.com/security/cve/CVE-2021-44733
- Patch: 5.4.17/CVE-2021-44733-kpatch.patch
- From: kernel-uek-5.4.17-2136.304.4.1
- CVE-2021-45095
- Description:
phonet: refcount leak in pep_sock_accep
- CVE: https://access.redhat.com/security/cve/CVE-2021-45095
- Patch: 5.10.0/CVE-2021-45095-phonet-refcount-leak-in-pep_sock_accep.patch
- From: kernel-5.10.92-1
- CVE-2021-45480
- Description:
rds: memory leak in __rds_conn_create()
- CVE: https://access.redhat.com/security/cve/CVE-2021-45480
- Patch: 5.10.0/CVE-2021-45480-rds-memory-leak-in-__rds_conn_create.patch
- From: kernel-5.10.92-1
- CVE-2022-0492
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 5.4.17/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 5.4.17-2136.302.7.2.3
- CVE-2022-0516
- Description:
s390 is unsupported
- CVE:
- Patch: skipped/CVE-2022-0516.patch
- From:
- CVE-2022-1055
- Description:
net: sched: fix use-after-free in tc_new_tfilter()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1055
- Patch: ubuntu-focal/5.4.0-107.121/0001-CVE-2022-1055-net-sched-fix-use-after-free-in-tc_new_tfilter.patch
- From: 5.4.0-107.121
- CVE-2022-27666
- Description:
esp: Fix possible buffer overflow in ESP transformation
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-27666
- Patch: ubuntu-focal/5.4.0-107.121/0002-CVE-2022-27666-esp-Fix-possible-buffer-overflow-in-ESP-transformati.patch
- From: 5.4.0-107.121
- CVE-2022-0617
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0617
- Patch: ubuntu-focal/5.4.0-109.123/0001-CVE-2022-0617-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: 5.4.0-109.123
- CVE-2022-0617
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0617
- Patch: ubuntu-focal/5.4.0-109.123/0002-CVE-2022-0617-udf-Fix-NULL-ptr-deref-when-converting-from-inline-f.patch
- From: 5.4.0-109.123
- CVE-2022-24448
- Description:
NFSv4: Handle case where the lookup of a directory fails
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-24448
- Patch: ubuntu-focal/5.4.0-109.123/0003-CVE-2022-24448-NFSv4-Handle-case-where-the-lookup-of-a-directory-fa.patch
- From: 5.4.0-109.123
- CVE-2022-24448
- Description:
NFSv4: nfs_atomic_open() can race when looking up a non-regular file
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-24448
- Patch: ubuntu-focal/5.4.0-109.123/0004-CVE-2022-24448-NFSv4-nfs_atomic_open-can-race-when-looking-up-a-non.patch
- From: 5.4.0-109.123
- CVE-2022-24448
- Description:
NFS: LOOKUP_DIRECTORY is also ok with symlinks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-24448
- Patch: ubuntu-focal/5.4.0-109.123/CVE-2022-24448-NFS-LOOKUP_DIRECTORY-is-also-ok-with-symlinks.patch
- From: 5.4.0-109.123
- CVE-2022-24959
- Description:
yam: fix a memory leak in yam_siocdevprivate()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-24959
- Patch: ubuntu-focal/5.4.0-109.123/0007-CVE-2022-24959-yam-fix-a-memory-leak-in-yam_siocdevprivate.patch
- From: 5.4.0-109.123
- CVE-2022-26490
- Description:
[PATCH] nfc: st21nfca: Fix potential buffer overflows in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-26490
- Patch: ubuntu-focal/5.4.0-110.124/0001-CVE-2022-26490-nfc-st21nfca-Fix-potential-buffer-overflows-in-EVT_T.patch
- From: 5.4.0-110.124
- CVE-2022-27223
- Description:
USB: gadget: validate endpoint index for xilinx udc
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-27223
- Patch: ubuntu-focal/5.4.0-110.124/0002-CVE-2022-27223-USB-gadget-validate-endpoint-index-for-xilinx-udc.patch
- From: 5.4.0-110.124
- CVE-2022-25258
- Description:
[PATCH] USB: gadget: validate interface OS descriptor requests
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-25258
- Patch: ubuntu-focal/5.4.0-110.124/0003-CVE-2022-25258-USB-gadget-validate-interface-OS-descriptor-requests.patch
- From: 5.4.0-110.124
- CVE-2022-25375
- Description:
usb: gadget: rndis: check size of RNDIS_MSG_SET command
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-25375
- Patch: ubuntu-focal/5.4.0-110.124/0004-CVE-2022-25375-usb-gadget-rndis-check-size-of-RNDIS_MSG_SET-command.patch
- From: 5.4.0-110.124
- CVE-2022-20008
- Description:
mmc: block: fix read single on recovery logic
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-20008
- Patch: ubuntu-focal/5.4.0-110.124/0005-CVE-2022-20008-mmc-block-fix-read-single-on-recovery-logic.patch
- From: 5.4.0-110.124
- CVE-2022-1016
- Description:
netfilter: nf_tables: initialize registers in nft_do_chain()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1016
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2022-1016-netfilter-nf_tables-initialize-registers-in-nft_do_chain.patch
- From: 5.4.0-110.124
- CVE-2020-27820
- Description:
drm/nouveau: Add a dedicated mutex for the clients list
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-Add-a-dedicated-mutex-for-the-clients-list.patch
- From: 5.4.0-110.124
- CVE-2020-27820
- Description:
drm/nouveau: clean up all clients on device removal
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-clean-up-all-clients-on-device-removal.patch
- From: 5.4.0-110.124
- CVE-2020-27820
- Description:
drm/nouveau: Add a dedicated mutex for the clients list (adaptation)
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-Add-a-dedicated-mutex-for-the-clients-kpatch.patch
- From: 5.4.0-110.124
- CVE-2021-26401
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26401.patch
- From:
- CVE-2022-2964
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-2964
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2022-2964-net-usb-ax88179_178a-Fix-out-of-bounds-accesses-in-RX-fixup.patch
- From: 5.4.0-110.124
- CVE-2022-0487
- Description:
moxart: fix potential use-after-free on remove path
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0487
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2022-0487-moxart-fix-potential-use-after-free-on-remove-path.patch
- From: 5.4.0-110.124
- CVE-2022-1116
- Description:
io_uring: fix fs->users overflow
- CVE: https://ubuntu.com/security/CVE-2022-1116
- Patch: 5.4.0/CVE-2022-1116-io_uring-fix-fs.users-overflow.patch
- From: 5.4.0-113.127
- CVE-2022-30594
- Description:
ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on
- CVE: https://ubuntu.com/security/CVE-2022-30594
- Patch: 5.4.0/CVE-2022-30594-ptrace-check-pt_suspend_seccomp-permission-on-pt_seized.patch
- From: 5.4.0-113.127
- CVE-2022-29581
- Description:
net/sched: cls_u32: fix netns refcount changes in
- CVE: https://ubuntu.com/security/CVE-2022-29581
- Patch: 5.4.0/CVE-2022-29581-cls_u32-fix-netns-refcount-changes-in-u32_change.patch
- From: 5.4.0-113.127
- CVE-2022-21499
- Description:
Not affected without certain conditions - Secure Boot, configured kgdb/kdb. Complex adaptation
- CVE:
- Patch: skipped/CVE-2022-21499.patch
- From:
- CVE-2021-4197
- Description:
cgroup: Use open-time cgroup namespace for process migration perm checks
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 5.4.0/CVE-2021-4197-cgroup-Use-open-time-credentials-for-process-migraton-perm.patch
- From: 5.4.181
- CVE-2021-4197
- Description:
cgroup: Use open-time cgroup namespace for process migration perm checks(adaptation).
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 5.4.0/CVE-2021-4197-cgroup-Use-open-time-credentials-for-process-migraton-perm-kpatch.patch
- From: 5.4.17-2136.308.7
- CVE-2022-1353
- Description:
af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1353
- Patch: 5.10.0/CVE-2022-1353-af_key-add-__GFP_ZERO-flag-for-compose_sadb_supported-in-function-pfkey_register.patch
- From: 5.10.113-1
- CVE-2022-1011
- Description:
fuse: use true,false for bool variable
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/1329-fuse-use-true-false-for-bool-variable.patch
- From: kernel-4.18.0-348.el8
- CVE-2022-1011
- Description:
fuse: fix pipe buffer lifetime for direct_io
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/13194-fuse-fix-pipe-buffer-lifetime-for-direct_io.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2022-1011
- Description:
fuse: fix pipe buffer lifetime for direct_io (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/13194-fuse-fix-pipe-buffer-lifetime-for-direct_io-240-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2022-1158
- Description:
KVM: x86/mmu: do compare-and-exchange of gPTE via the user
- CVE: https://access.redhat.com/security/cve/CVE-2022-1158
- Patch: 5.4.17/CVE-2022-1158-KVM-x86-mmu-do-compare-and-exchange-of-gPTE-via-the-user-2102.patch
- From: 5.4.17-2136.306.1.3
- CVE-2022-1198
- Description:
drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1198
- Patch: 5.10.0/CVE-2022-1198-drivers-hamradio-6pack-fix-UAF-bug-caused-by-mod_timer.patch
- From: 5.10.113-1
- CVE-2022-1516
- Description:
net/x25: Fix null-ptr-deref caused by x25_disconnect
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1516
- Patch: 5.10.0/CVE-2022-1516-net-x25-Fix-null-ptr-deref-caused-by-x25_disconnect.patch
- From: 5.10.113-1
- CVE-2022-1966
- Description:
netfilter: nf_tables: disallow non-stateful expression in sets earlier
- CVE: https://access.redhat.com/security/cve/cve-2022-1966
- Patch: 5.4.0/CVE-2022-1966-netfilter-nf_tables-disallow-non-stateful-expression-in-sets.patch
- From: linux_5.4.0-117.132
- CVE-2022-26966
- Description:
sr9700: sanity check for packet length
- CVE: https://access.redhat.com/security/cve/CVE-2022-26966
- Patch: 5.4.17/CVE-2022-26966-sr9700-sanity-check-for-packet-length.patch
- From: 5.4.17-2136.306.1.3
- CVE-2022-24958
- Description:
gadget: don't release an existing dev->buf
- CVE: https://access.redhat.com/security/cve/CVE-2022-24958
- Patch: 5.10.0/CVE-2022-24958.patch
- From: 4.19.235-1
- CVE-2022-23040
- Description:
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23040
- Patch: 5.4.0/CVE-2022-23040-xen-xenbus-dont-let-xenbus_grant_ring-remove-grants-in-error-case.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23036 CVE-2022-23038
- Description:
xen/grant-table: add gnttab_try_end_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23036
- Patch: 5.4.0/CVE-2022-23036-CVE-2022-23038-xen-grant-table-add-gnttab_try_end_foreign_access.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23036
- Description:
xen/blkfront: don't use gnttab_query_foreign_access() for mapped status
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23036
- Patch: 5.4.0/CVE-2022-23036-xen-blkfront-dont-use-gnttab_query_foreign_access-for-mapped-status.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23038
- Description:
xen/scsifront: don't use gnttab_query_foreign_access() for mapped status
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23038
- Patch: 5.4.0/CVE-2022-23038-xen-scsifront-dont-use-gnttab_query_foreign_access-for-mapped-status.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23039
- Description:
xen/gntalloc: don't use gnttab_query_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23037
- Patch: 5.4.0/CVE-2022-23039-xen-gntalloc-dont-use-gnttab_query_foreign_access.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23041
- Description:
xen: remove gnttab_query_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: 5.4.0/CVE-2022-23041-xen-remove-gnttab_query_foreign_access.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23041
- Description:
xen/9p: use alloc/free_pages_exact()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: 5.4.0/CVE-2022-23041-xen-9p-use-alloc-free_pages_exact.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23041
- Description:
xen/pvcalls: use alloc/free_pages_exact()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: 5.4.0/CVE-2022-23041-xen-pvcalls-use-alloc-free_pages_exact.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23041
- Description:
xen/gnttab: fix gnttab_end_foreign_access() without page specified
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: 5.4.0/CVE-2022-23041-xen-gnttab-fix-gnttab_end_foreign_access-without-page-specified.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23042
- Description:
xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23042
- Patch: 5.4.0/CVE-2022-23042-xen-netfront-react-properly-to-failing-gnttab_end_foreign_access_ref.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23041
- Description:
xen/gnttab: fix gnttab_end_foreign_access() without page specified (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: 5.4.17/CVE-2022-23041-kpatch.patch
- From: 4.15.0-177.186
- CVE-2022-23042
- Description:
xen/netfront: react properly to failing gnttab_end_foreign_access_ref() (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23042
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23042-kpatch.patch
- From: 4.15.0-177.186
- CVE-2022-28356
- Description:
llc: fix netdevice reference leaks in llc_ui_bind()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-28356
- Patch: 5.10.0/CVE-2022-28356-llc-fix-netdevice-reference-leaks-in-llc_ui_bind.patch
- From: 5.10.113-1
- CVE-2022-28389
- Description:
can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-28389
- Patch: 5.10.0/CVE-2022-28389-can-mcba_usb-mcba_usb_start_xmit-fix-double-dev_kfree_skb-in-error-path.patch
- From: 5.10.113-1
- CVE-2022-28390
- Description:
can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-28390
- Patch: 5.10.0/CVE-2022-28390-can-ems_usb-ems_usb_start_xmit-fix-double-dev_kfree_skb-in-error-path.patch
- From: 5.10.113-1
- CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21127
- Description:
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- CVE: https://access.redhat.com/security/cve/cve-2022-21127
- Patch: mmio-enable.patch
- From: 5.18
- CVE-2022-28388
- Description:
can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-28388
- Patch: ubuntu-focal/5.4.0-121.137/0001-CVE-2022-28388-can-usb_8dev-usb_8dev_start_xmit-fix-double-dev_kfre.patch
- From: 5.4.0-121.137
- CVE-2022-1199
- Description:
ax25: improve the incomplete fix to avoid UAF and NPD bugs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1199
- Patch: ubuntu-focal/5.4.0-122.138/CVE-2022-1199-ax25-NPD-bug-when-detaching-AX25-device.patch
- From: N/A
- CVE-2022-1199
- Description:
ax25: improve the incomplete fix to avoid UAF and NPD bugs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1199
- Patch: ubuntu-focal/5.4.0-122.138/CVE-2022-1199-ax25-improve-the-incomplete-fix-to-avoid-UAF-and-NPD-bugs.patch
- From: N/A
- CVE-2022-1199
- Description:
ax25: improve the incomplete fix to avoid UAF and NPD bugs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1199
- Patch: ubuntu-focal/5.4.0-122.138/CVE-2022-1199-ax25-Fix-NULL-pointer-dereference-in-ax25_kill_by_device.patch
- From: N/A
- CVE-2022-1204
- Description:
[PATCH] ax25: add refcount in ax25_dev to avoid UAF bugs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1204
- Patch: ubuntu-focal/5.4.0-122.138/0001-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-add-refcount-in-ax25_dev-to-avoid-UAF-bugs.patch
- From: 5.4.0-122.138
- CVE-2022-1204
- Description:
[PATCH] ax25: fix reference count leaks of ax25_dev
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1204
- Patch: ubuntu-focal/5.4.0-122.138/0002-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-fix-reference-count-leaks-of-ax25_dev.patch
- From: 5.4.0-122.138
- CVE-2022-1204
- Description:
[PATCH] ax25: fix UAF bugs of net_device caused by rebinding
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1204
- Patch: ubuntu-focal/5.4.0-122.138/0003-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-fix-UAF-bugs-of-net_device-caused-by-rebinding-.patch
- From: 5.4.0-122.138
- CVE-2022-1204
- Description:
[PATCH] ax25: Fix refcount leaks caused by ax25_cb_del()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1204
- Patch: ubuntu-focal/5.4.0-122.138/0004-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-Fix-refcount-leaks-caused-by-ax25_cb_del.patch
- From: 5.4.0-122.138
- CVE-2022-1204
- Description:
[PATCH] ax25: fix UAF bug in ax25_send_control()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1204
- Patch: ubuntu-focal/5.4.0-122.138/0005-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-fix-UAF-bug-in-ax25_send_control.patch
- From: 5.4.0-122.138
- CVE-2022-1199
- Description:
[PATCH] ax25: fix NPD bug in ax25_disconnect
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1199
- Patch: ubuntu-focal/5.4.0-122.138/0006-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-fix-NPD-bug-in-ax25_disconnect.patch
- From: 5.4.0-122.138
- CVE-2022-1205
- Description:
[PATCH] ax25: Fix NULL pointer dereferences in ax25 timers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1205
- Patch: ubuntu-focal/5.4.0-122.138/0007-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-Fix-NULL-pointer-dereferences-in-ax25-timers.patch
- From: 5.4.0-122.138
- CVE-2022-1205
- Description:
[PATCH] ax25: Fix UAF bugs in ax25 timers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1205
- Patch: ubuntu-focal/5.4.0-122.138/0008-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-Fix-UAF-bugs-in-ax25-timers.patch
- From: 5.4.0-122.138
- CVE-2022-1204
- Description:
ax25: add refcount in ax25_dev to avoid UAF bugs (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1204
- Patch: 5.10.0/CVE-2022-1204-kpatch.patch
- From: 5.10.113-1
- CVE-2022-33981
- Description:
floppy: disable FDRAWCMD by default
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-33981
- Patch: ubuntu-focal/5.4.0-122.138/0009-CVE-2022-33981-floppy-disable-FDRAWCMD-by-default.patch
- From: 5.4.0-122.138
- CVE-2022-33981
- Description:
floppy: disable FDRAWCMD by default (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-33981
- Patch: ubuntu-focal/5.4.0-122.138/CVE-2022-33981-kpatch.patch
- From: 5.4.0-122.138
- CVE-2022-1195
- Description:
hamradio: defer 6pack kfree after unregister_netdev
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1195
- Patch: ubuntu-focal/5.4.0-122.138/0010-CVE-2022-1195-hamradio-defer-6pack-kfree-after-unregister_netdev.patch
- From: 5.4.0-122.138
- CVE-2022-1195
- Description:
hamradio: remove needs_free_netdev to avoid UAF
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1195
- Patch: ubuntu-focal/5.4.0-122.138/0011-CVE-2022-1195-hamradio-remove-needs_free_netdev-to-avoid-UAF.patch
- From: 5.4.0-122.138
- CVE-2022-1652
- Description:
floppy: use a statically allocated error counter
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: ubuntu-focal/5.4.0-124.140/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter.patch
- From: 5.4.0-124.140
- CVE-2022-1652
- Description:
floppy: use a statically allocated error counter (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: ubuntu-focal/5.4.0-124.140/CVE-2022-1652-kpatch.patch
- From: 5.4.0-124.140
- CVE-2022-1734
- Description:
nfc: nfcmrvl: main: reorder destructive operations in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1734
- Patch: ubuntu-focal/5.4.0-124.140/0001-CVE-2022-1734-nfc-nfcmrvl-main-reorder-destructive-operations-in-n.patch
- From: 5.4.0-124.140
- CVE-2022-28893
- Description:
[PATCH] SUNRPC: Ensure we flush any closed sockets before
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-28893
- Patch: ubuntu-focal/5.4.0-124.140/0002-CVE-2022-28893-SUNRPC-Ensure-we-flush-any-closed-sockets-before-xs_.patch
- From: 5.4.0-124.140
- CVE-2022-28893
- Description:
[PATCH] SUNRPC: Don't leak sockets in xs_local_connect()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-28893
- Patch: ubuntu-focal/5.4.0-124.140/0003-CVE-2022-28893-SUNRPC-Don-t-leak-sockets-in-xs_local_connect.patch
- From: 5.4.0-124.140
- CVE-2022-1679
- Description:
[PATCH v4 1/2] ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1679
- Patch: ubuntu-focal/5.4.0-124.140/0004-CVE-2022-1679-UBUNTU-SAUCE-ath9k-fix-use-after-free-in-ath9k_hif_u.patch
- From: 5.4.0-124.140
- CVE-2022-1974
- Description:
nfc: replace improper check device_is_registered() in netlink related
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1974
- Patch: ubuntu-focal/5.4.0-124.140/0006-CVE-2022-1974-nfc-replace-improper-check-device_is_registered-in-n.patch
- From: 5.4.0-124.140
- CVE-2022-1975
- Description:
NFC: netlink: fix sleep in atomic bug when firmware download timeout
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1975
- Patch: ubuntu-focal/5.4.0-124.140/0007-CVE-2022-1975-NFC-netlink-fix-sleep-in-atomic-bug-when-firmware-do.patch
- From: 5.4.0-124.140
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1048
- Patch: ubuntu-focal/5.4.0-124.140/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-hw_params-and-hw_free-calls.patch
- From: 5.4.0-124.140
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent read/write and buffer changes
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1048
- Patch: ubuntu-focal/5.4.0-124.140/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-read-write-and-buffer-changes.patch
- From: 5.4.0-124.140
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1048
- Patch: ubuntu-focal/5.4.0-124.140/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prepare-and-hw_params-hw_free-calls.patch
- From: 5.4.0-124.140
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent prealloc proc writes
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1048
- Patch: ubuntu-focal/5.4.0-124.140/0009-CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prealloc-proc-wr.patch
- From: 5.4.0-124.140
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.4.17/CVE-2022-1048-kpatch.patch
- From: 5.4.17-2136.308.7
- CVE-2022-34918
- Description:
netfilter: nf_tables: stricter validation of element data
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-34918
- Patch: ubuntu-focal/5.4.0-124.140/0010-CVE-2022-34918-netfilter-nf_tables-stricter-validation-of-element-d.patch
- From: 5.4.0-124.140
- CVE-2022-2588
- Description:
UBUNTU: SAUCE: net_sched: cls_route: remove from list when handle is 0
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-2588
- Patch: ubuntu-focal/5.4.0-124.140/CVE-2022-2588-UBUNTU-SAUCE-net_sched-cls_route-remove-from-list-when-handle-is-0.patch
- From: 5.4.0-124.140
- CVE-2022-2586
- Description:
UBUNTU: SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- CVE: https://access.redhat.com/security/cve/cve-2022-2586
- Patch: ubuntu-focal/5.4.0-124.140/0011-CVE-2022-2586-UBUNTU-SAUCE-netfilter-nf_tables-do-not-allow-SET_ID.patch
- From: 5.4.0-124.140
- CVE-2022-2586
- Description:
UBUNTU: SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another table
- CVE: https://access.redhat.com/security/cve/cve-2022-2586
- Patch: ubuntu-focal/5.4.0-124.140/0012-CVE-2022-2586-UBUNTU-SAUCE-netfilter-nf_tables-do-not-allow-RULE_I.patch
- From: 5.4.0-124.140
- CVE-2021-33656
- Description:
vt: drop old FONT ioctls
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33656
- Patch: ubuntu-focal/5.4.0-125.141/0005-vt-drop-old-FONT-ioctls.patch
- From: 5.4.0-125.141
- CVE-2021-33061
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2021-33061.patch
- From:
- CVE-2022-33655
- Description:
fbcon: Disallow setting font bigger than screen size
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33655
- Patch: 5.4.0/CVE-2021-33655-fbcon-disallow-setting-font-bigger-than-screen-size.patch
- From: 5.4.209-116.363
- CVE-2022-33655
- Description:
fbcon: Prevent that screen size is smaller than font size
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33655
- Patch: 5.4.0/CVE-2021-33655-fbcon-prevent-that-screen-size-is-smaller-than-font-size.patch
- From: 5.4.209-116.363
- CVE-2022-33655
- Description:
fbmem: Check virtual screen sizes in fb_set_var()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33655
- Patch: 5.4.0/CVE-2021-33655-fbmem-check-virtual-screen-sizes-in-fb_set_var.patch
- From: 5.4.209-116.363
- CVE-2022-32296
- Description:
tcp: change source port randomizarion at connect() time
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-32296
- Patch: 5.4.0/CVE-2022-32296-tcp-change-source-port-randomizarion-at-connect-time.patch
- From: 5.4.0-126.142
- CVE-2022-1012
- Description:
secure_seq: use the 64 bits of the siphash for port offset
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1012
- Patch: 5.4.0/CVE-2022-1012-secure_seq-use-the-64-bits-of-the-siphash-for-port-offset-1.patch
- From: 5.4.0-126.142
- CVE-2022-1012
- Description:
tcp: use different parts of the port_offset for index and
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1012
- Patch: 5.4.0/CVE-2022-1012-tcp-use-different-parts-of-the-port_offset-for-index-and-offset.patch
- From: 5.4.0-126.142
- CVE-2022-32296
- Description:
tcp: increase source port perturb table to 2^16
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-32296
- Patch: 5.4.0/CVE-2022-32296-tcp-dynamically-allocate-the-perturb-table-used-by-source-ports.patch
- From: 5.4.0-126.142
- CVE-2022-32296
- Description:
tcp: increase source port perturb table to 2^16
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-32296
- Patch: 5.4.0/CVE-2022-32296-tcp-increase-source-port-perturb-table-to-2-16.patch
- From: 5.4.0-126.142
- CVE-2022-32296
- Description:
tcp: change source port randomizarion at connect() time (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-32296
- Patch: 5.4.0/CVE-2022-32296-tcp-change-source-port-randomizarion-at-connect-time-kpatch.patch
- From: 5.4.0-126.142
- CVE-2022-1729
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://access.redhat.com/security/cve/CVE-2022-1729
- Patch: 5.4.17/CVE-2022-1729-perf-Fix-sys-perf-event-open-race-against-itself.patch
- From: 5.4.17-2136.307.3.2.el8uek
- CVE-2022-2503
- Description:
dm verity: set DM_TARGET_IMMUTABLE feature flag
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2503
- Patch: 5.4.0/CVE-2022-2503-dm-verity-set-DM_TARGET_IMMUTABLE-feature-flag.patch
- From: 5.4.0-126.142
- CVE-2022-2503
- Description:
dm verity: set DM_TARGET_IMMUTABLE feature flag (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2503
- Patch: 5.4.0/CVE-2022-2503-kpatch.patch
- From: 5.4.0-126.142
- CVE-2022-36946
- Description:
netfilter: nf_queue: do not allow packet truncation below
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-36946
- Patch: 5.10.0/CVE-2022-36946-netfilter-nf_queue-do-not-allow-packet-truncation-below.patch
- From: 5.10.136-1
- CVE-2022-3577
- Description:
HID: bigben: fix slab-out-of-bounds Write in bigben_probe
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3577
- Patch: ubuntu-focal/5.4.0-125.141/CVE-2022-3577-hid-bigben-fix-slab-out-of-bounds-write-in-bigben_probe.patch
- From: 5.4.0-126.142
- CVE-2022-3115
- Description:
drm: mali-dp: potential dereference of null pointer
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-3115
- Patch: ubuntu-focal/5.4.0-126.142/CVE-2022-3115-drm-mali-dp-potential-dereference-of-null-pointer.patch
- From: 5.4.0-126.142
- CVE-2021-4159
- Description:
bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-4159
- Patch: 4.14.0/CVE-2021-4159-bpf-Verifer-adjust_scalar_min_max_vals-to-always-call.patch
- From: kernel-4.14.273-207.502.amzn2
- CVE-2022-20369
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-20369.patch
- From:
- CVE-2022-2318
- Description:
net: rose: fix UAF bugs caused by timer handler
- CVE: https://access.redhat.com/security/cve/CVE-2022-2318
- Patch: 5.4.0/CVE-2022-2318-net-rose-fix-UAF-bugs-caused-by-timer-handler.patch
- From: 5.4.0-126.142
- CVE-2022-2318
- Description:
net: rose: fix UAF bugs caused by timer handler (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2318
- Patch: 5.15.0/CVE-2022-2318-net-rose-fix-UAF-bugs-caused-by-timer-handler-kpatch.patch
- From: 5.15.0-48.54
- CVE-2022-26365
- Description:
xen/blkfront: fix leaking data in shared pages
- CVE: https://ubuntu.com/security/CVE-2022-26365
- Patch: 5.4.0/CVE-2022-26365-xen-blkfront-fix-leaking-data-in-shared-pages-2.patch
- From: 5.4.0-126.142
- CVE-2022-3176
- Description:
io_uring: disable polling pollfree files
- CVE: https://access.redhat.com/security/cve/CVE-2022-3176
- Patch: 5.4.0/CVE-2022-3176-io_uring-disable-polling-pollfree-files.patch
- From: 5.4.0-126.142
- CVE-2022-3176
- Description:
io_uring: disable polling pollfree files (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-3176
- Patch: 5.4.0/CVE-2022-3176-io_uring-disable-polling-pollfree-files-kpatch.patch
- From: 5.4.0-126.142
- CVE-2022-33740
- Description:
xen/netfront: fix leaking data in shared pages
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33740
- Patch: 5.4.0/CVE-2022-33740-xen-netfront-fix-leaking-data-in-shared-pages.patch
- From: v5.4
- CVE-2022-33741
- Description:
xen/netfront: force data bouncing when backend is untrusted
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33741
- Patch: 5.4.0/CVE-2022-33741-xen-netfront-force-data-bouncing-when-backend-is-untrusted-aws-2.patch
- From: 5.4.0-126.142
- CVE-2022-33741
- Description:
xen/netfront: force data bouncing when backend is untrusted (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-33741
- Patch: 5.4.0/CVE-2022-33741-xen-netfront-force-data-bouncing-when-backend-is-untrusted-kpatch-aws-2.patch
- From: 5.4.0-126.142
- CVE-2022-33742
- Description:
xen/blkfront: force data bouncing when backend is untrusted
- CVE: https://ubuntu.com/security/CVE-2022-33742
- Patch: 5.4.0/CVE-2022-33742-xen-blkfront-force-data-bouncing-when-backend-is-untrusted-aws.patch
- From: 5.4.0-126.142
- CVE-2022-33742
- Description:
xen/blkfront: force data bouncing when backend is untrusted (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33742
- Patch: 5.4.0/CVE-2022-33742-kpatch-aws.patch
- From: 5.4.0-126.142
- CVE-2022-33744
- Description:
Out of scope - ARM architecture.
