- kernel-5.15.0-1082.91 (ubuntu-jammy-azure)
- 5.15.0-1103.112
- 2026-03-19 21:07:08
- 2026-03-20 09:21:50
- K20260319_18
- CVE-2024-49996
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://ubuntu.com/security/CVE-2024-49996
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points-5.15.0-1075.84.patch
- From: 5.15.0-135.146
- CVE-2024-50055
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://ubuntu.com/security/CVE-2024-50055
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 5.15.0-135.146
- CVE-2024-50051
- Description:
spi: mpc52xx: Add cancel_work_sync before module remove
- CVE: https://ubuntu.com/security/CVE-2024-50051
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50051-spi-mpc52xx-add-cancel-work-sync-before-module-remove.patch
- From: 5.15.0-135.146
- CVE-2024-47730
- Description:
crypto: hisilicon/qm - inject error before stopping queue
- CVE: https://ubuntu.com/security/CVE-2024-47730
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47730-crypto-hisilicon-qm-inject-error-before-stopping-queue.patch
- From: 5.15.0-135.146
- CVE-2024-50121
- Description:
nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
- CVE: https://ubuntu.com/security/CVE-2024-50121
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50121-nfsd-cancel-nfsd-shrinker-work-using-sync-mode-in-nfs4-state-shutdown-net.patch
- From: 5.15.0-135.146
- CVE-2024-43900
- Description:
media: xc2028: avoid use-after-free in load_firmware_cb()
- CVE: https://ubuntu.com/security/CVE-2024-43900
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-43900-media-xc2028-avoid-use-after-free-in-load-firmware-cb.patch
- From: 5.15.0-135.146
- CVE-2024-50242
- Description:
fs/ntfs3: Additional check in ntfs_file_release
- CVE: https://ubuntu.com/security/CVE-2024-50242
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50242-fs-ntfs3-additional-check-in-ntfs-file-release.patch
- From: 5.15.0-135.146
- CVE-2024-56619
- Description:
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-56619
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56619-nilfs2-fix-potential-out-of-bounds-memory-access-in-nilfs-find-entry.patch
- From: 5.15.0-135.146
- CVE-2024-56615
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56615
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 5.15.0-135.146
- CVE-2024-56614
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56614
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 5.15.0-135.146
- CVE-2024-56606
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56606
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 5.15.0-135.146
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://ubuntu.com/security/CVE-2024-56605
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.15.0-135.146
- CVE-2024-56603
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://ubuntu.com/security/CVE-2024-56603
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.15.0-135.146
- CVE-2024-56602
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://ubuntu.com/security/CVE-2024-56602
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.15.0-135.146
- CVE-2024-56601
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56601
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.15.0-135.146
- CVE-2024-56626
- Description:
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
- CVE: https://ubuntu.com/security/CVE-2024-56626
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56626-ksmbd-fix-out-of-bounds-write-in-ksmbd-vfs-stream-write.patch
- From: 5.15.0-135.146
- CVE-2024-57896
- Description:
btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount
- CVE: https://ubuntu.com/security/CVE-2024-57896
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57896-btrfs-flush-delalloc-workers-queue-before-stopping-cleaner-kthread-during-unmount.patch
- From: 5.15.0-135.146
- CVE-2024-57900
- Description:
ila: serialize calls to nf_register_net_hooks()
- CVE: https://ubuntu.com/security/CVE-2024-57900
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57900-ila-serialize-calls-to-nf-register-net-hooks.patch
- From: 5.15.0-135.146
- CVE-2025-21631
- Description:
block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()
- CVE: https://ubuntu.com/security/CVE-2025-21631
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21631-block-bfq-fix-waker-bfqq-uaf-after-bfq-split-bfqq.patch
- From: 5.15.0-135.146
- CVE-2025-21680
- Description:
pktgen: Avoid out-of-bounds access in get_imix_entries
- CVE: https://ubuntu.com/security/CVE-2025-21680
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21680-pktgen-avoid-out-of-bounds-access-in-get-imix-entries.patch
- From: 5.15.0-135.146
- CVE-2025-21687
- Description:
vfio/platform: check the bounds of read/write syscalls
- CVE: https://ubuntu.com/security/CVE-2025-21687
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21687-vfio-platform-check-the-bounds-of-read-write-syscalls.patch
- From: 5.15.0-135.146
- CVE-2025-21692
- Description:
net: sched: fix ets qdisc OOB Indexing
- CVE: https://ubuntu.com/security/CVE-2025-21692
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21692-net-sched-fix-ets-qdisc-oob-indexing.patch
- From: 5.15.0-135.146
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://ubuntu.com/security/CVE-2024-53150
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.15.0-135.146
- CVE-2024-53155
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://ubuntu.com/security/CVE-2024-53155
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 5.15.0-135.146
- CVE-2024-56650
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://ubuntu.com/security/CVE-2024-56650
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 5.15.0-135.146
- CVE-2024-50275
- Description:
arm64/sve: Discard stale CPU state when handling SVE traps
- CVE: https://ubuntu.com/security/CVE-2024-50275
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50275-arm64-sve-discard-stale-cpu-state-when-handling-sve-traps.patch
- From: 5.15.0-135.146
- CVE-2024-56662
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://ubuntu.com/security/CVE-2024-56662
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi-nfit-ctl.patch
- From: 5.15.0-135.146
- CVE-2024-56627
- Description:
ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
- CVE: https://ubuntu.com/security/CVE-2024-56627
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56627-ksmbd-fix-out-of-bounds-read-in-ksmbd-vfs-stream-read.patch
- From: 5.15.0-135.146
- CVE-2024-57925
- Description:
ksmbd: fix a missing return value check bug
- CVE: https://ubuntu.com/security/CVE-2024-57925
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57925-ksmbd-fix-a-missing-return-value-check-bug.patch
- From: 5.15.0-135.146
- CVE-2024-57912
- Description:
iio: pressure: zpa2326: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57912
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57912-iio-pressure-zpa2326-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57911
- Description:
iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57911
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57911-iio-dummy-iio-simply-dummy-buffer-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57910
- Description:
iio: light: vcnl4035: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57910
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57910-iio-light-vcnl4035-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57908
- Description:
iio: imu: kmx61: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57908
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57908-iio-imu-kmx61-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57906
- Description:
iio: adc: ti-ads8688: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57906
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57906-iio-adc-ti-ads8688-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-36899
- Description:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
- CVE: https://ubuntu.com/security/CVE-2024-36899
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-36899-gpiolib-cdev-fix-use-after-free-in-lineinfo-changed-notify.patch
- From: 5.15.0-135.146
- CVE-2024-57907
- Description:
iio: adc: rockchip_saradc: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57907
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57907-iio-adc-rockchip-saradc-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch-uek7.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2022-49034
- Description:
Out of scope: SuperH arch not supported.
- CVE:
- Patch: skipped/CVE-2022-49034.patch
- From:
- CVE-2024-57874
- Description:
arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL
- CVE: https://ubuntu.com/security/CVE-2024-57874
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57874-arm64-ptrace-fix-partial-setregset-for-nt-arm-tagged-addr-ctrl.patch
- From: 5.15.0-135.146
- CVE-2024-45828
- Description:
i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request
- CVE: https://ubuntu.com/security/CVE-2024-45828
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-45828-i3c-mipi-i3c-hci-mask-ring-interrupts-before-ring-stop-request.patch
- From: 5.15.0-135.146
- CVE-2024-43098
- Description:
i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock
- CVE: https://ubuntu.com/security/CVE-2024-43098
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-43098-i3c-use-i3cdev-desc-info-instead-of-calling-i3c-device-get-info-to-avoid-deadlock.patch
- From: 5.15.0-135.146
- CVE-2024-46809
- Description:
drm/amd/display: Check BIOS images before it is used
- CVE: https://ubuntu.com/security/CVE-2024-46809
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46809-drm-amd-display-check-bios-images-before-it-is-used.patch
- From: 5.15.0-135.146
- CVE-2024-42315
- Description:
exfat: fix potential deadlock on __exfat_get_dentry_set
- CVE: https://ubuntu.com/security/CVE-2024-42315
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-42315-exfat-fix-potential-deadlock-on-exfat-get-dentry-set.patch
- From: 5.15.0-135.146
- CVE-2024-36476
- Description:
RDMA/rtrs: Ensure 'ib_sge list' is accessible
- CVE: https://ubuntu.com/security/CVE-2024-36476
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-36476-rdma-rtrs-ensure-ib-sge-list-is-accessible.patch
- From: 5.15.0-135.146
- CVE-2024-44938
- Description:
jfs: Fix shift-out-of-bounds in dbDiscardAG
- CVE: https://ubuntu.com/security/CVE-2024-44938
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-44938-jfs-fix-shift-out-of-bounds-in-dbdiscardag.patch
- From: 5.15.0-135.146
- CVE-2024-53158
- Description:
soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()
- CVE: https://ubuntu.com/security/CVE-2024-53158
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53158-soc-qcom-geni-se-fix-array-underflow-in-geni-se-clk-tbl-get.patch
- From: 5.15.0-135.146
- CVE-2025-21683
- Description:
bpf: Fix bpf_sk_select_reuseport() memory leak
- CVE: https://ubuntu.com/security/CVE-2025-21683
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21683-bpf-fix-bpf-sk-select-reuseport-memory-leak.patch
- From: 5.15.0-135.146
- CVE-2025-21678
- Description:
gtp: Destroy device along with udp socket's netns dismantle.
- CVE: https://ubuntu.com/security/CVE-2025-21678
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21678-gtp-destroy-device-along-with-udp-socket-s-netns-dismantle.patch
- From: 5.15.0-135.146
- CVE-2025-21697
- Description:
drm/v3d: Ensure job pointer is set to NULL after job completion
- CVE: https://ubuntu.com/security/CVE-2025-21697
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21697-drm-v3d-ensure-job-pointer-is-set-to-null-after-job-completion.patch
- From: 5.15.0-135.146
- CVE-2025-21697
- Description:
drm/v3d: Assign job pointer to NULL before signaling the fence
- CVE: https://ubuntu.com/security/CVE-2025-21697
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21697-drm-v3d-Assign-job-pointer-to-NULL-before-signaling-the-fence.patch
- From: 5.15.0-135.146
- CVE-2025-21694
- Description:
fs/proc: fix softlockup in __read_vmcore (part 2)
- CVE: https://ubuntu.com/security/CVE-2025-21694
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21694-fs-proc-fix-softlockup-in-read-vmcore-part-2.patch
- From: 5.15.0-135.146
- CVE-2025-21669
- Description:
vsock/virtio: discard packets if the transport changes
- CVE: https://ubuntu.com/security/CVE-2025-21669
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21669-vsock-virtio-discard-packets-if-the-transport-changes.patch
- From: 5.15.0-135.146
- CVE-2025-21699
- Description:
gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
- CVE: https://ubuntu.com/security/CVE-2025-21699
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21699-gfs2-truncate-address-space-when-flipping-gfs2-dif-jdata-flag.patch
- From: 5.15.0-135.146
- CVE-2025-21690
- Description:
scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
- CVE: https://ubuntu.com/security/CVE-2025-21690
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21690-scsi-storvsc-ratelimit-warning-logs-to-prevent-vm-denial-of-service.patch
- From: 5.15.0-135.146
- CVE-2025-21689
- Description:
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
- CVE: https://ubuntu.com/security/CVE-2025-21689
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21689-usb-serial-quatech2-fix-null-ptr-deref-in-qt2-process-read-urb.patch
- From: 5.15.0-135.146
- CVE-2024-49950
- Description:
Bluetooth: L2CAP: Fix uaf in l2cap_connect
- CVE: https://ubuntu.com/security/CVE-2024-49950
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49950-Bluetooth-L2CAP-Fix-uaf-in-l2cap_connect.patch
- From: 5.15.0-135.146
- CVE-2024-49950
- Description:
Bluetooth: hci_core: Fix calling mgmt_device_connected
- CVE: https://ubuntu.com/security/CVE-2024-49950
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49950-Bluetooth-hci_core-Fix-calling-mgmt_device_connected.patch
- From: 5.15.0-135.146
- CVE-2024-57951
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://ubuntu.com/security/CVE-2024-57951
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57951-hrtimers-Handle-CPU-state-correctly-on-hotplug.patch
- From: 5.15.0-135.146
- CVE-2024-57951
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://ubuntu.com/security/CVE-2024-57951
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57951-hrtimers-Handle-CPU-state-correctly-on-hotplug-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-53161
- Description:
EDAC/bluefield: Fix potential integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-53161
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53161-edac-bluefield-fix-potential-integer-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-53157
- Description:
firmware: arm_scpi: Check the DVFS OPP count returned by the firmware
- CVE: https://ubuntu.com/security/CVE-2024-53157
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53157-firmware-arm-scpi-check-the-dvfs-opp-count-returned-by-the-firmware.patch
- From: 5.15.0-135.146
- CVE-2024-53214
- Description:
vfio/pci: Properly hide first-in-list PCIe extended capability
- CVE: https://ubuntu.com/security/CVE-2024-53214
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53214-vfio-pci-properly-hide-first-in-list-pcie-extended-capability.patch
- From: 5.15.0-135.146
- CVE-2024-53198
- Description:
xen: Fix the issue of resource not being properly released in xenbus_dev_probe()
- CVE: https://ubuntu.com/security/CVE-2024-53198
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53198-xen-fix-the-issue-of-resource-not-being-properly-released-in-xenbus-dev-probe.patch
- From: 5.15.0-135.146
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 5.15.0-135.146
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix a DMA to stack memory bug
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53197-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch
- From: 5.15.0-135.146
- CVE-2024-53184
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53184.patch
- From:
- CVE-2024-53183
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53183.patch
- From:
- CVE-2024-53181
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53181.patch
- From:
- CVE-2024-53180
- Description:
ALSA: pcm: Add sanity NULL check for the default mmap fault handler
- CVE: https://ubuntu.com/security/CVE-2024-53180
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53180-alsa-pcm-add-sanity-null-check-for-the-default-mmap-fault-handler.patch
- From: 5.15.0-135.146
- CVE-2024-53172
- Description:
ubi: fastmap: Fix duplicate slab cache names while attaching
- CVE: https://ubuntu.com/security/CVE-2024-53172
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53172-ubi-fastmap-fix-duplicate-slab-cache-names-while-attaching.patch
- From: 5.15.0-135.146
- CVE-2024-56708
- Description:
EDAC/igen6: Avoid segmentation fault on module unload
- CVE: https://ubuntu.com/security/CVE-2024-56708
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56708-edac-igen6-avoid-segmentation-fault-on-module-unload.patch
- From: 5.15.0-135.146
- CVE-2024-56678
- Description:
powerpc: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-56678.patch
- From:
- CVE-2024-56704
- Description:
9p/xen: fix release of IRQ
- CVE: https://ubuntu.com/security/CVE-2024-56704
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 5.15.0-135.146
- CVE-2024-56642
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://ubuntu.com/security/CVE-2024-56642
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.15.0-135.146
- CVE-2024-56640
- Description:
net/smc: fix LGR and link use-after-free issue
- CVE: https://ubuntu.com/security/CVE-2024-56640
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56640-net-smc-fix-lgr-and-link-use-after-free-issue.patch
- From: 5.15.0-135.146
- CVE-2024-57850
- Description:
jffs2: Prevent rtime decompress memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-57850
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57850-jffs2-prevent-rtime-decompress-memory-corruption.patch
- From: 5.15.0-135.146
- CVE-2024-56759
- Description:
btrfs: fix use-after-free when COWing tree bock and tracing is enabled
- CVE: https://ubuntu.com/security/CVE-2024-56759
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56759-btrfs-fix-use-after-free-when-cowing-tree-bock-and-tracing-is-enabled.patch
- From: 5.15.0-135.146
- CVE-2024-57892
- Description:
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
- CVE: https://ubuntu.com/security/CVE-2024-57892
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57892-ocfs2-fix-slab-use-after-free-due-to-dangling-pointer-dqi-priv.patch
- From: 5.15.0-135.146
- CVE-2024-56631
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://ubuntu.com/security/CVE-2024-56631
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 5.15.0-135.146
- CVE-2024-58087
- Description:
ksmbd: fix racy issue from session lookup and expire
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-58087-ksmbd-fix-racy-issue-from-session-lookup-and-expire.patch
- From: 5.15.0-135.146
- CVE-2024-46841
- Description:
btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()
- CVE: https://ubuntu.com/security/CVE-2024-46841
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46841-btrfs-don-t-bug-on-on-enomem-from-btrfs-lookup-extent-info-in-walk-down-proc.patch
- From: 5.15.0-135.146
- CVE-2024-47143
- Description:
dma-debug: fix a possible deadlock on radix_lock
- CVE: https://ubuntu.com/security/CVE-2024-47143
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47143-dma-debug-fix-a-possible-deadlock-on-radix-lock.patch
- From: 5.15.0-135.146
- CVE-2024-47408
- Description:
net/smc: check smcd_v2_ext_offset when receiving proposal msg
- CVE: https://ubuntu.com/security/CVE-2024-47408
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47408-net-smc-check-smcd-v2-ext-offset-when-receiving-proposal-msg.patch
- From: 5.15.0-135.146
- CVE-2024-47707
- Description:
ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
- CVE: https://ubuntu.com/security/CVE-2024-47707
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47707-ipv6-avoid-possible-null-deref-in-rt6-uncached-list-flush-dev.patch
- From: 5.15.0-135.146
- CVE-2024-48881
- Description:
bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again
- CVE: https://ubuntu.com/security/CVE-2024-48881
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-48881-bcache-revert-replacing-is-err-or-null-with-is-err-again.patch
- From: 5.15.0-135.146
- CVE-2024-49571
- Description:
net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg
- CVE: https://ubuntu.com/security/CVE-2024-49571
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49571-net-smc-check-iparea-offset-and-ipv6-prefixes-cnt-when-receiving-proposal-msg.patch
- From: 5.15.0-135.146
- CVE-2024-49998
- Description:
net: dsa: improve shutdown sequence
- CVE: https://ubuntu.com/security/CVE-2024-49998
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49998-net-dsa-improve-shutdown-sequence.patch
- From: 5.15.0-135.146
- CVE-2024-50304
- Description:
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
- CVE: https://ubuntu.com/security/CVE-2024-50304
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50304-ipv4-ip-tunnel-fix-suspicious-rcu-usage-warning-in-ip-tunnel-find.patch
- From: 5.15.0-135.146
- CVE-2025-21648
- Description:
netfilter: conntrack: clamp maximum hashtable size to INT_MAX
- CVE: https://ubuntu.com/security/CVE-2025-21648
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21648-netfilter-conntrack-clamp-maximum-hashtable-size-to-int-max.patch
- From: 5.15.0-135.146
- CVE-2025-21646
- Description:
afs: Fix the maximum cell name length
- CVE: https://ubuntu.com/security/CVE-2025-21646
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21646-afs-fix-the-maximum-cell-name-length.patch
- From: 5.15.0-135.146
- CVE-2025-21664
- Description:
dm thin: make get_first_thin use rcu-safe list first function
- CVE: https://ubuntu.com/security/CVE-2025-21664
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21664-dm-thin-make-get-first-thin-use-rcu-safe-list-first-function.patch
- From: 5.15.0-135.146
- CVE-2025-21640
- Description:
sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21640
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21640-sctp-sysctl-cookie-hmac-alg-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21639
- Description:
sctp: sysctl: rto_min/max: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21639
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21639-sctp-sysctl-rto-min-max-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21638
- Description:
sctp: sysctl: auth_enable: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21638
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21638-sctp-sysctl-auth-enable-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21637
- Description:
sctp: sysctl: udp_port: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21637
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21637-sctp-sysctl-udp-port-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21666
- Description:
vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
- CVE: https://ubuntu.com/security/CVE-2025-21666
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21666-vsock-prevent-null-ptr-deref-in-vsock-has-data-has-space.patch
- From: 5.15.0-135.146
- CVE-2025-21665
- Description:
filemap: avoid truncating 64-bit offset to 32 bits
- CVE: https://ubuntu.com/security/CVE-2025-21665
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21665-filemap-avoid-truncating-64-bit-offset-to-32-bits.patch
- From: 5.15.0-135.146
- CVE-2025-21653
- Description:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
- CVE: https://ubuntu.com/security/CVE-2025-21653
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21653-net-sched-cls-flow-validate-tca-flow-rshift-attribute.patch
- From: 5.15.0-135.146
- CVE-2025-21653
- Description:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (adaptation)
- CVE: https://ubuntu.com/security/CVE-2025-21653
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21653-net-sched-cls-flow-validate-tca-flow-rshift-attribute-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-57902
- Description:
af_packet: fix vlan_get_tci() vs MSG_PEEK
- CVE: https://ubuntu.com/security/CVE-2024-57902
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57902-af-packet-fix-vlan-get-tci-vs-msg-peek.patch
- From: 5.15.0-135.146
- CVE-2024-57897
- Description:
drm/amdkfd: Correct the migration DMA map direction
- CVE: https://ubuntu.com/security/CVE-2024-57897
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57897-drm-amdkfd-correct-the-migration-dma-map-direction.patch
- From: 5.15.0-135.146
- CVE-2024-57884
- Description:
mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()
- CVE: https://ubuntu.com/security/CVE-2024-57884
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57884-mm-vmscan-account-for-free-pages-to-prevent-infinite-loop-in-throttle-direct-reclaim.patch
- From: 5.15.0-135.146
- CVE-2024-57913
- Description:
usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
- CVE: https://ubuntu.com/security/CVE-2024-57913
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57913-usb-gadget-f-fs-remove-warn-on-in-functionfs-bind.patch
- From: 5.15.0-135.146
- CVE-2024-57904
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57904.patch
- From:
- CVE-2024-57882
- Description:
mptcp: fix TCP options overflow.
