- kernel-6.8.0-1013.14 (ubuntu-noble)
- 6.8.0-1036.38
- 2025-09-05 21:03:24
- 2025-09-08 08:30:22
- K20250905_20
- CVE-2024-39292
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-39292.patch
- From:
- CVE-2024-39484
- Description:
mmc: davinci: Don't strip remove function when driver is builtin
- CVE: https://ubuntu.com/security/CVE-2024-39484
- Patch: ubuntu-noble/6.8.0-41.41/CVE-2024-39484-mmc-davinci-don-t-strip-remove-function-when-driver-is-builtin.patch
- From: 6.8.0-41.41
- CVE-2024-38630
- Description:
watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
- CVE: https://ubuntu.com/security/CVE-2024-38630
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-38630-watchdog-cpu5wdt-c-fix-use-after-free-bug-caused-by.patch
- From: 6.8.0-44.44
- CVE-2024-38627
- Description:
stm class: Fix a double free in stm_register_device()
- CVE: https://ubuntu.com/security/CVE-2024-38627
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-38627-stm-class-fix-a-double-free-in-stm-register-device.patch
- From: 6.8.0-44.44
- CVE-2024-39291
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-39291.patch
- From:
- CVE-2024-38664
- Description:
drm: zynqmp_dpsub: Always register bridge
- CVE: https://ubuntu.com/security/CVE-2024-38664
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-38664-drm-zynqmp-dpsub-always-register-bridge.patch
- From: 6.8.0-44.44
- CVE-2024-36477
- Description:
tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
- CVE: https://ubuntu.com/security/CVE-2024-36477
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-36477-tpm-tis-spi-account-for-spi-header-when-allocating-tpm-spi.patch
- From: 6.8.0-44.44
- CVE-2024-39277
- Description:
dma-mapping: benchmark: handle NUMA_NO_NODE correctly
- CVE: https://ubuntu.com/security/CVE-2024-39277
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39277-dma-mapping-benchmark-handle-numa-no-node-correctly.patch
- From: 6.8.0-44.44
- CVE-2024-38667
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-38667.patch
- From:
- CVE-2024-39463
- Description:
9p: add missing locking around taking dentry fid list
- CVE: https://ubuntu.com/security/CVE-2024-39463
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39463-9p-add-missing-locking-around-taking-dentry-fid-list.patch
- From: 6.8.0-44.44
- CVE-2024-36978
- Description:
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
- CVE: https://ubuntu.com/security/CVE-2024-36978
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in.patch
- From: 6.8.0-44.44
- CVE-2024-40903
- Description:
usb: typec: tcpm: fix use-after-free case in
- CVE: https://ubuntu.com/security/CVE-2024-40903
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-40903-usb-typec-tcpm-fix-use-after-free-case-in.patch
- From: 6.8.0-44.44
- CVE-2024-39479
- Description:
drm/i915/hwmon: Get rid of devm
- CVE: https://ubuntu.com/security/CVE-2024-39479
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39479-drm-i915-hwmon-get-rid-of-devm.patch
- From: 6.8.0-44.44
- CVE-2024-39480
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://ubuntu.com/security/CVE-2024-39480
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39480-kdb-fix-buffer-overflow-during-tab-complete.patch
- From: 6.8.0-44.44
- CVE-2024-40906
- Description:
net/mlx5: Always stop health timer during driver removal
- CVE: https://ubuntu.com/security/CVE-2024-40906
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-40906-net-mlx5-always-stop-health-timer-during-driver-removal.patch
- From: 6.8.0-44.44
- CVE-2024-40902
- Description:
jfs: xattr: fix buffer overflow for invalid xattr
- CVE: https://ubuntu.com/security/CVE-2024-40902
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-40902-jfs-xattr-fix-buffer-overflow-for-invalid-xattr.patch
- From: 6.8.0-44.44
- CVE-2024-40899
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2024-40899.patch
- From:
- CVE-2024-39510
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2024-39510.patch
- From:
- CVE-2024-39496
- Description:
btrfs: zoned: fix use-after-free due to race with dev replace
- CVE: https://ubuntu.com/security/CVE-2024-39496
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39496-btrfs-zoned-fix-use-after-free-due-to-race-with-dev-replace.patch
- From: 6.8.0-44.44
- CVE-2024-39495
- Description:
greybus: Fix use-after-free bug in gb_interface_release due to race condition.
- CVE: https://ubuntu.com/security/CVE-2024-39495
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39495-greybus-fix-use-after-free-bug-in-gb-interface-release-due.patch
- From: 6.8.0-44.44
- CVE-2024-39494
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://ubuntu.com/security/CVE-2024-39494
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39494-ima-fix-use-after-free-on-a-dentry-s-dname-name.patch
- From: 6.8.0-44.44
- CVE-2024-36971
- Description:
net: fix __dst_negative_advice() race
- CVE: https://ubuntu.com/security/CVE-2024-36971
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-36971-net-fix-dst-negative-advice-race.patch
- From: 6.8.0-44.44
- CVE-2024-42159
- Description:
scsi: mpi3mr: Sanitise num_phys
- CVE: https://ubuntu.com/security/CVE-2024-42159
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42159-scsi-mpi3mr-sanitise-num-phys.patch
- From: 6.8.0-45.45
- CVE-2024-42228
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://ubuntu.com/security/CVE-2024-42228
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling.patch
- From: 6.8.0-45.45
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://ubuntu.com/security/CVE-2024-42154
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 6.8.0-45.45
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://ubuntu.com/security/CVE-2024-42154
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 6.8.0-45.45
- CVE-2024-42224
- Description:
net: dsa: mv88e6xxx: Correct check for empty list
- CVE: https://ubuntu.com/security/CVE-2024-42224
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42224-net-dsa-mv88e6xxx-correct-check-for-empty-list.patch
- From: 6.8.0-45.45
- CVE-2024-42160
- Description:
f2fs: check validation of fault attrs in f2fs_build_fault_attr()
- CVE: https://ubuntu.com/security/CVE-2024-42160
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42160-f2fs-check-validation-of-fault-attrs-in.patch
- From: 6.8.0-45.45
- CVE-2024-42160
- Description:
f2fs: Add inline to f2fs_build_fault_attr() stub
- CVE: https://ubuntu.com/security/CVE-2024-42160
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42160-f2fs-add-inline-to-f2fs-build-fault-attr-stub.patch
- From: 6.8.0-45.45
- CVE-2024-41009
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2024-41009.patch
- From:
- CVE-2024-45016
- Description:
netem: fix return value if duplicate enqueue fails
- CVE: https://ubuntu.com/security/CVE-2024-45016
- Patch: ubuntu-noble/6.8.0-47.47/CVE-2024-45016-netem-fix-return-value-if-duplicate-enqueue-fails.patch
- From: 6.8.0-47.47
- CVE-2024-46800
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://ubuntu.com/security/CVE-2024-46800
- Patch: ubuntu-noble/6.8.0-49.49/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 6.8.0-49.49
- CVE-2024-43882
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://ubuntu.com/security/CVE-2024-43882
- Patch: ubuntu-noble/6.8.0-49.49/CVE-2024-43882-exec-Fix-ToCToU-between-perm-check-and-set-uid-gid-usage.patch
- From: 6.8.0-49.49
- CVE-2024-42285
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://ubuntu.com/security/CVE-2024-42285
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-42285-rdma-iwcm-fix-a-use-after-free-related-to-destroying-cm-ids.patch
- From: 6.8.0-50.51
- CVE-2024-42301
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://ubuntu.com/security/CVE-2024-42301
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 6.8.0-50.51
- CVE-2024-46831
- Description:
net: microchip: vcap: Fix use-after-free error in kunit test
- CVE: https://ubuntu.com/security/CVE-2024-46831
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46831-net-microchip-vcap-Fix-use-after-free-error-in-kunit-test.patch
- From: 6.8.0-50.51
- CVE-2024-46743
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://ubuntu.com/security/CVE-2024-46743
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 6.8.0-50.51
- CVE-2024-46743
- Description:
of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one()
- CVE: https://ubuntu.com/security/CVE-2024-46743
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46743-of-irq-Fix-using-uninitialized-variable-addr_len-in-API-of_irq_parse_one.patch
- From: 6.8.0-50.51
- CVE-2024-46723
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46723
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 6.8.0-50.51
- CVE-2024-46724
- Description:
drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://ubuntu.com/security/CVE-2024-46724
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46724-drm-amdgpu-fix-out-of-bounds-read-of-df-v1-7-channel-number.patch
- From: 6.8.0-50.51
- CVE-2024-46747
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://ubuntu.com/security/CVE-2024-46747
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 6.8.0-50.51
- CVE-2024-46731
- Description:
drm/amd/pm: fix the Out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46731
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46731-drm-amd-pm-fix-the-out-of-bounds-read-warning.patch
- From: 6.8.0-50.51
- CVE-2024-46774
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-46774.patch
- From:
- CVE-2024-46858
- Description:
mptcp: pm: Fix uaf in __timer_delete_sync
- CVE: https://ubuntu.com/security/CVE-2024-46858
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46858-mptcp-pm-fix-uaf-in-timer-delete-sync.patch
- From: 6.8.0-50.51
- CVE-2024-46854
- Description:
net: dpaa: Pad packets to ETH_ZLEN
- CVE: https://ubuntu.com/security/CVE-2024-46854
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46854-net-dpaa-pad-packets-to-eth-zlen.patch
- From: 6.8.0-50.51
- CVE-2024-42302
- Description:
Patched function waits for external events, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-42302.patch
- From:
- CVE-2024-42284
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://ubuntu.com/security/CVE-2024-42284
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 6.8.0-50.51
- CVE-2024-43852
- Description:
hwmon: (ltc2991) re-order conditions to fix off by one bug
- CVE: https://ubuntu.com/security/CVE-2024-43852
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-43852-hwmon-ltc2991-re-order-conditions-to-fix-off-by-one-bug.patch
- From: 6.8.0-50.51
- CVE-2024-43843
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-43843.patch
- From:
- CVE-2024-44934
- Description:
net: bridge: mcast: wait for previous gc cycles when removing port
- CVE: https://ubuntu.com/security/CVE-2024-44934
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44934-net-bridge-mcast-wait-for-previous-gc-cycles-when-removing-port.patch
- From: 6.8.0-50.51
- CVE-2024-43900
- Description:
media: xc2028: avoid use-after-free in load_firmware_cb()
- CVE: https://ubuntu.com/security/CVE-2024-43900
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-43900-media-xc2028-avoid-use-after-free-in-load-firmware-cb.patch
- From: 6.8.0-50.51
- CVE-2024-44967
- Description:
drm/mgag200: Bind I2C lifetime to DRM device
- CVE: https://ubuntu.com/security/CVE-2024-44967
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44967-drm-mgag200-bind-i2c-lifetime-to-drm-device.patch
- From: 6.8.0-50.51
- CVE-2024-44977
- Description:
drm/amdgpu: Validate TA binary size
- CVE: https://ubuntu.com/security/CVE-2024-44977
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44977-drm-amdgpu-validate-ta-binary-size.patch
- From: 6.8.0-50.51
- CVE-2024-44978
- Description:
drm/xe: Free job before xe_exec_queue_put
- CVE: https://ubuntu.com/security/CVE-2024-44978
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44978-drm-xe-free-job-before-xe-exec-queue-put.patch
- From: 6.8.0-50.51
- CVE-2024-46673
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://ubuntu.com/security/CVE-2024-46673
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46673-scsi-aacraid-fix-double-free-on-probe-failure.patch
- From: 6.8.0-50.51
- CVE-2024-46757
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46757
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 6.8.0-50.51
- CVE-2024-46725
- Description:
drm/amdgpu: Fix out-of-bounds write warning
- CVE: https://ubuntu.com/security/CVE-2024-46725
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46725-drm-amdgpu-fix-out-of-bounds-write-warning.patch
- From: 6.8.0-50.51
- CVE-2024-46821
- Description:
drm/amd/pm: Fix negative array index read
- CVE: https://ubuntu.com/security/CVE-2024-46821
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46821-drm-amd-pm-fix-negative-array-index-read.patch
- From: 6.8.0-50.51
- CVE-2024-46818
- Description:
drm/amd/display: Check gpio_id before used as array index
- CVE: https://ubuntu.com/security/CVE-2024-46818
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46818-drm-amd-display-check-gpio-id-before-used-as-array-index.patch
- From: 6.8.0-50.51
- CVE-2024-46815
- Description:
drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]
- CVE: https://ubuntu.com/security/CVE-2024-46815
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46815-drm-amd-display-check-num-valid-sets-before-accessing-reader-wm-sets.patch
- From: 6.8.0-50.51
- CVE-2024-46814
- Description:
drm/amd/display: Check msg_id before processing transcation
- CVE: https://ubuntu.com/security/CVE-2024-46814
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46814-drm-amd-display-check-msg-id-before-processing-transcation.patch
- From: 6.8.0-50.51
- CVE-2024-46812
- Description:
drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration
- CVE: https://ubuntu.com/security/CVE-2024-46812
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46812-drm-amd-display-skip-inactive-planes-within-modesupportandsystemconfiguration.patch
- From: 6.8.0-50.51
- CVE-2024-44998
- Description:
atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://ubuntu.com/security/CVE-2024-44998
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue-rx.patch
- From: 6.8.0-50.51
- CVE-2024-43842
- Description:
wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()
- CVE: https://ubuntu.com/security/CVE-2024-43842
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-43842-wifi-rtw89-fix-array-index-mistake-in-rtw89-sta-info-get-iter.patch
- From: 6.8.0-50.51
- CVE-2024-43825
- Description:
iio: Fix the sorting functionality in iio_gts_build_avail_time_table