- CVE:
- Patch: skipped/CVE-2022-33744.patch
- From:
- CVE-2022-36879
- Description:
xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-36879
- Patch: 5.10.0/CVE-2022-36879-xfrm-xfrm_policy-fix-a-possible-double-xfrm_pols_put-in.patch
- From: 5.10.136-1
- CVE-2022-20566
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put
- CVE: https://ubuntu.com/security/CVE-2022-20566
- Patch: ubuntu-focal/5.4.0-128.144/CVE-2022-20566-bluetooth-L2CAP-fix-use-after-free-caused-by-l2cap_chan_put.patch
- From: 5.4.0-128.144
- CVE-2022-1462
- Description:
tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1462
- Patch: ubuntu-focal/5.4.0-128.144/CVE-2022-1462-tty-extract-tty_flip_buffer_commit-from-tty_flip_buffer_push.patch
- From: 5.4.0-128.144
- CVE-2022-1462
- Description:
tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1462
- Patch: ubuntu-focal/5.4.0-128.144/CVE-2022-1462-tty-use-new-tty_insert_flip_string_and_push_buffer-in-pty_write.patch
- From: 5.4.0-128.144
- CVE-2022-2602
- Description:
io_uring/af_unix: defer registered files gc to io_uring release
- CVE: https://www.zerodayinitiative.com/advisories/ZDI-22-1462/
- Patch: 5.4.0/CVE-2022-2602-io_uring-af_unix-defer-registered-files-gc.patch
- From: 5.4.0-131.147
- CVE-2022-2602
- Description:
io_uring/af_unix: defer registered files gc to io_uring release
- CVE: https://www.zerodayinitiative.com/advisories/ZDI-22-1462/
- Patch: 5.4.0/CVE-2022-2602-io_uring-af_unix-defer-registered-files-gc-kpatch.patch
- From: 5.4.0-131.147
- CVE-2022-2602
- Description:
UBUNTU: SAUCE: io_uring/af_unix: fix memleak during unix GC
- CVE: https://www.zerodayinitiative.com/advisories/ZDI-22-1462/
- Patch: 5.4.0/CVE-2022-2602-io_uring-af_unix-fix-memleak-during-unix-GC.patch
- From: 5.4.0-131.147
- CVE-2022-41674
- Description:
wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-41674
- Patch: 5.4.0/CVE-2022-41674-wifi-cfg80211-fix-u8-overflow-in-cfg80211_update_notlisted_nontrans.patch
- From: 5.4.0-131.147
- CVE-2022-42720
- Description:
wifi: cfg80211: fix BSS refcounting bugs
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-42720
- Patch: 5.4.0/CVE-2022-42720-wifi-cfg80211-fix-BSS-refcounting-bugs-1.patch
- From: 5.4.0-131.147
- CVE-2022-42721
- Description:
wifi: cfg80211: avoid nontransmitted BSS list corruption
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-42721
- Patch: 5.4.0/CVE-2022-42721-wifi-cfg80211-avoid-nontransmitted-BSS-list-corruption.patch
- From: 5.4.0-131.147
- CVE-2022-40768
- Description:
scsi: stex: Properly zero out the passthrough command structure
- CVE: https://ubuntu.com/security/CVE-2022-40768
- Patch: ubuntu-focal/5.4.0-132.148/0001-CVE-2022-40768-scsi-stex-Properly-zero-out-the-passthrough-command-.patch
- From: 5.4.0-132.148
- CVE-2022-3028
- Description:
[PATCH] af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://ubuntu.com/security/CVE-2022-3028
- Patch: ubuntu-focal/5.4.0-132.148/0002-CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
- From: 5.4.0-132.148
- CVE-2022-41222
- Description:
mm/mremap: hold the rmap lock in write mode when moving page table
- CVE: https://ubuntu.com/security/CVE-2022-41222
- Patch: ubuntu-focal/5.4.0-132.148/0003-CVE-2022-41222-mm-mremap-hold-the-rmap-lock-in-write-mode-when-movi.patch
- From: 5.4.0-132.148
- CVE-2022-20422
- Description:
ARM related CVE.
- CVE:
- Patch: skipped/CVE-2022-20422.patch
- From:
- CVE-2022-3625
- Description:
devlink: Fix use-after-free after a failed reload
- CVE: https://ubuntu.com/security/CVE-2022-3625
- Patch: ubuntu-focal/5.4.0-132.148/0007-CVE-2022-3625-devlink-Fix-use-after-free-after-a-failed-reload.patch
- From: 5.4.0-132.148
- CVE-2022-3635
- Description:
atm: idt77252: fix use-after-free bugs caused by tst_timer
- CVE: https://ubuntu.com/security/CVE-2022-3635
- Patch: ubuntu-focal/5.4.0-132.148/0008-CVE-2022-3635-atm-idt77252-fix-use-after-free-bugs-caused-by-tst_t.patch
- From: 5.4.0-132.148
- CVE-2022-2978
- Description:
fs: fix UAF/GPF bug in nilfs_mdt_destroy
- CVE: https://ubuntu.com/security/CVE-2022-2978
- Patch: ubuntu-focal/5.4.0-132.148/0001-CVE-2022-2978-fs-fix-UAF-GPF-bug-in-nilfs_mdt_destroy.patch
- From: 5.4.0-132.148
- CVE-2022-42719
- Description:
wifi: mac80211: don't parse mbssid in assoc response
- CVE: https://ubuntu.com/security/CVE-2022-42719
- Patch: ubuntu-focal/5.4.0-132.148/0001-mac80211-mlme-find-auth-challenge-directly.patch
- From: 5.4.0-132.148
- CVE-2022-42719
- Description:
wifi: mac80211: don't parse mbssid in assoc response
- CVE: https://ubuntu.com/security/CVE-2022-42719
- Patch: ubuntu-focal/5.4.0-132.148/0002-wifi-mac80211-don-t-parse-mbssid-in-assoc-response.patch
- From: 5.4.0-132.148
- CVE-2022-42719
- Description:
wifi: mac80211: fix MBSSID parsing use-after-free
- CVE: https://ubuntu.com/security/CVE-2022-42719
- Patch: ubuntu-focal/5.4.0-132.148/0003-wifi-mac80211-fix-MBSSID-parsing-use-after-free.patch
- From: 5.4.0-132.148
- CVE-2022-42719
- Description:
adaptation
- CVE: https://ubuntu.com/security/CVE-2022-42719
- Patch: ubuntu-focal/5.4.0-132.148/CVE-2022-42719-kpatch.patch
- From: 5.4.0-132.148
- CVE-2022-39188
- Description:
mm: Fix TLB flush for not-first PFNMAP mappings in unmap_region()
- CVE: https://ubuntu.com/security/CVE-2022-39188
- Patch: ubuntu-focal/5.4.0-132.148/0001-mm-Force-TLB-flush-for-PFNMAP-mappings-before-unlink.patch
- From: 5.4.0-132.148
- CVE-2022-39188
- Description:
mm: Fix TLB flush for not-first PFNMAP mappings in unmap_region()
- CVE: https://ubuntu.com/security/CVE-2022-39188
- Patch: ubuntu-focal/5.4.0-132.148/0001-mm-Fix-TLB-flush-for-not-first-PFNMAP-mappings-in-un.patch
- From: 5.4.0-132.148
- CVE-2022-29900
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-29900.patch
- From:
- CVE-2022-29901
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-29901.patch
- From:
- CVE-2022-26373
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-26373.patch
- From:
- CVE-2022-2153
- Description:
KVM: Add infrastructure and macro to mark VM as bugged
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: ubuntu-focal/5.4.0-132.148/0001-KVM-Add-infrastructure-and-macro-to-mark-VM-as-bugge.patch
- From: 5.4.0-132.148
- CVE-2022-2153
- Description:
[PATCH] KVM: x86: Check lapic_in_kernel() before attempting to set a
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: ubuntu-focal/5.4.0-132.148/0002-KVM-x86-Check-lapic_in_kernel-before-attempting-to-s.patch
- From: 5.4.0-132.148
- CVE-2022-2153
- Description:
KVM: x86: Avoid theoretical NULL pointer dereference in
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: ubuntu-focal/5.4.0-132.148/0003-KVM-x86-Avoid-theoretical-NULL-pointer-dereference-i.patch
- From: 5.4.0-132.148
- CVE-2022-2153
- Description:
KVM: x86: Check lapic_in_kernel() before attempting to set a ( adaptation )
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: ubuntu-focal/5.4.0-132.148/CVE-2022-2153-kpatch.patch
- From: 5.4.0-132.148
- CVE-2022-3594
- Description:
r8152: Rate limit overflow messages
- CVE: https://ubuntu.com/security/CVE-2022-3594
- Patch: ubuntu-focal/5.4.0-135.152/0001-CVE-2022-3594-r8152-Rate-limit-overflow-messages.patch
- From: 5.4.0-135.152
- CVE-2022-3564
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://ubuntu.com/security/CVE-2022-3564
- Patch: ubuntu-focal/5.4.0-135.152/0003-CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_r.patch
- From: 5.4.0-135.152
- CVE-2022-3565
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-focal/5.4.0-135.152/0001-mISDN-fix-use-after-free-bugs-in-l1oip-timer-handler.patch
- From: 5.4.0-135.152
- CVE-2022-3565
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-focal/5.4.0-135.152/CVE-2022-3565-kpatch.patch
- From: 5.4.0-135.152
- CVE-2022-3621
- Description:
nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
- CVE: https://ubuntu.com/security/CVE-2022-3621
- Patch: ubuntu-focal/5.4.0-135.152/0008-CVE-2022-3621-nilfs2-fix-NULL-pointer-dereference-at-nilfs_bmap_lo.patch
- From: 5.4.0-135.152
- CVE-2022-3061
- Description:
video: fbdev: i740fb: Error out if 'pixclock' equals zero
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
- Patch: 5.10.0/CVE-2022-3061.patch
- From: v5.18
- CVE-2022-40307
- Description:
efi: capsule-loader: Fix use-after-free in efi_capsule_write
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-40307
- Patch: 4.19.0/CVE-2022-40307-efi-capsule-loader-fix-use-after-free-in-efi_capsule_write.patch
- From: 4.19.260-1
- CVE-2022-40307
- Description:
efi: capsule-loader: Fix use-after-free in efi_capsule_write (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-40307
- Patch: 4.19.0/CVE-2022-40307-efi-capsule-loader-fix-use-after-free-in-efi_capsule_write-kpatch.patch
- From: 4.19.260-1
- CVE-2022-20421
- Description:
binder: fix UAF of ref->proc caused by race condition
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-20421
- Patch: 5.10.0/CVE-2022-20421.patch
- From: v5.19
- CVE-2022-2663
- Description:
netfilter: nf_conntrack_irc: Tighten matching on DCC message
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
- Patch: 5.10.0/CVE-2022-2663.patch
- From: v5.19
- CVE-2022-3303
- Description:
ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3303
- Patch: 5.10.0/CVE-2022-3303.patch
- From: v5.19
- CVE-2022-4095
- Description:
staging: rtl8712: fix use after free bugs
- CVE: https://ubuntu.com/security/CVE-2022-4095
- Patch: ubuntu-focal/5.4.0-136.153/0003-CVE-2022-4095-staging-rtl8712-fix-use-after-free-bugs.patch
- From: 5.4.0-136.153
- CVE-2022-3586
- Description:
sch_sfb: Don't assume the skb is still around after enqueueing to child
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3586
- Patch: 5.10.0/CVE-2022-3586-sch_sfb-Don-t-assume-the-skb-is-still-around-after-enqueueing-to-child.patch
- From: kernel-5.10.149-1
- CVE-2022-3586
- Description:
sch_sfb: Also store skb len before calling child enqueue
- CVE: https://ubuntu.com/security/CVE-2022-3586
- Patch: ubuntu-focal/5.4.0-136.153/0006-CVE-2022-3586-sch_sfb-Also-store-skb-len-before-calling-child-enqu.patch
- From: 5.4.0-136.153
- CVE-2022-39842
- Description:
pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-39842
- Patch: 5.4.0/CVE-2022-39842.patch
- From: v5.19
- CVE-2022-43750
- Description:
usb: mon: make mmapped memory read only
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
- Patch: 4.14.0/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
- From: 5.19.15
- CVE-2022-3646
- Description:
nilfs2: fix leak of nilfs_root in case of writer thread creation failure
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-3646.html
- Patch: 5.4.0/CVE-2022-3646-nilfs2-fix-NULL-pointer-dereference-at-nilfs_bmap_lo.patch
- From: kernel-5.4.219-126.410
- CVE-2022-42896
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://ubuntu.com/security/CVE-2022-42896
- Patch: ubuntu-focal/5.4.0-137.154/0001-CVE-2022-42896-CVE-2022-45934-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
- From: 5.4.0-137.154
- CVE-2022-3643
- Description:
xen/netback: Ensure protocol headers don't fall in the non-linear area
- CVE: https://ubuntu.com/security/CVE-2022-3643
- Patch: 5.15.0/CVE-2022-3643-0001-xen-netback-Ensure-protocol-headers-don-t-fall-in-th.patch
- From: 5.15.0-58.64
- CVE-2022-42896
- Description:
Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: 5.15.0/CVE-2022-42896-0002-Bluetooth-L2CAP-Fix-l2cap_global_chan_by_psm.patch
- From: 5.15.0-58.64
- CVE-2022-45934
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: 5.15.0/CVE-2022-45934-0001-Bluetooth-L2CAP-Fix-u8-overflow.patch
- From: 5.15.0-58.64
- CVE-2022-43945
- Description:
NFSD: Cap rsize_bop result based on send buffer size
- CVE: https://ubuntu.com/security/CVE-2022-43945
- Patch: ubuntu-focal/5.4.0-137.154/0004-CVE-2022-43945-NFSD-Cap-rsize_bop-result-based-on-send-buffer-size.patch
- From: 5.4.0-137.154
- CVE-2022-3649
- Description:
nilfs2: fix use-after-free bug of struct nilfs_root
- CVE: https://ubuntu.com/security/CVE-2022-3649
- Patch: ubuntu-focal/5.4.0-139.156/0001-CVE-2022-3649-nilfs2-fix-use-after-free-bug-of-struct-nilfs_root.patch
- From: 5.4.0-139.156
- CVE-2023-20928
- Description:
binder: fix UAF of alloc->vma in race with munmap()
- CVE: https://ubuntu.com/security/CVE-2023-20928
- Patch: ubuntu-focal/5.4.0-139.156/0002-binder-fix-UAF-of-alloc-vma-in-race-with-munmap.patch
- From: 5.4.0-139.156
- CVE-2022-3640
- Description:
[PATCH] Bluetooth: L2CAP: Fix attempting to access uninitialized
- CVE: https://ubuntu.com/security/CVE-2022-3640
- Patch: ubuntu-focal/5.4.0-139.156/0004-CVE-2022-3640-Bluetooth-L2CAP-fix-use-after-free-in-l2cap_conn_del.patch
- From: 5.4.0-139.156
- CVE-2022-42895
- Description:
[PATCH] Bluetooth: L2CAP: Fix attempting to access uninitialized
- CVE: https://ubuntu.com/security/CVE-2022-42895
- Patch: ubuntu-focal/5.4.0-139.156/0005-CVE-2022-42895-Bluetooth-L2CAP-Fix-attempting-to-access-uninitializ.patch
- From: 5.4.0-139.156
- CVE-2022-41850
- Description:
roccat: Fix use-after-free in roccat_read()
- CVE: https://ubuntu.com/security/CVE-2022-41850
- Patch: ubuntu-focal/5.4.0-139.156/0006-CVE-2022-41850-HID-roccat-Fix-use-after-free-in-roccat_read.patch
- From: 5.4.0-139.156
- CVE-2022-3628
- Description:
wifi: brcmfmac: Fix potential buffer overflow in
- CVE: https://ubuntu.com/security/CVE-2022-3628
- Patch: ubuntu-focal/5.4.0-139.156/0007-CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf.patch
- From: 5.4.0-139.156
- CVE-2022-41849
- Description:
fbdev: smscufx: Fix use-after-free in ufx_ops_open()
- CVE: https://ubuntu.com/security/CVE-2022-41849
- Patch: ubuntu-focal/5.4.0-139.156/0008-CVE-2022-41849-fbdev-smscufx-Fix-use-after-free-in-ufx_ops_open.patch
- From: 5.4.0-139.156
- CVE-2022-3545
- Description:
nfp: fix use-after-free in area_cache_get()
- CVE: https://ubuntu.com/security/CVE-2022-3545
- Patch: 5.10.0/CVE-2022-3545-nfp-fix-use-after-free0in-area_cache_get.patch
- From: 5.10.162-1
- CVE-2023-0266
- Description:
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
- CVE: https://ubuntu.com/security/CVE-2023-0266
- Patch: 5.4.0/CVE-2023-0266-alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch
- From: 5.4.0-144.161
- CVE-2022-36280
- Description:
drm/vmwgfx: Validate the box size for the snooped cursor
- CVE: https://ubuntu.com/security/CVE-2022-36280
- Patch: 5.10.0/CVE-2022-36280-drm-vmwgfx-validate-the-box-size-for-snooped-cursor.patch
- From: 5.10.162-1
- CVE-2022-41218
- Description:
media: dvb-core: Fix UAF due to refcount races at releasing
- CVE: https://ubuntu.com/security/CVE-2022-41218
- Patch: 5.10.0/CVE-2022-41218-media-dvb-core-fix-UAF-due-to-refcount-races-at-releasing.patch
- From: 5.10.162-1
- CVE-2022-47929
- Description:
net: sched: disallow noqueue for qdisc classes
- CVE: https://ubuntu.com/security/CVE-2022-47929
- Patch: 5.10.0/CVE-2022-47929-net-sched-disallow-noqueue-for-qdisc-classes.patch
- From: 5.10.162-1
- CVE-2023-0394
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://ubuntu.com/security/CVE-2023-0394
- Patch: 5.10.0/CVE-2023-0394-ipv6-raw-deduct-extension-header-length-in-rawv6_push_pending_frames.patch
- From: 5.10.162-1
- CVE-2023-23454
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://ubuntu.com/security/CVE-2023-23454
- Patch: 5.4.0/CVE-2023-23454-net-sched-cbq-dont-intepret-cls-results-when-asked-t.patch
- From: 5.4.0-144.161
- CVE-2023-23455
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://ubuntu.com/security/CVE-2023-23455
- Patch: 5.10.0/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 5.10.162-1
- CVE-2023-0045
- Description:
x86/bugs: Flush IBP in ib_prctl_set()
- CVE: https://ubuntu.com/security/CVE-2023-0045
- Patch: 5.4.0/CVE-2023-0045-x86-bugs-flush-ibp-in-ib_prctl_set.patch
- From: 5.4.0-144.161
- CVE-2023-0461
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://ubuntu.com/security/CVE-2023-0461
- Patch: 5.4.0/CVE-2023-0461-net-ulp-prevent-ulp-without-clone-op-from-entering-the-listen-status.patch
- From: 5.4.0-144.161
- CVE-2022-3424
- Description:
misc: sgi-gru: fix use-after-free error in gru_set_context_option
- CVE: https://ubuntu.com/security/CVE-2022-3424
- Patch: 5.4.0/CVE-2022-3424-misc-sgi-gru-fix-use-after-free-error-in-gru_set_con.patch
- From: 5.4.0-144.161
- CVE-2022-3169
- Description:
nvme: ensure subsystem reset is single threaded
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-3169.html
- Patch: 5.4.0/CVE-2022-3169-nvme-ensure-subsystem-reset-is-single-threaded.patch
- From: 5.4.226-129.415.amzn2
- CVE-2022-3623
- Description:
mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page
- CVE: https://ubuntu.com/security/CVE-2022-3623
- Patch: 5.4.0/CVE-2022-3623-mm-hugetlb-fix-races-when-looking-up-a-CONT-PTE-PMD-size-hugetlb-page.patch
- From: 5.4.0-144.161
- CVE-2022-3521
- Description:
kcm: avoid potential race in kcm_tx_work
- CVE: https://ubuntu.com/security/CVE-2022-3521
- Patch: 5.4.0/CVE-2022-3521-kcm-void-potential-race-in-kcm_tx_work.patch
- From: 5.4.0-144.161
- CVE-2022-3435
- Description:
ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference
- CVE: https://ubuntu.com/security/CVE-2022-3435
- Patch: 5.4.0/001-CVE-2022-3435-ipv4-Handle-attempt-to-delete-multipath-route-when-fib_info-contains-an-nh-reference-1.patch
- From: 5.4.0-144.161
- CVE-2022-3435
- Description:
ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference
- CVE: https://ubuntu.com/security/CVE-2022-3435
- Patch: 5.4.0/0002-CVE-2022-3435-ipv4-Fix-route-deletion-when-nexthop-info-is-not-specified-1.patch
- From: 5.4.0-144.161
- CVE-2022-47520
- Description:
- CVE: https://ubuntu.com/security/CVE-2022-47520
- Patch: 5.4.0/CVE-2022-47520-wifi-wilc1000-validate-pairwise-and-authentication-suite-offsets.patch
- From: 5.4.0-144.161
- CVE-2022-4378
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://linux.oracle.com/cve/CVE-2022-4378.html
- Patch: 4.14.35/CVE-2022-4378-0200-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: 4.14.35-2047.520.3.1
- CVE-2022-4378
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://linux.oracle.com/cve/CVE-2022-4378.html
- Patch: 4.14.35/CVE-2022-4378-0300-proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-C-strings.patch
- From: 4.14.35-2047.520.3.1
- CVE-2022-4139
- Description:
drm/i915: fix TLB invalidation for Gen12 video and compute engines
- CVE: https://ubuntu.com/security/CVE-2022-4139
- Patch: 5.4.0/CVE-2022-4139-drm-i915-fix-TLB-invalidation-for-Gen12-video-and-compute-engines-1.patch
- From: 5.4.0-144.161
- CVE-2021-3669
- Description:
ipc: replace costly bailout check in sysvipc_find_ipc()
- CVE: https://ubuntu.com/security/CVE-2021-3669
- Patch: ubuntu-focal/5.4.0-146.163/CVE-2021-3669-ipc-replace-costly-bailout-check-in-sysvipc_find_ipc.patch
- From: 5.4.0-146.163
- CVE-2022-2196
- Description:
KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- CVE: https://ubuntu.com/security/CVE-2022-2196
- Patch: ubuntu-focal/5.4.0-146.163/CVE-2022-2196-KVM-VMX-Execute-IBPB-on-emulated-VM-exit-when-guest-.patch
- From: 5.4.0-146.163
- CVE-2022-4382
- Description:
USB: gadgetfs: Fix race between mounting and unmounting
- CVE: https://ubuntu.com/security/CVE-2022-4382
- Patch: ubuntu-focal/5.4.0-146.163/CVE-2022-4382-USB-gadgetfs-Fix-race-between-mounting-and-unmountin.patch
- From: 5.4.0-146.163
- CVE-2023-23559
- Description:
wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
- CVE: https://ubuntu.com/security/CVE-2023-23559
- Patch: ubuntu-focal/5.4.0-146.163/CVE-2023-23559-wifi-rndis_wlan-Prevent-buffer-overflow-in-rndis_que.patch
- From: 5.4.0-146.163
- CVE-2023-2166
- Description:
can: af_can: fix NULL pointer dereference in can_rcv_filter
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2166
- Patch: ubuntu-focal/5.4.0-144.161/CVE-2023-2166-can-af_can-fix-NULL-pointer-dereference-in-can_rcv_f.patch
- From: 5.4.0-144.161
- n/a
- Description:
USB: move snd_usb_pipe_sanity_check into the USB core
- CVE: n/a
- Patch: 5.4.0/introduce_usb_pipe_type_check.patch
- From: 5.10
- n/a
- Description:
USB: add usb_control_msg_send() and usb_control_msg_recv()
- CVE: n/a
- Patch: 5.10.0/usb-add-usb_control_msg_send-and-usb_control_msg_recv.patch
- From: 5.10
- CVE-2023-1281
- Description:
net/sched: tcindex: update imperfect hash filters respecting rcu
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1281
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-1281-net-sched-tcindex-update-imperfect-hash-filters-respecting-rcu.patch
- From: 5.4.0-147.164
- CVE-2023-1073
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1073
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-1073-hid-check-empty-report_list-in-hid_validate_values.patch
- From: 5.4.0-147.164
- CVE-2022-3108
- Description:
drm/amdkfd: Check for null pointer after calling kmemdup
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3108
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2022-3108-drm-amdkfd-Check-for-null-pointer-after-calling-kmemdup.patch
- From: 5.4.0-147.164
- CVE-2022-4129
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-4129
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2022-4129-l2tp-serialize-access-to-sk_user_data-with-sk_callback_lock.patch
- From: 5.4.0-147.164
- CVE-2023-1074
- Description:
sctp: fail if no bound addresses can be used for a given scope
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1074
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-given-scope.patch
- From: 5.4.0-147.164
- CVE-2023-26545
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-26545
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: 5.4.0-147.164
- CVE-2022-3903
- Description:
media: mceusb: Use new usb_control_msg_*() routines
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3903
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2022-3903-media-mceusb-use-new-usb_control_msg-routines-1.patch
- From: 5.4.0-147.164
- CVE-2023-0458
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://ubuntu.com/security/CVE-2023-0458
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-0458-prlimit-do_prlimit-needs-to-have-a-speculation-check.patch
- From: 5.4.0-147.164
- CVE-2023-1829
- Description:
Complex adaptation is required, mainline retired tcindex.