- CVE: https://ubuntu.com/security/CVE-2024-57882
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57882-mptcp-fix-tcp-options-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-56693
- Description:
brd: remove brd_devices_mutex mutex
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56693-brd-remove-brd_devices_mutex-mutex-dep.patch
- From: 5.15.0-135.146
- CVE-2024-56693
- Description:
brd: defer automatic disk creation until module initialization succeeds
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56693-brd-defer-automatic-disk-creation-until-module-initialization-succeeds.patch
- From: 5.15.0-135.146
- CVE-2024-46871
- Description:
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
- CVE: https://ubuntu.com/security/CVE-2024-46871
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46871-drm-amd-display-Correct-the-defined-value-for-AMDGPU_DMUB_NOTIFICATION_MAX.patch
- From: 5.15.0-135.146
- CVE-2024-46871
- Description:
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
- CVE: https://ubuntu.com/security/CVE-2024-46871
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46871-drm-amd-display-Correct-the-defined-value-for-AMDGPU_DMUB_NOTIFICATION_MAX-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-56548
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times.patch
- From: 5.15.0-135.146
- CVE-2024-56548
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-52332
- Description:
igb: Fix potential invalid memory access in igb_init_module()
- CVE: https://ubuntu.com/security/CVE-2024-52332
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-52332-igb-fix-potential-invalid-memory-access-in-igb-init-module.patch
- From: 5.15.0-135.146
- CVE-2024-53112
- Description:
ocfs2: uncache inode which has failed entering the group
- CVE: https://ubuntu.com/security/CVE-2024-53112
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53112-ocfs2-uncache-inode-which-has-failed-entering-the-group.patch
- From: 5.15.0-135.146
- CVE-2024-53113
- Description:
mm: fix NULL pointer dereference in alloc_pages_bulk_noprof
- CVE: https://ubuntu.com/security/CVE-2024-53113
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53113-mm-fix-null-pointer-dereference-in-alloc-pages-bulk-noprof.patch
- From: 5.15.0-135.146
- CVE-2024-53119
- Description:
virtio/vsock: Fix accept_queue memory leak
- CVE: https://ubuntu.com/security/CVE-2024-53119
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53119-virtio-vsock-fix-accept-queue-memory-leak.patch
- From: 5.15.0-135.146
- CVE-2024-53120
- Description:
net/mlx5e: CT: Fix null-ptr-deref in add rule err flow
- CVE: https://ubuntu.com/security/CVE-2024-53120
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53120-net-mlx5e-ct-fix-null-ptr-deref-in-add-rule-err-flow.patch
- From: 5.15.0-135.146
- CVE-2024-53121
- Description:
net/mlx5: fs, lock FTE when checking if active
- CVE: https://ubuntu.com/security/CVE-2024-53121
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53121-net-mlx5-fs-lock-fte-when-checking-if-active.patch
- From: 5.15.0-135.146
- CVE-2024-53122
- Description:
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
- CVE: https://ubuntu.com/security/CVE-2024-53122
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch
- From: 5.15.0-135.146
- CVE-2024-53124
- Description:
net: fix data-races around sk->sk_forward_alloc
- CVE: https://ubuntu.com/security/CVE-2024-53124
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53124-net-fix-data-races-around-sk-sk-forward-alloc.patch
- From: 5.15.0-135.146
- CVE-2024-53127
- Description:
Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"
- CVE: https://ubuntu.com/security/CVE-2024-53127
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53127-revert-mmc-dw-mmc-fix-idmac-operation-with-pages-bigger-than-4k.patch
- From: 5.15.0-135.146
- CVE-2024-57889
- Description:
pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking
- CVE: https://ubuntu.com/security/CVE-2024-57889
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57889-pinctrl-mcp23s08-fix-sleeping-in-atomic-context-due-to-regmap-locking.patch
- From: 5.15.0-135.146
- CVE-2024-57889
- Description:
pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-57889
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57889-pinctrl-mcp23s08-fix-sleeping-in-atomic-context-due-to-regmap-locking-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-57890
- Description:
RDMA/uverbs: Prevent integer overflow issue
- CVE: https://ubuntu.com/security/CVE-2024-57890
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57890-rdma-uverbs-prevent-integer-overflow-issue.patch
- From: 5.15.0-135.146
- CVE-2024-57903
- Description:
net: restrict SO_REUSEPORT to inet sockets
- CVE: https://ubuntu.com/security/CVE-2024-57903
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57903-net-restrict-so-reuseport-to-inet-sockets.patch
- From: 5.15.0-135.146
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53239-alsa-6fire-release-resources-at-card-release.patch
- From: 5.15.0-135.146
- CVE-2024-53237
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://ubuntu.com/security/CVE-2024-53237
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child.patch
- From: 5.15.0-135.146
- CVE-2024-53237
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://ubuntu.com/security/CVE-2024-53237
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-53227
- Description:
scsi: bfa: Fix use-after-free in bfad_im_module_exit()
- CVE: https://ubuntu.com/security/CVE-2024-53227
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53227-scsi-bfa-fix-use-after-free-in-bfad-im-module-exit.patch
- From: 5.15.0-135.146
- CVE-2024-56581
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://ubuntu.com/security/CVE-2024-56581
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 5.15.0-135.146
- CVE-2024-56558
- Description:
nfsd: make sure exp active before svc_export_show
- CVE: https://ubuntu.com/security/CVE-2024-56558
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56558-nfsd-make-sure-exp-active-before-svc-export-show.patch
- From: 5.15.0-135.146
- CVE-2024-56600
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://ubuntu.com/security/CVE-2024-56600
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.15.0-135.146
- CVE-2024-56598
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://ubuntu.com/security/CVE-2024-56598
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 5.15.0-135.146
- CVE-2024-56596
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://ubuntu.com/security/CVE-2024-56596
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.15.0-135.146
- CVE-2024-56595
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2024-56595
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-135.146
- CVE-2024-57901
- Description:
af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK
- CVE: https://ubuntu.com/security/CVE-2024-57901
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57901-af-packet-fix-vlan-get-protocol-dgram-vs-msg-peek.patch
- From: 5.15.0-135.146
- CVE-2024-57901
- Description:
af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-57901
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57901-af-packet-fix-vlan-get-protocol-dgram-vs-msg-peek-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-56644
- Description:
net/ipv6: release expired exception dst cached in socket
- CVE: https://ubuntu.com/security/CVE-2024-56644
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56644-net-ipv6-release-expired-exception-dst-cached-in-socket.patch
- From: 5.15.0-135.146
- CVE-2024-53125
- Description:
bpf: sync_linked_regs() must preserve subreg_def
- CVE: https://ubuntu.com/security/CVE-2024-53125
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53125-bpf-sync_linked_regs-must-preserve-subreg_def.patch
- From: 5.15.0-135.146
- CVE-2024-57917
- Description:
topology: Keep the cpumask unchanged when printing cpumap
- CVE: https://ubuntu.com/security/CVE-2024-57917
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57917-topology-keep-the-cpumask-unchanged-when-printing-cpumap.patch
- From: 5.15.0-135.146
- CVE-2024-57922
- Description:
drm/amd/display: Add check for granularity in dml ceil/floor helpers
- CVE: https://ubuntu.com/security/CVE-2024-57922
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57922-drm-amd-display-add-check-for-granularity-in-dml-ceil-floor-helpers.patch
- From: 5.15.0-135.146
- CVE-2024-57929
- Description:
dm array: fix releasing a faulty array block twice in dm_array_cursor_end
- CVE: https://ubuntu.com/security/CVE-2024-57929
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57929-dm-array-fix-releasing-a-faulty-array-block-twice-in-dm-array-cursor-end.patch
- From: 5.15.0-135.146
- CVE-2024-57931
- Description:
selinux: ignore unknown extended permissions
- CVE: https://ubuntu.com/security/CVE-2024-57931
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57931-selinux-ignore-unknown-extended-permissions.patch
- From: 5.15.0-135.146
- CVE-2024-57938
- Description:
net/sctp: Prevent autoclose integer overflow in sctp_association_init()
- CVE: https://ubuntu.com/security/CVE-2024-57938
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57938-net-sctp-prevent-autoclose-integer-overflow-in-sctp-association-init.patch
- From: 5.15.0-135.146
- CVE-2024-57939
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57939.patch
- From:
- CVE-2024-57940
- Description:
exfat: fix the infinite loop in exfat_readdir()
- CVE: https://ubuntu.com/security/CVE-2024-57940
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57940-exfat-fix-the-infinite-loop-in-exfat-readdir.patch
- From: 5.15.0-135.146
- CVE-2024-57946
- Description:
virtio-blk: don't keep queue frozen during system suspend
- CVE: https://ubuntu.com/security/CVE-2024-57946
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57946-virtio-blk-don-t-keep-queue-frozen-during-system-suspend.patch
- From: 5.15.0-135.146
- CVE-2024-57948
- Description:
mac802154: check local interfaces before deleting sdata list
- CVE: https://ubuntu.com/security/CVE-2024-57948
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57948-mac802154-check-local-interfaces-before-deleting-sdata-list.patch
- From: 5.15.0-135.146
- CVE-2025-21636
- Description:
sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21636
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21636-sctp-sysctl-plpmtud-probe-interval-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2024-53129
- Description:
drm/rockchip: vop: Fix a dereferenced before check warning
- CVE: https://ubuntu.com/security/CVE-2024-53129
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53129-drm-rockchip-vop-fix-a-dereferenced-before-check-warning.patch
- From: 5.15.0-135.146
- CVE-2024-53131
- Description:
nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
- CVE: https://ubuntu.com/security/CVE-2024-53131
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53131-nilfs2-fix-null-ptr-deref-in-block-touch-buffer-tracepoint.patch
- From: 5.15.0-135.146
- CVE-2024-53130
- Description:
nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint
- CVE: https://ubuntu.com/security/CVE-2024-53130
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53130-nilfs2-fix-null-ptr-deref-in-block-dirty-buffer-tracepoint.patch
- From: 5.15.0-135.146
- CVE-2024-53136
- Description:
mm: revert "mm: shmem: fix data-race in shmem_getattr()"
- CVE: https://ubuntu.com/security/CVE-2024-53136
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53136-mm-revert-mm-shmem-fix-data-race-in-shmem-getattr.patch
- From: 5.15.0-135.146
- CVE-2024-53151
- Description:
svcrdma: Address an integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-53151
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53151-svcrdma-address-an-integer-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-53148
- Description:
comedi: Flush partial mappings in error case
- CVE: https://ubuntu.com/security/CVE-2024-53148
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53148-comedi-flush-partial-mappings-in-error-case.patch
- From: 5.15.0-135.146
- CVE-2024-53146
- Description:
NFSD: Prevent a potential integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-53146
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53146-nfsd-prevent-a-potential-integer-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-53145
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53145.patch
- From:
- CVE-2024-53138
- Description:
net/mlx5e: kTLS, Fix incorrect page refcounting
- CVE: https://ubuntu.com/security/CVE-2024-53138
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53138-net-mlx5e-ktls-fix-incorrect-page-refcounting.patch
- From: 5.15.0-135.146
- CVE-2024-53140
- Description:
[PATCH] netlink: terminate outstanding dump on socket close
- CVE: https://ubuntu.com/security/CVE-2024-53140
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53140-netlink-terminate-outstanding-dump-on-socket-close-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle.patch
- From: 5.15.0-136.147
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch.patch
- From: 5.15.0-136.147
- CVE-2024-35864
- Description:
smb: client: fix potential UAF in smb2_is_valid_lease_break()
- CVE: https://ubuntu.com/security/CVE-2024-35864
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-35864-smb-client-fix-potential-uaf-in-smb2-is-valid-lease-break-azure.patch
- From: 5.15.0-136.147
- CVE-2024-35864 CVE-2024-26928
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://ubuntu.com/security/CVE-2024-26928
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-26928-CVE-2024-35864-smb-client-fix-potential-uaf-in-cifs-debug-files-proc-show-azure.patch
- From: 5.15.0-136.147
- CVE-2024-57798
- Description:
drm/dp_mst: Skip CSN if topology probing is not done yet
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-57798-drm-dp-mst-skip-csn-if-topology-probing-is-not-done-yet.patch
- From: 5.15.0-136.147
- CVE-2024-57798
- Description:
drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-57798-drm-dp-mst-ensure-mst-primary-pointer-is-valid-in-drm-dp-mst-handle-up-req.patch
- From: 5.15.0-136.147
- CVE-2025-21701
- Description:
net: avoid race between device unregistration and ethnl ops
- CVE: https://ubuntu.com/security/CVE-2025-21701
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21701-net-avoid-race-between-device-unregistration-and-ethnl-ops.patch
- From: 5.15.0-138.148
- CVE-2022-0995
- Description:
watch_queue: Use the bitmap API when applicable
- CVE: https://ubuntu.com/security/CVE-2022-0995
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2022-0995-watch-queue-use-the-bitmap-api-when-applicable.patch
- From: 5.15.0-138.148
- CVE-2024-50248
- Description:
ntfs3: Add bounds checking to mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-50248
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50248-ntfs3-add-bounds-checking-to-mi-enum-attr.patch
- From: 5.15.0-138.148
- CVE-2024-50248
- Description:
fs/ntfs3: Sequential field availability check in mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-50248
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50248-fs-ntfs3-sequential-field-availability-check-in-mi-enum-attr.patch
- From: 5.15.0-138.148
- CVE-2025-21993
- Description:
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
- CVE: https://ubuntu.com/security/CVE-2025-21993
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21993-iscsi-ibft-fix-ubsan-shift-out-of-bounds-warning-in-ibft-attr-show-nic.patch
- From: 5.15.0-138.148
- CVE-2024-56651
- Description:
can: hi311x: hi3110_can_ist(): fix potential use-after-free
- CVE: https://ubuntu.com/security/CVE-2024-56651
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-56651-can-hi311x-hi3110-can-ist-fix-potential-use-after-free.patch
- From: 5.15.0-138.148
- CVE-2024-46826
- Description:
ELF: fix kernel.randomize_va_space double read
- CVE: https://ubuntu.com/security/CVE-2024-46826
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-46826-elf-fix-kernel-randomize-va-space-double-read.patch
- From: 5.15.0-138.148
- CVE-2025-21700
- Description:
net: sched: Disallow replacing of child qdisc from one parent to another
- CVE: https://ubuntu.com/security/CVE-2025-21700
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21700-net-sched-disallow-replacing-of-child-qdisc-from-one-parent-to-another.patch
- From: 5.15.0-138.148
- CVE-2025-21702
- Description:
pfifo_tail_enqueue: Drop new packet when sch->limit == 0
- CVE: https://ubuntu.com/security/CVE-2025-21702
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21702-pfifo-tail-enqueue-drop-new-packet-when-sch-limit-0.patch
- From: 5.15.0-138.148
- CVE-2024-50256
- Description:
netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
- CVE: https://ubuntu.com/security/CVE-2024-50256
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50256-netfilter-nf-reject-ipv6-fix-potential-crash-in-nf-send-reset6.patch
- From: 5.15.0-138.148
- CVE-2025-21756
- Description:
vsock: Keep the binding until socket destruction
- CVE: https://ubuntu.com/security/CVE-2025-21756
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21756-vsock-keep-the-binding-until-socket-destruction.patch
- From: 5.15.0-138.148
- CVE-2025-21756
- Description:
vsock: Orphan socket after transport release
- CVE: https://ubuntu.com/security/CVE-2025-21756
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21756-vsock-orphan-socket-after-transport-release.patch
- From: 5.15.0-138.148
- CVE-2024-26837
- Description:
net: bridge: switchdev: Skip MDB replays of deferred events on offload
- CVE: https://ubuntu.com/security/CVE-2024-26837
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-26837-net-bridge-switchdev-skip-mdb-replays-of-deferred-events-on-offload.patch
- From: 5.15.0-138.148
- CVE-2024-26837
- Description:
net: bridge: switchdev: Skip MDB replays of deferred events on offload (adapatation)
- CVE: https://ubuntu.com/security/CVE-2024-26837
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-26837-net-bridge-switchdev-skip-mdb-replays-of-deferred-events-on-offload-kpatch.patch
- From: 5.15.0-138.148
- CVE-2023-52927
- Description:
netfilter: allow exp not to be removed in nf_ct_find_expectation
- CVE: https://ubuntu.com/security/CVE-2023-52927
- Patch: ubuntu-jammy/5.15.0-139.149/CVE-2023-52927-netfilter-allow-exp-not-to-be-removed-in-nf-ct-find-expectation.patch
- From: 5.15.0-139.149
- CVE-2023-52664
- Description:
net: atlantic: eliminate double free in error handling logic
- CVE: https://ubuntu.com/security/CVE-2023-52664
- Patch: ubuntu-jammy/5.15.0-139.149/CVE-2023-52664-net-atlantic-eliminate-double-free-in-error-handling-logic.patch
- From: 5.15.0-139.149
- CVE-2025-21718
- Description:
net: rose: fix timer races against user threads
- CVE: https://ubuntu.com/security/CVE-2025-21718
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21718-net-rose-fix-timer-races-against-user-threads.patch
- From: 5.15.0-140.150
- CVE-2024-58007
- Description:
soc: qcom: socinfo: Avoid out of bounds read of serial number
- CVE: https://ubuntu.com/security/CVE-2024-58007
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58007-soc-qcom-socinfo-avoid-out-of-bounds-read-of-serial-number-5.15.0-134.145.patch
- From: 5.15.0-140.150
- CVE-2025-21782
- Description:
orangefs: fix a oob in orangefs_debug_write
- CVE: https://ubuntu.com/security/CVE-2025-21782
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21782-orangefs-fix-a-oob-in-orangefs-debug-write.patch
- From: 5.15.0-140.150
- CVE-2025-21905
- Description:
wifi: iwlwifi: limit printed string from FW file
- CVE: https://ubuntu.com/security/CVE-2025-21905
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21905-wifi-iwlwifi-limit-printed-string-from-fw-file.patch
- From: 5.15.0-140.150
- CVE-2025-21727
- Description:
padata: fix UAF in padata_reorder
- CVE: https://ubuntu.com/security/CVE-2025-21727
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21727-padata-fix-UAF-in-padata_reorder.patch
- From: 5.15.0-140.150
- CVE-2025-21726
- Description:
padata: avoid UAF for reorder_work
- CVE: https://ubuntu.com/security/CVE-2025-21726
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21726-padata-avoid-UAF-for-reorder_work.patch
- From: 5.15.0-140.150
- CVE-2025-21726
- Description:
padata: avoid UAF for reorder_work
- CVE: https://ubuntu.com/security/CVE-2025-21726
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21726-padata-avoid-UAF-for-reorder_work-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-58034
- Description:
Out of scope; patch fixes the memory controller module for Nvidia Tegra SoCs.
- CVE:
- Patch: skipped/CVE-2024-58034.patch
- From:
- CVE-2024-58069
- Description:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
- CVE: https://ubuntu.com/security/CVE-2024-58069
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58069-rtc-pcf85063-fix-potential-oob-write-in-pcf85063-nvmem-read.patch
- From: 5.15.0-140.150
- CVE-2025-21715
- Description:
The DM9000 chip is available on ARM32 and MIPS architectures, which KernelCare does not support.
- CVE:
- Patch: skipped/CVE-2025-21715.patch
- From:
- CVE-2024-57980
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://ubuntu.com/security/CVE-2024-57980
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 5.15.0-140.150
- CVE-2024-58055
- Description:
usb: gadget: f_tcm: Don't free command immediately
- CVE: https://ubuntu.com/security/CVE-2024-58055
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58055-usb-gadget-f-tcm-don-t-free-command-immediately.patch
- From: 5.15.0-140.150
- CVE-2024-58083
- Description:
KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- CVE: https://ubuntu.com/security/CVE-2024-58083
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58083-kvm-explicitly-verify-target-vcpu-is-online-in-kvm-get-vcpu.patch
- From: 5.15.0-140.150
- CVE-2025-21722
- Description:
nilfs2: do not force clear folio if buffer is referenced
- CVE: https://ubuntu.com/security/CVE-2025-21722
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21722-nilfs2-do-not-force-clear-folio-if-buffer-is-referenced.patch
- From: 5.15.0-140.150
- CVE-2024-57979
- Description:
PPS for embedded GPS devices. Irrelevant for servers.
- CVE:
- Patch: skipped/CVE-2024-57979.patch
- From:
- CVE-2025-21731
- Description:
nbd: don't allow reconnect after disconnect
- CVE: https://ubuntu.com/security/CVE-2025-21731
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21731-nbd-don-t-allow-reconnect-after-disconnect.patch
- From: 5.15.0-140.150
- CVE-2025-21753
- Description:
btrfs: fix use-after-free when attempting to join an aborted transaction
- CVE: https://ubuntu.com/security/CVE-2025-21753
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21753-btrfs-fix-use-after-free-when-attempting-to-join-an-aborted-transaction.patch
- From: 5.15.0-140.150
- CVE-2025-21735
- Description:
NFC: nci: Add bounds checking in nci_hci_create_pipe()
- CVE: https://ubuntu.com/security/CVE-2025-21735
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21735-nfc-nci-add-bounds-checking-in-nci-hci-create-pipe.patch
- From: 5.15.0-140.150
- CVE-2025-21785
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2025-21764
- Description:
ndisc: use RCU protection in ndisc_alloc_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21764
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21764-ndisc-use-rcu-protection-in-ndisc-alloc-skb.patch
- From: 5.15.0-140.150
- CVE-2025-21763
- Description:
neighbour: use RCU protection in __neigh_notify()
- CVE: https://ubuntu.com/security/CVE-2025-21763
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21763-neighbour-use-rcu-protection-in-neigh-notify.patch
- From: 5.15.0-140.150
- CVE-2025-21762
- Description:
arp: use RCU protection in arp_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-21762
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21762-arp-use-rcu-protection-in-arp-xmit.patch
- From: 5.15.0-140.150
- CVE-2025-21761
- Description:
openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
- CVE: https://ubuntu.com/security/CVE-2025-21761
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21761-openvswitch-use-rcu-protection-in-ovs-vport-cmd-fill-info.patch
- From: 5.15.0-140.150
- CVE-2025-21760
- Description:
ndisc: extend RCU protection in ndisc_send_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21760
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21760-ndisc-extend-rcu-protection-in-ndisc-send-skb.patch
- From: 5.15.0-140.150
- CVE-2025-21796
- Description:
nfsd: clear acl_access/acl_default after releasing them
- CVE: https://ubuntu.com/security/CVE-2025-21796
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21796-nfsd-clear-acl-access-acl-default-after-releasing-them.patch
- From: 5.15.0-140.150
- CVE-2025-21791
- Description:
vrf: use RCU protection in l3mdev_l3_out()
- CVE: https://ubuntu.com/security/CVE-2025-21791
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21791-vrf-use-rcu-protection-in-l3mdev-l3-out.patch
- From: 5.15.0-140.150
- CVE-2025-21791
- Description:
vrf: use RCU protection in l3mdev_l3_out()
- CVE: https://ubuntu.com/security/CVE-2025-21791
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21791-vrf-use-rcu-protection-in-l3mdev-l3-out-kpatch.patch
- From: 5.15.0-140.150
- CVE-2025-21811
- Description:
nilfs2: protect access to buffers with no active references
- CVE: https://ubuntu.com/security/CVE-2025-21811
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21811-nilfs2-protect-access-to-buffers-with-no-active-references.patch
- From: 5.15.0-140.150
- CVE-2025-21858
- Description:
geneve: Fix use-after-free in geneve_find_dev().
