- kernel-5.15.0-1082.91~20.04.1 (ubuntu-focal-lts-jammy-azure)
- 5.15.0-1089.98~20.04.1
- 2025-07-05 16:27:38
- 2025-07-07 08:31:40
- K20250705_05
- CVE-2024-49996, CVSSv2 Score: 7.8
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://ubuntu.com/security/CVE-2024-49996
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points-5.15.0-1075.84.patch
- From: 5.15.0-135.146
- CVE-2024-50055, CVSSv2 Score: 7.8
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://ubuntu.com/security/CVE-2024-50055
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 5.15.0-135.146
- CVE-2024-50051, CVSSv2 Score: 7.8
- Description:
spi: mpc52xx: Add cancel_work_sync before module remove
- CVE: https://ubuntu.com/security/CVE-2024-50051
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50051-spi-mpc52xx-add-cancel-work-sync-before-module-remove.patch
- From: 5.15.0-135.146
- CVE-2024-47730, CVSSv2 Score: 7.8
- Description:
crypto: hisilicon/qm - inject error before stopping queue
- CVE: https://ubuntu.com/security/CVE-2024-47730
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47730-crypto-hisilicon-qm-inject-error-before-stopping-queue.patch
- From: 5.15.0-135.146
- CVE-2024-50121, CVSSv2 Score: 7.8
- Description:
nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
- CVE: https://ubuntu.com/security/CVE-2024-50121
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50121-nfsd-cancel-nfsd-shrinker-work-using-sync-mode-in-nfs4-state-shutdown-net.patch
- From: 5.15.0-135.146
- CVE-2024-43900, CVSSv2 Score: 7.8
- Description:
media: xc2028: avoid use-after-free in load_firmware_cb()
- CVE: https://ubuntu.com/security/CVE-2024-43900
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-43900-media-xc2028-avoid-use-after-free-in-load-firmware-cb.patch
- From: 5.15.0-135.146
- CVE-2024-50242, CVSSv2 Score: 7.8
- Description:
fs/ntfs3: Additional check in ntfs_file_release
- CVE: https://ubuntu.com/security/CVE-2024-50242
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50242-fs-ntfs3-additional-check-in-ntfs-file-release.patch
- From: 5.15.0-135.146
- CVE-2024-56619, CVSSv2 Score: 7.8
- Description:
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-56619
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56619-nilfs2-fix-potential-out-of-bounds-memory-access-in-nilfs-find-entry.patch
- From: 5.15.0-135.146
- CVE-2024-56615, CVSSv2 Score: 7.8
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56615
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 5.15.0-135.146
- CVE-2024-56614, CVSSv2 Score: 7.8
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56614
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 5.15.0-135.146
- CVE-2024-56606, CVSSv2 Score: 7.8
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56606
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 5.15.0-135.146
- CVE-2024-56605, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://ubuntu.com/security/CVE-2024-56605
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.15.0-135.146
- CVE-2024-56603, CVSSv2 Score: 7.8
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://ubuntu.com/security/CVE-2024-56603
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.15.0-135.146
- CVE-2024-56602, CVSSv2 Score: 7.8
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://ubuntu.com/security/CVE-2024-56602
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.15.0-135.146
- CVE-2024-56601, CVSSv2 Score: 7.8
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56601
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.15.0-135.146
- CVE-2024-56626, CVSSv2 Score: 7.8
- Description:
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
- CVE: https://ubuntu.com/security/CVE-2024-56626
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56626-ksmbd-fix-out-of-bounds-write-in-ksmbd-vfs-stream-write.patch
- From: 5.15.0-135.146
- CVE-2024-57896, CVSSv2 Score: 7.8
- Description:
btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount
- CVE: https://ubuntu.com/security/CVE-2024-57896
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57896-btrfs-flush-delalloc-workers-queue-before-stopping-cleaner-kthread-during-unmount.patch
- From: 5.15.0-135.146
- CVE-2024-57900, CVSSv2 Score: 7.8
- Description:
ila: serialize calls to nf_register_net_hooks()
- CVE: https://ubuntu.com/security/CVE-2024-57900
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57900-ila-serialize-calls-to-nf-register-net-hooks.patch
- From: 5.15.0-135.146
- CVE-2025-21631, CVSSv2 Score: 7.8
- Description:
block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()
- CVE: https://ubuntu.com/security/CVE-2025-21631
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21631-block-bfq-fix-waker-bfqq-uaf-after-bfq-split-bfqq.patch
- From: 5.15.0-135.146
- CVE-2025-21680, CVSSv2 Score: 7.8
- Description:
pktgen: Avoid out-of-bounds access in get_imix_entries
- CVE: https://ubuntu.com/security/CVE-2025-21680
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21680-pktgen-avoid-out-of-bounds-access-in-get-imix-entries.patch
- From: 5.15.0-135.146
- CVE-2025-21687, CVSSv2 Score: 7.8
- Description:
vfio/platform: check the bounds of read/write syscalls
- CVE: https://ubuntu.com/security/CVE-2025-21687
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21687-vfio-platform-check-the-bounds-of-read-write-syscalls.patch
- From: 5.15.0-135.146
- CVE-2025-21692, CVSSv2 Score: 7.8
- Description:
net: sched: fix ets qdisc OOB Indexing
- CVE: https://ubuntu.com/security/CVE-2025-21692
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21692-net-sched-fix-ets-qdisc-oob-indexing.patch
- From: 5.15.0-135.146
- CVE-2024-53150, CVSSv2 Score: 7.1
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://ubuntu.com/security/CVE-2024-53150
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.15.0-135.146
- CVE-2024-53155, CVSSv2 Score: 7.1
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://ubuntu.com/security/CVE-2024-53155
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 5.15.0-135.146
- CVE-2024-56650, CVSSv2 Score: 7.1
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://ubuntu.com/security/CVE-2024-56650
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 5.15.0-135.146
- CVE-2024-50275, CVSSv2 Score: 7.0
- Description:
arm64/sve: Discard stale CPU state when handling SVE traps
- CVE: https://ubuntu.com/security/CVE-2024-50275
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50275-arm64-sve-discard-stale-cpu-state-when-handling-sve-traps.patch
- From: 5.15.0-135.146
- CVE-2024-56662, CVSSv2 Score: 7.1
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://ubuntu.com/security/CVE-2024-56662
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi-nfit-ctl.patch
- From: 5.15.0-135.146
- CVE-2024-56627, CVSSv2 Score: 7.1
- Description:
ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
- CVE: https://ubuntu.com/security/CVE-2024-56627
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56627-ksmbd-fix-out-of-bounds-read-in-ksmbd-vfs-stream-read.patch
- From: 5.15.0-135.146
- CVE-2024-57925, CVSSv2 Score: 7.1
- Description:
ksmbd: fix a missing return value check bug
- CVE: https://ubuntu.com/security/CVE-2024-57925
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57925-ksmbd-fix-a-missing-return-value-check-bug.patch
- From: 5.15.0-135.146
- CVE-2024-57912, CVSSv2 Score: 7.1
- Description:
iio: pressure: zpa2326: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57912
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57912-iio-pressure-zpa2326-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57911, CVSSv2 Score: 7.1
- Description:
iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57911
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57911-iio-dummy-iio-simply-dummy-buffer-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57910, CVSSv2 Score: 7.1
- Description:
iio: light: vcnl4035: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57910
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57910-iio-light-vcnl4035-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57908, CVSSv2 Score: 7.1
- Description:
iio: imu: kmx61: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57908
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57908-iio-imu-kmx61-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57906, CVSSv2 Score: 7.1
- Description:
iio: adc: ti-ads8688: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57906
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57906-iio-adc-ti-ads8688-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-36899, CVSSv2 Score: 7.0
- Description:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
- CVE: https://ubuntu.com/security/CVE-2024-36899
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-36899-gpiolib-cdev-fix-use-after-free-in-lineinfo-changed-notify.patch
- From: 5.15.0-135.146
- CVE-2024-57907, CVSSv2 Score: 7.1
- Description:
iio: adc: rockchip_saradc: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57907
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57907-iio-adc-rockchip-saradc-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-53135, CVSSv2 Score: 6.5
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135, CVSSv2 Score: 6.5
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch-uek7.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2022-49034, CVSSv2 Score:
- Description:
Out of scope: SuperH arch not supported.