- CVE:
- Patch: skipped/CVE-2023-1829.patch
- From:
- CVE-2023-0459
- Description:
Safety check failed for copy_from_user; zendesk:191568
- CVE:
- Patch: skipped/CVE-2023-0459.patch
- From:
- CVE-2023-1075
- Description:
net/tls: tls_is_tx_ready() checked list_entry
- CVE: https://ubuntu.com/security/CVE-2023-1075
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-1075-patch-net-tls-tls-is-tx-ready-checked-list-entry.patch
- From: 5.4.0-149.166
- CVE-2023-1513
- Description:
kvm: initialize all of the kvm_debugregs structure before sending it
- CVE: https://ubuntu.com/security/CVE-2023-1513
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-1513-patch-kvm-initialize-all-of-the-kvm-debugregs-structure-before.patch
- From: 5.4.0-149.166
- CVE-2023-1078
- Description:
rds: rds_rm_zerocopy_callback() use list_first_entry()
- CVE: https://ubuntu.com/security/CVE-2023-1078
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-1078-patch-rds-rds-rm-zerocopy-callback-use-list-first-entry.patch
- From: 5.4.0-149.166
- CVE-2023-2162
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost
- CVE: https://ubuntu.com/security/CVE-2023-2162
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-2162-patch-scsi-iscsi-tcp-fix-uaf-during-login-when-accessing-the.patch
- From: 5.4.0-149.166
- CVE-2023-32269
- Description:
netrom: Fix use-after-free caused by accept on already connected
- CVE: https://ubuntu.com/security/CVE-2023-32269
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-32269-patch-netrom-fix-use-after-free-caused-by-accept-on-already.patch
- From: 5.4.0-149.166
- CVE-2023-1118
- Description:
[PATCH] media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
- CVE: https://ubuntu.com/security/CVE-2023-1118
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-1118-patch-media-rc-fix-use-after-free-bugs-caused-by-ene-tx-irqsim.patch
- From: 5.4.0-149.166
- CVE-2023-1380
- Description:
wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
- CVE: https://ubuntu.com/security/CVE-2023-1380
- Patch: ubuntu-focal/5.4.0-150.167/CVE-2023-1380-wifi-brcmfmac-slab-out-of-bounds-read-in-brcmf_get_a.patch
- From: 5.4.0-150.167
- CVE-2023-30456
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://ubuntu.com/security/CVE-2023-1380
- Patch: ubuntu-focal/5.4.0-150.167/CVE-2023-30456-KVM-nVMX-add-missing-consistency-checks-for-CR0-and-.patch
- From: 5.4.0-150.167
- CVE-2023-31436
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://ubuntu.com/security/CVE-2023-31436
- Patch: ubuntu-focal/5.4.0-150.167/CVE-2023-31436-net-sched-sch_qfq-prevent-slab-out-of-bounds-in-qfq_.patch
- From: 5.4.0-150.167
- CVE-2023-32233
- Description:
netfilter: nf_tables: deactivate anonymous set from
- CVE: https://ubuntu.com/security/CVE-2023-32233
- Patch: ubuntu-focal/5.4.0-150.167/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-pr.patch
- From: 5.4.0-150.167
- CVE-2023-35788
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://ubuntu.com/security/CVE-2023-35788
- Patch: ubuntu-jammy/5.15.0-76.83/CVE-2023-35788-patch-net-sched-flower-fix-possible-oob-write-in.patch
- From: 5.15.0-76.83
- CVE-2023-3090
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://ubuntu.com/security/CVE-2023-3090
- Patch: ubuntu-focal/5.4.0-155.172/CVE-2023-3090-ipvlan-fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 5.4.0-155.172
- CVE-2023-3390
- Description:
netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- CVE: https://ubuntu.com/security/CVE-2023-3390
- Patch: ubuntu-focal/5.4.0-155.172/CVE-2023-3390-netfilter-nf_tables-incorrect-error-path-handling-with-NFT_MSG_NEWRULE.patch
- From: 5.4.0-155.172
- CVE-2023-35001
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://ubuntu.com/security/CVE-2023-35001
- Patch: ubuntu-focal/5.4.0-155.172/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
- From: 5.4.0-155.172
- CVE-2023-32629
- Description:
overlayfs: Skip permission checking for trusted.overlayfs.* xattrs
- CVE: https://ubuntu.com/security/CVE-2023-32629
- Patch: ubuntu-focal/5.4.0-155.172/CVE-2023-32629-overlayfs-skip-permission-checking-for-trusted-overlayfs-xattrs.patch
- From: 5.4.0-155.172
- CVE-2023-3141
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2023-3141
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-3141-patch-memstick-r592-fix-uaf-bug-in-r592-remove-due-to-race.patch
- From: 5.4.0-156.173
- CVE-2023-3111
- Description:
btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()
- CVE: https://ubuntu.com/security/CVE-2023-3111
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-3111-btrfs-unset-reloc-control-if-transaction-commit-fails-in-prepare_to_relocate.patch
- From: 5.4.0-156.173
- CVE-2023-1611
- Description:
[PATCH] btrfs: fix race between quota disable and quota assign ioctls
- CVE: https://ubuntu.com/security/CVE-2023-1611
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-1611-patch-btrfs-fix-race-between-quota-disable-and-quota-assign-ioctls.patch
- From: 5.4.0-156.173
- CVE-2022-0168
- Description:
cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
- CVE: https://ubuntu.com/security/CVE-2022-0168
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-0168-patch-cifs-fix-null-ptr-dereference-in-smb2-ioctl-query-info.patch
- From: 5.4.0-156.173
- CVE-2023-0590
- Description:
net: sched: fix race condition in qdisc_graft()
- CVE: https://ubuntu.com/security/CVE-2023-0590
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-0590-patch-net-sched-fix-race-condition-in-qdisc-graft.patch
- From: 5.4.0-156.173
- CVE-2023-2194
- Description:
[PATCH] i2c: xgene-slimpro: Fix out-of-bounds bug in
- CVE: https://ubuntu.com/security/CVE-2023-2194
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-2194-patch-i2c-xgene-slimpro-fix-out-of-bounds-bug-in.patch
- From: 5.4.0-156.173
- CVE-2023-33203
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race
- CVE: https://ubuntu.com/security/CVE-2023-33203
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-33203-patch-net-qcom-emac-fix-use-after-free-bug-in-emac-remove-due-to.patch
- From: 5.4.0-156.173
- CVE-2023-30772
- Description:
power: supply: da9150: Fix use after free bug in
- CVE: https://ubuntu.com/security/CVE-2023-30772
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-30772-patch-power-supply-da9150-fix-use-after-free-bug-in.patch
- From: 5.4.0-156.173
- CVE-2023-28466
- Description:
net: tls: fix possible race condition between
- CVE: https://ubuntu.com/security/CVE-2023-28466
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-28466-patch-net-tls-fix-possible-race-condition-between.patch
- From: 5.4.0-156.173
- CVE-2023-2124
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://ubuntu.com/security/CVE-2023-2124
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-2124-patch-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: 5.4.0-156.173
- CVE-2020-36691
- Description:
netlink: limit recursion depth in policy validation
- CVE: https://ubuntu.com/security/CVE-2020-36691
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2020-36691-patch-netlink-limit-recursion-depth-in-policy-validation-1.patch
- From: 5.4.0-156.173
- CVE-2022-4269
- Description:
[PATCH] act_mirred: use the backlog for nested calls to mirred
- CVE: https://ubuntu.com/security/CVE-2022-4269
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-4269-patch-act-mirred-use-the-backlog-for-nested-calls-to-mirred.patch
- From: 5.4.0-156.173
- CVE-2023-1855
- Description:
hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to
- CVE: https://ubuntu.com/security/CVE-2023-1855
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-1855-patch-hwmon-xgene-fix-use-after-free-bug-in-xgene-hwmon-remove.patch
- From: 5.4.0-156.173
- CVE-2023-1990
- Description:
nfc: st-nci: Fix use after free bug in ndlc_remove due to race
- CVE: https://ubuntu.com/security/CVE-2023-1990
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-1990-patch-nfc-st-nci-fix-use-after-free-bug-in-ndlc-remove-due-to.patch
- From: 5.4.0-156.173
- CVE-2022-1184
- Description:
ext4: verify dir block before splitting it
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-ext4-verify-dir-block-before-splitting-it.patch
- From: 5.4.0-156.173
- CVE-2022-1184
- Description:
ext4: avoid cycles in directory h-tree
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-ext4-avoid-cycles-in-directory-h-tree.patch
- From: 5.4.0-156.173
- CVE-2022-1184
- Description:
ext4: make variable "count" signed
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-make-variable-count-signed.patch
- From: 5.4.0-156.173
- CVE-2022-1184
- Description:
ext4: check if directory block is within i_size
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-04-ext4-check-if-directory-block-is-within-i_size.patch
- From: 5.4.0-156.173
- CVE-2022-1184
- Description:
ext4: make sure ext4_append() always allocates new block
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-05-ext4-make-sure-ext4_append-always-allocates-new-block.patch
- From: 5.4.0-156.173
- CVE-2022-1184
- Description:
ext4: fix check for block being out of directory size
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-06-ext4-fix-check-for-block-being-out-of-directory-size.patch
- From: 5.4.0-156.173
- CVE-2022-27672
- Description:
x86/speculation: Identify processors vulnerable to SMT RSB predictions
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: smt_rsb-enable.patch
- From: N/A
- CVE-2022-27672
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug
- CVE: https://ubuntu.com/security/CVE-2022-27672
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug.patch
- From: 5.4.0-156.173
- CVE-2022-27672
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-27672
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug-kpatch.patch
- From: 5.4.0-156.173
- CVE-2022-40982
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-40982.patch
- From:
- CVE-2023-3776
- Description:
net/sched: cls_fw: Fix improper refcount update leads to
- CVE: https://ubuntu.com/security/CVE-2023-3776
- Patch: ubuntu-focal/5.4.0-159.176/CVE-2023-3776-patch-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 5.4.0-159.176
- CVE-2023-3611
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://ubuntu.com/security/CVE-2023-3611
- Patch: ubuntu-focal/5.4.0-159.176/CVE-2023-3611-patch-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
- From: 5.4.0-159.176
- CVE-2023-3609
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://ubuntu.com/security/CVE-2023-3609
- Patch: ubuntu-focal/5.4.0-159.176/CVE-2023-3609-patch-net-sched-cls-u32-fix-reference-counter-leak-leading-to.patch
- From: 5.4.0-159.176
- CVE-2023-20593
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: zenbleed-enable.patch
- From: N/A
- CVE-2023-21255
- Description:
binder: fix UAF caused by faulty buffer cleanup
- CVE: https://ubuntu.com/security/CVE-2023-21255
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-21255-patch-binder-fix-uaf-caused-by-faulty-buffer-cleanup.patch
- From: 5.4.0-162.179
- CVE-2023-35828
- Description:
usb: gadget: udc: renesas_usb3: Fix use after free bug in
- CVE: https://ubuntu.com/security/CVE-2023-35828
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-35828-patch-usb-gadget-udc-renesas-usb3-fix-use-after-free-bug-in.patch
- From: 5.4.0-162.179
- CVE-2023-35823
- Description:
media: saa7134: fix use after free bug in saa7134_finidev due to race
- CVE: https://ubuntu.com/security/CVE-2023-35823
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-35823-patch-media-saa7134-fix-use-after-free-bug-in-saa7134-finidev-due.patch
- From: 5.4.0-162.179
- CVE-2023-2163
- Description:
bpf: Fix incorrect verifier pruning due to missing register precision
- CVE: https://ubuntu.com/security/CVE-2023-2163
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-2163-patch-bpf-fix-incorrect-verifier-pruning-due-to-missing-register.patch
- From: 5.4.0-162.179
- CVE-2023-3268
- Description:
relayfs: fix out-of-bounds access in relay_file_read
- CVE: https://ubuntu.com/security/CVE-2023-3268
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-3268-patch-relayfs-fix-out-of-bounds-access-in-relay-file-read.patch
- From: 5.4.0-162.179
- CVE-2023-35824
- Description:
media: dm1105: Fix use after free bug in dm1105_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2023-35824
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-35824-media-dm1105-fix-use-after-free-bug-in-dm1105_remove-due-to-race-condition.patch
- From: 5.4.0-162.179
- CVE-2023-2002
- Description:
bluetooth: Perform careful capability checks in hci_sock_ioctl()
- CVE: https://ubuntu.com/security/CVE-2023-2002
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-2002-bluetooth-perform-careful-capability-checks-in-hci_sock_ioctl.patch
- From: 5.4.0-162.179
- CVE-2023-31084
- Description:
media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
- CVE: https://ubuntu.com/security/CVE-2023-31084
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-31084-media-dvb-core-fix-kernel-WARNING-for-blocking-operation-in-wait_event.patch
- From: 5.4.0-162.179
- CVE-2023-2269
- Description:
dm ioctl: fix nested locking in table_clear() to remove deadlock concern
- CVE: https://ubuntu.com/security/CVE-2023-2269
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-2269-dm-ioctl-fix-nested-locking-in-table_clear-to-remove-deadlock-concern.patch
- From: 5.4.0-162.179
- CVE-2023-40283
- Description:
Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
- CVE: https://ubuntu.com/security/CVE-2023-40283
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-40283-patch-bluetooth-l2cap-fix-use-after-free-in-l2cap-sock-ready-cb.patch
- From: 5.4.0-163.180
- CVE-2023-4128
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4128
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-4128-patch-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.4.0-163.180
- CVE-2023-4128
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4128
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-4128-patch-net-sched-cls-fw-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.4.0-163.180
- CVE-2023-4128
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4128
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-4128-patch-net-sched-cls-u32-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.4.0-163.180
- CVE-2023-20588
- Description:
x86/CPU/AMD: Do not leak quotient data after a division by 0
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-20588.html
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-20588-x86-CPU-AMD-Do-not-leak-quotient-data-after-a-division-by-0.patch
- From: kernel-4.14.322-244.539.amzn2
- CVE-2023-1206
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-3338
- Description:
The patch remove functionality.
- CVE:
- Patch: skipped/CVE-2023-3338.patch
- From:
- CVE-2023-3863
- Description:
[PATCH] nfc: llcp: simplify llcp_sock_connect() error paths
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-3863-nfc-llcp-simplify-llcp_sock_connect-error-paths.patch
- From: 5.4.0-164.181
- CVE-2023-3863
- Description:
[PATCH] net: nfc: Fix use-after-free caused by nfc_llcp_find_local
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-3863-patch-net-nfc-fix-use-after-free-caused-by-nfc-llcp-find-local.patch
- From: 5.4.0-164.181
- CVE-2023-3212
- Description:
gfs2: Don't deref jdesc in evict
- CVE: https://ubuntu.com/security/CVE-2023-3212
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-3212-patch-gfs2-don-t-deref-jdesc-in-evict.patch
- From: 5.4.0-164.181
- CVE-2021-4001
- Description:
bpf: Fix toctou on read-only map's constant scalar tracking
- CVE: https://ubuntu.com/security/CVE-2021-4001
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2021-4001-bpf-Fix-toctou-on-read-only-maps-constant-scalar-tracking.patch
- From: 5.4.0-164.181
- CVE-2021-4001
- Description:
bpf: Fix toctou on read-only map's constant scalar tracking
- CVE: https://ubuntu.com/security/CVE-2021-4001
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2021-4001-bpf-Fix-toctou-on-read-only-maps-constant-scalar-tracking-kpatch.patch
- From: 5.4.0-164.181
- CVE-2023-4622
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://ubuntu.com/security/CVE-2023-4622
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4622-patch-af-unix-fix-null-ptr-deref-in-unix-stream-sendpage.patch
- From: 5.4.0-165.182
- CVE-2023-4623
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://ubuntu.com/security/CVE-2023-4623
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4623-patch-net-sched-sch-hfsc-ensure-inner-classes-have-fsc-curve.patch
- From: 5.4.0-165.182
- CVE-2023-4921
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue.patch
- From: 5.4.0-165.182
- CVE-2023-4921
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue-kpatch.patch
- From: 5.4.0-165.182
- CVE-2023-42753
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for
- CVE: https://ubuntu.com/security/CVE-2023-42753
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
- From: 5.4.0-165.182
- CVE-2023-42752
- Description:
igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU
- CVE: https://ubuntu.com/security/CVE-2023-42752
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42752-patch-igmp-limit-igmpv3-newpack-packet-size-to-ip-max-mtu.patch
- From: 5.4.0-165.182
- CVE-2023-4881
- Description:
CVE was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.
- CVE:
- Patch: skipped/CVE-2023-4881.patch
- From:
- CVE-2023-42755
- Description:
The patch removes functionality.
- CVE:
- Patch: skipped/CVE-2023-42755.patch
- From:
- CVE-2023-42756
- Description:
netfilter: ipset: Add schedule point in call_ad().