- CVE: https://ubuntu.com/security/CVE-2024-43825
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-43825-iio-fix-the-sorting-functionality-in-iio-gts-build-avail-time-table.patch
- From: 6.8.0-50.51
- CVE-2024-43873
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://ubuntu.com/security/CVE-2024-43873
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-43873-vhost-vsock-always-initialize-seqpacket-allow.patch
- From: 6.8.0-50.51
- CVE-2024-42314
- Description:
btrfs: fix extent map use-after-free when adding pages to compressed bio
- CVE: https://ubuntu.com/security/CVE-2024-42314
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-42314-btrfs-fix-extent-map-use-after-free-when-adding-pages-to-compressed-bio.patch
- From: 6.8.0-50.51
- CVE-2024-42313
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://ubuntu.com/security/CVE-2024-42313
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 6.8.0-50.51
- CVE-2024-46744
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://ubuntu.com/security/CVE-2024-46744
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46744-squashfs-sanity-check-symbolic-link-size.patch
- From: 6.8.0-50.51
- CVE-2024-46741
- Description:
misc: fastrpc: Fix double free of 'buf' in error path
- CVE: https://ubuntu.com/security/CVE-2024-46741
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46741-misc-fastrpc-fix-double-free-of-buf-in-error-path.patch
- From: 6.8.0-50.51
- CVE-2024-46740
- Description:
binder: fix UAF caused by offsets overwrite
- CVE: https://ubuntu.com/security/CVE-2024-46740
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46740-binder-fix-uaf-caused-by-offsets-overwrite.patch
- From: 6.8.0-50.51
- CVE-2024-46811
- Description:
drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box
- CVE: https://ubuntu.com/security/CVE-2024-46811
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46811-drm-amd-display-fix-index-may-exceed-array-range-within-fpu-update-bw-bounding-box.patch
- From: 6.8.0-50.51
- CVE-2024-46813
- Description:
drm/amd/display: Check link_index before accessing dc->links[]
- CVE: https://ubuntu.com/security/CVE-2024-46813
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46813-drm-amd-display-check-link-index-before-accessing-dc-links.patch
- From: 6.8.0-50.51
- CVE-2024-46830
- Description:
KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS
- CVE: https://ubuntu.com/security/CVE-2024-46830
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46830-kvm-x86-acquire-kvm-srcu-when-handling-kvm-set-vcpu-events.patch
- From: 6.8.0-50.51
- CVE-2024-46845
- Description:
tracing/timerlat: Only clear timer if a kthread exists
- CVE: https://ubuntu.com/security/CVE-2024-46845
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46845-tracing-timerlat-only-clear-timer-if-a-kthread-exists.patch
- From: 6.8.0-50.51
- CVE-2024-46828
- Description:
sched: sch_cake: fix bulk flow accounting logic for host fairness
- CVE: https://ubuntu.com/security/CVE-2024-46828
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46828-sched-sch-cake-fix-bulk-flow-accounting-logic-for-host-fairness.patch
- From: 6.8.0-50.51
- CVE-2024-46836
- Description:
usb: gadget: aspeed_udc: validate endpoint index for ast udc
- CVE: https://ubuntu.com/security/CVE-2024-46836
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46836-usb-gadget-aspeed-udc-validate-endpoint-index-for-ast-udc.patch
- From: 6.8.0-50.51
- CVE-2024-46746
- Description:
HID: amd_sfh: free driver_data after destroying hid device
- CVE: https://ubuntu.com/security/CVE-2024-46746
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46746-hid-amd-sfh-free-driver-data-after-destroying-hid-device.patch
- From: 6.8.0-50.51
- CVE-2024-43888
- Description:
mm: list_lru: fix UAF for memory cgroup
- CVE: https://ubuntu.com/security/CVE-2024-43888
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-43888-mm-list-lru-fix-uaf-for-memory-cgroup.patch
- From: 6.8.0-50.51
- CVE-2024-44941
- Description:
f2fs: fix to cover read extent cache access with lock
- CVE: https://ubuntu.com/security/CVE-2024-44941
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44941-f2fs-fix-to-cover-read-extent-cache-access-with-lock.patch
- From: 6.8.0-50.51
- CVE-2024-46738
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://ubuntu.com/security/CVE-2024-46738
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46738-vmci-fix-use-after-free-when-removing-resource-in-vmci-resource-remove.patch
- From: 6.8.0-50.51
- CVE-2024-46756
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46756
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 6.8.0-50.51
- CVE-2024-46758
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46758
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 6.8.0-50.51
- CVE-2024-46759
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46759
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 6.8.0-50.51
- CVE-2024-45026
- Description:
Architecture is not supported
- CVE:
- Patch: skipped/CVE-2024-45026.patch
- From:
- CVE-2024-44986
- Description:
ipv6: fix possible UAF in ip6_finish_output2()
- CVE: https://ubuntu.com/security/CVE-2024-44986
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44986-ipv6-fix-possible-uaf-in-ip6-finish-output2.patch
- From: 6.8.0-50.51
- CVE-2024-44985
- Description:
ipv6: prevent possible UAF in ip6_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-44985
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44985-ipv6-prevent-possible-uaf-in-ip6-xmit.patch
- From: 6.8.0-50.51
- CVE-2024-47659
- Description:
smack: tcp: ipv4, fix incorrect labeling
- CVE: https://ubuntu.com/security/CVE-2024-47659
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-47659-smack-tcp-ipv4-fix-incorrect-labeling.patch
- From: 6.8.0-50.51
- CVE-2024-49967
- Description:
ext4: no need to continue when the number of entries is 1
- CVE: https://ubuntu.com/security/CVE-2024-49967
- Patch: ubuntu-noble/6.8.0-51.52/CVE-2024-49967-ext4-no-need-to-continue-when-the-number-of-entries-is-1.patch
- From: 6.8.0-51.52
- CVE-2024-53057
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://ubuntu.com/security/CVE-2024-53057
- Patch: ubuntu-noble/6.8.0-51.52/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 6.8.0-51.52
- CVE-2024-50264
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://ubuntu.com/security/CVE-2024-50264
- Patch: ubuntu-noble/6.8.0-51.52/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 6.8.0-51.52
- CVE-2024-53103
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://ubuntu.com/security/CVE-2024-53103
- Patch: ubuntu-noble/6.8.0-52.53/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 6.8.0-52.53
- CVE-2024-53141
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://ubuntu.com/security/CVE-2024-53141
- Patch: ubuntu-noble/6.8.0-52.53/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 6.8.0-52.53
- CVE-2024-53164
- Description:
net: sched: fix ordering of qlen adjustment
- CVE: https://ubuntu.com/security/CVE-2024-53164
- Patch: ubuntu-noble/6.8.0-52.53/CVE-2024-53164-net-sched-fix-ordering-of-qlen-adjustment.patch
- From: 6.8.0-52.53
- CVE-2024-47685
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://ubuntu.com/security/CVE-2024-47685
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.15.0-127.137
- CVE-2024-47670
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-47670
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.15.0-127.137
- CVE-2024-47675
- Description:
bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()
- CVE: https://ubuntu.com/security/CVE-2024-47675
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47675-bpf-fix-use-after-free-in-bpf-uprobe-multi-link-attach.patch
- From: kernel-6.8.0-54.56
- CVE-2024-47682
- Description:
scsi: sd: Fix off-by-one error in sd_read_block_characteristics()
- CVE: https://ubuntu.com/security/CVE-2024-47682
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47682-scsi-sd-fix-off-by-one-error-in-sd-read-block-characteristics.patch
- From: kernel-6.8.0-54.56
- CVE-2024-47695
- Description:
RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds
- CVE: https://ubuntu.com/security/CVE-2024-47695
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47695-rdma-rtrs-clt-reset-cid-to-con-num-1-to-stay-in-bounds.patch
- From: kernel-6.8.0-54.56
- CVE-2024-47697
- Description:
drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47697
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47697-drivers-media-dvb-frontends-rtl2830-fix-an-out-of-bounds-write-error.patch
- From: 6.8.0-54.56
- CVE-2024-47698
- Description:
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47698
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47698-drivers-media-dvb-frontends-rtl2832-fix-an-out-of-bounds-write-error.patch
- From: 6.8.0-54.56
- CVE-2024-47701
- Description:
ext4: return error on ext4_find_inline_entry
- CVE: https://ubuntu.com/security/CVE-2024-47701
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47701-ext4-return-error-on-ext4_find_inline_entry.patch
- From: 6.8.0-54.56
- CVE-2024-47701
- Description:
ext4: avoid OOB when system.data xattr changes underneath the filesystem
- CVE: https://ubuntu.com/security/CVE-2024-47701
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47701-ext4-avoid-oob-when-system-data-xattr-changes-underneath-the-filesystem.patch
- From: 6.8.0-54.56
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://ubuntu.com/security/CVE-2024-47696
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47696-rdma-iwcm-fix-warning-at-kernel-workqueue-c-check-flush-dependency.patch
- From: 6.8.0-54.56
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://ubuntu.com/security/CVE-2024-47696
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47696-rdma-iwcm-fix-warning-at-kernel-workqueue-c-check-flush-dependency-kpatch.patch
- From: 6.8.0-54.56
- CVE-2024-47691
- Description:
f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()
- CVE: https://ubuntu.com/security/CVE-2024-47691
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47691-f2fs-fix-to-avoid-use-after-free-in-f2fs_stop_gc_thread.patch
- From: 6.8.0-54.56
- CVE-2024-47718
- Description:
[PATCH] wifi: rtw88: always wait for both firmware loading attempts
- CVE: https://ubuntu.com/security/CVE-2024-47718
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47718-wifi-rtw88-always-wait-for-both-firmware-loading-attempts.patch
- From: 6.8.0-54.56
- CVE-2024-47730
- Description:
crypto: hisilicon/qm - inject error before stopping queue
- CVE: https://ubuntu.com/security/CVE-2024-47730
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47730-crypto-hisilicon-qm-inject-error-before-stopping-queue.patch
- From: 6.8.0-54.56
- CVE-2024-47751
- Description:
PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()
- CVE: https://ubuntu.com/security/CVE-2024-47751
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47751-pci-kirin-fix-buffer-overflow-in-kirin-pcie-parse-port.patch
- From: 6.8.0-54.56
- CVE-2024-47750
- Description:
RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08
- CVE: https://ubuntu.com/security/CVE-2024-47750
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47750-rdma-hns-fix-use-after-free-of-rsv-qp-on-hip08.patch
- From: 6.8.0-54.56
- CVE-2024-47748
- Description:
vhost_vdpa: assign irq bypass producer token correctly
- CVE: https://ubuntu.com/security/CVE-2024-47748
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47748-vhost-vdpa-assign-irq-bypass-producer-token-correctly.patch
- From: 6.8.0-54.56
- CVE-2024-47742
- Description:
firmware_loader: Block path traversal
- CVE: https://ubuntu.com/security/CVE-2024-47742
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47742-firmware-loader-block-path-traversal.patch
- From: 6.8.0-54.56
- CVE-2024-47727
- Description:
x86/tdx: Fix "in-kernel MMIO" check
- CVE: https://ubuntu.com/security/CVE-2024-47727
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47727-x86-tdx-fix-in-kernel-mmio-check.patch
- From: 6.8.0-54.56
- CVE-2024-47732
- Description:
crypto: iaa - Fix potential use after free bug
- CVE: https://ubuntu.com/security/CVE-2024-47732
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47732-crypto-iaa-fix-potential-use-after-free-bug.patch
- From: 6.8.0-54.56
- CVE-2024-47745
- Description:
mm: call the security_mmap_file() LSM hook in remap_file_pages()
- CVE: https://ubuntu.com/security/CVE-2024-47745
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47745-mm-call-the-security-mmap-file-lsm-hook-in-remap-file-pages.patch
- From: 6.8.0-54.56
- CVE-2024-47719
- Description:
iommufd: Protect against overflow of ALIGN() during iova allocation
- CVE: https://ubuntu.com/security/CVE-2024-47719
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47719-iommufd-protect-against-overflow-of-align-during-iova-allocation.patch
- From: 6.8.0-54.56
- CVE-2024-47686
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-47686.patch
- From:
- CVE-2024-49997
- Description:
net: ethernet: lantiq_etop: fix memory disclosure
- CVE: https://ubuntu.com/security/CVE-2024-49997
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49997-net-ethernet-lantiq-etop-fix-memory-disclosure.patch
- From: 6.8.0-54.56
- CVE-2024-49995
- Description:
tipc: guard against string buffer overrun
- CVE: https://ubuntu.com/security/CVE-2024-49995
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 6.8.0-54.56
- CVE-2024-50007
- Description:
ALSA: asihpi: Fix potential OOB array access
- CVE: https://ubuntu.com/security/CVE-2024-50007
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-50007-alsa-asihpi-fix-potential-oob-array-access.patch
- From: 6.8.0-54.56
- CVE-2024-49991
- Description:
drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
- CVE: https://ubuntu.com/security/CVE-2024-49991
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49991-drm-amdkfd-amdkfd-free-gtt-mem-clear-the-correct-pointer.patch
- From: 6.8.0-54.56
- CVE-2024-49989
- Description:
drm/amd/display: fix double free issue during amdgpu module unload
- CVE: https://ubuntu.com/security/CVE-2024-49989
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49989-drm-amd-display-fix-double-free-issue-during-amdgpu-module-unload.patch
- From: 6.8.0-54.56
- CVE-2024-50005
- Description:
mac802154: Fix potential RCU dereference issue in mac802154_scan_worker
- CVE: https://ubuntu.com/security/CVE-2024-50005
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-50005-mac802154-fix-potential-rcu-dereference-issue-in-mac802154-scan-worker.patch
- From: 6.8.0-54.56
- CVE-2024-49986
- Description:
Out of scope: android related patch.