- CVE:
- Patch: skipped/CVE-2022-49034.patch
- From:
- CVE-2024-57874, CVSSv2 Score: 6.1
- Description:
arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL
- CVE: https://ubuntu.com/security/CVE-2024-57874
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57874-arm64-ptrace-fix-partial-setregset-for-nt-arm-tagged-addr-ctrl.patch
- From: 5.15.0-135.146
- CVE-2024-45828, CVSSv2 Score: 5.5
- Description:
i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request
- CVE: https://ubuntu.com/security/CVE-2024-45828
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-45828-i3c-mipi-i3c-hci-mask-ring-interrupts-before-ring-stop-request.patch
- From: 5.15.0-135.146
- CVE-2024-43098, CVSSv2 Score: 5.5
- Description:
i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock
- CVE: https://ubuntu.com/security/CVE-2024-43098
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-43098-i3c-use-i3cdev-desc-info-instead-of-calling-i3c-device-get-info-to-avoid-deadlock.patch
- From: 5.15.0-135.146
- CVE-2024-46809, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Check BIOS images before it is used
- CVE: https://ubuntu.com/security/CVE-2024-46809
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46809-drm-amd-display-check-bios-images-before-it-is-used.patch
- From: 5.15.0-135.146
- CVE-2024-42315, CVSSv2 Score: 5.5
- Description:
exfat: fix potential deadlock on __exfat_get_dentry_set
- CVE: https://ubuntu.com/security/CVE-2024-42315
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-42315-exfat-fix-potential-deadlock-on-exfat-get-dentry-set.patch
- From: 5.15.0-135.146
- CVE-2024-36476, CVSSv2 Score: 5.5
- Description:
RDMA/rtrs: Ensure 'ib_sge list' is accessible
- CVE: https://ubuntu.com/security/CVE-2024-36476
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-36476-rdma-rtrs-ensure-ib-sge-list-is-accessible.patch
- From: 5.15.0-135.146
- CVE-2024-44938, CVSSv2 Score: 5.5
- Description:
jfs: Fix shift-out-of-bounds in dbDiscardAG
- CVE: https://ubuntu.com/security/CVE-2024-44938
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-44938-jfs-fix-shift-out-of-bounds-in-dbdiscardag.patch
- From: 5.15.0-135.146
- CVE-2024-53158, CVSSv2 Score: 4.4
- Description:
soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()
- CVE: https://ubuntu.com/security/CVE-2024-53158
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53158-soc-qcom-geni-se-fix-array-underflow-in-geni-se-clk-tbl-get.patch
- From: 5.15.0-135.146
- CVE-2025-21683, CVSSv2 Score: 5.5
- Description:
bpf: Fix bpf_sk_select_reuseport() memory leak
- CVE: https://ubuntu.com/security/CVE-2025-21683
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21683-bpf-fix-bpf-sk-select-reuseport-memory-leak.patch
- From: 5.15.0-135.146
- CVE-2025-21678, CVSSv2 Score: 5.5
- Description:
gtp: Destroy device along with udp socket's netns dismantle.
- CVE: https://ubuntu.com/security/CVE-2025-21678
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21678-gtp-destroy-device-along-with-udp-socket-s-netns-dismantle.patch
- From: 5.15.0-135.146
- CVE-2025-21697, CVSSv2 Score: 5.5
- Description:
drm/v3d: Ensure job pointer is set to NULL after job completion
- CVE: https://ubuntu.com/security/CVE-2025-21697
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21697-drm-v3d-ensure-job-pointer-is-set-to-null-after-job-completion.patch
- From: 5.15.0-135.146
- CVE-2025-21697, CVSSv2 Score: 5.5
- Description:
drm/v3d: Assign job pointer to NULL before signaling the fence
- CVE: https://ubuntu.com/security/CVE-2025-21697
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21697-drm-v3d-Assign-job-pointer-to-NULL-before-signaling-the-fence.patch
- From: 5.15.0-135.146
- CVE-2025-21694, CVSSv2 Score: 5.5
- Description:
fs/proc: fix softlockup in __read_vmcore (part 2)
- CVE: https://ubuntu.com/security/CVE-2025-21694
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21694-fs-proc-fix-softlockup-in-read-vmcore-part-2.patch
- From: 5.15.0-135.146
- CVE-2025-21669, CVSSv2 Score: 5.5
- Description:
vsock/virtio: discard packets if the transport changes
- CVE: https://ubuntu.com/security/CVE-2025-21669
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21669-vsock-virtio-discard-packets-if-the-transport-changes.patch
- From: 5.15.0-135.146
- CVE-2025-21699, CVSSv2 Score: 5.5
- Description:
gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
- CVE: https://ubuntu.com/security/CVE-2025-21699
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21699-gfs2-truncate-address-space-when-flipping-gfs2-dif-jdata-flag.patch
- From: 5.15.0-135.146
- CVE-2025-21690, CVSSv2 Score: 5.5
- Description:
scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
- CVE: https://ubuntu.com/security/CVE-2025-21690
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21690-scsi-storvsc-ratelimit-warning-logs-to-prevent-vm-denial-of-service.patch
- From: 5.15.0-135.146
- CVE-2025-21689, CVSSv2 Score: 5.5
- Description:
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
- CVE: https://ubuntu.com/security/CVE-2025-21689
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21689-usb-serial-quatech2-fix-null-ptr-deref-in-qt2-process-read-urb.patch
- From: 5.15.0-135.146
- CVE-2024-49950, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix uaf in l2cap_connect
- CVE: https://ubuntu.com/security/CVE-2024-49950
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49950-Bluetooth-L2CAP-Fix-uaf-in-l2cap_connect.patch
- From: 5.15.0-135.146
- CVE-2024-49950, CVSSv2 Score: 7.8
- Description:
Bluetooth: hci_core: Fix calling mgmt_device_connected
- CVE: https://ubuntu.com/security/CVE-2024-49950
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49950-Bluetooth-hci_core-Fix-calling-mgmt_device_connected.patch
- From: 5.15.0-135.146
- CVE-2024-57951, CVSSv2 Score: 7.8
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://ubuntu.com/security/CVE-2024-57951
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57951-hrtimers-Handle-CPU-state-correctly-on-hotplug.patch
- From: 5.15.0-135.146
- CVE-2024-57951, CVSSv2 Score: 7.8
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://ubuntu.com/security/CVE-2024-57951
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57951-hrtimers-Handle-CPU-state-correctly-on-hotplug-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-53161, CVSSv2 Score: 5.5
- Description:
EDAC/bluefield: Fix potential integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-53161
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53161-edac-bluefield-fix-potential-integer-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-53157, CVSSv2 Score: 5.5
- Description:
firmware: arm_scpi: Check the DVFS OPP count returned by the firmware
- CVE: https://ubuntu.com/security/CVE-2024-53157
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53157-firmware-arm-scpi-check-the-dvfs-opp-count-returned-by-the-firmware.patch
- From: 5.15.0-135.146
- CVE-2024-53214, CVSSv2 Score: 5.5
- Description:
vfio/pci: Properly hide first-in-list PCIe extended capability
- CVE: https://ubuntu.com/security/CVE-2024-53214
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53214-vfio-pci-properly-hide-first-in-list-pcie-extended-capability.patch
- From: 5.15.0-135.146
- CVE-2024-53198, CVSSv2 Score: 5.5
- Description:
xen: Fix the issue of resource not being properly released in xenbus_dev_probe()
- CVE: https://ubuntu.com/security/CVE-2024-53198
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53198-xen-fix-the-issue-of-resource-not-being-properly-released-in-xenbus-dev-probe.patch
- From: 5.15.0-135.146
- CVE-2024-53197, CVSSv2 Score: 5.5
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 5.15.0-135.146
- CVE-2024-53197, CVSSv2 Score: 5.5
- Description:
ALSA: usb-audio: Fix a DMA to stack memory bug