- CVE: https://ubuntu.com/security/CVE-2023-42756
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42756-netfilter-ipset-Add-schedule-point-in-call_ad.patch
- From: 5.4.0-165.182
- CVE-2023-42756
- Description:
netfilter: ipset: Fix race between IPSET_CMD_CREATE and
- CVE: https://ubuntu.com/security/CVE-2023-42756
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42756-patch-netfilter-ipset-fix-race-between-ipset-cmd-create-and.patch
- From: 5.4.0-165.182
- CVE-2023-34319
- Description:
xen/netback: Fix buffer overrun triggered by unusual packet
- CVE: https://ubuntu.com/security/CVE-2023-34319
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-34319-patch-xen-netback-fix-buffer-overrun-triggered-by-unusual-packet-155.patch
- From: 5.4.0-165.182
- CVE-2023-31083
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in
- CVE: https://ubuntu.com/security/CVE-2023-31083
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-31083-patch-bluetooth-hci-ldisc-check-hci-uart-proto-ready-flag-in.patch
- From: 5.4.0-166.183
- CVE-2023-4132
- Description:
media: usb: siano: Fix use after free bugs caused by do_submit_urb (dependency)
- CVE: https://ubuntu.com/security/CVE-2023-4132
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-4132-media-usb-siano-Fix-use-after-free-bugs-caused-by-do_submit_urb.patch
- From: 5.4.0-166.183
- CVE-2023-4132
- Description:
media: usb: siano: Fix warning due to null work_func_t function
- CVE: https://ubuntu.com/security/CVE-2023-4132
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-4132-patch-media-usb-siano-fix-warning-due-to-null-work-func-t.patch
- From: 5.4.0-166.183
- CVE-2023-0597
- Description:
Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
- CVE:
- Patch: skipped/CVE-2023-0597.patch
- From:
- CVE-2023-3772
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://ubuntu.com/security/CVE-2023-3772
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-3772-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: 5.4.0-166.183
- CVE-2023-31085
- Description:
ubi: Refuse attaching if mtd's erasesize is 0
- CVE: https://ubuntu.com/security/CVE-2023-31085
- Patch: ubuntu-focal/5.4.0-167.184/CVE-2023-31085-ubi-Refuse-attaching-if-mtd-s-erasesize-is-0.patch
- From: 5.4.0-167.184
- CVE-2023-45871
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://ubuntu.com/security/CVE-2023-45871
- Patch: ubuntu-focal/5.4.0-167.184/CVE-2023-45871-patch-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 5.4.0-167.184
- CVE-2023-45871
- Description:
igb: set max size RX buffer when store bad packet is enabled (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-45871
- Patch: ubuntu-focal/5.4.0-167.184/CVE-2023-45871-kpatch.patch
- From: 5.4.0-167.184
- CVE-2023-6176
- Description:
net/tls: do not free tls_rec on async operation in
- CVE: https://ubuntu.com/security/CVE-2023-6176
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-6176-patch-net-tls-do-not-free-tls-rec-on-async-operation-in.patch
- From: 5.4.0-169.187
- CVE-2023-39189
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39189
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39189-patch-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 5.4.0-169.187
- CVE-2023-39193
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://ubuntu.com/security/CVE-2023-39193
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39193-patch-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 5.4.0-169.187
- CVE-2023-39192
- Description:
netfilter: xt_u32: validate user space input
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39192-patch-netfilter-xt-u32-validate-user-space-input.patch
- From: 5.4.0-169.187
- CVE-2023-39192
- Description:
netfilter: xt_u32: validate user space input (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39192-netfilter-xt-u32-validate-user-space-input-kpatch.patch
- From: 5.4.0-169.187
- CVE-2023-5717
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://ubuntu.com/security/CVE-2023-5717
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5717-patch-perf-disallow-mis-matched-inherited-group-reads.patch
- From: 5.4.0-169.187
- CVE-2023-5717
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://ubuntu.com/security/CVE-2023-5717
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch.patch
- From: 5.4.0-169.187
- CVE-2023-5178
- Description:
nvmet-tcp: move send/recv error handling in the send/recv methods instead of call-sites
- CVE: https://ubuntu.com/security/CVE-2023-5178
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5178-0001-nvmet-tcp-move-send-recv-error-handling-in-the-send-.patch
- From: 5.4.0-169.187
- CVE-2023-5178
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://ubuntu.com/security/CVE-2023-5178
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5178-patch-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 5.4.0-169.187
- CVE-2023-42754
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://ubuntu.com/security/CVE-2023-42754
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-42754-patch-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 5.4.0-169.187
- CVE-2023-39194
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39194
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39194-patch-net-xfrm-fix-xfrm-address-filter-oob-read.patch
- From: 5.4.0-169.187
- CVE-2023-3006
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2023-3006.patch
- From:
- CVE-2023-6040
- Description:
netfilter: nf_tables: Reject tables of unsupported family
- CVE: https://ubuntu.com/security/CVE-2023-6040
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6040-netfilter-nf_tables-Reject-tables-of-unsupported-family-165.patch
- From: 5.4.0-170.188
- CVE-2023-6606
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://ubuntu.com/security/CVE-2023-6606
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6606-smb-client-fix-OOB-in-smbCalcSize.patch
- From: 5.4.0-170.188
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://ubuntu.com/security/CVE-2023-6931
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6931-perf-Fix-perf_event_validate_size.patch
- From: 5.4.0-170.188
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size() lockdep splat
- CVE: https://ubuntu.com/security/CVE-2023-6931
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6931-perf-Fix-perf_event_validate_size-lockdep-splat.patch
- From: 5.4.0-170.188
- CVE-2023-6932
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://ubuntu.com/security/CVE-2023-6932
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
- From: 5.4.0-170.188
- CVE-2023-35827
- Description:
ravb: Fix use-after-free issue in ravb_tx_timeout_work()
- CVE: https://ubuntu.com/security/CVE-2023-35827
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-35827-patch-ravb-fix-use-after-free-issue-in-ravb-tx-timeout-work.patch
- From: 5.4.0-171.189
- CVE-2023-46343
- Description:
nfc: nci: fix possible NULL pointer dereference in send_acknowledge()
- CVE: https://ubuntu.com/security/CVE-2023-46343
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-46343-patch-nfc-nci-fix-possible-null-pointer-dereference-in.patch
- From: 5.4.0-171.189
- CVE-2023-45863
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://ubuntu.com/security/CVE-2023-45863
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-45863-patch-kobject-fix-slab-out-of-bounds-in-fill-kobj-path.patch
- From: 5.4.0-171.189
- CVE-2023-34324
- Description:
xen/events: replace evtchn_rwlock with RCU
- CVE: https://ubuntu.com/security/CVE-2023-34324
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-34324-xen-events-replace-evtchn_rwlock-with-RCU-kpatch.patch
- From: 5.4.0-171.189
- CVE-2024-0646
- Description:
net: tls, update curr on splice as well
- CVE: https://ubuntu.com/security/CVE-2024-0646
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2024-0646-patch-net-tls-update-curr-on-splice-as-well.patch
- From: 5.4.0-172.190
- CVE-2024-0565
- Description:
smb: client: fix OOB in receive_encrypted_standard()
- CVE: https://ubuntu.com/security/CVE-2024-0565
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2024-0565-patch-smb-client-fix-oob-in-receive-encrypted-standard.patch
- From: 5.4.0-172.190
- CVE-2023-6915
- Description:
ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://ubuntu.com/security/CVE-2023-6915
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2023-6915-patch-ida-fix-crash-in-ida-free-when-the-bitmap-is-empty.patch
- From: 5.4.0-172.190
- CVE-2023-51781
- Description:
appletalk: Fix Use-After-Free in atalk_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51781
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2023-51781-patch-appletalk-fix-use-after-free-in-atalk-ioctl.patch
- From: 5.4.0-172.190
- CVE-2023-22995
- Description:
usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core
- CVE: https://ubuntu.com/security/CVE-2023-22995
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-22995-patch-usb-dwc3-dwc3-qcom-add-missing-platform-device-put-in.patch
- From: 5.4.0-173.191
- CVE-2023-51779
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg
- CVE: https://ubuntu.com/security/CVE-2023-51779
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-51779-patch-bluetooth-af-bluetooth-fix-use-after-free-in.patch
- From: 5.4.0-173.191
- CVE-2021-44879
- Description:
f2fs: fix to do sanity check on inode type during garbage collection
- CVE: https://ubuntu.com/security/CVE-2021-44879
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2021-44879-patch-f2fs-fix-to-do-sanity-check-on-inode-type-during-garbage.patch
- From: 5.4.0-173.191
- CVE-2023-4244
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-6121
- Description:
nvmet: nul-terminate the NQNs passed in the connect command
- CVE: https://ubuntu.com/security/CVE-2023-6121
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-6121-patch-nvmet-nul-terminate-the-nqns-passed-in-the-connect-command.patch
- From: 5.4.0-173.191
- CVE-2023-51782
- Description:
net/rose: Fix Use-After-Free in rose_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51782
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-51782-patch-net-rose-fix-use-after-free-in-rose-ioctl.patch
- From: 5.4.0-173.191
- CVE-2023-51780
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51780
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-51780-patch-atm-fix-use-after-free-in-do-vcc-ioctl.patch
- From: 5.4.0-173.191
- CVE-2024-0340
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://ubuntu.com/security/CVE-2024-0340
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-0340-CVE-2024-0340-patch-vhost-use-kzalloc-instead-of-kmalloc-followed-by.patch
- From: 5.4.0-173.191
- CVE-2024-1086
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://ubuntu.com/security/CVE-2024-1086
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2024-1086-patch-netfilter-nf-tables-reject-queue-drop-verdict-parameters-5.4.0-167.184.patch
- From: 5.4.0-174.193
- CVE-2023-23000
- Description:
phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function
- CVE: https://ubuntu.com/security/CVE-2023-23000
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2023-23000-patch-phy-tegra-xusb-fix-return-value-of.patch
- From: 5.4.0-174.193
- CVE-2023-23004
- Description:
malidp: Fix NULL vs IS_ERR() checking
- CVE: https://ubuntu.com/security/CVE-2023-23004
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2023-23004-patch-malidp-fix-null-vs-is-err-checking.patch
- From: 5.4.0-174.193
- CVE-2024-24855
- Description:
scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()
- CVE: https://ubuntu.com/security/CVE-2024-24855
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2024-24855-patch-scsi-lpfc-fix-a-possible-data-race-in.patch
- From: 5.4.0-174.193
- CVE-2023-52454
- Description:
nvmet-tcp: add bounds check on Transfer Tag
- CVE: https://ubuntu.com/security/CVE-2023-52454
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52454-03-nvmet-tcp-add-bounds-check-on-Transfer-Tag.patch
- From: 5.4.0-176.196
- CVE-2023-52454
- Description:
nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length
- CVE: https://ubuntu.com/security/CVE-2023-52454
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52454-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-invalid-H2C-PDU-length.patch
- From: 5.4.0-176.196
- CVE-2023-52470
- Description:
drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()
- CVE: https://ubuntu.com/security/CVE-2023-52470
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52470-drm-radeon-check-the-alloc_workqueue-return-value-in-radeon_crtc_init.patch
- From: 5.4.0-176.196
- CVE-2023-52609
- Description:
binder: fix race between mmput() and do_exit()
- CVE: https://ubuntu.com/security/CVE-2023-52609
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52609-binder-fix-race-between-mmput-and-do_exit.patch
- From: 5.4.0-176.196
- CVE-2023-52612
- Description:
crypto: scomp - fix req->dst buffer overflow
- CVE: https://ubuntu.com/security/CVE-2023-52612
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52612-crypto-scomp-fix-req-dst-buffer-overflow.patch
- From: 5.4.0-176.196
- CVE-2024-26597
- Description:
net: qualcomm: rmnet: fix global oob in rmnet_policy
- CVE: https://ubuntu.com/security/CVE-2024-26597
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-26597-net-qualcomm-rmnet-fix-global-oob-in-rmnet_policy.patch
- From: 5.4.0-176.196
- CVE-2024-26597
- Description:
net: qualcomm: rmnet: fix global oob in rmnet_policy
- CVE: https://ubuntu.com/security/CVE-2024-26597
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-26597-net-qualcomm-rmnet-fix-global-oob-in-rmnet_policy-kpatch.patch
- From: 5.4.0-176.196
- CVE-2024-26633
- Description:
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
- CVE: https://ubuntu.com/security/CVE-2024-26633
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-26633-ip6_tunnel-fix-NEXTHDR_FRAGMENT-handling-in-ip6_tnl_parse_tlv_enc_lim.patch
- From: 5.4.0-176.196
- CVE-2023-52340
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://ubuntu.com/security/CVE-2023-52340
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52340-patch-ipv6-remove-max-size-check-inline-with-ipv4.patch
- From: 5.4.0-176.196
- CVE-2023-52340
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://ubuntu.com/security/CVE-2023-52340
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52340-fix-decnet-function-declaration.patch
- From: 5.4.0-176.196
- CVE-2024-23851
- Description:
dm ioctl: log an error if the ioctl structure is corrupted
- CVE: https://ubuntu.com/security/CVE-2024-23851
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-23851-patch-dm-ioctl-log-an-error-if-the-ioctl-structure-is-corrupted.patch
- From: 5.4.0-176.196
- CVE-2023-52429 CVE-2024-23851
- Description:
dm: limit the number of targets and parameter size area
- CVE: https://ubuntu.com/security/CVE-2024-23851
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52429-CVE-2024-23851-patch-dm-limit-the-number-of-targets-and-parameter-size-area.patch
- From: 5.4.0-176.196
- CVE-2023-52443
- Description:
apparmor: avoid crash when parsed profile name is empty
- CVE: https://ubuntu.com/security/CVE-2023-52443
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52443-apparmor-avoid-crash-when-parsed-profile-name-is-empty.patch
- From: 5.4.0-176.196
- CVE-2023-52448
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://ubuntu.com/security/CVE-2023-52448
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52448-gfs2-fix-kernel-NULL-pointer-dereference-in-gfs2_rgrp_dump.patch
- From: 5.4.0-176.196
- CVE-2023-52449
- Description:
mtd: Fix gluebi NULL pointer dereference caused by ftl
- CVE: https://ubuntu.com/security/CVE-2023-52449
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52449-mtd-fix-gluebi-NULL-pointer-dereference-caused-by-ftl-notifier.patch
- From: 5.4.0-176.196
- CVE-2023-52436
- Description:
f2fs: explicitly null-terminate the xattr list
- CVE: https://ubuntu.com/security/CVE-2023-52436
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52436-f2fs-explicitly-null-terminate-the-xattr-list.patch
- From: 5.4.0-176.196
- CVE-2023-52469
- Description:
drivers/amd/pm: fix a use-after-free in kv_parse_power_table
- CVE: https://ubuntu.com/security/CVE-2023-52469
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52469-drivers-amd-pm-fix-a-use-after-free-in-kv_parse_power_table.patch
- From: 5.4.0-176.196
- CVE-2023-52464
- Description:
EDAC/thunderx: Fix possible out-of-bounds string access
- CVE: https://ubuntu.com/security/CVE-2023-52464
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52464-edac-thunderx-fix-possible-out-of-bounds-string-access.patch
- From: 5.4.0-176.196
- CVE-2024-0607
- Description:
netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()
- CVE: https://ubuntu.com/security/CVE-2024-0607
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-0607-patch-netfilter-nf-tables-fix-pointer-math-issue-in.patch
- From: 5.4.0-176.196
- CVE-2023-52438
- Description:
Out of scope. Android related patch.
- CVE:
- Patch: skipped/CVE-2023-52438.patch
- From:
- CVE-2023-52439
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://ubuntu.com/security/CVE-2023-52439
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52439-uio-Fix-use-after-free-in-uio_open.patch
- From: 5.4.0-176.196
- CVE-2023-52444
- Description:
f2fs: fix to avoid dirent corruption
- CVE: https://ubuntu.com/security/CVE-2023-52444
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52444-patch-f2fs-fix-to-avoid-dirent-corruption.patch
- From: 5.4.0-176.196
- CVE-2023-52445
- Description:
media: pvrusb2: fix use after free on context disconnection
- CVE: https://ubuntu.com/security/CVE-2023-52445
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context-disconne.patch
- From: 5.4.0-176.196
- CVE-2023-52451
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52451.patch
- From:
- CVE-2023-46838
- Description:
xen-netback: don't produce zero-size SKB frags
- CVE: https://ubuntu.com/security/CVE-2023-46838
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-46838-patch-xen-netback-don-t-produce-zero-size-skb-frags.patch
- From: 5.4.0-176.196
- CVE-2024-26589
- Description:
bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS
- CVE: https://ubuntu.com/security/CVE-2024-26589
- Patch: ubuntu-focal/5.4.0-177.197/CVE-2024-26589-patch-bpf-reject-variable-offset-alu-on-ptr-to-flow-keys.patch
- From: 5.4.0-177.197
- CVE-2023-52603
- Description:
UBSAN: array-index-out-of-bounds in dtSplitRoot
- CVE: https://ubuntu.com/security/CVE-2023-52603
- Patch: ubuntu-focal/5.4.0-177.197/CVE-2023-52603-patch-ubsan-array-index-out-of-bounds-in-dtsplitroot.patch
- From: 5.4.0-177.197
- CVE-2023-52600
- Description:
jfs: fix uaf in jfs_evict_inode
- CVE: https://ubuntu.com/security/CVE-2023-52600
- Patch: ubuntu-focal/5.4.0-177.197/CVE-2023-52600-patch-jfs-fix-uaf-in-jfs-evict-inode.patch
- From: 5.4.0-177.197
- CVE-2023-24023
- Description:
Bluetooth: Add more enc key size check
- CVE: https://ubuntu.com/security/CVE-2023-24023
- Patch: ubuntu-focal/5.4.0-177.197/CVE-2023-24023-bluetooth-add-more-enc-key-size-check.patch
- From: 5.4.0-177.197
- CVE-2023-52604
- Description:
FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2023-52604
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52604-fs-jfs-ubsan-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.4.0-181.201
- CVE-2023-52601
- Description:
jfs: fix array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2023-52601
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52601-jfs-fix-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.4.0-181.201
- CVE-2023-52587
- Description:
IB/ipoib: Fix mcast list locking
- CVE: https://ubuntu.com/security/CVE-2023-52587
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52587-ib-ipoib-fix-mcast-list-locking.patch
- From: 5.4.0-181.201
- CVE-2024-26593
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://ubuntu.com/security/CVE-2024-26593
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions.patch
- From: 5.4.0-181.201
- CVE-2023-52606
- Description:
powerpc/lib: Validate size for vector operations
- CVE: https://ubuntu.com/security/CVE-2023-52606
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52606-powerpc-lib-validate-size-for-vector-operations.patch
- From: 5.4.0-181.201
- CVE-2023-52599
- Description:
jfs: fix array-index-out-of-bounds in diNewExt
- CVE: https://ubuntu.com/security/CVE-2023-52599
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52599-jfs-fix-array-index-out-of-bounds-in-dinewext.patch
- From: 5.4.0-181.201
- CVE-2023-52598
- Description:
s390/ptrace: handle setting of fpc register correctly
- CVE: https://ubuntu.com/security/CVE-2023-52598
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52598-s390-ptrace-handle-setting-of-fpc-register-correctly.patch
- From: 5.4.0-181.201
- CVE-2023-52597
- Description:
KVM: s390: fix setting of fpc register
- CVE: https://ubuntu.com/security/CVE-2023-52597
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52597-kvm-s390-fix-setting-of-fpc-register.patch
- From: 5.4.0-181.201
- CVE-2024-26625
- Description:
llc: call sock_orphan() at release time
- CVE: https://ubuntu.com/security/CVE-2024-26625
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26625-llc-call-sock-orphan-at-release-time.patch
- From: 5.4.0-181.201
- CVE-2024-26598
- Description:
KVM: arm64: vgic-its: Avoid potential UAF in LPI translation
- CVE: https://ubuntu.com/security/CVE-2024-26598
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26598-kvm-arm64-vgic-its-avoid-potential-uaf-in-lpi-translation.patch
- From: 5.4.0-181.201
- CVE-2023-52435
- Description:
net: prevent mss overflow in skb_segment()
- CVE: https://ubuntu.com/security/CVE-2023-52435
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52435-net-prevent-mss-overflow-in-skb-segment.patch
- From: 5.4.0-181.201
- CVE-2023-52583
- Description:
ceph: fix deadlock or deadcode of misusing dget()
- CVE: https://ubuntu.com/security/CVE-2023-52583
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52583-ceph-fix-deadlock-or-deadcode-of-misusing-dget.patch
- From: 5.4.0-181.201
- CVE-2023-52607
- Description:
powerpc/mm: Fix null-pointer dereference in pgtable_cache_add
- CVE: https://ubuntu.com/security/CVE-2023-52607
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52607-powerpc-mm-fix-null-pointer-dereference-in-pgtable-cache-add.patch
- From: 5.4.0-181.201
- CVE-2023-52623
- Description:
SUNRPC: Fix a suspicious RCU usage warning
- CVE: https://ubuntu.com/security/CVE-2023-52623
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52623-sunrpc-fix-a-suspicious-rcu-usage-warning.patch
- From: 5.4.0-181.201
- CVE-2024-23849
- Description:
net/rds: Fix UBSAN: array-index-out-of-bounds in
- CVE: https://ubuntu.com/security/CVE-2024-23849
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-23849-net-rds-fix-ubsan-array-index-out-of-bounds-in.patch
- From: 5.4.0-181.201
- CVE-2024-26600
- Description:
phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
- CVE: https://ubuntu.com/security/CVE-2024-26600
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26600-phy-ti-phy-omap-usb2-fix-null-pointer-dereference-for-srp.patch
- From: 5.4.0-181.201
- CVE-2024-26602
- Description:
sched/membarrier: reduce the ability to hammer on
- CVE: https://ubuntu.com/security/CVE-2024-26602
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
- From: 5.4.0-181.201
- CVE-2023-52637
- Description:
can: j1939: Fix UAF in j1939_sk_match_filter during
- CVE: https://ubuntu.com/security/CVE-2023-52637
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52637-can-j1939-fix-uaf-in-j1939-sk-match-filter-during.patch
- From: 5.4.0-181.201
- CVE-2023-52637
- Description:
can: j1939: Fix UAF in j1939_sk_match_filter during (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-52637
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52637-can-j1939-fix-uaf-in-j1939-sk-match-filter-during-kpatch.patch
- From: 5.4.0-181.201
- CVE-2023-52622
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://ubuntu.com/security/CVE-2023-52622
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg.patch
- From: 5.4.0-181.201
- CVE-2023-52622
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://ubuntu.com/security/CVE-2023-52622
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg-kpatch.patch
- From: 5.4.0-181.201
- CVE-2024-26606
- Description:
binder: signal epoll threads of self-work
- CVE: https://ubuntu.com/security/CVE-2024-26606
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26606-binder-signal-epoll-threads-of-self-work.patch
- From: 5.4.0-181.201
- CVE-2024-26615
- Description:
net/smc: fix illegal rmb_desc access in SMC-D connection dump
- CVE: https://ubuntu.com/security/CVE-2024-26615
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch
- From: 5.4.0-181.201
- CVE-2024-26635
- Description:
llc: Drop support for ETH_P_TR_802_2.
- CVE: https://ubuntu.com/security/CVE-2024-26635
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26635-llc-drop-support-for-eth-p-tr-802-2.patch
- From: 5.4.0-181.201
- CVE-2024-26635
- Description:
llc: Drop support for ETH_P_TR_802_2 (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26635
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26635-llc-drop-support-for-eth-p-tr-802-2-kpatch.patch
- From: 5.4.0-181.201
- CVE-2024-26636
- Description:
llc: make llc_ui_sendmsg() more robust against bonding
- CVE: https://ubuntu.com/security/CVE-2024-26636
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26636-llc-make-llc-ui-sendmsg-more-robust-against-bonding.patch
- From: 5.4.0-181.201
- CVE-2024-26663
- Description:
tipc: Check the bearer type before calling
- CVE: https://ubuntu.com/security/CVE-2024-26663
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26663-tipc-check-the-bearer-type-before-calling.patch
- From: 5.4.0-181.201
- CVE-2024-26671
- Description:
blk-mq: fix IO hang from sbitmap wakeup race
- CVE: https://ubuntu.com/security/CVE-2024-26671
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26671-blk-mq-fix-io-hang-from-sbitmap-wakeup-race.patch
- From: 5.4.0-181.201
- CVE-2024-26673
- Description:
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in
- CVE: https://ubuntu.com/security/CVE-2024-26673
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26673-netfilter-nft-ct-sanitize-layer-3-and-4-protocol-number-in.patch
- From: 5.4.0-181.201
- CVE-2024-26675
- Description:
ppp_async: limit MRU to 64K
- CVE: https://ubuntu.com/security/CVE-2024-26675
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26675-ppp-async-limit-mru-to-64k.patch
- From: 5.4.0-181.201
- CVE-2024-26679
- Description:
inet: read sk->sk_family once in inet_recv_error()
- CVE: https://ubuntu.com/security/CVE-2024-26679
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26679-inet-read-sk-sk-family-once-in-inet-recv-error.patch
- From: 5.4.0-181.201
- CVE-2024-26685
- Description:
nilfs2: fix potential bug in end_buffer_async_write
- CVE: https://ubuntu.com/security/CVE-2024-26685
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26685-nilfs2-fix-potential-bug-in-end-buffer-async-write-1.patch
- From: 5.4.0-181.201
- CVE-2024-26696
- Description:
nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()
- CVE: https://ubuntu.com/security/CVE-2024-26696
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26696-nilfs2-fix-hang-in-nilfs-lookup-dirty-data-buffers.patch
- From: 5.4.0-181.201
- CVE-2024-26697
- Description:
nilfs2: fix data corruption in dsync block recovery for small
- CVE: https://ubuntu.com/security/CVE-2024-26697
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26697-nilfs2-fix-data-corruption-in-dsync-block-recovery-for-small.patch
- From: 5.4.0-181.201
- CVE-2024-26702
- Description:
iio: magnetometer: rm3100: add boundary check for the value
- CVE: https://ubuntu.com/security/CVE-2024-26702
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26702-iio-magnetometer-rm3100-add-boundary-check-for-the-value.patch
- From: 5.4.0-181.201
- CVE-2024-26704
- Description:
ext4: fix double-free of blocks due to wrong extents
- CVE: https://ubuntu.com/security/CVE-2024-26704
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26704-ext4-fix-double-free-of-blocks-due-to-wrong-extents.patch
- From: 5.4.0-181.201
- CVE-2024-26720
- Description:
mm/writeback: fix possible divide-by-zero in
- CVE: https://ubuntu.com/security/CVE-2024-26720
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26720-mm-writeback-fix-possible-divide-by-zero-in.patch
- From: 5.4.0-181.201
- CVE-2023-52602
- Description:
jfs: fix slab-out-of-bounds Read in dtSearch
- CVE: https://ubuntu.com/security/CVE-2023-52602
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52602-jfs-fix-slab-out-of-bounds-read-in-dtsearch.patch
- From: 5.4.0-181.201
- CVE-2023-52486
- Description:
drm: Don't unref the same fb many times by mistake due to
- CVE: https://ubuntu.com/security/CVE-2023-52486
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52486-drm-don-t-unref-the-same-fb-many-times-by-mistake-due-to.patch
- From: 5.4.0-181.201
- CVE-2023-47233
- Description:
wifi: brcmfmac: Fix use-after-free bug in
- CVE: https://ubuntu.com/security/CVE-2023-47233
- Patch: ubuntu-focal/5.4.0-182.202/CVE-2023-47233-wifi-brcmfmac-fix-use-after-free-bug-in.patch
- From: 5.4.0-182.202
- CVE-2024-26622
- Description:
tomoyo: fix UAF write bug in tomoyo_write_control()
- CVE: https://ubuntu.com/security/CVE-2024-26622
- Patch: ubuntu-focal/5.4.0-182.202/CVE-2024-26622-tomoyo-fix-uaf-write-bug-in-tomoyo-write-control.patch
- From: 5.4.0-182.202
- CVE-2023-52530
- Description:
wifi: mac80211: fix potential key use-after-free
- CVE: https://ubuntu.com/security/CVE-2023-52530
- Patch: ubuntu-focal/5.4.0-182.202/CVE-2023-52530-wifi-mac80211-fix-potential-key-use-after-free.patch
- From: 5.4.0-182.202
- CVE-2024-26614
- Description:
Complex adaptation required. Network services prevents update because sleeps in inet_csk_accept() function.