- CVE: https://ubuntu.com/security/CVE-2025-21858
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21858-geneve-fix-use-after-free-in-geneve-find-dev.patch
- From: 5.15.0-140.150
- CVE-2025-21887
- Description:
ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up
- CVE: https://ubuntu.com/security/CVE-2025-21887
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21887-ovl-fix-uaf-in-ovl-dentry-update-reval-by-moving-dput-in-ovl-link-up.patch
- From: 5.15.0-140.150
- CVE-2025-21934
- Description:
rapidio: fix an API misues when rio_add_net() fails
- CVE: https://ubuntu.com/security/CVE-2025-21934
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21934-rapidio-fix-an-api-misues-when-rio-add-net-fails.patch
- From: 5.15.0-140.150
- CVE-2025-21928
- Description:
HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
- CVE: https://ubuntu.com/security/CVE-2025-21928
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21928-hid-intel-ish-hid-fix-use-after-free-issue-in-ishtp-hid-remove.patch
- From: 5.15.0-140.150
- CVE-2024-26982
- Description:
Squashfs: check the inode number is not the invalid value of zero
- CVE: https://ubuntu.com/security/CVE-2024-26982
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid-value-of-zero.patch
- From: 5.15.0-140.150
- CVE-2024-56721
- Description:
x86/CPU/AMD: Terminate the erratum_1386_microcode array
- CVE: https://ubuntu.com/security/CVE-2024-56721
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-56721-x86-cpu-amd-terminate-the-erratum-1386-microcode-array.patch
- From: 5.15.0-140.150
- CVE-2024-57986
- Description:
HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections
- CVE: https://ubuntu.com/security/CVE-2024-57986
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57986-hid-core-fix-assumption-that-resolution-multipliers-must-be-in-logical-collections.patch
- From: 5.15.0-140.150
- CVE-2024-57973
- Description:
rdma/cxgb4: Prevent potential integer overflow on 32bit
- CVE: https://ubuntu.com/security/CVE-2024-57973
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57973-rdma-cxgb4-prevent-potential-integer-overflow-on-32bit.patch
- From: 5.15.0-140.150
- CVE-2024-57981
- Description:
usb: xhci: Fix NULL pointer dereference on certain command aborts
- CVE: https://ubuntu.com/security/CVE-2024-57981
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57981-usb-xhci-fix-null-pointer-dereference-on-certain-command-aborts.patch
- From: 5.15.0-140.150
- CVE-2024-58001
- Description:
ocfs2: handle a symlink read error correctly
- CVE: https://ubuntu.com/security/CVE-2024-58001
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58001-ocfs2-handle-a-symlink-read-error-correctly.patch
- From: 5.15.0-140.150
- CVE-2024-57834
- Description:
media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread
- CVE: https://ubuntu.com/security/CVE-2024-57834
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57834-media-vidtv-fix-a-null-ptr-deref-in-vidtv-mux-stop-thread.patch
- From: 5.15.0-140.150
- CVE-2024-47726
- Description:
f2fs: fix to wait dio completion
- CVE: https://ubuntu.com/security/CVE-2024-47726
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-47726-f2fs-fix-to-wait-dio-completion.patch
- From: 5.15.0-140.150
- CVE-2024-58005
- Description:
tpm: Change to kvalloc() in eventlog/acpi.c
- CVE: https://ubuntu.com/security/CVE-2024-58005
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58005-tpm-change-to-kvalloc-in-eventlog-acpi-c.patch
- From: 5.15.0-140.150
- CVE-2024-56599
- Description:
wifi: ath10k: avoid NULL pointer error during sdio remove
- CVE: https://ubuntu.com/security/CVE-2024-56599
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-56599-wifi-ath10k-avoid-null-pointer-error-during-sdio-remove.patch
- From: 5.15.0-140.150
- CVE-2025-21920
- Description:
vlan: enforce underlying device type
- CVE: https://ubuntu.com/security/CVE-2025-21920
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21920-vlan-enforce-underlying-device-type.patch
- From: 5.15.0-140.150
- CVE-2025-21920
- Description:
vlan: enforce underlying device type
- CVE: https://ubuntu.com/security/CVE-2025-21920
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21920-vlan-enforce-underlying-device-type-kpatch.patch
- From: 5.15.0-140.150
- CVE-2025-21898
- Description:
ftrace: Avoid potential division by zero in function_stat_show()
- CVE: https://ubuntu.com/security/CVE-2025-21898
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21898-ftrace-avoid-potential-division-by-zero-in-function-stat-show.patch
- From: 5.15.0-140.150
- CVE-2025-21912
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-21912.patch
- From:
- CVE-2025-21910
- Description:
wifi: cfg80211: regulatory: improve invalid hints checking
- CVE: https://ubuntu.com/security/CVE-2025-21910
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21910-wifi-cfg80211-regulatory-improve-invalid-hints-checking.patch
- From: 5.15.0-140.150
- CVE-2025-21909
- Description:
wifi: nl80211: reject cooked mode if it is set along with other flags
- CVE: https://ubuntu.com/security/CVE-2025-21909
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21909-wifi-nl80211-reject-cooked-mode-if-it-is-set-along-with-other-flags.patch
- From: 5.15.0-140.150
- CVE-2025-21904
- Description:
caif_virtio: fix wrong pointer check in cfv_probe()
- CVE: https://ubuntu.com/security/CVE-2025-21904
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21904-caif-virtio-fix-wrong-pointer-check-in-cfv-probe.patch
- From: 5.15.0-140.150
- CVE-2025-21925
- Description:
llc: do not use skb_get() before dev_queue_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-21925
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21925-llc-do-not-use-skb-get-before-dev-queue-xmit.patch
- From: 5.15.0-140.150
- CVE-2025-21922
- Description:
ppp: Fix KMSAN uninit-value warning with bpf
- CVE: https://ubuntu.com/security/CVE-2025-21922
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21922-ppp-fix-kmsan-uninit-value-warning-with-bpf.patch
- From: 5.15.0-140.150
- CVE-2025-21917
- Description:
usb: renesas_usbhs: Flush the notify_hotplug_work
- CVE: https://ubuntu.com/security/CVE-2025-21917
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21917-usb-renesas-usbhs-flush-the-notify-hotplug-work.patch
- From: 5.15.0-140.150
- CVE-2025-21916
- Description:
usb: atm: cxacru: fix a flaw in existing endpoint checks
- CVE: https://ubuntu.com/security/CVE-2025-21916
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21916-usb-atm-cxacru-fix-a-flaw-in-existing-endpoint-checks.patch
- From: 5.15.0-140.150
- CVE-2025-21914
- Description:
slimbus: messaging: Free transaction ID in delayed interrupt scenario
- CVE: https://ubuntu.com/security/CVE-2025-21914
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21914-slimbus-messaging-free-transaction-id-in-delayed-interrupt-scenario.patch
- From: 5.15.0-140.150
- CVE-2024-58002
- Description:
[PATCH] media: uvcvideo: Only save async fh if success
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58002-media-uvcvideo-Only-save-async-fh-if-success.patch
- From: 5.15.0-140.150
- CVE-2024-58002
- Description:
[PATCH] media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers.patch
- From: 5.15.0-140.150
- CVE-2024-58002
- Description:
[PATCH] media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-57977
- Description:
memcg: fix soft lockup in the OOM process
- CVE: https://ubuntu.com/security/CVE-2024-57977
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57977-memcg-fix-soft-lockup-in-the-oom-process.patch
- From: 5.15.0-140.150
- CVE-2024-57977
- Description:
memcg: always call cond_resched() after fn()
- CVE: https://ubuntu.com/security/CVE-2024-57977
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57977-memcg-always-call-cond_resched-after-fn.patch
- From: 5.15.0-140.150
- CVE-2024-57977
- Description:
memcg: fix soft lockup in the OOM process (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-57977
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57977-memcg-fix-soft-lockup-in-the-oom-process-kpatch.patch
- From: 5.15.0-140.150
- CVE-2025-21859
- Description:
USB: gadget: f_midi: f_midi_complete to call queue_work
- CVE: https://ubuntu.com/security/CVE-2025-21859
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21859-usb-gadget-f-midi-f-midi-complete-to-call-queue-work.patch
- From: 5.15.0-140.150
- CVE-2025-21866
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21866.patch
- From:
- CVE-2025-21678
- Description:
gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl().
- CVE: https://ubuntu.com/security/CVE-2025-21678
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21865-gtp-suppress-list-corruption-splat-in-gtp-net-exit-batch-rtnl-135.patch
- From: 5.15.0-140.150
- CVE-2025-21871
- Description:
tee: optee: Fix supplicant wait loop
- CVE: https://ubuntu.com/security/CVE-2025-21871
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21871-tee-optee-fix-supplicant-wait-loop.patch
- From: 5.15.0-140.150
- CVE-2025-21862
- Description:
drop_monitor: fix incorrect initialization order
- CVE: https://ubuntu.com/security/CVE-2025-21862
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21862-drop-monitor-fix-incorrect-initialization-order.patch
- From: 5.15.0-140.150
- CVE-2025-21848
- Description:
nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
- CVE: https://ubuntu.com/security/CVE-2025-21848
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21848-nfp-bpf-add-check-for-nfp-app-ctrl-msg-alloc.patch
- From: 5.15.0-140.150
- CVE-2025-21878
- Description:
i2c: npcm: disable interrupt enable bit before devm_request_irq
- CVE: https://ubuntu.com/security/CVE-2025-21878
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21878-i2c-npcm-disable-interrupt-enable-bit-before-devm-request-irq.patch
- From: 5.15.0-140.150
- CVE-2025-21877
- Description:
usbnet: gl620a: fix endpoint checking in genelink_bind()
- CVE: https://ubuntu.com/security/CVE-2025-21877
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21877-usbnet-gl620a-fix-endpoint-checking-in-genelink-bind.patch
- From: 5.15.0-140.150
- CVE-2025-21875
- Description:
mptcp: always handle address removal under msk socket lock
- CVE: https://ubuntu.com/security/CVE-2025-21875
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21875-mptcp-always-handle-address-removal-under-msk-socket-lock.patch
- From: 5.15.0-140.150
- CVE-2025-21846
- Description:
acct: perform last write from workqueue
- CVE: https://ubuntu.com/security/CVE-2025-21846
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21846-acct-perform-last-write-from-workqueue.patch
- From: 5.15.0-140.150
- CVE-2025-21846
- Description:
acct: perform last write from workqueue
- CVE: https://ubuntu.com/security/CVE-2025-21846
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21846-acct-perform-last-write-from-workqueue-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-58052
- Description:
drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table
- CVE: https://ubuntu.com/security/CVE-2024-58052
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58052-drm-amdgpu-fix-potential-null-pointer-dereference-in-atomctrl-get-smc-sclk-range-table.patch
- From: 5.15.0-140.150
- CVE-2024-58051
- Description:
ipmi: ipmb: Add check devm_kasprintf() returned value
- CVE: https://ubuntu.com/security/CVE-2024-58051
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58051-ipmi-ipmb-add-check-devm-kasprintf-returned-value.patch
- From: 5.15.0-140.150
- CVE-2024-58063
- Description:
wifi: rtlwifi: fix memory leaks and invalid access at probe error path
- CVE: https://ubuntu.com/security/CVE-2024-58063
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58063-wifi-rtlwifi-fix-memory-leaks-and-invalid-access-at-probe-error-path.patch
- From: 5.15.0-140.150
- CVE-2024-58071
- Description:
team: prevent adding a device which is already a team device lower
- CVE: https://ubuntu.com/security/CVE-2024-58071
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58071-team-prevent-adding-a-device-which-is-already-a-team-device-lower.patch
- From: 5.15.0-140.150
- CVE-2024-58058
- Description:
ubifs: skip dumping tnc tree when zroot is null
- CVE: https://ubuntu.com/security/CVE-2024-58058
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58058-ubifs-skip-dumping-tnc-tree-when-zroot-is-null.patch
- From: 5.15.0-140.150
- CVE-2024-58017
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2024-58017.patch
- From:
- CVE-2024-58016
- Description:
safesetid: check size of policy writes
- CVE: https://ubuntu.com/security/CVE-2024-58016
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58016-safesetid-check-size-of-policy-writes.patch
- From: 5.15.0-140.150
- CVE-2024-58014
- Description:
wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()
- CVE: https://ubuntu.com/security/CVE-2024-58014
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58014-wifi-brcmsmac-add-gain-range-check-to-wlc-phy-iqcal-gainparams-nphy.patch
- From: 5.15.0-140.150
- CVE-2024-58010
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-58010.patch
- From:
- CVE-2024-58020
- Description:
HID: multitouch: Add NULL check in mt_input_configured
- CVE: https://ubuntu.com/security/CVE-2024-58020
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58020-hid-multitouch-add-null-check-in-mt-input-configured.patch
- From: 5.15.0-140.150
- CVE-2025-21711
- Description:
net/rose: prevent integer overflows in rose_setsockopt()
- CVE: https://ubuntu.com/security/CVE-2025-21711
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21711-net-rose-prevent-integer-overflows-in-rose-setsockopt.patch
- From: 5.15.0-140.150
- CVE-2025-21728
- Description:
bpf: Send signals asynchronously if !preemptible
- CVE: https://ubuntu.com/security/CVE-2025-21728
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21728-bpf-send-signals-asynchronously-if-preemptible.patch
- From: 5.15.0-140.150
- CVE-2025-21728
- Description:
bpf: Use preempt_count() directly in bpf_send_signal_common()
- CVE: https://ubuntu.com/security/CVE-2025-21728
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21728-bpf-Use-preempt_count-directly-in-bpf_send_signal_common.patch
- From: 5.15.0-140.150
- CVE-2025-21719
- Description:
ipmr: do not call mr_mfc_uses_dev() for unres entries
- CVE: https://ubuntu.com/security/CVE-2025-21719
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21719-ipmr-do-not-call-mr-mfc-uses-dev-for-unres-entries.patch
- From: 5.15.0-140.150
- CVE-2025-21749
- Description:
net: rose: lock the socket in rose_bind()
- CVE: https://ubuntu.com/security/CVE-2025-21749
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21749-net-rose-lock-the-socket-in-rose-bind.patch
- From: 5.15.0-140.150
- CVE-2025-21745
- Description:
blk-cgroup: Fix class @block_class's subsystem refcount leakage
- CVE: https://ubuntu.com/security/CVE-2025-21745
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21745-blk-cgroup-fix-class-block-class-s-subsystem-refcount-leakage.patch
- From: 5.15.0-140.150
- CVE-2025-21744
- Description:
wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()
- CVE: https://ubuntu.com/security/CVE-2025-21744
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21744-wifi-brcmfmac-fix-null-pointer-dereference-in-brcmf-txfinalize.patch
- From: 5.15.0-140.150
- CVE-2025-21736
- Description:
nilfs2: fix possible int overflows in nilfs_fiemap()
- CVE: https://ubuntu.com/security/CVE-2025-21736
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21736-nilfs2-fix-possible-int-overflows-in-nilfs-fiemap.patch
- From: 5.15.0-140.150
- CVE-2025-21758
- Description:
ipv6: mcast: add RCU protection to mld_newpack()
- CVE: https://ubuntu.com/security/CVE-2025-21758
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21758-ipv6-mcast-add-rcu-protection-to-mld-newpack.patch
- From: 5.15.0-140.150
- CVE-2025-21748
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-21748.patch
- From:
- CVE-2025-21721
- Description:
nilfs2: handle errors that nilfs_prepare_chunk() may return
- CVE: https://ubuntu.com/security/CVE-2025-21721
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21721-nilfs2-handle-errors-that-nilfs-prepare-chunk-may-return.patch
- From: 5.15.0-140.150
- CVE-2025-21647
- Description:
sched: sch_cake: add bounds checks to host bulk flow fairness counts
- CVE: https://ubuntu.com/security/CVE-2025-21647
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21647-sched-sch-cake-add-bounds-checks-to-host-bulk-flow-fairness-counts.patch
- From: 5.15.0-140.150
- CVE-2025-21647
- Description:
sched: sch_cake: add bounds checks to host bulk flow fairness counts kpatch
- CVE: https://ubuntu.com/security/CVE-2025-21647
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21647-sched-sch-cake-add-bounds-checks-to-host-bulk-flow-fairness-counts-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-58085
- Description:
tomoyo: don't emit warning in tomoyo_write_control()
- CVE: https://ubuntu.com/security/CVE-2024-58085
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58085-tomoyo-don-t-emit-warning-in-tomoyo-write-control.patch
- From: 5.15.0-140.150
- CVE-2024-58086
- Description:
drm/v3d: Stop active perfmon if it is being destroyed
- CVE: https://ubuntu.com/security/CVE-2024-58086
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58086-drm-v3d-stop-active-perfmon-if-it-is-being-destroyed.patch
- From: 5.15.0-140.150
- CVE-2025-21708
- Description:
net: usb: rtl8150: enable basic endpoint checking
- CVE: https://ubuntu.com/security/CVE-2025-21708
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21708-net-usb-rtl8150-enable-basic-endpoint-checking.patch
- From: 5.15.0-140.150
- CVE-2025-21799
- Description:
net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns()
- CVE: https://ubuntu.com/security/CVE-2025-21799
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21799-net-ethernet-ti-am65-cpsw-fix-freeing-irq-in-am65-cpsw-nuss-remove-tx-chns.patch
- From: 5.15.0-140.150
- CVE-2025-21795
- Description:
NFSD: fix hang in nfsd4_shutdown_callback
- CVE: https://ubuntu.com/security/CVE-2025-21795
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21795-nfsd-fix-hang-in-nfsd4-shutdown-callback.patch
- From: 5.15.0-140.150
- CVE-2025-21787
- Description:
team: better TEAM_OPTION_TYPE_STRING validation
- CVE: https://ubuntu.com/security/CVE-2025-21787
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21787-team-better-team-option-type-string-validation.patch
- From: 5.15.0-140.150
- CVE-2025-21781
- Description:
batman-adv: fix panic during interface removal
- CVE: https://ubuntu.com/security/CVE-2025-21781
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21781-batman-adv-fix-panic-during-interface-removal.patch
- From: 5.15.0-140.150
- CVE-2025-21779
- Description:
KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel
- CVE: https://ubuntu.com/security/CVE-2025-21779
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21779-kvm-x86-reject-hyper-v-s-send-ipi-hypercalls-if-local-apic-isn-t-in-kernel.patch
- From: 5.15.0-140.150
- CVE-2025-21776
- Description:
USB: hub: Ignore non-compliant devices with too many configs or interfaces
- CVE: https://ubuntu.com/security/CVE-2025-21776
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21776-usb-hub-ignore-non-compliant-devices-with-too-many-configs-or-interfaces.patch
- From: 5.15.0-140.150
- CVE-2025-21772
- Description:
partitions: mac: fix handling of bogus partition table
- CVE: https://ubuntu.com/security/CVE-2025-21772
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21772-partitions-mac-fix-handling-of-bogus-partition-table.patch
- From: 5.15.0-140.150
- CVE-2025-21767
- Description:
clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context
- CVE: https://ubuntu.com/security/CVE-2025-21767
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21767-clocksource-use-migrate-disable-to-avoid-calling-get-random-u32-in-atomic-context.patch
- From: 5.15.0-140.150
- CVE-2025-21814
- Description:
ptp: Ensure info->enable callback is always set
- CVE: https://ubuntu.com/security/CVE-2025-21814
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21814-ptp-ensure-info-enable-callback-is-always-set.patch
- From: 5.15.0-140.150
- CVE-2025-21814
- Description:
ptp: Ensure info->enable callback is always set
- CVE: https://ubuntu.com/security/CVE-2025-21814
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21814-ptp-ensure-info-enable-callback-is-always-set-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-58072
- Description:
wifi: rtlwifi: remove unused check_buddy_priv
- CVE: https://ubuntu.com/security/CVE-2024-58072
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58072-wifi-rtlwifi-remove-unused-check-buddy-priv.patch
- From: 5.15.0-140.150
- CVE-2025-21806
- Description:
net: let net.core.dev_weight always be non-zero
- CVE: https://ubuntu.com/security/CVE-2025-21806
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21806-net-let-net.core.dev_weight-always-be-non-zero.patch
- From: 5.15.0-140.150
- CVE-2025-21806
- Description:
net: let net.core.dev_weight always be non-zero
- CVE: https://ubuntu.com/security/CVE-2025-21806
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21806-net-let-net.core.dev_weight-always-be-non-zero-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-58076
- Description:
Out of scope - affects smartphones SoC component.
- CVE:
- Patch: skipped/CVE-2024-58076.patch
- From:
- CVE-2025-21830
- Description:
landlock: Handle weird files
- CVE: https://ubuntu.com/security/CVE-2025-21830
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21830-landlock-handle-weird-files.patch
- From: 5.15.0-140.150
- CVE-2025-21804
- Description:
PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region()
- CVE: https://ubuntu.com/security/CVE-2025-21804
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21804-pci-rcar-ep-fix-incorrect-variable-used-when-calling-devm-request-mem-region.patch
- From: 5.15.0-140.150
- CVE-2025-21802
- Description:
net: hns3: fix oops when unload drivers paralleling
- CVE: https://ubuntu.com/security/CVE-2025-21802
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21802-net-hns3-fix-oops-when-unload-drivers-paralleling.patch
- From: 5.15.0-140.150
- CVE-2025-21826
- Description:
netfilter: nf_tables: reject mismatching sum of field_len with set key length
- CVE: https://ubuntu.com/security/CVE-2025-21826
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21826-netfilter-nf-tables-reject-mismatching-sum-of-field-len-with-set-key-length.patch
- From: 5.15.0-140.150
- CVE-2025-21820
- Description:
tty: xilinx_uartps: split sysrq handling
- CVE: https://ubuntu.com/security/CVE-2025-21820
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21820-tty-xilinx-uartps-split-sysrq-handling.patch
- From: 5.15.0-140.150
- CVE-2025-21835
- Description:
usb: gadget: f_midi: fix MIDI Streaming descriptor lengths
- CVE: https://ubuntu.com/security/CVE-2025-21835
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21835-usb-gadget-f-midi-fix-midi-streaming-descriptor-lengths.patch
- From: 5.15.0-140.150
- CVE-2025-21823
- Description:
[PATCH] batman-adv: Ignore neighbor throughput metrics in error case
- CVE: https://ubuntu.com/security/CVE-2025-21823
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21823-batman-adv-Ignore-neighbor-throughput-metrics-in-error-case.patch
- From: 5.15.0-140.150
- CVE-2025-21823
- Description:
[PATCH] batman-adv: Drop initialization of flexible
- CVE: https://ubuntu.com/security/CVE-2025-21823
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21823-batman-adv-Drop-initialization-of-flexible-ethtool_link_ksettings.patch
- From: 5.15.0-140.150
- CVE-2025-21823
- Description:
[PATCH] batman-adv: Drop unmanaged ELP metric worker
- CVE: https://ubuntu.com/security/CVE-2025-21823
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21823-batman-adv-Drop-unmanaged-ELP-metric-worker.patch
- From: 5.15.0-140.150
- CVE-2025-21823
- Description:
[PATCH] batman-adv: Drop unmanaged ELP metric worker
- CVE: https://ubuntu.com/security/CVE-2025-21823
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21823-batman-adv-Drop-unmanaged-ELP-metric-worker-kpatch.patch
- From: 5.15.0-140.150
- CVE-2025-21844
- Description:
smb: client: Add check for next_buffer in receive_encrypted_standard()
- CVE: https://ubuntu.com/security/CVE-2025-21844
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21844-smb-client-add-check-for-next-buffer-in-receive-encrypted-standard.patch
- From: 5.15.0-140.150
- CVE-2025-21684
- Description:
Out of scope - affects Xilinx FPGA and SoC devices.
- CVE:
- Patch: skipped/CVE-2025-21684.patch
- From:
- CVE-2024-56551
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://ubuntu.com/security/CVE-2024-56551
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 5.15.0-141.151
- CVE-2024-53168
- Description:
sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket
- CVE: https://ubuntu.com/security/CVE-2024-53168
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-53168-sunrpc-fix-one-uaf-issue-caused-by-sunrpc-kernel-tcp-socket.patch
- From: 5.15.0-141.151
- CVE-2024-56608
- Description:
drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'
- CVE: https://ubuntu.com/security/CVE-2024-56608
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-56608-drm-amd-display-fix-out-of-bounds-access-in-dcn21-link-encoder-create.patch
- From: 5.15.0-141.151
- CVE-2025-21991
- Description:
x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
- CVE: https://ubuntu.com/security/CVE-2025-21991
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21991-x86-microcode-amd-fix-out-of-bounds-on-systems-with-cpu-less-numa-nodes.patch
- From: 5.15.0-142.152
- CVE-2025-21968
- Description:
drm/amd/display: Fix slab-use-after-free on hdcp_work
- CVE: https://ubuntu.com/security/CVE-2025-21968
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21968-drm-amd-display-fix-slab-use-after-free-on-hdcp-work.patch
- From: 5.15.0-142.152
- CVE-2025-22004
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://ubuntu.com/security/CVE-2025-22004
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 5.15.0-142.152
- CVE-2025-21999
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://ubuntu.com/security/CVE-2025-21999
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode.patch
- From: 5.15.0-142.152
- CVE-2025-21999
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://ubuntu.com/security/CVE-2025-21999
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-53144 CVE-2024-8805
- Description:
Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE
- CVE: https://ubuntu.com/security/CVE-2024-8805
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-53144-CVE-2024-8805-bluetooth-hci-event-align-br-edr-just-works-paring-with-le.patch
- From: 5.15.0-142.152
- CVE-2025-22020
- Description:
memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
- CVE: https://ubuntu.com/security/CVE-2025-22020
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22020-memstick-rtsx-usb-ms-fix-slab-use-after-free-in-rtsx-usb-ms-drv-remove.patch
- From: 5.15.0-142.152
- CVE-2025-22055
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://ubuntu.com/security/CVE-2025-22055
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow.patch
- From: 5.15.0-142.152
- CVE-2025-22055
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://ubuntu.com/security/CVE-2025-22055
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-46821
- Description:
drm/amd/pm: Fix negative array index read
- CVE: https://ubuntu.com/security/CVE-2024-46821
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-46821-drm-amd-pm-fix-negative-array-index-read.patch
- From: 5.15.0-142.152
- CVE-2024-46812
- Description:
drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration
- CVE: https://ubuntu.com/security/CVE-2024-46812
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-46812-drm-amd-display-skip-inactive-planes-within-modesupportandsystemconfiguration.patch
- From: 5.15.0-142.152
- CVE-2025-22035
- Description:
tracing: Fix use-after-free in print_graph_function_flags during tracer switching
- CVE: https://ubuntu.com/security/CVE-2025-22035
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22035-tracing-fix-use-after-free-in-print-graph-function-flags-during-tracer-switching.patch
- From: 5.15.0-142.152
- CVE-2025-37785
- Description:
ext4: fix OOB read when checking dotdot dir
- CVE: https://ubuntu.com/security/CVE-2025-37785
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-37785-ext4-fix-oob-read-when-checking-dotdot-dir.patch
- From: 5.15.0-142.152
- CVE-2025-39735
- Description:
jfs: xattr: check invalid xattr size more strictly
- CVE: https://ubuntu.com/security/CVE-2025-39735
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-39735-jfs-xattr-check-invalid-xattr-size-more-strictly.patch
- From: 5.15.0-142.152
- CVE-2025-39735
- Description:
jfs: fix slab-out-of-bounds read in ea_get()
- CVE: https://ubuntu.com/security/CVE-2025-39735
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-39735-jfs-fix-slab-out-of-bounds-read-in-ea-get.patch
- From: 5.15.0-142.152
- CVE-2024-56664
- Description:
bpf, sockmap: Fix race between element replace and close()
- CVE: https://ubuntu.com/security/CVE-2024-56664
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-56664-bpf-sockmap-fix-race-between-element-replace-and-close.patch
- From: 5.15.0-142.152
- CVE-2025-37937
- Description:
objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds()
- CVE: https://ubuntu.com/security/CVE-2025-37937
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-37937-objtool-media-dib8000-prevent-divide-by-zero-in-dib8000-set-dds.patch
- From: 5.15.0-142.152
- CVE-2025-21964
- Description:
cifs: Fix integer overflow while processing acregmax mount option
- CVE: https://ubuntu.com/security/CVE-2025-21964
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21964-cifs-fix-integer-overflow-while-processing-acregmax-mount-option.patch
- From: 5.15.0-142.152
- CVE-2025-21963
- Description:
cifs: Fix integer overflow while processing acdirmax mount option
- CVE: https://ubuntu.com/security/CVE-2025-21963
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21963-cifs-fix-integer-overflow-while-processing-acdirmax-mount-option.patch
- From: 5.15.0-142.152
- CVE-2025-21962
- Description:
cifs: Fix integer overflow while processing closetimeo mount option
- CVE: https://ubuntu.com/security/CVE-2025-21962
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21962-cifs-fix-integer-overflow-while-processing-closetimeo-mount-option.patch
- From: 5.15.0-142.152
- CVE-2022-49636
- Description:
vlan: fix memory leak in vlan_newlink()
- CVE: https://ubuntu.com/security/CVE-2022-49636
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2022-49636-vlan-fix-memory-leak-in-vlan-newlink.patch
- From: 5.15.0-142.152
- CVE-2025-22097
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://ubuntu.com/security/CVE-2025-22097
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error.patch
- From: 5.15.0-142.152
- CVE-2025-22097
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://ubuntu.com/security/CVE-2025-22097
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error-kpatch.patch
- From: 5.15.0-142.152
- CVE-2022-49728
- Description:
[PATCH] ipv6: Fix signed integer overflow in __ip6_append_data
- CVE: https://ubuntu.com/security/CVE-2022-49728
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2022-49728-ipv6-Fix-signed-integer-overflow-in-__ip6_append_data.patch
- From: 5.15.0-142.152
- CVE-2022-49728
- Description:
[PATCH] ipv6: Fix signed integer overflow in __ip6_append_data
- CVE: https://ubuntu.com/security/CVE-2022-49728
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2022-49728-ipv6-Fix-signed-integer-overflow-in-__ip6_append_data-kpatch.patch
- From: 5.15.0-142.152
- CVE-2025-21981
- Description:
ice: fix memory leak in aRFS after reset
- CVE: https://ubuntu.com/security/CVE-2025-21981
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21981-ice-fix-memory-leak-in-arfs-after-reset.patch
- From: 5.15.0-142.152
- CVE-2025-21975
- Description:
net/mlx5: handle errors in mlx5_chains_create_table()
- CVE: https://ubuntu.com/security/CVE-2025-21975
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21975-net-mlx5-handle-errors-in-mlx5-chains-create-table.patch
- From: 5.15.0-142.152
- CVE-2025-21959
- Description:
netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()
- CVE: https://ubuntu.com/security/CVE-2025-21959
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21959-netfilter-nf-conncount-fully-initialize-struct-nf-conncount-tuple-in-insert-tree.patch
- From: 5.15.0-142.152
- CVE-2025-21970
- Description:
net/mlx5: Bridge, fix the crash caused by LAG state check
- CVE: https://ubuntu.com/security/CVE-2025-21970
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21970-net-mlx5-bridge-fix-the-crash-caused-by-lag-state-check.patch
- From: 5.15.0-142.152
- CVE-2025-21957
- Description:
scsi: qla1280: Fix kernel oops when debug level > 2
- CVE: https://ubuntu.com/security/CVE-2025-21957
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21957-scsi-qla1280-fix-kernel-oops-when-debug-level-2.patch
- From: 5.15.0-142.152
- CVE-2025-21956
- Description:
drm/amd/display: Assign normalized_pix_clk when color depth = 14
- CVE: https://ubuntu.com/security/CVE-2025-21956
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21956-drm-amd-display-assign-normalized-pix-clk-when-color-depth-14.patch
- From: 5.15.0-142.152
- CVE-2025-21941
- Description:
[PATCH] drm/amd/display: Check for invalid input params when building scaling params
- CVE: https://ubuntu.com/security/CVE-2025-21941
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21941-drm-amd-display-Check-for-invalid-input-params-when-building-scaling-params.patch
- From: 5.15.0-142.152
- CVE-2025-21941
- Description:
drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params
- CVE: https://ubuntu.com/security/CVE-2025-21941
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21941-drm-amd-display-fix-null-check-for-pipe-ctx-plane-state-in-resource-build-scaling-params.patch
- From: 5.15.0-142.152
- CVE-2025-22010
- Description:
CONFIG_INFINIBAND_HNS is not enabled on jammy.
