- pve-kernel-5.15.158-1-pve_5.15.158-1 (pve-7-5.15)
- 5.15.158-2-pve-5.15.158-2
- 2025-06-19 11:46:57
- 2025-06-25 07:29:43
- K20250619_08
- CVE-2024-36016
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://ubuntu.com/security/CVE-2024-36016
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-gsm0-receive.patch
- From: 5.15.0-117.127
- CVE-2024-26952
- Description:
ksmbd: fix potencial out-of-bounds when buffer offset is
- CVE: https://ubuntu.com/security/CVE-2024-26952
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-26952-ksmbd-fix-potencial-out-of-bounds-when-buffer-offset-is.patch
- From: 5.15.0-117.127
- CVE-2023-52752
- Description:
smb: client: fix use-after-free bug in
- CVE: https://ubuntu.com/security/CVE-2023-52752
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2023-52752-smb-client-fix-use-after-free-bug-in.patch
- From: 5.15.0-117.127
- CVE-2024-26886
- Description:
Bluetooth: af_bluetooth: Fix deadlock
- CVE: https://ubuntu.com/security/CVE-2024-26886
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-26886-bluetooth-af-bluetooth-fix-deadlock.patch
- From: 5.15.0-117.127
- CVE-2024-25742
- Description:
x86/sev: Harden #VC instruction emulation somewhat
- CVE: https://ubuntu.com/security/CVE-2024-25742
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-25742-x86-sev-harden-vc-instruction-emulation-somewhat.patch
- From: 5.15.0-117.127
- CVE-2024-25742
- Description:
x86/sev: Check for MWAITX and MONITORX opcodes in the #VC
- CVE: https://ubuntu.com/security/CVE-2024-25742
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-25742-x86-sev-check-for-mwaitx-and-monitorx-opcodes-in-the-vc.patch
- From: 5.15.0-117.127
- CVE-2024-27017
- Description:
netfilter: nft_set_pipapo: constify lookup fn args where
- CVE: https://ubuntu.com/security/CVE-2024-27017
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-27017-netfilter-nft-set-pipapo-constify-lookup-fn-args-where.patch
- From: 5.15.0-117.127
- CVE-2024-27017
- Description:
netfilter: nft_set_pipapo: walk over current view on netlink
- CVE: https://ubuntu.com/security/CVE-2024-27017
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-27017-netfilter-nft-set-pipapo-walk-over-current-view-on-netlink.patch
- From: 5.15.0-117.127
- CVE-2024-27017
- Description:
netfilter: nf_tables: missing iterator type in lookup walk
- CVE: https://ubuntu.com/security/CVE-2024-27017
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-27017-netfilter-nf-tables-missing-iterator-type-in-lookup-walk.patch
- From: 5.15.0-117.127
- CVE-2024-26980
- Description:
ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf
- CVE: https://ubuntu.com/security/CVE-2024-26980
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-26980-ksmbd-fix-slab-out-of-bounds-in-smb2-allocate-rsp-buf.patch
- From: 5.15.0-118.128
- CVE-2024-26936
- Description:
ksmbd: validate request buffer size in
- CVE: https://ubuntu.com/security/CVE-2024-26936
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-26936-ksmbd-validate-request-buffer-size-in.patch
- From: 5.15.0-118.128
- CVE-2024-35848
- Description:
eeprom: at24: Probe for DDR3 thermal sensor in the SPD case (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-35848
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-35848-01-eeprom-at24-probe-for-ddr3-thermal-sensor-in-the-spd-case-5.15.0-117.127.patch
- From: 5.15.0-118.128
- CVE-2024-35848
- Description:
eeprom: at24: Use dev_err_probe for nvmem register failure (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-35848
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-35848-02-eeprom-at24-use-dev-err-probe-for-nvmem-register-failure-5.15.0-117.127.patch
- From: 5.15.0-118.128
- CVE-2024-35848
- Description:
eeprom: at24: fix memory corruption race condition
- CVE: https://ubuntu.com/security/CVE-2024-35848
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-35848-eeprom-at24-fix-memory-corruption-race-condition.patch
- From: 5.15.0-118.128
- CVE-2024-27398
- Description:
Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-27398
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-27398-bluetooth-fix-use-after-free-bugs-caused-by-sco-sock-timeout.patch
- From: 5.15.0-118.128
- CVE-2024-27399
- Description:
Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
- CVE: https://ubuntu.com/security/CVE-2024-27399
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-27399-bluetooth-l2cap-fix-null-ptr-deref-in-l2cap-chan-timeout.patch
- From: 5.15.0-118.128
- CVE-2024-27401
- Description:
firewire: nosy: ensure user_length is taken into account when
- CVE: https://ubuntu.com/security/CVE-2024-27401
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-27401-firewire-nosy-ensure-user-length-is-taken-into-account-when.patch
- From: 5.15.0-118.128
- CVE-2024-35947
- Description:
dyndbg: fix old BUG_ON in >control parser
- CVE: https://ubuntu.com/security/CVE-2024-35947
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-35947-dyndbg-fix-old-bug-on-in-control-parser.patch
- From: 5.15.0-118.128
- CVE-2024-26900
- Description:
md: fix kmemleak of rdev->serial
- CVE: https://ubuntu.com/security/CVE-2024-26900
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-26900-md-fix-kmemleak-of-rdev-serial.patch
- From: 5.15.0-118.128
- CVE-2024-36967
- Description:
KEYS: trusted: Fix memory leak in tpm2_key_encode()
- CVE: https://ubuntu.com/security/CVE-2024-36967
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36967-keys-trusted-fix-memory-leak-in-tpm2-key-encode.patch
- From: 5.15.0-118.128
- CVE-2024-36975
- Description:
KEYS: trusted: Do not use WARN when encode fails
- CVE: https://ubuntu.com/security/CVE-2024-36975
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36975-keys-trusted-do-not-use-warn-when-encode-fails.patch
- From: 5.15.0-118.128
- CVE-2024-36965
- Description:
remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
- CVE: https://ubuntu.com/security/CVE-2024-36965
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36965-remoteproc-mediatek-make-sure-ipi-buffer-fits-in-l2tcm.patch
- From: 5.15.0-118.128
- CVE-2024-36883
- Description:
net: fix out-of-bounds access in ops_init
- CVE: https://ubuntu.com/security/CVE-2024-36883
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36883-net-fix-out-of-bounds-access-in-ops-init.patch
- From: 5.15.0-118.128
- CVE-2024-36886
- Description:
tipc: fix UAF in error path
- CVE: https://ubuntu.com/security/CVE-2024-36886
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36886-tipc-fix-uaf-in-error-path.patch
- From: 5.15.0-118.128
- CVE-2024-36960
- Description:
drm/vmwgfx: Fix invalid reads in fence signaled events
- CVE: https://ubuntu.com/security/CVE-2024-36960
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36960-drm-vmwgfx-fix-invalid-reads-in-fence-signaled-events.patch
- From: 5.15.0-118.128
- CVE-2024-36969
- Description:
drm/amd/display: Fix division by zero in setup_dsc_config
- CVE: https://ubuntu.com/security/CVE-2024-36969
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36969-drm-amd-display-fix-division-by-zero-in-setup-dsc-config.patch
- From: 5.15.0-118.128
- CVE-2024-38600
- Description:
ALSA: Fix deadlocks with kctl removals at disconnection
- CVE: https://ubuntu.com/security/CVE-2024-38600
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-38600-alsa-fix-deadlocks-with-kctl-removals-at-disconnection.patch
- From: 5.15.0-118.128
- CVE-2024-36906
- Description:
arm: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-36906.patch
- From:
- CVE-2024-36905
- Description:
tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
- CVE: https://ubuntu.com/security/CVE-2024-36905
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36905-tcp-defer-shutdown-send-shutdown-for-tcp-syn-recv-sockets.patch
- From: 5.15.0-118.128
- CVE-2024-36904
- Description:
tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().
- CVE: https://ubuntu.com/security/CVE-2024-36904
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36904-tcp-use-refcount-inc-not-zero-in-tcp-twsk-unique.patch
- From: 5.15.0-118.128
- CVE-2024-36017
- Description:
rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
- CVE: https://ubuntu.com/security/CVE-2024-36017
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36017-rtnetlink-correct-nested-ifla-vf-vlan-list-attribute-validation.patch
- From: 5.15.0-118.128
- CVE-2024-36902
- Description:
ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
- CVE: https://ubuntu.com/security/CVE-2024-36902
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36902-ipv6-fib6-rules-avoid-possible-null-dereference-in-fib6-rule-action.patch
- From: 5.15.0-118.128
- CVE-2024-36897
- Description:
drm/amd/display: Atom Integrated System Info v2_2 for DCN35
- CVE: https://ubuntu.com/security/CVE-2024-36897
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36897-drm-amd-display-atom-integrated-system-info-v2-2-for-dcn35.patch
- From: 5.15.0-118.128
- CVE-2024-36889
- Description:
mptcp: ensure snd_nxt is properly initialized on connect
- CVE: https://ubuntu.com/security/CVE-2024-36889
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36889-mptcp-ensure-snd-nxt-is-properly-initialized-on-connect.patch
- From: 5.15.0-118.128
- CVE-2024-36880
- Description:
Bluetooth: qca: add missing firmware sanity checks
- CVE: https://ubuntu.com/security/CVE-2024-36880
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36880-bluetooth-qca-add-missing-firmware-sanity-checks.patch
- From: 5.15.0-118.128
- CVE-2024-36928
- Description:
s390: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-36928.patch
- From:
- CVE-2024-36938
- Description:
bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
- CVE: https://ubuntu.com/security/CVE-2024-36938
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36938-bpf-skmsg-fix-null-pointer-dereference-in-sk-psock-skb-ingress-enqueue.patch
- From: 5.15.0-118.128
- CVE-2024-36934
- Description:
bna: ensure the copied buf is NUL terminated
- CVE: https://ubuntu.com/security/CVE-2024-36934
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36934-bna-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.15.0-118.128
- CVE-2024-36931
- Description:
s390: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-36931.patch
- From:
- CVE-2024-36929
- Description:
net: core: reject skb_copy(_expand) for fraglist GSO skbs
- CVE: https://ubuntu.com/security/CVE-2024-36929
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36929-net-core-reject-skb-copy-expand-for-fraglist-gso-skbs.patch
- From: 5.15.0-118.128
- CVE-2024-36919
- Description:
scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload
- CVE: https://ubuntu.com/security/CVE-2024-36919
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36919-scsi-bnx2fc-remove-spin-lock-bh-while-releasing-resources-after-upload.patch
- From: 5.15.0-118.128
- CVE-2024-36916
- Description:
blk-iocost: avoid out of bounds shift
- CVE: https://ubuntu.com/security/CVE-2024-36916
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36916-blk-iocost-avoid-out-of-bounds-shift.patch
- From: 5.15.0-118.128
- CVE-2024-36953
- Description:
KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-36953
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36953-01-kvm-arm64-vgic-v2-use-cpuid-from-userspace-as-vcpu-id-5.15.0-117.127.patch
- From: 5.15.0-118.128
- CVE-2024-36953
- Description:
KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()
- CVE: https://ubuntu.com/security/CVE-2024-36953
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36953-kvm-arm64-vgic-v2-check-for-non-null-vcpu-in-vgic-v2-parse-attr.patch
- From: 5.15.0-118.128
- CVE-2024-36941
- Description:
wifi: nl80211: don't free NULL coalescing rule
- CVE: https://ubuntu.com/security/CVE-2024-36941
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36941-wifi-nl80211-don-t-free-null-coalescing-rule.patch
- From: 5.15.0-118.128
- CVE-2024-36940
- Description:
pinctrl: core: delete incorrect free in pinctrl_enable()
- CVE: https://ubuntu.com/security/CVE-2024-36940
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36940-pinctrl-core-delete-incorrect-free-in-pinctrl-enable.patch
- From: 5.15.0-118.128
- CVE-2024-36955
- Description:
ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()
- CVE: https://ubuntu.com/security/CVE-2024-36955
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36955-alsa-hda-intel-sdw-acpi-fix-usage-of-device-get-named-child-node.patch
- From: 5.15.0-118.128
- CVE-2024-36954
- Description:
tipc: fix a possible memleak in tipc_buf_append
- CVE: https://ubuntu.com/security/CVE-2024-36954
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36954-tipc-fix-a-possible-memleak-in-tipc-buf-append.patch
- From: 5.15.0-118.128
- CVE-2024-36952
- Description:
scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
- CVE: https://ubuntu.com/security/CVE-2024-36952
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36952-scsi-lpfc-move-npiv-s-transport-unregistration-to-after-resource-clean-up.patch
- From: 5.15.0-118.128
- CVE-2024-36950
- Description:
firewire: ohci: mask bus reset interrupts between ISR and bottom half
- CVE: https://ubuntu.com/security/CVE-2024-36950
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36950-firewire-ohci-mask-bus-reset-interrupts-between-isr-and-bottom-half.patch
- From: 5.15.0-118.128
- CVE-2024-36947
- Description:
qibfs: fix dentry leak
- CVE: https://ubuntu.com/security/CVE-2024-36947
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36947-qibfs-fix-dentry-leak.patch
- From: 5.15.0-118.128
- CVE-2024-36946
- Description:
phonet: fix rtm_phonet_notify() skb allocation
- CVE: https://ubuntu.com/security/CVE-2024-36946
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36946-phonet-fix-rtm-phonet-notify-skb-allocation.patch
- From: 5.15.0-118.128
- CVE-2024-36957
- Description:
octeontx2-af: avoid off-by-one read from userspace
- CVE: https://ubuntu.com/security/CVE-2024-36957
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36957-octeontx2-af-avoid-off-by-one-read-from-userspace.patch
- From: 5.15.0-118.128
- CVE-2024-36964
- Description:
fs/9p: only translate RWX permissions for plain 9P2000
- CVE: https://ubuntu.com/security/CVE-2024-36964
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36964-fs-9p-only-translate-rwx-permissions-for-plain-9p2000.patch
- From: 5.15.0-118.128
- CVE-2023-52585
- Description:
drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
- CVE: https://ubuntu.com/security/CVE-2023-52585
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2023-52585-drm-amdgpu-fix-possible-null-dereference-in-amdgpu-ras-query-error-status-helper.patch
- From: 5.15.0-118.128
- CVE-2024-36933
- Description:
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
- CVE: https://ubuntu.com/security/CVE-2024-36933
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36933-nsh-restore-skb-protocol-data-mac-header-for-outer-header-in-nsh-gso-segment.patch
- From: 5.15.0-118.128
- CVE-2024-36959
- Description:
pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()
- CVE: https://ubuntu.com/security/CVE-2024-36959
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36959-pinctrl-devicetree-fix-refcount-leak-in-pinctrl-dt-to-map.patch
- From: 5.15.0-118.128
- CVE-2024-36031
- Description:
keys: Fix overwrite of key expiration on instantiation
- CVE: https://ubuntu.com/security/CVE-2024-36031
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36031-keys-Fix-overwrite-of-key-expiration-on-instantiation.patch
- From: 5.15.0-118.128
- CVE-2024-26921
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- CVE:
- Patch: skipped/CVE-2024-26921.patch
- From:
- CVE-2023-52629
- Description:
Out of scope - related to SuperH
- CVE:
- Patch: skipped/CVE-2023-52629.patch
- From:
- CVE-2023-52760
- Description:
gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
- CVE: https://ubuntu.com/security/CVE-2023-52760
- Patch: ubuntu-jammy/5.15.0-119.129/CVE-2023-52760-gfs2-fix-slab-use-after-free-in-gfs2-qd-dealloc.patch
- From: 5.15.0-119.129
- CVE-2024-26680
- Description:
net: atlantic: Fix DMA mapping for PTP hwts ring
- CVE: https://ubuntu.com/security/CVE-2024-26680
- Patch: ubuntu-jammy/5.15.0-119.129/CVE-2024-26680-net-atlantic-fix-dma-mapping-for-ptp-hwts-ring.patch
- From: 5.15.0-119.129
- CVE-2024-26830
- Description:
Fixed function sleeps and executed in kthread, which may prevent patching/unpatching. Low score CVE.
- CVE:
- Patch: skipped/CVE-2024-26830.patch
- From:
- CVE-2024-36901
- Description:
ipv6: prevent NULL dereference in ip6_output()
- CVE: https://ubuntu.com/security/CVE-2024-36901
- Patch: ubuntu-jammy/5.15.0-119.129/CVE-2024-36901-ipv6-prevent-null-dereference-in-ip6-output.patch
- From: 5.15.0-119.129
- CVE-2024-39292
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-39292.patch
- From:
- CVE-2024-39484
- Description:
mmc: davinci: Don't strip remove function when driver is
- CVE: https://ubuntu.com/security/CVE-2024-39484
- Patch: ubuntu-jammy/5.15.0-119.129/CVE-2024-39484-mmc-davinci-don-t-strip-remove-function-when-driver-is-kpatch.patch
- From: 5.15.0-119.129
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://ubuntu.com/security/CVE-2024-42154
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 5.15.0-121.131
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://ubuntu.com/security/CVE-2024-42154
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42154-tcp_metrics-validate-source-addr-length-kpatch.patch
- From: 5.15.0-121.131
- CVE-2024-36978
- Description:
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
- CVE: https://ubuntu.com/security/CVE-2024-36978
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in.patch
- From: 5.15.0-121.131
- CVE-2024-38552
- Description:
drm/amd/display: Fix potential index out of bounds in color transformation function
- CVE: https://ubuntu.com/security/CVE-2024-38552
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38552-drm-amd-display-fix-potential-index-out-of-bounds-in-color.patch
- From: 5.15.0-121.131
- CVE-2024-38555
- Description:
net/mlx5: Discard command completions in internal error
- CVE: https://ubuntu.com/security/CVE-2024-38555
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38555-net-mlx5-discard-command-completions-in-internal-error.patch
- From: 5.15.0-121.131
- CVE-2024-38583
- Description:
nilfs2: We cannot patch functions that sleep in kthread().
- CVE:
- Patch: skipped/CVE-2024-38583.patch
- From:
- CVE-2024-38627
- Description:
stm class: Fix a double free in stm_register_device()
- CVE: https://ubuntu.com/security/CVE-2024-38627
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38627-stm-class-fix-a-double-free-in-stm-register-device.patch
- From: 5.15.0-121.131
- CVE-2024-39480
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://ubuntu.com/security/CVE-2024-39480
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39480-kdb-fix-buffer-overflow-during-tab-complete.patch
- From: 5.15.0-121.131
- CVE-2024-39495
- Description:
greybus: Fix use-after-free bug in gb_interface_release due to race condition.
- CVE: https://ubuntu.com/security/CVE-2024-39495
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39495-greybus-fix-use-after-free-bug-in-gb-interface-release-due.patch
- From: 5.15.0-121.131
- CVE-2024-39277
- Description:
dma-mapping: benchmark: handle NUMA_NO_NODE correctly
- CVE: https://ubuntu.com/security/CVE-2024-39277
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39277-dma-mapping-benchmark-handle-numa-no-node-correctly.patch
- From: 5.15.0-121.131
- CVE-2024-38381
- Description:
Out of scope as the patch is for NFC/Android
- CVE:
- Patch: skipped/CVE-2024-38381.patch
- From:
- CVE-2024-42093
- Description:
net/dpaa2: Avoid explicit cpumask var allocation on stack
- CVE: https://ubuntu.com/security/CVE-2024-42093
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42093-net-dpaa2-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.15.0-121.131
- CVE-2024-42094
- Description:
net/iucv: Avoid explicit cpumask var allocation on stack
- CVE: https://ubuntu.com/security/CVE-2024-42094
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42094-net-iucv-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.15.0-121.131
- CVE-2024-42104
- Description:
nilfs2: add missing check for inode numbers on directory
- CVE: https://ubuntu.com/security/CVE-2024-42104
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42104-nilfs2-add-missing-check-for-inode-numbers-on-directory.patch
- From: 5.15.0-121.131
- CVE-2024-42161
- Description:
BPF selftest fix, not a kernel code.
- CVE:
- Patch: skipped/CVE-2024-42161.patch
- From:
- CVE-2024-42224
- Description:
net: dsa: mv88e6xxx: Correct check for empty list
- CVE: https://ubuntu.com/security/CVE-2024-42224
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42224-net-dsa-mv88e6xxx-correct-check-for-empty-list.patch
- From: 5.15.0-121.131
- CVE-2024-42225
- Description:
wifi: mt76: replace skb_put with skb_put_zero
- CVE: https://ubuntu.com/security/CVE-2024-42225
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42225-wifi-mt76-replace-skb-put-with-skb-put-zero.patch
- From: 5.15.0-121.131
- CVE-2024-39471
- Description:
drm/amdgpu: add error handle to avoid out-of-bounds
- CVE: https://ubuntu.com/security/CVE-2024-39471
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39471-drm-amdgpu-add-error-handle-to-avoid-out-of-bounds.patch
- From: 5.15.0-121.131
- CVE-2024-39487
- Description:
bonding: Fix out-of-bounds read in
- CVE: https://ubuntu.com/security/CVE-2024-39487
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39487-bonding-fix-out-of-bounds-read-in.patch
- From: 5.15.0-121.131
- CVE-2024-41040
- Description:
net/sched: Fix UAF when resolving a clash
- CVE: https://ubuntu.com/security/CVE-2024-41040
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41040-net-sched-fix-uaf-when-resolving-a-clash.patch
- From: 5.15.0-121.131
- CVE-2022-48772
- Description:
media: lgdt3306a: Add a check against null-pointer-def
- CVE: https://ubuntu.com/security/CVE-2022-48772
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2022-48772-media-lgdt3306a-add-a-check-against-null-pointer-def.patch
- From: 5.15.0-121.131
- CVE-2023-52884
- Description:
Patched functions sleep and are called from a kthread. Trackpad suspend/resume fix.
- CVE:
- Patch: skipped/CVE-2023-52884.patch
- From:
- CVE-2023-52887
- Description:
net: can: j1939: enhanced error handling for tightly received
- CVE: https://ubuntu.com/security/CVE-2023-52887
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2023-52887-net-can-j1939-enhanced-error-handling-for-tightly-received.patch
- From: 5.15.0-121.131
- CVE-2024-23848
- Description:
media: cec: cec-api: add locking in cec_release()
- CVE: https://ubuntu.com/security/CVE-2024-23848
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-23848-media-cec-cec-api-add-locking-in-cec_release.patch
- From: 5.15.0-121.131
- CVE-2024-25741
- Description:
usb: gadget: printer: fix races against disable
- CVE: https://ubuntu.com/security/CVE-2024-25741
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-25741-usb-gadget-printer-fix-races-against-disable.patch
- From: 5.15.0-121.131
- CVE-2024-31076
- Description:
genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU
- CVE: https://ubuntu.com/security/CVE-2024-31076
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-31076-genirq-cpuhotplug-x86-vector-prevent-vector-leak-during-cpu.patch
- From: 5.15.0-121.131
- CVE-2024-33621
- Description:
ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound
- CVE: https://ubuntu.com/security/CVE-2024-33621
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-33621-ipvlan-dont-use-skb-sk-in-ipvlan-process-v-46-outbound.patch
- From: 5.15.0-121.131
- CVE-2024-33847
- Description:
f2fs: compress: don't allow unaligned truncation on released
- CVE: https://ubuntu.com/security/CVE-2024-33847
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-33847-f2fs-compress-don-t-allow-unaligned-truncation-on-released.patch
- From: 5.15.0-121.131
- CVE-2024-34027
- Description:
f2fs: compress: fix to cover
- CVE: https://ubuntu.com/security/CVE-2024-34027
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-34027-f2fs-compress-fix-to-cover.patch
- From: 5.15.0-121.131
- CVE-2024-34777
- Description:
dma-mapping: benchmark: fix node id validation
- CVE: https://ubuntu.com/security/CVE-2024-34777
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-34777-dma-mapping-benchmark-fix-node-id-validation.patch
- From: 5.15.0-121.131
- CVE-2024-36489
- Description:
tls: fix missing memory barrier in tls_init
- CVE: https://ubuntu.com/security/CVE-2024-36489
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36489-tls-fix-missing-memory-barrier-in-tls-init.patch
- From: 5.15.0-121.131
- CVE-2024-36015
- Description:
ppdev: Add an error check in register_device
- CVE: https://ubuntu.com/security/CVE-2024-36015
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36015-ppdev-add-an-error-check-in-register-device.patch
- From: 5.15.0-121.131
- CVE-2024-36032
- Description:
Bluetooth: qca: fix info leak when fetching fw build id
- CVE: https://ubuntu.com/security/CVE-2024-36032
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36032-bluetooth-qca-fix-info-leak-when-fetching-fw-build-id.patch
- From: 5.15.0-121.131
- CVE-2024-36014
- Description:
drm/arm/malidp: fix a possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-36014
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36014-drm-arm-malidp-fix-a-possible-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-36270
- Description:
netfilter: tproxy: bail out if IP has been disabled on the device
- CVE: https://ubuntu.com/security/CVE-2024-36270
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been-disabled-on-the-device.patch
- From: 5.15.0-121.131
- CVE-2024-36894
- Description:
usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete
- CVE: https://ubuntu.com/security/CVE-2024-36894
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36894-usb-gadget-f-fs-fix-race-between-aio-cancel-and-aio-request-complete.patch
- From: 5.15.0-121.131
- CVE-2024-36286
- Description:
netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()
- CVE: https://ubuntu.com/security/CVE-2024-36286
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36286-netfilter-nfnetlink-queue-acquire-rcu-read-lock-in-instance-destroy-rcu.patch
- From: 5.15.0-121.131
- CVE-2024-35927
- Description:
drm: Check output polling initialized before disabling
- CVE: https://ubuntu.com/security/CVE-2024-35927
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-35927-drm-Check-output-polling-initialized-before-disabling.patch
- From: 5.15.0-121.131
- CVE-2024-35972
- Description:
Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem.