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53197-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch
- From: 5.15.0-135.146
- CVE-2024-53184, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53184.patch
- From:
- CVE-2024-53183, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53183.patch
- From:
- CVE-2024-53181, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53181.patch
- From:
- CVE-2024-53180, CVSSv2 Score: 5.5
- Description:
ALSA: pcm: Add sanity NULL check for the default mmap fault handler
- CVE: https://ubuntu.com/security/CVE-2024-53180
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53180-alsa-pcm-add-sanity-null-check-for-the-default-mmap-fault-handler.patch
- From: 5.15.0-135.146
- CVE-2024-53172, CVSSv2 Score: 5.5
- Description:
ubi: fastmap: Fix duplicate slab cache names while attaching
- CVE: https://ubuntu.com/security/CVE-2024-53172
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53172-ubi-fastmap-fix-duplicate-slab-cache-names-while-attaching.patch
- From: 5.15.0-135.146
- CVE-2024-56708, CVSSv2 Score: 7.8
- Description:
EDAC/igen6: Avoid segmentation fault on module unload
- CVE: https://ubuntu.com/security/CVE-2024-56708
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56708-edac-igen6-avoid-segmentation-fault-on-module-unload.patch
- From: 5.15.0-135.146
- CVE-2024-56678, CVSSv2 Score:
- Description:
powerpc: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-56678.patch
- From:
- CVE-2024-56704, CVSSv2 Score: 7.8
- Description:
9p/xen: fix release of IRQ
- CVE: https://ubuntu.com/security/CVE-2024-56704
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 5.15.0-135.146
- CVE-2024-56642, CVSSv2 Score: 7.8
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://ubuntu.com/security/CVE-2024-56642
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.15.0-135.146
- CVE-2024-56640, CVSSv2 Score: 7.8
- Description:
net/smc: fix LGR and link use-after-free issue
- CVE: https://ubuntu.com/security/CVE-2024-56640
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56640-net-smc-fix-lgr-and-link-use-after-free-issue.patch
- From: 5.15.0-135.146
- CVE-2024-57850, CVSSv2 Score: 7.8
- Description:
jffs2: Prevent rtime decompress memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-57850
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57850-jffs2-prevent-rtime-decompress-memory-corruption.patch
- From: 5.15.0-135.146
- CVE-2024-56759, CVSSv2 Score: 7.8
- Description:
btrfs: fix use-after-free when COWing tree bock and tracing is enabled
- CVE: https://ubuntu.com/security/CVE-2024-56759
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56759-btrfs-fix-use-after-free-when-cowing-tree-bock-and-tracing-is-enabled.patch
- From: 5.15.0-135.146
- CVE-2024-57892, CVSSv2 Score: 7.8
- Description:
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
- CVE: https://ubuntu.com/security/CVE-2024-57892
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57892-ocfs2-fix-slab-use-after-free-due-to-dangling-pointer-dqi-priv.patch
- From: 5.15.0-135.146
- CVE-2024-56631, CVSSv2 Score: 7.8
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://ubuntu.com/security/CVE-2024-56631
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 5.15.0-135.146
- CVE-2024-58087, CVSSv2 Score: 8.1
- Description:
ksmbd: fix racy issue from session lookup and expire
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-58087-ksmbd-fix-racy-issue-from-session-lookup-and-expire.patch
- From: 5.15.0-135.146
- CVE-2024-46841, CVSSv2 Score: 5.5
- Description:
btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()
- CVE: https://ubuntu.com/security/CVE-2024-46841
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46841-btrfs-don-t-bug-on-on-enomem-from-btrfs-lookup-extent-info-in-walk-down-proc.patch
- From: 5.15.0-135.146
- CVE-2024-47143, CVSSv2 Score: 5.5
- Description:
dma-debug: fix a possible deadlock on radix_lock
- CVE: https://ubuntu.com/security/CVE-2024-47143
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47143-dma-debug-fix-a-possible-deadlock-on-radix-lock.patch
- From: 5.15.0-135.146
- CVE-2024-47408, CVSSv2 Score: 5.5
- Description:
net/smc: check smcd_v2_ext_offset when receiving proposal msg
- CVE: https://ubuntu.com/security/CVE-2024-47408
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47408-net-smc-check-smcd-v2-ext-offset-when-receiving-proposal-msg.patch
- From: 5.15.0-135.146
- CVE-2024-47707, CVSSv2 Score: 5.5
- Description:
ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
- CVE: https://ubuntu.com/security/CVE-2024-47707
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47707-ipv6-avoid-possible-null-deref-in-rt6-uncached-list-flush-dev.patch
- From: 5.15.0-135.146
- CVE-2024-48881, CVSSv2 Score: 5.5
- Description:
bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again
- CVE: https://ubuntu.com/security/CVE-2024-48881
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-48881-bcache-revert-replacing-is-err-or-null-with-is-err-again.patch
- From: 5.15.0-135.146
- CVE-2024-49571, CVSSv2 Score: 5.5
- Description:
net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg
- CVE: https://ubuntu.com/security/CVE-2024-49571
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49571-net-smc-check-iparea-offset-and-ipv6-prefixes-cnt-when-receiving-proposal-msg.patch
- From: 5.15.0-135.146
- CVE-2024-49998, CVSSv2 Score: 5.5
- Description:
net: dsa: improve shutdown sequence
- CVE: https://ubuntu.com/security/CVE-2024-49998
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49998-net-dsa-improve-shutdown-sequence.patch
- From: 5.15.0-135.146
- CVE-2024-50304, CVSSv2 Score: 5.5
- Description:
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
- CVE: https://ubuntu.com/security/CVE-2024-50304
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50304-ipv4-ip-tunnel-fix-suspicious-rcu-usage-warning-in-ip-tunnel-find.patch
- From: 5.15.0-135.146
- CVE-2025-21648, CVSSv2 Score: 5.5
- Description:
netfilter: conntrack: clamp maximum hashtable size to INT_MAX
- CVE: https://ubuntu.com/security/CVE-2025-21648
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21648-netfilter-conntrack-clamp-maximum-hashtable-size-to-int-max.patch
- From: 5.15.0-135.146
- CVE-2025-21646, CVSSv2 Score: 5.5
- Description:
afs: Fix the maximum cell name length
- CVE: https://ubuntu.com/security/CVE-2025-21646
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21646-afs-fix-the-maximum-cell-name-length.patch
- From: 5.15.0-135.146
- CVE-2025-21664, CVSSv2 Score: 5.5
- Description:
dm thin: make get_first_thin use rcu-safe list first function
- CVE: https://ubuntu.com/security/CVE-2025-21664
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21664-dm-thin-make-get-first-thin-use-rcu-safe-list-first-function.patch
- From: 5.15.0-135.146
- CVE-2025-21640, CVSSv2 Score: 5.5
- Description:
sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21640
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21640-sctp-sysctl-cookie-hmac-alg-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21639, CVSSv2 Score: 5.5
- Description:
sctp: sysctl: rto_min/max: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21639
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21639-sctp-sysctl-rto-min-max-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21638, CVSSv2 Score: 5.5
- Description:
sctp: sysctl: auth_enable: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21638
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21638-sctp-sysctl-auth-enable-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21637, CVSSv2 Score: 5.5
- Description:
sctp: sysctl: udp_port: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21637
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21637-sctp-sysctl-udp-port-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21666, CVSSv2 Score: 5.5