- CVE:
- Patch: skipped/CVE-2025-22010.patch
- From:
- CVE-2025-37889
- Description:
[PATCH] ASoC: ops: Consistently treat platform_max as control value
- CVE: https://ubuntu.com/security/CVE-2025-37889
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-37889-ASoC-ops-Consistently-treat-platform_max-as-control-value.patch
- From: 5.15.0-142.152
- CVE-2025-37889
- Description:
[PATCH] ASoC: ops: Consistently treat platform_max as control value
- CVE: https://ubuntu.com/security/CVE-2025-37889
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-37889-ASoC-ops-Consistently-treat-platform_max-as-control-value-kpatch.patch
- From: 5.15.0-142.152
- CVE-2025-22056
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2025-22056.patch
- From:
- CVE-2025-21992
- Description:
[PATCH] HID: ignore non-functional sensor in HP 5MP Camera
- CVE: https://ubuntu.com/security/CVE-2025-21992
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21992-HID-ignore-non-functional-sensor-in-HP-5MP-Camera.patch
- From: 5.15.0-142.152
- CVE-2025-21992
- Description:
[PATCH] HID: ignore non-functional sensor in HP 5MP Camera
- CVE: https://ubuntu.com/security/CVE-2025-21992
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21992-HID-ignore-non-functional-sensor-in-HP-5MP-Camera-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-50047
- Description:
smb: client: fix UAF in async decryption
- CVE: https://ubuntu.com/security/CVE-2024-50047
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2024-50047-smb-client-fix-uaf-in-async-decryption-azure.patch
- From: 5.15.0-143.153
- CVE-2024-53185
- Description:
smb: client: fix NULL ptr deref in crypto_aead_setkey()
- CVE: https://ubuntu.com/security/CVE-2024-53185
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2024-53185-smb-client-fix-null-ptr-deref-in-crypto-aead-setkey.patch
- From: 5.15.0-143.153
- CVE-2025-37932
- Description:
sch_htb: make htb_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37932
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37932-sch-htb-make-htb-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-codel-remove-sch-q-qlen-check-before-qdisc-tree-reduce-backlog.patch
- From: 5.15.0-143.153
- CVE-2025-37798 CVE-2025-37953
- Description:
sch_htb: make htb_deactivate() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37953
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-htb-make-htb-deactivate-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
sch_drr: make drr_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-drr-make-drr-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
sch_hfsc: make hfsc_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-hfsc-make-hfsc-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
sch_qfq: make qfq_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-qfq-make-qfq-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
sch_ets: make est_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-ets-make-est-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37997
- Description:
netfilter: ipset: fix region locking in hash types
- CVE: https://ubuntu.com/security/CVE-2025-37997
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37997-netfilter-ipset-fix-region-locking-in-hash-types.patch
- From: 5.15.0-143.153
- CVE-2024-46787
- Description:
userfaultfd: fix checks for huge PMDs
- CVE: https://ubuntu.com/security/CVE-2024-46787
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2024-46787-userfaultfd-fix-checks-for-huge-PMDs.patch
- From: 5.15.0-143.153
- CVE-2024-53051
- Description:
drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability
- CVE: https://ubuntu.com/security/CVE-2024-53051
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2024-53051-drm-i915-hdcp-Add-encoder-check-in-intel_hdcp_get_capability.patch
- From: 5.15.0-143.153
- CVE-2025-37890
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37890
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37890-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-143.153
- CVE-2025-38000
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://ubuntu.com/security/CVE-2025-38000
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-38000-sch-hfsc-fix-qlen-accounting-bug-when-using-peek-in-hfsc-enqueue.patch
- From: 5.15.0-143.153
- CVE-2025-38001
- Description:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
- CVE: https://ubuntu.com/security/CVE-2025-38001
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-38001-net-sched-hfsc-address-reentrant-enqueue-adding-class-to-eltree-twice.patch
- From: 5.15.0-143.153
- CVE-2025-37749
- Description:
net: ppp: Add bound checking for skb data on ppp_sync_txmung
- CVE: https://ubuntu.com/security/CVE-2025-37749
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37749-net-ppp-add-bound-checking-for-skb-data-on-ppp-sync-txmung.patch
- From: 5.15.0-144.157
- CVE-2025-37841
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-37841.patch
- From:
- CVE-2025-23161
- Description:
Kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2025-23161.patch
- From:
- CVE-2025-37892
- Description:
mtd: inftlcore: Add error check for inftl_read_oob()
- CVE: https://ubuntu.com/security/CVE-2025-37892
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37892-mtd-inftlcore-add-error-check-for-inftl-read-oob.patch
- From: 5.15.0-144.157
- CVE-2025-23142
- Description:
sctp: detect and prevent references to a freed transport in sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-23142
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-23142-sctp-detect-and-prevent-references-to-a-freed-transport-in-sendmsg.patch
- From: 5.15.0-144.157
- CVE-2025-23142
- Description:
sctp: detect and prevent references to a freed transport in sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-23142
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-23142-sctp-detect-and-prevent-references-to-a-freed-transport-in-sendmsg-kpatch.patch
- From: 5.15.0-144.157
- CVE-2025-37838
- Description:
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2025-37838
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37838-hsi-ssi-protocol-fix-use-after-free-vulnerability-in-ssi-protocol-driver-due-to-race-condition.patch
- From: 5.15.0-144.157
- CVE-2025-37982
- Description:
wifi: wl1251: fix memory leak in wl1251_tx_work
- CVE: https://ubuntu.com/security/CVE-2025-37982
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37982-wifi-wl1251-fix-memory-leak-in-wl1251-tx-work.patch
- From: 5.15.0-144.157
- CVE-2025-37792
- Description:
Bluetooth: btrtl: Prevent potential NULL dereference
- CVE: https://ubuntu.com/security/CVE-2025-37792
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37792-bluetooth-btrtl-prevent-potential-null-dereference.patch
- From: 5.15.0-144.157
- CVE-2025-37875
- Description:
igc: fix PTM cycle trigger logic
- CVE: https://ubuntu.com/security/CVE-2025-37875
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37875-igc-fix-ptm-cycle-trigger-logic.patch
- From: 5.15.0-144.157
- CVE-2025-37790
- Description:
net: mctp: Set SOCK_RCU_FREE
- CVE: https://ubuntu.com/security/CVE-2025-37790
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37790-net-mctp-set-sock-rcu-free.patch
- From: 5.15.0-144.157
- CVE-2025-37789
- Description:
net: openvswitch: fix nested key length validation in the set() action
- CVE: https://ubuntu.com/security/CVE-2025-37789
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37789-net-openvswitch-fix-nested-key-length-validation-in-the-set-action.patch
- From: 5.15.0-144.157
- CVE-2025-37788
- Description:
cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path
- CVE: https://ubuntu.com/security/CVE-2025-37788
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37788-cxgb4-fix-memory-leak-in-cxgb4-init-ethtool-filters-error-path.patch
- From: 5.15.0-144.157
- CVE-2025-37787
- Description:
net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered
- CVE: https://ubuntu.com/security/CVE-2025-37787
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37787-net-dsa-mv88e6xxx-avoid-unregistering-devlink-regions-which-were-never-registered.patch
- From: 5.15.0-144.157
- CVE-2025-37781
- Description:
i2c: cros-ec-tunnel: defer probe if parent EC is not present
- CVE: https://ubuntu.com/security/CVE-2025-37781
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37781-i2c-cros-ec-tunnel-defer-probe-if-parent-ec-is-not-present.patch
- From: 5.15.0-144.157
- CVE-2025-37780
- Description:
isofs: Prevent the use of too small fid
- CVE: https://ubuntu.com/security/CVE-2025-37780
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37780-isofs-prevent-the-use-of-too-small-fid.patch
- From: 5.15.0-144.157
- CVE-2025-37773
- Description:
virtiofs: add filesystem context source name check
- CVE: https://ubuntu.com/security/CVE-2025-37773
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37773-virtiofs-add-filesystem-context-source-name-check.patch
- From: 5.15.0-144.157
- CVE-2024-50258
- Description:
net: fix crash when config small gso_max_size/gso_ipv4_max_size
- CVE: https://ubuntu.com/security/CVE-2024-50258
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50258-net-fix-crash-when-config-small-gso_max_size-gso_ipv4_max_size.patch
- From: 5.15.0-144.157
- CVE-2024-50258
- Description:
net: fix crash when config small gso_max_size/gso_ipv4_max_size
- CVE: https://ubuntu.com/security/CVE-2024-50258
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50258-net-fix-crash-when-config-small-gso_max_size-gso_ipv4_max_size-kpatch.patch
- From: 5.15.0-144.157
- CVE-2024-46774
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-46774.patch
- From:
- CVE-2024-35866
- Description:
smb: client: fix potential UAF in cifs_dump_full_key()
- CVE: https://ubuntu.com/security/CVE-2024-35866
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-35866-smb-client-fix-potential-uaf-in-cifs-dump-full-key-azure-1051.patch
- From: 5.15.0-144.157
- CVE-2024-35867
- Description:
smb: client: fix potential UAF in cifs_stats_proc_show()
- CVE: https://ubuntu.com/security/CVE-2024-35867
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-35867-smb-client-fix-potential-uaf-in-cifs-stats-proc-show-azure-1051.patch
- From: 5.15.0-144.157
- CVE-2024-49960
- Description:
ext4: fix timer use-after-free on failed mount
- CVE: https://ubuntu.com/security/CVE-2024-49960
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-49960-ext4-fix-timer-use-after-free-on-failed-mount.patch
- From: 5.15.0-144.157
- CVE-2024-54458
- Description:
scsi: ufs: bsg: Set bsg_queue to NULL after removal
- CVE: https://ubuntu.com/security/CVE-2024-54458
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-54458-scsi-ufs-bsg-set-bsg-queue-to-null-after-removal.patch
- From: 5.15.0-144.157
- CVE-2024-50280
- Description:
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
- CVE: https://ubuntu.com/security/CVE-2024-50280
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50280-dm-cache-fix-flushing-uninitialized-delayed-work-on-cache-ctr-error.patch
- From: 5.15.0-144.157
- CVE-2022-49535
- Description:
scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI
- CVE: https://ubuntu.com/security/CVE-2022-49535
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-49535-scsi-lpfc-fix-null-pointer-dereference-after-failing-to-issue-flogi-and-plogi.patch
- From: 5.15.0-144.157
- CVE-2024-50125
- Description:
Bluetooth: SCO: Fix UAF on sco_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-50125
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50125-bluetooth-sco-fix-uaf-on-sco-sock-timeout.patch
- From: 5.15.0-144.157
- CVE-2025-22027
- Description:
media: streamzap: fix race between device disconnection and urb callback
- CVE: https://ubuntu.com/security/CVE-2025-22027
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-22027-media-streamzap-fix-race-between-device-disconnection-and-urb-callback.patch
- From: 5.15.0-144.157
- CVE-2025-23148
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-23148.patch
- From:
- CVE-2025-37844
- Description:
cifs: avoid NULL pointer dereference in dbg call
- CVE: https://ubuntu.com/security/CVE-2025-37844
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37844-cifs-avoid-null-pointer-dereference-in-dbg-call-azure.patch
- From: 5.15.0-144.157
- CVE-2025-37985
- Description:
USB: wdm: close race between wdm_open and wdm_wwan_port_stop
- CVE: https://ubuntu.com/security/CVE-2025-37985
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37985-usb-wdm-close-race-between-wdm-open-and-wdm-wwan-port-stop.patch
- From: 5.15.0-144.157
- CVE-2025-37881
- Description:
CONFIG_USB_ASPEED_VHUB is not enabled.
- CVE:
- Patch: skipped/CVE-2025-37881.patch
- From:
- CVE-2025-37803
- Description:
udmabuf: fix a buf size overflow issue during udmabuf creation
- CVE: https://ubuntu.com/security/CVE-2025-37803
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37803-udmabuf-fix-a-buf-size-overflow-issue-during-udmabuf-creation.patch
- From: 5.15.0-144.157
- CVE-2024-49989
- Description:
drm/amd/display: fix double free issue during amdgpu module unload
- CVE: https://ubuntu.com/security/CVE-2024-49989
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-49989-drm-amd-display-fix-double-free-issue-during-amdgpu-module-unload.patch
- From: 5.15.0-144.157
- CVE-2025-37930
- Description:
drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()
- CVE: https://ubuntu.com/security/CVE-2025-37930
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37930-drm-nouveau-fix-warn-on-in-nouveau-fence-context-kill.patch
- From: 5.15.0-144.157
- CVE-2025-37991
- Description:
Out of scope: PA-RISC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-37991.patch
- From:
- CVE-2025-37990
- Description:
wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()
- CVE: https://ubuntu.com/security/CVE-2025-37990
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37990-wifi-brcm80211-fmac-add-error-handling-for-brcmf-usb-dl-writeimage.patch
- From: 5.15.0-144.157
- CVE-2025-37923
- Description:
tracing: Fix oob write in trace_seq_to_buffer()
- CVE: https://ubuntu.com/security/CVE-2025-37923
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37923-tracing-fix-oob-write-in-trace-seq-to-buffer.patch
- From: 5.15.0-144.157
- CVE-2024-26739
- Description:
net/sched: act_mirred: don't override retval if we already lost the skb
- CVE: https://ubuntu.com/security/CVE-2024-26739
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-26739-net-sched-act-mirred-don-t-override-retval-if-we-already-lost-the-skb.patch
- From: 5.15.0-144.157
- CVE-2025-37915
- Description:
net_sched: drr: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37915
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37915-net-sched-drr-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-144.157
- CVE-2025-37914
- Description:
net_sched: ets: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37914
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37914-net-sched-ets-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-144.157
- CVE-2025-37913
- Description:
net_sched: qfq: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37913
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37913-net-sched-qfq-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-144.157
- CVE-2025-37912
- Description:
ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr()
- CVE: https://ubuntu.com/security/CVE-2025-37912
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37912-ice-check-vf-vsi-pointer-value-in-ice-vc-add-fdir-fltr.patch
- From: 5.15.0-144.157
- CVE-2025-37911
- Description:
bnxt_en: Fix out-of-bound memcpy() during ethtool -w
- CVE: https://ubuntu.com/security/CVE-2025-37911
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37911-bnxt-en-fix-out-of-bound-memcpy-during-ethtool-w.patch
- From: 5.15.0-144.157
- CVE-2025-37909
- Description:
net: lan743x: Fix memleak issue when GSO enabled
- CVE: https://ubuntu.com/security/CVE-2025-37909
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37909-net-lan743x-fix-memleak-issue-when-gso-enabled.patch
- From: 5.15.0-144.157
- CVE-2025-37909
- Description:
net: lan743x: Fix memleak issue when GSO enabled
- CVE: https://ubuntu.com/security/CVE-2025-37909
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37909-net-lan743x-fix-memleak-issue-when-gso-enabled-kpatch.patch
- From: 5.15.0-144.157
- CVE-2024-38541
- Description:
of: module: add buffer overflow check in of_modalias()
- CVE: https://ubuntu.com/security/CVE-2024-38541
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-38541-of-module-add-buffer-overflow-check-in-of-modalias.patch
- From: 5.15.0-144.157
- CVE-2025-37905
- Description:
firmware: arm_scmi: Balance device refcount when destroying devices
- CVE: https://ubuntu.com/security/CVE-2025-37905
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37905-firmware-arm-scmi-balance-device-refcount-when-destroying-devices.patch
- From: 5.15.0-144.157
- CVE-2022-21546
- Description:
scsi: target: Fix WRITE_SAME No Data Buffer crash
- CVE: https://ubuntu.com/security/CVE-2022-21546
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-21546-scsi-target-fix-write-same-no-data-buffer-crash.patch
- From: 5.15.0-144.157
- CVE-2025-37998
- Description:
openvswitch: Fix unsafe attribute parsing in output_userspace()
- CVE: https://ubuntu.com/security/CVE-2025-37998
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37998-openvswitch-fix-unsafe-attribute-parsing-in-output-userspace.patch
- From: 5.15.0-144.157
- CVE-2025-37970
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo
- CVE: https://ubuntu.com/security/CVE-2025-37970
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37970-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-fifo.patch
- From: 5.15.0-144.157
- CVE-2025-37969
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo
- CVE: https://ubuntu.com/security/CVE-2025-37969
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37969-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-tagged-fifo.patch
- From: 5.15.0-144.157
- CVE-2025-37949
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2025-37949.patch
- From:
- CVE-2025-37995
- Description:
module: ensure that kobject_put() is safe for module type kobjects
- CVE: https://ubuntu.com/security/CVE-2025-37995
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37995-module-ensure-that-kobject-put-is-safe-for-module-type-kobjects.patch
- From: 5.15.0-144.157
- CVE-2025-37994
- Description:
usb: typec: ucsi: displayport: Fix NULL pointer access
- CVE: https://ubuntu.com/security/CVE-2025-37994
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37994-usb-typec-ucsi-displayport-fix-null-pointer-access.patch
- From: 5.15.0-144.157
- CVE-2025-38024
- Description:
RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug
- CVE: https://ubuntu.com/security/CVE-2025-38024
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38024-rdma-rxe-fix-slab-use-after-free-read-in-rxe-queue-cleanup-bug.patch
- From: 5.15.0-144.157
- CVE-2025-38023
- Description:
nfs: handle failure of nfs_get_lock_context in unlock path
- CVE: https://ubuntu.com/security/CVE-2025-38023
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38023-nfs-handle-failure-of-nfs-get-lock-context-in-unlock-path.patch
- From: 5.15.0-144.157
- CVE-2025-37992
- Description:
net_sched: Flush gso_skb list too during ->change()
- CVE: https://ubuntu.com/security/CVE-2025-37992
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37992-net-sched-flush-gso-skb-list-too-during-change.patch
- From: 5.15.0-144.157
- CVE-2025-38094
- Description:
net: cadence: macb: Fix a possible deadlock in macb_halt_tx.