- CVE:
- Patch: skipped/CVE-2024-49986.patch
- From:
- CVE-2024-49853
- Description:
firmware: arm_scmi: Fix double free in OPTEE transport
- CVE: https://ubuntu.com/security/CVE-2024-49853
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49853-firmware-arm-scmi-fix-double-free-in-optee-transport-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49852
- Description:
scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
- CVE: https://ubuntu.com/security/CVE-2024-49852
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49852-scsi-elx-libefc-fix-potential-use-after-free-in-efc-nport-vport-del-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49895
- Description:
drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation
- CVE: https://ubuntu.com/security/CVE-2024-49895
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49895-drm-amd-display-fix-index-out-of-bounds-in-dcn30-degamma-hardware-format-translation-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49894
- Description:
drm/amd/display: Fix index out of bounds in degamma hardware format translation
- CVE: https://ubuntu.com/security/CVE-2024-49894
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49894-drm-amd-display-fix-index-out-of-bounds-in-degamma-hardware-format-translation-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49889
- Description:
ext4: avoid use-after-free in ext4_ext_show_leaf()
- CVE: https://ubuntu.com/security/CVE-2024-49889
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49889-ext4-avoid-use-after-free-in-ext4-ext-show-leaf-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49883
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://ubuntu.com/security/CVE-2024-49883
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49882
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://ubuntu.com/security/CVE-2024-49882
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49880
- Description:
ext4: fix off by one issue in alloc_flex_gd()
- CVE: https://ubuntu.com/security/CVE-2024-49880
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49880-ext4-fix-off-by-one-issue-in-alloc-flex-gd-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49884
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://ubuntu.com/security/CVE-2024-49884
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49884-ext4-fix-slab-use-after-free-in-ext4_split_extent_at-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49950
- Description:
Bluetooth: L2CAP: Fix uaf in l2cap_connect
- CVE: https://ubuntu.com/security/CVE-2024-49950
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49950-bluetooth-l2cap-fix-uaf-in-l2cap-connect-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49936
- Description:
net/xen-netback: prevent UAF in xenvif_flush_hash()
- CVE: https://ubuntu.com/security/CVE-2024-49936
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49936-net-xen-netback-prevent-uaf-in-xenvif-flush-hash-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49931
- Description:
wifi: ath12k: fix array out-of-bound access in SoC stats
- CVE: https://ubuntu.com/security/CVE-2024-49931
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49931-wifi-ath12k-fix-array-out-of-bound-access-in-soc-stats-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49930
- Description:
wifi: ath11k: fix array out-of-bound access in SoC stats
- CVE: https://ubuntu.com/security/CVE-2024-49930
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49930-wifi-ath11k-fix-array-out-of-bound-access-in-soc-stats-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49969
- Description:
drm/amd/display: Fix index out of bounds in DCN30 color transformation
- CVE: https://ubuntu.com/security/CVE-2024-49969
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49969-drm-amd-display-fix-index-out-of-bounds-in-dcn30-color-transformation-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49983
- Description:
ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free
- CVE: https://ubuntu.com/security/CVE-2024-49983
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49983-ext4-drop-ppath-from-ext4-ext-replay-update-ex-to-avoid-double-free-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49960
- Description:
ext4: fix timer use-after-free on failed mount
- CVE: https://ubuntu.com/security/CVE-2024-49960
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49960-ext4-fix-timer-use-after-free-on-failed-mount-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49966
- Description:
ocfs2: cancel dqi_sync_work before freeing oinfo
- CVE: https://ubuntu.com/security/CVE-2024-49966
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49966-ocfs2-cancel-dqi-sync-work-before-freeing-oinfo-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49982
- Description:
aoe: fix the potential use-after-free problem in more places
- CVE: https://ubuntu.com/security/CVE-2024-49982
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49982-aoe-fix-the-potential-use-after-free-problem-in-more-places-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49924
- Description:
fbdev: pxafb: Fix possible use after free in pxafb_task()
- CVE: https://ubuntu.com/security/CVE-2024-49924
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49924-fbdev-pxafb-Fix-possible-use-after-free-in-pxafb_task.patch
- From: 6.8.0-54.56
- CVE-2024-47723
- Description:
jfs: fix out-of-bounds in dbNextAG() and diAlloc()
- CVE: https://ubuntu.com/security/CVE-2024-47723
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47723-jfs-fix-out-of-bounds-in-dbNextAG-and-diAlloc.patch
- From: 6.8.0-54.56
- CVE-2024-47747
- Description:
net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2024-47747
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47747-net-seeq-fix-use-after-free-vulnerability-in-ether3-driver-due-to-race-condition.patch
- From: 6.8.0-54.56
- CVE-2024-47757
- Description:
nilfs2: fix potential oob read in nilfs_btree_check_delete()
- CVE: https://ubuntu.com/security/CVE-2024-47757
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47757-nilfs2-fix-potential-oob-read-in-nilfs_btree_check_delete.patch
- From: 6.8.0-54.56
- CVE-2024-49855
- Description:
nbd: fix race between timeout and normal completion
- CVE: https://ubuntu.com/security/CVE-2024-49855
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49855-nbd-fix-race-between-timeout-and-normal-completion.patch
- From: 6.8.0-54.56
- CVE-2024-49860
- Description:
ACPI: sysfs: validate return type of _STR method
- CVE: https://ubuntu.com/security/CVE-2024-49860
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49860-acpi-sysfs-validate-return-type-of-str-method.patch
- From: 6.8.0-54.56
- CVE-2024-49861
- Description:
jfs: fix out-of-bounds in dbNextAG() and diAlloc()
- CVE: https://ubuntu.com/security/CVE-2024-49861
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49861-bpf-fix-helper-writes-to-read-only-maps.patch
- From: 6.8.0-54.56
- CVE-2024-49862
- Description:
powercap: intel_rapl: Fix off by one in get_rpi()
- CVE: https://ubuntu.com/security/CVE-2024-49862
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49862-powercap-intel_rapl-Fix-off-by-one-in-get_rpi.patch
- From: 6.8.0-54.56
- CVE-2024-49874
- Description:
i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2024-49874
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49874-i3c-master-svc-fix-use-after-free-vulnerability-in-svc-i3c-master-driver-due-to-race-condition.patch
- From: 6.8.0-54.56
- CVE-2024-49900
- Description:
jfs: Fix uninit-value access of new_ea in ea_buffer
- CVE: https://ubuntu.com/security/CVE-2024-49900
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49900-jfs-fix-uninit-value-access-of-new-ea-in-ea-buffer.patch
- From: 6.8.0-54.56
- CVE-2024-49903
- Description:
jfs: Fix uaf in dbFreeBits
- CVE: https://ubuntu.com/security/CVE-2024-49903
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49903-jfs-fix-uaf-in-dbfreebits.patch
- From: 6.8.0-54.56
- CVE-2024-49928
- Description:
wifi: rtw89: avoid reading out of bounds when loading TX power FW elements
- CVE: https://ubuntu.com/security/CVE-2024-49928
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49928-wifi-rtw89-avoid-reading-out-of-bounds-when-loading-tx-power-fw-elements.patch
- From: 6.8.0-54.56
- CVE-2024-49981
- Description:
media: venus: fix use after free bug in venus_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-49981
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49981-media-venus-fix-use-after-free-bug-in-venus-remove-due-to-race-condition.patch
- From: 6.8.0-54.56
- CVE-2024-47741
- Description:
btrfs: fix race setting file private on concurrent lseek using same fd
- CVE: https://ubuntu.com/security/CVE-2024-47741
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47741-btrfs-fix-race-setting-file-private-on-concurrent-lseek-using-same-fd.patch
- From: 6.8.0-54.56
- CVE-2024-47741
- Description:
btrfs: fix race setting file private on concurrent lseek using same fd
- CVE: https://ubuntu.com/security/CVE-2024-47741
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47741-btrfs-fix-race-setting-file-private-on-concurrent-lseek-using-same-fd-kpatch.patch
- From: 6.8.0-54.56
- CVE-2024-41016
- Description:
[PATCH 1/1] ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-41016
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-41016-ocfs2-strict-bound-check-before-memcmp-in-ocfs2_xattr_find_entry.patch
- From: 6.8.0-54.56
- CVE-2024-47671
- Description:
[PATCH 1/1] USB: usbtmc: prevent kernel-usb-infoleak
- CVE: https://ubuntu.com/security/CVE-2024-47671
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47671-USB-usbtmc-prevent-kernel-usb-infoleak.patch
- From: 6.8.0-54.56
- CVE-2024-47672
- Description:
[PATCH 1/1] wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead
- CVE: https://ubuntu.com/security/CVE-2024-47672
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47672-wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmware-is-dead.patch
- From: 6.8.0-54.56
- CVE-2024-47673
- Description:
[PATCH 1/1] wifi: iwlwifi: mvm: pause TCM when the firmware is stopped
- CVE: https://ubuntu.com/security/CVE-2024-47673
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47673-wifi-iwlwifi-mvm-pause-TCM-when-the-firmware-is-stopped.patch
- From: 6.8.0-54.56
- CVE-2024-47677
- Description:
[PATCH 1/1] exfat: resolve memory leak from exfat_create_upcase_table()
- CVE: https://ubuntu.com/security/CVE-2024-47677
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47677-exfat-resolve-memory-leak-from-exfat_create_upcase_table.patch
- From: 6.8.0-54.56
- CVE-2024-47678
- Description:
[PATCH 1/1] icmp: change the order of rate limits
- CVE: https://ubuntu.com/security/CVE-2024-47678
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47678-icmp-change-the-order-of-rate-limits.patch
- From: 6.8.0-54.56
- CVE-2024-47678
- Description:
[PATCH 1/1] icmp: change the order of rate limits
- CVE: https://ubuntu.com/security/CVE-2024-47678
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47678-icmp-change-the-order-of-rate-limits-kpatch.patch
- From: 6.8.0-54.56
- CVE-2024-47679
- Description:
[PATCH 1/1] vfs: fix race between evice_inodes() and find_inode()&iput()
- CVE: https://ubuntu.com/security/CVE-2024-47679
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47679-vfs-fix-race-between-evice_inodes-and-find_inode-iput.patch
- From: 6.8.0-54.56
- CVE-2024-47692
- Description:
[PATCH 1/1] nfsd: return -EINVAL when namelen is 0
- CVE: https://ubuntu.com/security/CVE-2024-47692
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47692-nfsd-return-EINVAL-when-namelen-is-0.patch
- From: 6.8.0-54.56
- CVE-2024-47693
- Description:
[PATCH 1/1] IB/core: Fix ib_cache_setup_one error flow cleanup
- CVE: https://ubuntu.com/security/CVE-2024-47693
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47693-IB-core-Fix-ib_cache_setup_one-error-flow-cleanup.patch
- From: 6.8.0-54.56
- CVE-2023-52917
- Description:
[PATCH] ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir()
- CVE: https://ubuntu.com/security/CVE-2023-52917
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2023-52917-ntb-intel-Fix-the-NULL-vs-IS_ERR-bug-for-debugfs_create_dir.patch
- From: 6.8.0-54.56
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://ubuntu.com/security/CVE-2024-53104
- Patch: ubuntu-noble/6.8.0-55.57/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 6.8.0-55.57
- CVE-2024-50180
- Description:
fbdev: sisfb: Fix strbuf array overflow
- CVE: https://ubuntu.com/security/CVE-2024-50180