- Description:
vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
- CVE: https://ubuntu.com/security/CVE-2025-21666
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21666-vsock-prevent-null-ptr-deref-in-vsock-has-data-has-space.patch
- From: 5.15.0-135.146
- CVE-2025-21665, CVSSv2 Score: 5.5
- Description:
filemap: avoid truncating 64-bit offset to 32 bits
- CVE: https://ubuntu.com/security/CVE-2025-21665
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21665-filemap-avoid-truncating-64-bit-offset-to-32-bits.patch
- From: 5.15.0-135.146
- CVE-2025-21653, CVSSv2 Score: 5.5
- Description:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
- CVE: https://ubuntu.com/security/CVE-2025-21653
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21653-net-sched-cls-flow-validate-tca-flow-rshift-attribute.patch
- From: 5.15.0-135.146
- CVE-2025-21653, CVSSv2 Score: 5.5
- Description:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (adaptation)
- CVE: https://ubuntu.com/security/CVE-2025-21653
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21653-net-sched-cls-flow-validate-tca-flow-rshift-attribute-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-57902, CVSSv2 Score: 5.5
- Description:
af_packet: fix vlan_get_tci() vs MSG_PEEK
- CVE: https://ubuntu.com/security/CVE-2024-57902
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57902-af-packet-fix-vlan-get-tci-vs-msg-peek.patch
- From: 5.15.0-135.146
- CVE-2024-57897, CVSSv2 Score: 5.5
- Description:
drm/amdkfd: Correct the migration DMA map direction
- CVE: https://ubuntu.com/security/CVE-2024-57897
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57897-drm-amdkfd-correct-the-migration-dma-map-direction.patch
- From: 5.15.0-135.146
- CVE-2024-57884, CVSSv2 Score: 5.5
- Description:
mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()
- CVE: https://ubuntu.com/security/CVE-2024-57884
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57884-mm-vmscan-account-for-free-pages-to-prevent-infinite-loop-in-throttle-direct-reclaim.patch
- From: 5.15.0-135.146
- CVE-2024-57913, CVSSv2 Score: 5.5
- Description:
usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
- CVE: https://ubuntu.com/security/CVE-2024-57913
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57913-usb-gadget-f-fs-remove-warn-on-in-functionfs-bind.patch
- From: 5.15.0-135.146
- CVE-2024-57904, CVSSv2 Score:
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57904.patch
- From:
- CVE-2024-57882, CVSSv2 Score: 5.5
- Description:
mptcp: fix TCP options overflow.
- CVE: https://ubuntu.com/security/CVE-2024-57882
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57882-mptcp-fix-tcp-options-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-56693, CVSSv2 Score: 7.8
- Description:
brd: remove brd_devices_mutex mutex
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56693-brd-remove-brd_devices_mutex-mutex-dep.patch
- From: 5.15.0-135.146
- CVE-2024-56693, CVSSv2 Score: 7.8
- Description:
brd: defer automatic disk creation until module initialization succeeds
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56693-brd-defer-automatic-disk-creation-until-module-initialization-succeeds.patch
- From: 5.15.0-135.146
- CVE-2024-46871, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
- CVE: https://ubuntu.com/security/CVE-2024-46871
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46871-drm-amd-display-Correct-the-defined-value-for-AMDGPU_DMUB_NOTIFICATION_MAX.patch
- From: 5.15.0-135.146
- CVE-2024-46871, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
- CVE: https://ubuntu.com/security/CVE-2024-46871
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46871-drm-amd-display-Correct-the-defined-value-for-AMDGPU_DMUB_NOTIFICATION_MAX-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-56548, CVSSv2 Score: 7.8
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times.patch
- From: 5.15.0-135.146
- CVE-2024-56548, CVSSv2 Score: 7.8
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-52332, CVSSv2 Score: 5.5
- Description:
igb: Fix potential invalid memory access in igb_init_module()
- CVE: https://ubuntu.com/security/CVE-2024-52332
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-52332-igb-fix-potential-invalid-memory-access-in-igb-init-module.patch
- From: 5.15.0-135.146
- CVE-2024-53112, CVSSv2 Score: 5.5
- Description:
ocfs2: uncache inode which has failed entering the group
- CVE: https://ubuntu.com/security/CVE-2024-53112
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53112-ocfs2-uncache-inode-which-has-failed-entering-the-group.patch
- From: 5.15.0-135.146
- CVE-2024-53113, CVSSv2 Score: 5.5
- Description:
mm: fix NULL pointer dereference in alloc_pages_bulk_noprof
- CVE: https://ubuntu.com/security/CVE-2024-53113
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53113-mm-fix-null-pointer-dereference-in-alloc-pages-bulk-noprof.patch
- From: 5.15.0-135.146
- CVE-2024-53119, CVSSv2 Score: 5.5
- Description:
virtio/vsock: Fix accept_queue memory leak
- CVE: https://ubuntu.com/security/CVE-2024-53119
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53119-virtio-vsock-fix-accept-queue-memory-leak.patch
- From: 5.15.0-135.146
- CVE-2024-53120, CVSSv2 Score: 5.5
- Description:
net/mlx5e: CT: Fix null-ptr-deref in add rule err flow
- CVE: https://ubuntu.com/security/CVE-2024-53120
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53120-net-mlx5e-ct-fix-null-ptr-deref-in-add-rule-err-flow.patch
- From: 5.15.0-135.146
- CVE-2024-53121, CVSSv2 Score: 5.5
- Description:
net/mlx5: fs, lock FTE when checking if active
- CVE: https://ubuntu.com/security/CVE-2024-53121
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53121-net-mlx5-fs-lock-fte-when-checking-if-active.patch
- From: 5.15.0-135.146
- CVE-2024-53122, CVSSv2 Score: 5.5
- Description:
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
- CVE: https://ubuntu.com/security/CVE-2024-53122
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch
- From: 5.15.0-135.146
- CVE-2024-53124, CVSSv2 Score: 5.5
- Description:
net: fix data-races around sk->sk_forward_alloc
- CVE: https://ubuntu.com/security/CVE-2024-53124
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53124-net-fix-data-races-around-sk-sk-forward-alloc.patch
- From: 5.15.0-135.146
- CVE-2024-53127, CVSSv2 Score: 5.5
- Description:
Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"
- CVE: https://ubuntu.com/security/CVE-2024-53127
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53127-revert-mmc-dw-mmc-fix-idmac-operation-with-pages-bigger-than-4k.patch
- From: 5.15.0-135.146
- CVE-2024-57889, CVSSv2 Score: 5.5
- Description:
pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking
- CVE: https://ubuntu.com/security/CVE-2024-57889
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57889-pinctrl-mcp23s08-fix-sleeping-in-atomic-context-due-to-regmap-locking.patch
- From: 5.15.0-135.146
- CVE-2024-57889, CVSSv2 Score: 5.5
- Description:
pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-57889
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57889-pinctrl-mcp23s08-fix-sleeping-in-atomic-context-due-to-regmap-locking-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-57890, CVSSv2 Score: 5.5
- Description:
RDMA/uverbs: Prevent integer overflow issue
- CVE: https://ubuntu.com/security/CVE-2024-57890
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57890-rdma-uverbs-prevent-integer-overflow-issue.patch
- From: 5.15.0-135.146
- CVE-2024-57903, CVSSv2 Score: 5.5
- Description:
net: restrict SO_REUSEPORT to inet sockets
- CVE: https://ubuntu.com/security/CVE-2024-57903
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57903-net-restrict-so-reuseport-to-inet-sockets.patch