- CVE: https://ubuntu.com/security/CVE-2025-38094
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38094-net-cadence-macb-fix-a-possible-deadlock-in-macb-halt-tx.patch
- From: 5.15.0-144.157
- CVE-2025-38009
- Description:
wifi: mt76: disable napi on driver removal
- CVE: https://ubuntu.com/security/CVE-2025-38009
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38009-wifi-mt76-disable-napi-on-driver-removal.patch
- From: 5.15.0-144.157
- CVE-2025-38005
- Description:
dmaengine: ti: k3-udma: Add missing locking
- CVE: https://ubuntu.com/security/CVE-2025-38005
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38005-dmaengine-ti-k3-udma-add-missing-locking.patch
- From: 5.15.0-144.157
- CVE-2025-37967
- Description:
usb: typec: ucsi: displayport: Fix deadlock
- CVE: https://ubuntu.com/security/CVE-2025-37967
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37967-usb-typec-ucsi-displayport-fix-deadlock.patch
- From: 5.15.0-144.157
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://ubuntu.com/security/CVE-2024-53203
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-53203-usb-typec-fix-potential-array-underflow-in-ucsi-ccg-sync-control.patch
- From: 5.15.0-144.157
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://ubuntu.com/security/CVE-2024-53203
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-53203-usb-typec-fix-pm-usage-counter-imbalance-in-ucsi_ccg_sync_control.patch
- From: 5.15.0-144.157
- CVE-2024-46751
- Description:
btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info()
- CVE: https://ubuntu.com/security/CVE-2024-46751
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-46751-btrfs-don-t-bug-on-when-0-reference-count-at-btrfs-lookup-extent-info.patch
- From: 5.15.0-144.157
- CVE-2022-49168
- Description:
btrfs: do not clean up repair bio if submit fails
- CVE: https://ubuntu.com/security/CVE-2022-49168
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-49168-btrfs-do-not-clean-up-repair-bio-if-submit-fails.patch
- From: 5.15.0-144.157
- CVE-2022-49063
- Description:
ice: arfs: fix use-after-free when freeing @rx_cpu_rmap
- CVE: https://ubuntu.com/security/CVE-2022-49063
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-49063-ice-arfs-fix-use-after-free-when-freeing-rx-cpu-rmap.patch
- From: 5.15.0-144.157
- CVE-2024-50073
- Description:
tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
- CVE: https://ubuntu.com/security/CVE-2024-50073
- Patch: ubuntu-jammy/5.15.0-151.161/CVE-2024-50073-tty-n-gsm-fix-use-after-free-in-gsm-cleanup-mux.patch
- From: 5.15.0-151.161
- CVE-2025-38083
- Description:
net_sched: prio: fix a race in prio_tune()
- CVE: https://ubuntu.com/security/CVE-2025-38083
- Patch: ubuntu-jammy/5.15.0-151.161/CVE-2025-38083-net-sched-prio-fix-a-race-in-prio-tune.patch
- From: 5.15.0-151.161
- CVE-2025-38075
- Description:
scsi: target: iscsi: Fix timeout on deleted connection
- CVE: https://ubuntu.com/security/CVE-2025-38075
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38075-scsi-target-iscsi-fix-timeout-on-deleted-connection.patch
- From: 5.15.0-152.162
- CVE-2025-38048
- Description:
virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN
- CVE: https://ubuntu.com/security/CVE-2025-38048
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38048-virtio-ring-fix-data-race-by-tagging-event-triggered-as-racy-for-kcsan.patch
- From: 5.15.0-152.162
- CVE-2025-38072
- Description:
libnvdimm/labels: Fix divide error in nd_label_data_init()
- CVE: https://ubuntu.com/security/CVE-2025-38072
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38072-libnvdimm-labels-fix-divide-error-in-nd-label-data-init.patch
- From: 5.15.0-152.162
- CVE-2025-38066
- Description:
dm cache: prevent BUG_ON by blocking retries on failed device resumes
- CVE: https://ubuntu.com/security/CVE-2025-38066
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38066-dm-cache-prevent-bug-on-by-blocking-retries-on-failed-device-resumes.patch
- From: 5.15.0-152.162
- CVE-2025-38065
- Description:
orangefs: Do not truncate file size
- CVE: https://ubuntu.com/security/CVE-2025-38065
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38065-orangefs-do-not-truncate-file-size.patch
- From: 5.15.0-152.162
- CVE-2025-38044
- Description:
media: cx231xx: set device_caps for 417
- CVE: https://ubuntu.com/security/CVE-2025-38044
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38044-media-cx231xx-set-device-caps-for-417.patch
- From: 5.15.0-152.162
- CVE-2025-38043
- Description:
firmware: arm_ffa: Set dma_mask for ffa devices
- CVE: https://ubuntu.com/security/CVE-2025-38043
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38043-firmware-arm-ffa-set-dma-mask-for-ffa-devices.patch
- From: 5.15.0-152.162
- CVE-2025-38043
- Description:
firmware: arm_ffa: Set dma_mask for ffa devices
- CVE: https://ubuntu.com/security/CVE-2025-38043
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38043-firmware-arm-ffa-set-dma-mask-for-ffa-devices-kpatch.patch
- From: 5.15.0-152.162
- CVE-2025-38061
- Description:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
- CVE: https://ubuntu.com/security/CVE-2025-38061
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38061-net-pktgen-fix-access-outside-of-user-given-buffer-in-pktgen-thread-write.patch
- From: 5.15.0-152.162
- CVE-2025-38037
- Description:
vxlan: Annotate FDB data races
- CVE: https://ubuntu.com/security/CVE-2025-38037
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38037-vxlan-annotate-fdb-data-races.patch
- From: 5.15.0-152.162
- CVE-2025-38035
- Description:
nvmet-tcp: don't restore null sk_state_change
- CVE: https://ubuntu.com/security/CVE-2025-38035
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38035-nvmet-tcp-don-t-restore-null-sk-state-change.patch
- From: 5.15.0-152.162
- CVE-2025-38058
- Description:
__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock
- CVE: https://ubuntu.com/security/CVE-2025-38058
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38058-legitimize-mnt-check-for-mnt-sync-umount-should-be-under-mount-lock-143.patch
- From: 5.15.0-152.162
- CVE-2025-38052
- Description:
Complex adaptation required. Low impact CVE
- CVE:
- Patch: skipped/CVE-2025-38052.patch
- From:
- CVE-2025-38079
- Description:
crypto: algif_hash - fix double free in hash_accept
- CVE: https://ubuntu.com/security/CVE-2025-38079
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38079-crypto-algif-hash-fix-double-free-in-hash-accept.patch
- From: 5.15.0-152.162
- CVE-2025-38031
- Description:
padata: do not leak refcount in reorder_work
- CVE: https://ubuntu.com/security/CVE-2025-38031
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38031-padata-do-not-leak-refcount-in-reorder-work-139.patch
- From: 5.15.0-152.162
- CVE-2025-38004
- Description:
can: bcm: add locking for bcm_op runtime updates
- CVE: https://ubuntu.com/security/CVE-2025-38004
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38004-can-bcm-add-locking-for-bcm-op-runtime-updates.patch
- From: 5.15.0-152.162
- CVE-2025-38004
- Description:
can: bcm: add locking for bcm_op runtime updates
- CVE: https://ubuntu.com/security/CVE-2025-38004
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38004-can-bcm-add-locking-for-bcm-op-runtime-updates-kpatch.patch
- From: 5.15.0-152.162
- CVE-2025-38003
- Description:
can: bcm: add missing rcu read protection for procfs content
- CVE: https://ubuntu.com/security/CVE-2025-38003
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38003-can-bcm-add-missing-rcu-read-protection-for-procfs-content.patch
- From: 5.15.0-152.162
- CVE-2025-38078
- Description:
ALSA: pcm: Fix race of buffer access at PCM OSS layer
- CVE: https://ubuntu.com/security/CVE-2025-38078
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38078-alsa-pcm-fix-race-of-buffer-access-at-pcm-oss-layer.patch
- From: 5.15.0-152.162
- CVE-2025-38077
- Description:
platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()
- CVE: https://ubuntu.com/security/CVE-2025-38077
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38077-platform-x86-dell-wmi-sysman-avoid-buffer-overflow-in-current-password-store.patch
- From: 5.15.0-152.162
- CVE-2025-38051
- Description:
smb: client: Fix use-after-free in cifs_fill_dirent
- CVE: https://ubuntu.com/security/CVE-2025-38051
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38051-smb-client-fix-use-after-free-in-cifs-fill-dirent.patch
- From: 5.15.0-152.162
- CVE-2024-27407
- Description:
fs/ntfs3: Fixed overflow check in mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-27407
- Patch: ubuntu-jammy/5.15.0-153.163/CVE-2024-27407-fs-ntfs3-fixed-overflow-check-in-mi-enum-attr.patch
- From: 5.15.0-153.163
- CVE-2025-38350
- Description:
net/sched: Always pass notifications when child class becomes empty
- CVE: https://ubuntu.com/security/CVE-2025-38350
- Patch: ubuntu-jammy/5.15.0-153.163/CVE-2025-38350-net-sched-always-pass-notifications-when-child-class-becomes-empty.patch
- From: 5.15.0-153.163
- CVE-2025-38174
- Description:
thunderbolt: Do not double dequeue a configuration request
- CVE: https://ubuntu.com/security/CVE-2025-38174
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38174-thunderbolt-do-not-double-dequeue-a-configuration-request.patch
- From: 5.15.0-156.166
- CVE-2025-38173
- Description:
crypto: marvell/cesa - Handle zero-length skcipher requests
- CVE: https://ubuntu.com/security/CVE-2025-38173
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38173-crypto-marvell-cesa-handle-zero-length-skcipher-requests.patch
- From: 5.15.0-156.166
- CVE-2025-38298
- Description:
EDAC/skx_common: Fix general protection fault
- CVE: https://ubuntu.com/security/CVE-2025-38298
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38298-edac-skx-common-fix-general-protection-fault.patch
- From: 5.15.0-156.166
- CVE-2025-38319
- Description:
drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table
- CVE: https://ubuntu.com/security/CVE-2025-38319
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38319-drm-amd-pp-fix-potential-null-pointer-dereference-in-atomctrl-initialize-mc-reg-table.patch
- From: 5.15.0-156.166
- CVE-2025-38167
- Description:
fs/ntfs3: handle hdr_first_de() return value
- CVE: https://ubuntu.com/security/CVE-2025-38167
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38167-fs-ntfs3-handle-hdr-first-de-return-value.patch
- From: 5.15.0-156.166
- CVE-2025-38293
- Description:
wifi: ath11k: fix node corruption in ar->arvifs list
- CVE: https://ubuntu.com/security/CVE-2025-38293
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38293-wifi-ath11k-fix-node-corruption-in-ar-arvifs-list.patch
- From: 5.15.0-156.166
- CVE-2025-38163
- Description:
f2fs: fix to do sanity check on sbi->total_valid_block_count
- CVE: https://ubuntu.com/security/CVE-2025-38163
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38163-f2fs-fix-to-do-sanity-check-on-sbi-total-valid-block-count.patch
- From: 5.15.0-156.166
- CVE-2025-38160
- Description:
clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()
- CVE: https://ubuntu.com/security/CVE-2025-38160
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38160-clk-bcm-rpi-add-null-check-in-raspberrypi-clk-register.patch
- From: 5.15.0-156.166
- CVE-2025-38285
- Description:
bpf: Fix WARN() in get_bpf_raw_tp_regs
- CVE: https://ubuntu.com/security/CVE-2025-38285
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38285-bpf-fix-warn-in-get-bpf-raw-tp-regs.patch
- From: 5.15.0-156.166
- CVE-2025-38159
- Description:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38159
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38159-wifi-rtw88-fix-the-para-buffer-size-to-avoid-reading-out-of-bounds.patch
- From: 5.15.0-156.166
- CVE-2025-38157
- Description:
wifi: ath9k_htc: Abort software beacon handling if disabled
- CVE: https://ubuntu.com/security/CVE-2025-38157
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38157-wifi-ath9k-htc-abort-software-beacon-handling-if-disabled.patch
- From: 5.15.0-156.166
- CVE-2025-38154
- Description:
bpf, sockmap: Avoid using sk_socket after free when sending
- CVE: https://ubuntu.com/security/CVE-2025-38154
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38154-bpf-sockmap-avoid-using-sk-socket-after-free-when-sending.patch
- From: 5.15.0-156.166
- CVE-2025-38153
- Description:
net: usb: aqc111: fix error handling of usbnet read calls
- CVE: https://ubuntu.com/security/CVE-2025-38153
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38153-net-usb-aqc111-fix-error-handling-of-usbnet-read-calls.patch
- From: 5.15.0-156.166
- CVE-2025-38280
- Description:
bpf: Avoid __bpf_prog_ret0_warn when jit fails
- CVE: https://ubuntu.com/security/CVE-2025-38280
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38280-bpf-avoid-bpf-prog-ret0-warn-when-jit-fails.patch
- From: 5.15.0-156.166
- CVE-2025-38147
- Description:
calipso: Don't call calipso functions for AF_INET sk.
- CVE: https://ubuntu.com/security/CVE-2025-38147
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38147-calipso-don-t-call-calipso-functions-for-af-inet-sk.patch
- From: 5.15.0-156.166
- CVE-2025-38147
- Description:
calipso: unlock rcu before returning -EAFNOSUPPORT
- CVE: https://ubuntu.com/security/CVE-2025-38147
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38147-calipso-unlock-rcu-before-returning-EAFNOSUPPORT.patch
- From: 5.15.0-156.166
- CVE-2025-38146
- Description:
net: openvswitch: Fix the dead loop of MPLS parse
- CVE: https://ubuntu.com/security/CVE-2025-38146
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38146-net-openvswitch-fix-the-dead-loop-of-mpls-parse.patch
- From: 5.15.0-156.166
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://ubuntu.com/security/CVE-2025-38415
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38415-squashfs-check-return-result-of-sb-min-blocksize.patch
- From: 5.15.0-156.166
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://ubuntu.com/security/CVE-2025-38415
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38415-squashfs-check-return-result-of-sb-min-blocksize-kpatch.patch
- From: 5.15.0-156.166
- CVE-2025-38415
- Description:
squashfs: fix memory leak in squashfs_fill_super
- CVE: https://ubuntu.com/security/CVE-2025-38415
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38415-squashfs-fix-memory-leak-in-squashfs_fill_super.patch
- From: 5.15.0-156.166
- CVE-2025-38313
- Description:
bus: fsl-mc: fix double-free on mc_dev
- CVE: https://ubuntu.com/security/CVE-2025-38313
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38313-bus-fsl-mc-fix-double-free-on-mc-dev.patch
- From: 5.15.0-156.166
- CVE-2025-38145
- Description:
soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop()
- CVE: https://ubuntu.com/security/CVE-2025-38145
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38145-soc-aspeed-add-null-check-in-aspeed-lpc-enable-snoop.patch
- From: 5.15.0-156.166
- CVE-2025-38312
- Description:
fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()
- CVE: https://ubuntu.com/security/CVE-2025-38312
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38312-fbdev-core-fbcvt-avoid-division-by-0-in-fb-cvt-hperiod.patch
- From: 5.15.0-156.166
- CVE-2025-38143
- Description:
backlight: pm8941: Add NULL check in wled_configure()
- CVE: https://ubuntu.com/security/CVE-2025-38143
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38143-backlight-pm8941-add-null-check-in-wled-configure.patch
- From: 5.15.0-156.166
- CVE-2025-38138
- Description:
dmaengine: ti: Add NULL check in udma_probe()
- CVE: https://ubuntu.com/security/CVE-2025-38138
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38138-dmaengine-ti-add-null-check-in-udma-probe.patch
- From: 5.15.0-156.166
- CVE-2025-38122
- Description:
gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO
- CVE: https://ubuntu.com/security/CVE-2025-38122
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38122-gve-add-missing-null-check-for-gve-alloc-pending-packet-in-tx-dqo.patch
- From: 5.15.0-156.166
- CVE-2025-38120
- Description:
netfilter: nf_set_pipapo_avx2: fix initial map fill
- CVE: https://ubuntu.com/security/CVE-2025-38120
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38120-netfilter-nf-set-pipapo-avx2-fix-initial-map-fill.patch
- From: 5.15.0-156.166
- CVE-2025-38310
- Description:
[PATCH] seg6: Fix validation of nexthop addresses
- CVE: https://ubuntu.com/security/CVE-2025-38310
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38310-seg6-Fix-validation-of-nexthop-addresses.patch
- From: 5.15.0-156.166
- CVE-2025-38310
- Description:
[PATCH] seg6: Fix validation of nexthop addresses
- CVE: https://ubuntu.com/security/CVE-2025-38310
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38310-seg6-Fix-validation-of-nexthop-addresses-kpatch.patch
- From: 5.15.0-156.166
- CVE-2025-38498
- Description:
do_change_type(): refuse to operate on unmounted/not ours mounts
- CVE: https://ubuntu.com/security/CVE-2025-38498
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38498-do-change-type-refuse-to-operate-on-unmounted-not-ours-mounts.patch
- From: 5.15.0-156.166
- CVE-2025-38498
- Description:
use uniform permission checks for all mount propagation changes
- CVE: https://ubuntu.com/security/CVE-2025-38498
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38498-use-uniform-permission-checks-for-all-mount-propagation-changes.patch
- From: 5.15.0-156.166
- CVE-2025-38119
- Description:
scsi: core: ufs: Fix a hang in the error handler
- CVE: https://ubuntu.com/security/CVE-2025-38119
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38119-scsi-core-ufs-fix-a-hang-in-the-error-handler.patch
- From: 5.15.0-156.166
- CVE-2025-38305
- Description:
ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use()
- CVE: https://ubuntu.com/security/CVE-2025-38305
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38305-ptp-remove-ptp-n-vclocks-check-logic-in-ptp-vclock-in-use.patch
- From: 5.15.0-156.166
- CVE-2025-38305
- Description:
ptp: fix breakage after ptp_vclock_in_use() rework
- CVE: https://ubuntu.com/security/CVE-2025-38305
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38305-ptp-fix-breakage-after-ptp_vclock_in_use-rework.patch
- From: 5.15.0-156.166
- CVE-2025-38115
- Description:
net_sched: sch_sfq: fix a potential crash on gso_skb handling
- CVE: https://ubuntu.com/security/CVE-2025-38115
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38115-net-sched-sch-sfq-fix-a-potential-crash-on-gso-skb-handling.patch
- From: 5.15.0-156.166
- CVE-2025-38088
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-38088.patch
- From:
- CVE-2025-38112
- Description:
net: Fix TOCTOU issue in sk_is_readable()
- CVE: https://ubuntu.com/security/CVE-2025-38112
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38112-net-fix-toctou-issue-in-sk-is-readable.patch
- From: 5.15.0-156.166
- CVE-2025-38111
- Description:
net/mdiobus: Fix potential out-of-bounds read/write access
- CVE: https://ubuntu.com/security/CVE-2025-38111
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38111-net-mdiobus-fix-potential-out-of-bounds-read-write-access.patch
- From: 5.15.0-156.166
- CVE-2025-38108
- Description:
net_sched: red: fix a race in __red_change()
- CVE: https://ubuntu.com/security/CVE-2025-38108
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38108-net-sched-red-fix-a-race-in-red-change.patch
- From: 5.15.0-156.166
- CVE-2025-38107
- Description:
net_sched: ets: fix a race in ets_qdisc_change()
- CVE: https://ubuntu.com/security/CVE-2025-38107
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38107-net-sched-ets-fix-a-race-in-ets-qdisc-change.patch
- From: 5.15.0-156.166
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://ubuntu.com/security/CVE-2025-38352
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle-posix-cpu-timers-and-posix-cpu-timer-del.patch
- From: 5.15.0-156.166
- CVE-2025-38102
- Description:
VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify
- CVE: https://ubuntu.com/security/CVE-2025-38102
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38102-vmci-fix-race-between-vmci-host-setup-notify-and-vmci-ctx-unset-notify.patch
- From: 5.15.0-156.166
- CVE-2025-38100
- Description:
x86/iopl: Cure TIF_IO_BITMAP inconsistencies
- CVE: https://ubuntu.com/security/CVE-2025-38100
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38100-x86-iopl-cure-tif-io-bitmap-inconsistencies.patch
- From: 5.15.0-156.166
- CVE-2025-38430
- Description:
nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request
- CVE: https://ubuntu.com/security/CVE-2025-38430
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38430-nfsd-nfsd4-spo-must-allow-must-check-this-is-a-v4-compound-request.patch
- From: 5.15.0-156.166
- CVE-2025-38231
- Description:
nfsd: Initialize ssc before laundromat_work to prevent NULL dereference
- CVE: https://ubuntu.com/security/CVE-2025-38231
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38231-nfsd-initialize-ssc-before-laundromat-work-to-prevent-null-dereference.patch
- From: 5.15.0-156.166
- CVE-2025-38337
- Description:
jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata()
- CVE: https://ubuntu.com/security/CVE-2025-38337
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38337-jbd2-fix-data-race-and-null-ptr-deref-in-jbd2-journal-dirty-metadata.patch
- From: 5.15.0-156.166
- CVE-2025-38229
- Description:
media: cxusb: no longer judge rbuf when the write fails
- CVE: https://ubuntu.com/security/CVE-2025-38229
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38229-media-cxusb-no-longer-judge-rbuf-when-the-write-fails.patch
- From: 5.15.0-156.166
- CVE-2025-38227
- Description:
media: vidtv: Terminating the subsequent process of initialization failure
- CVE: https://ubuntu.com/security/CVE-2025-38227
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38227-media-vidtv-terminating-the-subsequent-process-of-initialization-failure.patch
- From: 5.15.0-156.166
- CVE-2025-38226
- Description:
media: vivid: Change the siize of the composing
- CVE: https://ubuntu.com/security/CVE-2025-38226
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38226-media-vivid-change-the-siize-of-the-composing.patch
- From: 5.15.0-156.166
- CVE-2025-38336
- Description:
ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330
- CVE: https://ubuntu.com/security/CVE-2025-38336
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38336-ata-pata-via-force-pio-for-atapi-devices-on-vt6415-vt6330.patch
- From: 5.15.0-156.166
- CVE-2025-38222
- Description:
ext4: inline: fix len overflow in ext4_prepare_inline_data
- CVE: https://ubuntu.com/security/CVE-2025-38222
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38222-ext4-inline-fix-len-overflow-in-ext4-prepare-inline-data.patch
- From: 5.15.0-156.166
- CVE-2025-38428
- Description:
Input: ims-pcu - check record size in ims_pcu_flash_firmware()
- CVE: https://ubuntu.com/security/CVE-2025-38428
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38428-input-ims-pcu-check-record-size-in-ims-pcu-flash-firmware.patch
- From: 5.15.0-156.166
- CVE-2025-38219
- Description:
f2fs: prevent kernel warning due to negative i_nlink from corrupted image
- CVE: https://ubuntu.com/security/CVE-2025-38219
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38219-f2fs-prevent-kernel-warning-due-to-negative-i-nlink-from-corrupted-image.patch
- From: 5.15.0-156.166
- CVE-2025-38218
- Description:
f2fs: fix to do sanity check on sit_bitmap_size
- CVE: https://ubuntu.com/security/CVE-2025-38218
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38218-f2fs-fix-to-do-sanity-check-on-sit-bitmap-size.patch
- From: 5.15.0-156.166
- CVE-2025-38416
- Description:
NFC: nci: uart: Set tty->disc_data only in success path
- CVE: https://ubuntu.com/security/CVE-2025-38416
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38416-nfc-nci-uart-set-tty-disc-data-only-in-success-path.patch
- From: 5.15.0-156.166
- CVE-2025-38212
- Description:
ipc: fix to protect IPCS lookups using RCU
- CVE: https://ubuntu.com/security/CVE-2025-38212
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38212-ipc-fix-to-protect-ipcs-lookups-using-rcu.patch
- From: 5.15.0-156.166
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
- CVE: https://ubuntu.com/security/CVE-2025-38211
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38211-rdma-iwcm-fix-use-after-free-of-work-objects-after-cm-id-destruction.patch
- From: 5.15.0-156.166
- CVE-2025-38346
- Description:
ftrace: Fix UAF when lookup kallsym after ftrace disabled
- CVE: https://ubuntu.com/security/CVE-2025-38346
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38346-ftrace-fix-uaf-when-lookup-kallsym-after-ftrace-disabled.patch
- From: 5.15.0-156.166
- CVE-2025-38086
- Description:
net: ch9200: fix uninitialised access during mii_nway_restart
- CVE: https://ubuntu.com/security/CVE-2025-38086
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38086-net-ch9200-fix-uninitialised-access-during-mii-nway-restart.patch
- From: 5.15.0-156.166
- CVE-2025-38419
- Description:
remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()
- CVE: https://ubuntu.com/security/CVE-2025-38419
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38419-remoteproc-core-cleanup-acquired-resources-when-rproc-handle-resources-fails-in-rproc-attach.patch
- From: 5.15.0-156.166
- CVE-2025-38418
- Description:
remoteproc: core: Release rproc->clean_table after rproc_attach() fails
- CVE: https://ubuntu.com/security/CVE-2025-38418
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38418-remoteproc-core-release-rproc-clean-table-after-rproc-attach-fails.patch
- From: 5.15.0-156.166
- CVE-2025-38345
- Description:
Kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2025-38345.patch
- From:
- CVE-2025-38344
- Description:
ACPICA: fix acpi parse and parseext cache leaks
- CVE: https://ubuntu.com/security/CVE-2025-38344
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38344-acpica-fix-acpi-parse-and-parseext-cache-leaks.patch
- From: 5.15.0-156.166
- CVE-2025-38206
- Description:
exfat: fix double free in delayed_free
- CVE: https://ubuntu.com/security/CVE-2025-38206
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38206-exfat-fix-double-free-in-delayed-free.patch
- From: 5.15.0-156.166
- CVE-2025-38204
- Description:
jfs: fix array-index-out-of-bounds read in add_missing_indices
- CVE: https://ubuntu.com/security/CVE-2025-38204
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38204-jfs-fix-array-index-out-of-bounds-read-in-add-missing-indices.patch
- From: 5.15.0-156.166
- CVE-2025-38203
- Description:
jfs: Fix null-ptr-deref in jfs_ioc_trim
- CVE: https://ubuntu.com/security/CVE-2025-38203
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38203-jfs-Fix-null-ptr-deref-in-jfs_ioc_trim.patch
- From: 5.15.0-156.166
- CVE-2025-38237
- Description:
media: platform: exynos4-is: Add hardware sync wait to fimc_is_hw_change_mode()
- CVE: https://ubuntu.com/security/CVE-2025-38237
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38237-media-platform-exynos4-is-Add-hardware-sync-wait-to-fimc_is_hw_change_mode.patch
- From: 5.15.0-156.166
- CVE-2025-38342
- Description:
software node: Correct a OOB check in software_node_get_reference_args()
- CVE: https://ubuntu.com/security/CVE-2025-38342
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38342-software-node-correct-a-oob-check-in-software-node-get-reference-args.patch
- From: 5.15.0-156.166
- CVE-2025-38332
- Description:
scsi: lpfc: Use memcpy() for BIOS version
- CVE: https://ubuntu.com/security/CVE-2025-38332
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38332-scsi-lpfc-use-memcpy-for-bios-version.patch
- From: 5.15.0-156.166
- CVE-2025-38200
- Description:
i40e: fix MMIO write access to an invalid page in i40e_clear_hw
- CVE: https://ubuntu.com/security/CVE-2025-38200
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38200-i40e-fix-mmio-write-access-to-an-invalid-page-in-i40e-clear-hw.patch
- From: 5.15.0-156.166
- CVE-2025-38197
- Description:
platform/x86: dell_rbu: Fix list usage
- CVE: https://ubuntu.com/security/CVE-2025-38197
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38197-platform-x86-dell-rbu-fix-list-usage.patch
- From: 5.15.0-156.166
- CVE-2025-38090
- Description:
drivers/rapidio/rio_cm.c: prevent possible heap overwrite
- CVE: https://ubuntu.com/security/CVE-2025-38090
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38090-drivers-rapidio-rio-cm-c-prevent-possible-heap-overwrite.patch
- From: 5.15.0-156.166
- CVE-2025-38194
- Description:
jffs2: check that raw node were preallocated before writing summary
- CVE: https://ubuntu.com/security/CVE-2025-38194
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38194-jffs2-check-that-raw-node-were-preallocated-before-writing-summary.patch
- From: 5.15.0-156.166
- CVE-2025-38328
- Description:
jffs2: check jffs2_prealloc_raw_node_refs() result in few other places
- CVE: https://ubuntu.com/security/CVE-2025-38328
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38328-jffs2-check-jffs2-prealloc-raw-node-refs-result-in-few-other-places.patch
- From: 5.15.0-156.166
- CVE-2025-38084
- Description:
mm/hugetlb: unshare page tables during VMA split, not before
- CVE: https://ubuntu.com/security/CVE-2025-38084
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38084-mm-hugetlb-unshare-page-tables-during-vma-split-not-before.patch
- From: 5.15.0-156.166
- CVE-2024-57883
- Description:
Complex adaptation required
- CVE:
- Patch: skipped/CVE-2024-57883.patch
- From:
- CVE-2025-38085
- Description:
Complex adaptation required. High risk of regression.