- CVE:
- Patch: skipped/CVE-2024-26614.patch
- From:
- CVE-2024-0841 CVE-2024-26688
- Description:
fs,hugetlb: fix NULL pointer dereference in
- CVE: https://ubuntu.com/security/CVE-2024-26688
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-0841-CVE-2024-26688-fs-hugetlb-fix-null-pointer-dereference-in.patch
- From: 5.4.0-186.206
- CVE-2021-47063
- Description:
drm: bridge/panel: Cleanup connector on bridge detach
- CVE: https://ubuntu.com/security/CVE-2021-47063
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2021-47063-drm-bridge-panel-cleanup-connector-on-bridge-detach.patch
- From: 5.4.0-186.206
- CVE-2024-26733
- Description:
arp: Prevent overflow in arp_req_get().
- CVE: https://ubuntu.com/security/CVE-2024-26733
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26733-arp-prevent-overflow-in-arp-req-get.patch
- From: 5.4.0-186.206
- CVE-2024-26736
- Description:
afs: Increase buffer size in afs_update_volume_status()
- CVE: https://ubuntu.com/security/CVE-2024-26736
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26736-afs-increase-buffer-size-in-afs-update-volume-status.patch
- From: 5.4.0-186.206
- CVE-2024-26735
- Description:
ipv6: sr: fix possible use-after-free and null-ptr-deref
- CVE: https://ubuntu.com/security/CVE-2024-26735
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and-null-ptr-deref.patch
- From: 5.4.0-186.206
- CVE-2023-52504
- Description:
Unable to fix early initialization before enabling SMP d35652a5fc9944784f6f50a5c979518ff8dacf61
- CVE:
- Patch: skipped/CVE-2023-52504.patch
- From:
- CVE-2024-26712
- Description:
Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0
- CVE:
- Patch: skipped/CVE-2024-26712.patch
- From:
- CVE-2024-26748
- Description:
usb: cdns3: fix memory double free when handle zero packet
- CVE: https://ubuntu.com/security/CVE-2024-26748
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26748-usb-cdns3-fix-memory-double-free-when-handle-zero-packet.patch
- From: 5.4.0-186.206
- CVE-2024-26749
- Description:
usb: cdns3: fixed memory use after free at
- CVE: https://ubuntu.com/security/CVE-2024-26749
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26749-usb-cdns3-fixed-memory-use-after-free-at.patch
- From: 5.4.0-186.206
- CVE-2024-26751
- Description:
ARM: ep93xx: Add terminator to gpiod_lookup_table
- CVE: https://ubuntu.com/security/CVE-2024-26751
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26751-arm-ep93xx-add-terminator-to-gpiod-lookup-table.patch
- From: 5.4.0-186.206
- CVE-2024-26754
- Description:
gtp: fix use-after-free and null-ptr-deref in
- CVE: https://ubuntu.com/security/CVE-2024-26754
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26754-gtp-fix-use-after-free-and-null-ptr-deref-in.patch
- From: 5.4.0-186.206
- CVE-2024-26763
- Description:
dm-crypt: don't modify the data when using authenticated
- CVE: https://ubuntu.com/security/CVE-2024-26763
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26763-dm-crypt-don-t-modify-the-data-when-using-authenticated.patch
- From: 5.4.0-186.206
- CVE-2024-26764
- Description:
fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via
- CVE: https://ubuntu.com/security/CVE-2024-26764
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26764-fs-aio-restrict-kiocb-set-cancel-fn-to-i-o-submitted-via.patch
- From: 5.4.0-186.206
- CVE-2024-26766
- Description:
IB/hfi1: Fix sdma.h tx->num_descs off-by-one error
- CVE: https://ubuntu.com/security/CVE-2024-26766
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26766-ib-hfi1-fix-sdma-h-tx-num-descs-off-by-one-errors-pre166.patch
- From: 5.4.0-165.182
- CVE-2024-26766
- Description:
IB/hfi1: Fix sdma.h tx->num_descs off-by-one error
- CVE: https://ubuntu.com/security/CVE-2024-26766
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26766-ib-hfi1-fix-sdma-h-tx-num-descs-off-by-one-error.patch
- From: 5.4.0-186.206
- CVE-2024-26752
- Description:
l2tp: pass correct message length to ip6_append_data
- CVE: https://ubuntu.com/security/CVE-2024-26752
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26752-l2tp-pass-correct-message-length-to-ip6-append-data-171.patch
- From: 5.4.0-186.206
- CVE-2024-26793
- Description:
gtp: fix use-after-free and null-ptr-deref in gtp_newlink()
- CVE: https://ubuntu.com/security/CVE-2024-26793
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26793-gtp-fix-use-after-free-and-null-ptr-deref-in-gtp-newlink.patch
- From: 5.4.0-186.206
- CVE-2024-26778
- Description:
fbdev: savage: Error out if pixclock equals zero
- CVE: https://ubuntu.com/security/CVE-2024-26778
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26778-fbdev-savage-error-out-if-pixclock-equals-zero.patch
- From: 5.4.0-186.206
- CVE-2024-26779
- Description:
wifi: mac80211: fix race condition on enabling fast-xmit
- CVE: https://ubuntu.com/security/CVE-2024-26779
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26779-wifi-mac80211-fix-race-condition-on-enabling-fast-xmit.patch
- From: 5.4.0-186.206
- CVE-2024-26777
- Description:
fbdev: sis: Error out if pixclock equals zero
- CVE: https://ubuntu.com/security/CVE-2024-26777
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26777-fbdev-sis-error-out-if-pixclock-equals-zero.patch
- From: 5.4.0-186.206
- CVE-2024-26773
- Description:
ext4: avoid allocating blocks from corrupted group in
- CVE: https://ubuntu.com/security/CVE-2024-26773
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26773-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 5.4.0-186.206
- CVE-2024-26772
- Description:
ext4: avoid allocating blocks from corrupted group in
- CVE: https://ubuntu.com/security/CVE-2024-26772
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26772-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 5.4.0-186.206
- CVE-2024-26791
- Description:
btrfs: dev-replace: properly validate device names
- CVE: https://ubuntu.com/security/CVE-2024-26791
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26791-btrfs-dev-replace-properly-validate-device-names.patch
- From: 5.4.0-186.206
- CVE-2024-26788
- Description:
dmaengine: fsl-qdma: init irq after reg initialization
- CVE: https://ubuntu.com/security/CVE-2024-26788
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26788-dmaengine-fsl-qdma-init-irq-after-reg-initialization.patch
- From: 5.4.0-186.206
- CVE-2024-26790
- Description:
dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned
- CVE: https://ubuntu.com/security/CVE-2024-26790
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26790-dmaengine-fsl-qdma-fix-soc-may-hang-on-16-byte-unaligned.patch
- From: 5.4.0-186.206
- CVE-2024-26801
- Description:
Bluetooth: Avoid potential use-after-free in hci_error_reset
- CVE: https://ubuntu.com/security/CVE-2024-26801
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26801-bluetooth-avoid-potential-use-after-free-in-hci-error-reset.patch
- From: 5.4.0-186.206
- CVE-2024-27410
- Description:
wifi: nl80211: reject iftype change with mesh ID change
- CVE: https://ubuntu.com/security/CVE-2024-27410
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-27410-wifi-nl80211-reject-iftype-change-with-mesh-ID-change.patch
- From: 5.4.0-186.206
- CVE-2024-27413
- Description:
efi/capsule-loader: fix incorrect allocation size
- CVE: https://ubuntu.com/security/CVE-2024-27413
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-27413-efi-capsule-loader-fix-incorrect-allocation-size.patch
- From: 5.4.0-186.206
- CVE-2024-27417
- Description:
ipv6: fix potential "struct net" leak in inet6_rtm_getaddr()
- CVE: https://ubuntu.com/security/CVE-2024-27417
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-27417-ipv6-fix-potential-struct-net-leak-in-inet6_rtm_getaddr.patch
- From: 5.4.0-186.206
- CVE-2021-47070
- Description:
uio_hv_generic: Fix another memory leak in error handling
- CVE: https://ubuntu.com/security/CVE-2021-47070
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2021-47070-uio-hv-generic-fix-another-memory-leak-in-error-handling.patch
- From: 5.4.0-186.206
- CVE-2024-26839
- Description:
IB/hfi1: Fix a memleak in init_credit_return
- CVE: https://ubuntu.com/security/CVE-2024-26839
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26839-ib-hfi1-fix-a-memleak-in-init-credit-return.patch
- From: 5.4.0-186.206
- CVE-2024-26845
- Description:
scsi: target: core: Add TMF to tmr_list handling
- CVE: https://ubuntu.com/security/CVE-2024-26845
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26845-scsi-target-core-add-tmf-to-tmr-list-handling.patch
- From: 5.4.0-186.206
- CVE-2024-26804
- Description:
net: ip_tunnel: prevent perpetual headroom growth
- CVE: https://ubuntu.com/security/CVE-2024-26804
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26804-net-ip-tunnel-prevent-perpetual-headroom-growth-5.4.0-155.172.patch
- From: 5.4.0-186.206
- CVE-2024-26805
- Description:
netlink: Fix kernel-infoleak-after-free in
- CVE: https://ubuntu.com/security/CVE-2024-26805
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26805-netlink-fix-kernel-infoleak-after-free-in.patch
- From: 5.4.0-186.206
- CVE-2024-26840
- Description:
cachefiles: fix memory leak in cachefiles_add_cache()
- CVE: https://ubuntu.com/security/CVE-2024-26840
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26840-cachefiles-fix-memory-leak-in-cachefiles-add-cache.patch
- From: 5.4.0-186.206
- CVE-2024-23307
- Description:
md/raid5: fix atomicity violation in raid5_cache_count
- CVE: https://ubuntu.com/security/CVE-2024-23307
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-23307-md-raid5-fix-atomicity-violation-in-raid5-cache-count.patch
- From: 5.4.0-189.209
- CVE-2024-26586
- Description:
mlxsw: spectrum_acl_tcam: Fix stack corruption
- CVE: https://ubuntu.com/security/CVE-2024-26586
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26586-mlxsw-spectrum-acl-tcam-fix-stack-corruption.patch
- From: 5.4.0-189.209
- CVE-2024-26882
- Description:
net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
- CVE: https://ubuntu.com/security/CVE-2024-26882
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26882-net-ip-tunnel-make-sure-to-pull-inner-header-in-156.patch
- From: 5.4.0-189.209
- CVE-2024-26883
- Description:
bpf: Fix stackmap overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26883
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26883-bpf-fix-stackmap-overflow-check-on-32-bit-arches-141.patch
- From: 5.4.0-189.209
- CVE-2024-26884
- Description:
bpf: Fix hashtab overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26884
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26884-bpf-fix-hashtab-overflow-check-on-32-bit-arches.patch
- From: 5.4.0-189.209
- CVE-2024-27020
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
- CVE: https://ubuntu.com/security/CVE-2024-27020
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-27020-netfilter-nf-tables-fix-potential-data-race-in.patch
- From: 5.4.0-189.209
- CVE-2024-26934
- Description:
USB: core: Fix deadlock in usb_deauthorize_interface()
- CVE: https://ubuntu.com/security/CVE-2024-26934
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26934-usb-core-fix-deadlock-in-usb-deauthorize-interface.patch
- From: 5.4.0-189.209
- CVE-2024-26852
- Description:
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
- CVE: https://ubuntu.com/security/CVE-2024-26852
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26852-net-ipv6-avoid-possible-uaf-in-ip6-route-mpath-notify.patch
- From: 5.4.0-189.209
- CVE-2023-6270 CVE-2024-26898
- Description:
aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
- CVE: https://ubuntu.com/security/CVE-2024-26898
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-6270-CVE-2024-26898-aoe-fix-the-potential-use-after-free-problem-in.patch
- From: 5.4.0-189.209
- CVE-2024-26923
- Description:
af_unix: Do not use atomic ops for unix_sk(sk)->inflight.
- CVE: https://ubuntu.com/security/CVE-2024-26923
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26923-af-unix-do-not-use-atomic-ops-for-unix-sk-sk-inflight-100.patch
- From: 5.4.0-189.209
- CVE-2024-26923
- Description:
af_unix: Fix garbage collector racing against connect()
- CVE: https://ubuntu.com/security/CVE-2024-26923
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26923-af-unix-fix-garbage-collector-racing-against-connect.patch
- From: 5.4.0-189.209
- CVE-2024-26925
- Description:
netfilter: nf_tables: release batch on table validation from abort path
- CVE: https://ubuntu.com/security/CVE-2024-26925
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26925-02-netfilter-nf_tables-release-batch-on-table-validation-from-abort-path-176.patch
- From: 5.4.0-187.207
- CVE-2024-26903 CVE-2024-22099
- Description:
Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
- CVE: https://ubuntu.com/security/CVE-2024-22099
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-22099-CVE-2024-26903-bluetooth-rfcomm-fix-null-ptr-deref.patch
- From: 5.4.0-189.209
- CVE-2024-26903 CVE-2024-22099
- Description:
Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
- CVE: https://ubuntu.com/security/CVE-2024-22099
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-22099-CVE-2024-26903-bluetooth-rfcomm-fix-null-ptr-deref-kpatch.patch
- From: 5.4.0-189.209
- CVE-2024-26828
- Description:
cifs: fix underflow in parse_server_interfaces()
- CVE: https://ubuntu.com/security/CVE-2024-26828
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26828-cifs-fix-underflow-in-parse-server-interfaces.patch
- From: 5.4.0-189.209
- CVE-2024-24861
- Description:
media: xc4000: Fix atomicity violation in
- CVE: https://ubuntu.com/security/CVE-2024-24861
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-24861-media-xc4000-fix-atomicity-violation.patch
- From: 5.4.0-189.209
- CVE-2024-26894
- Description:
ACPI: processor_idle: Fix memory leak in
- CVE: https://ubuntu.com/security/CVE-2024-26894
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26894-acpi-processor-idle-fix-memory-leak.patch
- From: 5.4.0-189.209
- CVE-2024-26816
- Description:
The patch fixes kernel building process.
- CVE:
- Patch: skipped/CVE-2024-26816.patch
- From:
- CVE-2024-27030
- Description:
octeontx2: CVE patch is outside the scope.
- CVE:
- Patch: skipped/CVE-2024-27030.patch
- From:
- CVE-2024-24857 CVE-2024-24858 CVE-2024-24859
- Description:
Bluetooth: Fix TOCTOU in HCI debugfs implementation
- CVE: https://ubuntu.com/security/CVE-2024-24859
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-24857-CVE-2024-24858-bluetooth-fix-toctou-in-hci-debugfs-implementation.patch
- From: 5.4.0-189.209
- CVE-2023-52620
- Description:
netfilter: nf_tables: disallow timeout for anonymous sets
- CVE: https://ubuntu.com/security/CVE-2023-52620
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-52620-netfilter-nf-tables-disallow-timeout-for-anonymous-sets.patch
- From: 5.4.0-189.209
- CVE-2024-35910
- Description:
mptcp: add sk_stop_timer_sync helper
- CVE: https://ubuntu.com/security/CVE-2024-35910
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-35910-mptcp-add-sk_stop_timer_sync-helper.patch
- From: 5.4.0-189.209
- CVE-2024-35910
- Description:
tcp: properly terminate timers for kernel sockets
- CVE: https://ubuntu.com/security/CVE-2024-35910
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-35910-tcp-properly-terminate-timers-for-kernel-sockets-upto-182.202.patch
- From: 5.4.0-189.209
- CVE-2024-26654
- Description:
[PATCH] ALSA: sh: Don't build Dreamcast AICA sound driver
- CVE: https://ubuntu.com/security/CVE-2024-26654
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26654-ALSA-sh-Don-t-build-Dreamcast-AICA-sound-driver-kpatch.patch
- From: 5.4.0-189.209
- CVE-2023-52654
- Description:
[PATCH] io_uring/af_unix: disable sending io_uring over sockets
- CVE: https://ubuntu.com/security/CVE-2023-52654
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-52654-io_uring-af_unix-disable-sending-io_uring-over-sockets.patch
- From: 5.4.0-189.209
- CVE-2023-52656
- Description:
[PATCH] io_uring/unix: drop usage of io_uring socket
- CVE: https://ubuntu.com/security/CVE-2023-52656
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-52656-io_uring-unix-drop-usage-of-io_uring-socket-165.patch
- From: 5.4.0-189.209
- CVE-2023-52656
- Description:
[PATCH] io_uring/unix: drop usage of io_uring socket
- CVE: https://ubuntu.com/security/CVE-2023-52656
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-52656-io_uring-unix-drop-usage-of-io_uring-socket-kpatch-165.patch
- From: 5.4.0-189.209
- CVE-2023-52656
- Description:
[PATCH] io_uring: drop any code related to SCM_RIGHTS
- CVE: https://ubuntu.com/security/CVE-2023-52656
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-52656-io_uring-drop-any-code-related-to-SCM_RIGHTS.patch
- From: 5.4.0-189.209
- CVE-2023-52656
- Description:
[PATCH] io_uring: drop any code related to SCM_RIGHTS
- CVE: https://ubuntu.com/security/CVE-2023-52656
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-52656-io_uring-drop-any-code-related-to-SCM_RIGHTS-kpatch.patch
- From: 5.4.0-189.209
- CVE-2023-7042
- Description:
[PATCH] wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()
- CVE: https://ubuntu.com/security/CVE-2023-7042
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-7042-wifi-ath10k-fix-NULL-pointer-dereference-in-ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev.patch
- From: 5.4.0-189.209
- CVE-2023-52644
- Description:
[PATCH 1/1] wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled
- CVE: https://ubuntu.com/security/CVE-2023-52644
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-52644-wifi-b43-Stop-wake-correct-queue-in-DMA-Tx-path-when-QoS-is-disabled.patch
- From: 5.4.0-189.209
- CVE-2023-52650
- Description:
[PATCH 1/1] drm/tegra: dsi: Add missing check for of_find_device_by_node
- CVE: https://ubuntu.com/security/CVE-2023-52650
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-52650-drm-tegra-dsi-Add-missing-check-for-of_find_device_by_node-113.patch
- From: 5.4.0-189.209
- CVE-2023-52699
- Description:
[PATCH 1/1] sysv: don't call sb_bread() with pointers_lock held
- CVE: https://ubuntu.com/security/CVE-2023-52699
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-52699-sysv-don-t-call-sb_bread-with-pointers_lock-held.patch
- From: 5.4.0-189.209
- CVE-2023-52880
- Description:
[PATCH 1/1] tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc
- CVE: https://ubuntu.com/security/CVE-2023-52880
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-52880-tty-n_gsm-require-CAP_NET_ADMIN-to-attach-N_GSM0710-ldisc.patch
- From: 5.4.0-189.209
- CVE-2024-25739
- Description:
[PATCH 1/1] ubi: Check for too small LEB size in VTBL code
- CVE: https://ubuntu.com/security/CVE-2024-25739
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-25739-ubi-Check-for-too-small-LEB-size-in-VTBL-code.patch
- From: 5.4.0-189.209
- CVE-2024-26642
- Description:
[PATCH] netfilter: nf_tables: disallow anonymous set with timeout
- CVE: https://ubuntu.com/security/CVE-2024-26642
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with-timeout-flag.patch
- From: 5.4.0-189.209
- CVE-2024-26651
- Description:
[PATCH] sr9800: Add check for usbnet_get_endpoints
- CVE: https://ubuntu.com/security/CVE-2024-26651
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26651-sr9800-Add-check-for-usbnet_get_endpoints.patch
- From: 5.4.0-189.209
- CVE-2024-26907
- Description:
stddef: Introduce DECLARE_FLEX_ARRAY() helper
- CVE: https://ubuntu.com/security/CVE-2024-26907
- Patch: ubuntu-focal/5.4.0-190.210/CVE-2024-26907-stddef-Introduce-DECLARE_FLEX_ARRAY-helper-kpatch.patch
- From: 5.4.0-190.210
- CVE-2024-26907
- Description:
RDMA/mlx5: Fix fortify source warning while accessing Eth segment
- CVE: https://ubuntu.com/security/CVE-2024-26907
- Patch: ubuntu-focal/5.4.0-190.210/CVE-2024-26907-rdma-mlx5-fix-fortify-source-warning-while-accessing-eth-segment.patch
- From: 5.4.0-190.210
- CVE-2022-48655
- Description:
firmware: arm_scmi: Harden accesses to the reset domains
- CVE: https://ubuntu.com/security/CVE-2022-48655
- Patch: ubuntu-focal/5.4.0-190.210/CVE-2022-48655-firmware-arm-scmi-harden-accesses-to-the-reset-domains.patch
- From: 5.4.0-190.210
- CVE-2024-36016
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://ubuntu.com/security/CVE-2024-36016
- Patch: ubuntu-focal/5.4.0-190.210/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-gsm0-receive.patch
- From: 5.4.0-190.210
- CVE-2024-38583
- Description:
nilfs2: We cannot patch functions that sleep in kthread().