- From: 5.15.0-135.146
- CVE-2024-53239, CVSSv2 Score: 7.8
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53239-alsa-6fire-release-resources-at-card-release.patch
- From: 5.15.0-135.146
- CVE-2024-53237, CVSSv2 Score: 7.8
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://ubuntu.com/security/CVE-2024-53237
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child.patch
- From: 5.15.0-135.146
- CVE-2024-53237, CVSSv2 Score: 7.8
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://ubuntu.com/security/CVE-2024-53237
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-53227, CVSSv2 Score: 7.8
- Description:
scsi: bfa: Fix use-after-free in bfad_im_module_exit()
- CVE: https://ubuntu.com/security/CVE-2024-53227
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53227-scsi-bfa-fix-use-after-free-in-bfad-im-module-exit.patch
- From: 5.15.0-135.146
- CVE-2024-56581, CVSSv2 Score: 7.8
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://ubuntu.com/security/CVE-2024-56581
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 5.15.0-135.146
- CVE-2024-56558, CVSSv2 Score: 7.8
- Description:
nfsd: make sure exp active before svc_export_show
- CVE: https://ubuntu.com/security/CVE-2024-56558
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56558-nfsd-make-sure-exp-active-before-svc-export-show.patch
- From: 5.15.0-135.146
- CVE-2024-56600, CVSSv2 Score: 7.8
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://ubuntu.com/security/CVE-2024-56600
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.15.0-135.146
- CVE-2024-56598, CVSSv2 Score: 7.8
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://ubuntu.com/security/CVE-2024-56598
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 5.15.0-135.146
- CVE-2024-56596, CVSSv2 Score: 7.8
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://ubuntu.com/security/CVE-2024-56596
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.15.0-135.146
- CVE-2024-56595, CVSSv2 Score: 7.8
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2024-56595
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-135.146
- CVE-2024-57901, CVSSv2 Score: 5.5
- Description:
af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK
- CVE: https://ubuntu.com/security/CVE-2024-57901
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57901-af-packet-fix-vlan-get-protocol-dgram-vs-msg-peek.patch
- From: 5.15.0-135.146
- CVE-2024-57901, CVSSv2 Score: 5.5
- Description:
af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-57901
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57901-af-packet-fix-vlan-get-protocol-dgram-vs-msg-peek-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-56658, CVSSv2 Score: 7.8
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle.patch
- From: 5.15.0-136.147
- CVE-2024-56658, CVSSv2 Score: 7.8
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch.patch
- From: 5.15.0-136.147
- CVE-2024-35864, CVSSv2 Score: 7.8
- Description:
smb: client: fix potential UAF in smb2_is_valid_lease_break()
- CVE: https://ubuntu.com/security/CVE-2024-35864
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-35864-smb-client-fix-potential-uaf-in-smb2-is-valid-lease-break-azure.patch
- From: 5.15.0-136.147
- CVE-2024-35864 CVE-2024-26928, CVSSv2 Score: 7.8
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://ubuntu.com/security/CVE-2024-26928
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-26928-CVE-2024-35864-smb-client-fix-potential-uaf-in-cifs-debug-files-proc-show-azure.patch
- From: 5.15.0-136.147
- CVE-2024-57798, CVSSv2 Score: 7.8
- Description:
drm/dp_mst: Skip CSN if topology probing is not done yet
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-57798-drm-dp-mst-skip-csn-if-topology-probing-is-not-done-yet.patch
- From: 5.15.0-136.147
- CVE-2024-57798, CVSSv2 Score: 7.8
- Description:
drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-57798-drm-dp-mst-ensure-mst-primary-pointer-is-valid-in-drm-dp-mst-handle-up-req.patch
- From: 5.15.0-136.147
- CVE-2025-21701, CVSSv2 Score: 5.5
- Description:
net: avoid race between device unregistration and ethnl ops
- CVE: https://ubuntu.com/security/CVE-2025-21701
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21701-net-avoid-race-between-device-unregistration-and-ethnl-ops.patch
- From: 5.15.0-138.148
- CVE-2022-0995, CVSSv2 Score: 7.8
- Description:
watch_queue: Use the bitmap API when applicable
- CVE: https://ubuntu.com/security/CVE-2022-0995
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2022-0995-watch-queue-use-the-bitmap-api-when-applicable.patch
- From: 5.15.0-138.148
- CVE-2024-50248, CVSSv2 Score: 5.5
- Description:
ntfs3: Add bounds checking to mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-50248
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50248-ntfs3-add-bounds-checking-to-mi-enum-attr.patch
- From: 5.15.0-138.148
- CVE-2024-50248, CVSSv2 Score: 5.5
- Description:
fs/ntfs3: Sequential field availability check in mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-50248
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50248-fs-ntfs3-sequential-field-availability-check-in-mi-enum-attr.patch
- From: 5.15.0-138.148
- CVE-2025-21993, CVSSv2 Score: 7.1
- Description:
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
- CVE: https://ubuntu.com/security/CVE-2025-21993
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21993-iscsi-ibft-fix-ubsan-shift-out-of-bounds-warning-in-ibft-attr-show-nic.patch
- From: 5.15.0-138.148
- CVE-2024-56651, CVSSv2 Score: 7.8
- Description:
can: hi311x: hi3110_can_ist(): fix potential use-after-free
- CVE: https://ubuntu.com/security/CVE-2024-56651
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-56651-can-hi311x-hi3110-can-ist-fix-potential-use-after-free.patch
- From: 5.15.0-138.148
- CVE-2024-46826, CVSSv2 Score: 5.5
- Description:
ELF: fix kernel.randomize_va_space double read
- CVE: https://ubuntu.com/security/CVE-2024-46826
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-46826-elf-fix-kernel-randomize-va-space-double-read.patch
- From: 5.15.0-138.148
- CVE-2025-21700, CVSSv2 Score: 7.8
- Description:
net: sched: Disallow replacing of child qdisc from one parent to another
- CVE: https://ubuntu.com/security/CVE-2025-21700
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21700-net-sched-disallow-replacing-of-child-qdisc-from-one-parent-to-another.patch
- From: 5.15.0-138.148
- CVE-2025-21702, CVSSv2 Score: 5.5
- Description:
pfifo_tail_enqueue: Drop new packet when sch->limit == 0
- CVE: https://ubuntu.com/security/CVE-2025-21702
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21702-pfifo-tail-enqueue-drop-new-packet-when-sch-limit-0.patch
- From: 5.15.0-138.148
- CVE-2024-50256, CVSSv2 Score: 5.5
- Description:
netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
- CVE: https://ubuntu.com/security/CVE-2024-50256
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50256-netfilter-nf-reject-ipv6-fix-potential-crash-in-nf-send-reset6.patch
- From: 5.15.0-138.148
- CVE-2025-21756, CVSSv2 Score: 7.8
- Description:
vsock: Keep the binding until socket destruction
- CVE: https://ubuntu.com/security/CVE-2025-21756
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21756-vsock-keep-the-binding-until-socket-destruction.patch
- From: 5.15.0-138.148
- CVE-2025-21756, CVSSv2 Score: 7.8
- Description:
vsock: Orphan socket after transport release
- CVE: https://ubuntu.com/security/CVE-2025-21756
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21756-vsock-orphan-socket-after-transport-release.patch
- From: 5.15.0-138.148
- CVE-2024-26837, CVSSv2 Score: 5.5
- Description:
net: bridge: switchdev: Skip MDB replays of deferred events on offload
- CVE: https://ubuntu.com/security/CVE-2024-26837