- CVE:
- Patch: skipped/CVE-2025-38085.patch
- From:
- CVE-2025-38326
- Description:
aoe: clean device rq_list in aoedev_downdev()
- CVE: https://ubuntu.com/security/CVE-2025-38326
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38326-aoe-clean-device-rq_list-in-aoedev_downdev.patch
- From: 5.15.0-156.166
- CVE-2025-38420
- Description:
wifi: carl9170: do not ping device which has failed to load firmware
- CVE: https://ubuntu.com/security/CVE-2025-38420
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38420-wifi-carl9170-do-not-ping-device-which-has-failed-to-load-firmware.patch
- From: 5.15.0-156.166
- CVE-2025-38324
- Description:
mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu().
- CVE: https://ubuntu.com/security/CVE-2025-38324
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38324-mpls-use-rcu-dereference-rtnl-in-mpls-route-input-rcu.patch
- From: 5.15.0-156.166
- CVE-2025-38184
- Description:
tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer
- CVE: https://ubuntu.com/security/CVE-2025-38184
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38184-tipc-fix-null-ptr-deref-when-acquiring-remote-ip-of-ethernet-bearer.patch
- From: 5.15.0-156.166
- CVE-2025-38181
- Description:
calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().
- CVE: https://ubuntu.com/security/CVE-2025-38181
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38181-calipso-fix-null-ptr-deref-in-calipso-req-set-del-attr.patch
- From: 5.15.0-156.166
- CVE-2025-37958
- Description:
mm/huge_memory: fix dereferencing invalid pmd migration entry
- CVE: https://ubuntu.com/security/CVE-2025-37958
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-37958-mm-huge-memory-fix-dereferencing-invalid-pmd-migration-entry.patch
- From: 5.15.0-156.166
- CVE-2025-38424
- Description:
perf: Fix sample vs do_exit()
- CVE: https://ubuntu.com/security/CVE-2025-38424
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38424-perf-fix-sample-vs-do-exit.patch
- From: 5.15.0-156.166
- CVE-2025-38320
- Description:
arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth()
- CVE: https://ubuntu.com/security/CVE-2025-38320
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38320-arm64-ptrace-fix-stack-out-of-bounds-read-in-regs-get-kernel-stack-nth.patch
- From: 5.15.0-156.166
- CVE-2025-38263
- Description:
bcache: fix NULL pointer in cache_set_flush()
- CVE: https://ubuntu.com/security/CVE-2025-38263
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38263-bcache-fix-NULL-pointer-in-cache_set_flush.patch
- From: 5.15.0-156.166
- CVE-2025-38257
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-38257.patch
- From:
- CVE-2025-38251
- Description:
atm: clip: prevent NULL deref in clip_push()
- CVE: https://ubuntu.com/security/CVE-2025-38251
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38251-atm-clip-prevent-null-deref-in-clip-push.patch
- From: 5.15.0-156.166
- CVE-2025-38249
- Description:
ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()
- CVE: https://ubuntu.com/security/CVE-2025-38249
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38249-ALSA-usb-audio-Fix-out-of-bounds-read-in-snd_usb_get_audioformat_uac3.patch
- From: 5.15.0-156.166
- CVE-2025-38245
- Description:
atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().
- CVE: https://ubuntu.com/security/CVE-2025-38245
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38245-atm-Release-atm_dev_mutex-after-removing-procfs-in-atm_dev_deregister.patch
- From: 5.15.0-156.166
- CVE-2025-38363
- Description:
drm/tegra: Fix a possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-38363
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38363-drm-tegra-fix-a-possible-null-pointer-dereference.patch
- From: 5.15.0-156.166
- CVE-2025-38362
- Description:
drm/amd/display: Add null pointer check for get_first_active_display()
- CVE: https://ubuntu.com/security/CVE-2025-38362
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38362-drm-amd-display-add-null-pointer-check-for-get-first-active-display.patch
- From: 5.15.0-156.166
- CVE-2025-38245
- Description:
btrfs: don't drop extent_map for free space inode on write error
- CVE: https://ubuntu.com/security/CVE-2025-38245
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2024-26726-btrfs-don-t-drop-extent_map-for-free-space-inode-on-write-error.patch
- From: 5.15.0-156.166
- CVE-2025-38403
- Description:
vsock/vmci: Clear the vmci transport packet properly when initializing it
- CVE: https://ubuntu.com/security/CVE-2025-38403
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38403-vsock-vmci-clear-the-vmci-transport-packet-properly-when-initializing-it.patch
- From: 5.15.0-156.166
- CVE-2025-38391
- Description:
usb: typec: altmodes/displayport: do not index invalid pin_assignments
- CVE: https://ubuntu.com/security/CVE-2025-38391
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38391-usb-typec-altmodes-displayport-do-not-index-invalid-pin-assignments.patch
- From: 5.15.0-156.166
- CVE-2025-38401
- Description:
mtk-sd: Prevent memory corruption from DMA map failure
- CVE: https://ubuntu.com/security/CVE-2025-38401
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38401-mtk-sd-Prevent-memory-corruption-from-DMA-map-failure.patch
- From: 5.15.0-156.166
- CVE-2025-38401
- Description:
mtk-sd: reset host->mrq on prepare_data() error
- CVE: https://ubuntu.com/security/CVE-2025-38401
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38401-mtk-sd-reset-host-mrq-on-prepare_data-error.patch
- From: 5.15.0-156.166
- CVE-2025-38387
- Description:
RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert
- CVE: https://ubuntu.com/security/CVE-2025-38387
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38387-rdma-mlx5-initialize-obj-event-obj-sub-list-before-xa-insert.patch
- From: 5.15.0-156.166
- CVE-2025-38393
- Description:
NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN
- CVE: https://ubuntu.com/security/CVE-2025-38393
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38393-nfsv4-pnfs-fix-a-race-to-wake-on-nfs-layout-drain.patch
- From: 5.15.0-156.166
- CVE-2025-38412
- Description:
platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks
- CVE: https://ubuntu.com/security/CVE-2025-38412
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38412-platform-x86-dell-wmi-sysman-fix-wmi-data-block-retrieval-in-sysfs-callbacks.patch
- From: 5.15.0-156.166
- CVE-2025-38389
- Description:
drm/i915/gt: Fix timeline left held on VMA alloc error
- CVE: https://ubuntu.com/security/CVE-2025-38389
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38389-drm-i915-gt-fix-timeline-left-held-on-vma-alloc-error.patch
- From: 5.15.0-156.166
- CVE-2025-38377
- Description:
rose: fix dangling neighbour pointers in rose_rt_device_down()
- CVE: https://ubuntu.com/security/CVE-2025-38377
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38377-rose-fix-dangling-neighbour-pointers-in-rose-rt-device-down.patch
- From: 5.15.0-156.166
- CVE-2025-38410
- Description:
drm/msm: Fix a fence leak in submit error path
- CVE: https://ubuntu.com/security/CVE-2025-38410
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38410-drm-msm-fix-a-fence-leak-in-submit-error-path.patch
- From: 5.15.0-156.166
- CVE-2025-38399
- Description:
scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()
- CVE: https://ubuntu.com/security/CVE-2025-38399
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38399-scsi-target-fix-null-pointer-dereference-in-core-scsi3-decode-spec-i-port.patch
- From: 5.15.0-156.166
- CVE-2025-38406
- Description:
wifi: ath6kl: remove WARN on bad firmware input
- CVE: https://ubuntu.com/security/CVE-2025-38406
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38406-wifi-ath6kl-remove-warn-on-bad-firmware-input.patch
- From: 5.15.0-156.166
- CVE-2025-38386
- Description:
ACPICA: Refuse to evaluate a method if arguments are missing
- CVE: https://ubuntu.com/security/CVE-2025-38386
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38386-acpica-refuse-to-evaluate-a-method-if-arguments-are-missing.patch
- From: 5.15.0-156.166
- CVE-2025-38384
- Description:
mtd: spinand: fix memory leak of ECC engine conf
- CVE: https://ubuntu.com/security/CVE-2025-38384
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38384-mtd-spinand-fix-memory-leak-of-ecc-engine-conf.patch
- From: 5.15.0-156.166
- CVE-2025-38467
- Description:
drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling
- CVE: https://ubuntu.com/security/CVE-2025-38467
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38467-drm-exynos-exynos7-drm-decon-add-vblank-check-in-irq-handling.patch
- From: 5.15.0-156.166
- CVE-2025-38466
- Description:
perf: Revert to requiring CAP_SYS_ADMIN for uprobes
- CVE: https://ubuntu.com/security/CVE-2025-38466
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38466-perf-revert-to-requiring-cap-sys-admin-for-uprobes.patch
- From: 5.15.0-156.166
- CVE-2025-38465
- Description:
netlink: Fix wraparounds of sk->sk_rmem_alloc.
- CVE: https://ubuntu.com/security/CVE-2025-38465
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38465-netlink-fix-wraparounds-of-sk-sk-rmem-alloc.patch
- From: 5.15.0-156.166
- CVE-2025-38464
- Description:
tipc: Fix use-after-free in tipc_conn_close().
- CVE: https://ubuntu.com/security/CVE-2025-38464
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38464-tipc-fix-use-after-free-in-tipc-conn-close.patch
- From: 5.15.0-156.166
- CVE-2025-38462
- Description:
vsock: Fix transport_{g2h,h2g} TOCTOU
- CVE: https://ubuntu.com/security/CVE-2025-38462
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38462-vsock-fix-transport-g2h-h2g-toctou.patch
- From: 5.15.0-156.166
- CVE-2025-38461
- Description:
vsock: Fix transport_* TOCTOU
- CVE: https://ubuntu.com/security/CVE-2025-38461
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38461-vsock-fix-transport-toctou.patch
- From: 5.15.0-156.166
- CVE-2025-38460
- Description:
atm: clip: Fix potential null-ptr-deref in to_atmarpd().
- CVE: https://ubuntu.com/security/CVE-2025-38460
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38460-atm-clip-fix-potential-null-ptr-deref-in-to-atmarpd.patch
- From: 5.15.0-156.166
- CVE-2025-38459
- Description:
atm: clip: Fix infinite recursive call of clip_push().
- CVE: https://ubuntu.com/security/CVE-2025-38459
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38459-atm-clip-fix-infinite-recursive-call-of-clip-push.patch
- From: 5.15.0-156.166
- CVE-2025-38458
- Description:
atm: Revert atm_account_tx() if copy_from_iter_full() fails.
- CVE: https://ubuntu.com/security/CVE-2025-38458
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38458-atm-revert-atm_account_tx-if-copy_from_iter_full-fails.patch
- From: 5.15.0-156.166
- CVE-2025-38458
- Description:
atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
- CVE: https://ubuntu.com/security/CVE-2025-38458
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38458-atm-clip-fix-null-pointer-dereference-in-vcc-sendmsg.patch
- From: 5.15.0-156.166
- CVE-2025-38458
- Description:
atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
- CVE: https://ubuntu.com/security/CVE-2025-38458
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38458-atm-clip-fix-null-pointer-dereference-in-vcc-sendmsg-kpatch.patch
- From: 5.15.0-156.166
- CVE-2025-38457
- Description:
net/sched: Abort __tc_modify_qdisc if parent class does not exist
- CVE: https://ubuntu.com/security/CVE-2025-38457
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38457-net-sched-abort-tc-modify-qdisc-if-parent-class-does-not-exist.patch
- From: 5.15.0-156.166
- CVE-2025-38514
- Description:
rxrpc: Fix oops due to non-existence of prealloc backlog struct
- CVE: https://ubuntu.com/security/CVE-2025-38514
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38514-rxrpc-fix-oops-due-to-non-existence-of-prealloc-backlog-struct.patch
- From: 5.15.0-156.166
- CVE-2022-48703
- Description:
thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR
- CVE: https://ubuntu.com/security/CVE-2022-48703
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2022-48703-thermal-int340x-thermal-handle-data-vault-when-the-value-is-zero-size-ptr.patch
- From: 5.15.0-156.166
- CVE-2024-26775
- Description:
aoe: avoid potential deadlock at set_capacity
- CVE: https://ubuntu.com/security/CVE-2024-26775
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2024-26775-aoe-avoid-potential-deadlock-at-set-capacity.patch
- From: 5.15.0-156.166
- CVE-2024-44939
- Description:
jfs: fix null ptr deref in dtInsertEntry
- CVE: https://ubuntu.com/security/CVE-2024-44939
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2024-44939-jfs-fix-null-ptr-deref-in-dtinsertentry.patch
- From: 5.15.0-156.166
- CVE-2025-38515
- Description:
drm/sched: Increment job count before swapping tail spsc queue
- CVE: https://ubuntu.com/security/CVE-2025-38515
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38515-drm-sched-increment-job-count-before-swapping-tail-spsc-queue.patch
- From: 5.15.0-156.166
- CVE-2025-38448
- Description:
usb: gadget: u_serial: Fix race condition in TTY wakeup
- CVE: https://ubuntu.com/security/CVE-2025-38448
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38448-usb-gadget-u-serial-fix-race-condition-in-tty-wakeup-134.patch
- From: 5.15.0-156.166
- CVE-2025-38375
- Description:
virtio-net: ensure the received length does not exceed allocated size
- CVE: https://ubuntu.com/security/CVE-2025-38375
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38375-virtio-net-ensure-the-received-length-does-not-exceed-allocated-size.patch
- From: 5.15.0-156.166
- CVE-2025-38513
- Description:
wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()
- CVE: https://ubuntu.com/security/CVE-2025-38513
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38513-wifi-zd1211rw-fix-potential-null-pointer-dereference-in-zd-mac-tx-to-dev.patch
- From: 5.15.0-156.166
- CVE-2025-38445
- Description:
md/raid1: Fix stack memory use after return in raid1_reshape
- CVE: https://ubuntu.com/security/CVE-2025-38445
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38445-md-raid1-fix-stack-memory-use-after-return-in-raid1-reshape.patch
- From: 5.15.0-156.166
- CVE-2025-38444
- Description:
raid10: cleanup memleak at raid10_make_request
- CVE: https://ubuntu.com/security/CVE-2025-38444
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38444-raid10-cleanup-memleak-at-raid10-make-request.patch
- From: 5.15.0-156.166
- CVE-2025-38443
- Description:
nbd: fix uaf in nbd_genl_connect() error path
- CVE: https://ubuntu.com/security/CVE-2025-38443
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38443-nbd-fix-uaf-in-nbd-genl-connect-error-path.patch
- From: 5.15.0-156.166
- CVE-2025-38441
- Description:
netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto()
- CVE: https://ubuntu.com/security/CVE-2025-38441
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38441-netfilter-flowtable-account-for-ethernet-header-in-nf-flow-pppoe-proto.patch
- From: 5.15.0-156.166
- CVE-2025-38439
- Description:
bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT
- CVE: https://ubuntu.com/security/CVE-2025-38439
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38439-bnxt-en-set-dma-unmap-len-correctly-for-xdp-redirect.patch
- From: 5.15.0-156.166
- CVE-2025-38074
- Description:
vhost-scsi: protect vq->log_used with vq->mutex
- CVE: https://ubuntu.com/security/CVE-2025-38074
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38074-vhost-scsi-protect-vq-log-used-with-vq-mutex.patch
- From: 5.15.0-156.166
- CVE-2025-38067
- Description:
postponed
- CVE:
- Patch: skipped/CVE-2025-38067.patch
- From:
- CVE-2025-21888
- Description:
RDMA/mlx5: Fix a WARN during dereg_mr for DM type
- CVE: https://ubuntu.com/security/CVE-2025-21888
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-21888-rdma-mlx5-fix-a-warn-during-dereg-mr-for-dm-type.patch
- From: 5.15.0-156.166
- CVE-2025-38618
- Description:
vsock: Do not allow binding to VMADDR_PORT_ANY
- CVE: https://ubuntu.com/security/CVE-2025-38618
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38618-vsock-do-not-allow-binding-to-vmaddr-port-any.patch
- From: 5.15.0-157.167
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://ubuntu.com/security/CVE-2025-38477
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38477-net-sched-sch-qfq-fix-race-condition-on-qfq-aggregate.patch
- From: 5.15.0-157.167
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class
- CVE: https://ubuntu.com/security/CVE-2025-38477
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38477-net-sched-sch-qfq-avoid-triggering-might-sleep-in-atomic-context-in-qfq-delete-class.patch
- From: 5.15.0-157.167
- CVE-2025-38617
- Description:
net/packet: fix a race in packet_set_ring() and acket_notifier()
- CVE: https://ubuntu.com/security/CVE-2025-38617
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38617-net-packet-fix-a-race-in-packet_set_ring-and-packet_notifier.patch
- From: 5.15.0-157.167
- CVE-2024-26700
- Description:
drm/amd/display: Fix MST Null Ptr for RV
- CVE: https://ubuntu.com/security/CVE-2024-26700
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2024-26700-drm-amd-display-Fix-MST-Null-Ptr-for-RV.patch
- From: 5.15.0-160.170
- CVE-2023-52593
- Description:
wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()
- CVE: https://ubuntu.com/security/CVE-2023-52593
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2023-52593-wifi-wfx-fix-possible-NULL-pointer-dereference-in-wfx_set_mfp_ap.patch
- From: 5.15.0-160.170
- CVE-2023-52593 CVE-2024-26896
- Description:
wifi: wfx: repair open network AP mode
- CVE: https://ubuntu.com/security/CVE-2024-26896
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2023-52593-CVE-2024-26896-wifi-wfx-fix-memory-leak-when-starting-AP.patch
- From: 5.15.0-160.170
- CVE-2023-52593
- Description:
wifi: wfx: repair open network AP mode
- CVE: https://ubuntu.com/security/CVE-2023-52593
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2023-52593-wifi-wfx-repair-open-network-AP-mode.patch
- From: 5.15.0-160.170
- CVE-2024-53068
- Description:
firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier()
- CVE: https://ubuntu.com/security/CVE-2024-53068
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2024-53068-firmware-arm-scmi-fix-slab-use-after-free-in-scmi-bus-notifier.patch
- From: 5.15.0-163.173
- CVE-2025-38678
- Description:
netfilter: nf_tables: reject duplicate device on updates
- CVE: https://ubuntu.com/security/CVE-2025-38678
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38678-netfilter-nf-tables-reject-duplicate-device-on-updates.patch
- From: 5.15.0-163.173
- CVE-2025-38535
- Description:
phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode
- CVE: https://ubuntu.com/security/CVE-2025-38535
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38535-phy-tegra-xusb-fix-unbalanced-regulator-disable-in-utmi-phy-mode.patch
- From: 5.15.0-163.173
- CVE-2025-38497
- Description:
usb: gadget: configfs: Fix OOB read on empty string write
- CVE: https://ubuntu.com/security/CVE-2025-38497
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38497-usb-gadget-configfs-fix-oob-read-on-empty-string-write.patch
- From: 5.15.0-163.173
- CVE-2025-38495
- Description:
HID: core: ensure the allocated report buffer can contain the reserved report ID
- CVE: https://ubuntu.com/security/CVE-2025-38495
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38495-hid-core-ensure-the-allocated-report-buffer-can-contain-the-reserved-report-id.patch
- From: 5.15.0-163.173
- CVE-2025-38494
- Description:
HID: core: do not bypass hid_hw_raw_request
- CVE: https://ubuntu.com/security/CVE-2025-38494
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38494-hid-core-do-not-bypass-hid-hw-raw-request.patch
- From: 5.15.0-163.173
- CVE-2025-38539
- Description:
tracing: Add down_write(trace_event_sem) when adding trace event
- CVE: https://ubuntu.com/security/CVE-2025-38539
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38539-tracing-add-down-write-trace-event-sem-when-adding-trace-event.patch
- From: 5.15.0-163.173
- CVE-2025-38538
- Description:
dmaengine: nbpfaxi: Fix memory corruption in probe()
- CVE: https://ubuntu.com/security/CVE-2025-38538
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38538-dmaengine-nbpfaxi-fix-memory-corruption-in-probe.patch
- From: 5.15.0-163.173
- CVE-2025-38529
- Description:
comedi: aio_iiro_16: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38529
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38529-comedi-aio-iiro-16-fix-bit-shift-out-of-bounds.patch
- From: 5.15.0-163.173
- CVE-2025-38483
- Description:
comedi: das16m1: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38483
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38483-comedi-das16m1-fix-bit-shift-out-of-bounds.patch
- From: 5.15.0-163.173
- CVE-2025-38482
- Description:
comedi: das6402: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38482
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38482-comedi-das6402-fix-bit-shift-out-of-bounds.patch
- From: 5.15.0-163.173
- CVE-2025-38528
- Description:
bpf: Reject %p% format string in bprintf-like helpers
- CVE: https://ubuntu.com/security/CVE-2025-38528
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38528-bpf-reject-p-format-string-in-bprintf-like-helpers.patch
- From: 5.15.0-163.173
- CVE-2025-38527
- Description:
smb: client: fix use-after-free in cifs_oplock_break
- CVE: https://ubuntu.com/security/CVE-2025-38527
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38527-smb-client-fix-use-after-free-in-cifs-oplock-break.patch
- From: 5.15.0-163.173
- CVE-2025-38474
- Description:
usb: net: sierra: check for no status endpoint
- CVE: https://ubuntu.com/security/CVE-2025-38474
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38474-usb-net-sierra-check-for-no-status-endpoint.patch
- From: 5.15.0-163.173
- CVE-2025-38473
- Description:
Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()
- CVE: https://ubuntu.com/security/CVE-2025-38473
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38473-bluetooth-fix-null-ptr-deref-in-l2cap-sock-resume-cb.patch
- From: 5.15.0-163.173
- CVE-2025-38550
- Description:
ipv6: mcast: Delay put pmc->idev in mld_del_delrec()
- CVE: https://ubuntu.com/security/CVE-2025-38550
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38550-ipv6-mcast-delay-put-pmc-idev-in-mld-del-delrec.patch
- From: 5.15.0-163.173
- CVE-2025-38468
- Description:
net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree
- CVE: https://ubuntu.com/security/CVE-2025-38468
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38468-net-sched-return-null-when-htb-lookup-leaf-encounters-an-empty-rbtree.patch
- From: 5.15.0-163.173