- CVE:
- Patch: skipped/CVE-2024-35972.patch
- From:
- CVE-2024-38559
- Description:
scsi: qedf: Ensure the copied buf is NUL terminated
- CVE: https://ubuntu.com/security/CVE-2024-38559
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38559-scsi-qedf-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.15.0-121.131
- CVE-2024-38558
- Description:
net: openvswitch: fix overwriting ct original tuple for ICMPv6
- CVE: https://ubuntu.com/security/CVE-2024-38558
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38558-net-openvswitch-fix-overwriting-ct-original-tuple-for-icmpv6.patch
- From: 5.15.0-121.131
- CVE-2024-38550
- Description:
ASoC: kirkwood: Fix potential NULL dereference
- CVE: https://ubuntu.com/security/CVE-2024-38550
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38550-asoc-kirkwood-fix-potential-null-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-38549
- Description:
drm/mediatek: Add 0 size check to mtk_drm_gem_obj
- CVE: https://ubuntu.com/security/CVE-2024-38549
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38549-drm-mediatek-add-0-size-check-to-mtk-drm-gem-obj.patch
- From: 5.15.0-121.131
- CVE-2024-38548
- Description:
drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-38548
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38548-drm-bridge-cdns-mhdp8546-fix-possible-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-38547
- Description:
media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries
- CVE: https://ubuntu.com/security/CVE-2024-38547
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38547-media-atomisp-ssh-css-fix-a-null-pointer-dereference-in-load-video-binaries.patch
- From: 5.15.0-121.131
- CVE-2024-38546
- Description:
drm: vc4: Fix possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-38546
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38546-drm-vc4-fix-possible-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-36974
- Description:
net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
- CVE: https://ubuntu.com/security/CVE-2024-36974
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36974-net-sched-taprio-always-validate-tca-taprio-attr-priomap.patch
- From: 5.15.0-121.131
- CVE-2024-37078
- Description:
nilfs2: fix potential kernel bug due to lack of writeback
- CVE: https://ubuntu.com/security/CVE-2024-37078
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-37078-nilfs2-fix-potential-kernel-bug-due-to-lack-of-writeback-flag-waiting.patch
- From: 5.15.0-121.131
- CVE-2024-38586
- Description:
r8169: Fix possible ring buffer corruption on fragmented Tx packets.
- CVE: https://ubuntu.com/security/CVE-2024-38586
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38586-r8169-fix-possible-ring-buffer-corruption-on-fragmented-tx-packets.patch
- From: 5.15.0-121.131
- CVE-2024-38582
- Description:
nilfs2: fix unexpected freezing of nilfs_segctor_sync() (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-38582
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38582-01-nilfs2-fix-unexpected-freezing-of-nilfs-segctor-sync-5.15.0-119.129.patch
- From: 5.15.0-121.131
- CVE-2024-38582
- Description:
nilfs2: fix potential hang in nilfs_detach_log_writer()
- CVE: https://ubuntu.com/security/CVE-2024-38582
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38582-nilfs2-fix-potential-hang-in-nilfs-detach-log-writer.patch
- From: 5.15.0-121.131
- CVE-2024-38580
- Description:
epoll: be better about file lifetimes
- CVE: https://ubuntu.com/security/CVE-2024-38580
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38580-epoll-be-better-about-file-lifetimes.patch
- From: 5.15.0-121.131
- CVE-2024-38579
- Description:
crypto: bcm - Fix pointer arithmetic
- CVE: https://ubuntu.com/security/CVE-2024-38579
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38579-crypto-bcm-fix-pointer-arithmetic.patch
- From: 5.15.0-121.131
- CVE-2024-38578
- Description:
ecryptfs: Fix buffer size for tag 66 packet
- CVE: https://ubuntu.com/security/CVE-2024-38578
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38578-ecryptfs-fix-buffer-size-for-tag-66-packet.patch
- From: 5.15.0-121.131
- CVE-2024-38573
- Description:
cppc_cpufreq: Fix possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-38573
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38573-cppc-cpufreq-fix-possible-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-38571
- Description:
thermal/drivers/tsens: Fix null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-38571
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38571-thermal-drivers-tsens-fix-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-38560
- Description:
scsi: bfa: Ensure the copied buf is NUL terminated
- CVE: https://ubuntu.com/security/CVE-2024-38560
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38560-scsi-bfa-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.15.0-121.131
- CVE-2024-38587
- Description:
speakup: Fix sizeof() vs ARRAY_SIZE() bug
- CVE: https://ubuntu.com/security/CVE-2024-38587
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38587-speakup-fix-sizeof-vs-array-size-bug.patch
- From: 5.15.0-121.131
- CVE-2024-38601
- Description:
ring-buffer: Fix a race between readers and resize checks
- CVE: https://ubuntu.com/security/CVE-2024-38601
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38601-ring-buffer-fix-a-race-between-readers-and-resize-checks.patch
- From: 5.15.0-121.131
- CVE-2024-38599
- Description:
jffs2: prevent xattr node from overflowing the eraseblock
- CVE: https://ubuntu.com/security/CVE-2024-38599
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38599-jffs2-prevent-xattr-node-from-overflowing-the-eraseblock.patch
- From: 5.15.0-121.131
- CVE-2024-38596
- Description:
af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
- CVE: https://ubuntu.com/security/CVE-2024-38596
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38596-af-unix-fix-data-races-in-unix-release-sock-unix-stream-sendmsg.patch
- From: 5.15.0-121.131
- CVE-2024-38591
- Description:
RDMA/hns: Fix deadlock on SRQ async events.
- CVE: https://ubuntu.com/security/CVE-2024-38591
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38591-rdma-hns-fix-deadlock-on-srq-async-events.patch
- From: 5.15.0-121.131
- CVE-2024-38590
- Description:
RDMA/hns: Modify the print level of CQE error
- CVE: https://ubuntu.com/security/CVE-2024-38590
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38590-rdma-hns-modify-the-print-level-of-cqe-error.patch
- From: 5.15.0-121.131
- CVE-2024-38605
- Description:
ALSA: core: Fix NULL module pointer assignment at card init
- CVE: https://ubuntu.com/security/CVE-2024-38605
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38605-alsa-core-fix-null-module-pointer-assignment-at-card-init.patch
- From: 5.15.0-121.131
- CVE-2024-38607
- Description:
macintosh/via-macii: Fix "BUG: sleeping function called from invalid context"
- CVE: https://ubuntu.com/security/CVE-2024-38607
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38607-macintosh-via-macii-fix-bug-sleeping-function-called-from-invalid-context.patch
- From: 5.15.0-121.131
- CVE-2024-38613
- Description:
Out of scope as the patch is for m68k arch only, x86_64, arm64 is not affected
- CVE:
- Patch: skipped/CVE-2024-38613.patch
- From:
- CVE-2024-38612
- Description:
Vulnerability affects OS during boot time and can't be closed via livepatching.
- CVE:
- Patch: skipped/CVE-2024-38612.patch
- From:
- CVE-2024-38623
- Description:
Patch changes global data size, which may lead to FS errors. Low-score CVE requires complex adaptation.
- CVE:
- Patch: skipped/CVE-2024-38623.patch
- From:
- CVE-2024-38621
- Description:
media: stk1160: fix bounds checking in stk1160_copy_video()
- CVE: https://ubuntu.com/security/CVE-2024-38621
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38621-media-stk1160-fix-bounds-checking-in-stk1160-copy-video.patch
- From: 5.15.0-121.131
- CVE-2024-38618
- Description:
ALSA: timer: Set lower bound of start tick time
- CVE: https://ubuntu.com/security/CVE-2024-38618
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38618-alsa-timer-set-lower-bound-of-start-tick-time.patch
- From: 5.15.0-121.131
- CVE-2024-38637
- Description:
greybus: lights: check return of get_channel_from_mode
- CVE: https://ubuntu.com/security/CVE-2024-38637
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38637-greybus-lights-check-return-of-get-channel-from-mode.patch
- From: 5.15.0-121.131
- CVE-2024-38635
- Description:
soundwire: cadence: fix invalid PDI offset
- CVE: https://ubuntu.com/security/CVE-2024-38635
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38635-soundwire-cadence-fix-invalid-pdi-offset.patch
- From: 5.15.0-121.131
- CVE-2024-38633
- Description:
serial: max3100: Update uart_driver_registered on driver removal
- CVE: https://ubuntu.com/security/CVE-2024-38633
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38633-serial-max3100-update-uart-driver-registered-on-driver-removal.patch
- From: 5.15.0-121.131
- CVE-2024-38780
- Description:
dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
- CVE: https://ubuntu.com/security/CVE-2024-38780
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38780-dma-buf-sw-sync-don-t-enable-irq-from-sync-print-obj.patch
- From: 5.15.0-121.131
- CVE-2024-38659
- Description:
enic: Validate length of nl attributes in enic_set_vf_port
- CVE: https://ubuntu.com/security/CVE-2024-38659
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38659-enic-validate-length-of-nl-attributes-in-enic-set-vf-port.patch
- From: 5.15.0-121.131
- CVE-2024-38662
- Description:
bpf: Allow delete from sockmap/sockhash only if update is allowed
- CVE: https://ubuntu.com/security/CVE-2024-38662
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38662-bpf-allow-delete-from-sockmap-sockhash-only-if-update-is-allowed.patch
- From: 5.15.0-121.131
- CVE-2024-39276
- Description:
ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()
- CVE: https://ubuntu.com/security/CVE-2024-39276
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39276-ext4-fix-mb-cache-entry-s-e-refcnt-leak-in-ext4-xattr-block-cache-find.patch
- From: 5.15.0-121.131
- CVE-2024-38661
- Description:
Out of scope as the patch is for s390 arch only, x86_64, arm64 is not affected
- CVE:
- Patch: skipped/CVE-2024-38661.patch
- From:
- CVE-2024-39490
- Description:
ipv6: sr: fix missing sk_buff release in seg6_input_core
- CVE: https://ubuntu.com/security/CVE-2024-39490
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39490-ipv6-sr-fix-missing-sk-buff-release-in-seg6-input-core.patch
- From: 5.15.0-121.131
- CVE-2024-39489
- Description:
ipv6: sr: fix memleak in seg6_hmac_init_algo
- CVE: https://ubuntu.com/security/CVE-2024-39489
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39489-ipv6-sr-fix-memleak-in-seg6-hmac-init-algo.patch
- From: 5.15.0-121.131
- CVE-2024-39467
- Description:
f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode()
- CVE: https://ubuntu.com/security/CVE-2024-39467
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39467-f2fs-fix-to-do-sanity-check-on-i-xattr-nid-in-sanity-check-inode.patch
- From: 5.15.0-121.131
- CVE-2024-39466
- Description:
thermal/drivers/qcom/lmh: Check for SCM availability at probe
- CVE: https://ubuntu.com/security/CVE-2024-39466
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39466-thermal-drivers-qcom-lmh-check-for-scm-availability-at-probe.patch
- From: 5.15.0-121.131
- CVE-2024-39475
- Description:
fbdev: savage: Handle err return when savagefb_check_var failed
- CVE: https://ubuntu.com/security/CVE-2024-39475
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39475-fbdev-savage-handle-err-return-when-savagefb-check-var-failed.patch
- From: 5.15.0-121.131
- CVE-2024-39301
- Description:
net/9p: fix uninit-value in p9_client_rpc()
- CVE: https://ubuntu.com/security/CVE-2024-39301
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39301-net-9p-fix-uninit-value-in-p9-client-rpc.patch
- From: 5.15.0-121.131
- CVE-2024-39468
- Description:
smb: client: fix deadlock in smb2_find_smb_tcon()
- CVE: https://ubuntu.com/security/CVE-2024-39468
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39468-smb-client-fix-deadlock-in-smb2-find-smb-tcon.patch
- From: 5.15.0-121.131
- CVE-2024-39493
- Description:
crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- CVE: https://ubuntu.com/security/CVE-2024-39493
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39493-crypto-qat-fix-adf-dev-reset-sync-memory-leak.patch
- From: 5.15.0-121.131
- CVE-2024-39506
- Description:
liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
- CVE: https://ubuntu.com/security/CVE-2024-39506
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39506-liquidio-adjust-a-null-pointer-handling-path-in-lio-vf-rep-copy-packet.patch
- From: 5.15.0-121.131
- CVE-2024-39505
- Description:
drm/komeda: check for error-valued pointer
- CVE: https://ubuntu.com/security/CVE-2024-39505
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39505-drm-komeda-check-for-error-valued-pointer.patch
- From: 5.15.0-121.131
- CVE-2024-39501
- Description:
drivers: core: synchronize really_probe() and dev_uevent()
- CVE: https://ubuntu.com/security/CVE-2024-39501
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39501-drivers-core-synchronize-really-probe-and-dev-uevent.patch
- From: 5.15.0-121.131
- CVE-2024-39499
- Description:
vmci: prevent speculation leaks by sanitizing event in event_deliver()
- CVE: https://ubuntu.com/security/CVE-2024-39499
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39499-vmci-prevent-speculation-leaks-by-sanitizing-event-in-event-deliver.patch
- From: 5.15.0-121.131
- CVE-2024-39509
- Description:
HID: core: remove unnecessary WARN_ON() in implement()
- CVE: https://ubuntu.com/security/CVE-2024-39509
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39509-hid-core-remove-unnecessary-warn-on-in-implement.patch
- From: 5.15.0-121.131
- CVE-2024-40912
- Description:
wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()
- CVE: https://ubuntu.com/security/CVE-2024-40912
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40912-wifi-mac80211-fix-deadlock-in-ieee80211-sta-ps-deliver-wakeup.patch
- From: 5.15.0-121.131
- CVE-2024-40911
- Description:
wifi: cfg80211: Lock wiphy in cfg80211_get_station
- CVE: https://ubuntu.com/security/CVE-2024-40911
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40911-wifi-cfg80211-lock-wiphy-in-cfg80211-get-station.patch
- From: 5.15.0-121.131
- CVE-2024-40929
- Description:
wifi: iwlwifi: mvm: check n_ssids before accessing the ssids
- CVE: https://ubuntu.com/security/CVE-2024-40929
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40929-wifi-iwlwifi-mvm-check-n-ssids-before-accessing-the-ssids.patch
- From: 5.15.0-121.131
- CVE-2024-40908
- Description:
bpf: Set run context for rawtp test_run callback
- CVE: https://ubuntu.com/security/CVE-2024-40908
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40908-bpf-set-run-context-for-rawtp-test-run-callback.patch
- From: 5.15.0-121.131
- CVE-2024-40905
- Description:
ipv6: fix possible race in __fib6_drop_pcpu_from()
- CVE: https://ubuntu.com/security/CVE-2024-40905
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40905-ipv6-fix-possible-race-in-fib6-drop-pcpu-from.patch
- From: 5.15.0-121.131
- CVE-2024-40904
- Description:
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log
- CVE: https://ubuntu.com/security/CVE-2024-40904
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40904-usb-class-cdc-wdm-fix-cpu-lockup-caused-by-excessive-log-messages.patch
- From: 5.15.0-121.131
- CVE-2024-40901
- Description:
scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
- CVE: https://ubuntu.com/security/CVE-2024-40901
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40901-scsi-mpt3sas-avoid-test-set-bit-operating-in-non-allocated-memory.patch
- From: 5.15.0-121.131
- CVE-2024-40942
- Description:
wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects
- CVE: https://ubuntu.com/security/CVE-2024-40942
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40942-wifi-mac80211-mesh-fix-leak-of-mesh-preq-queue-objects.patch
- From: 5.15.0-121.131
- CVE-2024-40941
- Description:
wifi: iwlwifi: mvm: don't read past the mfuart notifcation
- CVE: https://ubuntu.com/security/CVE-2024-40941
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40941-wifi-iwlwifi-mvm-don-t-read-past-the-mfuart-notifcation.patch
- From: 5.15.0-121.131
- CVE-2024-40945
- Description:
iommu: Return right value in iommu_sva_bind_device()
- CVE: https://ubuntu.com/security/CVE-2024-40945
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40945-iommu-return-right-value-in-iommu-sva-bind-device.patch
- From: 5.15.0-121.131
- CVE-2024-40945
- Description:
iommu: Return right value in iommu_sva_bind_device()
- CVE: https://ubuntu.com/security/CVE-2024-40945
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40945-iommu-return-right-value-in-iommu-sva-bind-device-kpatch.patch
- From: 5.15.0-121.131
- CVE-2024-40932
- Description:
drm/exynos/vidi: fix memory leak in .get_modes()
- CVE: https://ubuntu.com/security/CVE-2024-40932
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40932-drm-exynos-vidi-fix-memory-leak-in-get-modes.patch
- From: 5.15.0-121.131
- CVE-2024-40943
- Description:
ocfs2: fix races between hole punching and AIO+DIO
- CVE: https://ubuntu.com/security/CVE-2024-40943
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40943-ocfs2-fix-races-between-hole-punching-and-aio-dio.patch
- From: 5.15.0-121.131
- CVE-2024-40959
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://ubuntu.com/security/CVE-2024-40959
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40959-xfrm6-check-ip6-dst-idev-return-value-in-xfrm6-get-saddr.patch
- From: 5.15.0-121.131
- CVE-2024-40957
- Description:
seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors
- CVE: https://ubuntu.com/security/CVE-2024-40957
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40957-seg6-fix-parameter-passing-when-calling-nf-hook-in-end-dx4-and-end-dx6-behaviors.patch
- From: 5.15.0-121.131
- CVE-2024-40978
- Description:
scsi: qedi: Fix crash while reading debugfs attribute
- CVE: https://ubuntu.com/security/CVE-2024-40978
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40978-scsi-qedi-fix-crash-while-reading-debugfs-attribute.patch
- From: 5.15.0-121.131
- CVE-2024-40976
- Description:
drm/lima: mask irqs in timeout path before hard reset
- CVE: https://ubuntu.com/security/CVE-2024-40976
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40976-drm-lima-mask-irqs-in-timeout-path-before-hard-reset.patch
- From: 5.15.0-121.131
- CVE-2024-40974
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-40974.patch
- From:
- CVE-2024-40971
- Description:
f2fs: remove clear SB_INLINECRYPT flag in default_options
- CVE: https://ubuntu.com/security/CVE-2024-40971
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40971-f2fs-remove-clear-sb-inlinecrypt-flag-in-default-options.patch
- From: 5.15.0-121.131
- CVE-2024-40968
- Description:
MIPS related CVE.
- CVE:
- Patch: skipped/CVE-2024-40968.patch
- From:
- CVE-2024-40967
- Description:
serial: imx: Introduce timeout when waiting on transmitter empty
- CVE: https://ubuntu.com/security/CVE-2024-40967
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40967-serial-imx-introduce-timeout-when-waiting-on-transmitter-empty.patch
- From: 5.15.0-121.131
- CVE-2024-40963
- Description:
Out of scope as the patch is for MIPS arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-40963.patch
- From:
- CVE-2024-40961
- Description:
ipv6: prevent possible NULL deref in fib6_nh_init()
- CVE: https://ubuntu.com/security/CVE-2024-40961
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40961-ipv6-prevent-possible-null-deref-in-fib6-nh-init.patch
- From: 5.15.0-121.131
- CVE-2024-40960
- Description:
ipv6: prevent possible NULL dereference in rt6_probe()
- CVE: https://ubuntu.com/security/CVE-2024-40960
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40960-ipv6-prevent-possible-null-dereference-in-rt6-probe.patch
- From: 5.15.0-121.131
- CVE-2024-41002
- Description:
crypto: hisilicon/sec - Fix memory leak for sec resource release
- CVE: https://ubuntu.com/security/CVE-2024-41002
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41002-crypto-hisilicon-sec-fix-memory-leak-for-sec-resource-release.patch
- From: 5.15.0-121.131
- CVE-2024-40981
- Description:
batman-adv: bypass empty buckets in batadv_purge_orig_ref()
- CVE: https://ubuntu.com/security/CVE-2024-40981
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40981-batman-adv-bypass-empty-buckets-in-batadv-purge-orig-ref.patch
- From: 5.15.0-121.131
- CVE-2024-41004
- Description:
tracing: Build event generation tests only as modules
- CVE: https://ubuntu.com/security/CVE-2024-41004
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41004-tracing-build-event-generation-tests-only-as-modules.patch
- From: 5.15.0-121.131
- CVE-2024-41004
- Description:
tracing: Build event generation tests only as modules
- CVE: https://ubuntu.com/security/CVE-2024-41004
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41004-tracing-Build-event-generation-tests-only-as-modules-kpatch.patch
- From: 5.15.0-121.131
- CVE-2024-40983
- Description:
tipc: force a dst refcount before doing decryption
- CVE: https://ubuntu.com/security/CVE-2024-40983
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40983-tipc-force-a-dst-refcount-before-doing-decryption.patch
- From: 5.15.0-121.131
- CVE-2024-40984
- Description:
ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs.