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-26837-net-bridge-switchdev-skip-mdb-replays-of-deferred-events-on-offload.patch
- From: 5.15.0-138.148
- CVE-2024-26837, CVSSv2 Score: 5.5
- Description:
net: bridge: switchdev: Skip MDB replays of deferred events on offload (adapatation)
- CVE: https://ubuntu.com/security/CVE-2024-26837
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-26837-net-bridge-switchdev-skip-mdb-replays-of-deferred-events-on-offload-kpatch.patch
- From: 5.15.0-138.148
- CVE-2023-52927, CVSSv2 Score: 5.5
- Description:
netfilter: allow exp not to be removed in nf_ct_find_expectation
- CVE: https://ubuntu.com/security/CVE-2023-52927
- Patch: ubuntu-jammy/5.15.0-139.149/CVE-2023-52927-netfilter-allow-exp-not-to-be-removed-in-nf-ct-find-expectation.patch
- From: 5.15.0-139.149
- CVE-2023-52664, CVSSv2 Score: 7.8
- Description:
net: atlantic: eliminate double free in error handling logic
- CVE: https://ubuntu.com/security/CVE-2023-52664
- Patch: ubuntu-jammy/5.15.0-139.149/CVE-2023-52664-net-atlantic-eliminate-double-free-in-error-handling-logic.patch
- From: 5.15.0-139.149
- CVE-2025-21718, CVSSv2 Score: 7.0
- Description:
net: rose: fix timer races against user threads
- CVE: https://ubuntu.com/security/CVE-2025-21718
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21718-net-rose-fix-timer-races-against-user-threads.patch
- From: 5.15.0-140.150
- CVE-2024-58007, CVSSv2 Score: 7.1
- Description:
soc: qcom: socinfo: Avoid out of bounds read of serial number
- CVE: https://ubuntu.com/security/CVE-2024-58007
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58007-soc-qcom-socinfo-avoid-out-of-bounds-read-of-serial-number-5.15.0-134.145.patch
- From: 5.15.0-140.150
- CVE-2025-21782, CVSSv2 Score: 7.1
- Description:
orangefs: fix a oob in orangefs_debug_write
- CVE: https://ubuntu.com/security/CVE-2025-21782
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21782-orangefs-fix-a-oob-in-orangefs-debug-write.patch
- From: 5.15.0-140.150
- CVE-2025-21905, CVSSv2 Score: 7.1
- Description:
wifi: iwlwifi: limit printed string from FW file
- CVE: https://ubuntu.com/security/CVE-2025-21905
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21905-wifi-iwlwifi-limit-printed-string-from-fw-file.patch
- From: 5.15.0-140.150
- CVE-2025-21727, CVSSv2 Score: 7.8
- Description:
padata: fix UAF in padata_reorder
- CVE: https://ubuntu.com/security/CVE-2025-21727
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21727-padata-fix-UAF-in-padata_reorder.patch
- From: 5.15.0-140.150
- CVE-2024-58034, CVSSv2 Score:
- Description:
Out of scope; patch fixes the memory controller module for Nvidia Tegra SoCs.
- CVE:
- Patch: skipped/CVE-2024-58034.patch
- From:
- CVE-2024-58069, CVSSv2 Score: 7.8
- Description:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
- CVE: https://ubuntu.com/security/CVE-2024-58069
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58069-rtc-pcf85063-fix-potential-oob-write-in-pcf85063-nvmem-read.patch
- From: 5.15.0-140.150
- CVE-2025-21715, CVSSv2 Score:
- Description:
The DM9000 chip is available on ARM32 and MIPS architectures, which KernelCare does not support.
- CVE:
- Patch: skipped/CVE-2025-21715.patch
- From:
- CVE-2024-57980, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://ubuntu.com/security/CVE-2024-57980
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 5.15.0-140.150
- CVE-2024-58055, CVSSv2 Score: 7.8
- Description:
usb: gadget: f_tcm: Don't free command immediately
- CVE: https://ubuntu.com/security/CVE-2024-58055
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58055-usb-gadget-f-tcm-don-t-free-command-immediately.patch
- From: 5.15.0-140.150
- CVE-2024-58083, CVSSv2 Score: 7.8
- Description:
KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- CVE: https://ubuntu.com/security/CVE-2024-58083
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58083-kvm-explicitly-verify-target-vcpu-is-online-in-kvm-get-vcpu.patch
- From: 5.15.0-140.150
- CVE-2025-21722, CVSSv2 Score: 7.8
- Description:
nilfs2: do not force clear folio if buffer is referenced
- CVE: https://ubuntu.com/security/CVE-2025-21722
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21722-nilfs2-do-not-force-clear-folio-if-buffer-is-referenced.patch
- From: 5.15.0-140.150
- CVE-2024-57979, CVSSv2 Score:
- Description:
PPS for embedded GPS devices. Irrelevant for servers.
- CVE:
- Patch: skipped/CVE-2024-57979.patch
- From:
- CVE-2025-21731, CVSSv2 Score: 7.8
- Description:
nbd: don't allow reconnect after disconnect
- CVE: https://ubuntu.com/security/CVE-2025-21731
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21731-nbd-don-t-allow-reconnect-after-disconnect.patch
- From: 5.15.0-140.150
- CVE-2025-21753, CVSSv2 Score: 7.8
- Description:
btrfs: fix use-after-free when attempting to join an aborted transaction
- CVE: https://ubuntu.com/security/CVE-2025-21753
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21753-btrfs-fix-use-after-free-when-attempting-to-join-an-aborted-transaction.patch
- From: 5.15.0-140.150
- CVE-2025-21735, CVSSv2 Score: 7.8
- Description:
NFC: nci: Add bounds checking in nci_hci_create_pipe()
- CVE: https://ubuntu.com/security/CVE-2025-21735
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21735-nfc-nci-add-bounds-checking-in-nci-hci-create-pipe.patch
- From: 5.15.0-140.150
- CVE-2025-21785, CVSSv2 Score:
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2025-21764, CVSSv2 Score: 7.8
- Description:
ndisc: use RCU protection in ndisc_alloc_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21764
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21764-ndisc-use-rcu-protection-in-ndisc-alloc-skb.patch
- From: 5.15.0-140.150
- CVE-2025-21763, CVSSv2 Score: 7.8
- Description:
neighbour: use RCU protection in __neigh_notify()
- CVE: https://ubuntu.com/security/CVE-2025-21763
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21763-neighbour-use-rcu-protection-in-neigh-notify.patch
- From: 5.15.0-140.150
- CVE-2025-21762, CVSSv2 Score: 7.8
- Description:
arp: use RCU protection in arp_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-21762
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21762-arp-use-rcu-protection-in-arp-xmit.patch
- From: 5.15.0-140.150
- CVE-2025-21761, CVSSv2 Score: 7.8
- Description:
openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
- CVE: https://ubuntu.com/security/CVE-2025-21761
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21761-openvswitch-use-rcu-protection-in-ovs-vport-cmd-fill-info.patch
- From: 5.15.0-140.150
- CVE-2025-21760, CVSSv2 Score: 7.8
- Description:
ndisc: extend RCU protection in ndisc_send_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21760
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21760-ndisc-extend-rcu-protection-in-ndisc-send-skb.patch
- From: 5.15.0-140.150
- CVE-2025-21796, CVSSv2 Score: 7.8
- Description:
nfsd: clear acl_access/acl_default after releasing them
- CVE: https://ubuntu.com/security/CVE-2025-21796
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21796-nfsd-clear-acl-access-acl-default-after-releasing-them.patch
- From: 5.15.0-140.150
- CVE-2025-21791, CVSSv2 Score: 7.8
- Description:
vrf: use RCU protection in l3mdev_l3_out()
- CVE: https://ubuntu.com/security/CVE-2025-21791
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21791-vrf-use-rcu-protection-in-l3mdev-l3-out.patch
- From: 5.15.0-140.150
- CVE-2025-21811, CVSSv2 Score: 7.8
- Description:
nilfs2: protect access to buffers with no active references
- CVE: https://ubuntu.com/security/CVE-2025-21811
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21811-nilfs2-protect-access-to-buffers-with-no-active-references.patch
- From: 5.15.0-140.150
- CVE-2025-21858, CVSSv2 Score: 7.8
- Description:
geneve: Fix use-after-free in geneve_find_dev().