- CVE-2025-38499
- Description:
clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns
- CVE: https://ubuntu.com/security/CVE-2025-38499
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38499-clone-private-mnt-make-sure-that-caller-has-cap-sys-admin-in-the-right-userns.patch
- From: 5.15.0-163.173
- CVE-2025-38335
- Description:
PEEMPT_RT config isn't enabled
- CVE:
- Patch: skipped/CVE-2025-38335.patch
- From:
- CVE-2025-38668
- Description:
regulator: core: fix NULL dereference on unbind due to stale coupling data
- CVE: https://ubuntu.com/security/CVE-2025-38668
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38668-regulator-core-fix-null-dereference-on-unbind-due-to-stale-coupling-data.patch
- From: 5.15.0-163.173
- CVE-2025-38671
- Description:
i2c: qup: jump out of the loop in case of timeout
- CVE: https://ubuntu.com/security/CVE-2025-38671
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38671-i2c-qup-jump-out-of-the-loop-in-case-of-timeout.patch
- From: 5.15.0-163.173
- CVE-2025-38663
- Description:
nilfs2: reject invalid file types when reading inodes
- CVE: https://ubuntu.com/security/CVE-2025-38663
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38663-nilfs2-reject-invalid-file-types-when-reading-inodes.patch
- From: 5.15.0-163.173
- CVE-2025-37925
- Description:
jfs: reject on-disk inodes of an unsupported type
- CVE: https://ubuntu.com/security/CVE-2025-37925
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-37925-jfs-reject-on-disk-inodes-of-an-unsupported-type.patch
- From: 5.15.0-163.173
- CVE-2025-38650
- Description:
hfsplus: remove mutex_lock check in hfsplus_free_extents
- CVE: https://ubuntu.com/security/CVE-2025-38650
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38650-hfsplus-remove-mutex-lock-check-in-hfsplus-free-extents.patch
- From: 5.15.0-163.173
- CVE-2025-38612
- Description:
staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc()
- CVE: https://ubuntu.com/security/CVE-2025-38612
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38612-staging-fbtft-fix-potential-memory-leak-in-fbtft-framebuffer-alloc.patch
- From: 5.15.0-163.173
- CVE-2025-38609
- Description:
PM / devfreq: Check governor before using governor->name
- CVE: https://ubuntu.com/security/CVE-2025-38609
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38609-pm-devfreq-check-governor-before-using-governor-name.patch
- From: 5.15.0-163.173
- CVE-2025-38608
- Description:
bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls
- CVE: https://ubuntu.com/security/CVE-2025-38608
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38608-bpf-ktls-fix-data-corruption-when-using-bpf-msg-pop-data-in-ktls.patch
- From: 5.15.0-163.173
- CVE-2025-38604
- Description:
wifi: rtl818x: Kill URBs before clearing tx status queue
- CVE: https://ubuntu.com/security/CVE-2025-38604
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38604-wifi-rtl818x-kill-urbs-before-clearing-tx-status-queue.patch
- From: 5.15.0-163.173
- CVE-2025-38602
- Description:
iwlwifi: Add missing check for alloc_ordered_workqueue
- CVE: https://ubuntu.com/security/CVE-2025-38602
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38602-iwlwifi-add-missing-check-for-alloc-ordered-workqueue.patch
- From: 5.15.0-163.173
- CVE-2025-38601
- Description:
wifi: ath11k: clear initialized flag for deinit-ed srng lists
- CVE: https://ubuntu.com/security/CVE-2025-38601
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38601-wifi-ath11k-clear-initialized-flag-for-deinit-ed-srng-lists.patch
- From: 5.15.0-163.173
- CVE-2025-38645
- Description:
net/mlx5: Check device memory pointer before usage
- CVE: https://ubuntu.com/security/CVE-2025-38645
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38645-net-mlx5-check-device-memory-pointer-before-usage.patch
- From: 5.15.0-163.173
- CVE-2025-38553
- Description:
net/sched: Restrict conditions for adding duplicating netems to qdisc tree
- CVE: https://ubuntu.com/security/CVE-2025-38553
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38553-net-sched-restrict-conditions-for-adding-duplicating-netems-to-qdisc-tree.patch
- From: 5.15.0-163.173
- CVE-2025-38639
- Description:
netfilter: xt_nfacct: don't assume acct name is null-terminated
- CVE: https://ubuntu.com/security/CVE-2025-38639
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38639-netfilter-xt-nfacct-don-t-assume-acct-name-is-null-terminated.patch
- From: 5.15.0-163.173
- CVE-2025-38583
- Description:
clk: xilinx: vcu: unregister pll_post only if registered correctly
- CVE: https://ubuntu.com/security/CVE-2025-38583
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38583-clk-xilinx-vcu-unregister-pll-post-only-if-registered-correctly.patch
- From: 5.15.0-163.173
- CVE-2025-38634
- Description:
power: supply: cpcap-charger: Fix null check for power_supply_get_by_name
- CVE: https://ubuntu.com/security/CVE-2025-38634
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38634-power-supply-cpcap-charger-fix-null-check-for-power-supply-get-by-name.patch
- From: 5.15.0-163.173
- CVE-2025-38581
- Description:
crypto: ccp - Fix crash when rebind ccp device for ccp.ko
- CVE: https://ubuntu.com/security/CVE-2025-38581
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38581-crypto-ccp-fix-crash-when-rebind-ccp-device-for-ccp-ko.patch
- From: 5.15.0-163.173
- CVE-2025-38581
- Description:
crypto: ccp - Fix crash when rebind ccp device for ccp.ko
- CVE: https://ubuntu.com/security/CVE-2025-38581
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38581-crypto-ccp-fix-crash-when-rebind-ccp-device-for-ccp-ko-kpatch.patch
- From: 5.15.0-163.173
- CVE-2025-38630
- Description:
fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref
- CVE: https://ubuntu.com/security/CVE-2025-38630
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38630-fbdev-imxfb-check-fb-add-videomode-to-prevent-null-ptr-deref.patch
- From: 5.15.0-163.173
- CVE-2025-38624
- Description:
Out of scope: powerpc: PowerNV PCI Hotplug: not supported
- CVE:
- Patch: skipped/CVE-2025-38624.patch
- From:
- CVE-2025-38623
- Description:
Out of scope: powerpc: PowerNV PCI Hotplug: not supported
- CVE:
- Patch: skipped/CVE-2025-38623.patch
- From:
- CVE-2025-39730
- Description:
NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
- CVE: https://ubuntu.com/security/CVE-2025-39730
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39730-nfs-fix-filehandle-bounds-checking-in-nfs-fh-to-dentry.patch
- From: 5.15.0-163.173
- CVE-2025-38574
- Description:
pptp: ensure minimal skb length in pptp_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-38574
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38574-pptp-ensure-minimal-skb-length-in-pptp-xmit.patch
- From: 5.15.0-163.173
- CVE-2025-38572
- Description:
ipv6: reject malicious packets in ipv6_gso_segment()
- CVE: https://ubuntu.com/security/CVE-2025-38572
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38572-ipv6-reject-malicious-packets-in-ipv6-gso-segment.patch
- From: 5.15.0-163.173
- CVE-2025-38555
- Description:
usb: gadget : fix use-after-free in composite_dev_cleanup()
- CVE: https://ubuntu.com/security/CVE-2025-38555
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38555-usb-gadget-fix-use-after-free-in-composite-dev-cleanup.patch
- From: 5.15.0-163.173
- CVE-2025-39757
- Description:
ALSA: usb-audio: Validate UAC3 cluster segment descriptors
- CVE: https://ubuntu.com/security/CVE-2025-39757
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39757-alsa-usb-audio-validate-uac3-cluster-segment-descriptors.patch
- From: 5.15.0-163.173
- CVE-2025-39757
- Description:
ALSA: usb-audio: Fix size validation in convert_chmap_v3()
- CVE: https://ubuntu.com/security/CVE-2025-39757
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39757-ALSA-usb-audio-Fix-size-validation-in-convert_chmap_v3.patch
- From: 5.15.0-163.173
- CVE-2025-38725
- Description:
net: usb: asix_devices: add phy_mask for ax88772 mdio bus
- CVE: https://ubuntu.com/security/CVE-2025-38725
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38725-net-usb-asix-devices-add-phy-mask-for-ax88772-mdio-bus.patch
- From: 5.15.0-163.173
- CVE-2025-38724
- Description:
nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
- CVE: https://ubuntu.com/security/CVE-2025-38724
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38724-nfsd-handle-get-client-locked-failure-in-nfsd4-setclientid-confirm.patch
- From: 5.15.0-163.173
- CVE-2025-39756
- Description:
fs: Prevent file descriptor table allocations exceeding INT_MAX
- CVE: https://ubuntu.com/security/CVE-2025-39756
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39756-fs-prevent-file-descriptor-table-allocations-exceeding-int-max.patch
- From: 5.15.0-163.173
- CVE-2025-38718
- Description:
sctp: linearize cloned gso packets in sctp_rcv
- CVE: https://ubuntu.com/security/CVE-2025-38718
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38718-sctp-linearize-cloned-gso-packets-in-sctp-rcv.patch
- From: 5.15.0-163.173
- CVE-2025-38715
- Description:
hfs: fix slab-out-of-bounds in hfs_bnode_read()
- CVE: https://ubuntu.com/security/CVE-2025-38715
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38715-hfs-fix-slab-out-of-bounds-in-hfs-bnode-read.patch
- From: 5.15.0-163.173
- CVE-2025-38714
- Description:
hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()
- CVE: https://ubuntu.com/security/CVE-2025-38714
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38714-hfsplus-fix-slab-out-of-bounds-in-hfsplus-bnode-read.patch
- From: 5.15.0-163.173
- CVE-2025-38713
- Description:
hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
- CVE: https://ubuntu.com/security/CVE-2025-38713
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38713-hfsplus-fix-slab-out-of-bounds-read-in-hfsplus-uni2asc.patch
- From: 5.15.0-163.173
- CVE-2025-38712
- Description:
hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()
- CVE: https://ubuntu.com/security/CVE-2025-38712
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38712-hfsplus-don-t-use-bug-on-in-hfsplus-create-attributes-file.patch
- From: 5.15.0-163.173
- CVE-2025-38706
- Description:
ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()
- CVE: https://ubuntu.com/security/CVE-2025-38706
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38706-asoc-core-check-for-rtd-null-in-snd-soc-remove-pcm-runtime.patch
- From: 5.15.0-163.173
- CVE-2025-38701
- Description:
ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr
- CVE: https://ubuntu.com/security/CVE-2025-38701
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38701-ext4-do-not-bug-when-inline-data-fl-lacks-system-data-xattr.patch
- From: 5.15.0-163.173
- CVE-2025-38700
- Description:
scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated
- CVE: https://ubuntu.com/security/CVE-2025-38700
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38700-scsi-libiscsi-initialize-iscsi-conn-dd-data-only-if-memory-is-allocated.patch
- From: 5.15.0-163.173
- CVE-2025-38699
- Description:
scsi: bfa: Double-free fix
- CVE: https://ubuntu.com/security/CVE-2025-38699
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38699-scsi-bfa-double-free-fix.patch
- From: 5.15.0-163.173
- CVE-2025-38699
- Description:
scsi: bfa: Double-free fix
- CVE: https://ubuntu.com/security/CVE-2025-38699
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38699-scsi-bfa-double-free-fix-kpatch.patch
- From: 5.15.0-163.173
- CVE-2025-39743
- Description:
jfs: truncate good inode pages when hard link is 0
- CVE: https://ubuntu.com/security/CVE-2025-39743
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39743-jfs-truncate-good-inode-pages-when-hard-link-is-0.patch
- From: 5.15.0-163.173
- CVE-2025-38698
- Description:
jfs: Regular file corruption check
- CVE: https://ubuntu.com/security/CVE-2025-38698
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38698-jfs-regular-file-corruption-check.patch
- From: 5.15.0-163.173
- CVE-2025-38697
- Description:
jfs: upper bound check of tree index in dbAllocAG
- CVE: https://ubuntu.com/security/CVE-2025-38697
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38697-jfs-upper-bound-check-of-tree-index-in-dballocag.patch
- From: 5.15.0-163.173
- CVE-2025-39742
- Description:
RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()
- CVE: https://ubuntu.com/security/CVE-2025-39742
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39742-rdma-hfi1-fix-possible-divide-by-zero-in-find-hw-thread-mask.patch
- From: 5.15.0-163.173
- CVE-2025-38695
- Description:
scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure
- CVE: https://ubuntu.com/security/CVE-2025-38695
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38695-scsi-lpfc-check-for-hdwq-null-ptr-when-cleaning-up-lpfc-vport-structure.patch
- From: 5.15.0-163.173
- CVE-2025-38694
- Description:
media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()
- CVE: https://ubuntu.com/security/CVE-2025-38694
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38694-media-dvb-frontends-dib7090p-fix-null-ptr-deref-in-dib7090p-rw-on-apb.patch
- From: 5.15.0-163.173
- CVE-2025-38693
- Description:
media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar
- CVE: https://ubuntu.com/security/CVE-2025-38693
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38693-media-dvb-frontends-w7090p-fix-null-ptr-deref-in-w7090p-tuner-write-serpar-and-w7090p-tuner-read-serpar.patch
- From: 5.15.0-163.173
- CVE-2025-39795
- Description:
block: avoid possible overflow for chunk_sectors check in blk_stack_limits()
- CVE: https://ubuntu.com/security/CVE-2025-39795
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39795-block-avoid-possible-overflow-for-chunk-sectors-check-in-blk-stack-limits.patch
- From: 5.15.0-163.173
- CVE-2025-38685
- Description:
fbdev: Fix vmalloc out-of-bounds write in fast_imageblit
- CVE: https://ubuntu.com/security/CVE-2025-38685
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38685-fbdev-fix-vmalloc-out-of-bounds-write-in-fast-imageblit.patch
- From: 5.15.0-163.173
- CVE-2025-38680
- Description:
media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()
- CVE: https://ubuntu.com/security/CVE-2025-38680
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38680-media-uvcvideo-fix-1-byte-out-of-bounds-read-in-uvc-parse-format.patch
- From: 5.15.0-163.173
- CVE-2025-39783
- Description:
PCI: endpoint: Fix configfs group list head handling
- CVE: https://ubuntu.com/security/CVE-2025-39783
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39783-pci-endpoint-fix-configfs-group-list-head-handling.patch
- From: 5.15.0-163.173
- CVE-2025-39782
- Description:
jbd2: prevent softlockup in jbd2_log_do_checkpoint()
- CVE: https://ubuntu.com/security/CVE-2025-39782
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39782-jbd2-prevent-softlockup-in-jbd2-log-do-checkpoint.patch
- From: 5.15.0-163.173
- CVE-2025-39714
- Description:
media: usbtv: Lock resolution while streaming
- CVE: https://ubuntu.com/security/CVE-2025-39714
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39714-media-usbtv-lock-resolution-while-streaming.patch
- From: 5.15.0-163.173
- CVE-2025-39713
- Description:
media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()
- CVE: https://ubuntu.com/security/CVE-2025-39713
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39713-media-rainshadow-cec-fix-toctou-race-condition-in-rain-interrupt.patch
- From: 5.15.0-163.173
- CVE-2025-39703
- Description:
net, hsr: reject HSR frame if skb can't hold tag
- CVE: https://ubuntu.com/security/CVE-2025-39703
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39703-net-hsr-reject-hsr-frame-if-skb-can-t-hold-tag.patch
- From: 5.15.0-163.173
- CVE-2025-39702
- Description:
ipv6: sr: Fix MAC comparison to be constant-time
- CVE: https://ubuntu.com/security/CVE-2025-39702
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39702-ipv6-sr-fix-mac-comparison-to-be-constant-time.patch
- From: 5.15.0-163.173
- CVE-2025-38664
- Description:
ice: Fix a null pointer dereference in ice_copy_and_init_pkg()
- CVE: https://ubuntu.com/security/CVE-2025-38664
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38664-ice-fix-a-null-pointer-dereference-in-ice-copy-and-init-pkg.patch
- From: 5.15.0-163.173
- CVE-2025-38488
- Description:
smb: client: fix use-after-free in crypt_message when using async crypto
- CVE: https://ubuntu.com/security/CVE-2025-38488
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38488-smb-client-fix-use-after-free-in-crypt-message-when-using-async-crypto.patch
- From: 5.15.0-163.173
- CVE-2025-39790
- Description:
bus: mhi: host: Detect events pointing to unexpected TREs
- CVE: https://ubuntu.com/security/CVE-2025-39790
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39790-bus-mhi-host-detect-events-pointing-to-unexpected-tres.patch
- From: 5.15.0-163.173
- CVE-2025-38684
- Description:
net/sched: ets: use old 'nbands' while purging unused classes
- CVE: https://ubuntu.com/security/CVE-2025-38684
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38684-net-sched-ets-use-old-nbands-while-purging-unused-classes.patch
- From: 5.15.0-163.173
- CVE-2022-50327
- Description:
ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value
- CVE: https://ubuntu.com/security/CVE-2022-50327
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2022-50327-acpi-processor-idle-check-acpi-fetch-acpi-dev-return-value.patch
- From: 5.15.0-163.173
- CVE-2022-50070
- Description:
mptcp: do not queue data on closed subflows
- CVE: https://ubuntu.com/security/CVE-2022-50070
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2022-50070-mptcp-do-not-queue-data-on-closed-subflows.patch
- From: 5.15.0-163.173
- CVE-2025-39693
- Description:
drm/amd/display: Avoid a NULL pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-39693
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39693-drm-amd-display-avoid-a-null-pointer-dereference.patch
- From: 5.15.0-163.173
- CVE-2025-39691
- Description:
fs/buffer: fix use-after-free when call bh_read() helper
- CVE: https://ubuntu.com/security/CVE-2025-39691
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39691-fs-buffer-fix-use-after-free-when-call-bh-read-helper.patch
- From: 5.15.0-163.173
- CVE-2025-39689
- Description:
ftrace: Also allocate and copy hash for reading of filter files
- CVE: https://ubuntu.com/security/CVE-2025-39689
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39689-ftrace-also-allocate-and-copy-hash-for-reading-of-filter-files.patch
- From: 5.15.0-163.173
- CVE-2025-38677
- Description:
f2fs: fix to avoid out-of-boundary access in dnode page
- CVE: https://ubuntu.com/security/CVE-2025-38677
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38677-f2fs-fix-to-avoid-out-of-boundary-access-in-dnode-page.patch
- From: 5.15.0-163.173
- CVE-2025-39787
- Description:
soc: qcom: mdt_loader: Ensure we don't read past the ELF header
- CVE: https://ubuntu.com/security/CVE-2025-39787
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39787-soc-qcom-mdt-loader-ensure-we-don-t-read-past-the-elf-header.patch
- From: 5.15.0-163.173
- CVE-2025-39788
- Description:
scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE
- CVE: https://ubuntu.com/security/CVE-2025-39788
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39788-scsi-ufs-exynos-fix-programming-of-hci-utrl-nexus-type.patch
- From: 5.15.0-163.173
- CVE-2025-39773
- Description:
net: bridge: fix soft lockup in br_multicast_query_expired()
- CVE: https://ubuntu.com/security/CVE-2025-39773
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39773-net-bridge-fix-soft-lockup-in-br_multicast_query_expired.patch
- From: 5.15.0-163.173
- CVE-2025-39773
- Description:
net: bridge: fix soft lockup in br_multicast_query_expired()
- CVE: https://ubuntu.com/security/CVE-2025-39773
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39773-net-bridge-fix-soft-lockup-in-br_multicast_query_expired-kpatch.patch
- From: 5.15.0-163.173
- CVE-2025-39676
- Description:
scsi: qla4xxx: Prevent a potential error pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-39676
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39676-scsi-qla4xxx-prevent-a-potential-error-pointer-dereference.patch
- From: 5.15.0-163.173
- CVE-2025-39675
- Description:
drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()
- CVE: https://ubuntu.com/security/CVE-2025-39675
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39675-drm-amd-display-add-null-pointer-check-in-mod-hdcp-hdcp1-create-session.patch
- From: 5.15.0-163.173
- CVE-2025-39673
- Description:
ppp: fix race conditions in ppp_fill_forward_path
- CVE: https://ubuntu.com/security/CVE-2025-39673
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39673-ppp-fix-race-conditions-in-ppp-fill-forward-path.patch
- From: 5.15.0-163.173
- CVE-2025-39766
- Description:
net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit
- CVE: https://ubuntu.com/security/CVE-2025-39766
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39766-net-sched-make-cake-enqueue-return-net-xmit-cn-when-past-buffer-limit.patch
- From: 5.15.0-163.173
- CVE-2025-38732
- Description:
netfilter: nf_reject: don't leak dst refcount for loopback packets
- CVE: https://ubuntu.com/security/CVE-2025-38732
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38732-netfilter-nf-reject-don-t-leak-dst-refcount-for-loopback-packets.patch
- From: 5.15.0-163.173
- CVE-2025-39817
- Description:
efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
- CVE: https://ubuntu.com/security/CVE-2025-39817
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39817-efivarfs-fix-slab-out-of-bounds-in-efivarfs-d-compare.patch
- From: 5.15.0-163.173
- CVE-2025-39823
- Description:
KVM: x86: use array_index_nospec with indices that come from guest
- CVE: https://ubuntu.com/security/CVE-2025-39823
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39823-kvm-x86-use-array-index-nospec-with-indices-that-come-from-guest.patch
- From: 5.15.0-163.173
- CVE-2025-39824
- Description:
HID: asus: fix UAF via HID_CLAIMED_INPUT validation
- CVE: https://ubuntu.com/security/CVE-2025-39824
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39824-hid-asus-fix-uaf-via-hid-claimed-input-validation.patch
- From: 5.15.0-163.173
- CVE-2025-39806
- Description:
HID: multitouch: fix slab out-of-bounds access in mt_report_fixup()
- CVE: https://ubuntu.com/security/CVE-2025-39806
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39806-hid-multitouch-fix-slab-out-of-bounds-access-in-mt-report-fixup.patch
- From: 5.15.0-163.173
- CVE-2025-39808
- Description:
Patch adds cross-module dependency: hid_ntrig -> usbhid (usb_hid_driver symbol). Cannot be resolved without userland modprobe modifications to ensure proper module loading order.