- CVE: https://ubuntu.com/security/CVE-2024-40984
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40984-acpica-revert-acpica-avoid-info-mapping-multiple-bars-your-kernel-is-fine.patch
- From: 5.15.0-121.131
- CVE-2024-40990
- Description:
RDMA/mlx5: Add check for srq max_sge attribute
- CVE: https://ubuntu.com/security/CVE-2024-40990
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40990-rdma-mlx5-add-check-for-srq-max-sge-attribute.patch
- From: 5.15.0-121.131
- CVE-2024-40988
- Description:
drm/radeon: fix UBSAN warning in kv_dpm.c
- CVE: https://ubuntu.com/security/CVE-2024-40988
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40988-drm-radeon-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 5.15.0-121.131
- CVE-2024-40987
- Description:
drm/amdgpu: fix UBSAN warning in kv_dpm.c
- CVE: https://ubuntu.com/security/CVE-2024-40987
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40987-drm-amdgpu-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 5.15.0-121.131
- CVE-2024-41005
- Description:
netpoll: Fix race condition in netpoll_owner_active
- CVE: https://ubuntu.com/security/CVE-2024-41005
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41005-netpoll-fix-race-condition-in-netpoll-owner-active.patch
- From: 5.15.0-121.131
- CVE-2024-41044
- Description:
ppp: reject claimed-as-LCP but actually malformed packets
- CVE: https://ubuntu.com/security/CVE-2024-41044
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41044-ppp-reject-claimed-as-lcp-but-actually-malformed-packets.patch
- From: 5.15.0-121.131
- CVE-2024-41041
- Description:
udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
- CVE: https://ubuntu.com/security/CVE-2024-41041
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41041-udp-set-sock-rcu-free-earlier-in-udp-lib-get-port.patch
- From: 5.15.0-121.131
- CVE-2024-41027
- Description:
Fix userfaultfd_api to return EINVAL as expected
- CVE: https://ubuntu.com/security/CVE-2024-41027
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41027-fix-userfaultfd-api-to-return-einval-as-expected.patch
- From: 5.15.0-121.131
- CVE-2024-41097
- Description:
usb: atm: cxacru: fix endpoint checking in cxacru_bind()
- CVE: https://ubuntu.com/security/CVE-2024-41097
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41097-usb-atm-cxacru-fix-endpoint-checking-in-cxacru-bind.patch
- From: 5.15.0-121.131
- CVE-2024-41095
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
- CVE: https://ubuntu.com/security/CVE-2024-41095
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41095-drm-nouveau-dispnv04-fix-null-pointer-dereference-in-nv17-tv-get-ld-modes.patch
- From: 5.15.0-121.131
- CVE-2024-41093
- Description:
drm/amdgpu: avoid using null object of framebuffer
- CVE: https://ubuntu.com/security/CVE-2024-41093
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41093-drm-amdgpu-avoid-using-null-object-of-framebuffer.patch
- From: 5.15.0-121.131
- CVE-2024-41089
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
- CVE: https://ubuntu.com/security/CVE-2024-41089
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41089-drm-nouveau-dispnv04-fix-null-pointer-dereference-in-nv17-tv-get-hd-modes.patch
- From: 5.15.0-121.131
- CVE-2024-41055
- Description:
The patch affects too much kernel code. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-41055.patch
- From:
- CVE-2024-42090
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
- CVE: https://ubuntu.com/security/CVE-2024-42090
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42090-pinctrl-fix-deadlock-in-create-pinctrl-when-handling-eprobe-defer.patch
- From: 5.15.0-121.131
- CVE-2024-42089
- Description:
ASoC: fsl-asoc-card: set priv->pdev before using it
- CVE: https://ubuntu.com/security/CVE-2024-42089
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42089-asoc-fsl-asoc-card-set-priv-pdev-before-using-it.patch
- From: 5.15.0-121.131
- CVE-2024-42087
- Description:
drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep
- CVE: https://ubuntu.com/security/CVE-2024-42087
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42087-drm-panel-ilitek-ili9881c-fix-warning-with-gpio-controllers-that-sleep.patch
- From: 5.15.0-121.131
- CVE-2024-42092
- Description:
gpio: davinci: Validate the obtained number of IRQs
- CVE: https://ubuntu.com/security/CVE-2024-42092
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42092-gpio-davinci-validate-the-obtained-number-of-irqs.patch
- From: 5.15.0-121.131
- CVE-2024-42096
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://ubuntu.com/security/CVE-2024-42096
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 5.15.0-121.131
- CVE-2024-42086
- Description:
iio: chemical: bme680: Fix overflows in compensate() functions
- CVE: https://ubuntu.com/security/CVE-2024-42086
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42086-iio-chemical-bme680-fix-overflows-in-compensate-functions.patch
- From: 5.15.0-121.131
- CVE-2024-42084
- Description:
ftruncate: pass a signed offset
- CVE: https://ubuntu.com/security/CVE-2024-42084
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42084-ftruncate-pass-a-signed-offset.patch
- From: 5.15.0-121.131
- CVE-2024-42098
- Description:
crypto: ecdh - explicitly zeroize private_key
- CVE: https://ubuntu.com/security/CVE-2024-42098
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42098-crypto-ecdh-explicitly-zeroize-private-key.patch
- From: 5.15.0-121.131
- CVE-2024-42097
- Description:
ALSA: emux: improve patch ioctl data validation
- CVE: https://ubuntu.com/security/CVE-2024-42097
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42097-alsa-emux-improve-patch-ioctl-data-validation.patch
- From: 5.15.0-121.131
- CVE-2024-42120
- Description:
drm/amd/display: Check pipe offset before setting vblank
- CVE: https://ubuntu.com/security/CVE-2024-42120
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42120-drm-amd-display-check-pipe-offset-before-setting-vblank.patch
- From: 5.15.0-121.131
- CVE-2024-42119
- Description:
drm/amd/display: Skip finding free audio for unknown engine_id
- CVE: https://ubuntu.com/security/CVE-2024-42119
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42119-drm-amd-display-skip-finding-free-audio-for-unknown-engine-id.patch
- From: 5.15.0-121.131
- CVE-2024-42115
- Description:
jffs2: Fix potential illegal address access in jffs2_free_inode
- CVE: https://ubuntu.com/security/CVE-2024-42115
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42115-jffs2-fix-potential-illegal-address-access-in-jffs2-free-inode.patch
- From: 5.15.0-121.131
- CVE-2024-42106
- Description:
inet_diag: Initialize pad field in struct inet_diag_req_v2
- CVE: https://ubuntu.com/security/CVE-2024-42106
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42106-inet-diag-initialize-pad-field-in-struct-inet-diag-req-v2.patch
- From: 5.15.0-121.131
- CVE-2024-42102
- Description:
Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again"
- CVE: https://ubuntu.com/security/CVE-2024-42102
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42102-revert-mm-writeback-fix-possible-divide-by-zero-in-wb-dirty-limits-again.patch
- From: 5.15.0-121.131
- CVE-2024-42101
- Description:
drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
- CVE: https://ubuntu.com/security/CVE-2024-42101
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42101-drm-nouveau-fix-null-pointer-dereference-in-nouveau-connector-get-modes.patch
- From: 5.15.0-121.131
- CVE-2024-42127
- Description:
drm/lima: fix shared irq handling on driver remove
- CVE: https://ubuntu.com/security/CVE-2024-42127
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42127-drm-lima-fix-shared-irq-handling-on-driver-remove.patch
- From: 5.15.0-121.131
- CVE-2024-42124
- Description:
scsi: qedf: Make qedf_execute_tmf() non-preemptible
- CVE: https://ubuntu.com/security/CVE-2024-42124
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42124-scsi-qedf-make-qedf-execute-tmf-non-preemptible.patch
- From: 5.15.0-121.131
- CVE-2024-42140
- Description:
Arch riscv is not supported.
- CVE:
- Patch: skipped/CVE-2024-42140.patch
- From:
- CVE-2024-42131
- Description:
mm: avoid overflows in dirty throttling logic
- CVE: https://ubuntu.com/security/CVE-2024-42131
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42131-mm-avoid-overflows-in-dirty-throttling-logic.patch
- From: 5.15.0-121.131
- CVE-2024-42152
- Description:
nvmet: fix a possible leak when destroy a ctrl during qp
- CVE: https://ubuntu.com/security/CVE-2024-42152
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42152-nvmet-fix-a-possible-leak-when-destroy-a-ctrl-during-qp-establishment.patch
- From: 5.15.0-121.131
- CVE-2024-42130
- Description:
nfc/nci: Add the inconsistency check between the input data length and count
- CVE: https://ubuntu.com/security/CVE-2024-42130
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42130-nfc-nci-add-the-inconsistency-check-between-the-input-data-length-and-count.patch
- From: 5.15.0-121.131
- CVE-2024-42229
- Description:
crypto: aead,cipher - zeroize key buffer after use
- CVE: https://ubuntu.com/security/CVE-2024-42229
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42229-crypto-aead-cipher-zeroize-key-buffer-after-use.patch
- From: 5.15.0-121.131
- CVE-2024-42223
- Description:
media: dvb-frontends: tda10048: Fix integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-42223
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42223-media-dvb-frontends-tda10048-fix-integer-overflow.patch
- From: 5.15.0-121.131
- CVE-2024-42157
- Description:
s390 architecture related CVE.
- CVE:
- Patch: skipped/CVE-2024-42157.patch
- From:
- CVE-2024-42236
- Description:
usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()
- CVE: https://ubuntu.com/security/CVE-2024-42236
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42236-usb-gadget-configfs-prevent-oob-read-write-in-usb-string-copy.patch
- From: 5.15.0-121.131
- CVE-2024-42232
- Description:
libceph: fix race between delayed_work() and ceph_monc_stop()
- CVE: https://ubuntu.com/security/CVE-2024-42232
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42232-libceph-fix-race-between-delayed-work-and-ceph-monc-stop.patch
- From: 5.15.0-121.131
- CVE-2024-42247
- Description:
wireguard: allowedips: avoid unaligned 64-bit memory accesses
- CVE: https://ubuntu.com/security/CVE-2024-42247
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42247-wireguard-allowedips-avoid-unaligned-64-bit-memory-accesses.patch
- From: 5.15.0-121.131
- CVE-2024-41049
- Description:
filelock: fix potential use-after-free in posix_lock_inode
- CVE: https://ubuntu.com/security/CVE-2024-41049
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41049-filelock-fix-potential-use-after-free-in-posix-lock-inode.patch
- From: 5.15.0-121.131
- CVE-2024-41046
- Description:
net: ethernet: lantiq_etop: fix double free in detach
- CVE: https://ubuntu.com/security/CVE-2024-41046
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41046-net-ethernet-lantiq-etop-fix-double-free-in-detach-5.15.0-119.129.patch
- From: 5.15.0-121.131
- CVE-2024-40902
- Description:
jfs: xattr: fix buffer overflow for invalid xattr
- CVE: https://ubuntu.com/security/CVE-2024-40902
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40902-jfs-xattr-fix-buffer-overflow-for-invalid-xattr.patch
- From: 5.15.0-121.131
- CVE-2024-41000
- Description:
block/ioctl: prefer different overflow check
- CVE: https://ubuntu.com/security/CVE-2024-41000
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41000-block-ioctl-prefer-different-overflow-check.patch
- From: 5.15.0-121.131
- CVE-2024-40958
- Description:
netns: Make get_net_ns() handle zero refcount net
- CVE: https://ubuntu.com/security/CVE-2024-40958
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40958-netns-make-get-net-ns-handle-zero-refcount-net.patch
- From: 5.15.0-121.131
- CVE-2024-40994
- Description:
Applies to 32-bit systems only that we don't cover
- CVE:
- Patch: skipped/CVE-2024-40994.patch
- From:
- CVE-2024-40956
- Description:
dmaengine: idxd: Fix possible Use-After-Free in
- CVE: https://ubuntu.com/security/CVE-2024-40956
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40956-dmaengine-idxd-fix-possible-use-after-free-in.patch
- From: 5.15.0-121.131
- CVE-2024-40954
- Description:
net: do not leave a dangling sk pointer, when socket creation
- CVE: https://ubuntu.com/security/CVE-2024-40954
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40954-net-do-not-leave-a-dangling-sk-pointer-when-socket-creation.patch
- From: 5.15.0-121.131
- CVE-2024-41092
- Description:
drm/i915/gt: Fix potential UAF by revoke of fence registers
- CVE: https://ubuntu.com/security/CVE-2024-41092
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41092-drm-i915-gt-fix-potential-uaf-by-revoke-of-fence-registers.patch
- From: 5.15.0-121.131
- CVE-2024-41087
- Description:
ata: libata-core: Fix double free on error
- CVE: https://ubuntu.com/security/CVE-2024-41087
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41087-ata-libata-core-fix-double-free-on-error.patch
- From: 5.15.0-121.131
- CVE-2024-39496
- Description:
btrfs: zoned: fix use-after-free due to race with dev replace
- CVE: https://ubuntu.com/security/CVE-2024-39496
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-39496-btrfs-zoned-fix-use-after-free-due-to-race-with-dev-replace.patch
- From: 5.15.0-122.132
- CVE-2024-42228
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://ubuntu.com/security/CVE-2024-42228
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu_vce_cs_reloc.patch
- From: 5.15.0-122.132
- CVE-2024-39494
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://ubuntu.com/security/CVE-2024-39494
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-39494-ima-fix-use-after-free-on-a-dentry-s-dname-name.patch
- From: 5.15.0-122.132
- CVE-2024-42160
- Description:
f2fs: check validation of fault attrs in
- CVE: https://ubuntu.com/security/CVE-2024-42160
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-42160-f2fs-check-validation-of-fault-attrs-in-f2fs_build_fault_attr.patch
- From: 5.15.0-122.132
- CVE-2024-27012
- Description:
netfilter: nf_tables: restore set elements when delete set fails
- CVE: https://ubuntu.com/security/CVE-2024-27012
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-27012-netfilter-nf-tables-restore-set-elements-when-delete-set-fails.patch
- From: 5.15.0-122.132
- CVE-2024-26677
- Description:
rxrpc: Fix delayed ACKs to not set the reference serial number
- CVE: https://ubuntu.com/security/CVE-2024-26677
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-26677-rxrpc-Fix-delayed-ACKs-to-not-set-the-reference-serial-number.patch
- From: 5.15.0-122.132
- CVE-2024-26677
- Description:
rxrpc: Fix delayed ACKs to not set the reference serial number (Adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26677
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-26677-rxrpc-Fix-delayed-ACKs-to-not-set-the-reference-serial-number-kpatch.patch
- From: 5.15.0-122.132
- CVE-2024-41009
- Description:
bpf: Fix overrunning reservations in ringbuf
- CVE: https://ubuntu.com/security/CVE-2024-41009
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-41009-bpf-Fix-overrunning-reservations-in-ringbuf.patch
- From: 5.15.0-122.132
- CVE-2024-41009
- Description:
bpf: Fix overrunning reservations in ringbuf (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-41009
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-41009-bpf-Fix-overrunning-reservations-in-ringbuf-kpatch.patch
- From: 5.15.0-122.132
- CVE-2024-38570
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://ubuntu.com/security/CVE-2024-38570
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-38570-01-gfs2-Rename-sd_-glock-kill-_wait.patch
- From: kernel-5.15.0-122.132
- CVE-2024-38570
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://ubuntu.com/security/CVE-2024-38570
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-38570-02-gfs2-Fix-potential-glock-use-after-free-on-unmount.patch
- From: kernel-5.15.0-122.132
- CVE-2024-38570
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://ubuntu.com/security/CVE-2024-38570
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-38570-02-gfs2-Fix-potential-glock-use-after-free-on-unmount-kpatch.patch
- From: kernel-5.15.0-122.132
- CVE-2024-38630
- Description:
watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
- CVE: https://ubuntu.com/security/CVE-2024-38630
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-38630-watchdog-cpu5wdt-c-fix-use-after-free-bug-caused-by-cpu5wdt-trigger.patch
- From: 5.15.0-124.134
- CVE-2024-45016
- Description:
netem: fix return value if duplicate enqueue fails
- CVE: https://ubuntu.com/security/CVE-2024-45016
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-45016-netem-fix-return-value-if-duplicate-enqueue-fails.patch
- From: 5.15.0-124.134
- CVE-2024-27397
- Description:
netfilter: netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://ubuntu.com/security/CVE-2024-27397
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout.patch
- From: 5.15.0-124.134
- CVE-2024-27397
- Description:
netfilter: netfilter: nf_tables: use timestamp to check for set element timeout kpatch
- CVE: https://ubuntu.com/security/CVE-2024-27397
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout-kpatch.patch
- From: 5.15.0-124.134
- CVE-2024-44986
- Description:
ipv6: fix possible UAF in ip6_finish_output2()
- CVE: https://ubuntu.com/security/CVE-2024-44986
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44986-ipv6-fix-possible-UAF-in-ip6_finish_output2.patch
- From: 5.15.0-125.135
- CVE-2024-44987
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://ubuntu.com/security/CVE-2024-44987
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44987-ipv6-prevent-UAF-in-ip6_send_skb.patch
- From: 5.15.0-125.135
- CVE-2024-44998
- Description:
atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://ubuntu.com/security/CVE-2024-44998
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue_rx.patch
- From: 5.15.0-125.135
- CVE-2024-45026
- Description:
Architecture is not supported
- CVE:
- Patch: skipped/CVE-2024-45026.patch
- From:
- CVE-2024-46673
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://ubuntu.com/security/CVE-2024-46673
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46673-scsi-aacraid-Fix-double-free-on-probe-failure.patch
- From: 5.15.0-125.135
- CVE-2024-46725
- Description:
drm/amdgpu: Fix out-of-bounds write warning
- CVE: https://ubuntu.com/security/CVE-2024-46725
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46725-drm-amdgpu-Fix-out-of-bounds-write-warning.patch
- From: 5.15.0-125.135
- CVE-2024-46738
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://ubuntu.com/security/CVE-2024-46738
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46738-VMCI-Fix-use-after-free-when-removing-resource-in-vmci_resource_remove.patch
- From: 5.15.0-125.135
- CVE-2024-46740
- Description:
binder: fix UAF caused by offsets overwrite
- CVE: https://ubuntu.com/security/CVE-2024-46740
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46740-binder-fix-UAF-caused-by-offsets-overwrite.patch
- From: 5.15.0-125.135
- CVE-2024-46744
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://ubuntu.com/security/CVE-2024-46744
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46744-Squashfs-sanity-check-symbolic-link-size.patch
- From: 5.15.0-125.135
- CVE-2024-46746
- Description:
HID: amd_sfh: free driver_data after destroying hid device
- CVE: https://ubuntu.com/security/CVE-2024-46746
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46746-HID-amd_sfh-free-driver_data-after-destroying-hid-device.patch
- From: 5.15.0-125.135
- CVE-2024-41059
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://ubuntu.com/security/CVE-2024-41059
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy-name.patch
- From: 5.15.0-125.135
- CVE-2024-44999
- Description:
gtp: pull network headers in gtp_dev_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-44999
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44999-gtp-pull-network-headers-in-gtp-dev-xmit.patch
- From: 5.15.0-125.135
- CVE-2024-41090
- Description:
tap: add missing verification for short frame
- CVE: https://ubuntu.com/security/CVE-2024-41090
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.15.0-125.135
- CVE-2024-41091
- Description:
tun: add missing verification for short frame
- CVE: https://ubuntu.com/security/CVE-2024-41091
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.15.0-125.135
- CVE-2024-46731
- Description:
drm/amd/pm: fix the Out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46731
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46731-drm-amd-pm-fix-the-out-of-bounds-read-warning.patch
- From: 5.15.0-125.135
- CVE-2024-46723
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46723
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.15.0-125.135
- CVE-2024-46844
- Description:
um: line: always fill *error_out in setup_one_line()
- CVE: https://ubuntu.com/security/CVE-2024-46844
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46844-um-line-always-fill-error-out-in-setup-one-line.patch
- From: 5.15.0-125.135
- CVE-2024-46722
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46722
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.15.0-125.135
- CVE-2024-43882
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://ubuntu.com/security/CVE-2024-43882
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.15.0-125.135
- CVE-2024-46724
- Description:
drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://ubuntu.com/security/CVE-2024-46724
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46724-drm-amdgpu-fix-out-of-bounds-read-of-df-v1-7-channel-number.patch
- From: 5.15.0-125.135
- CVE-2024-46747
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://ubuntu.com/security/CVE-2024-46747
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.15.0-125.135
- CVE-2024-46743
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://ubuntu.com/security/CVE-2024-46743
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.15.0-125.135
- CVE-2024-44983
- Description:
netfilter: flowtable: validate vlan header
- CVE: https://ubuntu.com/security/CVE-2024-44983
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44983-netfilter-flowtable-validate-vlan-header.patch
- From: 5.15.0-125.135
- CVE-2024-38602
- Description:
ax25: Fix reference count leak issues of ax25_dev
- CVE: https://ubuntu.com/security/CVE-2024-38602
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-38602-ax25-fix-reference-count-leak-issues-of-ax25-dev.patch
- From: 5.15.0-125.135
- CVE-2024-40915
- Description:
CVE patch is for RISCV arch only
- CVE:
- Patch: skipped/CVE-2024-40915.patch
- From:
- CVE-2022-48666
- Description:
scsi: core: Fix a use-after-free
- CVE: https://ubuntu.com/security/CVE-2022-48666
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2022-48666-scsi-core-fix-a-use-after-free.patch
- From: 5.15.0-125.135
- CVE-2022-48666
- Description:
scsi: core: Fix a use-after-free
- CVE: https://ubuntu.com/security/CVE-2022-48666
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2022-48666-scsi-core-fix-a-use-after-free-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-26669
- Description:
net/sched: flower: Fix chain template offload
- CVE: https://ubuntu.com/security/CVE-2024-26669
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26669-net-sched-flower-Fix-chain-template-offload.patch
- From: 5.15.0-125.135
- CVE-2024-26669
- Description:
net/sched: flower: Fix chain template offload
- CVE: https://ubuntu.com/security/CVE-2024-26669
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26669-net-sched-flower-Fix-chain-template-offload-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-41073
- Description:
nvme: avoid double free special payload
- CVE: https://ubuntu.com/security/CVE-2024-41073
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41073-nvme-avoid-double-free-special-payload.patch
- From: 5.15.0-125.135
- CVE-2024-41070
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41070.patch
- From:
- CVE-2024-42284
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://ubuntu.com/security/CVE-2024-42284
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.15.0-125.135
- CVE-2024-42280
- Description:
mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://ubuntu.com/security/CVE-2024-42280
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42280-misdn-fix-a-use-after-free-in-hfcmulti-tx.patch
- From: 5.15.0-125.135
- CVE-2024-42271
- Description:
net/iucv: fix use after free in iucv_sock_close()
- CVE: https://ubuntu.com/security/CVE-2024-42271
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv-sock-close.patch
- From: 5.15.0-125.135
- CVE-2024-41011
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://ubuntu.com/security/CVE-2024-41011
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 5.15.0-125.135
- CVE-2024-41071
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://ubuntu.com/security/CVE-2024-41071
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41071-wifi-mac80211-avoid-address-calculations-via-out-of-bounds-array-indexing.patch
- From: 5.15.0-125.135
- CVE-2024-47659
- Description:
smack: tcp: ipv4, fix incorrect labeling
- CVE: https://ubuntu.com/security/CVE-2024-47659
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-47659-smack-tcp-ipv4-fix-incorrect-labeling.patch
- From: 5.15.0-125.135
- CVE-2024-38577
- Description:
rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
- CVE: https://ubuntu.com/security/CVE-2024-38577
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-38577-rcu-tasks-fix-show-rcu-tasks-trace-gp-kthread-buffer-overflow.patch
- From: 5.15.0-125.135
- CVE-2024-42285
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://ubuntu.com/security/CVE-2024-42285
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42285-RDMA-iwcm-Fix-a-use-after-free-related-to-destroying-CM-IDs.patch
- From: 5.15.0-125.135
- CVE-2024-42301
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://ubuntu.com/security/CVE-2024-42301
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 5.15.0-125.135
- CVE-2024-42302
- Description:
Patched function waits for external events, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-42302.patch
- From:
- CVE-2024-42313
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://ubuntu.com/security/CVE-2024-42313
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 5.15.0-125.135
- CVE-2024-43858
- Description:
jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://ubuntu.com/security/CVE-2024-43858
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43858-jfs-fix-array-index-out-of-bounds-in-difree.patch
- From: 5.15.0-125.135
- CVE-2024-43873
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://ubuntu.com/security/CVE-2024-43873
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43873-vhost-vsock-always-initialize-seqpacket-allow.patch
- From: 5.15.0-125.135
- CVE-2024-43873
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://ubuntu.com/security/CVE-2024-43873
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43873-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-44934
- Description:
net: bridge: mcast: wait for previous gc cycles when removing port
- CVE: https://ubuntu.com/security/CVE-2024-44934
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44934-net-bridge-mcast-wait-for-previous-gc-cycles-when-removing-port.patch
- From: 5.15.0-125.135
- CVE-2024-44974
- Description:
mptcp: pm: avoid possible UaF when selecting endp
- CVE: https://ubuntu.com/security/CVE-2024-44974
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44974-mptcp-pm-avoid-possible-UaF-when-selecting-endp.patch
- From: 5.15.0-125.135
- CVE-2024-44985
- Description:
ipv6: prevent possible UAF in ip6_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-44985
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44985-ipv6-prevent-possible-UAF-in-ip6_xmit.patch
- From: 5.15.0-125.135
- CVE-2024-41015
- Description:
ocfs2: add bounds checking to ocfs2_check_dir_entry()
- CVE: https://ubuntu.com/security/CVE-2024-41015
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41015-ocfs2-add-bounds-checking-to-ocfs2-check-dir-entry.patch
- From: 5.15.0-125.135
- CVE-2024-41017
- Description:
jfs: don't walk off the end of ealist
- CVE: https://ubuntu.com/security/CVE-2024-41017
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41017-jfs-don-t-walk-off-the-end-of-ealist.patch
- From: 5.15.0-125.135
- CVE-2024-41019
- Description:
fs/ntfs3: Validate ff offset
- CVE: https://ubuntu.com/security/CVE-2024-41019
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41019-fs-ntfs3-validate-ff-offset.patch
- From: 5.15.0-125.135
- CVE-2024-41020
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://ubuntu.com/security/CVE-2024-41020
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41020-filelock-Remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 5.15.0-125.135
- CVE-2024-41022
- Description:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
- CVE: https://ubuntu.com/security/CVE-2024-41022
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41022-drm-amdgpu-fix-signedness-bug-in-sdma-v4-0-process-trap-irq.patch
- From: 5.15.0-125.135
- CVE-2024-41042
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://ubuntu.com/security/CVE-2024-41042
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41042-netfilter-nf-tables-prefer-nft-chain-validate.patch
- From: 5.15.0-125.135
- CVE-2024-41060
- Description:
drm/radeon: check bo_va->bo is non-NULL before using it
- CVE: https://ubuntu.com/security/CVE-2024-41060
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41060-drm-radeon-check-bo-va-bo-is-non-null-before-using-it.patch
- From: 5.15.0-125.135
- CVE-2024-41063
- Description:
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
- CVE: https://ubuntu.com/security/CVE-2024-41063
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41063-bluetooth-hci-core-cancel-all-works-upon-hci-unregister-dev.patch
- From: 5.15.0-125.135
- CVE-2024-41064
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41064.patch
- From:
- CVE-2024-41065
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41065.patch
- From:
- CVE-2024-41068
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-41068.patch
- From:
- CVE-2024-41072
- Description:
wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
- CVE: https://ubuntu.com/security/CVE-2024-41072
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41072-wifi-cfg80211-wext-add-extra-siocsiwscan-data-check.patch
- From: 5.15.0-125.135
- CVE-2024-41077
- Description:
null_blk: fix validation of block size
- CVE: https://ubuntu.com/security/CVE-2024-41077
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41077-null-blk-fix-validation-of-block-size.patch
- From: 5.15.0-125.135
- CVE-2024-41078
- Description:
btrfs: qgroup: fix quota root leak after quota disable failure
- CVE: https://ubuntu.com/security/CVE-2024-41078
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41078-btrfs-qgroup-fix-quota-root-leak-after-quota-disable-failure.patch
- From: 5.15.0-125.135
- CVE-2024-41081
- Description:
ila: block BH in ila_output()
- CVE: https://ubuntu.com/security/CVE-2024-41081
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41081-ila-block-bh-in-ila-output.patch
- From: 5.15.0-125.135
- CVE-2024-41098
- Description:
ata: libata-core: Fix null pointer dereference on error
- CVE: https://ubuntu.com/security/CVE-2024-41098
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41098-ata-libata-core-fix-null-pointer-dereference-on-error.patch
- From: 5.15.0-125.135
- CVE-2024-42114
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
- CVE: https://ubuntu.com/security/CVE-2024-42114
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values.patch
- From: 5.15.0-125.135
- CVE-2024-42114
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-42114
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42246
- Description:
net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
- CVE: https://ubuntu.com/security/CVE-2024-42246
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42246-net-sunrpc-remap-eperm-in-case-of-connection-failure-in-xs-tcp-setup-socket.patch
- From: 5.15.0-125.135
- CVE-2024-42126
- Description:
powerpc arch not supported.