- CVE: https://ubuntu.com/security/CVE-2025-21858
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21858-geneve-fix-use-after-free-in-geneve-find-dev.patch
- From: 5.15.0-140.150
- CVE-2025-21887, CVSSv2 Score: 7.8
- Description:
ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up
- CVE: https://ubuntu.com/security/CVE-2025-21887
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21887-ovl-fix-uaf-in-ovl-dentry-update-reval-by-moving-dput-in-ovl-link-up.patch
- From: 5.15.0-140.150
- CVE-2025-21934, CVSSv2 Score: 7.8
- Description:
rapidio: fix an API misues when rio_add_net() fails
- CVE: https://ubuntu.com/security/CVE-2025-21934
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21934-rapidio-fix-an-api-misues-when-rio-add-net-fails.patch
- From: 5.15.0-140.150
- CVE-2025-21928, CVSSv2 Score: 7.8
- Description:
HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
- CVE: https://ubuntu.com/security/CVE-2025-21928
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21928-hid-intel-ish-hid-fix-use-after-free-issue-in-ishtp-hid-remove.patch
- From: 5.15.0-140.150
- CVE-2025-21919, CVSSv2 Score: 7.8
- Description:
sched/fair: Fix potential memory corruption in child_cfs_rq_on_list
- CVE: https://ubuntu.com/security/CVE-2025-21919
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21919-sched-fair-fix-potential-memory-corruption-in-child-cfs-rq-on-list.patch
- From: 5.15.0-140.150
- CVE-2024-26982, CVSSv2 Score: 7.1
- Description:
Squashfs: check the inode number is not the invalid value of zero
- CVE: https://ubuntu.com/security/CVE-2024-26982
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid-value-of-zero.patch
- From: 5.15.0-140.150
- CVE-2024-56721, CVSSv2 Score: 7.1
- Description:
x86/CPU/AMD: Terminate the erratum_1386_microcode array
- CVE: https://ubuntu.com/security/CVE-2024-56721
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-56721-x86-cpu-amd-terminate-the-erratum-1386-microcode-array.patch
- From: 5.15.0-140.150
- CVE-2024-57986, CVSSv2 Score: 5.5
- Description:
HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections
- CVE: https://ubuntu.com/security/CVE-2024-57986
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57986-hid-core-fix-assumption-that-resolution-multipliers-must-be-in-logical-collections.patch
- From: 5.15.0-140.150
- CVE-2024-57973, CVSSv2 Score: 5.5
- Description:
rdma/cxgb4: Prevent potential integer overflow on 32bit
- CVE: https://ubuntu.com/security/CVE-2024-57973
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57973-rdma-cxgb4-prevent-potential-integer-overflow-on-32bit.patch
- From: 5.15.0-140.150
- CVE-2024-57981, CVSSv2 Score: 5.5
- Description:
usb: xhci: Fix NULL pointer dereference on certain command aborts
- CVE: https://ubuntu.com/security/CVE-2024-57981
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57981-usb-xhci-fix-null-pointer-dereference-on-certain-command-aborts.patch
- From: 5.15.0-140.150
- CVE-2024-58001, CVSSv2 Score: 5.5
- Description:
ocfs2: handle a symlink read error correctly
- CVE: https://ubuntu.com/security/CVE-2024-58001
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58001-ocfs2-handle-a-symlink-read-error-correctly.patch
- From: 5.15.0-140.150
- CVE-2024-57834, CVSSv2 Score: 5.5
- Description:
media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread
- CVE: https://ubuntu.com/security/CVE-2024-57834
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57834-media-vidtv-fix-a-null-ptr-deref-in-vidtv-mux-stop-thread.patch
- From: 5.15.0-140.150
- CVE-2024-47726, CVSSv2 Score: 6.5
- Description:
f2fs: fix to wait dio completion
- CVE: https://ubuntu.com/security/CVE-2024-47726
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-47726-f2fs-fix-to-wait-dio-completion.patch
- From: 5.15.0-140.150
- CVE-2024-58005, CVSSv2 Score: 5.5
- Description:
tpm: Change to kvalloc() in eventlog/acpi.c
- CVE: https://ubuntu.com/security/CVE-2024-58005
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58005-tpm-change-to-kvalloc-in-eventlog-acpi-c.patch
- From: 5.15.0-140.150
- CVE-2024-56599, CVSSv2 Score: 5.5
- Description:
wifi: ath10k: avoid NULL pointer error during sdio remove
- CVE: https://ubuntu.com/security/CVE-2024-56599
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-56599-wifi-ath10k-avoid-null-pointer-error-during-sdio-remove.patch
- From: 5.15.0-140.150
- CVE-2025-21920, CVSSv2 Score: 7.1
- Description:
vlan: enforce underlying device type
- CVE: https://ubuntu.com/security/CVE-2025-21920
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21920-vlan-enforce-underlying-device-type.patch
- From: 5.15.0-140.150
- CVE-2025-21920, CVSSv2 Score: 7.1
- Description:
vlan: enforce underlying device type
- CVE: https://ubuntu.com/security/CVE-2025-21920
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21920-vlan-enforce-underlying-device-type-kpatch.patch
- From: 5.15.0-140.150
- CVE-2025-21898, CVSSv2 Score: 5.5
- Description:
ftrace: Avoid potential division by zero in function_stat_show()
- CVE: https://ubuntu.com/security/CVE-2025-21898
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21898-ftrace-avoid-potential-division-by-zero-in-function-stat-show.patch
- From: 5.15.0-140.150
- CVE-2025-21912, CVSSv2 Score:
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-21912.patch
- From:
- CVE-2025-21910, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: regulatory: improve invalid hints checking
- CVE: https://ubuntu.com/security/CVE-2025-21910
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21910-wifi-cfg80211-regulatory-improve-invalid-hints-checking.patch
- From: 5.15.0-140.150
- CVE-2025-21909, CVSSv2 Score: 5.5
- Description:
wifi: nl80211: reject cooked mode if it is set along with other flags
- CVE: https://ubuntu.com/security/CVE-2025-21909
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21909-wifi-nl80211-reject-cooked-mode-if-it-is-set-along-with-other-flags.patch
- From: 5.15.0-140.150
- CVE-2025-21904, CVSSv2 Score: 5.5
- Description:
caif_virtio: fix wrong pointer check in cfv_probe()
- CVE: https://ubuntu.com/security/CVE-2025-21904
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21904-caif-virtio-fix-wrong-pointer-check-in-cfv-probe.patch
- From: 5.15.0-140.150
- CVE-2025-21925, CVSSv2 Score: 5.5
- Description:
llc: do not use skb_get() before dev_queue_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-21925
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21925-llc-do-not-use-skb-get-before-dev-queue-xmit.patch
- From: 5.15.0-140.150
- CVE-2025-21922, CVSSv2 Score: 5.5
- Description:
ppp: Fix KMSAN uninit-value warning with bpf
- CVE: https://ubuntu.com/security/CVE-2025-21922
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21922-ppp-fix-kmsan-uninit-value-warning-with-bpf.patch
- From: 5.15.0-140.150
- CVE-2025-21917, CVSSv2 Score: 5.5
- Description:
usb: renesas_usbhs: Flush the notify_hotplug_work
- CVE: https://ubuntu.com/security/CVE-2025-21917
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21917-usb-renesas-usbhs-flush-the-notify-hotplug-work.patch
- From: 5.15.0-140.150
- CVE-2025-21916, CVSSv2 Score: 5.5
- Description:
usb: atm: cxacru: fix a flaw in existing endpoint checks
- CVE: https://ubuntu.com/security/CVE-2025-21916
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21916-usb-atm-cxacru-fix-a-flaw-in-existing-endpoint-checks.patch
- From: 5.15.0-140.150
- CVE-2025-21914, CVSSv2 Score: 5.5
- Description:
slimbus: messaging: Free transaction ID in delayed interrupt scenario
- CVE: https://ubuntu.com/security/CVE-2025-21914