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50180-fbdev-sisfb-fix-strbuf-array-overflow.patch
- From: 6.8.0-56.58
- CVE-2024-50186
- Description:
net: explicitly clear the sk pointer, when pf->create fails
- CVE: https://ubuntu.com/security/CVE-2024-50186
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50186-net-explicitly-clear-the-sk-pointer-when-pf-create-fails.patch
- From: 6.8.0-56.58
- CVE-2024-50088
- Description:
btrfs: fix uninitialized pointer free in add_inode_ref()
- CVE: https://ubuntu.com/security/CVE-2024-50088
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50088-btrfs-fix-uninitialized-pointer-free-in-add-inode-ref.patch
- From: 6.8.0-56.58
- CVE-2024-50083
- Description:
tcp: fix mptcp DSS corruption due to large pmtu xmit
- CVE: https://ubuntu.com/security/CVE-2024-50083
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50083-tcp-fix-mptcp-dss-corruption-due-to-large-pmtu-xmit.patch
- From: 6.8.0-56.58
- CVE-2024-56614
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56614
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 6.8.0-56.58
- CVE-2024-53156
- Description:
wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
- CVE: https://ubuntu.com/security/CVE-2024-53156
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-53156-wifi-ath9k-add-range-check-for-conn-rsp-epid-in-htc-connect-service.patch
- From: 6.8.0-56.58
- CVE-2024-53165
- Description:
Out of scope: SuperH architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53165.patch
- From:
- CVE-2024-56582
- Description:
btrfs: fix use-after-free in btrfs_encoded_read_endio()
- CVE: https://ubuntu.com/security/CVE-2024-56582
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-56582-btrfs-fix-use-after-free-in-btrfs-encoded-read-endio.patch
- From: 6.8.0-56.58
- CVE-2024-49865
- Description:
drm/xe/vm: move xa_alloc to prevent UAF
- CVE: https://ubuntu.com/security/CVE-2024-49865
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-49865-drm-xe-vm-move-xa-alloc-to-prevent-uaf.patch
- From: 6.8.0-56.58
- CVE-2024-50055
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://ubuntu.com/security/CVE-2024-50055
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 6.8.0-56.58
- CVE-2024-50047
- Description:
smb: client: fix UAF in async decryption
- CVE: https://ubuntu.com/security/CVE-2024-50047
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50047-smb-client-fix-uaf-in-async-decryption.patch
- From: 6.8.0-56.58
- CVE-2024-50029
- Description:
Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync
- CVE: https://ubuntu.com/security/CVE-2024-50029
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50029-bluetooth-hci-conn-fix-uaf-in-hci-enhanced-setup-sync.patch
- From: 6.8.0-56.58
- CVE-2024-50084
- Description:
net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test()
- CVE: https://ubuntu.com/security/CVE-2024-50084
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50084-net-microchip-vcap-api-fix-memory-leaks-in-vcap-api-encode-rule-test.patch
- From: 6.8.0-56.58
- CVE-2024-50074
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://ubuntu.com/security/CVE-2024-50074
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access.patch
- From: 6.8.0-56.58
- CVE-2024-50073
- Description:
tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
- CVE: https://ubuntu.com/security/CVE-2024-50073
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50073-tty-n-gsm-fix-use-after-free-in-gsm-cleanup-mux.patch
- From: 6.8.0-56.58
- CVE-2024-50061
- Description:
i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2024-50061
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50061-i3c-master-cdns-fix-use-after-free-vulnerability-in-cdns-i3c-master-driver-due-to-race-condition.patch
- From: 6.8.0-56.58
- CVE-2024-50059
- Description:
ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-50059
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50059-ntb-ntb-hw-switchtec-fix-use-after-free-vulnerability-in-switchtec-ntb-remove-due-to-race-condition.patch
- From: 6.8.0-56.58
- CVE-2024-50042
- Description:
ice: Fix increasing MSI-X on VF
- CVE: https://ubuntu.com/security/CVE-2024-50042
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50042-ice-fix-increasing-msi-x-on-vf.patch
- From: 6.8.0-56.58
- CVE-2024-50036
- Description:
net: do not delay dst_entries_add() in dst_release()
- CVE: https://ubuntu.com/security/CVE-2024-50036
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50036-net-do-not-delay-dst-entries-add-in-dst-release.patch
- From: 6.8.0-56.58
- CVE-2024-50035
- Description:
ppp: fix ppp_async_encode() illegal access
- CVE: https://ubuntu.com/security/CVE-2024-50035
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50035-ppp-fix-ppp-async-encode-illegal-access.patch
- From: 6.8.0-56.58
- CVE-2024-50033
- Description:
slip: make slhc_remember() more robust against malicious packets
- CVE: https://ubuntu.com/security/CVE-2024-50033
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50033-slip-make-slhc-remember-more-robust-against-malicious-packets.patch
- From: 6.8.0-56.58
- CVE-2024-50063
- Description:
bpf: Prevent tail call between progs attached to different hooks
- CVE: https://ubuntu.com/security/CVE-2024-50063
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50063-bpf-Prevent-tail-call-between-progs-attached-to-different-hooks.patch
- From: 6.8.0-56.58
- CVE-2024-50063
- Description:
bpf: Prevent tail call between progs attached to different hooks
- CVE: https://ubuntu.com/security/CVE-2024-50063
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50063-bpf-Prevent-tail-call-between-progs-attached-to-different-hooks-kpatch.patch
- From: 6.8.0-56.58
- CVE-2024-50066
- Description:
mm/mremap: fix move_normal_pmd/retract_page_tables race
- CVE: https://ubuntu.com/security/CVE-2024-50066
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50066-mm-mremap-fix-move-normal-pmd-retract-page-tables-race.patch
- From: 6.8.0-56.58
- CVE-2024-50193
- Description:
Out of scope: patch for x86_32 arch
- CVE:
- Patch: skipped/CVE-2024-50193.patch
- From:
- CVE-2024-56663
- Description:
wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one
- CVE: https://ubuntu.com/security/CVE-2024-56663
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-56663-wifi-nl80211-fix-nl80211-attr-mlo-link-id-off-by-one.patch
- From: 6.8.0-56.58
- CVE-2024-56663
- Description:
wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one
- CVE: https://ubuntu.com/security/CVE-2024-56663
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-56663-wifi-nl80211-fix-nl80211-attr-mlo-link-id-off-by-one-kpatch.patch
- From: 6.8.0-56.58
- CVE-2024-46795
- Description:
ksmbd: unset the binding mark of a reused connection
- CVE: https://ubuntu.com/security/CVE-2024-46795
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-46795-ksmbd-unset-the-binding-mark-of-a-reused-connection.patch
- From: 6.8.0-56.58
- CVE-2024-50086
- Description:
ksmbd: fix user-after-free from session log off
- CVE: https://ubuntu.com/security/CVE-2024-50086
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50086-ksmbd-fix-user-after-free-from-session-log-off.patch
- From: 6.8.0-56.58
- CVE-2024-50086
- Description:
ksmbd: fix user-after-free from session log off
- CVE: https://ubuntu.com/security/CVE-2024-50086
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50086-ksmbd-fix-user-after-free-from-session-log-off-kpatch.patch
- From: 6.8.0-56.58
- CVE-2024-56598
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://ubuntu.com/security/CVE-2024-56598
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 6.8.0-57.59
- CVE-2024-56595
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2024-56595
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 6.8.0-57.59
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://ubuntu.com/security/CVE-2024-50302
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 6.8.0-57.59
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle.patch
- From: 6.8.0-57.59
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56658
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch.patch
- From: 6.1.123-1
- CVE-2024-57798
- Description:
drm/dp_mst: Skip CSN if topology probing is not done yet (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-57798-drm-dp-mst-skip-csn-if-topology-probing-is-not-done-yet-49.patch
- From: 6.8.0-57.59
- CVE-2024-57798
- Description:
drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-57798-drm-dp-mst-ensure-mst-primary-pointer-is-valid-in-drm-dp-mst-handle-up-req.patch
- From: 6.8.0-57.59
- CVE-2024-56672
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://ubuntu.com/security/CVE-2024-56672
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 6.8.0-57.59
- CVE-2024-53063
- Description:
media: dvbdev: prevent the risk of out of memory access
- CVE: https://ubuntu.com/security/CVE-2024-53063
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-53063-media-dvbdev-prevent-the-risk-of-out-of-memory-access.patch
- From: 6.8.0-57.59
- CVE-2024-50067
- Description:
uprobe: avoid out-of-bounds memory access of fetching args
- CVE: https://ubuntu.com/security/CVE-2024-50067
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50067-uprobe-avoid-out-of-bounds-memory-access-of-fetching-args.patch
- From: 6.8.0-58.60
- CVE-2024-50131
- Description:
tracing: Consider the NULL character when validating the event length
- CVE: https://ubuntu.com/security/CVE-2024-50131
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50131-tracing-consider-the-null-character-when-validating-the-event-length.patch
- From: 6.8.0-58.60
- CVE-2024-50127
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://ubuntu.com/security/CVE-2024-50127
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 6.8.0-58.60
- CVE-2024-50126
- Description:
net: sched: use RCU read-side critical section in taprio_dump()
- CVE: https://ubuntu.com/security/CVE-2024-50126
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50126-net-sched-use-rcu-read-side-critical-section-in-taprio-dump.patch
- From: 6.8.0-58.60
- CVE-2024-50125
- Description:
Bluetooth: SCO: Fix UAF on sco_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-50125
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50125-bluetooth-sco-fix-uaf-on-sco-sock-timeout.patch
- From: 6.8.0-58.60
- CVE-2024-50124
- Description:
Bluetooth: ISO: Fix UAF on iso_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-50124
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50124-bluetooth-iso-fix-uaf-on-iso-sock-timeout.patch
- From: 6.8.0-58.60
- CVE-2024-50121
- Description:
nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
- CVE: https://ubuntu.com/security/CVE-2024-50121
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50121-nfsd-cancel-nfsd-shrinker-work-using-sync-mode-in-nfs4-state-shutdown-net.patch
- From: 6.8.0-58.60
- CVE-2024-50051
- Description:
spi: mpc52xx: Add cancel_work_sync before module remove
- CVE: https://ubuntu.com/security/CVE-2024-50051
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50051-spi-mpc52xx-add-cancel-work-sync-before-module-remove.patch
- From: 6.8.0-58.60
- CVE-2024-50209
- Description:
RDMA/bnxt_re: Add a check for memory allocation
- CVE: https://ubuntu.com/security/CVE-2024-50209
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50209-rdma-bnxt-re-add-a-check-for-memory-allocation.patch
- From: 6.8.0-58.60
- CVE-2024-50159
- Description:
firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup()
- CVE: https://ubuntu.com/security/CVE-2024-50159
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50159-firmware-arm-scmi-fix-the-double-free-in-scmi-debugfs-common-setup.patch
- From: 6.8.0-58.60
- CVE-2024-50158
- Description:
RDMA/bnxt_re: Fix out of bound check
- CVE: https://ubuntu.com/security/CVE-2024-50158
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50158-rdma-bnxt-re-fix-out-of-bound-check.patch
- From: 6.8.0-58.60
- CVE-2024-50155
- Description:
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
- CVE: https://ubuntu.com/security/CVE-2024-50155
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50155-netdevsim-use-cond-resched-in-nsim-dev-trap-report-work.patch
- From: 6.8.0-58.60
- CVE-2024-50154
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
- CVE: https://ubuntu.com/security/CVE-2024-50154
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50154-tcp-dccp-don-t-use-timer-pending-in-reqsk-queue-unlink-6.8.0-47.47.patch
- From: 6.8.0-58.60
- CVE-2024-53206
- Description:
tcp: Fix use-after-free of nreq in reqsk_timer_handler().