- CVE:
- Patch: skipped/CVE-2024-42126.patch
- From:
- CVE-2024-42259
- Description:
drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
- CVE: https://ubuntu.com/security/CVE-2024-42259
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42259-drm-i915-gem-fix-virtual-memory-mapping-boundaries-calculation.patch
- From: 5.15.0-125.135
- CVE-2024-43839
- Description:
bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
- CVE: https://ubuntu.com/security/CVE-2024-43839
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43839-bna-adjust-name-buf-size-of-bna-tcb-and-bna-ccb-structures.patch
- From: 5.15.0-125.135
- CVE-2024-46782
- Description:
ila: call nf_unregister_net_hooks() sooner
- CVE: https://ubuntu.com/security/CVE-2024-46782
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46782-ila-call-nf_unregister_net_hooks-sooner-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-42265
- Description:
protect the fetch of ->fd[fd] in do_dup2() from mispredictions
- CVE: https://ubuntu.com/security/CVE-2024-42265
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42265-protect-the-fetch-of-fd-fd-in-do-dup2-from-mispredictions.patch
- From: 5.15.0-125.135
- CVE-2024-42267
- Description:
RISCV arch not supported.
- CVE:
- Patch: skipped/CVE-2024-42267.patch
- From:
- CVE-2024-42269
- Description:
netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init().
- CVE: https://ubuntu.com/security/CVE-2024-42269
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42269-netfilter-iptables-fix-potential-null-ptr-deref-in-ip6table-nat-table-init.patch
- From: 5.15.0-125.135
- CVE-2024-42270
- Description:
netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init().
- CVE: https://ubuntu.com/security/CVE-2024-42270
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42270-netfilter-iptables-fix-null-ptr-deref-in-iptable-nat-table-init.patch
- From: 5.15.0-125.135
- CVE-2024-42277
- Description:
iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en
- CVE: https://ubuntu.com/security/CVE-2024-42277
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42277-iommu-sprd-avoid-null-deref-in-sprd-iommu-hw-en.patch
- From: 5.15.0-125.135
- CVE-2024-42281
- Description:
bpf: Fix a segment issue when downgrading gso_size
- CVE: https://ubuntu.com/security/CVE-2024-42281
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42281-bpf-fix-a-segment-issue-when-downgrading-gso-size.patch
- From: 5.15.0-125.135
- CVE-2024-42283
- Description:
net: nexthop: Initialize all fields in dumped nexthops
- CVE: https://ubuntu.com/security/CVE-2024-42283
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42283-net-nexthop-initialize-all-fields-in-dumped-nexthops.patch
- From: 5.15.0-125.135
- CVE-2024-42296
- Description:
f2fs: fix return value of f2fs_convert_inline_inode()
- CVE: https://ubuntu.com/security/CVE-2024-42296
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42296-f2fs-fix-return-value-of-f2fs-convert-inline-inode.patch
- From: 5.15.0-125.135
- CVE-2024-42287
- Description:
scsi: qla2xxx: Complete command early within lock
- CVE: https://ubuntu.com/security/CVE-2024-42287
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42287-scsi-qla2xxx-complete-command-early-within-lock.patch
- From: 5.15.0-125.135
- CVE-2024-46771
- Description:
can: bcm: Remove proc entry when dev is unregistered.
- CVE: https://ubuntu.com/security/CVE-2024-46771
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46771-can-bcm-remove-proc-entry-when-dev-is-unregistered.patch
- From: 5.15.0-125.135
- CVE-2024-42297
- Description:
f2fs: fix to don't dirty inode for readonly filesystem
- CVE: https://ubuntu.com/security/CVE-2024-42297
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42297-f2fs-fix-to-don-t-dirty-inode-for-readonly-filesystem.patch
- From: 5.15.0-125.135
- CVE-2024-42299
- Description:
fs/ntfs3: Update log->page_{mask,bits} if log->page_size changed
- CVE: https://ubuntu.com/security/CVE-2024-42299
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42299-fs-ntfs3-update-log-page-mask-bits-if-log-page-size-changed.patch
- From: 5.15.0-125.135
- CVE-2024-42292
- Description:
kobject_uevent: Fix OOB access within zap_modalias_env()
- CVE: https://ubuntu.com/security/CVE-2024-42292
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42292-kobject-uevent-fix-oob-access-within-zap-modalias-env.patch
- From: 5.15.0-125.135
- CVE-2024-42288
- Description:
scsi: qla2xxx: Fix for possible memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-42288
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42288-scsi-qla2xxx-fix-for-possible-memory-corruption.patch
- From: 5.15.0-125.135
- CVE-2024-42286
- Description:
scsi: qla2xxx: validate nvme_local_port correctly
- CVE: https://ubuntu.com/security/CVE-2024-42286
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42286-scsi-qla2xxx-validate-nvme-local-port-correctly.patch
- From: 5.15.0-125.135
- CVE-2024-42295
- Description:
nilfs2: handle inconsistent state in nilfs_btnode_create_block()
- CVE: https://ubuntu.com/security/CVE-2024-42295
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42295-nilfs2-handle-inconsistent-state-in-nilfs-btnode-create-block.patch
- From: 5.15.0-125.135
- CVE-2024-46804
- Description:
drm/amd/display: Add array index check for hdcp ddc access
- CVE: https://ubuntu.com/security/CVE-2024-46804
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46804-drm-amd-display-add-array-index-check-for-hdcp-ddc-access-5.15.0-119.129.patch
- From: 5.15.0-125.135
- CVE-2024-46818
- Description:
drm/amd/display: Check gpio_id before used as array index
- CVE: https://ubuntu.com/security/CVE-2024-46818
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46818-drm-amd-display-check-gpio-id-before-used-as-array-index.patch
- From: 5.15.0-125.135
- CVE-2024-46814
- Description:
drm/amd/display: Check msg_id before processing transcation
- CVE: https://ubuntu.com/security/CVE-2024-46814
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46814-drm-amd-display-check-msg-id-before-processing-transcation.patch
- From: 5.15.0-125.135
- CVE-2024-46800
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://ubuntu.com/security/CVE-2024-46800
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.15.0-125.135
- CVE-2024-46798
- Description:
ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://ubuntu.com/security/CVE-2024-46798
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46798-asoc-dapm-fix-uaf-for-snd-soc-pcm-runtime-object.patch
- From: 5.15.0-125.135
- CVE-2024-46759
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46759
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2024-46758
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46758
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2024-46757
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46757
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2024-46756
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46756
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2023-52889
- Description:
apparmor: Fix null pointer deref when receiving skb during sock creation
- CVE: https://ubuntu.com/security/CVE-2023-52889
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2023-52889-apparmor-fix-null-pointer-deref-when-receiving-skb-during-sock-creation.patch
- From: 5.15.0-125.135
- CVE-2023-52918
- Description:
media: pci: cx23885: check cx23885_vdev_init() return
- CVE: https://ubuntu.com/security/CVE-2023-52918
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2023-52918-media-pci-cx23885-check-cx23885-vdev-init-return.patch
- From: 5.15.0-125.135
- CVE-2024-26661
- Description:
drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'
- CVE: https://ubuntu.com/security/CVE-2024-26661
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26661-drm-amd-display-Add-NULL-test-for-timing-generator-i.patch
- From: 5.15.0-125.135
- CVE-2024-38611
- Description:
media: i2c: et8ek8: Don't strip remove function when driver is builtin
- CVE: https://ubuntu.com/security/CVE-2024-38611
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-38611-media-i2c-et8ek8-don-t-strip-remove-function-when-driver-is-builtin.patch
- From: 5.15.0-125.135
- CVE-2024-39472
- Description:
xfs: fix log recovery buffer allocation for the legacy h_size fixup
- CVE: https://ubuntu.com/security/CVE-2024-39472
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-39472-xfs-fix-log-recovery-buffer-allocation-for-the-legacy-h-size-fixup.patch
- From: 5.15.0-125.135
- CVE-2024-41012
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://ubuntu.com/security/CVE-2024-41012
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41012-filelock-remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 5.15.0-125.135
- CVE-2024-42289
- Description:
scsi: qla2xxx: During vport delete send async logout explicitly
- CVE: https://ubuntu.com/security/CVE-2024-42289
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42289-scsi-qla2xxx-during-vport-delete-send-async-logout-explicitly.patch
- From: 5.15.0-125.135
- CVE-2024-44940
- Description:
fou: remove warn in gue_gro_receive on unsupported protocol
- CVE: https://ubuntu.com/security/CVE-2024-44940
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-44940-fou-remove-warn-in-gue-gro-receive-on-unsupported-protocol-5.15.0-124.134.patch
- From: 5.15.0-127.137
- CVE-2024-38667
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-38667.patch
- From:
- CVE-2024-44942
- Description:
f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC
- CVE: https://ubuntu.com/security/CVE-2024-44942
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-44942-f2fs-fix-to-do-sanity-check-on-f2fs-inline-data-flag-in-inode-during-gc.patch
- From: 5.15.0-127.137
- CVE-2024-46853
- Description:
spi: nxp-fspi: fix the KASAN report out-of-bounds bug
- CVE: https://ubuntu.com/security/CVE-2024-46853
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46853-spi-nxp-fspi-fix-the-kasan-report-out-of-bounds-bug.patch
- From: 5.15.0-127.137
- CVE-2024-46852
- Description:
dma-buf: heaps: Fix off-by-one in CMA heap fault handler
- CVE: https://ubuntu.com/security/CVE-2024-46852
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46852-dma-buf-heaps-fix-off-by-one-in-cma-heap-fault-handler.patch
- From: 5.15.0-127.137
- CVE-2024-46849
- Description:
ASoC: meson: axg-card: fix 'use-after-free'
- CVE: https://ubuntu.com/security/CVE-2024-46849
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46849-asoc-meson-axg-card-fix-use-after-free.patch
- From: 5.15.0-127.137
- CVE-2024-47685
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://ubuntu.com/security/CVE-2024-47685
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.15.0-127.137
- CVE-2024-39463
- Description:
9p: add missing locking around taking dentry fid list
- CVE: https://ubuntu.com/security/CVE-2024-39463
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-39463-9p-add-missing-locking-around-taking-dentry-fid-list.patch
- From: 5.15.0-127.137
- CVE-2024-49966
- Description:
ocfs2: cancel dqi_sync_work before freeing oinfo
- CVE: https://ubuntu.com/security/CVE-2024-49966
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49966-ocfs2-cancel-dqi-sync-work-before-freeing-oinfo.patch
- From: 5.15.0-127.137
- CVE-2024-49936
- Description:
net/xen-netback: prevent UAF in xenvif_flush_hash()
- CVE: https://ubuntu.com/security/CVE-2024-49936
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49936-net-xen-netback-prevent-uaf-in-xenvif-flush-hash.patch
- From: 5.15.0-127.137
- CVE-2024-49930
- Description:
wifi: ath11k: fix array out-of-bound access in SoC stats
- CVE: https://ubuntu.com/security/CVE-2024-49930
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49930-wifi-ath11k-fix-array-out-of-bound-access-in-soc-stats.patch
- From: 5.15.0-127.137
- CVE-2024-49924
- Description:
fbdev: pxafb: Fix possible use after free in pxafb_task()
- CVE: https://ubuntu.com/security/CVE-2024-49924
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49924-fbdev-pxafb-fix-possible-use-after-free-in-pxafb-task.patch
- From: 5.15.0-127.137
- CVE-2024-49895
- Description:
drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation
- CVE: https://ubuntu.com/security/CVE-2024-49895
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49895-drm-amd-display-fix-index-out-of-bounds-in-dcn30-degamma-hardware-format-translation.patch
- From: 5.15.0-127.137
- CVE-2024-49894
- Description:
drm/amd/display: Fix index out of bounds in degamma hardware format translation
- CVE: https://ubuntu.com/security/CVE-2024-49894
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49894-drm-amd-display-fix-index-out-of-bounds-in-degamma-hardware-format-translation.patch
- From: 5.15.0-127.137
- CVE-2024-49889
- Description:
ext4: avoid use-after-free in ext4_ext_show_leaf()
- CVE: https://ubuntu.com/security/CVE-2024-49889
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49889-ext4-avoid-use-after-free-in-ext4-ext-show-leaf.patch
- From: 5.15.0-127.137
- CVE-2024-49884
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://ubuntu.com/security/CVE-2024-49884
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49884-ext4-fix-slab-use-after-free-in-ext4-split-extent-at.patch
- From: 5.15.0-127.137
- CVE-2024-49883
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://ubuntu.com/security/CVE-2024-49883
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 5.15.0-127.137
- CVE-2024-49882
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://ubuntu.com/security/CVE-2024-49882
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path.patch
- From: 5.15.0-127.137
- CVE-2024-47670
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-47670
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.15.0-127.137
- CVE-2024-47718
- Description:
wifi: rtw88: always wait for both firmware loading attempts
- CVE: https://ubuntu.com/security/CVE-2024-47718
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47718-wifi-rtw88-always-wait-for-both-firmware-loading-attempts.patch
- From: 5.15.0-127.137
- CVE-2024-47701
- Description:
ext4: avoid OOB when system.data xattr changes underneath the filesystem
- CVE: https://ubuntu.com/security/CVE-2024-47701
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47701-ext4-avoid-oob-when-system-data-xattr-changes-underneath-the-filesystem.patch
- From: 5.15.0-127.137
- CVE-2024-47698
- Description:
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47698
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47698-drivers-media-dvb-frontends-rtl2832-fix-an-out-of-bounds-write-error.patch
- From: 5.15.0-127.137
- CVE-2024-47697
- Description:
drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47697
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47697-drivers-media-dvb-frontends-rtl2830-fix-an-out-of-bounds-write-error.patch
- From: 5.15.0-127.137
- CVE-2024-49852
- Description:
scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
- CVE: https://ubuntu.com/security/CVE-2024-49852
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49852-scsi-elx-libefc-fix-potential-use-after-free-in-efc-nport-vport-del.patch
- From: 5.15.0-127.137
- CVE-2024-47695
- Description:
RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds
- CVE: https://ubuntu.com/security/CVE-2024-47695
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47695-rdma-rtrs-clt-reset-cid-to-con-num-1-to-stay-in-bounds.patch
- From: 5.15.0-127.137
- CVE-2024-47742
- Description:
firmware_loader: Block path traversal
- CVE: https://ubuntu.com/security/CVE-2024-47742
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47742-firmware-loader-block-path-traversal.patch
- From: 5.15.0-127.137
- CVE-2024-49997
- Description:
net: ethernet: lantiq_etop: fix memory disclosure
- CVE: https://ubuntu.com/security/CVE-2024-49997
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49997-net-ethernet-lantiq-etop-fix-memory-disclosure.patch
- From: 5.15.0-127.137
- CVE-2024-38538
- Description:
net: bridge: xmit: make sure we have at least eth header len bytes
- CVE: https://ubuntu.com/security/CVE-2024-38538
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-header-len-bytes.patch
- From: 5.15.0-127.137
- CVE-2024-49995
- Description:
tipc: guard against string buffer overrun
- CVE: https://ubuntu.com/security/CVE-2024-49995
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 5.15.0-127.137
- CVE-2024-50007
- Description:
ALSA: asihpi: Fix potential OOB array access
- CVE: https://ubuntu.com/security/CVE-2024-50007
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50007-alsa-asihpi-fix-potential-oob-array-access.patch
- From: 5.15.0-127.137
- CVE-2024-49967
- Description:
ext4: no need to continue when the number of entries is 1
- CVE: https://ubuntu.com/security/CVE-2024-49967
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49967-ext4-no-need-to-continue-when-the-number-of-entries-is-1.patch
- From: 5.15.0-127.137
- CVE-2024-49983
- Description:
ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free
- CVE: https://ubuntu.com/security/CVE-2024-49983
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49983-ext4-drop-ppath-from-ext4-ext-replay-update-ex-to-avoid-double-free.patch
- From: 5.15.0-127.137
- CVE-2024-49982
- Description:
aoe: fix the potential use-after-free problem in more places
- CVE: https://ubuntu.com/security/CVE-2024-49982
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49982-aoe-fix-the-potential-use-after-free-problem-in-more-places.patch
- From: 5.15.0-127.137
- CVE-2024-50180
- Description:
fbdev: sisfb: Fix strbuf array overflow
- CVE: https://ubuntu.com/security/CVE-2024-50180
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50180-fbdev-sisfb-fix-strbuf-array-overflow.patch
- From: 5.15.0-127.137
- CVE-2024-50186
- Description:
net: explicitly clear the sk pointer, when pf->create fails
- CVE: https://ubuntu.com/security/CVE-2024-50186
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50186-net-explicitly-clear-the-sk-pointer-when-pf-create-fails.patch
- From: 5.15.0-127.137
- CVE-2024-49969
- Description:
drm/amd/display: Fix index out of bounds in DCN30 color transformation
- CVE: https://ubuntu.com/security/CVE-2024-49969
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49969-drm-amd-display-fix-index-out-of-bounds-in-dcn30-color-transformation.patch
- From: 5.15.0-127.137
- CVE-2024-46858
- Description:
mptcp: pm: Fix uaf in __timer_delete_sync
- CVE: https://ubuntu.com/security/CVE-2024-46858
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46858-mptcp-pm-fix-uaf-in-timer-delete-sync.patch
- From: 5.15.0-127.137
- CVE-2024-46854
- Description:
net: dpaa: Pad packets to ETH_ZLEN
- CVE: https://ubuntu.com/security/CVE-2024-46854
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46854-net-dpaa-pad-packets-to-eth-zlen.patch
- From: 5.15.0-127.137
- CVE-2024-47723
- Description:
jfs: fix out-of-bounds in dbNextAG() and diAlloc()
- CVE: https://ubuntu.com/security/CVE-2024-47723
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47723-jfs-fix-out-of-bounds-in-dbnextag-and-dialloc.patch
- From: 5.15.0-127.137
- CVE-2024-47747
- Description:
net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2024-47747
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47747-net-seeq-fix-use-after-free-vulnerability-in-ether3-driver-due-to-race-condition.patch
- From: 5.15.0-127.137
- CVE-2024-49860
- Description:
ACPI: sysfs: validate return type of _STR method
- CVE: https://ubuntu.com/security/CVE-2024-49860
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49860-acpi-sysfs-validate-return-type-of-str-method.patch
- From: 5.15.0-127.137
- CVE-2024-49903
- Description:
jfs: Fix uaf in dbFreeBits
- CVE: https://ubuntu.com/security/CVE-2024-49903
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49903-jfs-fix-uaf-in-dbfreebits.patch
- From: 5.15.0-127.137
- CVE-2024-49900
- Description:
jfs: Fix uninit-value access of new_ea in ea_buffer
- CVE: https://ubuntu.com/security/CVE-2024-49900
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49900-jfs-fix-uninit-value-access-of-new-ea-in-ea-buffer.patch
- From: 5.15.0-127.137
- CVE-2024-50035
- Description:
ppp: fix ppp_async_encode() illegal access
- CVE: https://ubuntu.com/security/CVE-2024-50035
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50035-ppp-fix-ppp-async-encode-illegal-access.patch
- From: 5.15.0-127.137
- CVE-2024-50033
- Description:
slip: make slhc_remember() more robust against malicious packets
- CVE: https://ubuntu.com/security/CVE-2024-50033
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50033-slip-make-slhc-remember-more-robust-against-malicious-packets.patch
- From: 5.15.0-127.137
- CVE-2024-49981
- Description:
media: venus: fix use after free bug in venus_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-49981
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49981-media-venus-fix-use-after-free-bug-in-venus-remove-due-to-race-condition.patch
- From: 5.15.0-127.137
- CVE-2024-47757
- Description:
nilfs2: fix potential oob read in nilfs_btree_check_delete()
- CVE: https://ubuntu.com/security/CVE-2024-47757
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47757-nilfs2-fix-potential-oob-read-in-nilfs-btree-check-delete.patch
- From: 5.15.0-127.137
- CVE-2024-50059
- Description:
ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-50059
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50059-ntb-ntb-hw-switchtec-fix-use-after-free-vulnerability-in-switchtec-ntb-remove-due-to-race-condition.patch
- From: 5.15.0-127.137
- CVE-2024-47748
- Description:
vhost_vdpa: assign irq bypass producer token correctly
- CVE: https://ubuntu.com/security/CVE-2024-47748
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47748-vhost_vdpa-assign-irq-bypass-producer-token-correctly.patch
- From: 5.15.0-127.137
- CVE-2023-52917
- Description:
ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir()
- CVE: https://ubuntu.com/security/CVE-2023-52917
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2023-52917-ntb-intel-fix-the-null-vs-is-err-bug-for-debugfs-create-dir.patch
- From: 5.15.0-127.137
- CVE-2024-47692
- Description:
nfsd: return -EINVAL when namelen is 0
- CVE: https://ubuntu.com/security/CVE-2024-47692
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47692-nfsd-return-einval-when-namelen-is-0.patch
- From: 5.15.0-127.137
- CVE-2024-27072
- Description:
media: usbtv: Remove useless locks in usbtv_video_free()
- CVE: https://ubuntu.com/security/CVE-2024-27072
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-27072-media-usbtv-remove-useless-locks-in-usbtv-video-free.patch
- From: 5.15.0-127.137
- CVE-2024-38544
- Description:
RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt
- CVE: https://ubuntu.com/security/CVE-2024-38544
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-38544-rdma-rxe-fix-seg-fault-in-rxe-comp-queue-pkt.patch
- From: 5.15.0-127.137
- CVE-2024-47693
- Description:
IB/core: Fix ib_cache_setup_one error flow cleanup
- CVE: https://ubuntu.com/security/CVE-2024-47693
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47693-ib-core-fix-ib-cache-setup-one-error-flow-cleanup.patch
- From: 5.15.0-127.137
- CVE-2023-52532
- Description:
net: mana: Fix TX CQE error handling
- CVE: https://ubuntu.com/security/CVE-2023-52532
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2023-52532-net-mana-Fix-TX-CQE-error-handling.patch
- From: 5.15.0-127.137
- CVE-2023-52639
- Description:
s390 architecture is not supported
- CVE:
- Patch: skipped/CVE-2023-52639.patch
- From:
- CVE-2024-26947
- Description:
ARM related CVE
- CVE:
- Patch: skipped/CVE-2024-26947.patch
- From:
- CVE-2024-35904
- Description:
Affects only __init function for a built-in component, so patching will have no effect
- CVE:
- Patch: skipped/CVE-2024-35904.patch