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21914-slimbus-messaging-free-transaction-id-in-delayed-interrupt-scenario.patch
- From: 5.15.0-140.150
- CVE-2024-58002, CVSSv2 Score: 7.8
- Description:
[PATCH] media: uvcvideo: Only save async fh if success
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58002-media-uvcvideo-Only-save-async-fh-if-success.patch
- From: 5.15.0-140.150
- CVE-2024-58002, CVSSv2 Score: 7.8
- Description:
[PATCH] media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers.patch
- From: 5.15.0-140.150
- CVE-2024-58002, CVSSv2 Score: 7.8
- Description:
[PATCH] media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-57977, CVSSv2 Score: 5.5
- Description:
memcg: fix soft lockup in the OOM process
- CVE: https://ubuntu.com/security/CVE-2024-57977
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57977-memcg-fix-soft-lockup-in-the-oom-process.patch
- From: 5.15.0-140.150
- CVE-2024-57977, CVSSv2 Score: 5.5
- Description:
memcg: always call cond_resched() after fn()
- CVE: https://ubuntu.com/security/CVE-2024-57977
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57977-memcg-always-call-cond_resched-after-fn.patch
- From: 5.15.0-140.150
- CVE-2024-57977, CVSSv2 Score: 5.5
- Description:
memcg: fix soft lockup in the OOM process (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-57977
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57977-memcg-fix-soft-lockup-in-the-oom-process-kpatch.patch
- From: 5.15.0-140.150
- CVE-2025-21859, CVSSv2 Score: 5.5
- Description:
USB: gadget: f_midi: f_midi_complete to call queue_work
- CVE: https://ubuntu.com/security/CVE-2025-21859
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21859-usb-gadget-f-midi-f-midi-complete-to-call-queue-work.patch
- From: 5.15.0-140.150
- CVE-2025-21866, CVSSv2 Score:
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21866.patch
- From:
- CVE-2025-21678, CVSSv2 Score: 5.5
- Description:
gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl().
- CVE: https://ubuntu.com/security/CVE-2025-21678
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21865-gtp-suppress-list-corruption-splat-in-gtp-net-exit-batch-rtnl-135.patch
- From: 5.15.0-140.150
- CVE-2025-21871, CVSSv2 Score: 5.5
- Description:
tee: optee: Fix supplicant wait loop
- CVE: https://ubuntu.com/security/CVE-2025-21871
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21871-tee-optee-fix-supplicant-wait-loop.patch
- From: 5.15.0-140.150
- CVE-2025-21862, CVSSv2 Score: 5.5
- Description:
drop_monitor: fix incorrect initialization order
- CVE: https://ubuntu.com/security/CVE-2025-21862
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21862-drop-monitor-fix-incorrect-initialization-order.patch
- From: 5.15.0-140.150
- CVE-2025-21848, CVSSv2 Score: 5.5
- Description:
nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
- CVE: https://ubuntu.com/security/CVE-2025-21848
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21848-nfp-bpf-add-check-for-nfp-app-ctrl-msg-alloc.patch
- From: 5.15.0-140.150
- CVE-2025-21878, CVSSv2 Score: 5.5
- Description:
i2c: npcm: disable interrupt enable bit before devm_request_irq
- CVE: https://ubuntu.com/security/CVE-2025-21878
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21878-i2c-npcm-disable-interrupt-enable-bit-before-devm-request-irq.patch
- From: 5.15.0-140.150
- CVE-2025-21877, CVSSv2 Score: 5.5
- Description:
usbnet: gl620a: fix endpoint checking in genelink_bind()
- CVE: https://ubuntu.com/security/CVE-2025-21877
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21877-usbnet-gl620a-fix-endpoint-checking-in-genelink-bind.patch
- From: 5.15.0-140.150
- CVE-2025-21875, CVSSv2 Score: 5.5
- Description:
mptcp: always handle address removal under msk socket lock
- CVE: https://ubuntu.com/security/CVE-2025-21875
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21875-mptcp-always-handle-address-removal-under-msk-socket-lock.patch
- From: 5.15.0-140.150
- CVE-2024-56551, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://ubuntu.com/security/CVE-2024-56551
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 5.15.0-141.151
- CVE-2024-53168, CVSSv2 Score: 7.8
- Description:
sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket
- CVE: https://ubuntu.com/security/CVE-2024-53168
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-53168-sunrpc-fix-one-uaf-issue-caused-by-sunrpc-kernel-tcp-socket.patch
- From: 5.15.0-141.151
- CVE-2024-56608, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'
- CVE: https://ubuntu.com/security/CVE-2024-56608
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-56608-drm-amd-display-fix-out-of-bounds-access-in-dcn21-link-encoder-create.patch
- From: 5.15.0-141.151
- CVE-2025-21991, CVSSv2 Score: 7.8
- Description:
x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
- CVE: https://ubuntu.com/security/CVE-2025-21991
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21991-x86-microcode-amd-fix-out-of-bounds-on-systems-with-cpu-less-numa-nodes.patch
- From: 5.15.0-142.152
- CVE-2025-21968, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix slab-use-after-free on hdcp_work
- CVE: https://ubuntu.com/security/CVE-2025-21968
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21968-drm-amd-display-fix-slab-use-after-free-on-hdcp-work.patch
- From: 5.15.0-142.152
- CVE-2025-22004, CVSSv2 Score: 7.8
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://ubuntu.com/security/CVE-2025-22004
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 5.15.0-142.152
- CVE-2025-21999, CVSSv2 Score: 7.8
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://ubuntu.com/security/CVE-2025-21999
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode.patch
- From: 5.15.0-142.152
- CVE-2025-21999, CVSSv2 Score: 7.8
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://ubuntu.com/security/CVE-2025-21999
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-53144 CVE-2024-8805, CVSSv2 Score: nan
- Description:
Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE
- CVE: https://ubuntu.com/security/CVE-2024-8805
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-53144-CVE-2024-8805-bluetooth-hci-event-align-br-edr-just-works-paring-with-le.patch
- From: 5.15.0-142.152
- CVE-2025-22020, CVSSv2 Score: 7.8
- Description:
memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
- CVE: https://ubuntu.com/security/CVE-2025-22020
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22020-memstick-rtsx-usb-ms-fix-slab-use-after-free-in-rtsx-usb-ms-drv-remove.patch
- From: 5.15.0-142.152
- CVE-2025-22055, CVSSv2 Score: 5.5
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://ubuntu.com/security/CVE-2025-22055
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow.patch
- From: 5.15.0-142.152
- CVE-2025-22055, CVSSv2 Score: 5.5
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://ubuntu.com/security/CVE-2025-22055
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-46821, CVSSv2 Score: 7.8
- Description:
drm/amd/pm: Fix negative array index read
- CVE: https://ubuntu.com/security/CVE-2024-46821
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-46821-drm-amd-pm-fix-negative-array-index-read.patch
- From: 5.15.0-142.152
- CVE-2024-46812, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration
- CVE: https://ubuntu.com/security/CVE-2024-46812
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-46812-drm-amd-display-skip-inactive-planes-within-modesupportandsystemconfiguration.patch
- From: 5.15.0-142.152