- CVE: https://ubuntu.com/security/CVE-2024-53206
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53206-tcp-Fix-use-after-free-of-nreq-in-reqsk_timer_handler-6.8.0-47.47.patch
- From: 6.8.0-58.60
- CVE-2024-50151
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://ubuntu.com/security/CVE-2024-50151
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 6.8.0-58.60
- CVE-2024-50143
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://ubuntu.com/security/CVE-2024-50143
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50143-udf-fix-uninit-value-use-in-udf-get-fileshortad.patch
- From: 6.8.0-58.60
- CVE-2024-50203
- Description:
Out of scope: ARM64 architecture issue
- CVE:
- Patch: skipped/CVE-2024-50203.patch
- From:
- CVE-2024-50215
- Description:
nvmet-auth: assign dh_key to NULL after kfree_sensitive
- CVE: https://ubuntu.com/security/CVE-2024-50215
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50215-nvmet-auth-assign-dh-key-to-null-after-kfree-sensitive.patch
- From: 6.8.0-58.60
- CVE-2024-50261
- Description:
macsec: Fix use-after-free while sending the offloading packet
- CVE: https://ubuntu.com/security/CVE-2024-50261
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50261-macsec-fix-use-after-free-while-sending-the-offloading-packet.patch
- From: 6.8.0-58.60
- CVE-2024-50262
- Description:
bpf: Fix out-of-bounds write in trie_get_next_key()
- CVE: https://ubuntu.com/security/CVE-2024-50262
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch
- From: 6.8.0-58.60
- CVE-2024-50257
- Description:
netfilter: Fix use-after-free in get_info()
- CVE: https://ubuntu.com/security/CVE-2024-50257
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50257-netfilter-fix-use-after-free-in-get-info.patch
- From: 6.8.0-58.60
- CVE-2024-50246
- Description:
fs/ntfs3: Add rough attr alloc_size check
- CVE: https://ubuntu.com/security/CVE-2024-50246
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50246-fs-ntfs3-add-rough-attr-alloc-size-check.patch
- From: 6.8.0-58.60
- CVE-2024-50242
- Description:
fs/ntfs3: Additional check in ntfs_file_release
- CVE: https://ubuntu.com/security/CVE-2024-50242
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50242-fs-ntfs3-additional-check-in-ntfs-file-release.patch
- From: 6.8.0-58.60
- CVE-2024-50235
- Description:
wifi: cfg80211: clear wdev->cqm_config pointer on free
- CVE: https://ubuntu.com/security/CVE-2024-50235
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50235-wifi-cfg80211-clear-wdev-cqm-config-pointer-on-free.patch
- From: 6.8.0-58.60
- CVE-2024-50222
- Description:
iov_iter: fix copy_page_from_iter_atomic() if KMAP_LOCAL_FORCE_MAP
- CVE: https://ubuntu.com/security/CVE-2024-50222
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50222-iov-iter-fix-copy-page-from-iter-atomic-if-kmap-local-force-map.patch
- From: 6.8.0-58.60
- CVE-2024-50230
- Description:
nilfs2: fix kernel bug due to missing clearing of checked flag
- CVE: https://ubuntu.com/security/CVE-2024-50230
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50230-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-checked-flag.patch
- From: 6.8.0-58.60
- CVE-2024-53059
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-53059
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53059-wifi-iwlwifi-mvm-fix-response-handling-in-iwl-mvm-send-recovery-cmd.patch
- From: 6.8.0-58.60
- CVE-2024-53061
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://ubuntu.com/security/CVE-2024-53061
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 6.8.0-58.60
- CVE-2024-50286
- Description:
ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create
- CVE: https://ubuntu.com/security/CVE-2024-50286
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50286-ksmbd-fix-slab-use-after-free-in-ksmbd-smb2-session-create.patch
- From: 6.8.0-58.60
- CVE-2024-50283
- Description:
ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp
- CVE: https://ubuntu.com/security/CVE-2024-50283
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50283-ksmbd-fix-slab-use-after-free-in-smb3-preauth-hash-rsp.patch
- From: 6.8.0-58.60
- CVE-2024-50282
- Description:
drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
- CVE: https://ubuntu.com/security/CVE-2024-50282
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50282-drm-amdgpu-add-missing-size-check-in-amdgpu-debugfs-gprwave-read.patch
- From: 6.8.0-58.60
- CVE-2024-50280
- Description:
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
- CVE: https://ubuntu.com/security/CVE-2024-50280
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50280-dm-cache-fix-flushing-uninitialized-delayed-work-on-cache-ctr-error.patch
- From: 6.8.0-58.60
- CVE-2024-50276
- Description:
net: vertexcom: mse102x: Fix possible double free of TX skb
- CVE: https://ubuntu.com/security/CVE-2024-50276
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50276-net-vertexcom-mse102x-fix-possible-double-free-of-tx-skb.patch
- From: 6.8.0-58.60
- CVE-2024-50269
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://ubuntu.com/security/CVE-2024-50269
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 6.8.0-58.60
- CVE-2024-50267
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://ubuntu.com/security/CVE-2024-50267
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 6.8.0-58.60
- CVE-2025-21993
- Description:
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
- CVE: https://ubuntu.com/security/CVE-2025-21993
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2025-21993-iscsi-ibft-fix-ubsan-shift-out-of-bounds-warning-in-ibft-attr-show-nic.patch
- From: 6.8.0-58.60
- CVE-2024-56627
- Description:
ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
- CVE: https://ubuntu.com/security/CVE-2024-56627
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56627-ksmbd-fix-out-of-bounds-read-in-ksmbd-vfs-stream-read.patch
- From: 6.8.0-58.60
- CVE-2024-50234
- Description:
wifi: iwlegacy: Clear stale interrupts before resuming device
- CVE: https://ubuntu.com/security/CVE-2024-50234
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50234-wifi-iwlegacy-clear-stale-interrupts-before-resuming-device.patch
- From: 6.8.0-58.60
- CVE-2024-50301
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://ubuntu.com/security/CVE-2024-50301
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 6.8.0-58.60
- CVE-2024-53082
- Description:
virtio_net: Add hash_key_length check
- CVE: https://ubuntu.com/security/CVE-2024-53082
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53082-virtio-net-add-hash-key-length-check.patch
- From: 6.8.0-58.60
- CVE-2024-50279
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50279
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 6.8.0-58.60
- CVE-2024-50275
- Description:
arm64/sve: Discard stale CPU state when handling SVE traps
- CVE: https://ubuntu.com/security/CVE-2024-50275
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50275-arm64-sve-discard-stale-cpu-state-when-handling-sve-traps.patch
- From: 6.8.0-58.60
- CVE-2024-53062
- Description:
media: mgb4: protect driver against spectre
- CVE: https://ubuntu.com/security/CVE-2024-53062
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53062-media-mgb4-protect-driver-against-spectre.patch
- From: 6.8.0-58.60
- CVE-2024-53099
- Description:
bpf: Check validity of link->type in bpf_link_show_fdinfo()
- CVE: https://ubuntu.com/security/CVE-2024-53099
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53099-bpf-check-validity-of-link-type-in-bpf-link-show-fdinfo.patch
- From: 6.8.0-58.60
- CVE-2024-53108
- Description:
drm/amd/display: Adjust VSDB parser for replay feature
- CVE: https://ubuntu.com/security/CVE-2024-53108
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53108-drm-amd-display-adjust-vsdb-parser-for-replay-feature.patch
- From: 6.8.0-58.60
- CVE-2024-53162
- Description:
crypto: qat/qat_4xxx - fix off by one in uof_get_name()
- CVE: https://ubuntu.com/security/CVE-2024-53162
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53162-crypto-qat-qat-4xxx-fix-off-by-one-in-uof-get-name.patch
- From: 6.8.0-58.60
- CVE-2024-53155
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://ubuntu.com/security/CVE-2024-53155
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 6.8.0-58.60
- CVE-2024-56650
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://ubuntu.com/security/CVE-2024-56650
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 6.8.0-58.60
- CVE-2024-50112
- Description:
The ADDRESS_MASKING config option cannot be turned off. LAM (linear address masking) would be fatal for applications using it.
- CVE:
- Patch: skipped/CVE-2024-50112.patch
- From:
- CVE-2024-53166
- Description:
block, bfq: fix bfqq uaf in bfq_limit_depth()
- CVE: https://ubuntu.com/security/CVE-2024-53166
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53166-block-bfq-fix-bfqq-uaf-in-bfq-limit-depth.patch
- From: 6.8.0-58.60
- CVE-2024-53068
- Description:
firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier()
- CVE: https://ubuntu.com/security/CVE-2024-53068
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53068-firmware-arm-scmi-fix-slab-use-after-free-in-scmi-bus-notifier.patch
- From: 6.8.0-58.60
- CVE-2024-53095
- Description:
smb: client: Fix use-after-free of network namespace.
- CVE: https://ubuntu.com/security/CVE-2024-53095
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53095-smb-client-fix-use-after-free-of-network-namespace.patch
- From: 6.8.0-58.60
- CVE-2024-54680
- Description:
smb: client: fix TCP timers deadlock after rmmod
- CVE: https://ubuntu.com/security/CVE-2024-54680
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-54680-smb-client-fix-TCP-timers-deadlock-after-rmmod.patch
- From: 6.8.0-58.60
- CVE-2024-53139
- Description:
sctp: fix possible UAF in sctp_v6_available()
- CVE: https://ubuntu.com/security/CVE-2024-53139
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53139-sctp-fix-possible-uaf-in-sctp-v6-available.patch
- From: 6.8.0-58.60
- CVE-2024-53126
- Description:
vdpa: solidrun: Fix UB bug with devres
- CVE: https://ubuntu.com/security/CVE-2024-53126
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53126-vdpa-solidrun-fix-ub-bug-with-devres.patch
- From: 6.8.0-58.60
- CVE-2024-53096
- Description:
mm: avoid unsafe VMA hook invocation when error arises on mmap hook
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-01-mm-avoid-unsafe-VMA-hook-invocation-when-error-arises-on-mmap-hook.patch
- From: 6.8.0-58.60
- CVE-2024-53096
- Description:
mm: unconditionally close VMAs on error
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-02-mm-unconditionally-close-VMAs-on-error.patch
- From: 6.8.0-58.60
- CVE-2024-53096
- Description:
mm: refactor map_deny_write_exec()
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-03-mm-refactor-map_deny_write_exec.patch
- From: 6.8.0-58.60
- CVE-2024-53096
- Description:
mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-04-mm-refactor-arch_calc_vm_flag_bits-and-arm64-MTE-handling.patch
- From: 6.8.0-58.60
- CVE-2024-53096
- Description:
mm: resolve faulty mmap_region() error path behaviour
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-05-mm-resolve-faulty-mmap_region-error-path-behaviour.patch
- From: 6.8.0-58.60
- CVE-2024-57937
- Description:
mm: reinstate ability to map write-sealed memfd mappings read-only
- CVE: https://ubuntu.com/security/CVE-2024-57937
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57937-mm-reinstate-ability-to-map-write-sealed-memfd-mappings-read-only.patch
- From: 6.8.0-58.60
- CVE-2024-53133
- Description:
drm/amd/display: Handle dml allocation failure to avoid crash
- CVE: https://ubuntu.com/security/CVE-2024-53133
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53133-drm-amd-display-handle-dml-allocation-failure-to-avoid-crash.patch
- From: 6.8.0-58.60
- CVE-2024-53142
- Description:
Patch affects initramfs
- CVE:
- Patch: skipped/CVE-2024-53142.patch
- From:
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://ubuntu.com/security/CVE-2024-53150
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 6.8.0-58.60
- CVE-2024-53168
- Description:
sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket
- CVE: https://ubuntu.com/security/CVE-2024-53168
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53168-sunrpc-fix-one-uaf-issue-caused-by-sunrpc-kernel-tcp-socket.patch
- From: 6.8.0-58.60
- CVE-2024-53171
- Description:
ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit
- CVE: https://ubuntu.com/security/CVE-2024-53171
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53171-ubifs-authentication-fix-use-after-free-in-ubifs-tnc-end-commit.patch
- From: 6.8.0-58.60
- CVE-2024-53173
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://ubuntu.com/security/CVE-2024-53173
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 6.8.0-58.60
- CVE-2024-53174
- Description:
SUNRPC: make sure cache entry active before cache_show
- CVE: https://ubuntu.com/security/CVE-2024-53174
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53174-sunrpc-make-sure-cache-entry-active-before-cache-show.patch
- From: 6.8.0-58.60
- CVE-2024-53185
- Description:
smb: client: fix NULL ptr deref in crypto_aead_setkey()
- CVE: https://ubuntu.com/security/CVE-2024-53185
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53185-smb-client-fix-null-ptr-deref-in-crypto-aead-setkey.patch
- From: 6.8.0-58.60
- CVE-2024-53191
- Description:
wifi: ath12k: fix warning when unbinding
- CVE: https://ubuntu.com/security/CVE-2024-53191
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53191-wifi-ath12k-fix-warning-when-unbinding.patch
- From: 6.8.0-58.60
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 6.8.0-58.60
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix a DMA to stack memory bug
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53197-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch
- From: 6.8.0-58.60
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://ubuntu.com/security/CVE-2024-53203
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53203-usb-typec-fix-potential-array-underflow-in-ucsi-ccg-sync-control.patch
- From: 6.8.0-58.60
- CVE-2024-53208
- Description:
Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync
- CVE: https://ubuntu.com/security/CVE-2024-53208
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53208-bluetooth-mgmt-fix-slab-use-after-free-read-in-set-powered-sync.patch
- From: 6.8.0-58.60
- CVE-2024-53237
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://ubuntu.com/security/CVE-2024-53237
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child.patch
- From: 6.8.0-58.60
- CVE-2024-53227
- Description:
scsi: bfa: Fix use-after-free in bfad_im_module_exit()
- CVE: https://ubuntu.com/security/CVE-2024-53227
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53227-scsi-bfa-fix-use-after-free-in-bfad-im-module-exit.patch
- From: 6.8.0-58.60
- CVE-2024-56538
- Description:
drm: zynqmp_kms: Unplug DRM device before removal
- CVE: https://ubuntu.com/security/CVE-2024-56538
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56538-drm-zynqmp-kms-unplug-drm-device-before-removal-6.8.0-49.49.patch
- From: 6.8.0-58.60
- CVE-2024-53218
- Description:
f2fs: fix race in concurrent f2fs_stop_gc_thread
- CVE: https://ubuntu.com/security/CVE-2024-53218
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53218-f2fs-fix-race-in-concurrent-f2fs-stop-gc-thread-52.53.patch
- From: 6.8.0-58.60
- CVE-2024-53213
- Description:
net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
- CVE: https://ubuntu.com/security/CVE-2024-53213
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53213-net-usb-lan78xx-fix-double-free-issue-with-interrupt-buffer-allocation.patch
- From: 6.8.0-58.60
- CVE-2024-56551
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://ubuntu.com/security/CVE-2024-56551
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 6.8.0-58.60
- CVE-2024-53232
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53232.patch