- CVE:
- Patch: skipped/CVE-2024-38583.patch
- From:
- CVE-2024-36971
- Description:
net: fix __dst_negative_advice() race
- CVE: https://ubuntu.com/security/CVE-2024-36971
- Patch: ubuntu-focal/5.4.0-192.212/CVE-2024-36971-net-fix-dst-negative-advice-race-5.4.0-163.180.patch
- From: 5.4.0-192.212
- CVE-2024-39480
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://ubuntu.com/security/CVE-2024-39480
- Patch: ubuntu-focal/5.4.0-192.212/CVE-2024-39480-kdb-fix-buffer-overflow-during-tab-complete.patch
- From: 5.4.0-192.212
- CVE-2022-48674
- Description:
erofs: fix pcluster use-after-free on UP platforms
- CVE: https://ubuntu.com/security/CVE-2022-48674
- Patch: ubuntu-focal/5.4.0-192.212/CVE-2022-48674-erofs-fix-pcluster-use-after-free-on-up-platforms.patch
- From: 5.4.0-192.212
- CVE-2023-52434
- Description:
smb: client: fix potential OOBs in smb2_parse_contexts()
- CVE: https://ubuntu.com/security/CVE-2023-52434
- Patch: ubuntu-focal/5.4.0-192.212/CVE-2023-52434-smb-client-fix-potential-oobs-in-smb2-parse-contexts.patch
- From: 5.4.0-192.212
- CVE-2023-52752
- Description:
smb: client: fix use-after-free bug in cifs_debug_data_proc_show()
- CVE: https://ubuntu.com/security/CVE-2023-52752
- Patch: ubuntu-focal/5.4.0-192.212/CVE-2023-52752-smb-client-fix-use-after-free-bug-in.patch
- From: 5.4.0-192.212
- CVE-2024-26921
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- CVE:
- Patch: skipped/CVE-2024-26921.patch
- From:
- CVE-2023-52760
- Description:
gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
- CVE: https://ubuntu.com/security/CVE-2023-52760
- Patch: ubuntu-focal/5.4.0-193.213/CVE-2023-52760-gfs2-Fix-slab-use-after-free-in-gfs2_qd_dealloc.patch
- From: 5.4.0-193.213
- CVE-2024-26929
- Description:
scsi: qla2xxx: Fix double free of fcport
- CVE: https://ubuntu.com/security/CVE-2024-26929
- Patch: ubuntu-focal/5.4.0-193.213/CVE-2024-26929-scsi-qla2xxx-Fix-double-free-of-fcport.patch
- From: 5.4.0-193.213
- CVE-2021-46926
- Description:
ALSA: hda: intel-sdw-acpi: harden detection of controller
- CVE: https://ubuntu.com/security/CVE-2021-46926
- Patch: ubuntu-focal/5.4.0-193.213/CVE-2021-46926-ALSA-hda-intel-sdw-acpi-harden-detection-of-controller.patch
- From: 5.4.0-193.213
- CVE-2023-52629
- Description:
sh: push-switch: Reorder cleanup operations to avoid use-after-free bug
- CVE: https://ubuntu.com/security/CVE-2023-52629
- Patch: ubuntu-focal/5.4.0-193.213/CVE-2023-52629-sh-push-switch-Reorder-cleanup-operations-to-avoid-use-after-free-bug.patch
- From: 5.4.0-193.213
- CVE-2024-36901
- Description:
ipv6: prevent NULL dereference in ip6_output()
- CVE: https://ubuntu.com/security/CVE-2024-36901
- Patch: ubuntu-focal/5.4.0-193.213/CVE-2024-36901-ipv6-prevent-NULL-dereference-in-ip6_output.patch
- From: 5.4.0-193.213
- CVE-2024-24860
- Description:
Bluetooth: Fix atomicity violation in {min, max}_key_size_set
- CVE: https://ubuntu.com/security/CVE-2024-24860
- Patch: ubuntu-focal/5.4.0-193.213/CVE-2024-24860-Bluetooth-Fix-atomicity-violation-in-min-max-_key_size_set.patch
- From: 5.4.0-193.213
- CVE-2024-26830
- Description:
i40e: Refactoring VF MAC filters counting to make more reliable
- CVE: https://ubuntu.com/security/CVE-2024-26830
- Patch: ubuntu-focal/5.4.0-193.213/CVE-2024-26830-i40e-Refactoring-VF-MAC-filters-counting-to-make-more-reliable-kpatch.patch
- From: 5.4.0-193.213
- CVE-2024-26830
- Description:
i40e: Fix MAC address setting for a VF via Host/VM
- CVE: https://ubuntu.com/security/CVE-2024-26830
- Patch: ubuntu-focal/5.4.0-193.213/CVE-2024-26830-i40e-Fix-MAC-address-setting-for-a-VF-via-Host-VM.patch
- From: 5.4.0-193.213
- CVE-2024-26830
- Description:
i40e: Do not allow untrusted VF to remove administratively set MAC
- CVE: https://ubuntu.com/security/CVE-2024-26830
- Patch: ubuntu-focal/5.4.0-193.213/CVE-2024-26830-i40e-Do-not-allow-untrusted-VF-to-remove-administratively-set-MAC.patch
- From: 5.4.0-193.213
- CVE-2024-39484
- Description:
mmc: davinci: Don't strip remove function when driver is builtin
- CVE: https://ubuntu.com/security/CVE-2024-39484
- Patch: ubuntu-focal/5.4.0-193.213/CVE-2024-39484-mmc-davinci-Don-t-strip-remove-function-when-driver-is-builtin-kpatch.patch
- From: 5.4.0-193.213
- CVE-2024-40958
- Description:
netns: Make get_net_ns() handle zero refcount net
- CVE: https://ubuntu.com/security/CVE-2024-40958
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-40958-netns-make-get-net-ns-handle-zero-refcount-net.patch
- From: 5.4.0-195.215
- CVE-2024-36978
- Description:
net: sched: sch_multiq: fix possible OOB write in
- CVE: https://ubuntu.com/security/CVE-2024-36978
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in.patch
- From: 5.4.0-195.215
- CVE-2024-39495
- Description:
greybus: Fix use-after-free bug in gb_interface_release due
- CVE: https://ubuntu.com/security/CVE-2024-39495
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-39495-greybus-fix-use-after-free-bug-in-gb-interface-release-due.patch
- From: 5.4.0-195.215
- CVE-2024-40902
- Description:
jfs: xattr: fix buffer overflow for invalid xattr
- CVE: https://ubuntu.com/security/CVE-2024-40902
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-40902-jfs-xattr-fix-buffer-overflow-for-invalid-xattr.patch
- From: 5.4.0-195.215
- CVE-2024-41087
- Description:
ata: libata-core: Fix double free on error
- CVE: https://ubuntu.com/security/CVE-2024-41087
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-41087-ata-libata-core-fix-double-free-on-error.patch
- From: 5.4.0-195.215
- CVE-2024-42093
- Description:
net/dpaa2: Avoid explicit cpumask var allocation on stack
- CVE: https://ubuntu.com/security/CVE-2024-42093
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42093-net-dpaa2-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.4.0-195.215
- CVE-2024-42094
- Description:
net/iucv: Avoid explicit cpumask var allocation on stack
- CVE: https://ubuntu.com/security/CVE-2024-42094
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42094-net-iucv-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.4.0-195.215
- CVE-2024-42105
- Description:
nilfs2: fix inode number range checks
- CVE: https://ubuntu.com/security/CVE-2024-42105
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42105-nilfs2-fix-inode-number-range-checks-187.patch
- From: 5.4.0-195.215
- CVE-2024-42104
- Description:
nilfs2: add missing check for inode numbers on directory
- CVE: https://ubuntu.com/security/CVE-2024-42104
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42104-nilfs2-add-missing-check-for-inode-numbers-on-directory.patch
- From: 5.4.0-195.215
- CVE-2024-42224
- Description:
net: dsa: mv88e6xxx: Correct check for empty list
- CVE: https://ubuntu.com/security/CVE-2024-42224
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42224-net-dsa-mv88e6xxx-correct-check-for-empty-list.patch
- From: 5.4.0-195.215
- CVE-2024-39487
- Description:
bonding: Fix out-of-bounds read in
- CVE: https://ubuntu.com/security/CVE-2024-39487
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-39487-bonding-fix-out-of-bounds-read-in.patch
- From: 5.4.0-195.215
- CVE-2024-41049
- Description:
locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock
- CVE: https://ubuntu.com/security/CVE-2024-41049
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-41049-locks-fix-KASAN-use-after-free-in-trace_event_raw_event_filelock_lock.patch
- From: 5.4.0-195.215
- CVE-2024-41049
- Description:
filelock: fix potential use-after-free in posix_lock_inode
- CVE: https://ubuntu.com/security/CVE-2024-41049
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-41049-filelock-fix-potential-use-after-free-in-posix-lock-inode.patch
- From: 5.4.0-195.215
- CVE-2024-41046
- Description:
net: lantiq_etop: add blank line after declaration
- CVE: https://ubuntu.com/security/CVE-2024-41046
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-41046-net-lantiq_etop-add-blank-line-after-declaration.patch
- From: 5.4.0-195.215
- CVE-2024-41046
- Description:
net: ethernet: lantiq_etop: fix double free in detach
- CVE: https://ubuntu.com/security/CVE-2024-41046
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-41046-net-ethernet-lantiq-etop-fix-double-free-in-detach.patch
- From: 5.4.0-195.215
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://ubuntu.com/security/CVE-2024-42154
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 5.4.0-195.215
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length kpatch
- CVE: https://ubuntu.com/security/CVE-2024-42154
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 5.4.0-195.215
- CVE-2024-42086
- Description:
iio: chemical: bme680: Fix overflows in compensate()
- CVE: https://ubuntu.com/security/CVE-2024-42086
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42086-iio-chemical-bme680-fix-overflows-in-compensate.patch
- From: 5.4.0-195.215
- CVE-2024-42087
- Description:
drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers
- CVE: https://ubuntu.com/security/CVE-2024-42087
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42087-drm-panel-ilitek-ili9881c-fix-warning-with-gpio-controllers.patch
- From: 5.4.0-195.215
- CVE-2024-42089
- Description:
ASoC: fsl-asoc-card: set priv->pdev before using it
- CVE: https://ubuntu.com/security/CVE-2024-42089
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42089-asoc-fsl-asoc-card-set-priv-pdev-before-using-it.patch
- From: 5.4.0-195.215
- CVE-2024-42090
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling
- CVE: https://ubuntu.com/security/CVE-2024-42090
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42090-pinctrl-fix-deadlock-in-create-pinctrl-when-handling.patch
- From: 5.4.0-195.215
- CVE-2024-42092
- Description:
gpio: davinci: Validate the obtained number of IRQs
- CVE: https://ubuntu.com/security/CVE-2024-42092
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42092-gpio-davinci-validate-the-obtained-number-of-irqs.patch
- From: 5.4.0-195.215
- CVE-2024-42096
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://ubuntu.com/security/CVE-2024-42096
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 5.4.0-195.215
- CVE-2024-42097
- Description:
ALSA: emux: improve patch ioctl data validation
- CVE: https://ubuntu.com/security/CVE-2024-42097
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42097-alsa-emux-improve-patch-ioctl-data-validation.patch
- From: 5.4.0-195.215
- CVE-2024-42101
- Description:
drm/nouveau: fix null pointer dereference in
- CVE: https://ubuntu.com/security/CVE-2024-42101
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42101-drm-nouveau-fix-null-pointer-dereference-in.patch
- From: 5.4.0-195.215
- CVE-2024-42102
- Description:
Revert "mm/writeback: fix possible divide-by-zero in
- CVE: https://ubuntu.com/security/CVE-2024-42102
- Patch: ubuntu-focal/5.4.0-195.215/CVE-2024-42102-revert-mm-writeback-fix-possible-divide-by-zero-in.patch
- From: 5.4.0-195.215
- CVE-2024-42148
- Description:
UBSAN warning fix, release kernels aren't affected.
- CVE:
- Patch: skipped/CVE-2024-42148.patch
- From:
- CVE-2024-39494
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://ubuntu.com/security/CVE-2024-39494
- Patch: ubuntu-focal/5.4.0-196.216/CVE-2024-39494-ima-Fix-use-after-free-on-a-dentry-s-dname.name-172.patch
- From: 5.4.0-196.216
- CVE-2021-47188
- Description:
scsi: ufs: core: Improve SCSI abort handling
- CVE: https://ubuntu.com/security/CVE-2021-47188
- Patch: ubuntu-focal/5.4.0-196.216/CVE-2021-47188-scsi-ufs-core-Improve-SCSI-abort-handling.patch
- From: 5.4.0-196.216
- CVE-2022-48791
- Description:
scsi: pm80xx: Fix TMF task completion race condition
- CVE: https://ubuntu.com/security/CVE-2022-48791
- Patch: ubuntu-focal/5.4.0-196.216/CVE-2022-48791-scsi-pm80xx-Fix-TMF-task-completion-race-condition.patch
- From: 5.4.0-196.216
- CVE-2022-48791
- Description:
scsi: pm8001: Fix use-after-free for aborted TMF sas_task
- CVE: https://ubuntu.com/security/CVE-2022-48791
- Patch: ubuntu-focal/5.4.0-196.216/CVE-2022-48791-scsi-pm8001-Fix-use-after-free-for-aborted-TMF-sas_task.patch
- From: 5.4.0-196.216
- CVE-2024-42228
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://ubuntu.com/security/CVE-2024-42228
- Patch: ubuntu-focal/5.4.0-196.216/CVE-2024-42228-drm-amdgpu-Using-uninitialized-value-size-when-calling-amdgpu_vce_cs_reloc.patch
- From: 5.4.0-196.216
- CVE-2024-42160
- Description:
scsi: f2fs: check validation of fault attrs in f2fs_build_fault_attr()
- CVE: https://ubuntu.com/security/CVE-2024-42160
- Patch: ubuntu-focal/5.4.0-196.216/CVE-2024-42160-f2fs-check-validation-of-fault-attrs-in-f2fs_build_fault_attr.patch
- From: 5.4.0-196.216
- CVE-2022-48863
- Description:
mISDN: Fix memory leak in dsp_pipeline_build()
- CVE: https://ubuntu.com/security/CVE-2022-48863
- Patch: ubuntu-focal/5.4.0-196.216/CVE-2022-48863-mISDN-Fix-memory-leak-in-dsp_pipeline_build.patch
- From: 5.4.0-196.216
- CVE-2024-38630
- Description:
watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
- CVE: https://ubuntu.com/security/CVE-2024-38630
- Patch: ubuntu-focal/5.4.0-198.218/CVE-2024-38630-watchdog-cpu5wdt-c-fix-use-after-free-bug-caused-by-cpu5wdt-trigger-187.patch
- From: 5.4.0-198.218
- CVE-2024-26960
- Description:
mm: swap: fix race between free_swap_and_cache() and swapoff()
- CVE: https://ubuntu.com/security/CVE-2024-26960
- Patch: ubuntu-focal/5.4.0-198.218/CVE-2024-26960-mm-swap-fix-race-between-free-swap-and-cache-and-swapoff.patch
- From: 5.4.0-198.218
- CVE-2024-45016
- Description:
netem: fix return value if duplicate enqueue fails
- CVE: https://ubuntu.com/security/CVE-2024-45016
- Patch: ubuntu-focal/5.4.0-198.218/CVE-2024-45016-netem-fix-return-value-if-duplicate-enqueue-fails.patch
- From: 5.4.0-198.218
- CVE-2024-27397
- Description:
netfilter: nft_set_rbtree: .deactivate fails if element has expired
- CVE: https://ubuntu.com/security/CVE-2024-27397
- Patch: ubuntu-focal/5.4.0-198.218/CVE-2024-27397-netfilter-nft_set_rbtree-.deactivate-fails-if-element-has-expired.patch
- From: 5.4.0-198.218
- CVE-2024-27397
- Description:
netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://ubuntu.com/security/CVE-2024-27397
- Patch: ubuntu-focal/5.4.0-198.218/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout-165.patch
- From: 5.4.0-198.218
- CVE-2024-27397
- Description:
netfilter: nf_tables: use timestamp to check for set element timeout kpatch
- CVE: https://ubuntu.com/security/CVE-2024-27397
- Patch: ubuntu-focal/5.4.0-198.218/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout-kpatch-165.patch
- From: 5.4.0-198.218
- CVE-2024-42313
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://ubuntu.com/security/CVE-2024-42313
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 5.4.0-200.220
- CVE-2024-43839
- Description:
bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
- CVE: https://ubuntu.com/security/CVE-2024-43839
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-43839-bna-adjust-name-buf-size-of-bna-tcb-and-bna-ccb-structures.patch
- From: 5.4.0-200.220
- CVE-2024-43858
- Description:
jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://ubuntu.com/security/CVE-2024-43858
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-43858-jfs-fix-array-index-out-of-bounds-in-difree.patch
- From: 5.4.0-200.220
- CVE-2024-44987
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://ubuntu.com/security/CVE-2024-44987
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-44987-ipv6-prevent-uaf-in-ip6-send-skb.patch
- From: 5.4.0-200.220
- CVE-2024-44998
- Description:
atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://ubuntu.com/security/CVE-2024-44998
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue-rx.patch
- From: 5.4.0-200.220
- CVE-2024-45026
- Description:
Architecture is not supported
- CVE:
- Patch: skipped/CVE-2024-45026.patch
- From:
- CVE-2024-46673
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://ubuntu.com/security/CVE-2024-46673
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46673-scsi-aacraid-fix-double-free-on-probe-failure.patch
- From: 5.4.0-200.220
- CVE-2024-46738
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://ubuntu.com/security/CVE-2024-46738
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46738-vmci-fix-use-after-free-when-removing-resource-in-vmci-resource-remove.patch
- From: 5.4.0-200.220
- CVE-2024-42301
- Description:
parport: Standardize use of printmode
- CVE: https://ubuntu.com/security/CVE-2024-42301
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-42301-parport-Standardize-use-of-printmode.patch
- From: 5.4.0-200.220
- CVE-2024-42301
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://ubuntu.com/security/CVE-2024-42301
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 5.4.0-200.220
- CVE-2024-27051
- Description:
cpufreq: brcmstb-avs-cpufreq: ISO C90 forbids mixed declarations
- CVE: https://ubuntu.com/security/CVE-2024-27051
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-27051-cpufreq-brcmstb-avs-cpufreq-iso-c90-forbids-mixed-declarations.patch
- From: 5.4.0-200.220
- CVE-2024-26668
- Description:
netfilter: nft_limit: reject configurations that cause integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-26668
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-26668-netfilter-nft-limit-reject-configurations-that-cause-integer-overflow.patch
- From: 5.4.0-200.220
- CVE-2024-26641
- Description:
ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
- CVE: https://ubuntu.com/security/CVE-2024-26641
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-26641-ip6-tunnel-make-sure-to-pull-inner-header-in-ip6-tnl-rcv-156.patch
- From: 5.4.0-200.220
- CVE-2024-41012
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://ubuntu.com/security/CVE-2024-41012
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41012-filelock-remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 5.4.0-200.220
- CVE-2023-52918
- Description:
media: pci: cx23885: check cx23885_vdev_init() return
- CVE: https://ubuntu.com/security/CVE-2023-52918
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2023-52918-media-pci-cx23885-check-cx23885-vdev-init-return.patch
- From: 5.4.0-200.220
- CVE-2023-52531
- Description:
wifi: iwlwifi: mvm: Fix a memory corruption issue
- CVE: https://ubuntu.com/security/CVE-2023-52531
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2023-52531-wifi-iwlwifi-mvm-fix-a-memory-corruption-issue.patch
- From: 5.4.0-200.220
- CVE-2024-26640
- Description:
Kernel versions older than 5.4.0-200.220 not affected
- CVE:
- Patch: skipped/CVE-2024-26640.patch
- From:
- CVE-2024-35848
- Description:
misc: eeprom: at24: fix regulator underflow
- CVE: https://ubuntu.com/security/CVE-2024-35848
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-35848-misc-eeprom-at24-fix-regulator-underflow.patch
- From: 5.4.0-200.220
- CVE-2024-35848
- Description:
misc: eeprom: at24: register nvmem only after eeprom is ready
- CVE: https://ubuntu.com/security/CVE-2024-35848
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-35848-misc-eeprom-at24-register-nvmem-only-after-eeprom-is.patch
- From: 5.4.0-200.220
- CVE-2024-35848
- Description:
eeprom: at24: fix memory corruption race condition
- CVE: https://ubuntu.com/security/CVE-2024-35848
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-35848-eeprom-at24-fix-memory-corruption-race-condition.patch
- From: 5.4.0-200.220
- CVE-2024-38611
- Description:
media: i2c: et8ek8: Don't strip remove function when driver is builtin
- CVE: https://ubuntu.com/security/CVE-2024-38611
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-38611-media-i2c-et8ek8-don-t-strip-remove-function-when-driver-is-builtin.patch
- From: 5.4.0-200.220
- CVE-2024-38602
- Description:
ax25: Fix reference count leak issues of ax25_dev
- CVE: https://ubuntu.com/security/CVE-2024-38602
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-38602-fix-reference-count-leak-issues-of-ax25_dev.patch
- From: 5.4.0-200.220
- CVE-2024-40929
- Description:
wifi: iwlwifi: mvm: check n_ssids before accessing the ssids
- CVE: https://ubuntu.com/security/CVE-2024-40929
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-40929-wifi-iwlwifi-mvm-check-n_ssids-before-accessing-the-ssids.patch
- From: 5.4.0-200.220
- CVE-2024-41015
- Description:
ocfs2: add bounds checking to ocfs2_check_dir_entry()
- CVE: https://ubuntu.com/security/CVE-2024-41015
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41015-ocfs2-add-bounds-checking-to-ocfs2_check_dir_entry.patch
- From: 5.4.0-200.220
- CVE-2024-41017
- Description:
jfs: don’t walk off the end of ealist
- CVE: https://ubuntu.com/security/CVE-2024-41017
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41017-jfs-don-t-walk-off-the-end-of-ealist.patch
- From: 5.4.0-200.220
- CVE-2024-41020
- Description:
filelock: Fix fcntl/close race recovery compat path
- CVE: https://ubuntu.com/security/CVE-2024-41020
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41020-filelock-Fix-fcntl-close-race-recovery-compat-path.patch
- From: 5.4.0-200.220
- CVE-2024-41022
- Description:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
- CVE: https://ubuntu.com/security/CVE-2024-41022
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41022-drm-amdgpu-fix-signedness-bug.patch
- From: 5.4.0-200.220
- CVE-2024-41063
- Description:
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
- CVE: https://ubuntu.com/security/CVE-2024-41063
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41063-bluetooth-hci_core-cancel-all-works-upon-hci_unregister_dev.patch
- From: 5.4.0-200.220
- CVE-2022-36402
- Description:
drm/vmwgfx: Fix shader stage validation
- CVE: https://ubuntu.com/security/CVE-2022-36402
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2022-36402-drm-vmwgfx-fix-shader-stage-validation.patch
- From: 5.4.0-200.220
- CVE-2024-41059
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://ubuntu.com/security/CVE-2024-41059
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy-name.patch
- From: 5.4.0-200.220
- CVE-2024-41090
- Description:
tap: add missing verification for short frame
- CVE: https://ubuntu.com/security/CVE-2024-41090
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.4.0-200.220
- CVE-2024-41091
- Description:
tun: add missing verification for short frame
- CVE: https://ubuntu.com/security/CVE-2024-41091
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.4.0-200.220
- CVE-2024-44999
- Description:
gtp: pull network headers in gtp_dev_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-44999
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-44999-gtp-pull-network-headers-in-gtp-dev-xmit.patch
- From: 5.4.0-200.220
- CVE-2024-46722
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46722
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.4.0-200.220
- CVE-2024-46723
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46723
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.4.0-200.220
- CVE-2024-46743
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://ubuntu.com/security/CVE-2024-46743
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.4.0-200.220
- CVE-2024-46747
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://ubuntu.com/security/CVE-2024-46747
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.4.0-200.220
- CVE-2024-43882
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://ubuntu.com/security/CVE-2024-43882
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.4.0-200.220
- CVE-2024-26669
- Description:
net: sched: fix possible refcount leak in tc_chain_tmplt_add()
- CVE: https://ubuntu.com/security/CVE-2024-26669
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-26669-net-sched-fix-possible-refcount-leak-in-tc_chain_tmp.patch
- From: 5.4.0-200.220
- CVE-2024-26669
- Description:
net/sched: flower: Fix chain template offload
- CVE: https://ubuntu.com/security/CVE-2024-26669
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-26669-net-sched-flower-Fix-chain-template-offload.patch
- From: 5.4.0-200.220
- CVE-2024-26669
- Description:
net/sched: flower: Fix chain template offload
- CVE: https://ubuntu.com/security/CVE-2024-26669
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-26669-net-sched-flower-fix-chain-template-offload-kpatch-5.4.0-163.180.patch
- From: 5.4.0-200.220
- CVE-2024-46744
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://ubuntu.com/security/CVE-2024-46744
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46744-squashfs-sanity-check-symbolic-link-size.patch
- From: 5.4.0-200.220
- CVE-2024-46756
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46756
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.0-200.220
- CVE-2024-46757
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46757
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.0-200.220
- CVE-2024-46758
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46758
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.0-200.220
- CVE-2024-46759
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46759
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.0-200.220
- CVE-2024-46798
- Description:
ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://ubuntu.com/security/CVE-2024-46798
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46798-asoc-dapm-fix-uaf-for-snd-soc-pcm-runtime-object.patch
- From: 5.4.0-200.220
- CVE-2024-46800
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://ubuntu.com/security/CVE-2024-46800
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.4.0-200.220
- CVE-2024-46818
- Description:
drm/amd/display: Check gpio_id before used as array index
- CVE: https://ubuntu.com/security/CVE-2024-46818
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46818-drm-amd-display-check-gpio-id-before-used-as-array-index.patch
- From: 5.4.0-200.220
- CVE-2024-46844
- Description:
Architecture um is not supported
- CVE:
- Patch: skipped/CVE-2024-46844.patch
- From:
- CVE-2024-46782
- Description:
ila: call nf_unregister_net_hooks() sooner
- CVE: https://ubuntu.com/security/CVE-2024-46782
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-46782-ila-call-nf-unregister-net-hooks-sooner-kpatch.patch
- From: 5.4.0-200.220
- CVE-2024-26885
- Description:
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26885
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-26885-bpf-fix-devmap-hash-overflow-check-on-32-bit-arches.patch
- From: 5.4.0-200.220
- CVE-2024-42284
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://ubuntu.com/security/CVE-2024-42284
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.4.0-200.220
- CVE-2024-42280
- Description:
mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://ubuntu.com/security/CVE-2024-42280
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-42280-misdn-fix-a-use-after-free-in-hfcmulti-tx.patch
- From: 5.4.0-200.220
- CVE-2024-42271
- Description:
net/iucv: fix use after free in iucv_sock_close()
- CVE: https://ubuntu.com/security/CVE-2024-42271
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv-sock-close.patch
- From: 5.4.0-200.220
- CVE-2024-41011
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://ubuntu.com/security/CVE-2024-41011
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 5.4.0-200.220
- CVE-2024-41071
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://ubuntu.com/security/CVE-2024-41071
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41071-wifi-mac80211-avoid-address-calculations-via-out-of-bounds-array-indexing.patch
- From: 5.4.0-200.220
- CVE-2024-41073
- Description:
nvme: avoid double free special payload
- CVE: https://ubuntu.com/security/CVE-2024-41073
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41073-nvme-avoid-double-free-special-payload.patch
- From: 5.4.0-200.220
- CVE-2024-47659
- Description:
smack: tcp: ipv4, fix incorrect labeling
- CVE: https://ubuntu.com/security/CVE-2024-47659
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-47659-smack-tcp-ipv4-fix-incorrect-labeling.patch
- From: 5.4.0-200.220
- CVE-2024-41070
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41070.patch
- From:
- CVE-2024-41042
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://ubuntu.com/security/CVE-2024-41042
- Patch: ubuntu-focal/5.4.0-200.220/CVE-2024-41042-netfilter-nf_tables-prefer-nft_chain_validate-195.patch
- From: 5.4.0-200.220
- CVE-2022-48943
- Description:
KVM: x86/mmu: make apf token non-zero to fix bug
- CVE: https://ubuntu.com/security/CVE-2022-48943
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2022-48943-kvm-x86-mmu-make-apf-token-non-zero-to-fix-bug.patch
- From: 5.4.0-202.222
- CVE-2024-38538
- Description:
net: bridge: xmit: make sure we have at least eth header len bytes
- CVE: https://ubuntu.com/security/CVE-2024-38538
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-header-len-bytes-5.4.0-109.123.patch
- From: 5.4.0-202.222
- CVE-2024-44942
- Description:
f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC
- CVE: https://ubuntu.com/security/CVE-2024-44942
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2024-44942-f2fs-fix-to-do-sanity-check-on-f2fs-inline-data-flag-in-inode-during-gc.patch
- From: 5.4.0-202.222
- CVE-2024-46724
- Description:
drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://ubuntu.com/security/CVE-2024-46724
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2024-46724-drm-amdgpu-fix-out-of-bounds-read-of-df-v1-7-channel-number.patch
- From: 5.4.0-202.222
- CVE-2024-44940
- Description:
fou: remove warn in gue_gro_receive on unsupported protocol
- CVE: https://ubuntu.com/security/CVE-2024-44940
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2024-44940-fou-remove-warn-in-gue-gro-receive-on-unsupported-protocol.patch
- From: 5.4.0-202.222
- CVE-2021-47076
- Description:
RDMA/rxe: Return CQE error if invalid lkey was supplied