- CVE:
- Patch: skipped/CVE-2025-39808.patch
- From:
- CVE-2025-39866
- Description:
fs: writeback: fix use-after-free in __mark_inode_dirty()
- CVE: https://ubuntu.com/security/CVE-2025-39866
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39866-fs-writeback-fix-use-after-free-in-mark-inode-dirty.patch
- From: 5.15.0-163.173
- CVE-2025-39865
- Description:
tee: fix NULL pointer dereference in tee_shm_put
- CVE: https://ubuntu.com/security/CVE-2025-39865
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39865-tee-fix-null-pointer-dereference-in-tee-shm-put.patch
- From: 5.15.0-163.173
- CVE-2025-39864
- Description:
wifi: cfg80211: fix use-after-free in cmp_bss()
- CVE: https://ubuntu.com/security/CVE-2025-39864
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39864-wifi-cfg80211-fix-use-after-free-in-cmp-bss.patch
- From: 5.15.0-163.173
- CVE-2025-39894
- Description:
netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm
- CVE: https://ubuntu.com/security/CVE-2025-39894
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39894-netfilter-br-netfilter-do-not-check-confirmed-bit-in-br-nf-local-in-after-confirm.patch
- From: 5.15.0-163.173
- CVE-2025-39860
- Description:
Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()
- CVE: https://ubuntu.com/security/CVE-2025-39860
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39860-bluetooth-fix-use-after-free-in-l2cap-sock-cleanup-listen.patch
- From: 5.15.0-163.173
- CVE-2025-39853
- Description:
i40e: Fix potential invalid access when MAC list is empty
- CVE: https://ubuntu.com/security/CVE-2025-39853
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39853-i40e-fix-potential-invalid-access-when-mac-list-is-empty.patch
- From: 5.15.0-163.173
- CVE-2025-39847
- Description:
ppp: fix memory leak in pad_compress_skb
- CVE: https://ubuntu.com/security/CVE-2025-39847
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39847-ppp-fix-memory-leak-in-pad-compress-skb.patch
- From: 5.15.0-163.173
- CVE-2025-39844
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2025-39844.patch
- From:
- CVE-2023-52935
- Description:
mm/khugepaged: fix ->anon_vma race
- CVE: https://ubuntu.com/security/CVE-2023-52935
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2023-52935-mm-khugepaged-fix-anon-vma-race.patch
- From: 5.15.0-163.173
- CVE-2025-37968
- Description:
iio: light: opt3001: fix deadlock due to concurrent flag access
- CVE: https://ubuntu.com/security/CVE-2025-37968
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-37968-iio-light-opt3001-fix-deadlock-due-to-concurrent-flag-access.patch
- From: 5.15.0-163.173
- CVE-2025-38095
- Description:
dma-buf: insert memory barrier before updating num_fences
- CVE: https://ubuntu.com/security/CVE-2025-38095
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38095-dma-buf-insert-memory-barrier-before-updating-num-fences.patch
- From: 5.15.0-163.173
- CVE-2025-39902
- Description:
mm/slub: avoid accessing metadata when pointer is invalid in object_err()
- CVE: https://ubuntu.com/security/CVE-2025-39902
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39902-mm-slub-avoid-accessing-metadata-when-pointer-is-invalid-in-object-err.patch
- From: 5.15.0-163.173
- CVE-2022-49390
- Description:
macsec: fix UAF bug for real_dev
- CVE: https://ubuntu.com/security/CVE-2022-49390
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2022-49390-macsec-fix-uaf-bug-for-real-dev.patch
- From: 5.15.0-164.174
- CVE-2022-49390
- Description:
macsec: fix UAF bug for real_dev
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49390.html
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2022-49390-macsec-fix-uaf-bug-for-real-dev-kpatch.patch
- From: 5.15.0-164.174
- CVE-2025-39964
- Description:
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-39964
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-39964-crypto-af-alg-disallow-concurrent-writes-in-af-alg-sendmsg.patch
- From: 5.15.0-164.174
- CVE-2025-39964
- Description:
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-39964
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-39964-crypto-af-alg-disallow-concurrent-writes-in-af-alg-sendmsg-kpatch.patch
- From: 5.15.0-164.174
- CVE-2024-53090
- Description:
afs: Fix lock recursion
- CVE: https://ubuntu.com/security/CVE-2024-53090
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-53090-afs-fix-lock-recursion-kpatch.patch
- From: 5.15.0-164.174
- CVE-2024-50067
- Description:
uprobe: avoid out-of-bounds memory access of fetching args
- CVE: https://ubuntu.com/security/CVE-2024-50067
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-50067-uprobe-avoid-out-of-bounds-memory-access-of-fetching-args.patch
- From: 5.15.0-164.174
- CVE-2025-21855
- Description:
ibmvnic: Don't reference skb after sending to VIOS
- CVE: https://ubuntu.com/security/CVE-2025-21855
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-21855-ibmvnic-don-t-reference-skb-after-sending-to-vios.patch
- From: 5.15.0-164.174
- CVE-2025-40018
- Description:
ipvs: Defer ip_vs_ftp unregister during netns cleanup
- CVE: https://ubuntu.com/security/CVE-2025-40018
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-40018-ipvs-defer-ip-vs-ftp-unregister-during-netns-cleanup.patch
- From: 5.15.0-164.174
- CVE-2025-39993
- Description:
media: rc: fix races with imon_disconnect()
- CVE: https://ubuntu.com/security/CVE-2025-39993
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-39993-media-rc-fix-races-with-imon-disconnect.patch
- From: 5.15.0-164.174
- CVE-2024-47691
- Description:
f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()
- CVE: https://ubuntu.com/security/CVE-2024-47691
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-47691-f2fs-fix-to-avoid-use-after-free-in-f2fs-stop-gc-thread.patch
- From: 5.15.0-164.174
- CVE-2024-53218
- Description:
f2fs: fix race in concurrent f2fs_stop_gc_thread
- CVE: https://ubuntu.com/security/CVE-2024-53218
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-53218-f2fs-fix-race-in-concurrent-f2fs-stop-gc-thread.patch
- From: 5.15.0-164.174
- CVE-2025-38561
- Description:
ksmbd: fix Preauh_HashValue race condition
- CVE: https://ubuntu.com/security/CVE-2025-38561
- Patch: ubuntu-jammy/5.15.0-168.178/CVE-2025-38561-ksmbd-fix-preauh-hashvalue-race-condition.patch
- From: 5.15.0-168.178
- CVE-2025-40019
- Description:
crypto: essiv - Check ssize for decryption and in-place encryption
- CVE: https://ubuntu.com/security/CVE-2025-40019
- Patch: ubuntu-jammy/5.15.0-168.178/CVE-2025-40019-crypto-essiv-check-ssize-for-decryption-and-in-place-encryption.patch
- From: 5.15.0-168.178
- CVE-2025-38584
- Description:
padata: Fix pd UAF once and for all
- CVE: https://ubuntu.com/security/CVE-2025-38584
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-38584-padata-fix-pd-uaf-once-and-for-all-139.149.patch
- From: 5.15.0-170.180
- CVE-2025-38584
- Description:
padata: Fix pd UAF once and for all
- CVE: https://ubuntu.com/security/CVE-2025-38584
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-38584-padata-fix-pd-uaf-once-and-for-all-kpatch.patch
- From: 5.15.0-170.180
- CVE-2024-56538
- Description:
Vulnerability affects only ZynqMP SoCs.
- CVE:
- Patch: skipped/CVE-2024-56538.patch
- From:
- CVE-2025-39913
- Description:
tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.
- CVE: https://ubuntu.com/security/CVE-2025-39913
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39913-tcp-bpf-call-sk-msg-free-when-tcp-bpf-send-verdict-fails-to-allocate-psock-cork.patch
- From: 5.15.0-170.180
- CVE-2025-39880
- Description:
libceph: fix invalid accesses to ceph_connection_v1_info
- CVE: https://ubuntu.com/security/CVE-2025-39880
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39880-libceph-fix-invalid-accesses-to-ceph-connection-v1-info.patch
- From: 5.15.0-170.180
- CVE-2025-39876
- Description:
net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable()
- CVE: https://ubuntu.com/security/CVE-2025-39876
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39876-net-fec-fix-possible-npd-in-fec-enet-phy-reset-after-clk-enable.patch
- From: 5.15.0-170.180
- CVE-2025-39911
- Description:
i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
- CVE: https://ubuntu.com/security/CVE-2025-39911
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39911-i40e-fix-irq-freeing-in-i40e-vsi-request-irq-msix-error-path-5.15.0-168.178.patch
- From: 5.15.0-170.180
- CVE-2025-39873
- Description:
can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB
- CVE: https://ubuntu.com/security/CVE-2025-39873
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39873-can-xilinx-can-xcan-write-frame-fix-use-after-free-of-transmitted-skb.patch
- From: 5.15.0-170.180
- CVE-2025-39869
- Description:
dmaengine: ti: edma: Fix memory allocation size for queue_priority_map
- CVE: https://ubuntu.com/security/CVE-2025-39869
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39869-dmaengine-ti-edma-fix-memory-allocation-size-for-queue-priority-map.patch
- From: 5.15.0-170.180
- CVE-2025-39923
- Description:
dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees
- CVE: https://ubuntu.com/security/CVE-2025-39923
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39923-dmaengine-qcom-bam-dma-fix-dt-error-handling-for-num-channels-ees.patch
- From: 5.15.0-170.180
- CVE-2025-39883
- Description:
mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory
- CVE: https://ubuntu.com/security/CVE-2025-39883
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39883-mm-memory-failure-fix-vm-bug-on-page-pagepoisoned-page-when-unpoison-memory.patch
- From: 5.15.0-170.180
- CVE-2025-39949
- Description:
qed: Don't collect too many protection override GRC elements
- CVE: https://ubuntu.com/security/CVE-2025-39949
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39949-qed-don-t-collect-too-many-protection-override-grc-elements.patch
- From: 5.15.0-170.180
- CVE-2025-39955
- Description:
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
- CVE: https://ubuntu.com/security/CVE-2025-39955
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39955-tcp-clear-tcp-sk-sk-fastopen-rsk-in-tcp-disconnect.patch
- From: 5.15.0-170.180
- CVE-2025-39945
- Description:
cnic: Fix use-after-free bugs in cnic_delete_task
- CVE: https://ubuntu.com/security/CVE-2025-39945
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39945-cnic-fix-use-after-free-bugs-in-cnic-delete-task.patch
- From: 5.15.0-170.180
- CVE-2025-39934
- Description:
drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ
- CVE: https://ubuntu.com/security/CVE-2025-39934
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39934-drm-bridge-anx7625-fix-null-pointer-dereference-with-early-irq.patch
- From: 5.15.0-170.180
- CVE-2025-39943
- Description:
ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer
- CVE: https://ubuntu.com/security/CVE-2025-39943
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39943-ksmbd-smbdirect-validate-data-offset-and-data-length-field-of-smb-direct-data-transfer-5.15.0-161.171.patch
- From: 5.15.0-170.180
- CVE-2025-40020
- Description:
can: peak_usb: fix shift-out-of-bounds issue
- CVE: https://ubuntu.com/security/CVE-2025-40020
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40020-can-peak-usb-fix-shift-out-of-bounds-issue.patch
- From: 5.15.0-170.180
- CVE-2025-39980
- Description:
nexthop: Forbid FDB status change while nexthop is in a group
- CVE: https://ubuntu.com/security/CVE-2025-39980
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39980-nexthop-forbid-fdb-status-change-while-nexthop-is-in-a-group.patch
- From: 5.15.0-170.180
- CVE-2025-40011
- Description:
drm/gma500: Fix null dereference in hdmi teardown
- CVE: https://ubuntu.com/security/CVE-2025-40011
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40011-drm-gma500-fix-null-dereference-in-hdmi-teardown.patch
- From: 5.15.0-170.180
- CVE-2025-40021
- Description:
tracing: dynevent: Add a missing lockdown check on dynevent
- CVE: https://ubuntu.com/security/CVE-2025-40021
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40021-tracing-dynevent-add-a-missing-lockdown-check-on-dynevent.patch
- From: 5.15.0-170.180
- CVE-2025-39967
- Description:
fbcon: fix integer overflow in fbcon_do_set_font
- CVE: https://ubuntu.com/security/CVE-2025-39967
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39967-fbcon-fix-integer-overflow-in-fbcon-do-set-font.patch
- From: 5.15.0-170.180
- CVE-2025-39967
- Description:
fbcon: Fix OOB access in font allocation
- CVE: https://ubuntu.com/security/CVE-2025-39967
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39967-fbcon-fix-OOB-access-in-font-allocation.patch
- From: 5.15.0-170.180
- CVE-2025-38236
- Description:
Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem..
- CVE:
- Patch: skipped/CVE-2025-38236.patch
- From:
- CVE-2025-21861
- Description:
mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize()
- CVE: https://ubuntu.com/security/CVE-2025-21861
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-21861-mm-migrate-device-don-t-add-folio-to-be-freed-to-lru-in-migrate-device-finalize.patch
- From: 5.15.0-170.180
- CVE-2025-39998
- Description:
scsi: target: target_core_configfs: Add length check to avoid buffer overflow
- CVE: https://ubuntu.com/security/CVE-2025-39998
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39998-scsi-target-target-core-configfs-add-length-check-to-avoid-buffer-overflow.patch
- From: 5.15.0-170.180
- CVE-2025-39996
- Description:
media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove
- CVE: https://ubuntu.com/security/CVE-2025-39996
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39996-media-b2c2-fix-use-after-free-causing-by-irq-check-work-in-flexcop-pci-remove.patch
- From: 5.15.0-170.180
- CVE-2025-22058
- Description:
udp: Fix memory accounting leak.
- CVE: https://ubuntu.com/security/CVE-2025-22058
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-22058-udp-fix-memory-accounting-leak.patch
- From: 5.15.0-170.180
- CVE-2025-39994
- Description:
media: tuner: xc5000: Fix use-after-free in xc5000_release
- CVE: https://ubuntu.com/security/CVE-2025-39994
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39994-media-tuner-xc5000-fix-use-after-free-in-xc5000-release-5.15.0-168.178.patch
- From: 5.15.0-170.180
- CVE-2025-39995
- Description:
media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe
- CVE: https://ubuntu.com/security/CVE-2025-39995
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39995-media-i2c-tc358743-fix-use-after-free-bugs-caused-by-orphan-timer-in-probe-5.15.0-134.145.patch
- From: 5.15.0-170.180
- CVE-2025-40081
- Description:
perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
- CVE: https://ubuntu.com/security/CVE-2025-40081
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40081-perf-arm-spe-prevent-overflow-in-perf-idx2off.patch
- From: 5.15.0-170.180
- CVE-2025-40125
- Description:
blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx
- CVE: https://ubuntu.com/security/CVE-2025-40125
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40125-blk-mq-check-kobject-state-in-sysfs-before-deleting-in-blk-mq-unregister-hctx.patch
- From: 5.15.0-170.180
- CVE-2025-40078
- Description:
bpf: Explicitly check accesses to bpf_sock_addr
- CVE: https://ubuntu.com/security/CVE-2025-40078
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40078-bpf-explicitly-check-accesses-to-bpf-sock-addr.patch
- From: 5.15.0-170.180
- CVE-2025-40116
- Description:
usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup
- CVE: https://ubuntu.com/security/CVE-2025-40116
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40116-usb-host-max3421-hcd-fix-error-pointer-dereference-in-probe-cleanup.patch
- From: 5.15.0-170.180
- CVE-2025-40070
- Description:
pps: fix warning in pps_register_cdev when register device fail
- CVE: https://ubuntu.com/security/CVE-2025-40070
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40070-pps-fix-warning-in-pps-register-cdev-when-register-device-fail-5.15.0-139.149.patch
- From: 5.15.0-170.180
- CVE-2025-40154
- Description:
ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
- CVE: https://ubuntu.com/security/CVE-2025-40154
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40154-asoc-intel-bytcr-rt5640-fix-invalid-quirk-input-mapping.patch
- From: 5.15.0-170.180
- CVE-2025-40121
- Description:
ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping
- CVE: https://ubuntu.com/security/CVE-2025-40121
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40121-asoc-intel-bytcr-rt5651-fix-invalid-quirk-input-mapping.patch
- From: 5.15.0-170.180
- CVE-2025-40140
- Description:
net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast
- CVE: https://ubuntu.com/security/CVE-2025-40140
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40140-net-usb-remove-disruptive-netif-wake-queue-in-rtl8150-set-multicast.patch
- From: 5.15.0-170.180
- CVE-2025-40053
- Description:
net: dlink: handle copy_thresh allocation failure
- CVE: https://ubuntu.com/security/CVE-2025-40053
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40053-net-dlink-handle-copy-thresh-allocation-failure.patch
- From: 5.15.0-170.180
- CVE-2025-40048
- Description:
uio_hv_generic: Let userspace take care of interrupt mask
- CVE: https://ubuntu.com/security/CVE-2025-40048
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40048-uio-hv-generic-let-userspace-take-care-of-interrupt-mask.patch
- From: 5.15.0-170.180
- CVE-2025-40044
- Description:
fs: udf: fix OOB read in lengthAllocDescs handling
- CVE: https://ubuntu.com/security/CVE-2025-40044
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40044-fs-udf-fix-oob-read-in-lengthallocdescs-handling.patch
- From: 5.15.0-170.180
- CVE-2025-40153
- Description:
mm: hugetlb: avoid soft lockup when mprotect to large memory area
- CVE: https://ubuntu.com/security/CVE-2025-40153
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40153-mm-hugetlb-avoid-soft-lockup-when-mprotect-to-large-memory-area.patch
- From: 5.15.0-170.180
- CVE-2025-40030
- Description:
pinctrl: check the return value of pinmux_ops::get_function_name()
- CVE: https://ubuntu.com/security/CVE-2025-40030
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40030-pinctrl-check-the-return-value-of-pinmux-ops-get-function-name.patch
- From: 5.15.0-170.180
- CVE-2025-40029
- Description:
bus: fsl-mc: Check return value of platform_get_resource()
- CVE: https://ubuntu.com/security/CVE-2025-40029
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40029-bus-fsl-mc-check-return-value-of-platform-get-resource.patch
- From: 5.15.0-170.180
- CVE-2025-40111
- Description:
drm/vmwgfx: Fix Use-after-free in validation
- CVE: https://ubuntu.com/security/CVE-2025-40111
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40111-drm-vmwgfx-fix-use-after-free-in-validation.patch
- From: 5.15.0-170.180
- CVE-2025-40187
- Description:
net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()
- CVE: https://ubuntu.com/security/CVE-2025-40187
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40187-net-sctp-fix-a-null-dereference-in-sctp-disposition-sctp-sf-do-5-1d-ce.patch
- From: 5.15.0-170.180
- CVE-2025-40183
- Description:
bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}
- CVE: https://ubuntu.com/security/CVE-2025-40183
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40183-bpf-fix-metadata-dst-leak-bpf-redirect-neigh-v-46.patch
- From: 5.15.0-170.180
- CVE-2025-40194
- Description:
cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
- CVE: https://ubuntu.com/security/CVE-2025-40194
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40194-cpufreq-intel-pstate-fix-object-lifecycle-issue-in-update-qos-request.patch
- From: 5.15.0-170.180
- CVE-2025-40204
- Description:
sctp: Fix MAC comparison to be constant-time
- CVE: https://ubuntu.com/security/CVE-2025-40204
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40204-sctp-fix-mac-comparison-to-be-constant-time.patch
- From: 5.15.0-170.180
- CVE-2025-40179
- Description:
ext4: verify orphan file size is not too big
- CVE: https://ubuntu.com/security/CVE-2025-40179
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40179-ext4-verify-orphan-file-size-is-not-too-big-161.patch
- From: 5.15.0-170.180
- CVE-2025-40179
- Description:
ext4: verify orphan file size is not too big
- CVE: https://ubuntu.com/security/CVE-2025-40179
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40179-ext4-verify-orphan-file-size-is-not-too-big-kpatch.patch
- From: 5.15.0-170.180
- CVE-2025-40179
- Description:
ext4: align max orphan file size with e2fsprogs limit
- CVE: https://ubuntu.com/security/CVE-2025-40179
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40179-ext4-align-max-orphan-file-size-with-e2fsprogs-limit.patch
- From: 5.15.0-170.180
- CVE-2025-40026
- Description:
KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O
- CVE: https://ubuntu.com/security/CVE-2025-40026
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40026-kvm-x86-don-t-re-check-l1-intercepts-when-completing-userspace-i-o.patch
- From: 5.15.0-170.180
- CVE-2025-40134
- Description:
dm: fix NULL pointer dereference in __dm_suspend()
- CVE: https://ubuntu.com/security/CVE-2025-40134
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40134-dm-fix-null-pointer-dereference-in-dm-suspend.patch
- From: 5.15.0-170.180
- CVE-2025-40178
- Description:
pid: Add a judgment for ns null in pid_nr_ns
- CVE: https://ubuntu.com/security/CVE-2025-40178
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40178-pid-add-a-judgment-for-ns-null-in-pid-nr-ns.patch
- From: 5.15.0-170.180
- CVE-2025-40167
- Description:
ext4: detect invalid INLINE_DATA + EXTENTS flag combination
- CVE: https://ubuntu.com/security/CVE-2025-40167
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40167-ext4-detect-invalid-inline-data-extents-flag-combination.patch
- From: 5.15.0-170.180
- CVE-2025-40173
- Description:
net/ip6_tunnel: Prevent perpetual tunnel growth
- CVE: https://ubuntu.com/security/CVE-2025-40173
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40173-net-ip6-tunnel-prevent-perpetual-tunnel-growth.patch
- From: 5.15.0-170.180
- CVE-2025-40085
- Description:
ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
- CVE: https://ubuntu.com/security/CVE-2025-40085
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40085-alsa-usb-audio-fix-null-pointer-deference-in-try-to-register-card.patch
- From: 5.15.0-170.180
- CVE-2025-40088
- Description:
hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()
- CVE: https://ubuntu.com/security/CVE-2025-40088
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40088-hfsplus-fix-slab-out-of-bounds-read-in-hfsplus-strcasecmp.patch
- From: 5.15.0-170.180
- CVE-2025-40244
- Description:
hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()
- CVE: https://ubuntu.com/security/CVE-2025-40244
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40244-hfsplus-fix-kmsan-uninit-value-issue-in-hfsplus-ext-cache-extent.patch
- From: 5.15.0-170.180
- CVE-2025-40349
- Description:
hfs: validate record offset in hfsplus_bmap_alloc
- CVE: https://ubuntu.com/security/CVE-2025-40349
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40349-hfs-validate-record-offset-in-hfsplus-bmap-alloc.patch
- From: 5.15.0-170.180
- CVE-2025-40351
- Description:
hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()
- CVE: https://ubuntu.com/security/CVE-2025-40351
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40351-hfsplus-fix-kmsan-uninit-value-issue-in-hfsplus-delete-cat.patch
- From: 5.15.0-170.180
- CVE-2025-40243
- Description:
hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()
- CVE: https://ubuntu.com/security/CVE-2025-40243
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40243-hfs-fix-kmsan-uninit-value-issue-in-hfs-find-set-zero-bits.patch
- From: 5.15.0-170.180
- CVE-2025-40240
- Description:
sctp: avoid NULL dereference when chunk data buffer is missing
- CVE: https://ubuntu.com/security/CVE-2025-40240
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40240-sctp-avoid-null-dereference-when-chunk-data-buffer-is-missing.patch
- From: 5.15.0-170.180
- CVE-2025-40233
- Description:
ocfs2: clear extent cache after moving/defragmenting extents
- CVE: https://ubuntu.com/security/CVE-2025-40233
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40233-ocfs2-clear-extent-cache-after-moving-defragmenting-extents.patch
- From: 5.15.0-170.180
- CVE-2025-40231
- Description:
vsock: fix lock inversion in vsock_assign_transport()
- CVE: https://ubuntu.com/security/CVE-2025-40231
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40231-vsock-fix-lock-inversion-in-vsock-assign-transport-134.patch
- From: 5.15.0-170.180
- CVE-2025-40106
- Description:
comedi: fix divide-by-zero in comedi_buf_munge()
- CVE: https://ubuntu.com/security/CVE-2025-40106
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40106-comedi-fix-divide-by-zero-in-comedi-buf-munge.patch
- From: 5.15.0-170.180
- CVE-2025-40223
- Description:
most: usb: Fix use-after-free in hdm_disconnect
- CVE: https://ubuntu.com/security/CVE-2025-40223
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40223-most-usb-fix-use-after-free-in-hdm-disconnect.patch
- From: 5.15.0-170.180
- CVE-2025-68249
- Description:
most: usb: hdm_probe: Fix calling put_device() before device initialization
- CVE: https://ubuntu.com/security/CVE-2025-68249
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-68249-most-usb-hdm-probe-fix-calling-put-device-before-device-initialization.patch
- From: 5.15.0-170.180
- CVE-2025-68249
- Description:
most: usb: fix double free on late probe failure
- CVE: https://ubuntu.com/security/CVE-2025-68249
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-68249-most-usb-fix-double-free-on-late-probe-failure.patch
- From: 5.15.0-170.180
- CVE-2025-40220
- Description:
fuse: fix livelock in synchronous file put from fuseblk workers
- CVE: https://ubuntu.com/security/CVE-2025-40220
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40220-fuse-fix-livelock-in-synchronous-file-put-from-fuseblk-workers-5.15.0-168.178.patch
- From: 5.15.0-170.180
- CVE-2025-40105
- Description:
vfs: Don't leak disconnected dentries on umount
- CVE: https://ubuntu.com/security/CVE-2025-40105
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40105-vfs-don-t-leak-disconnected-dentries-on-umount.patch
- From: 5.15.0-170.180
- CVE-2025-40092
- Description:
usb: gadget: f_ncm: Refactor bind path to use __free()
- CVE: https://ubuntu.com/security/CVE-2025-40092
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40092-usb-gadget-f-ncm-refactor-bind-path-to-use-free.patch
- From: 5.15.0-170.180
- CVE-2025-40094
- Description:
usb: gadget: f_acm: Refactor bind path to use __free()
- CVE: https://ubuntu.com/security/CVE-2025-40094
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40094-usb-gadget-f-acm-refactor-bind-path-to-use-free.patch
- From: 5.15.0-170.180
- CVE-2025-40092 CVE-2025-40094
- Description:
usb: gadget: f_acm: Refactor bind path to use __free()
- CVE: https://ubuntu.com/security/CVE-2025-40094
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40094-CVE-2025-40092-kpatch.patch
- From: 5.15.0-170.180
- CVE-2025-21780
- Description:
drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
- CVE: https://ubuntu.com/security/CVE-2025-21780
- Patch: ubuntu-jammy/5.15.0-171.181/CVE-2025-21780-drm-amdgpu-avoid-buffer-overflow-attach-in-smu-sys-set-pp-table.patch
- From: 5.15.0-171.181
- CVE-2022-49267
- Description:
mmc: core: use sysfs_emit() instead of sprintf()
- CVE: https://ubuntu.com/security/CVE-2022-49267
- Patch: ubuntu-jammy/5.15.0-171.181/CVE-2022-49267-mmc-core-use-sysfs-emit-instead-of-sprintf.patch
- From: 5.15.0-171.181