- From:
- CVE-2024-53228
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53228.patch
- From:
- CVE-2024-50274
- Description:
idpf: avoid vport access in idpf_get_link_ksettings
- CVE: https://ubuntu.com/security/CVE-2024-50274
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50274-idpf-avoid-vport-access-in-idpf-get-link-ksettings.patch
- From: 6.8.0-58.60
- CVE-2024-50274
- Description:
idpf: avoid vport access in idpf_get_link_ksettings
- CVE: https://ubuntu.com/security/CVE-2024-50274
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50274-idpf-avoid-vport-access-in-idpf-get-link-ksettings-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-50221
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-50221.patch
- From:
- CVE-2024-50226
- Description:
cxl/port: Fix use-after-free, permit out-of-order decoder shutdown
- CVE: https://ubuntu.com/security/CVE-2024-50226
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50226-cxl-port-fix-use-after-free-permit-out-of-order-decoder-shutdown.patch
- From: 6.8.0-58.60
- CVE-2024-56606
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56606
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 6.8.0-58.60
- CVE-2024-56608
- Description:
drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'
- CVE: https://ubuntu.com/security/CVE-2024-56608
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56608-drm-amd-display-fix-out-of-bounds-access-in-dcn21-link-encoder-create.patch
- From: 6.8.0-58.60
- CVE-2024-56615
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56615
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 6.8.0-58.60
- CVE-2024-56619
- Description:
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-56619
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56619-nilfs2-fix-potential-out-of-bounds-memory-access-in-nilfs-find-entry.patch
- From: 6.8.0-58.60
- CVE-2024-56626
- Description:
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
- CVE: https://ubuntu.com/security/CVE-2024-56626
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56626-ksmbd-fix-out-of-bounds-write-in-ksmbd-vfs-stream-write.patch
- From: 6.8.0-58.60
- CVE-2024-56631
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://ubuntu.com/security/CVE-2024-56631
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 6.8.0-58.60
- CVE-2024-56635
- Description:
net: avoid potential UAF in default_operstate()
- CVE: https://ubuntu.com/security/CVE-2024-56635
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56635-net-avoid-potential-uaf-in-default-operstate.patch
- From: 6.8.0-58.60
- CVE-2024-56640
- Description:
net/smc: fix LGR and link use-after-free issue
- CVE: https://ubuntu.com/security/CVE-2024-56640
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56640-net-smc-fix-lgr-and-link-use-after-free-issue.patch
- From: 6.8.0-58.60
- CVE-2024-56642
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://ubuntu.com/security/CVE-2024-56642
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 6.8.0-58.60
- CVE-2024-56661
- Description:
tipc: fix NULL deref in cleanup_bearer()
- CVE: https://ubuntu.com/security/CVE-2024-56661
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56661-tipc-fix-NULL-deref-in-cleanup_bearer.patch
- From: 6.8.0-58.60
- CVE-2024-56651
- Description:
can: hi311x: hi3110_can_ist(): fix potential use-after-free
- CVE: https://ubuntu.com/security/CVE-2024-56651
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56651-can-hi311x-hi3110-can-ist-fix-potential-use-after-free.patch
- From: 6.8.0-58.60
- CVE-2024-56765
- Description:
powerpc arch not supported
- CVE:
- Patch: skipped/CVE-2024-56765.patch
- From:
- CVE-2024-56693
- Description:
brd: defer automatic disk creation until module initialization succeeds
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56693-brd-defer-automatic-disk-creation-until-module-initialization-succeeds.patch
- From: 6.8.0-58.60
- CVE-2024-56708
- Description:
EDAC/igen6: Avoid segmentation fault on module unload
- CVE: https://ubuntu.com/security/CVE-2024-56708
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56708-edac-igen6-avoid-segmentation-fault-on-module-unload.patch
- From: 6.8.0-58.60
- CVE-2024-56678
- Description:
powerpc: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-56678.patch
- From:
- CVE-2024-56704
- Description:
9p/xen: fix release of IRQ
- CVE: https://ubuntu.com/security/CVE-2024-56704
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 6.8.0-58.60
- CVE-2024-57850
- Description:
jffs2: Prevent rtime decompress memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-57850
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57850-jffs2-prevent-rtime-decompress-memory-corruption.patch
- From: 6.8.0-58.60
- CVE-2024-57850
- Description:
jffs2: Fix rtime decompressor
- CVE: https://ubuntu.com/security/CVE-2024-57850
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57850-jffs2-Fix-rtime-decompressor.patch
- From: 6.8.0-58.60
- CVE-2024-56772
- Description:
kunit: string-stream: Fix a UAF bug in kunit_init_suite()
- CVE: https://ubuntu.com/security/CVE-2024-56772
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56772-kunit-string-stream-fix-a-uaf-bug-in-kunit-init-suite.patch
- From: 6.8.0-58.60
- CVE-2024-56775
- Description:
drm/amd/display: Fix handling of plane refcount
- CVE: https://ubuntu.com/security/CVE-2024-56775
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56775-drm-amd-display-fix-handling-of-plane-refcount.patch
- From: 6.8.0-58.60
- CVE-2025-21700
- Description:
net: sched: Disallow replacing of child qdisc from one parent to another
- CVE: https://ubuntu.com/security/CVE-2025-21700
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2025-21700-net-sched-disallow-replacing-of-child-qdisc-from-one-parent-to-another.patch
- From: 6.8.0-58.60
- CVE-2024-50115
- Description:
KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
- CVE: https://ubuntu.com/security/CVE-2024-50115
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50115-kvm-nsvm-ignore-ncr3-4-0-when-loading-pdptes-from-memory.patch
- From: 6.8.0-58.60
- CVE-2024-50250
- Description:
iomap: improve shared block detection in iomap_unshare_iter
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-iomap-improve-shared-block-detection-in-iomap_unshare_iter.patch
- From: 6.8.0-58.60
- CVE-2024-50250
- Description:
iomap: don't bother unsharing delalloc extents
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-iomap-don-t-bother-unsharing-delalloc-extents.patch
- From: 6.8.0-58.60
- CVE-2024-50250
- Description:
iomap: share iomap_unshare_iter predicate code with fsdax
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-iomap-share-iomap_unshare_iter-predicate-code-with-fsdax.patch
- From: 6.8.0-58.60
- CVE-2024-50250
- Description:
fsdax: remove zeroing code from dax_unshare_iter
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-fsdax-remove-zeroing-code-from-dax_unshare_iter.patch
- From: 6.8.0-58.60
- CVE-2024-50250
- Description:
fsdax: dax_unshare_iter needs to copy entire blocks
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-fsdax-dax-unshare-iter-needs-to-copy-entire-blocks.patch
- From: 6.8.0-58.60
- CVE-2024-50247
- Description:
fs/ntfs3: Check if more than chunk-size bytes are written
- CVE: https://ubuntu.com/security/CVE-2024-50247
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50247-fs-ntfs3-check-if-more-than-chunk-size-bytes-are-written.patch
- From: 6.8.0-58.60
- CVE-2024-50278
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_bit-when-resizing.patch
- From: 6.8.0-58.60
- CVE-2024-50278
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 6.8.0-58.60
- CVE-2024-50268
- Description:
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-50268
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50268-usb-typec-fix-potential-out-of-bounds-in-ucsi-ccg-update-set-new-cam-cmd.patch
- From: 6.8.0-58.60
- CVE-2024-41014
- Description:
xfs: add bounds checking to xlog_recover_process_data
- CVE: https://ubuntu.com/security/CVE-2024-41014
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-41014-xfs-add-bounds-checking-to-xlog-recover-process-data.patch
- From: 6.8.0-58.60
- CVE-2024-50128
- Description:
net: wwan: fix global oob in wwan_rtnl_policy
- CVE: https://ubuntu.com/security/CVE-2024-50128
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50128-net-wwan-fix-global-oob-in-wwan-rtnl-policy.patch
- From: 6.8.0-58.60
- CVE-2024-50128
- Description:
net: wwan: fix global oob in wwan_rtnl_policy
- CVE: https://ubuntu.com/security/CVE-2024-50128
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50128-net-wwan-fix-global-oob-in-wwan-rtnl-policy-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53239-alsa-6fire-release-resources-at-card-release.patch
- From: 6.8.0-58.60
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53239-alsa-6fire-release-resources-at-card-release-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-56548
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times.patch
- From: 6.8.0-58.60
- CVE-2024-56548
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-53177
- Description:
smb: prevent use-after-free due to open_cached_dir error paths
- CVE: https://ubuntu.com/security/CVE-2024-53177
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53177-smb-prevent-use-after-free-due-to-open_cached_dir-er.patch
- From: 6.8.0-58.60
- CVE-2024-53177
- Description:
smb: prevent use-after-free due to open_cached_dir error paths
- CVE: https://ubuntu.com/security/CVE-2024-53177
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53177-smb-prevent-use-after-free-due-to-open_cached_dir-er-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-56600
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://ubuntu.com/security/CVE-2024-56600
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 6.8.0-58.60
- CVE-2024-56581
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://ubuntu.com/security/CVE-2024-56581
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 6.8.0-58.60
- CVE-2024-56558
- Description:
nfsd: make sure exp active before svc_export_show
- CVE: https://ubuntu.com/security/CVE-2024-56558
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56558-nfsd-make-sure-exp-active-before-svc-export-show.patch
- From: 6.8.0-58.60
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://ubuntu.com/security/CVE-2024-56605
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 6.8.0-58.60
- CVE-2024-58009
- Description:
Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc
- CVE: https://ubuntu.com/security/CVE-2024-58009
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-58009-bluetooth-l2cap-handle-null-sock-pointer-in-l2cap.patch
- From: 6.8.0-58.60
- CVE-2024-56604
- Description:
Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()
- CVE: https://ubuntu.com/security/CVE-2024-56604
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56604-bluetooth-rfcomm-avoid-leaving-dangling-sk-pointer-in-rfcomm-sock-alloc.patch
- From: 6.8.0-58.60
- CVE-2024-56603
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://ubuntu.com/security/CVE-2024-56603
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 6.8.0-58.60
- CVE-2024-56602
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://ubuntu.com/security/CVE-2024-56602
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 6.8.0-58.60
- CVE-2024-56601
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56601
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 6.8.0-58.60
- CVE-2024-56596
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://ubuntu.com/security/CVE-2024-56596
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 6.8.0-58.60
- CVE-2024-50130
- Description:
netfilter: bpf: must hold reference on net namespace
- CVE: https://ubuntu.com/security/CVE-2024-50130
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50130-netfilter-bpf-must-hold-reference-on-net-namespace.patch
- From: 6.8.0-58.60
- CVE-2024-50130
- Description:
netfilter: bpf: must hold reference on net namespace kpatch
- CVE: https://ubuntu.com/security/CVE-2024-50130
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50130-netfilter-bpf-must-hold-reference-on-net-namespace-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-50251
- Description:
netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
- CVE: https://ubuntu.com/security/CVE-2024-50251
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50251-netfilter-nft-payload-sanitize-offset-and-length-before-calling-skb-checksum.patch
- From: 6.8.0-58.60
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch-noble.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-44955
- Description:
drm/amd/display: Don't refer to dc_sink in is_dsc_need_re_compute
- CVE: https://ubuntu.com/security/CVE-2024-44955
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-44955-drm-amd-display-don-t-refer-to-dc-sink-in-is-dsc-need-re-compute.patch
- From: 6.8.0-58.60
- CVE-2024-42122
- Description:
drm/amd/display: Add NULL pointer check for kzalloc
- CVE: https://ubuntu.com/security/CVE-2024-42122
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-42122-drm-amd-display-add-null-pointer-check-for-kzalloc.patch
- From: 6.8.0-58.60
- CVE-2022-49034
- Description:
Out of scope: SuperH arch not supported.
- CVE:
- Patch: skipped/CVE-2022-49034.patch
- From:
- CVE-2024-57874
- Description:
arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL
- CVE: https://ubuntu.com/security/CVE-2024-57874
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57874-arm64-ptrace-fix-partial-setregset-for-nt-arm-tagged-addr-ctrl.patch
- From: 6.8.0-58.60
- CVE-2024-45828
- Description:
i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request
- CVE: https://ubuntu.com/security/CVE-2024-45828
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-45828-i3c-mipi-i3c-hci-mask-ring-interrupts-before-ring-stop-request.patch
- From: 6.8.0-58.60
- CVE-2024-43098
- Description:
i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock
- CVE: https://ubuntu.com/security/CVE-2024-43098
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-43098-i3c-use-i3cdev-desc-info-instead-of-calling-i3c-device-get-info-to-avoid-deadlock.patch
- From: 6.8.0-58.60
- CVE-2024-41935
- Description:
f2fs: fix to shrink read extent node in batches
- CVE: https://ubuntu.com/security/CVE-2024-41935
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-41935-f2fs-fix-to-shrink-read-extent-node-in-batches.patch
- From: 6.8.0-58.60
- CVE-2024-41932
- Description:
sched: fix warning in sched_setaffinity
- CVE: https://ubuntu.com/security/CVE-2024-41932
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-41932-sched-fix-warning-in-sched-setaffinity.patch
- From: 6.8.0-58.60
- CVE-2024-56644
- Description:
net/ipv6: release expired exception dst cached in socket
- CVE: https://ubuntu.com/security/CVE-2024-56644
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56644-net-ipv6-release-expired-exception-dst-cached-in-socket.patch
- From: 6.8.0-58.60
- CVE-2024-56664
- Description:
Revert "bpf, sockmap: Prevent lock inversion deadlock in map delete elem"
- CVE: https://ubuntu.com/security/CVE-2024-56664
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56664-revert-bpf-sockmap-prevent-lock-inversion-deadlock-in-map-delete-elem-6.8.0-49.49.patch
- From: 6.8.0-60.63
- CVE-2024-56664
- Description:
bpf, sockmap: Fix race between element replace and close()
- CVE: https://ubuntu.com/security/CVE-2024-56664
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56664-bpf-sockmap-fix-race-between-element-replace-and-close.patch
- From: 6.8.0-60.63
- CVE-2024-56662
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://ubuntu.com/security/CVE-2024-56662
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi-nfit-ctl.patch
- From: 6.8.0-60.63
- CVE-2024-57900
- Description:
Complex adaptation required
- CVE:
- Patch: skipped/CVE-2024-57900.patch
- From:
- CVE-2025-21652
- Description:
ipvlan: Fix use-after-free in ipvlan_get_iflink().