- CVE: https://ubuntu.com/security/CVE-2021-47076
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2021-47076-rdma-rxe-return-cqe-error-if-invalid-lkey-was-supplied.patch
- From: 5.4.0-202.222
- CVE-2021-47501
- Description:
i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc
- CVE: https://ubuntu.com/security/CVE-2021-47501
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2021-47501-i40e-fix-null-pointer-dereference-in-i40e-dbg-dump-desc.patch
- From: 5.4.0-202.222
- CVE-2022-48938
- Description:
CDC-NCM: avoid overflow in sanity checking
- CVE: https://ubuntu.com/security/CVE-2022-48938
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2022-48938-cdc-ncm-avoid-overflow-in-sanity-checking-5.4.0-159.176.patch
- From: 5.4.0-202.222
- CVE-2023-52497
- Description:
erofs: fix lz4 inplace decompression
- CVE: https://ubuntu.com/security/CVE-2023-52497
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2023-52497-erofs-fix-lz4-inplace-decompression.patch
- From: 5.4.0-202.222
- CVE-2023-52639
- Description:
s390 architecture is not supported
- CVE:
- Patch: skipped/CVE-2023-52639.patch
- From:
- CVE-2024-26947
- Description:
ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses
- CVE: https://ubuntu.com/security/CVE-2024-26947
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2024-26947-arm-9359-1-flush-check-if-the-folio-is-reserved-for-no-mapping-addresses.patch
- From: 5.4.0-202.222
- CVE-2024-35904
- Description:
Affects only __init function for a built-in component, so patching will have no effect
- CVE:
- Patch: skipped/CVE-2024-35904.patch
- From:
- CVE-2024-42156
- Description:
Out of scope: s390 is not supported
- CVE:
- Patch: skipped/CVE-2024-42156.patch
- From:
- CVE-2024-36953
- Description:
KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()
- CVE: https://ubuntu.com/security/CVE-2024-36953
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2024-36953-kvm-arm64-vgic-v2-check-for-non-null-vcpu-in-vgic-v2-parse-attr.patch
- From: 5.4.0-202.222
- CVE-2024-36938
- Description:
bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
- CVE: https://ubuntu.com/security/CVE-2024-36938
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2024-36938-bpf-skmsg-fix-null-pointer-dereference-in-sk-psock-skb-ingress-enqueue.patch
- From: 5.4.0-202.222
- CVE-2024-35951
- Description:
drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr()
- CVE: https://ubuntu.com/security/CVE-2024-35951
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2024-35951-drm-panfrost-fix-the-error-path-in-panfrost-mmu-map-fault-addr-155.patch
- From: 5.4.0-202.222
- CVE-2024-42068
- Description:
bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()
- CVE: https://ubuntu.com/security/CVE-2024-42068
- Patch: ubuntu-focal/5.4.0-202.222/CVE-2024-42068-bpf-take-return-from-set-memory-ro-into-account-with-bpf-prog-lock-ro.patch
- From: 5.4.0-202.222
- CVE-2024-49967
- Description:
ext4: no need to continue when the number of entries is 1
- CVE: https://ubuntu.com/security/CVE-2024-49967
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2024-49967-ext4-no-need-to-continue-when-the-number-of-entries-is-1.patch
- From: 5.4.0-204.224
- CVE-2024-53057
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://ubuntu.com/security/CVE-2024-53057
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 5.4.0-204.224
- CVE-2024-50264
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://ubuntu.com/security/CVE-2024-50264
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 5.4.0-204.224
- CVE-2024-35967
- Description:
Bluetooth: SCO: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35967
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2024-35967-bluetooth-sco-fix-not-validating-setsockopt-user-input.patch
- From: 5.4.0-204.224
- CVE-2024-35966
- Description:
Bluetooth: RFCOMM: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35966
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2024-35966-bluetooth-rfcomm-fix-not-validating-setsockopt-user-input.patch
- From: 5.4.0-204.224
- CVE-2024-35965
- Description:
Bluetooth: L2CAP: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35965
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2024-35965-bluetooth-l2cap-fix-not-validating-setsockopt-user-input.patch
- From: 5.4.0-204.224
- CVE-2024-35963
- Description:
Bluetooth: hci_sock: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35963
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2024-35963-bluetooth-hci-sock-fix-not-validating-setsockopt-user-input.patch
- From: 5.4.0-204.224
- CVE-2024-40910
- Description:
Not patching the function that can remain on the stack for a while (i.e. if the socket is not non-blocking AND no signal is delivered)
- CVE:
- Patch: skipped/CVE-2024-40910.patch
- From:
- CVE-2024-36952
- Description:
scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
- CVE: https://ubuntu.com/security/CVE-2024-36952
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2024-36952-scsi-lpfc-move-npiv-s-transport-unregistration-to-after-resource-clean-up.patch
- From: 5.4.0-204.224
- CVE-2023-52821
- Description:
drm/panel: fix a possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2023-52821
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2023-52821-drm-panel-fix-a-possible-null-pointer-dereference.patch
- From: 5.4.0-204.224
- CVE-2024-38597
- Description:
eth: sungem: remove .ndo_poll_controller to avoid deadlocks
- CVE: https://ubuntu.com/security/CVE-2024-38597
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2024-38597-eth-sungem-remove-ndo-poll-controller-to-avoid-deadlocks-kpatch.patch
- From: 5.4.0-204.224
- CVE-2024-38553
- Description:
Patches a network driver available only for Motorola ColdFire and Freescale i.MX platforms that are not among the platforms our clients are using
- CVE:
- Patch: skipped/CVE-2024-38553.patch
- From:
- CVE-2024-43892
- Description:
memcg: protect concurrent access to mem_cgroup_idr
- CVE: https://ubuntu.com/security/CVE-2024-43892
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2024-43892-memcg-protect-concurrent-access-to-mem-cgroup-idr.patch
- From: 5.4.0-204.224
- CVE-2022-38096
- Description:
drm/vmwgfx: Fix possible null pointer derefence with invalid contexts
- CVE: https://ubuntu.com/security/CVE-2022-38096
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2022-38096-drm-vmwgfx-fix-possible-null-pointer-derefence-with-invalid-contexts-198.218.patch
- From: 5.4.0-204.224
- CVE-2021-47101
- Description:
The patched function (asix_check_host_enable) does not exist for Ubuntu Focal's kernel (only for HWE)
- CVE:
- Patch: skipped/CVE-2021-47101.patch
- From:
- CVE-2021-47001
- Description:
xprtrdma: Fix cwnd update ordering
- CVE: https://ubuntu.com/security/CVE-2021-47001
- Patch: ubuntu-focal/5.4.0-204.224/CVE-2021-47001-xprtrdma-Fix-cwnd-update-ordering.patch
- From: 5.4.0-204.224
- CVE-2024-53103
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://ubuntu.com/security/CVE-2024-53103
- Patch: ubuntu-focal/5.4.0-205.225/CVE-2024-53103-hv_sock-Initializing-vsk-trans-to-NULL-to-prevent-a-dangling-pointer.patch
- From: 5.4.0-205.225
- CVE-2024-53141
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://ubuntu.com/security/CVE-2024-53141
- Patch: ubuntu-focal/5.4.0-205.225/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap_ip_uadt.patch
- From: 5.4.0-205.225
- CVE-2023-21400
- Description:
io_uring: remove extra check in __io_commit_cqring
- CVE: https://ubuntu.com/security/CVE-2023-21400
- Patch: ubuntu-focal/5.4.0-205.225/CVE-2023-21400-io_uring-remove-extra-check-in-__io_commit_cqring.patch
- From: 5.4.0-205.225
- CVE-2023-21400
- Description:
io_uring: dont kill fasync under completion_lock
- CVE: https://ubuntu.com/security/CVE-2023-21400
- Patch: ubuntu-focal/5.4.0-205.225/CVE-2023-21400-io_uring-dont-kill-fasync-under-completion_lock.patch
- From: 5.4.0-205.225
- CVE-2023-21400
- Description:
io_uring: ensure IOPOLL locks around deferred work
- CVE: https://ubuntu.com/security/CVE-2023-21400
- Patch: ubuntu-focal/5.4.0-205.225/CVE-2023-21400-io_uring-ensure-IOPOLL-locks-around-deferred-work.patch
- From: 5.4.0-205.225
- CVE-2024-40967
- Description:
Out of scope, i.MX SoC is not supported
- CVE:
- Patch: skipped/CVE-2024-40967.patch
- From:
- CVE-2024-53164
- Description:
net: sched: fix ordering of qlen adjustment
- CVE: https://ubuntu.com/security/CVE-2024-53164
- Patch: ubuntu-focal/5.4.0-205.225/CVE-2024-53164-net-sched-fix-ordering-of-qlen-adjustment.patch
- From: 5.4.0-205.225
- CVE-2024-47742
- Description:
firmware_loader: Block path traversal
- CVE: https://ubuntu.com/security/CVE-2024-47742
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47742-firmware-loader-block-path-traversal.patch
- From: 5.4.0-208.228
- CVE-2024-49882
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://ubuntu.com/security/CVE-2024-49882
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path.patch
- From: 5.4.0-208.228
- CVE-2024-49883
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://ubuntu.com/security/CVE-2024-49883
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 5.4.0-208.228
- CVE-2024-49894
- Description:
drm/amd/display: Fix index out of bounds in degamma hardware format translation
- CVE: https://ubuntu.com/security/CVE-2024-49894
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-49894-drm-amd-display-fix-index-out-of-bounds-in-degamma-hardware-format-translation.patch
- From: 5.4.0-208.228
- CVE-2024-49924
- Description:
fbdev: pxafb: Fix possible use after free in pxafb_task()
- CVE: https://ubuntu.com/security/CVE-2024-49924
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-49924-fbdev-pxafb-fix-possible-use-after-free-in-pxafb-task.patch
- From: 5.4.0-208.228
- CVE-2024-49966
- Description:
ocfs2: cancel dqi_sync_work before freeing oinfo
- CVE: https://ubuntu.com/security/CVE-2024-49966
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-49966-ocfs2-cancel-dqi-sync-work-before-freeing-oinfo.patch
- From: 5.4.0-208.228
- CVE-2024-49982
- Description:
aoe: fix the potential use-after-free problem in more places
- CVE: https://ubuntu.com/security/CVE-2024-49982
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-49982-aoe-fix-the-potential-use-after-free-problem-in-more-places.patch
- From: 5.4.0-208.228
- CVE-2024-49995
- Description:
tipc: guard against string buffer overrun
- CVE: https://ubuntu.com/security/CVE-2024-49995
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 5.4.0-208.228
- CVE-2024-50007
- Description:
ALSA: asihpi: Fix potential OOB array access
- CVE: https://ubuntu.com/security/CVE-2024-50007
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50007-alsa-asihpi-fix-potential-oob-array-access.patch
- From: 5.4.0-208.228
- CVE-2024-50074
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://ubuntu.com/security/CVE-2024-50074
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access.patch
- From: 5.4.0-208.228
- CVE-2024-50127
- Description:
rcu: Upgrade rcu_swap_protected() to rcu_replace_pointer()
- CVE: https://ubuntu.com/security/CVE-2024-50127
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50127-rcu-Upgrade-rcu_swap_protected-to-rcu_replace_pointe.patch
- From: 5.4.0-208.228
- CVE-2024-50127
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://ubuntu.com/security/CVE-2024-50127
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 5.4.0-208.228
- CVE-2024-50131
- Description:
tracing: Consider the NULL character when validating the event length
- CVE: https://ubuntu.com/security/CVE-2024-50131
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50131-tracing-consider-the-null-character-when-validating-the-event-length.patch
- From: 5.4.0-208.228
- CVE-2024-50143
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://ubuntu.com/security/CVE-2024-50143
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50143-udf-fix-uninit-value-use-in-udf-get-fileshortad.patch
- From: 5.4.0-208.228
- CVE-2024-50151
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://ubuntu.com/security/CVE-2024-50151
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 5.4.0-208.228
- CVE-2024-50180
- Description:
fbdev: sisfb: Fix strbuf array overflow
- CVE: https://ubuntu.com/security/CVE-2024-50180
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50180-fbdev-sisfb-fix-strbuf-array-overflow.patch
- From: 5.4.0-208.228
- CVE-2024-50230
- Description:
nilfs2: fix kernel bug due to missing clearing of checked flag
- CVE: https://ubuntu.com/security/CVE-2024-50230
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50230-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-checked-flag.patch
- From: 5.4.0-208.228
- CVE-2024-50262
- Description:
bpf: Fix out-of-bounds write in trie_get_next_key()
- CVE: https://ubuntu.com/security/CVE-2024-50262
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch
- From: 5.4.0-208.228
- CVE-2024-50267
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://ubuntu.com/security/CVE-2024-50267
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 5.4.0-208.228
- CVE-2024-50269
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://ubuntu.com/security/CVE-2024-50269
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 5.4.0-208.228
- CVE-2024-47685
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://ubuntu.com/security/CVE-2024-47685
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47685-netfilter-nf_reject_ipv6-fix-nf_reject_ip6_tcphdr_put.patch
- From: 5.4.0-208.228
- CVE-2024-46849
- Description:
ASoC: meson: axg-card: fix 'use-after-free'
- CVE: https://ubuntu.com/security/CVE-2024-46849
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-46849-ASoC-meson-axg-card-fix-use-after-free.patch
- From: 5.4.0-208.228
- CVE-2024-46853
- Description:
spi: nxp-fspi: fix the KASAN report out-of-bounds bug
- CVE: https://ubuntu.com/security/CVE-2024-46853
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-46853-spi-nxp-fspi-fix-the-KASAN-report-out-of-bounds-bug.patch
- From: 5.4.0-208.228
- CVE-2024-47670
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-47670
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.4.0-208.228
- CVE-2024-47697
- Description:
drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47697
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47697-drivers-media-dvb-frontends-rtl2830-fix-an-out-of-bounds-write-error.patch
- From: 5.4.0-208.228
- CVE-2024-47698
- Description:
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47698
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47698-drivers-media-dvb-frontends-rtl2832-fix-an-out-of-bounds-write-error.patch
- From: 5.4.0-208.228
- CVE-2024-47701
- Description:
ext4: return error on ext4_find_inline_entry
- CVE: https://ubuntu.com/security/CVE-2024-47701
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47701-ext4-return-error-on-ext4_find_inline_entry.patch
- From: 5.4.0-208.228
- CVE-2024-47701
- Description:
ext4: avoid OOB when system.data xattr changes underneath the filesystem
- CVE: https://ubuntu.com/security/CVE-2024-47701
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47701-ext4-avoid-oob-when-system-data-xattr-changes-underneath-the-filesystem.patch
- From: 5.4.0-208.228
- CVE-2024-50150
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2024-50150.patch
- From:
- CVE-2024-53059
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-53059
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-53059-wifi-iwlwifi-mvm-Fix-response-handling-in-iwl_mvm_send_recovery_cmd.patch
- From: 5.4.0-208.228
- CVE-2024-50282
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-50282.patch
- From:
- CVE-2024-46731
- Description:
drm/amd/pm: fix the Out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46731
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-46731-drm-amd-pm-fix-the-Out-of-bounds-read-warning.patch
- From: 5.4.0-208.228
- CVE-2024-46854
- Description:
net: dpaa: Pad packets to ETH_ZLEN
- CVE: https://ubuntu.com/security/CVE-2024-46854
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-46854-net-dpaa-pad-packets-to-eth-zlen.patch
- From: 5.4.0-208.228
- CVE-2024-35896
- Description:
netfilter: complete validation of user input for expected length
- CVE: https://ubuntu.com/security/CVE-2024-35896
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-35896-netfilter-validate-user-input-for-expected-length.patch
- From: 5.4.0-208.228
- CVE-2024-53061
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://ubuntu.com/security/CVE-2024-53061
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 5.4.0-208.228
- CVE-2024-47757
- Description:
nilfs2: fix potential oob read in nilfs_btree_check_delete()
- CVE: https://ubuntu.com/security/CVE-2024-47757
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47757-nilfs2-fix-potential-oob-read-in-nilfs-btree-check-delete.patch
- From: 5.4.0-208.228
- CVE-2024-49997
- Description:
net: ethernet: lantiq_etop: fix memory disclosure
- CVE: https://ubuntu.com/security/CVE-2024-49997
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-49997-net-ethernet-lantiq-etop-fix-memory-disclosure-137.patch
- From: 5.4.0-208.228
- CVE-2024-47723
- Description:
jfs: fix array-index-out-of-bounds in diAlloc
- CVE: https://linux.oracle.com/cve/CVE-2024-47723.html
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47723-jfs-fix-array-index-out-of-bounds-in-diAlloc.patch
- From: 5.4.0-208.228
- CVE-2024-47723
- Description:
jfs: fix divide error in dbNextAG
- CVE: https://ubuntu.com/security/CVE-2024-47723
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47723-jfs-fix-divide-error-in-dbNextAG.patch
- From: 5.4.0-208.228
- CVE-2024-47723
- Description:
jfs: fix out-of-bounds in dbNextAG() and diAlloc()
- CVE: https://ubuntu.com/security/CVE-2024-47723
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47723-jfs-fix-out-of-bounds-in-dbnextag-and-dialloc-139.patch
- From: 5.4.0-208.228
- CVE-2024-50301
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://ubuntu.com/security/CVE-2024-50301
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 5.15.0-133.144
- CVE-2024-47747
- Description:
net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2024-47747
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47747-net-seeq-fix-use-after-free-vulnerability-in-ether3-driver-due-to-race-condition.patch
- From: 5.4.0-208.228
- CVE-2024-49903
- Description:
jfs: Fix uaf in dbFreeBits
- CVE: https://ubuntu.com/security/CVE-2024-49903
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-49903-jfs-fix-uaf-in-dbfreebits.patch
- From: 5.4.0-208.228
- CVE-2024-49900
- Description:
jfs: Fix uninit-value access of new_ea in ea_buffer
- CVE: https://ubuntu.com/security/CVE-2024-49900
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-49900-jfs-fix-uninit-value-access-of-new-ea-in-ea-buffer.patch
- From: 5.4.0-208.228
- CVE-2024-49981
- Description:
media: venus: fix use after free bug in venus_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-49981
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-49981-media-venus-fix-use-after-free-bug-in-venus-remove-due-to-race-condition.patch
- From: 5.4.0-208.228
- CVE-2024-50059
- Description:
ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-50059
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50059-ntb-ntb-hw-switchtec-fix-use-after-free-vulnerability-in-switchtec-ntb-remove-due-to-race-condition.patch
- From: 5.4.0-208.228
- CVE-2024-50035
- Description:
ppp: fix ppp_async_encode() illegal access
- CVE: https://ubuntu.com/security/CVE-2024-50035
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50035-ppp-fix-ppp-async-encode-illegal-access.patch
- From: 5.4.0-208.228
- CVE-2024-50033
- Description:
slip: make slhc_remember() more robust against malicious packets
- CVE: https://ubuntu.com/security/CVE-2024-50033
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-50033-slip-make-slhc-remember-more-robust-against-malicious-packets.patch
- From: 5.4.0-208.228
- CVE-2024-50234
- Description:
wifi: iwlegacy: Clear stale interrupts before resuming device
- CVE: https://ubuntu.com/security/CVE-2024-50234
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50234-wifi-iwlegacy-clear-stale-interrupts-before-resuming-device.patch
- From: 5.15.0-133.144
- CVE-2024-50279
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50279
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 5.15.0-133.144
- CVE-2024-50278
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_bit-when-resizing.patch
- From: 5.15.0-133.144
- CVE-2024-50278
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 5.15.0-133.144
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://ubuntu.com/security/CVE-2024-47696
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47696-rdma-iwcm-fix-warning-at-kernel-workqueue-c-check-flush-dependency.patch
- From: 5.4.0-208.228
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://ubuntu.com/security/CVE-2024-47696
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-47696-rdma-iwcm-fix-warning-at-kernel-workqueue-c-check-flush-dependency-kpatch.patch
- From: 5.4.0-208.228
- CVE-2024-35887
- Description:
ax25: fix use-after-free bugs caused by ax25_ds_del_timer
- CVE: https://ubuntu.com/security/CVE-2024-35887
- Patch: ubuntu-focal/5.4.0-208.228/CVE-2024-35887-ax25-fix-use-after-free-bugs-caused-by-ax25-ds-del-timer-5.4.0-187.207.patch
- From: 5.4.0-208.228
- CVE-2024-53155
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://ubuntu.com/security/CVE-2024-53155
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 5.4.0-211.231
- CVE-2024-56650
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://ubuntu.com/security/CVE-2024-56650
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 5.4.0-211.231
- CVE-2024-57912
- Description:
iio: pressure: zpa2326: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57912
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-57912-iio-pressure-zpa2326-fix-information-leak-in-triggered-buffer.patch
- From: 5.4.0-211.231
- CVE-2024-57911
- Description:
iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57911
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-57911-iio-dummy-iio-simply-dummy-buffer-fix-information-leak-in-triggered-buffer.patch
- From: 5.4.0-211.231
- CVE-2024-57910
- Description:
iio: light: vcnl4035: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57910
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-57910-iio-light-vcnl4035-fix-information-leak-in-triggered-buffer.patch
- From: 5.4.0-211.231
- CVE-2024-57908
- Description:
iio: imu: kmx61: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57908
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-57908-iio-imu-kmx61-fix-information-leak-in-triggered-buffer.patch
- From: 5.4.0-211.231
- CVE-2024-57906
- Description:
iio: adc: ti-ads8688: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57906
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-57906-iio-adc-ti-ads8688-fix-information-leak-in-triggered-buffer.patch
- From: 5.4.0-211.231
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53239-alsa-6fire-release-resources-at-card-release.patch
- From: 5.4.0-211.231
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53239-alsa-6fire-release-resources-at-card-release-kpatch.patch
- From: 5.4.0-211.231
- CVE-2024-43900
- Description:
media: xc2028: avoid use-after-free in load_firmware_cb()
- CVE: https://ubuntu.com/security/CVE-2024-43900
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-43900-media-xc2028-avoid-use-after-free-in-load_firmware_cb.patch
- From: 5.4.0-211.231
- CVE-2024-49936
- Description:
net/xen-netback: prevent UAF in xenvif_flush_hash()
- CVE: https://ubuntu.com/security/CVE-2024-49936
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-49936-net-xen-netback-prevent-uaf-in-xenvif-flush-hash.patch
- From: 5.4.0-211.231
- CVE-2024-49996
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://ubuntu.com/security/CVE-2024-49996
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points.patch
- From: 5.4.0-211.231
- CVE-2024-50051
- Description:
spi: mpc52xx: Add cancel_work_sync before module remove
- CVE: https://ubuntu.com/security/CVE-2024-50051
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-50051-spi-mpc52xx-add-cancel-work-sync-before-module-remove.patch
- From: 5.4.0-211.231
- CVE-2024-53142
- Description:
Patch affects initramfs
- CVE:
- Patch: skipped/CVE-2024-53142.patch
- From:
- CVE-2024-53156
- Description:
wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
- CVE: https://ubuntu.com/security/CVE-2024-53156
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53156-wifi-ath9k-add-range-check-for-conn-rsp-epid-in-htc-connect-service.patch
- From: 5.4.0-211.231
- CVE-2024-53165
- Description:
Out of scope: SuperH architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53165.patch
- From:
- CVE-2024-53171
- Description:
ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit
- CVE: https://ubuntu.com/security/CVE-2024-53171
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53171-ubifs-authentication-fix-use-after-free-in-ubifs-tnc-end-commit.patch
- From: 5.4.0-211.231
- CVE-2024-56606
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56606
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 5.4.0-211.231
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://ubuntu.com/security/CVE-2024-56605
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.4.0-211.231
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc
- CVE: https://ubuntu.com/security/CVE-2024-56605
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56605-Bluetooth-L2CAP-handle-NULL-sock-pointer-in-l2cap_sock_alloc.patch
- From: 5.4.0-211.231
- CVE-2024-56603
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://ubuntu.com/security/CVE-2024-56603
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.4.0-211.231
- CVE-2024-56602
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://ubuntu.com/security/CVE-2024-56602
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.4.0-211.231
- CVE-2024-56601
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56601
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.4.0-211.231
- CVE-2024-56600
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://ubuntu.com/security/CVE-2024-56600
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.4.0-211.231
- CVE-2024-56598
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://ubuntu.com/security/CVE-2024-56598
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 5.4.0-211.231
- CVE-2024-56615
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56615
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 5.4.0-211.231
- CVE-2024-56614
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56614
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 5.4.0-211.231
- CVE-2024-56619
- Description:
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-56619
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56619-nilfs2-fix-potential-out-of-bounds-memory-access-in-nilfs-find-entry.patch
- From: 5.4.0-211.231
- CVE-2024-53161
- Description:
EDAC/bluefield: Fix potential integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-53161
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53161-edac-bluefield-fix-potential-integer-overflow.patch
- From: 5.4.0-211.231
- CVE-2024-53157
- Description:
firmware: arm_scpi: Check the DVFS OPP count returned by the firmware
- CVE: https://ubuntu.com/security/CVE-2024-53157
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53157-firmware-arm-scpi-check-the-dvfs-opp-count-returned-by-the-firmware.patch
- From: 5.4.0-211.231
- CVE-2024-53214
- Description:
vfio/pci: Properly hide first-in-list PCIe extended capability
- CVE: https://ubuntu.com/security/CVE-2024-53214
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53214-vfio-pci-properly-hide-first-in-list-pcie-extended-capability.patch
- From: 5.4.0-211.231
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 5.4.0-211.231
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix a DMA to stack memory bug
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53197-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch
- From: 5.4.0-211.231
- CVE-2024-53148
- Description:
comedi: Flush partial mappings in error case
- CVE: https://ubuntu.com/security/CVE-2024-53148
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53148-comedi-flush-partial-mappings-in-error-case.patch
- From: 5.4.0-211.231
- CVE-2024-53184
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53184.patch
- From:
- CVE-2024-53183
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53183.patch
- From:
- CVE-2024-53181
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53181.patch
- From:
- CVE-2024-53172
- Description:
ubi: fastmap: Fix duplicate slab cache names while attaching
- CVE: https://ubuntu.com/security/CVE-2024-53172
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53172-ubi-fastmap-fix-duplicate-slab-cache-names-while-attaching.patch
- From: 5.4.0-211.231
- CVE-2024-53198
- Description:
xen: Fix the issue of resource not being properly released in xenbus_dev_probe()
- CVE: https://ubuntu.com/security/CVE-2024-53198
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53198-xen-fix-the-issue-of-resource-not-being-properly-released-in-xenbus-dev-probe.patch
- From: 5.4.0-211.231
- CVE-2024-53112
- Description:
ocfs2: uncache inode which has failed entering the group
- CVE: https://ubuntu.com/security/CVE-2024-53112
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53112-ocfs2-uncache-inode-which-has-failed-entering-the-group.patch
- From: 5.4.0-211.231
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2022-49034
- Description:
Out of scope: SuperH arch not supported.