- From:
- CVE-2024-36893
- Description:
usb: typec: tcpm: Check for port partner validity before consuming it
- CVE: https://ubuntu.com/security/CVE-2024-36893
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-36893-usb-typec-tcpm-check-for-port-partner-validity-before-consuming-it.patch
- From: 5.15.0-127.137
- CVE-2024-38632
- Description:
vfio/pci: fix potential memory leak in vfio_intx_enable()
- CVE: https://ubuntu.com/security/CVE-2024-38632
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-38632-vfio-pci-fix-potential-memory-leak-in-vfio-intx-enable.patch
- From: 5.15.0-127.137
- CVE-2024-41016
- Description:
ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-41016
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-41016-ocfs2-strict-bound-check-before-memcmp-in-ocfs2-xattr-find-entry.patch
- From: 5.15.0-127.137
- CVE-2024-42079
- Description:
gfs2: Fix NULL pointer dereference in gfs2_log_flush
- CVE: https://ubuntu.com/security/CVE-2024-42079
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-42079-gfs2-fix-null-pointer-dereference-in-gfs2-log-flush.patch
- From: 5.15.0-127.137
- CVE-2024-42156
- Description:
Out of scope: s390 is not supported
- CVE:
- Patch: skipped/CVE-2024-42156.patch
- From:
- CVE-2024-42158
- Description:
Out of scope: s390 is not supported
- CVE:
- Patch: skipped/CVE-2024-42158.patch
- From:
- CVE-2024-44931
- Description:
gpio: prevent potential speculation leaks in gpio_device_get_desc()
- CVE: https://ubuntu.com/security/CVE-2024-44931
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-44931-gpio-prevent-potential-speculation-leaks-in-gpio-device-get-desc.patch
- From: 5.15.0-127.137
- CVE-2024-46695
- Description:
selinux,smack: don't bypass permissions check in inode_setsecctx hook
- CVE: https://ubuntu.com/security/CVE-2024-46695
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46695-selinux-smack-don-t-bypass-permissions-check-in-inode-setsecctx-hook.patch
- From: 5.15.0-127.137
- CVE-2024-46855
- Description:
netfilter: nft_socket: fix sk refcount leaks
- CVE: https://ubuntu.com/security/CVE-2024-46855
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46855-netfilter-nft-socket-fix-sk-refcount-leaks.patch
- From: 5.15.0-127.137
- CVE-2024-47671
- Description:
USB: usbtmc: prevent kernel-usb-infoleak
- CVE: https://ubuntu.com/security/CVE-2024-47671
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47671-usb-usbtmc-prevent-kernel-usb-infoleak.patch
- From: 5.15.0-127.137
- CVE-2024-47672
- Description:
wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead
- CVE: https://ubuntu.com/security/CVE-2024-47672
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47672-wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmware-is-dead.patch
- From: 5.15.0-127.137
- CVE-2024-47673
- Description:
wifi: iwlwifi: mvm: pause TCM when the firmware is stopped
- CVE: https://ubuntu.com/security/CVE-2024-47673
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47673-wifi-iwlwifi-mvm-pause-tcm-when-the-firmware-is-stopped.patch
- From: 5.15.0-127.137
- CVE-2024-47674
- Description:
mm: avoid leaving partial pfn mappings around in error case
- CVE: https://ubuntu.com/security/CVE-2024-47674
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47674-mm-avoid-leaving-partial-pfn-mappings-around-in-error-case.patch
- From: 5.15.0-127.137
- CVE-2024-47679
- Description:
vfs: fix race between evice_inodes() and find_inode()&iput()
- CVE: https://ubuntu.com/security/CVE-2024-47679
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47679-vfs-fix-race-between-evice-inodes-and-find-inode-iput.patch
- From: 5.15.0-127.137
- CVE-2024-47684
- Description:
tcp: check skb is non-NULL in tcp_rto_delta_us()
- CVE: https://ubuntu.com/security/CVE-2024-47684
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47684-tcp-check-skb-is-non-null-in-tcp-rto-delta-us.patch
- From: 5.15.0-127.137
- CVE-2024-47684
- Description:
tcp: check skb is non-NULL in tcp_rto_delta_us()
- CVE: https://ubuntu.com/security/CVE-2024-47684
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47684-tcp-check-skb-is-non-null-in-tcp-rto-delta-us-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-47699
- Description:
nilfs2: fix potential null-ptr-deref in nilfs_btree_insert()
- CVE: https://ubuntu.com/security/CVE-2024-47699
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47699-nilfs2-fix-potential-null-ptr-deref-in-nilfs-btree-insert.patch
- From: 5.15.0-127.137
- CVE-2024-47699
- Description:
nilfs2: determine empty node blocks as corrupted
- CVE: https://ubuntu.com/security/CVE-2024-47699
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47699-nilfs2-determine-empty-node-blocks-as-corrupted.patch
- From: 5.15.0-127.137
- CVE-2024-47705
- Description:
block: fix potential invalid pointer dereference in blk_add_partition
- CVE: https://ubuntu.com/security/CVE-2024-47705
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47705-block-fix-potential-invalid-pointer-dereference-in-blk-add-partition.patch
- From: 5.15.0-127.137
- CVE-2024-49959
- Description:
jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error
- CVE: https://ubuntu.com/security/CVE-2024-49959
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49959-jbd2-stop-waiting-for-space-when-jbd2-cleanup-journal-tail-returns-error.patch
- From: 5.15.0-127.137
- CVE-2024-49958
- Description:
ocfs2: reserve space for inline xattr before attaching reflink tree
- CVE: https://ubuntu.com/security/CVE-2024-49958
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49958-ocfs2-reserve-space-for-inline-xattr-before-attaching-reflink-tree.patch
- From: 5.15.0-127.137
- CVE-2024-49965
- Description:
ocfs2: remove unreasonable unlock in ocfs2_read_blocks
- CVE: https://ubuntu.com/security/CVE-2024-49965
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49965-ocfs2-remove-unreasonable-unlock-in-ocfs2-read-blocks.patch
- From: 5.15.0-127.137
- CVE-2024-49954
- Description:
static_call: Replace pointless WARN_ON() in static_call_module_notify()
- CVE: https://ubuntu.com/security/CVE-2024-49954
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49954-static-call-replace-pointless-warn-on-in-static-call-module-notify.patch
- From: 5.15.0-127.137
- CVE-2024-49962
- Description:
ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package()
- CVE: https://ubuntu.com/security/CVE-2024-49962
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49962-acpica-check-null-return-of-acpi-allocate-zeroed-in-acpi-db-convert-to-package.patch
- From: 5.15.0-127.137
- CVE-2024-49955
- Description:
ACPI: battery: Fix possible crash when unregistering a battery hook
- CVE: https://ubuntu.com/security/CVE-2024-49955
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49955-acpi-battery-fix-possible-crash-when-unregistering-a-battery-hook.patch
- From: 5.15.0-127.137
- CVE-2024-49957
- Description:
ocfs2: fix null-ptr-deref when journal load failed.
- CVE: https://ubuntu.com/security/CVE-2024-49957
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49957-ocfs2-fix-null-ptr-deref-when-journal-load-failed.patch
- From: 5.15.0-127.137
- CVE-2024-49949
- Description:
net: avoid potential underflow in qdisc_pkt_len_init() with UFO
- CVE: https://ubuntu.com/security/CVE-2024-49949
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49949-net-avoid-potential-underflow-in-qdisc-pkt-len-init-with-ufo.patch
- From: 5.15.0-127.137
- CVE-2024-49952
- Description:
netfilter: nf_tables: prevent nf_skb_duplicated corruption
- CVE: https://ubuntu.com/security/CVE-2024-49952
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49952-netfilter-nf-tables-prevent-nf-skb-duplicated-corruption.patch
- From: 5.15.0-127.137
- CVE-2024-49851
- Description:
tpm: Clean up TPM space after command failure
- CVE: https://ubuntu.com/security/CVE-2024-49851
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49851-tpm-clean-up-tpm-space-after-command-failure.patch
- From: 5.15.0-127.137
- CVE-2024-47749
- Description:
RDMA/cxgb4: Added NULL check for lookup_atid
- CVE: https://ubuntu.com/security/CVE-2024-47749
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47749-rdma-cxgb4-added-null-check-for-lookup-atid.patch
- From: 5.15.0-127.137
- CVE-2024-49858
- Description:
Out of scope: EFI libstub fix, running kernels not vulnerable.
- CVE:
- Patch: skipped/CVE-2024-49858.patch
- From:
- CVE-2024-47740
- Description:
f2fs: Require FMODE_WRITE for atomic write ioctls
- CVE: https://ubuntu.com/security/CVE-2024-47740
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47740-f2fs-require-fmode-write-for-atomic-write-ioctls.patch
- From: 5.15.0-127.137
- CVE-2024-49868
- Description:
btrfs: fix a NULL pointer dereference when failed to start a new trasacntion
- CVE: https://ubuntu.com/security/CVE-2024-49868
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49868-btrfs-fix-a-null-pointer-dereference-when-failed-to-start-a-new-trasacntion.patch
- From: 5.15.0-127.137
- CVE-2024-49867
- Description:
btrfs: wait for fixup workers before stopping cleaner kthread during umount
- CVE: https://ubuntu.com/security/CVE-2024-49867
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49867-btrfs-wait-for-fixup-workers-before-stopping-cleaner-kthread-during-umount.patch
- From: 5.15.0-127.137
- CVE-2024-49866
- Description:
tracing/timerlat: Fix a race during cpuhp processing
- CVE: https://ubuntu.com/security/CVE-2024-49866
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49866-tracing-timerlat-fix-a-race-during-cpuhp-processing.patch
- From: 5.15.0-127.137
- CVE-2024-49856
- Description:
x86/sgx: Fix deadlock in SGX NUMA node search
- CVE: https://ubuntu.com/security/CVE-2024-49856
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49856-x86-sgx-fix-deadlock-in-sgx-numa-node-search.patch
- From: 5.15.0-127.137
- CVE-2024-49863
- Description:
vhost/scsi: null-ptr-dereference in vhost_scsi_get_req()
- CVE: https://ubuntu.com/security/CVE-2024-49863
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49863-vhost-scsi-null-ptr-dereference-in-vhost-scsi-get-req.patch
- From: 5.15.0-127.137
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://ubuntu.com/security/CVE-2024-47696
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47696-RDMA-iwcm-Fix-WARNING-at_kernel-workqueue.c-check_flush_dependency.patch
- From: 5.15.0-127.137
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://ubuntu.com/security/CVE-2024-47696
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47696-RDMA-iwcm-Fix-WARNING-at_kernel-workqueue.c-check_flush_dependency-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-49963
- Description:
Out of scope as the patch is for arm64 arch only, x86_64 not affected
- CVE:
- Patch: skipped/CVE-2024-49963.patch
- From:
- CVE-2024-36968
- Description:
Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
- CVE: https://ubuntu.com/security/CVE-2024-36968
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-36968-bluetooth-l2cap-fix-div-by-zero-in-l2cap-le-flowctl-init.patch
- From: 5.15.0-127.137
- CVE-2024-36968
- Description:
Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-36968
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-36968-bluetooth-l2cap-fix-div-by-zero-in-l2cap-le-flowctl-init-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-50181
- Description:
Out of scope, i.MX SoC is not supported
- CVE:
- Patch: skipped/CVE-2024-50181.patch
- From:
- CVE-2024-47706
- Description:
block, bfq: fix possible UAF for bfqq->bic with merge chain
- CVE: https://ubuntu.com/security/CVE-2024-47706
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47706-block-bfq-fix-possible-UAF-for-bfqq-bic-with-merge-chain.patch
- From: 5.15.0-127.137
- CVE-2024-47709
- Description:
can: bcm: Clear bo->bcm_proc_read after remove_proc_entry()
- CVE: https://ubuntu.com/security/CVE-2024-47709
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47709-can-bcm-Clear-bo-bcm_proc_read-after-remove_proc_entry.patch
- From: 5.15.0-127.137
- CVE-2024-47710
- Description:
sock_map: Add a cond_resched() in sock_hash_free()
- CVE: https://ubuntu.com/security/CVE-2024-47710
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47710-sock_map-Add-a-cond_resched-in-sock_hash_free.patch
- From: 5.15.0-127.137
- CVE-2024-47712
- Description:
wifi: wilc1000: fix ies_len type in connect path
- CVE: https://ubuntu.com/security/CVE-2024-47712
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47712-wifi-wilc1000-fix-ies_len-type-in-connect-path.patch
- From: 5.15.0-127.137
- CVE-2024-47712
- Description:
wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param
- CVE: https://ubuntu.com/security/CVE-2024-47712
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47712-wifi-wilc1000-fix-potential-RCU-dereference-issue-in-wilc_parse_join_bss_param.patch
- From: 5.15.0-127.137
- CVE-2024-47713
- Description:
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
- CVE: https://ubuntu.com/security/CVE-2024-47713
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47713-wifi-mac80211-use-two-phase-skb-reclamation-in-ieee80211_do_stop.patch
- From: 5.15.0-127.137
- CVE-2024-47720
- Description:
drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func
- CVE: https://ubuntu.com/security/CVE-2024-47720
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47720-drm-amd-display-Add-null-check-for-set_output_gamma-in-dcn30_set_output_transfer_func.patch
- From: 5.15.0-127.137
- CVE-2024-47734
- Description:
bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()
- CVE: https://ubuntu.com/security/CVE-2024-47734
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47734-bonding-Fix-unnecessary-warnings-and-logs-from-bond_xdp_get_xmit_slave.patch
- From: 5.15.0-127.137
- CVE-2024-47735
- Description:
RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled
- CVE: https://ubuntu.com/security/CVE-2024-47735
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47735-RDMA-hns-Fix-spin_unlock_irqrestore-called-with-IRQs-enabled.patch
- From: 5.15.0-127.137
- CVE-2024-47737
- Description:
nfsd: call cache_put if xdr_reserve_space returns NULL
- CVE: https://ubuntu.com/security/CVE-2024-47737
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47737-nfsd-call-cache-put-if-xdr-reserve-space-returns-null.patch
- From: 5.15.0-127.137
- CVE-2024-47739
- Description:
padata: use integer wrap around to prevent deadlock on seq_nr overflow
- CVE: https://ubuntu.com/security/CVE-2024-47739
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47739-padata-use-integer-wrap-around-to-prevent-deadlock-on-seq_nr-overflow.patch
- From: 5.15.0-127.137
- CVE-2024-49878
- Description:
resource: fix region_intersects() vs add_memory_driver_managed()
- CVE: https://ubuntu.com/security/CVE-2024-49878
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49878-resource-fix-region-intersects-vs-add-memory-driver-managed.patch
- From: 5.15.0-127.137
- CVE-2024-49879
- Description:
drm: omapdrm: Add missing check for alloc_ordered_workqueue
- CVE: https://ubuntu.com/security/CVE-2024-49879
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49879-drm-omapdrm-add-missing-check-for-alloc-ordered-workqueue.patch
- From: 5.15.0-127.137
- CVE-2024-49881
- Description:
ext4: update orig_path in ext4_find_extent()
- CVE: https://ubuntu.com/security/CVE-2024-49881
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49881-ext4-update-orig-path-in-ext4-find-extent.patch
- From: 5.15.0-127.137
- CVE-2024-49886
- Description:
platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug
- CVE: https://ubuntu.com/security/CVE-2024-49886
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49886-platform-x86-isst-fix-the-kasan-report-slab-out-of-bounds-bug.patch
- From: 5.15.0-127.137
- CVE-2024-49890
- Description:
drm/amd/pm: ensure the fw_info is not null before using it
- CVE: https://ubuntu.com/security/CVE-2024-49890
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49890-drm-amd-pm-ensure-the-fw-info-is-not-null-before-using-it.patch
- From: 5.15.0-127.137
- CVE-2024-49892
- Description:
drm/amd/display: Initialize get_bytes_per_element's default to 1
- CVE: https://ubuntu.com/security/CVE-2024-49892
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49892-drm-amd-display-initialize-get-bytes-per-element-s-default-to-1.patch
- From: 5.15.0-127.137
- CVE-2024-49896
- Description:
drm/amd/display: Check stream before comparing them
- CVE: https://ubuntu.com/security/CVE-2024-49896
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49896-drm-amd-display-check-stream-before-comparing-them.patch
- From: 5.15.0-127.137
- CVE-2024-50093
- Description:
[PATCH] thermal: intel: int340x: processor: Fix warning during module unload
- CVE: https://ubuntu.com/security/CVE-2024-50093
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50093-thermal-intel-int340x-processor-Fix-warning-during-module-unload.patch
- From: 5.15.0-127.137
- CVE-2023-52621
- Description:
[PATCH 1/1] bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
- CVE: https://ubuntu.com/security/CVE-2023-52621
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2023-52621-bpf-Check-rcu_read_lock_trace_held-before-calling-bpf-map-helpers.patch
- From: 5.15.0-127.137
- CVE-2024-50045
- Description:
[PATCH 1/1] netfilter: br_netfilter: fix panic with metadata_dst skb
- CVE: https://ubuntu.com/security/CVE-2024-50045
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50045-netfilter-br_netfilter-fix-panic-with-metadata_dst-skb.patch
- From: 5.15.0-127.137
- CVE-2024-50049
- Description:
[PATCH 1/1] drm/amd/display: Check null pointer before dereferencing se
- CVE: https://ubuntu.com/security/CVE-2024-50049
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50049-drm-amd-display-Check-null-pointer-before-dereferencing-se.patch
- From: 5.15.0-127.137
- CVE-2024-50062
- Description:
[PATCH 1/1] RDMA/rtrs-srv: Avoid null pointer deref during path
- CVE: https://ubuntu.com/security/CVE-2024-50062
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50062-RDMA-rtrs-srv-Avoid-null-pointer-deref-during-path-establishment.patch
- From: 5.15.0-127.137
- CVE-2024-50095
- Description:
[PATCH 1/1] RDMA/mad: Improve handling of timed out WRs of mad agent
- CVE: https://ubuntu.com/security/CVE-2024-50095
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50095-RDMA-mad-Improve-handling-of-timed-out-WRs-of-mad-agent.patch
- From: 5.15.0-127.137
- CVE-2024-50096
- Description:
[PATCH 1/1] nouveau/dmem: Fix vulnerability in migrate_to_ram upon
- CVE: https://ubuntu.com/security/CVE-2024-50096
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50096-nouveau-dmem-Fix-vulnerability-in-migrate_to_ram-upon-copy-error.patch
- From: 5.15.0-127.137
- CVE-2024-50179
- Description:
[PATCH 1/1] ceph: remove the incorrect Fw reference check when
- CVE: https://ubuntu.com/security/CVE-2024-50179
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50179-ceph-remove-the-incorrect-Fw-reference-check-when-dirtying-pages.patch
- From: 5.15.0-127.137
- CVE-2024-50184
- Description:
[PATCH 1/1] virtio_pmem: Check device status before requesting flush
- CVE: https://ubuntu.com/security/CVE-2024-50184
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50184-virtio_pmem-Check-device-status-before-requesting-flush.patch
- From: 5.15.0-127.137
- CVE-2024-50188
- Description:
[PATCH 1/1] net: phy: dp83869: fix memory corruption when enabling
- CVE: https://ubuntu.com/security/CVE-2024-50188
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50188-net-phy-dp83869-fix-memory-corruption-when-enabling-fiber.patch
- From: 5.15.0-127.137
- CVE-2024-50191
- Description:
[PATCH 1/1] ext4: don't set SB_RDONLY after filesystem errors
- CVE: https://ubuntu.com/security/CVE-2024-50191
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50191-ext4-don-t-set-SB_RDONLY-after-filesystem-errors.patch
- From: 5.15.0-127.137
- CVE-2024-49875
- Description:
nfsd: map the EBADMSG to nfserr_io to avoid warning
- CVE: https://ubuntu.com/security/CVE-2024-49875
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49875-nfsd-map-the-ebadmsg-to-nfserr-io-to-avoid-warning-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-49902
- Description:
jfs: check if leafidx greater than num leaves per dmap tree
- CVE: https://ubuntu.com/security/CVE-2024-49902
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49902-jfs-check-if-leafidx-greater-than-num-leaves-per-dmap-tree.patch
- From: 5.15.0-127.137
- CVE-2024-49907
- Description:
drm/amd/display: Check null pointers before using dc->clk_mgr
- CVE: https://ubuntu.com/security/CVE-2024-49907
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49907-drm-amd-display-check-null-pointers-before-using-dc-clk-mgr.patch
- From: 5.15.0-127.137
- CVE-2024-49913
- Description:
drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream
- CVE: https://ubuntu.com/security/CVE-2024-49913
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49913-drm-amd-display-add-null-check-for-top-pipe-to-program-in-commit-planes-for-stream.patch
- From: 5.15.0-127.137
- CVE-2024-49927
- Description:
x86/ioapic: Handle allocation failures gracefully
- CVE: https://ubuntu.com/security/CVE-2024-49927
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49927-x86-ioapic-handle-allocation-failures-gracefully.patch
- From: 5.15.0-127.137
- CVE-2024-49933
- Description:
blk_iocost: fix more out of bound shifts
- CVE: https://ubuntu.com/security/CVE-2024-49933
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49933-blk-iocost-fix-more-out-of-bound-shifts.patch
- From: 5.15.0-127.137
- CVE-2024-49935
- Description:
Low-score CVE changes a kthread, which may prevent patching/unpatching
- CVE:
- Patch: skipped/CVE-2024-49935.patch
- From:
- CVE-2024-49938
- Description:
wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
- CVE: https://ubuntu.com/security/CVE-2024-49938
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49938-wifi-ath9k-htc-use-skb-set-length-for-resetting-urb-before-resubmit.patch
- From: 5.15.0-127.137
- CVE-2024-49944
- Description:
sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start
- CVE: https://ubuntu.com/security/CVE-2024-49944
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49944-sctp-set-sk-state-back-to-closed-if-autobind-fails-in-sctp-listen-start.patch
- From: 5.15.0-127.137
- CVE-2024-49944
- Description:
sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start
- CVE: https://ubuntu.com/security/CVE-2024-49944
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49944-sctp-ensure-sk_state-is-set-to-CLOSED-if-hashing-fails-in-sctp_listen_start.patch
- From: 5.15.0-127.137
- CVE-2024-49946
- Description:
ppp: do not assume bh is held in ppp_channel_bridge_input()
- CVE: https://ubuntu.com/security/CVE-2024-49946
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49946-ppp-do-not-assume-bh-is-held-in-ppp-channel-bridge-input.patch
- From: 5.15.0-127.137
- CVE-2024-49948
- Description:
net: add more sanity checks to qdisc_pkt_len_init()
- CVE: https://ubuntu.com/security/CVE-2024-49948
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49948-net-add-more-sanity-checks-to-qdisc-pkt-len-init.patch
- From: 5.15.0-127.137
- CVE-2024-49871
- Description:
Input: adp5589-keys - fix NULL pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-49871
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49871-input-adp5589-keys-fix-null-pointer-dereference-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-50046
- Description:
[PATCH] NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()
- CVE: https://ubuntu.com/security/CVE-2024-50046
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50046-NFSv4-Prevent-NULL-pointer-dereference-in-nfs42_complete_copies.patch
- From: 5.15.0-127.137
- CVE-2024-50046
- Description:
[PATCH] NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()