- CVE: https://ubuntu.com/security/CVE-2025-21652
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2025-21652-ipvlan-fix-use-after-free-in-ipvlan-get-iflink.patch
- From: 6.8.0-60.63
- CVE-2024-57926
- Description:
drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err
- CVE: https://ubuntu.com/security/CVE-2024-57926
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57926-drm-mediatek-set-private-all-drm-private-i-drm-to-null-if-mtk-drm-bind-returns-err.patch
- From: 6.8.0-60.63
- CVE-2024-57925
- Description:
ksmbd: fix a missing return value check bug
- CVE: https://ubuntu.com/security/CVE-2024-57925
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57925-ksmbd-fix-a-missing-return-value-check-bug.patch
- From: 6.8.0-60.63
- CVE-2024-57912
- Description:
iio: pressure: zpa2326: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57912
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57912-iio-pressure-zpa2326-fix-information-leak-in-triggered-buffer.patch
- From: 6.8.0-60.63
- CVE-2024-57911
- Description:
iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57911
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57911-iio-dummy-iio-simply-dummy-buffer-fix-information-leak-in-triggered-buffer.patch
- From: 6.8.0-60.63
- CVE-2024-57910
- Description:
iio: light: vcnl4035: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57910
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57910-iio-light-vcnl4035-fix-information-leak-in-triggered-buffer.patch
- From: 6.8.0-60.63
- CVE-2024-57908
- Description:
iio: imu: kmx61: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57908
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57908-iio-imu-kmx61-fix-information-leak-in-triggered-buffer.patch
- From: 6.8.0-60.63
- CVE-2024-57907
- Description:
iio: adc: rockchip_saradc: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57907
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57907-iio-adc-rockchip-saradc-fix-information-leak-in-triggered-buffer.patch
- From: 6.8.0-60.63
- CVE-2024-57906
- Description:
iio: adc: ti-ads8688: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57906
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57906-iio-adc-ti-ads8688-fix-information-leak-in-triggered-buffer.patch
- From: 6.8.0-60.63
- CVE-2025-21650
- Description:
net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue
- CVE: https://ubuntu.com/security/CVE-2025-21650
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2025-21650-net-hns3-fixed-hclge-fetch-pf-reg-accesses-bar-space-out-of-bounds-issue.patch
- From: 6.8.0-60.63
- CVE-2024-56675
- Description:
bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors
- CVE: https://ubuntu.com/security/CVE-2024-56675
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56675-bpf-fix-uaf-via-mismatching-bpf-prog-attachment-rcu-flavors.patch
- From: 6.8.0-60.63
- CVE-2024-58087
- Description:
ksmbd: fix racy issue from session lookup and expire
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-58087-ksmbd-fix-racy-issue-from-session-lookup-and-expire.patch
- From: 6.8.0-60.63
- CVE-2024-56652
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2024-56652.patch
- From:
- CVE-2024-56764
- Description:
ublk: detach gendisk from ublk device if add_disk() fails
- CVE: https://ubuntu.com/security/CVE-2024-56764
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56764-ublk-detach-gendisk-from-ublk-device-if-add-disk-fails.patch
- From: 6.8.0-60.63
- CVE-2024-56759
- Description:
btrfs: fix use-after-free when COWing tree bock and tracing is enabled
- CVE: https://ubuntu.com/security/CVE-2024-56759
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56759-btrfs-fix-use-after-free-when-cowing-tree-bock-and-tracing-is-enabled-6.8.0-49.49.patch
- From: 6.8.0-60.63
- CVE-2024-53179
- Description:
smb: client: fix use-after-free of signing key
- CVE: https://ubuntu.com/security/CVE-2024-53179
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-53179-smb-client-fix-use-after-free-of-signing-key-6.8.0-59.61.patch
- From: 6.8.0-60.63
- CVE-2024-57801
- Description:
net/mlx5e: Skip restore TC rules for vport rep without loaded flag
- CVE: https://ubuntu.com/security/CVE-2024-57801
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57801-net-mlx5e-skip-restore-tc-rules-for-vport-rep-without-loaded-flag.patch
- From: 6.8.0-60.63
- CVE-2024-57892
- Description:
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
- CVE: https://ubuntu.com/security/CVE-2024-57892
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57892-ocfs2-fix-slab-use-after-free-due-to-dangling-pointer-dqi-priv.patch
- From: 6.8.0-60.63
- CVE-2024-57887
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57887.patch
- From:
- CVE-2025-21683
- Description:
bpf: Fix bpf_sk_select_reuseport() memory leak
- CVE: https://ubuntu.com/security/CVE-2025-21683
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21683-bpf-fix-bpf-sk-select-reuseport-memory-leak.patch
- From: 6.8.0-62.65
- CVE-2025-21681
- Description:
openvswitch: fix lockup on tx to unregistering netdev with carrier
- CVE: https://ubuntu.com/security/CVE-2025-21681
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21681-openvswitch-fix-lockup-on-tx-to-unregistering-netdev-with-carrier.patch
- From: 6.8.0-62.65
- CVE-2025-21680
- Description:
pktgen: Avoid out-of-bounds access in get_imix_entries
- CVE: https://ubuntu.com/security/CVE-2025-21680
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21680-pktgen-avoid-out-of-bounds-access-in-get-imix-entries.patch
- From: 6.8.0-62.65
- CVE-2025-21676
- Description:
net: fec: handle page_pool_dev_alloc_pages error
- CVE: https://ubuntu.com/security/CVE-2025-21676
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21676-net-fec-handle-page-pool-dev-alloc-pages-error.patch
- From: 6.8.0-62.65
- CVE-2025-21675
- Description:
net/mlx5: Clear port select structure when fail to create
- CVE: https://ubuntu.com/security/CVE-2025-21675
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21675-net-mlx5-clear-port-select-structure-when-fail-to-create.patch
- From: 6.8.0-62.65
- CVE-2025-21674
- Description:
net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel
- CVE: https://ubuntu.com/security/CVE-2025-21674
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21674-net-mlx5e-fix-inversion-dependency-warning-while-enabling-ipsec-tunnel.patch
- From: 6.8.0-62.65
- CVE-2025-21697
- Description:
drm/v3d: Ensure job pointer is set to NULL after job completion
- CVE: https://ubuntu.com/security/CVE-2025-21697
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21697-drm-v3d-ensure-job-pointer-is-set-to-null-after-job-completion.patch
- From: 6.8.0-62.65
- CVE-2025-21665
- Description:
filemap: avoid truncating 64-bit offset to 32 bits
- CVE: https://ubuntu.com/security/CVE-2025-21665
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21665-filemap-avoid-truncating-64-bit-offset-to-32-bits.patch
- From: 6.8.0-62.65
- CVE-2025-21692
- Description:
net: sched: fix ets qdisc OOB Indexing
- CVE: https://ubuntu.com/security/CVE-2025-21692
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21692-net-sched-fix-ets-qdisc-oob-indexing.patch
- From: 6.8.0-62.65
- CVE-2025-21691
- Description:
cachestat: fix page cache statistics permission checking
- CVE: https://ubuntu.com/security/CVE-2025-21691
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21691-cachestat-fix-page-cache-statistics-permission-checking.patch
- From: 6.8.0-62.65
- CVE-2024-57951
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://ubuntu.com/security/CVE-2024-57951
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2024-57951-hrtimers-handle-cpu-state-correctly-on-hotplug.patch
- From: 6.8.0-62.65
- CVE-2024-57951
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://ubuntu.com/security/CVE-2024-57951
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2024-57951-hrtimers-handle-cpu-state-correctly-on-hotplug-kpatch.patch
- From: 6.8.0-62.65
- CVE-2024-57948
- Description:
mac802154: check local interfaces before deleting sdata list
- CVE: https://ubuntu.com/security/CVE-2024-57948
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2024-57948-mac802154-check-local-interfaces-before-deleting-sdata-list.patch
- From: 6.8.0-62.65
- CVE-2025-21667
- Description:
iomap: avoid avoid truncating 64-bit offset to 32 bits
- CVE: https://ubuntu.com/security/CVE-2025-21667
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21667-iomap-avoid-avoid-truncating-64-bit-offset-to-32-bits.patch
- From: 6.8.0-62.65
- CVE-2025-21670
- Description:
vsock/bpf: return early if transport is not assigned
- CVE: https://ubuntu.com/security/CVE-2025-21670
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21670-vsock-bpf-return-early-if-transport-is-not-assigned.patch
- From: 6.8.0-62.65
- CVE-2025-21669
- Description:
vsock/virtio: discard packets if the transport changes
- CVE: https://ubuntu.com/security/CVE-2025-21669
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21669-vsock-virtio-discard-packets-if-the-transport-changes.patch
- From: 6.8.0-62.65
- CVE-2025-21666
- Description:
vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
- CVE: https://ubuntu.com/security/CVE-2025-21666
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21666-vsock-prevent-null-ptr-deref-in-vsock-has-data-has-space.patch
- From: 6.8.0-62.65
- CVE-2025-21694
- Description:
fs/proc: fix softlockup in __read_vmcore
- CVE: https://ubuntu.com/security/CVE-2025-21694
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21694-fs-proc-fix-softlockup-in-read-vmcore.patch
- From: 6.8.0-62.65
- CVE-2025-21694
- Description:
fs/proc: fix softlockup in __read_vmcore (part 2)
- CVE: https://ubuntu.com/security/CVE-2025-21694
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21694-fs-proc-fix-softlockup-in-read-vmcore-part-2.patch
- From: 6.8.0-62.65
- CVE-2025-21668
- Description:
Out of scope as the patch is for i.MX SoC
- CVE:
- Patch: skipped/CVE-2025-21668.patch
- From:
- CVE-2024-57949
- Description:
Patch is on ARM64 architecture, which this distro does not support.
- CVE:
- Patch: skipped/CVE-2024-57949.patch
- From:
- CVE-2024-57924
- Description:
fs: relax assertions on failure to encode file handles
- CVE: https://ubuntu.com/security/CVE-2024-57924
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2024-57924-fs-relax-assertions-on-failure-to-encode-file-handles.patch
- From: 6.8.0-62.65
- CVE-2024-53124
- Description:
net: fix data-races around sk->sk_forward_alloc
- CVE: https://ubuntu.com/security/CVE-2024-53124
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2024-53124-net-fix-data-races-around-sk-sk-forward-alloc.patch
- From: 6.8.0-62.65
- CVE-2025-22088
- Description:
RDMA/erdma: Prevent use-after-free in erdma_accept_newconn()
- CVE: https://ubuntu.com/security/CVE-2025-22088
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-22088-rdma-erdma-prevent-use-after-free-in-erdma-accept-newconn.patch
- From: 6.8.0-63.66
- CVE-2025-37932
- Description:
sch_htb: make htb_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37932
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37932-sch-htb-make-htb-qlen-notify-idempotent.patch
- From: 6.8.0-63.66
- CVE-2025-37997
- Description:
netfilter: ipset: fix region locking in hash types
- CVE: https://ubuntu.com/security/CVE-2025-37997
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37997-netfilter-ipset-fix-region-locking-in-hash-types.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-codel-remove-sch-q-qlen-check-before-qdisc-tree-reduce-backlog.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
sch_htb: make htb_deactivate() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-sch-htb-make-htb-deactivate-idempotent.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
sch_drr: make drr_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-sch-drr-make-drr-qlen-notify-idempotent.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
sch_hfsc: make hfsc_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-sch-hfsc-make-hfsc-qlen-notify-idempotent.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
sch_qfq: make qfq_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-sch-qfq-make-qfq-qlen-notify-idempotent.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
sch_qfq: make qfq_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-sch-qfq-make-qfq-qlen-notify-idempotent-kpatch.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
sch_ets: make est_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-sch-ets-make-est-qlen-notify-idempotent.patch
- From: 6.8.0-63.66
- CVE-2025-37890
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37890
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37890-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-with-netem-as-child-qdisc.patch
- From: 6.8.0-63.66
- CVE-2025-38000
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://ubuntu.com/security/CVE-2025-38000
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-38000-sch-hfsc-fix-qlen-accounting-bug-when-using-peek-in-hfsc-enqueue.patch
- From: 6.8.0-63.66
- CVE-2025-38001
- Description:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
- CVE: https://ubuntu.com/security/CVE-2025-38001
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-38001-net-sched-hfsc-address-reentrant-enqueue-adding-class-to-eltree-twice.patch
- From: 6.8.0-63.66
- CVE-2025-21731
- Description:
nbd: don't allow reconnect after disconnect
- CVE: https://ubuntu.com/security/CVE-2025-21731
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21731-nbd-don-t-allow-reconnect-after-disconnect.patch
- From: 6.8.0-64.67
- CVE-2024-57996
- Description:
net_sched: sch_sfq: don't allow 1 packet limit
- CVE: https://ubuntu.com/security/CVE-2024-57996
- Patch: ubuntu-noble/6.8.0-79.79/CVE-2024-57996-net_sched-sch_sfq-don-t-allow-1-packet-limit.patch
- From: 6.8.0-79.79
- CVE-2025-21812
- Description:
ax25: rcu protect dev->ax25_ptr
- CVE: https://ubuntu.com/security/CVE-2025-21812
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21812-ax25-rcu-protect-dev-ax25-ptr.patch
- From: 6.8.0-64.67
- CVE-2025-21812
- Description:
ax25: rcu protect dev->ax25_ptr
- CVE: https://ubuntu.com/security/CVE-2025-21812
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21812-ax25-rcu-protect-dev-ax25-ptr-kpatch-6.8.0-41.41.patch
- From: 6.8.0-64.67
- CVE-2025-21727
- Description:
padata: fix UAF in padata_reorder
- CVE: https://ubuntu.com/security/CVE-2025-21727
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21727-padata-fix-uaf-in-padata-reorder.patch
- From: 6.8.0-64.67
- CVE-2025-21726
- Description:
padata: add pd get/put refcnt helper
- CVE: https://ubuntu.com/security/CVE-2025-21726
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21726-padata-add-pd-get-put-refcnt-helper.patch
- From: 6.8.0-64.67
- CVE-2025-21726
- Description:
padata: avoid UAF for reorder_work
- CVE: https://ubuntu.com/security/CVE-2025-21726
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21726-padata-avoid-uaf-for-reorder-work.patch
- From: 6.8.0-64.67
- CVE-2024-58034
- Description:
memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code()
- CVE: https://ubuntu.com/security/CVE-2024-58034
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58034-memory-tegra20-emc-fix-an-of-node-reference-bug-in-tegra-emc-find-node-by-ram-code.patch
- From: 6.8.0-64.67
- CVE-2024-57984
- Description:
Hot-join not supported
- CVE:
- Patch: skipped/CVE-2024-57984.patch
- From:
- CVE-2025-21811
- Description:
nilfs2: protect access to buffers with no active references
- CVE: https://ubuntu.com/security/CVE-2025-21811
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21811-nilfs2-protect-access-to-buffers-with-no-active-references.patch
- From: 6.8.0-64.67
- CVE-2024-58069
- Description:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
- CVE: https://ubuntu.com/security/CVE-2024-58069
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58069-rtc-pcf85063-fix-potential-oob-write-in-pcf85063-nvmem-read.patch
- From: 6.8.0-64.67
- CVE-2025-21718
- Description:
net: rose: fix timer races against user threads
- CVE: https://ubuntu.com/security/CVE-2025-21718
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21718-net-rose-fix-timer-races-against-user-threads.patch
- From: 6.8.0-64.67
- CVE-2025-21715
- Description:
net: davicom: fix UAF in dm9000_drv_remove
- CVE: https://ubuntu.com/security/CVE-2025-21715
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21715-net-davicom-fix-uaf-in-dm9000-drv-remove.patch
- From: 6.8.0-64.67
- CVE-2024-57980
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://ubuntu.com/security/CVE-2024-57980
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 6.8.0-64.67
- CVE-2024-57979
- Description:
PPS for embedded GPS devices. Irrelevant for servers.