- CVE:
- Patch: skipped/CVE-2022-49034.patch
- From:
- CVE-2024-43098
- Description:
i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock
- CVE: https://ubuntu.com/security/CVE-2024-43098
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-43098-i3c-use-i3cdev-desc-info-instead-of-calling-i3c-device-get-info-to-avoid-deadlock.patch
- From: 5.4.0-211.231
- CVE-2024-47707
- Description:
ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
- CVE: https://ubuntu.com/security/CVE-2024-47707
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-47707-ipv6-avoid-possible-null-deref-in-rt6-uncached-list-flush-dev.patch
- From: 5.4.0-211.231
- CVE-2024-44938
- Description:
[PATCH] jfs: Fix shift-out-of-bounds in dbDiscardAG
- CVE: https://ubuntu.com/security/CVE-2024-44938
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-44938-jfs-Fix-shift-out-of-bounds-in-dbDiscardAG.patch
- From: 5.4.0-211.231
- CVE-2024-49884
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://ubuntu.com/security/CVE-2024-49884
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-49884-ext4-fix-slab-use-after-free-in-ext4-split-extent-at-205.patch
- From: 5.4.0-211.231
- CVE-2024-52332
- Description:
[PATCH] igb: Fix potential invalid memory access in igb_init_module()
- CVE: https://ubuntu.com/security/CVE-2024-52332
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-52332-igb-Fix-potential-invalid-memory-access-in-igb_init_module.patch
- From: 5.4.0-211.231
- CVE-2024-53194
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-53194.patch
- From:
- CVE-2024-53121
- Description:
net/mlx5: fs, lock FTE when checking if active
- CVE: https://ubuntu.com/security/CVE-2024-53121
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53121-net-mlx5-fs-lock-fte-when-checking-if-active.patch
- From: 5.4.0-211.231
- CVE-2024-53130
- Description:
nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint
- CVE: https://ubuntu.com/security/CVE-2024-53130
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53130-nilfs2-fix-null-ptr-deref-in-block-dirty-buffer-tracepoint-198.218.patch
- From: 5.4.0-211.231
- CVE-2024-53146
- Description:
NFSD: Prevent a potential integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-53146
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53146-nfsd-prevent-a-potential-integer-overflow.patch
- From: 5.4.0-211.231
- CVE-2024-53145
- Description:
um: Fix potential integer overflow during physmem setup
- CVE: https://ubuntu.com/security/CVE-2024-53145
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53145-um-fix-potential-integer-overflow-during-physmem-setup.patch
- From: 5.4.0-211.231
- CVE-2024-53124
- Description:
net: fix data-races around sk->sk_forward_alloc
- CVE: https://ubuntu.com/security/CVE-2024-53124
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53124-net-fix-data-races-around-sk-sk-forward-alloc-148.165.patch
- From: 5.4.0-211.231
- CVE-2024-53131
- Description:
nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
- CVE: https://ubuntu.com/security/CVE-2024-53131
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53131-nilfs2-fix-null-ptr-deref-in-block-touch-buffer-tracepoint.patch
- From: 5.4.0-211.231
- CVE-2024-56548
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times.patch
- From: 5.4.0-211.231
- CVE-2024-56548
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times-kpatch.patch
- From: 5.4.0-211.231
- CVE-2024-53140
- Description:
[PATCH] netlink: terminate outstanding dump on socket close
- CVE: https://ubuntu.com/security/CVE-2024-53140
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53140-netlink-terminate-outstanding-dump-on-socket-close.patch
- From: 5.4.0-211.231
- CVE-2024-53140
- Description:
[PATCH] netlink: terminate outstanding dump on socket close
- CVE: https://ubuntu.com/security/CVE-2024-53140
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53140-netlink-terminate-outstanding-dump-on-socket-close-kpatch.patch
- From: 5.4.0-211.231
- CVE-2024-56704
- Description:
9p/xen: fix release of IRQ
- CVE: https://ubuntu.com/security/CVE-2024-56704
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56704-9p-xen-Fix-use-after-free-bug-in-xen_9pfs_front_remove-due-to-race-condition.patch
- From: 5.4.0-211.231
- CVE-2024-56704
- Description:
9p/xen: fix release of IRQ
- CVE: https://ubuntu.com/security/CVE-2024-56704
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 5.4.0-211.231
- CVE-2024-57850
- Description:
jffs2: Prevent rtime decompress memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-57850
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-57850-jffs2-prevent-rtime-decompress-memory-corruption.patch
- From: 5.4.0-211.231
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://ubuntu.com/security/CVE-2024-53150
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.4.0-211.231
- CVE-2024-57900
- Description:
ila: serialize calls to nf_register_net_hooks()
- CVE: https://ubuntu.com/security/CVE-2024-57900
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-57900-ila-serialize-calls-to-nf-register-net-hooks.patch
- From: 5.4.0-211.231
- CVE-2021-47219
- Description:
scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()
- CVE: https://ubuntu.com/security/CVE-2021-47219
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2021-47219-scsi-scsi-debug-fix-out-of-bound-read-in-resp-report-tgtpgs.patch
- From: 5.4.0-211.231
- CVE-2024-57892
- Description:
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
- CVE: https://ubuntu.com/security/CVE-2024-57892
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-57892-ocfs2-fix-slab-use-after-free-due-to-dangling-pointer-dqi-priv.patch
- From: 5.4.0-211.231
- CVE-2024-56631
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://ubuntu.com/security/CVE-2024-56631
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 5.4.0-211.231
- CVE-2025-21687
- Description:
vfio/platform: check the bounds of read/write syscalls
- CVE: https://ubuntu.com/security/CVE-2025-21687
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2025-21687-vfio-platform-check-the-bounds-of-read-write-syscalls.patch
- From: 5.4.0-211.231
- CVE-2024-56642
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://ubuntu.com/security/CVE-2024-56642
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.4.0-211.231
- CVE-2024-56644
- Description:
net/ipv6: release expired exception dst cached in socket
- CVE: https://ubuntu.com/security/CVE-2024-56644
- Patch: ubuntu-focal/5.4.0-211.231/CVE-2024-56644-net-ipv6-release-expired-exception-dst-cached-in-socket.patch
- From: 5.15.0-211.231
- CVE-2024-26928 CVE-2024-35864
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://ubuntu.com/security/CVE-2024-35864
- Patch: ubuntu-focal/5.4.0-212.232/CVE-2024-26928-CVE-2024-35864-smb-client-fix-potential-uaf-in-cifs-debug-files-proc-show-5.4.0-139.156.patch
- From: 5.4.0-212.232
- CVE-2024-35864
- Description:
smb: client: fix potential UAF in smb2_is_valid_lease_break()
- CVE: https://ubuntu.com/security/CVE-2024-35864
- Patch: ubuntu-focal/5.4.0-212.232/CVE-2024-35864-smb-client-fix-potential-uaf-in-smb2-is-valid-lease-break.patch
- From: 5.4.0-212.232
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-focal/5.4.0-212.232/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-5.4.0-208.228.patch
- From: 5.4.0-212.232
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-focal/5.4.0-212.232/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch-5.4.0-208.228.patch
- From: 5.4.0-212.232
- CVE-2025-21700
- Description:
net: sched: Disallow replacing of child qdisc from one parent to another
- CVE: https://ubuntu.com/security/CVE-2025-21700
- Patch: ubuntu-focal/5.4.0-214.234/CVE-2025-21700-net-sched-disallow-replacing-of-child-qdisc-from-one-parent-to-another.patch
- From: 5.4.0-214.234
- CVE-2021-47119
- Description:
ext4: fix memory leak in ext4_fill_super
- CVE: https://ubuntu.com/security/CVE-2021-47119
- Patch: ubuntu-focal/5.4.0-214.234/CVE-2021-47119-ext4-fix-memory-leak-in-ext4-fill-super-5.4.0-167.184.patch
- From: 5.4.0-214.234
- CVE-2024-26915
- Description:
drm/amdgpu: Reset IH OVERFLOW_CLEAR bit
- CVE: https://ubuntu.com/security/CVE-2024-26915
- Patch: ubuntu-focal/5.4.0-214.234/CVE-2024-26915-drm-amdgpu-reset-ih-overflow-clear-bit.patch
- From: 5.4.0-214.234
- CVE-2024-35958
- Description:
net: ena: Fix incorrect descriptor free behavior
- CVE: https://ubuntu.com/security/CVE-2024-35958
- Patch: ubuntu-focal/5.4.0-214.234/CVE-2024-35958-net-ena-fix-incorrect-descriptor-free-behavior.patch
- From: 5.4.0-214.234
- CVE-2024-46826
- Description:
ELF: fix kernel.randomize_va_space double read
- CVE: https://ubuntu.com/security/CVE-2024-46826
- Patch: ubuntu-focal/5.4.0-214.234/CVE-2024-46826-elf-fix-kernel-randomize-va-space-double-read.patch
- From: 5.4.0-214.234
- CVE-2024-50256
- Description:
netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
- CVE: https://ubuntu.com/security/CVE-2024-50256
- Patch: ubuntu-focal/5.4.0-214.234/CVE-2024-50256-netfilter-nf-reject-ipv6-fix-potential-crash-in-nf-send-reset6.patch
- From: 5.4.0-214.234
- CVE-2025-21702
- Description:
pfifo_tail_enqueue: Drop new packet when sch->limit == 0
- CVE: https://ubuntu.com/security/CVE-2025-21702
- Patch: ubuntu-focal/5.4.0-214.234/CVE-2025-21702-pfifo-tail-enqueue-drop-new-packet-when-sch-limit-0.patch
- From: 5.4.0-214.234
- CVE-2024-49974
- Description:
NFSD: Force all NFSv4.2 COPY requests to be synchronous
- CVE: https://ubuntu.com/security/CVE-2024-49974
- Patch: ubuntu-focal/5.4.0-214.234/CVE-2024-49974-NFSD-Force-all-NFSv4.2-COPY-requests-to-be-synchronous.patch
- From: 5.4.0-214.234
- CVE-2023-52927
- Description:
netfilter: allow exp not to be removed in nf_ct_find_expectation
- CVE: https://ubuntu.com/security/CVE-2023-52927
- Patch: ubuntu-focal/5.4.0-215.235/CVE-2023-52927-netfilter-allow-exp-not-to-be-removed-in-nf-ct-find-expectation.patch
- From: 5.4.0-215.235
- CVE-2024-26689
- Description:
ceph: prevent use-after-free in encode_cap_msg()
- CVE: https://ubuntu.com/security/CVE-2024-26689
- Patch: ubuntu-focal/5.4.0-215.235/CVE-2024-26689-ceph-prevent-use-after-free-in-encode-cap-msg.patch
- From: 5.4.0-215.235
- CVE-2023-52664
- Description:
net: atlantic: eliminate double free in error handling logic
- CVE: https://ubuntu.com/security/CVE-2023-52664
- Patch: ubuntu-focal/5.4.0-215.235/CVE-2023-52664-net-atlantic-eliminate-double-free-in-error-handling-logic.patch
- From: 5.4.0-215.235
- CVE-2024-26996
- Description:
usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error
- CVE: https://ubuntu.com/security/CVE-2024-26996
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2024-26996-usb-gadget-f-ncm-fix-uaf-ncm-object-at-re-bind-after-usb-ep-transport-error.patch
- From: 5.4.0-216.236
- CVE-2024-58069
- Description:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
- CVE: https://ubuntu.com/security/CVE-2024-58069
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2024-58069-rtc-pcf85063-fix-potential-oob-write-in-pcf85063-nvmem-read.patch
- From: 5.4.0-216.236
- CVE-2025-21715
- Description:
The DM9000 chip is available on ARM32 and MIPS architectures, which KernelCare does not support.
- CVE:
- Patch: skipped/CVE-2025-21715.patch
- From:
- CVE-2024-57980
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://ubuntu.com/security/CVE-2024-57980
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 5.4.0-216.236
- CVE-2024-58055
- Description:
usb: gadget: f_tcm: Don't free command immediately
- CVE: https://ubuntu.com/security/CVE-2024-58055
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2024-58055-usb-gadget-f-tcm-don-t-free-command-immediately.patch
- From: 5.4.0-216.236
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-5.4.0-150.167.patch
- From: 5.4.0-216.236
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-58002
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-kpatch-5.4.0-150.167.patch
- From: 6.1.133-1
- CVE-2024-58083
- Description:
Complex adaptation required
- CVE:
- Patch: skipped/CVE-2024-58083.patch
- From:
- CVE-2024-57979
- Description:
PPS for embedded GPS devices. Irrelevant for servers.
- CVE:
- Patch: skipped/CVE-2024-57979.patch
- From:
- CVE-2024-50055
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://ubuntu.com/security/CVE-2024-50055
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 5.4.0-216.236
- CVE-2023-52741
- Description:
cifs: Fix use-after-free in rdata->read_into_pages()
- CVE: https://ubuntu.com/security/CVE-2023-52741
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2023-52741-cifs-fix-use-after-free-in-rdata-read-into-pages.patch
- From: 5.4.0-216.236
- CVE-2025-21718
- Description:
net: rose: fix timer races against user threads
- CVE: https://ubuntu.com/security/CVE-2025-21718
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2025-21718-net-rose-fix-timer-races-against-user-threads.patch
- From: 5.4.0-216.236
- CVE-2024-58007
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-58007.patch
- From:
- CVE-2025-21791
- Description:
vrf: use RCU protection in l3mdev_l3_out()
- CVE: https://ubuntu.com/security/CVE-2025-21791
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2025-21791-vrf-use-rcu-protection-in-l3mdev-l3-out.patch
- From: 5.4.0-216.236
- CVE-2025-21782
- Description:
orangefs: fix a oob in orangefs_debug_write
- CVE: https://ubuntu.com/security/CVE-2025-21782
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2025-21782-orangefs-fix-a-oob-in-orangefs-debug-write.patch
- From: 5.4.0-216.236
- CVE-2025-21811
- Description:
nilfs2: protect access to buffers with no active references
- CVE: https://ubuntu.com/security/CVE-2025-21811
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2025-21811-nilfs2-protect-access-to-buffers-with-no-active-references-5.4.0-167.184.patch
- From: 5.4.0-216.236
- CVE-2025-21858
- Description:
geneve: Fix use-after-free in geneve_find_dev().
- CVE: https://ubuntu.com/security/CVE-2025-21858
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2025-21858-geneve-fix-use-after-free-in-geneve-find-dev.patch
- From: 5.4.0-216.236
- CVE-2025-21858
- Description:
geneve: Suppress list corruption splat in geneve_destroy_tunnels()
- CVE: https://ubuntu.com/security/CVE-2025-21858
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2025-21858-geneve-Suppress-list-corruption-splat-in-geneve_destroy_tunnels.patch
- From: 5.4.0-216.236
- CVE-2025-21934
- Description:
rapidio: fix an API misues when rio_add_net() fails
- CVE: https://ubuntu.com/security/CVE-2025-21934
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2025-21934-rapidio-fix-an-api-misues-when-rio-add-net-fails.patch
- From: 5.4.0-216.236
- CVE-2025-21905
- Description:
wifi: iwlwifi: limit printed string from FW file
- CVE: https://ubuntu.com/security/CVE-2025-21905
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2025-21905-wifi-iwlwifi-limit-printed-string-from-fw-file.patch
- From: 5.4.0-216.236
- CVE-2025-21928
- Description:
HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
- CVE: https://ubuntu.com/security/CVE-2025-21928
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2025-21928-hid-intel-ish-hid-fix-use-after-free-issue-in-ishtp-hid-remove.patch
- From: 5.4.0-216.236
- CVE-2025-21920
- Description:
vlan: enforce underlying device type
- CVE: https://ubuntu.com/security/CVE-2025-21920
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2025-21920-vlan-enforce-underlying-device-type.patch
- From: 5.4.0-216.236
- CVE-2024-26982
- Description:
Squashfs: check the inode number is not the invalid value of zero
- CVE: https://ubuntu.com/security/CVE-2024-26982
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid-value-of-zero.patch
- From: 5.4.0-216.236
- CVE-2021-47191
- Description:
scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()
- CVE: https://ubuntu.com/security/CVE-2021-47191
- Patch: ubuntu-focal/5.4.0-216.236/CVE-2021-47191-scsi-scsi-debug-fix-out-of-bound-read-in-resp-readcap16.patch
- From: 5.4.0-216.236
- CVE-2025-21959
- Description:
netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()
- CVE: https://ubuntu.com/security/CVE-2025-21959
- Patch: ubuntu-focal/5.4.0-218.238/CVE-2025-21959-netfilter-nf-conncount-fully-initialize-struct-nf-conncount-tuple-in-insert-tree-5.4.0-198.218.patch
- From: 5.4.0-218.238
- CVE-2025-21993
- Description:
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
- CVE: https://ubuntu.com/security/CVE-2025-21993
- Patch: ubuntu-focal/5.4.0-218.238/CVE-2025-21993-iscsi-ibft-fix-ubsan-shift-out-of-bounds-warning-in-ibft-attr-show-nic.patch
- From: 5.4.0-218.238
- CVE-2025-39735
- Description:
jfs: xattr: check invalid xattr size more strictly
- CVE: https://ubuntu.com/security/CVE-2025-39735
- Patch: ubuntu-focal/5.4.0-218.238/CVE-2025-39735-jfs-fix-slab-out-of-bounds-read-in-ea-get-dep1-195.215.patch
- From: 5.4.0-218.238
- CVE-2025-39735
- Description:
jfs: fix slab-out-of-bounds read in ea_get()
- CVE: https://ubuntu.com/security/CVE-2025-39735
- Patch: ubuntu-focal/5.4.0-218.238/CVE-2025-39735-jfs-fix-slab-out-of-bounds-read-in-ea-get.patch
- From: 5.4.0-218.238
- CVE-2025-37937
- Description:
objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds()
- CVE: https://ubuntu.com/security/CVE-2025-37937
- Patch: ubuntu-focal/5.4.0-218.238/CVE-2025-37937-objtool-media-dib8000-prevent-divide-by-zero-in-dib8000-set-dds.patch
- From: 5.4.0-218.238
- CVE-2024-56551
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://ubuntu.com/security/CVE-2024-56551
- Patch: ubuntu-focal/5.4.0-218.238/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 5.4.0-218.238
- CVE-2023-53034
- Description:
ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans
- CVE: https://ubuntu.com/security/CVE-2023-53034
- Patch: ubuntu-focal/5.4.0-218.238/CVE-2023-53034-ntb-hw-switchtec-fix-shift-out-of-bounds-in-switchtec-ntb-mw-set-trans.patch
- From: 5.4.0-218.238
- CVE-2025-22004
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://ubuntu.com/security/CVE-2025-22004
- Patch: ubuntu-focal/5.4.0-218.238/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 5.4.0-218.238
- CVE-2021-47211
- Description:
ALSA: usb-audio: fix null pointer dereference on pointer cs_desc
- CVE: https://ubuntu.com/security/CVE-2021-47211
- Patch: ubuntu-focal/5.4.0-218.238/CVE-2021-47211-alsa-usb-audio-fix-null-pointer-dereference-on-pointer-cs-desc.patch
- From: 5.4.0-218.238
- CVE-2024-50047
- Description:
smb: client: fix UAF in async decryption
- CVE: https://ubuntu.com/security/CVE-2024-50047
- Patch: ubuntu-focal/5.4.0-219.239/CVE-2024-50047-smb-client-fix-uaf-in-async-decryption-139.patch
- From: 5.4.0-219.239
- CVE-2024-56662
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://ubuntu.com/security/CVE-2024-56662
- Patch: ubuntu-focal/5.4.0-219.239/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi_nfit_ctl.patch
- From: 5.4.0-219.239
- N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://ubuntu.com/security/CVE-2024-53104
- Patch: ubuntu-focal/5.4.0-207.227/CVE-2024-53104-media-uvcvideo-Skip-parsing-frames-of-type-UVC_VS_UN.patch
- From: 5.4.0-207.227