- CVE: https://ubuntu.com/security/CVE-2024-50046
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50046-NFSv4-Prevent-NULL-pointer-dereference-in-nfs42_complete_copies-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-50189
- Description:
When introduced by live-patching, patch causes more problems than it fixes. Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-50189.patch
- From:
- CVE-2024-47690
- Description:
f2fs: get rid of online repaire on corrupted directory
- CVE: https://ubuntu.com/security/CVE-2024-47690
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47690-f2fs-get-rid-of-online-repaire-on-corrupted-directory-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-49975
- Description:
uprobes: fix kernel info leak via "[uprobes]" vma
- CVE: https://ubuntu.com/security/CVE-2024-49975
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49975-uprobes-fix-kernel-info-leak-via-uprobes-vma-5.15.0-124.134.patch
- From: 5.15.0-127.137
- CVE-2024-49985
- Description:
i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume
- CVE: https://ubuntu.com/security/CVE-2024-49985
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49985-i2c-stm32f7-do-not-prepare-unprepare-clock-during-runtime-suspend-resume.patch
- From: 5.15.0-127.137
- CVE-2024-50000
- Description:
net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()
- CVE: https://ubuntu.com/security/CVE-2024-50000
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50000-net-mlx5e-fix-null-deref-in-mlx5e-tir-builder-alloc.patch
- From: 5.15.0-127.137
- CVE-2024-50001
- Description:
net/mlx5: Fix error path in multi-packet WQE transmit
- CVE: https://ubuntu.com/security/CVE-2024-50001
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50001-net-mlx5-fix-error-path-in-multi-packet-wqe-transmit.patch
- From: 5.15.0-127.137
- CVE-2024-50003
- Description:
drm/amd/display: Fix system hang while resume with TBT monitor
- CVE: https://ubuntu.com/security/CVE-2024-50003
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50003-drm-amd-display-fix-system-hang-while-resume-with-tbt-monitor.patch
- From: 5.15.0-127.137
- CVE-2024-50006
- Description:
ext4: fix i_data_sem unlock order in ext4_ind_migrate()
- CVE: https://ubuntu.com/security/CVE-2024-50006
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50006-ext4-fix-i-data-sem-unlock-order-in-ext4-ind-migrate.patch
- From: 5.15.0-127.137
- CVE-2024-50008
- Description:
wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext()
- CVE: https://ubuntu.com/security/CVE-2024-50008
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50008-wifi-mwifiex-fix-memcpy-field-spanning-write-warning-in-mwifiex-cmd-802-11-scan-ext.patch
- From: 5.15.0-127.137
- CVE-2024-50008
- Description:
wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext()
- CVE: https://ubuntu.com/security/CVE-2024-50008
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50008-wifi-mwifiex-fix-memcpy-field-spanning-write-warning-in-mwifiex-cmd-802-11-scan-ext-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-50002
- Description:
[PATCH] static_call: Handle module init failure correctly in static_call_del_module()
- CVE: https://ubuntu.com/security/CVE-2024-50002
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50002-static_call-Handle-module-init-failure-correctly-in-static_call_del_module.patch
- From: 5.15.0-127.137
- CVE-2024-50013
- Description:
exfat: fix memory leak in exfat_load_bitmap()
- CVE: https://ubuntu.com/security/CVE-2024-50013
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50013-exfat-fix-memory-leak-in-exfat-load-bitmap.patch
- From: 5.15.0-127.137
- CVE-2024-50019
- Description:
kthread: unpark only parked kthread
- CVE: https://ubuntu.com/security/CVE-2024-50019
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50019-kthread-unpark-only-parked-kthread.patch
- From: 5.15.0-127.137
- CVE-2024-50024
- Description:
net: Fix an unsafe loop on the list
- CVE: https://ubuntu.com/security/CVE-2024-50024
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50024-net-fix-an-unsafe-loop-on-the-list-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-50031
- Description:
drm/v3d: Stop the active perfmon before being destroyed
- CVE: https://ubuntu.com/security/CVE-2024-50031
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50031-drm-v3d-stop-the-active-perfmon-before-being-destroyed.patch
- From: 5.15.0-127.137
- CVE-2024-50040
- Description:
igb: Do not bring the device up after non-fatal error
- CVE: https://ubuntu.com/security/CVE-2024-50040
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50040-igb-do-not-bring-the-device-up-after-non-fatal-error.patch
- From: 5.15.0-127.137
- CVE-2024-50041
- Description:
i40e: Fix macvlan leak by synchronizing access to mac_filter_hash
- CVE: https://ubuntu.com/security/CVE-2024-50041
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50041-i40e-fix-macvlan-leak-by-synchronizing-access-to-mac-filter-hash.patch
- From: 5.15.0-127.137
- CVE-2024-50044
- Description:
Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change
- CVE: https://ubuntu.com/security/CVE-2024-50044
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50044-bluetooth-rfcomm-fix-possible-deadlock-in-rfcomm-sk-state-change.patch
- From: 5.15.0-127.137
- CVE-2024-50039
- Description:
net/sched: accept TCA_STAB only for root qdisc
- CVE: https://ubuntu.com/security/CVE-2024-50039
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50039-net-sched-accept-TCA_STAB-only-for-root-qdisc.patch
- From: 5.15.0-127.137
- CVE-2024-50039
- Description:
net/sched: accept TCA_STAB only for root qdisc
- CVE: https://ubuntu.com/security/CVE-2024-50039
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50039-net-sched-accept-TCA_STAB-only-for-root-qdisc-kpatch.patch
- From: 5.15.0-127.137
- CVE-2020-12351 CVE-2020-12352 CVE-2020-24490
- Description:
UBUNTU: [Config] Disable BlueZ highspeed support
- CVE: https://ubuntu.com/security/CVE-2020-24490
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2020-12351-CVE-2020-12352-CVE-2020-24490-kpatch.patch
- From: 5.15.0-130.140
- CVE-2024-40910
- Description:
ax25: Fix refcount imbalance on inbound connections
- CVE: https://ubuntu.com/security/CVE-2024-40910
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-40910-ax25-fix-refcount-imbalance-on-inbound-connections.patch
- From: 5.15.0-130.140
- CVE-2024-53057
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://ubuntu.com/security/CVE-2024-53057
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 5.15.0-130.140
- CVE-2024-40973
- Description:
media: mtk-vcodec: potential null pointer deference in SCP
- CVE: https://ubuntu.com/security/CVE-2024-40973
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-40973-media-mtk-vcodec-potential-null-pointer-deference-in-scp.patch
- From: 5.15.0-130.140
- CVE-2024-35967
- Description:
Bluetooth: SCO: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35967
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35967-bluetooth-sco-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-35966
- Description:
Bluetooth: RFCOMM: Fix not validating setsockopt user
- CVE: https://ubuntu.com/security/CVE-2024-35966
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35966-bluetooth-rfcomm-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-35965
- Description:
Bluetooth: L2CAP: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35965
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35965-bluetooth-l2cap-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-35963
- Description:
Bluetooth: hci_sock: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35963
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35963-bluetooth-hci-sock-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-38553
- Description:
net: fec: remove .ndo_poll_controller to avoid deadlocks
- CVE: https://ubuntu.com/security/CVE-2024-38553
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-38553-net-fec-remove-ndo-poll-controller-to-avoid-deadlocks.patch
- From: 5.15.0-130.140
- CVE-2024-38553
- Description:
net: fec: remove .ndo_poll_controller to avoid deadlocks
- CVE: https://ubuntu.com/security/CVE-2024-38553
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-38553-net-fec-remove-ndo-poll-controller-to-avoid-deadlocks-kpatch.patch
- From: 5.15.0-130.140
- CVE-2024-50264
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://ubuntu.com/security/CVE-2024-50264
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 5.15.0-130.140
- CVE-2024-43904
- Description:
drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing
- CVE: https://ubuntu.com/security/CVE-2024-43904
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-43904-drm-amd-display-add-null-checks-for-stream-and-plane-before-dereferencing.patch
- From: 5.15.0-130.140
- CVE-2024-26822
- Description:
smb: client: set correct id, uid and cruid for multiuser automounts
- CVE: https://ubuntu.com/security/CVE-2024-26822
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-26822-smb-client-set-correct-id-uid-and-cruid-for-multiuser-automounts.patch
- From: 5.15.0-130.140
- CVE-2024-53164
- Description:
net: sched: fix ordering of qlen adjustment
- CVE: https://ubuntu.com/security/CVE-2024-53164
- Patch: ubuntu-jammy/5.15.0-131.141/CVE-2024-53164-net-sched-fix-ordering-of-qlen-adjustment.patch
- From: 5.15.0-131.141
- CVE-2024-53141
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://ubuntu.com/security/CVE-2024-53141
- Patch: ubuntu-jammy/5.15.0-131.141/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 5.15.0-131.141
- CVE-2024-53103
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://ubuntu.com/security/CVE-2024-53103
- Patch: ubuntu-jammy/5.15.0-131.141/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 5.15.0-131.141
- CVE-2024-56672
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://ubuntu.com/security/CVE-2024-56672
- Patch: ubuntu-jammy/5.15.0-134.145/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 5.15.0-134.145
- CVE-2024-56672
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://ubuntu.com/security/CVE-2024-56672
- Patch: ubuntu-jammy/5.15.0-134.145/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online-kpatch.patch
- From: 5.15.0-134.145
- CVE-2024-50074
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://ubuntu.com/security/CVE-2024-50074
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access.patch
- From: 5.15.0-133.144
- CVE-2024-50085
- Description:
mptcp: pm: only decrement add_addr_accepted for MPJ req
- CVE: https://ubuntu.com/security/CVE-2024-50085
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50085-mptcp-pm-only-decrement-add_addr_accepted-for-MPJ-req-119.patch
- From: 5.15.0-133.144
- CVE-2024-50085
- Description:
mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow
- CVE: https://ubuntu.com/security/CVE-2024-50085
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50085-mptcp-pm-fix-uaf-read-in-mptcp-pm-nl-rm-addr-or-subflow-119.patch
- From: 5.15.0-133.144
- CVE-2024-35887
- Description:
ax25: fix use-after-free bugs caused by ax25_ds_del_timer
- CVE: https://ubuntu.com/security/CVE-2024-35887
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-35887-ax25-fix-use-after-free-bugs-caused-by-ax25-ds-del-timer.patch
- From: 5.15.0-133.144
- CVE-2024-50209
- Description:
RDMA/bnxt_re: Add a check for memory allocation
- CVE: https://ubuntu.com/security/CVE-2024-50209
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50209-rdma-bnxt-re-add-a-check-for-memory-allocation.patch
- From: 5.15.0-133.144
- CVE-2024-50154
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
- CVE: https://ubuntu.com/security/CVE-2024-50154
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50154-tcp-dccp-don-t-use-timer-pending-in-reqsk-queue-unlink-119.patch
- From: 5.15.0-133.144
- CVE-2024-50131
- Description:
tracing: Consider the NULL character when validating the event length
- CVE: https://ubuntu.com/security/CVE-2024-50131
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50131-tracing-consider-the-null-character-when-validating-the-event-length.patch
- From: 5.15.0-133.144
- CVE-2024-50127
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://ubuntu.com/security/CVE-2024-50127
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 5.15.0-133.144
- CVE-2024-50143
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://ubuntu.com/security/CVE-2024-50143
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50143-udf-fix-uninit-value-use-in-udf-get-fileshortad.patch
- From: 5.15.0-133.144
- CVE-2024-50151
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://ubuntu.com/security/CVE-2024-50151
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 5.15.0-133.144
- CVE-2024-50115
- Description:
KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
- CVE: https://ubuntu.com/security/CVE-2024-50115
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50115-kvm-nsvm-ignore-ncr3-4-0-when-loading-pdptes-from-memory.patch
- From: 5.15.0-133.144
- CVE-2024-50247
- Description:
fs/ntfs3: Check if more than chunk-size bytes are written
- CVE: https://ubuntu.com/security/CVE-2024-50247
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50247-fs-ntfs3-check-if-more-than-chunk-size-bytes-are-written.patch
- From: 5.15.0-133.144
- CVE-2024-50234
- Description:
wifi: iwlegacy: Clear stale interrupts before resuming device
- CVE: https://ubuntu.com/security/CVE-2024-50234
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50234-wifi-iwlegacy-clear-stale-interrupts-before-resuming-device.patch
- From: 5.15.0-133.144
- CVE-2024-50279
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50279
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 5.15.0-133.144
- CVE-2024-50278
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_bit-when-resizing.patch
- From: 5.15.0-133.144
- CVE-2024-50278
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 5.15.0-133.144
- CVE-2024-50036
- Description:
net: do not delay dst_entries_add() in dst_release()
- CVE: https://ubuntu.com/security/CVE-2024-50036
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50036-net-do-not-delay-dst-entries-add-in-dst-release.patch
- From: 5.15.0-133.144
- CVE-2024-50268
- Description:
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-50268
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50268-usb-typec-fix-potential-out-of-bounds-in-ucsi-ccg-update-set-new-cam-cmd.patch
- From: 5.15.0-133.144
- CVE-2024-50301
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://ubuntu.com/security/CVE-2024-50301
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 5.15.0-133.144
- CVE-2024-53059
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-53059
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53059-wifi-iwlwifi-mvm-fix-response-handling-in-iwl-mvm-send-recovery-cmd.patch
- From: 5.15.0-133.144
- CVE-2024-50262
- Description:
bpf: Fix out-of-bounds write in trie_get_next_key()
- CVE: https://ubuntu.com/security/CVE-2024-50262
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch
- From: 5.15.0-133.144
- CVE-2024-50230
- Description:
nilfs2: fix kernel bug due to missing clearing of checked flag
- CVE: https://ubuntu.com/security/CVE-2024-50230
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50230-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-checked-flag.patch
- From: 5.15.0-133.144
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://ubuntu.com/security/CVE-2024-53104
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 5.15.0-133.144
- CVE-2024-50269
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://ubuntu.com/security/CVE-2024-50269
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 5.15.0-133.144
- CVE-2024-50267
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://ubuntu.com/security/CVE-2024-50267
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 5.15.0-133.144
- CVE-2024-50083
- Description:
tcp: fix mptcp DSS corruption due to large pmtu xmit
- CVE: https://ubuntu.com/security/CVE-2024-50083
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50083-tcp-fix-mptcp-dss-corruption-due-to-large-pmtu-xmit.patch
- From: 5.15.0-133.144
- CVE-2024-53061
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://ubuntu.com/security/CVE-2024-53061
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 5.15.0-133.144
- ubuntu-jammy/5.15.0-133.144/CVE-2024-50282-drm-amdgpu-add-missing-size-check-in-amdgpu-debugfs-gprwave-read.patch
- Description:
The fix for this CVE was reverted in upstream Ubuntu kernel by the following commit (b0feddb6759a) Revert "drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()"
- CVE:
- Patch: skipped/ubuntu-jammy/5.15.0-133.144/CVE-2024-50282-drm-amdgpu-add-missing-size-check-in-amdgpu-debugfs-gprwave-read.patch
- From:
- CVE-2024-50257
- Description:
netfilter: Fix use-after-free in get_info()
- CVE: https://ubuntu.com/security/CVE-2024-50257
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50257-netfilter-fix-use-after-free-in-get-info.patch
- From: 5.15.0-133.144
- CVE-2024-40953
- Description:
KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()
- CVE: https://ubuntu.com/security/CVE-2024-40953
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-40953-kvm-fix-a-data-race-on-last-boosted-vcpu-in-kvm-vcpu-on-spin.patch
- From: 5.15.0-133.144
- CVE-2024-39497
- Description:
drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)
- CVE: https://ubuntu.com/security/CVE-2024-39497
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-39497-drm-shmem-helper-fix-bug-on-on-mmap-prot-write-map-private.patch
- From: 5.15.0-133.144
- CVE-2024-42252
- Description:
closures: Change BUG_ON() to WARN_ON()
- CVE: https://ubuntu.com/security/CVE-2024-42252
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-42252-closures-change-bug-on-to-warn-on.patch
- From: 5.15.0-133.144
- CVE-2024-41066
- Description:
ibmvnic: Add tx check to prevent skb leak
- CVE: https://ubuntu.com/security/CVE-2024-41066
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-41066-ibmvnic-add-tx-check-to-prevent-skb-leak.patch
- From: 5.15.0-133.144
- CVE-2024-50251
- Description:
netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
- CVE: https://ubuntu.com/security/CVE-2024-50251
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50251-netfilter-nft-payload-sanitize-offset-and-length-before-calling-skb-checksum.patch
- From: 5.15.0-133.144
- CVE-2023-52913
- Description:
drm/i915: Fix potential context UAFs
- CVE: https://ubuntu.com/security/CVE-2023-52913
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2023-52913-drm-i915-fix-potential-context-uafs.patch
- From: 5.15.0-133.144
- CVE-2024-41080
- Description:
io_uring: fix possible deadlock in io_register_iowq_max_workers()
- CVE: https://ubuntu.com/security/CVE-2024-41080
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-41080-io-uring-fix-possible-deadlock-in-io-register-iowq-max-workers.patch
- From: 5.15.0-133.144
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://ubuntu.com/security/CVE-2024-50302
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 5.15.0-133.144
- CVE-2024-26718
- Description:
dm-crypt, dm-verity: disable tasklets
- CVE: https://ubuntu.com/security/CVE-2024-26718
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-26718-dm-crypt-dm-verity-disable-tasklets.patch
- From: 5.15.0-133.144
- CVE-2024-26718
- Description:
dm-crypt, dm-verity: disable tasklets (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26718
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-26718-dm-crypt-dm-verity-disable-tasklets-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-50099
- Description:
arm64: probes: Remove broken LDR (literal) uprobe support
- CVE: https://ubuntu.com/security/CVE-2024-50099
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50099-arm64-probes-remove-broken-ldr-literal-uprobe-support.patch
- From: 5.15.0-133.144
- CVE-2024-50101
- Description:
iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices
- CVE: https://ubuntu.com/security/CVE-2024-50101
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50101-iommu-vt-d-fix-incorrect-pci-for-each-dma-alias-for-non-pci-devices.patch
- From: 5.15.0-133.144
- CVE-2024-50082
- Description:
blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
- CVE: https://ubuntu.com/security/CVE-2024-50082
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50082-blk-rq-qos-fix-crash-on-rq-qos-wait-vs-rq-qos-wake-function-race.patch
- From: 5.15.0-133.144
- CVE-2024-50010
- Description:
exec: don't WARN for racy path_noexec check
- CVE: https://ubuntu.com/security/CVE-2024-50010
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50010-exec-don-t-warn-for-racy-path-noexec-check.patch
- From: 5.15.0-133.144
- CVE-2024-50110
- Description:
xfrm: fix one more kernel-infoleak in algo dumping
- CVE: https://ubuntu.com/security/CVE-2024-50110
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50110-xfrm-fix-one-more-kernel-infoleak-in-algo-dumping.patch
- From: 5.15.0-133.144
- CVE-2024-50058
- Description:
serial: protect uart_port_dtr_rts() in uart_shutdown() too
- CVE: https://ubuntu.com/security/CVE-2024-50058
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50058-serial-protect-uart-port-dtr-rts-in-uart-shutdown-too.patch
- From: 5.15.0-133.144
- CVE-2024-50103
- Description:
ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
- CVE: https://ubuntu.com/security/CVE-2024-50103
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50103-asoc-qcom-fix-null-dereference-in-asoc-qcom-lpass-cpu-platform-probe.patch
- From: 5.15.0-133.144
- CVE-2024-50072
- Description:
Out of scope: x86 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-50072.patch
- From:
- CVE-2024-50116
- Description:
nilfs2: fix kernel bug due to missing clearing of buffer delay flag
- CVE: https://ubuntu.com/security/CVE-2024-50116
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50116-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-buffer-delay-flag.patch
- From: 5.15.0-133.144
- CVE-2024-42291
- Description:
ice: Add a per-VF limit on number of FDIR filters
- CVE: https://ubuntu.com/security/CVE-2024-42291
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-42291-ice-add-a-per-vf-limit-on-number-of-fdir-filters.patch
- From: 5.15.0-133.144
- CVE-2024-42291
- Description:
ice: Add a per-VF limit on number of FDIR filters (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-42291
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-42291-ice-add-a-per-vf-limit-on-number-of-fdir-filters-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-50160
- Description:
ALSA: hda/cs8409: Fix possible NULL dereference
- CVE: https://ubuntu.com/security/CVE-2024-50160
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50160-alsa-hda-cs8409-fix-possible-null-dereference.patch
- From: 5.15.0-133.144
- CVE-2024-50153
- Description:
scsi: target: core: Fix null-ptr-deref in target_alloc_device()
- CVE: https://ubuntu.com/security/CVE-2024-50153
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50153-scsi-target-core-fix-null-ptr-deref-in-target-alloc-device.patch
- From: 5.15.0-133.144
- CVE-2024-50148
- Description:
Bluetooth: bnep: fix wild-memory-access in proto_unregister
- CVE: https://ubuntu.com/security/CVE-2024-50148
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50148-bluetooth-bnep-fix-wild-memory-access-in-proto-unregister.patch
- From: 5.15.0-133.144
- CVE-2024-50148
- Description:
Bluetooth: bnep: fix wild-memory-access in proto_unregister kpatch
- CVE: https://ubuntu.com/security/CVE-2024-50148
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50148-bluetooth-bnep-fix-wild-memory-access-in-proto-unregister-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-50134
- Description:
drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA
- CVE: https://ubuntu.com/security/CVE-2024-50134
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50134-drm-vboxvideo-replace-fake-vla-at-end-of-vbva-mouse-pointer-shape-with-real-vla.patch
- From: 5.15.0-133.144
- CVE-2024-50117
- Description:
drm/amd: Guard against bad data for ATIF ACPI method
- CVE: https://ubuntu.com/security/CVE-2024-50117
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50117-drm-amd-guard-against-bad-data-for-atif-acpi-method.patch
- From: 5.15.0-133.144
- CVE-2024-50142
- Description:
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
- CVE: https://ubuntu.com/security/CVE-2024-50142
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch
- From: 5.15.0-133.144
- CVE-2024-50141
- Description:
ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context
- CVE: https://ubuntu.com/security/CVE-2024-50141
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50141-acpi-prm-find-efi-memory-runtime-block-for-prm-handler-and-context.patch
- From: 5.15.0-133.144
- CVE-2024-50141
- Description:
[PATCH] ACPI: PRM: Remove unnecessary strict handler address checks
- CVE: https://ubuntu.com/security/CVE-2024-50141
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50141-ACPI-PRM-Remove-unnecessary-strict-handler-address-checks.patch
- From: 5.15.0-133.144
- CVE-2024-53060
- Description:
[PATCH] drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
- CVE: https://ubuntu.com/security/CVE-2024-53060
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53060-drm-amdgpu-prevent-NULL-pointer-dereference-if-ATIF-is-not-supported.patch
- From: 5.15.0-133.144
- CVE-2024-50167
- Description:
be2net: fix potential memory leak in be_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-50167
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50167-be2net-fix-potential-memory-leak-in-be-xmit.patch
- From: 5.15.0-133.144
- CVE-2024-50168
- Description:
net/sun3_82586: fix potential memory leak in sun3_82586_send_packet()
- CVE: https://ubuntu.com/security/CVE-2024-50168
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50168-net-sun3-82586-fix-potential-memory-leak-in-sun3-82586-send-packet.patch
- From: 5.15.0-133.144
- CVE-2024-50171
- Description:
net: systemport: fix potential memory leak in bcm_sysport_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-50171
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50171-net-systemport-fix-potential-memory-leak-in-bcm-sysport-xmit.patch
- From: 5.15.0-133.144
- CVE-2024-50182
- Description:
secretmem: disable memfd_secret() if arch cannot set direct map
- CVE: https://ubuntu.com/security/CVE-2024-50182
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50182-secretmem-disable-memfd-secret-if-arch-cannot-set-direct-map.patch
- From: 5.15.0-133.144
- CVE-2024-50192
- Description:
arm64: Low-score CVE requiring adaptation that is hard to implement; targets very rare hardware
- CVE:
- Patch: skipped/CVE-2024-50192.patch
- From:
- CVE-2024-50195
- Description:
posix-clock: Fix missing timespec64 check in pc_clock_settime()
- CVE: https://ubuntu.com/security/CVE-2024-50195
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50195-posix-clock-fix-missing-timespec64-check-in-pc-clock-settime.patch
- From: 5.15.0-133.144
- CVE-2024-50195
- Description:
posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()
- CVE: https://ubuntu.com/security/CVE-2024-50195
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50195-posix-clock-posix-clock-fix-unbalanced-locking-in-pc-clock-settime.patch
- From: 5.15.0-133.144
- CVE-2024-50196
- Description:
pinctrl: ocelot: fix system hang on level based interrupts
- CVE: https://ubuntu.com/security/CVE-2024-50196
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50196-pinctrl-ocelot-fix-system-hang-on-level-based-interrupts.patch
- From: 5.15.0-133.144
- CVE-2024-50198
- Description:
iio: light: veml6030: fix IIO device retrieval from embedded device
- CVE: https://ubuntu.com/security/CVE-2024-50198
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50198-iio-light-veml6030-fix-iio-device-retrieval-from-embedded-device.patch
- From: 5.15.0-133.144
- CVE-2024-50199
- Description:
mm/swapfile: skip HugeTLB pages for unuse_vma
- CVE: https://ubuntu.com/security/CVE-2024-50199
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50199-mm-swapfile-skip-hugetlb-pages-for-unuse-vma.patch
- From: 5.15.0-133.144
- CVE-2024-50201
- Description:
drm/radeon: Fix encoder->possible_clones
- CVE: https://ubuntu.com/security/CVE-2024-50201
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50201-drm-radeon-fix-encoder-possible-clones.patch
- From: 5.15.0-133.144
- CVE-2024-50202
- Description:
nilfs2: propagate directory read errors from nilfs_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-50202
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50202-nilfs2-propagate-directory-read-errors-from-nilfs-find-entry-119.129.patch
- From: 5.15.0-133.144
- CVE-2024-50208
- Description:
RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
- CVE: https://ubuntu.com/security/CVE-2024-50208
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50208-rdma-bnxt-re-fix-a-bug-while-setting-up-level-2-pbl-pages.patch
- From: 5.15.0-133.144
- CVE-2024-50205
- Description:
ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
- CVE: https://ubuntu.com/security/CVE-2024-50205
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50205-alsa-firewire-lib-avoid-division-by-zero-in-apply-constraint-to-size.patch
- From: 5.15.0-133.144
- CVE-2024-50236
- Description:
wifi: ath10k: Fix memory leak in management tx
- CVE: https://ubuntu.com/security/CVE-2024-50236
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50236-wifi-ath10k-fix-memory-leak-in-management-tx.patch
- From: 5.15.0-133.144
- CVE-2024-50233
- Description:
staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg()
- CVE: https://ubuntu.com/security/CVE-2024-50233
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50233-staging-iio-frequency-ad9832-fix-division-by-zero-in-ad9832-calc-freqreg.patch
- From: 5.15.0-133.144
- CVE-2024-50232
- Description:
iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr()
- CVE: https://ubuntu.com/security/CVE-2024-50232
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50232-iio-adc-ad7124-fix-division-by-zero-in-ad7124-set-channel-odr.patch
- From: 5.15.0-133.144
- CVE-2024-50229
- Description:
nilfs2: fix potential deadlock with newly created symlinks
- CVE: https://ubuntu.com/security/CVE-2024-50229
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50229-nilfs2-fix-potential-deadlock-with-newly-created-symlinks.patch
- From: 5.15.0-133.144
- CVE-2024-50218
- Description:
ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow
- CVE: https://ubuntu.com/security/CVE-2024-50218
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50218-ocfs2-pass-u64-to-ocfs2-truncate-inline-maybe-overflow.patch
- From: 5.15.0-133.144
- CVE-2024-50259
- Description:
netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write()
- CVE: https://ubuntu.com/security/CVE-2024-50259
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50259-netdevsim-add-trailing-zero-to-terminate-the-string-in-nsim-nexthop-bucket-activity-write.patch
- From: 5.15.0-133.144
- CVE-2024-50245
- Description:
fs/ntfs3: Fix possible deadlock in mi_read
- CVE: https://ubuntu.com/security/CVE-2024-50245
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50245-fs-ntfs3-fix-possible-deadlock-in-mi-read.patch
- From: 5.15.0-133.144
- CVE-2024-50244
- Description:
fs/ntfs3: Additional check in ni_clear()
- CVE: https://ubuntu.com/security/CVE-2024-50244
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50244-fs-ntfs3-additional-check-in-ni-clear.patch
- From: 5.15.0-133.144
- CVE-2024-50237
- Description:
wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
- CVE: https://ubuntu.com/security/CVE-2024-50237
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50237-wifi-mac80211-do-not-pass-a-stopped-vif-to-the-driver-in-get-txpower.patch
- From: 5.15.0-133.144
- CVE-2024-50292
- Description:
ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove
- CVE: https://ubuntu.com/security/CVE-2024-50292
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50292-asoc-stm32-spdifrx-fix-dma-channel-release-in-stm32-spdifrx-remove.patch
- From: 5.15.0-133.144
- CVE-2024-50290
- Description:
media: cx24116: prevent overflows on SNR calculus
- CVE: https://ubuntu.com/security/CVE-2024-50290
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50290-media-cx24116-prevent-overflows-on-snr-calculus.patch
- From: 5.15.0-133.144
- CVE-2024-50273
- Description:
btrfs: reinitialize delayed ref list after deleting it from the list
- CVE: https://ubuntu.com/security/CVE-2024-50273
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50273-btrfs-reinitialize-delayed-ref-list-after-deleting-it-from-the-list.patch
- From: 5.15.0-133.144
- CVE-2024-50265
- Description:
ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()
- CVE: https://ubuntu.com/security/CVE-2024-50265
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50265-ocfs2-remove-entry-once-instead-of-null-ptr-dereference-in-ocfs2-xa-remove.patch
- From: 5.15.0-133.144
- CVE-2024-50162
- Description:
[PATCH 2/2] bpf: devmap: provide rxq after redirect
- CVE: https://ubuntu.com/security/CVE-2024-50162
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50162-bpf-devmap-provide-rxq-after-redirect.patch
- From: 5.15.0-133.144
- CVE-2024-50163
- Description:
[PATCH 1/2] bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
- CVE: https://ubuntu.com/security/CVE-2024-50163
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50163-bpf-Make-sure-internal-and-UAPI-bpf_redirect-flags-don-t-overlap.patch
- From: 5.15.0-133.144
- CVE-2024-50163
- Description:
[PATCH 1/2] bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
- CVE: https://ubuntu.com/security/CVE-2024-50163
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50163-bpf-Make-sure-internal-and-UAPI-bpf_redirect-flags-don-t-overlap-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-53058
- Description:
net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data
- CVE: https://ubuntu.com/security/CVE-2024-53058
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53058-net-stmmac-tso-fix-unbalanced-dma-map-unmap-for-non-paged-skb-data.patch
- From: 5.15.0-133.144
- CVE-2024-53058
- Description:
net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data
- CVE: https://ubuntu.com/security/CVE-2024-53058
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53058-net-stmmac-fix-TSO-DMA-API-usage-causing-oops.patch
- From: 5.15.0-133.144
- CVE-2024-53055
- Description:
wifi: iwlwifi: mvm: fix 6 GHz scan construction
- CVE: https://ubuntu.com/security/CVE-2024-53055
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53055-wifi-iwlwifi-mvm-fix-6-ghz-scan-construction.patch
- From: 5.15.0-133.144
- CVE-2024-50299
- Description:
sctp: properly validate chunk size in sctp_sf_ootb()
- CVE: https://ubuntu.com/security/CVE-2024-50299
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50299-sctp-properly-validate-chunk-size-in-sctp-sf-ootb.patch
- From: 5.15.0-133.144
- CVE-2024-50296
- Description:
net: hns3: fix kernel crash when uninstalling driver
- CVE: https://ubuntu.com/security/CVE-2024-50296
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50296-net-hns3-fix-kernel-crash-when-uninstalling-driver.patch
- From: 5.15.0-133.144
- CVE-2024-50295
- Description:
The ndev->dev.parent mappings cannot be changed to ndev->dev.parent and driver is broken already
- CVE:
- Patch: skipped/CVE-2024-50295.patch
- From:
- CVE-2024-53063
- Description:
media: dvbdev: prevent the risk of out of memory access
- CVE: https://ubuntu.com/security/CVE-2024-53063
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53063-media-dvbdev-prevent-the-risk-of-out-of-memory-access.patch
- From: 5.15.0-133.144
- CVE-2024-53052
- Description:
io_uring/rw: fix missing NOWAIT check for O_DIRECT start write
- CVE: https://ubuntu.com/security/CVE-2024-53052
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53052-io-uring-rw-fix-missing-nowait-check-for-o-direct-start-write.patch
- From: 5.15.0-133.144
- CVE-2024-53052
- Description:
io_uring/rw: fix missing NOWAIT check for O_DIRECT start write
- CVE: https://ubuntu.com/security/CVE-2024-53052
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53052-fs-create-kiocb_-start-end-_write-helpers.patch
- From: 5.15.0-133.144
- CVE-2024-53066
- Description:
nfs: Fix KMSAN warning in decode_getfattr_attrs()
- CVE: https://ubuntu.com/security/CVE-2024-53066
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53066-nfs-fix-kmsan-warning-in-decode-getfattr-attrs.patch
- From: 5.15.0-133.144
- CVE-2024-53101
- Description:
fs: Fix uninitialized value issue in from_kuid and from_kgid
- CVE: https://ubuntu.com/security/CVE-2024-53101
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53101-fs-fix-uninitialized-value-issue-in-from-kuid-and-from-kgid.patch
- From: 5.15.0-133.144
- CVE-2024-49996
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://ubuntu.com/security/CVE-2024-49996
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points.patch
- From: 5.15.0-135.146
- CVE-2024-50055
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://ubuntu.com/security/CVE-2024-50055
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 5.15.0-135.146
- CVE-2024-50051
- Description:
spi: mpc52xx: Add cancel_work_sync before module remove
- CVE: https://ubuntu.com/security/CVE-2024-50051
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50051-spi-mpc52xx-add-cancel-work-sync-before-module-remove.patch
- From: 5.15.0-135.146
- CVE-2024-47730
- Description:
crypto: hisilicon/qm - inject error before stopping queue
- CVE: https://ubuntu.com/security/CVE-2024-47730
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47730-crypto-hisilicon-qm-inject-error-before-stopping-queue.patch
- From: 5.15.0-135.146
- CVE-2024-43900
- Description:
media: xc2028: avoid use-after-free in load_firmware_cb()
- CVE: https://ubuntu.com/security/CVE-2024-43900
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-43900-media-xc2028-avoid-use-after-free-in-load-firmware-cb.patch
- From: 5.15.0-135.146
- CVE-2024-50242
- Description:
fs/ntfs3: Additional check in ntfs_file_release
- CVE: https://ubuntu.com/security/CVE-2024-50242
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50242-fs-ntfs3-additional-check-in-ntfs-file-release.patch
- From: 5.15.0-135.146
- CVE-2024-56619
- Description:
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-56619
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56619-nilfs2-fix-potential-out-of-bounds-memory-access-in-nilfs-find-entry.patch
- From: 5.15.0-135.146
- CVE-2024-56615
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56615
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 5.15.0-135.146
- CVE-2024-56614
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56614
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 5.15.0-135.146
- CVE-2024-56606
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56606
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create-119.patch
- From: 5.15.0-135.146
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://ubuntu.com/security/CVE-2024-56605
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.15.0-135.146
- CVE-2024-56603
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://ubuntu.com/security/CVE-2024-56603
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.15.0-135.146
- CVE-2024-56602
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://ubuntu.com/security/CVE-2024-56602
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.15.0-135.146
- CVE-2024-56601
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56601
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.15.0-135.146
- CVE-2024-56626
- Description:
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
- CVE: https://ubuntu.com/security/CVE-2024-56626
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56626-ksmbd-fix-out-of-bounds-write-in-ksmbd-vfs-stream-write.patch
- From: 5.15.0-135.146
- CVE-2024-57896
- Description:
btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount
- CVE: https://ubuntu.com/security/CVE-2024-57896
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57896-btrfs-flush-delalloc-workers-queue-before-stopping-cleaner-kthread-during-unmount.patch
- From: 5.15.0-135.146
- CVE-2024-57900
- Description:
ila: serialize calls to nf_register_net_hooks()
- CVE: https://ubuntu.com/security/CVE-2024-57900
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57900-ila-serialize-calls-to-nf-register-net-hooks.patch
- From: 5.15.0-135.146
- CVE-2025-21680
- Description:
pktgen: Avoid out-of-bounds access in get_imix_entries
- CVE: https://ubuntu.com/security/CVE-2025-21680
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21680-pktgen-avoid-out-of-bounds-access-in-get-imix-entries.patch
- From: 5.15.0-135.146
- CVE-2025-21687
- Description:
vfio/platform: check the bounds of read/write syscalls
- CVE: https://ubuntu.com/security/CVE-2025-21687
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21687-vfio-platform-check-the-bounds-of-read-write-syscalls.patch
- From: 5.15.0-135.146
- CVE-2025-21692
- Description:
net: sched: fix ets qdisc OOB Indexing
- CVE: https://ubuntu.com/security/CVE-2025-21692
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21692-net-sched-fix-ets-qdisc-oob-indexing.patch
- From: 5.15.0-135.146
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://ubuntu.com/security/CVE-2024-53150
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.15.0-135.146
- CVE-2024-53155
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://ubuntu.com/security/CVE-2024-53155
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 5.15.0-135.146
- CVE-2024-56650
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://ubuntu.com/security/CVE-2024-56650
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 5.15.0-135.146
- CVE-2024-50275
- Description:
arm64/sve: Discard stale CPU state when handling SVE traps
- CVE: https://ubuntu.com/security/CVE-2024-50275
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50275-arm64-sve-discard-stale-cpu-state-when-handling-sve-traps.patch
- From: 5.15.0-135.146
- CVE-2024-56662
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://ubuntu.com/security/CVE-2024-56662
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi-nfit-ctl.patch
- From: 5.15.0-135.146
- CVE-2024-56627
- Description:
ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
- CVE: https://ubuntu.com/security/CVE-2024-56627
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56627-ksmbd-fix-out-of-bounds-read-in-ksmbd-vfs-stream-read.patch
- From: 5.15.0-135.146
- CVE-2024-57925
- Description:
ksmbd: fix a missing return value check bug
- CVE: https://ubuntu.com/security/CVE-2024-57925
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57925-ksmbd-fix-a-missing-return-value-check-bug.patch
- From: 5.15.0-135.146
- CVE-2024-57912
- Description:
iio: pressure: zpa2326: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57912
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57912-iio-pressure-zpa2326-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57911
- Description:
iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57911
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57911-iio-dummy-iio-simply-dummy-buffer-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57910
- Description:
iio: light: vcnl4035: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57910
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57910-iio-light-vcnl4035-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57908
- Description:
iio: imu: kmx61: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57908
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57908-iio-imu-kmx61-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57906
- Description:
iio: adc: ti-ads8688: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57906
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57906-iio-adc-ti-ads8688-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-36899
- Description:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
- CVE: https://ubuntu.com/security/CVE-2024-36899
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-36899-gpiolib-cdev-fix-use-after-free-in-lineinfo-changed-notify.patch
- From: 5.15.0-135.146
- CVE-2024-57907
- Description:
iio: adc: rockchip_saradc: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57907
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57907-iio-adc-rockchip-saradc-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch-uek7.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2022-49034
- Description:
Out of scope: SuperH arch not supported.
- CVE:
- Patch: skipped/CVE-2022-49034.patch
- From:
- CVE-2024-57874
- Description:
arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL
- CVE: https://ubuntu.com/security/CVE-2024-57874
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57874-arm64-ptrace-fix-partial-setregset-for-nt-arm-tagged-addr-ctrl.patch
- From: 5.15.0-135.146
- CVE-2024-45828
- Description:
i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request
- CVE: https://ubuntu.com/security/CVE-2024-45828
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-45828-i3c-mipi-i3c-hci-mask-ring-interrupts-before-ring-stop-request.patch
- From: 5.15.0-135.146
- CVE-2024-43098
- Description:
i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock
- CVE: https://ubuntu.com/security/CVE-2024-43098
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-43098-i3c-use-i3cdev-desc-info-instead-of-calling-i3c-device-get-info-to-avoid-deadlock.patch
- From: 5.15.0-135.146
- CVE-2024-46809
- Description:
drm/amd/display: Check BIOS images before it is used
- CVE: https://ubuntu.com/security/CVE-2024-46809
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46809-drm-amd-display-check-bios-images-before-it-is-used.patch
- From: 5.15.0-135.146
- CVE-2024-42315
- Description:
exfat: fix potential deadlock on __exfat_get_dentry_set
- CVE: https://ubuntu.com/security/CVE-2024-42315
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-42315-exfat-fix-potential-deadlock-on-exfat-get-dentry-set.patch
- From: 5.15.0-135.146
- CVE-2024-36476
- Description:
RDMA/rtrs: Ensure 'ib_sge list' is accessible
- CVE: https://ubuntu.com/security/CVE-2024-36476
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-36476-rdma-rtrs-ensure-ib-sge-list-is-accessible.patch
- From: 5.15.0-135.146
- CVE-2024-44938
- Description:
jfs: Fix shift-out-of-bounds in dbDiscardAG
- CVE: https://ubuntu.com/security/CVE-2024-44938
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-44938-jfs-fix-shift-out-of-bounds-in-dbdiscardag.patch
- From: 5.15.0-135.146
- CVE-2024-53158
- Description:
soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()
- CVE: https://ubuntu.com/security/CVE-2024-53158
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53158-soc-qcom-geni-se-fix-array-underflow-in-geni-se-clk-tbl-get.patch
- From: 5.15.0-135.146
- CVE-2025-21683
- Description:
bpf: Fix bpf_sk_select_reuseport() memory leak
- CVE: https://ubuntu.com/security/CVE-2025-21683
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21683-bpf-fix-bpf-sk-select-reuseport-memory-leak.patch
- From: 5.15.0-135.146
- CVE-2025-21678
- Description:
gtp: Destroy device along with udp socket's netns dismantle.
- CVE: https://ubuntu.com/security/CVE-2025-21678
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21678-gtp-destroy-device-along-with-udp-socket-s-netns-dismantle.patch
- From: 5.15.0-135.146
- CVE-2025-21678
- Description:
gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl().