- CVE:
- Patch: skipped/CVE-2024-57979.patch
- From:
- CVE-2024-58055
- Description:
usb: gadget: f_tcm: Don't free command immediately
- CVE: https://ubuntu.com/security/CVE-2024-58055
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58055-usb-gadget-f-tcm-don-t-free-command-immediately.patch
- From: 6.8.0-64.67
- CVE-2024-57990
- Description:
wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc
- CVE: https://ubuntu.com/security/CVE-2024-57990
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-57990-wifi-mt76-mt7925-fix-a-potential-array-index-out-of-bounds-issue-for-clc.patch
- From: 6.8.0-64.67
- CVE-2024-57990
- Description:
wifi: mt76: mt7925: fix off by one in mt7925_load_clc()
- CVE: https://ubuntu.com/security/CVE-2024-57990
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-57990-wifi-mt76-mt7925-fix-off-by-one-in-mt7925-load-clc.patch
- From: 6.8.0-64.67
- CVE-2025-21722
- Description:
nilfs2: do not force clear folio if buffer is referenced
- CVE: https://ubuntu.com/security/CVE-2025-21722
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21722-nilfs2-do-not-force-clear-folio-if-buffer-is-referenced-6.8.0-57.59.patch
- From: 6.8.0-64.67
- CVE-2024-57982
- Description:
xfrm: state: fix out-of-bounds read during lookup
- CVE: https://ubuntu.com/security/CVE-2024-57982
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-57982-xfrm-state-fix-out-of-bounds-read-during-lookup.patch
- From: 6.8.0-64.67
- CVE-2025-21714
- Description:
RDMA/mlx5: Fix implicit ODP use after free
- CVE: https://ubuntu.com/security/CVE-2025-21714
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21714-rdma-mlx5-fix-implicit-odp-use-after-free.patch
- From: 6.8.0-64.67
- CVE-2025-21753
- Description:
btrfs: fix use-after-free when attempting to join an aborted transaction
- CVE: https://ubuntu.com/security/CVE-2025-21753
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21753-btrfs-fix-use-after-free-when-attempting-to-join-an-aborted-transaction.patch
- From: 6.8.0-64.67
- CVE-2024-58013
- Description:
Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync
- CVE: https://ubuntu.com/security/CVE-2024-58013
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58013-bluetooth-mgmt-fix-slab-use-after-free-read-in-mgmt-remove-adv-monitor-sync.patch
- From: 6.8.0-64.67
- CVE-2024-58083
- Description:
KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- CVE: https://ubuntu.com/security/CVE-2024-58083
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58083-kvm-explicitly-verify-target-vcpu-is-online-in-kvm-get-vcpu.patch
- From: 6.8.0-64.67
- CVE-2025-21743
- Description:
usbnet: ipheth: fix possible overflow in DPE length check
- CVE: https://ubuntu.com/security/CVE-2025-21743
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21743-usbnet-ipheth-fix-possible-overflow-in-dpe-length-check.patch
- From: 6.8.0-64.67
- CVE-2025-21742
- Description:
usbnet: ipheth: use static NDP16 location in URB
- CVE: https://ubuntu.com/security/CVE-2025-21742
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21742-usbnet-ipheth-use-static-ndp16-location-in-urb.patch
- From: 6.8.0-64.67
- CVE-2024-58007
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-58007.patch
- From:
- CVE-2024-58079
- Description:
media: uvcvideo: Fix crash during unbind if gpio unit is in use
- CVE: https://ubuntu.com/security/CVE-2024-58079
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58079-media-uvcvideo-fix-crash-during-unbind-if-gpio-unit-is-in-use-6.8.0-57.59.patch
- From: 6.8.0-64.67
- CVE-2024-58079
- Description:
media: uvcvideo: Fix crash during unbind if gpio unit is in use (kpatch adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-58079
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58079-media-uvcvideo-fix-crash-during-unbind-if-gpio-unit-is-in-use-kpatch-6.8.0-57.59.patch
- From: 6.8.0-64.67
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58002-media-uvcvideo-Only-save-async-fh-if-success.patch
- From: 6.8.0-64.67
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers.patch
- From: 6.8.0-64.67
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-kpatch.patch
- From: 6.8.0-64.67
- CVE-2025-21735
- Description:
NFC: nci: Add bounds checking in nci_hci_create_pipe()
- CVE: https://ubuntu.com/security/CVE-2025-21735
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21735-nfc-nci-add-bounds-checking-in-nci-hci-create-pipe.patch
- From: 6.8.0-64.67
- CVE-2025-21732
- Description:
RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error
- CVE: https://ubuntu.com/security/CVE-2025-21732
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21732-rdma-mlx5-fix-a-race-for-an-odp-mr-which-leads-to-cqe-with-error-52.patch
- From: 6.8.0-64.67
- CVE-2025-37974
- Description:
unsupported_arch_s390
- CVE:
- Patch: skipped/CVE-2025-37974.patch
- From:
- CVE-2025-37797
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class handling
- CVE: https://ubuntu.com/security/CVE-2025-37797
- Patch: ubuntu-noble/6.8.0-71.71/CVE-2025-37797-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-handling.patch
- From: 6.8.0-71.71
- CVE-2025-38083
- Description:
net_sched: prio: fix a race in prio_tune()
- CVE: https://ubuntu.com/security/CVE-2025-38083
- Patch: ubuntu-noble/6.8.0-71.71/CVE-2025-38083-net-sched-prio-fix-a-race-in-prio-tune.patch
- From: 6.8.0-71.71
- CVE-2025-21796
- Description:
nfsd: clear acl_access/acl_default after releasing them
- CVE: https://ubuntu.com/security/CVE-2025-21796
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21796-nfsd-clear-acl-access-acl-default-after-releasing-them.patch
- From: 6.8.0-78.78
- CVE-2025-21791
- Description:
vrf: use RCU protection in l3mdev_l3_out()
- CVE: https://ubuntu.com/security/CVE-2025-21791
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21791-vrf-use-rcu-protection-in-l3mdev-l3-out.patch
- From: 6.8.0-78.78
- CVE-2025-21785
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2024-57834
- Description:
media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread
- CVE: https://ubuntu.com/security/CVE-2024-57834
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2024-57834-media-vidtv-fix-a-null-ptr-deref-in-vidtv-mux-stop-thread.patch
- From: 6.8.0-78.78
- CVE-2024-54458
- Description:
scsi: ufs: bsg: Set bsg_queue to NULL after removal
- CVE: https://ubuntu.com/security/CVE-2024-54458
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2024-54458-scsi-ufs-bsg-set-bsg-queue-to-null-after-removal.patch
- From: 6.8.0-78.78
- CVE-2024-54456
- Description:
NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client()
- CVE: https://ubuntu.com/security/CVE-2024-54456
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2024-54456-nfs-fix-potential-buffer-overflowin-nfs-sysfs-link-rpc-client.patch
- From: 6.8.0-78.78
- CVE-2025-21782
- Description:
orangefs: fix a oob in orangefs_debug_write
- CVE: https://ubuntu.com/security/CVE-2025-21782
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21782-orangefs-fix-a-oob-in-orangefs-debug-write.patch
- From: 6.8.0-78.78
- CVE-2025-21780
- Description:
drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
- CVE: https://ubuntu.com/security/CVE-2025-21780
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21780-drm-amdgpu-avoid-buffer-overflow-attach-in-smu-sys-set-pp-table.patch
- From: 6.8.0-78.78
- CVE-2025-21772
- Description:
partitions: mac: fix handling of bogus partition table
- CVE: https://ubuntu.com/security/CVE-2025-21772
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21772-partitions-mac-fix-handling-of-bogus-partition-table.patch
- From: 6.8.0-78.78
- CVE-2025-21767
- Description:
clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context
- CVE: https://ubuntu.com/security/CVE-2025-21767
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21767-clocksource-use-migrate-disable-to-avoid-calling-get-random-u32-in-atomic-context.patch
- From: 6.8.0-78.78
- CVE-2025-21767
- Description:
clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context kpatch
- CVE: https://ubuntu.com/security/CVE-2025-21767
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21767-clocksource-use-migrate-disable-to-avoid-calling-get-random-u32-in-atomic-context-kpatch.patch
- From: 6.8.0-78.78
- CVE-2025-21764
- Description:
ndisc: use RCU protection in ndisc_alloc_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21764
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21764-ndisc-use-rcu-protection-in-ndisc-alloc-skb.patch
- From: 6.8.0-78.78
- CVE-2025-21763
- Description:
neighbour: use RCU protection in __neigh_notify()
- CVE: https://ubuntu.com/security/CVE-2025-21763
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21763-neighbour-use-rcu-protection-in-neigh-notify.patch
- From: 6.8.0-78.78
- CVE-2025-21762
- Description:
net: add dev_net_rcu() helper
- CVE: https://ubuntu.com/security/CVE-2025-21762
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21762-0001-net-add-dev_net_rcu-helper.patch
- From: 6.8.0-78.78
- CVE-2025-21762
- Description:
arp: use RCU protection in arp_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-21762
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21762-arp-use-rcu-protection-in-arp-xmit.patch
- From: 6.8.0-78.78
- CVE-2025-21761
- Description:
openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
- CVE: https://ubuntu.com/security/CVE-2025-21761
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21761-openvswitch-use-rcu-protection-in-ovs-vport-cmd-fill-info.patch
- From: 6.8.0-78.78
- CVE-2025-21760
- Description:
ndisc: extend RCU protection in ndisc_send_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21760
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21760-ndisc-extend-rcu-protection-in-ndisc-send-skb.patch
- From: 6.8.0-78.78
- CVE-2025-21759
- Description:
ipv6: mcast: extend RCU protection in igmp6_send()
- CVE: https://ubuntu.com/security/CVE-2025-21759
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21759-ipv6-mcast-extend-rcu-protection-in-igmp6-send.patch
- From: 6.8.0-78.78
- CVE-2025-21758
- Description:
ipv6: mcast: add RCU protection to mld_newpack()
- CVE: https://ubuntu.com/security/CVE-2025-21758
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21758-ipv6-mcast-add-rcu-protection-to-mld-newpack.patch
- From: 6.8.0-78.78
- CVE-2025-21836
- Description:
io_uring/kbuf: reallocate buf lists on upgrade
- CVE: https://ubuntu.com/security/CVE-2025-21836
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21836-io-uring-kbuf-reallocate-buf-lists-on-upgrade.patch
- From: 6.8.0-78.78
- CVE-2025-21838
- Description:
usb: gadget: core: flush gadget workqueue after device removal
- CVE: https://ubuntu.com/security/CVE-2025-21838
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21838-usb-gadget-core-flush-gadget-workqueue-after-device-removal.patch
- From: 6.8.0-78.78
- CVE-2025-21858
- Description:
geneve: Fix use-after-free in geneve_find_dev().
- CVE: https://ubuntu.com/security/CVE-2025-21858
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21858-geneve-fix-use-after-free-in-geneve-find-dev.patch
- From: 6.8.0-78.78
- CVE-2025-21856
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21856.patch
- From:
- CVE-2025-21855
- Description:
ibmvnic: Don't reference skb after sending to VIOS
- CVE: https://ubuntu.com/security/CVE-2025-21855
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21855-ibmvnic-don-t-reference-skb-after-sending-to-vios.patch
- From: 6.8.0-78.78
- CVE-2025-21867
- Description:
bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
- CVE: https://ubuntu.com/security/CVE-2025-21867
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21867-bpf-test-run-fix-use-after-free-issue-in-eth-skb-pkt-type.patch
- From: 6.8.0-78.78
- CVE-2025-21863
- Description:
io_uring: prevent opcode speculation
- CVE: https://ubuntu.com/security/CVE-2025-21863
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21863-io-uring-prevent-opcode-speculation.patch
- From: 6.8.0-78.78
- CVE-2025-21887
- Description:
ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up
- CVE: https://ubuntu.com/security/CVE-2025-21887
- Patch: ubuntu-noble/6.8.0-79.79/CVE-2025-21887-ovl-fix-uaf-in-ovl-dentry-update-reval-by-moving-dput-in-ovl-link-up.patch
- From: 6.8.0-79.79
- CVE-2025-38350
- Description:
net/sched: Always pass notifications when child class becomes empty
- CVE: https://ubuntu.com/security/CVE-2025-38350
- Patch: ubuntu-noble/6.8.0-79.79/CVE-2025-38350-net-sched-always-pass-notifications-when-child-class-becomes-empty.patch
- From: 6.8.0-79.79
- CVE-2025-37752
- Description:
net_sched: sch_sfq: move the limit validation
- CVE: https://ubuntu.com/security/CVE-2025-37752
- Patch: ubuntu-noble/6.8.0-79.79/CVE-2025-37752-net-sched-sch-sfq-move-the-limit-validation-63.66.patch
- From: 6.8.0-79.79