- CVE: https://ubuntu.com/security/CVE-2025-21678
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21678-gtp-Suppress-list-corruption-splat-in-gtp_net_exit_batch_rtnl.patch
- From: 5.15.0-135.146
- CVE-2025-21697
- Description:
drm/v3d: Ensure job pointer is set to NULL after job completion
- CVE: https://ubuntu.com/security/CVE-2025-21697
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21697-drm-v3d-ensure-job-pointer-is-set-to-null-after-job-completion.patch
- From: 5.15.0-135.146
- CVE-2025-21697
- Description:
drm/v3d: Assign job pointer to NULL before signaling the fence
- CVE: https://ubuntu.com/security/CVE-2025-21697
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21697-drm-v3d-Assign-job-pointer-to-NULL-before-signaling-the-fence.patch
- From: 5.15.0-135.146
- CVE-2025-21669
- Description:
vsock/virtio: discard packets if the transport changes
- CVE: https://ubuntu.com/security/CVE-2025-21669
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21669-vsock-virtio-discard-packets-if-the-transport-changes.patch
- From: 5.15.0-135.146
- CVE-2025-21699
- Description:
gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
- CVE: https://ubuntu.com/security/CVE-2025-21699
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21699-gfs2-truncate-address-space-when-flipping-gfs2-dif-jdata-flag.patch
- From: 5.15.0-135.146
- CVE-2025-21690
- Description:
scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
- CVE: https://ubuntu.com/security/CVE-2025-21690
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21690-scsi-storvsc-ratelimit-warning-logs-to-prevent-vm-denial-of-service.patch
- From: 5.15.0-135.146
- CVE-2025-21689
- Description:
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
- CVE: https://ubuntu.com/security/CVE-2025-21689
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21689-usb-serial-quatech2-fix-null-ptr-deref-in-qt2-process-read-urb.patch
- From: 5.15.0-135.146
- CVE-2024-49950
- Description:
Bluetooth: L2CAP: Fix uaf in l2cap_connect
- CVE: https://ubuntu.com/security/CVE-2024-49950
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49950-Bluetooth-L2CAP-Fix-uaf-in-l2cap_connect.patch
- From: 5.15.0-135.146
- CVE-2024-49950
- Description:
Bluetooth: hci_core: Fix calling mgmt_device_connected
- CVE: https://ubuntu.com/security/CVE-2024-49950
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49950-Bluetooth-hci_core-Fix-calling-mgmt_device_connected.patch
- From: 5.15.0-135.146
- CVE-2024-57951
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://ubuntu.com/security/CVE-2024-57951
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57951-hrtimers-Handle-CPU-state-correctly-on-hotplug.patch
- From: 5.15.0-135.146
- CVE-2024-57951
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://ubuntu.com/security/CVE-2024-57951
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57951-hrtimers-Handle-CPU-state-correctly-on-hotplug-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-53161
- Description:
EDAC/bluefield: Fix potential integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-53161
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53161-edac-bluefield-fix-potential-integer-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-53157
- Description:
firmware: arm_scpi: Check the DVFS OPP count returned by the firmware
- CVE: https://ubuntu.com/security/CVE-2024-53157
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53157-firmware-arm-scpi-check-the-dvfs-opp-count-returned-by-the-firmware.patch
- From: 5.15.0-135.146
- CVE-2024-53214
- Description:
vfio/pci: Properly hide first-in-list PCIe extended capability
- CVE: https://ubuntu.com/security/CVE-2024-53214
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53214-vfio-pci-properly-hide-first-in-list-pcie-extended-capability.patch
- From: 5.15.0-135.146
- CVE-2024-53198
- Description:
xen: Fix the issue of resource not being properly released in xenbus_dev_probe()
- CVE: https://ubuntu.com/security/CVE-2024-53198
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53198-xen-fix-the-issue-of-resource-not-being-properly-released-in-xenbus-dev-probe.patch
- From: 5.15.0-135.146
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 5.15.0-135.146
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix a DMA to stack memory bug
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53197-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch
- From: 5.15.0-135.146
- CVE-2024-53184
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53184.patch
- From:
- CVE-2024-53183
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53183.patch
- From:
- CVE-2024-53181
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53181.patch
- From:
- CVE-2024-53180
- Description:
ALSA: pcm: Add sanity NULL check for the default mmap fault handler
- CVE: https://ubuntu.com/security/CVE-2024-53180
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53180-alsa-pcm-add-sanity-null-check-for-the-default-mmap-fault-handler.patch
- From: 5.15.0-135.146
- CVE-2024-53172
- Description:
ubi: fastmap: Fix duplicate slab cache names while attaching
- CVE: https://ubuntu.com/security/CVE-2024-53172
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53172-ubi-fastmap-fix-duplicate-slab-cache-names-while-attaching.patch
- From: 5.15.0-135.146
- CVE-2024-56708
- Description:
EDAC/igen6: Avoid segmentation fault on module unload
- CVE: https://ubuntu.com/security/CVE-2024-56708
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56708-edac-igen6-avoid-segmentation-fault-on-module-unload.patch
- From: 5.15.0-135.146
- CVE-2024-56678
- Description:
powerpc: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-56678.patch
- From:
- CVE-2024-56704
- Description:
9p/xen: fix release of IRQ
- CVE: https://ubuntu.com/security/CVE-2024-56704
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 5.15.0-135.146
- CVE-2024-56642
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://ubuntu.com/security/CVE-2024-56642
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.15.0-135.146
- CVE-2024-56640
- Description:
net/smc: fix LGR and link use-after-free issue
- CVE: https://ubuntu.com/security/CVE-2024-56640
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56640-net-smc-fix-lgr-and-link-use-after-free-issue.patch
- From: 5.15.0-135.146
- CVE-2024-57850
- Description:
jffs2: Prevent rtime decompress memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-57850
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57850-jffs2-prevent-rtime-decompress-memory-corruption.patch
- From: 5.15.0-135.146
- CVE-2024-56759
- Description:
btrfs: fix use-after-free when COWing tree bock and tracing is enabled
- CVE: https://ubuntu.com/security/CVE-2024-56759
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56759-btrfs-fix-use-after-free-when-cowing-tree-bock-and-tracing-is-enabled.patch
- From: 5.15.0-135.146
- CVE-2024-57892
- Description:
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
- CVE: https://ubuntu.com/security/CVE-2024-57892
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57892-ocfs2-fix-slab-use-after-free-due-to-dangling-pointer-dqi-priv.patch
- From: 5.15.0-135.146
- CVE-2024-56631
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://ubuntu.com/security/CVE-2024-56631
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 5.15.0-135.146
- CVE-2024-58087
- Description:
ksmbd: fix user-after-free from session log off
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-58087-ksmbd-fix-user-after-free-from-session-log-off-upto-124.134.patch
- From: 5.15.0-135.146
- CVE-2024-58087
- Description:
ksmbd: fix user-after-free from session log off
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-58087-ksmbd-fix-user-after-free-from-session-log-off-kpatch-upto-124.134.patch
- From: 5.15.0-135.146
- CVE-2024-58087
- Description:
ksmbd: fix racy issue from session lookup and expire
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-58087-ksmbd-fix-racy-issue-from-session-lookup-and-expire-upto-124.134.patch
- From: 5.15.0-135.146
- CVE-2024-46841
- Description:
btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()
- CVE: https://ubuntu.com/security/CVE-2024-46841
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46841-btrfs-don-t-bug-on-on-enomem-from-btrfs-lookup-extent-info-in-walk-down-proc-124.134.patch
- From: 5.15.0-135.146
- CVE-2024-47143
- Description:
dma-debug: fix a possible deadlock on radix_lock
- CVE: https://ubuntu.com/security/CVE-2024-47143
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47143-dma-debug-fix-a-possible-deadlock-on-radix-lock.patch
- From: 5.15.0-135.146
- CVE-2024-47408
- Description:
net/smc: check smcd_v2_ext_offset when receiving proposal msg
- CVE: https://ubuntu.com/security/CVE-2024-47408
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47408-net-smc-check-smcd-v2-ext-offset-when-receiving-proposal-msg.patch
- From: 5.15.0-135.146
- CVE-2024-47707
- Description:
ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
- CVE: https://ubuntu.com/security/CVE-2024-47707
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47707-ipv6-avoid-possible-null-deref-in-rt6-uncached-list-flush-dev.patch
- From: 5.15.0-135.146
- CVE-2024-48881
- Description:
bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again
- CVE: https://ubuntu.com/security/CVE-2024-48881
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-48881-bcache-revert-replacing-is-err-or-null-with-is-err-again.patch
- From: 5.15.0-135.146
- CVE-2024-49571
- Description:
net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg
- CVE: https://ubuntu.com/security/CVE-2024-49571
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49571-net-smc-check-iparea-offset-and-ipv6-prefixes-cnt-when-receiving-proposal-msg.patch
- From: 5.15.0-135.146
- CVE-2024-49998
- Description:
net: dsa: improve shutdown sequence
- CVE: https://ubuntu.com/security/CVE-2024-49998
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49998-net-dsa-improve-shutdown-sequence.patch
- From: 5.15.0-135.146
- CVE-2024-50304
- Description:
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
- CVE: https://ubuntu.com/security/CVE-2024-50304
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50304-ipv4-ip-tunnel-fix-suspicious-rcu-usage-warning-in-ip-tunnel-find.patch
- From: 5.15.0-135.146
- CVE-2025-21648
- Description:
netfilter: conntrack: clamp maximum hashtable size to INT_MAX
- CVE: https://ubuntu.com/security/CVE-2025-21648
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21648-netfilter-conntrack-clamp-maximum-hashtable-size-to-int-max.patch
- From: 5.15.0-135.146
- CVE-2025-21646
- Description:
afs: Fix the maximum cell name length
- CVE: https://ubuntu.com/security/CVE-2025-21646
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21646-afs-fix-the-maximum-cell-name-length.patch
- From: 5.15.0-135.146
- CVE-2025-21664
- Description:
dm thin: make get_first_thin use rcu-safe list first function
- CVE: https://ubuntu.com/security/CVE-2025-21664
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21664-dm-thin-make-get-first-thin-use-rcu-safe-list-first-function.patch
- From: 5.15.0-135.146
- CVE-2025-21640
- Description:
sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21640
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21640-sctp-sysctl-cookie-hmac-alg-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21639
- Description:
sctp: sysctl: rto_min/max: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21639
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21639-sctp-sysctl-rto-min-max-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21638
- Description:
sctp: sysctl: auth_enable: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21638
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21638-sctp-sysctl-auth-enable-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21637
- Description:
sctp: sysctl: udp_port: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21637
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21637-sctp-sysctl-udp-port-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21666
- Description:
vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
- CVE: https://ubuntu.com/security/CVE-2025-21666
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21666-vsock-prevent-null-ptr-deref-in-vsock-has-data-has-space.patch
- From: 5.15.0-135.146
- CVE-2025-21665
- Description:
filemap: avoid truncating 64-bit offset to 32 bits
- CVE: https://ubuntu.com/security/CVE-2025-21665
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21665-filemap-avoid-truncating-64-bit-offset-to-32-bits.patch
- From: 5.15.0-135.146
- CVE-2025-21653
- Description:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
- CVE: https://ubuntu.com/security/CVE-2025-21653
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21653-net-sched-cls-flow-validate-tca-flow-rshift-attribute.patch
- From: 5.15.0-135.146
- CVE-2025-21653
- Description:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (adaptation)
- CVE: https://ubuntu.com/security/CVE-2025-21653
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21653-net-sched-cls-flow-validate-tca-flow-rshift-attribute-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-57897
- Description:
drm/amdkfd: Correct the migration DMA map direction
- CVE: https://ubuntu.com/security/CVE-2024-57897
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57897-drm-amdkfd-correct-the-migration-dma-map-direction.patch
- From: 5.15.0-135.146
- CVE-2024-57884
- Description:
mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()
- CVE: https://ubuntu.com/security/CVE-2024-57884
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57884-mm-vmscan-account-for-free-pages-to-prevent-infinite-loop-in-throttle-direct-reclaim.patch
- From: 5.15.0-135.146
- CVE-2024-57913
- Description:
usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
- CVE: https://ubuntu.com/security/CVE-2024-57913
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57913-usb-gadget-f-fs-remove-warn-on-in-functionfs-bind.patch
- From: 5.15.0-135.146
- CVE-2024-57904
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57904.patch
- From:
- CVE-2024-57882
- Description:
mptcp: fix TCP options overflow.
- CVE: https://ubuntu.com/security/CVE-2024-57882
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57882-mptcp-fix-tcp-options-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-56693
- Description:
brd: remove brd_devices_mutex mutex
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56693-brd-remove-brd_devices_mutex-mutex-dep.patch
- From: 5.15.0-135.146
- CVE-2024-56693
- Description:
brd: defer automatic disk creation until module initialization succeeds
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56693-brd-defer-automatic-disk-creation-until-module-initialization-succeeds.patch
- From: 5.15.0-135.146
- CVE-2024-46871
- Description:
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
- CVE: https://ubuntu.com/security/CVE-2024-46871
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46871-drm-amd-display-Correct-the-defined-value-for-AMDGPU_DMUB_NOTIFICATION_MAX.patch
- From: 5.15.0-135.146
- CVE-2024-56548
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times.patch
- From: 5.15.0-135.146
- CVE-2024-56548
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-52332
- Description:
igb: Fix potential invalid memory access in igb_init_module()
- CVE: https://ubuntu.com/security/CVE-2024-52332
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-52332-igb-fix-potential-invalid-memory-access-in-igb-init-module.patch
- From: 5.15.0-135.146
- CVE-2024-53112
- Description:
ocfs2: uncache inode which has failed entering the group
- CVE: https://ubuntu.com/security/CVE-2024-53112
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53112-ocfs2-uncache-inode-which-has-failed-entering-the-group.patch
- From: 5.15.0-135.146
- CVE-2024-53113
- Description:
mm: fix NULL pointer dereference in alloc_pages_bulk_noprof
- CVE: https://ubuntu.com/security/CVE-2024-53113
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53113-mm-fix-null-pointer-dereference-in-alloc-pages-bulk-noprof.patch
- From: 5.15.0-135.146
- CVE-2024-53119
- Description:
virtio/vsock: Fix accept_queue memory leak
- CVE: https://ubuntu.com/security/CVE-2024-53119
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53119-virtio-vsock-fix-accept-queue-memory-leak.patch
- From: 5.15.0-135.146
- CVE-2024-53120
- Description:
net/mlx5e: CT: Fix null-ptr-deref in add rule err flow
- CVE: https://ubuntu.com/security/CVE-2024-53120
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53120-net-mlx5e-ct-fix-null-ptr-deref-in-add-rule-err-flow.patch
- From: 5.15.0-135.146
- CVE-2024-53121
- Description:
net/mlx5: fs, lock FTE when checking if active
- CVE: https://ubuntu.com/security/CVE-2024-53121
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53121-net-mlx5-fs-lock-fte-when-checking-if-active.patch
- From: 5.15.0-135.146
- CVE-2024-53122
- Description:
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
- CVE: https://ubuntu.com/security/CVE-2024-53122
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch
- From: 5.15.0-135.146
- CVE-2024-53124
- Description:
net: fix data-races around sk->sk_forward_alloc
- CVE: https://ubuntu.com/security/CVE-2024-53124
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53124-net-fix-data-races-around-sk-sk-forward-alloc.patch
- From: 5.15.0-135.146
- CVE-2024-57889
- Description:
pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking
- CVE: https://ubuntu.com/security/CVE-2024-57889
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57889-pinctrl-mcp23s08-fix-sleeping-in-atomic-context-due-to-regmap-locking.patch
- From: 5.15.0-135.146
- CVE-2024-57889
- Description:
pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-57889
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57889-pinctrl-mcp23s08-fix-sleeping-in-atomic-context-due-to-regmap-locking-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-57890
- Description:
RDMA/uverbs: Prevent integer overflow issue
- CVE: https://ubuntu.com/security/CVE-2024-57890
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57890-rdma-uverbs-prevent-integer-overflow-issue.patch
- From: 5.15.0-135.146
- CVE-2024-57903
- Description:
net: restrict SO_REUSEPORT to inet sockets
- CVE: https://ubuntu.com/security/CVE-2024-57903
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57903-net-restrict-so-reuseport-to-inet-sockets.patch
- From: 5.15.0-135.146
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53239-alsa-6fire-release-resources-at-card-release.patch
- From: 5.15.0-135.146
- CVE-2024-53237
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://ubuntu.com/security/CVE-2024-53237
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child.patch
- From: 5.15.0-135.146
- CVE-2024-53237
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://ubuntu.com/security/CVE-2024-53237
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-53227
- Description:
scsi: bfa: Fix use-after-free in bfad_im_module_exit()
- CVE: https://ubuntu.com/security/CVE-2024-53227
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53227-scsi-bfa-fix-use-after-free-in-bfad-im-module-exit.patch
- From: 5.15.0-135.146
- CVE-2024-56581
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://ubuntu.com/security/CVE-2024-56581
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 5.15.0-135.146
- CVE-2024-56558
- Description:
nfsd: make sure exp active before svc_export_show
- CVE: https://ubuntu.com/security/CVE-2024-56558
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56558-nfsd-make-sure-exp-active-before-svc-export-show.patch
- From: 5.15.0-135.146
- CVE-2024-56600
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://ubuntu.com/security/CVE-2024-56600
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.15.0-135.146
- CVE-2024-56598
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://ubuntu.com/security/CVE-2024-56598
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 5.15.0-135.146
- CVE-2024-56596
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://ubuntu.com/security/CVE-2024-56596
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.15.0-135.146
- CVE-2024-56595
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2024-56595
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-135.146
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle.patch
- From: 5.15.0-136.147
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch.patch
- From: 5.15.0-136.147
- CVE-2024-35864
- Description:
smb: client: fix potential UAF in smb2_is_valid_lease_break()
- CVE: https://ubuntu.com/security/CVE-2024-35864
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-35864-smb-client-fix-potential-uaf-in-smb2-is-valid-lease-break.patch
- From: 5.15.0-136.147
- CVE-2024-35864 CVE-2024-26928
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://ubuntu.com/security/CVE-2024-26928
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-26928-CVE-2024-35864-smb-client-fix-potential-uaf-in-cifs-debug-files-proc-show.patch
- From: 5.15.0-136.147
- CVE-2024-57798
- Description:
drm/dp_mst: Skip CSN if topology probing is not done yet
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-57798-drm-dp-mst-skip-csn-if-topology-probing-is-not-done-yet.patch
- From: 5.15.0-136.147
- CVE-2024-57798
- Description:
drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-57798-drm-dp-mst-ensure-mst-primary-pointer-is-valid-in-drm-dp-mst-handle-up-req.patch
- From: 5.15.0-136.147
- CVE-2025-21701
- Description:
net: avoid race between device unregistration and ethnl ops
- CVE: https://ubuntu.com/security/CVE-2025-21701
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21701-net-avoid-race-between-device-unregistration-and-ethnl-ops.patch
- From: 5.15.0-138.148
- CVE-2022-0995
- Description:
watch_queue: Use the bitmap API when applicable
- CVE: https://ubuntu.com/security/CVE-2022-0995
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2022-0995-watch-queue-use-the-bitmap-api-when-applicable.patch
- From: 5.15.0-138.148
- CVE-2024-50248
- Description:
ntfs3: Add bounds checking to mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-50248
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50248-ntfs3-add-bounds-checking-to-mi-enum-attr.patch
- From: 5.15.0-138.148
- CVE-2024-50248
- Description:
fs/ntfs3: Sequential field availability check in mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-50248
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50248-fs-ntfs3-sequential-field-availability-check-in-mi-enum-attr.patch
- From: 5.15.0-138.148
- CVE-2025-21993
- Description:
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
- CVE: https://ubuntu.com/security/CVE-2025-21993
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21993-iscsi-ibft-fix-ubsan-shift-out-of-bounds-warning-in-ibft-attr-show-nic.patch
- From: 5.15.0-138.148
- CVE-2024-56651
- Description:
can: hi311x: hi3110_can_ist(): fix potential use-after-free
- CVE: https://ubuntu.com/security/CVE-2024-56651
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-56651-can-hi311x-hi3110-can-ist-fix-potential-use-after-free.patch
- From: 5.15.0-138.148
- CVE-2024-46826
- Description:
ELF: fix kernel.randomize_va_space double read
- CVE: https://ubuntu.com/security/CVE-2024-46826
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-46826-elf-fix-kernel-randomize-va-space-double-read.patch
- From: 5.15.0-138.148
- CVE-2025-21700
- Description:
net: sched: Disallow replacing of child qdisc from one parent to another
- CVE: https://ubuntu.com/security/CVE-2025-21700
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21700-net-sched-disallow-replacing-of-child-qdisc-from-one-parent-to-another.patch
- From: 5.15.0-138.148
- CVE-2025-21702
- Description:
pfifo_tail_enqueue: Drop new packet when sch->limit == 0
- CVE: https://ubuntu.com/security/CVE-2025-21702
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21702-pfifo-tail-enqueue-drop-new-packet-when-sch-limit-0.patch
- From: 5.15.0-138.148
- CVE-2024-50256
- Description:
netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
- CVE: https://ubuntu.com/security/CVE-2024-50256
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50256-netfilter-nf-reject-ipv6-fix-potential-crash-in-nf-send-reset6.patch
- From: 5.15.0-138.148
- CVE-2025-21756
- Description:
vsock: Keep the binding until socket destruction
- CVE: https://ubuntu.com/security/CVE-2025-21756
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21756-vsock-keep-the-binding-until-socket-destruction.patch
- From: 5.15.0-138.148
- CVE-2025-21756
- Description:
vsock: Orphan socket after transport release
- CVE: https://ubuntu.com/security/CVE-2025-21756
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21756-vsock-orphan-socket-after-transport-release.patch
- From: 5.15.0-138.148
- CVE-2024-26837
- Description:
net: bridge: switchdev: Skip MDB replays of deferred events on offload
- CVE: https://ubuntu.com/security/CVE-2024-26837
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-26837-net-bridge-switchdev-skip-mdb-replays-of-deferred-events-on-offload.patch
- From: 5.15.0-138.148
- CVE-2024-26837
- Description:
net: bridge: switchdev: Skip MDB replays of deferred events on offload (adapatation)
- CVE: https://ubuntu.com/security/CVE-2024-26837
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-26837-net-bridge-switchdev-skip-mdb-replays-of-deferred-events-on-offload-kpatch.patch
- From: 5.15.0-138.148
- CVE-2023-52927
- Description:
netfilter: allow exp not to be removed in nf_ct_find_expectation
- CVE: https://ubuntu.com/security/CVE-2023-52927
- Patch: ubuntu-jammy/5.15.0-139.149/CVE-2023-52927-netfilter-allow-exp-not-to-be-removed-in-nf-ct-find-expectation.patch
- From: 5.15.0-139.149
- CVE-2023-52664
- Description:
net: atlantic: eliminate double free in error handling logic
- CVE: https://ubuntu.com/security/CVE-2023-52664
- Patch: ubuntu-jammy/5.15.0-139.149/CVE-2023-52664-net-atlantic-eliminate-double-free-in-error-handling-logic.patch
- From: 5.15.0-139.149
- CVE-2025-21718
- Description:
net: rose: fix timer races against user threads
- CVE: https://ubuntu.com/security/CVE-2025-21718
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21718-net-rose-fix-timer-races-against-user-threads.patch
- From: 5.15.0-140.150
- CVE-2024-58007
- Description:
soc: qcom: socinfo: Avoid out of bounds read of serial number
- CVE: https://ubuntu.com/security/CVE-2024-58007
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58007-soc-qcom-socinfo-avoid-out-of-bounds-read-of-serial-number-5.15.0-134.145.patch
- From: 5.15.0-140.150
- CVE-2025-21782
- Description:
orangefs: fix a oob in orangefs_debug_write
- CVE: https://ubuntu.com/security/CVE-2025-21782
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21782-orangefs-fix-a-oob-in-orangefs-debug-write.patch
- From: 5.15.0-140.150
- CVE-2025-21905
- Description:
wifi: iwlwifi: limit printed string from FW file
- CVE: https://ubuntu.com/security/CVE-2025-21905
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21905-wifi-iwlwifi-limit-printed-string-from-fw-file.patch
- From: 5.15.0-140.150
- CVE-2025-21727
- Description:
padata: fix UAF in padata_reorder
- CVE: https://ubuntu.com/security/CVE-2025-21727
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21727-padata-fix-UAF-in-padata_reorder.patch
- From: 5.15.0-140.150
- CVE-2024-58034
- Description:
Out of scope; patch fixes the memory controller module for Nvidia Tegra SoCs.
- CVE:
- Patch: skipped/CVE-2024-58034.patch
- From:
- CVE-2024-58069
- Description:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
- CVE: https://ubuntu.com/security/CVE-2024-58069
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58069-rtc-pcf85063-fix-potential-oob-write-in-pcf85063-nvmem-read.patch
- From: 5.15.0-140.150
- CVE-2025-21715
- Description:
The DM9000 chip is available on ARM32 and MIPS architectures, which KernelCare does not support.
- CVE:
- Patch: skipped/CVE-2025-21715.patch
- From:
- CVE-2024-57980
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://ubuntu.com/security/CVE-2024-57980
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 5.15.0-140.150
- CVE-2024-58055
- Description:
usb: gadget: f_tcm: Don't free command immediately
- CVE: https://ubuntu.com/security/CVE-2024-58055
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58055-usb-gadget-f-tcm-don-t-free-command-immediately.patch
- From: 5.15.0-140.150
- CVE-2024-58083
- Description:
KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- CVE: https://ubuntu.com/security/CVE-2024-58083
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58083-kvm-explicitly-verify-target-vcpu-is-online-in-kvm-get-vcpu.patch
- From: 5.15.0-140.150
- CVE-2025-21722
- Description:
nilfs2: do not force clear folio if buffer is referenced
- CVE: https://ubuntu.com/security/CVE-2025-21722
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21722-nilfs2-do-not-force-clear-folio-if-buffer-is-referenced.patch
- From: 5.15.0-140.150
- CVE-2024-57979
- Description:
PPS for embedded GPS devices. Irrelevant for servers.
- CVE:
- Patch: skipped/CVE-2024-57979.patch
- From:
- CVE-2024-56551
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://ubuntu.com/security/CVE-2024-56551
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 5.15.0-141.151
- CVE-2024-53168
- Description:
sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket
- CVE: https://ubuntu.com/security/CVE-2024-53168
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-53168-sunrpc-fix-one-uaf-issue-caused-by-sunrpc-kernel-tcp-socket.patch
- From: 5.15.0-141.151
- CVE-2024-56608
- Description:
drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'
- CVE: https://ubuntu.com/security/CVE-2024-56608
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-56608-drm-amd-display-fix-out-of-bounds-access-in-dcn21-link-encoder-create.patch
- From: 5.15.0-141.151