- kernel-5.4.0-1041.43~18.04.1 (ubuntu-bionic-lts-focal-azure)
- 5.4.0-1131.138~18.04.1
- 2024-07-03 11:04:40
- 2024-07-11 08:57:08
- K20240703_08
- CVE-2021-27365, CVSSv2 Score: 7.8
- Description:
sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-27365
- Patch: 5.4.0/CVE-2021-27365-sysfs-Add-sysfs_emit-and-sysfs_emit_at-to-format-sysfs-output.patch
- From: >kernel-5.4.0-66.74
- CVE-2021-27363 CVE-2021-27364, CVSSv2 Score: 7.1
- Description:
scsi: iscsi: Restrict sessions and handles to admin capabilities
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-27363
- Patch: 5.4.0/CVE-2021-27363-CVE-2021-27364-scsi-iscsi-Restrict-sessions-and-handles-to-admin-capabilities.patch
- From: >kernel-5.4.0-66.74
- CVE-2021-27365, CVSSv2 Score: 7.8
- Description:
scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-27365
- Patch: 5.4.0/CVE-2021-27365-scsi-iscsi-Ensure-sysfs-attributes-are-limited-to-PAGE_SIZE.patch
- From: >kernel-5.4.0-66.74
- CVE-2021-27365, CVSSv2 Score: 7.8
- Description:
scsi: iscsi: Verify lengths on passthrough PDUs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-27365
- Patch: 5.4.0/CVE-2021-27365-scsi-iscsi-Verify-lengths-on-passthrough-PDUs.patch
- From: >kernel-5.4.0-66.74
- CVE-2020-27170, CVSSv2 Score: 5.5
- Description:
bpf: Prohibit alu ops for pointer types not defining ptr_limit
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-27170
- Patch: 5.4.0/CVE-2020-27170-bpf-Prohibit-alu-ops-for-pointer-types-not-defining-ptr_limit.patch
- From: >kernel-5.4.0-67.75
- CVE-2020-27171, CVSSv2 Score: 5.5
- Description:
bpf: Fix off-by-one for area size in creating mask to left
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-27171
- Patch: 5.4.0/CVE-2020-27171-bpf-Fix-off-by-one-for-area-size-in-creating-mask-to-left.patch
- From: >kernel-5.4.0-67.75
- CVE-2020-27171 CVE-2020-27170, CVSSv2 Score: 5.5
- Description:
bpf: Simplify alu_limit masking for pointer arithmetic
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-27171
- Patch: 5.4.0/CVE-2020-27170-CVE-2020-27171-bpf-Simplify-alu_limit-masking-for-pointer-arithmetic.patch
- From: >kernel-5.4.0-67.75
- CVE-2020-27171 CVE-2020-27170, CVSSv2 Score: 5.5
- Description:
bpf: Simplify alu_limit masking for pointer arithmetic
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-27171
- Patch: 5.4.0/CVE-2020-27170-CVE-2020-27171-bpf-Add-sanity-check-for-upper-ptr_limit.patch
- From: >kernel-5.4.0-67.75
- CVE-2021-3444, CVSSv2 Score: 7.8
- Description:
bpf: Fix 32 bit src register truncation on div/mod
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3444
- Patch: 5.4.0/CVE-2021-3444-bpf-Fix-32-bit-src-register-truncation-on-div-mod.patch
- From: >kernel-5.4.0-67.75
- CVE-2021-3444, CVSSv2 Score: 7.8
- Description:
bpf: Fix truncation handling for mod32 dst reg wrt zero
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3444
- Patch: 5.4.0/CVE-2021-3444-bpf-Fix-truncation-handling-for-mod32-dst-reg-wrt-zero.patch
- From: >kernel-5.4.0-67.75
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-blkback: don't "handle" error by BUG()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-26931
- Patch: ubuntu-focal/5.4.0-71.79/CVE-2021-26931-xsa362-linux-1.patch
- From: 5.4.0-71.79
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-netback: don't "handle" error by BUG()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-26931
- Patch: ubuntu-focal/5.4.0-71.79/CVE-2021-26931-xsa362-linux-2.patch
- From: 5.4.0-71.79
- CVE-2021-26931, CVSSv2 Score: 5.5
- Description:
xen-scsiback: don't "handle" error by BUG()
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-26931
- Patch: ubuntu-focal/5.4.0-71.79/CVE-2021-26931-xsa362-linux-3.patch
- From: 5.4.0-71.79
- CVE-2021-26930, CVSSv2 Score: 7.8
- Description:
xen-blkback: fix error handling in xen_blkbk_map()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-26930
- Patch: ubuntu-focal/5.4.0-71.79/CVE-2021-26930-xsa365-linux.patch
- From: 5.4.0-71.79
- CVE-2021-20194, CVSSv2 Score: 7.8
- Description:
bpf, cgroup: Fix optlen WARN_ON_ONCE toctou
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-20194
- Patch: ubuntu-focal/5.4.0-71.79/CVE-2021-20194-bpf-cgroup-Fix-optlen-WARN_ON_ONCE-toctou.patch
- From: 5.4.0-71.79
- CVE-2021-20194, CVSSv2 Score: 7.8
- Description:
bpf, cgroup: Fix problematic bounds check
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-20194
- Patch: ubuntu-focal/5.4.0-71.79/CVE-2021-20194-bpf-cgroup-Fix-problematic-bounds-check.patch
- From: 5.4.0-71.79
- CVE-2021-3348, CVSSv2 Score: 7.0
- Description:
nbd: freeze the queue while we're adding connections
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3348
- Patch: ubuntu-focal/5.4.0-71.79/CVE-2021-3348-nbd-freeze-the-queue-while-we-re-adding-connections.patch
- From: 5.4.0-71.79
- CVE-2021-29154, CVSSv2 Score: 7.8
- Description:
bpf, x86: Validate computation of branch displacements for x86-64
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29154
- Patch: 5.4.0/CVE-2021-29154-bpf-x86-Validate-computation-of-branch-displacements-for-x86-64.patch
- From: >kernel-5.4.0-70.78
- CVE-2021-3492, CVSSv2 Score: 8.8
- Description:
UBUNTU: SAUCE: shiftfs: free allocated memory in shiftfs_btrfs_ioctl_fd_replace() error paths
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3492
- Patch: 5.4.0/CVE-2021-3492-UBUNTU-SAUCE-shiftfs-free-allocated-memory-in-shiftfs_btrfs_ioctl_fd_replace-error-paths.patch
- From: kernel-5.4.0-71.79
- CVE-2021-3492, CVSSv2 Score: 8.8
- Description:
UBUNTU: SAUCE: shiftfs: handle copy_to_user() return values correctly
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3492
- Patch: 5.4.0/CVE-2021-3492-UBUNTU-SAUCE-shiftfs-handle-copy_to_user-return-values-correctly.patch
- From: kernel-5.4.0-71.79
- CVE-2021-3493, CVSSv2 Score: 8.8
- Description:
vfs: move cap_convert_nscap() call into vfs_setxattr()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-3493
- Patch: 5.4.0/CVE-2021-3493-vfs-move-cap_convert_nscap-call-into-vfs_setxattr.patch
- From: kernel-5.4.0-71.79
- CVE-2021-30002, CVSSv2 Score: 6.2
- Description:
media: v4l: ioctl: Fix memory leak in video_usercopy
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-30002
- Patch: ubuntu-focal/5.4.0-73.82/0001-CVE-2021-30002-media-v4l-ioctl-Fix-memory-leak-in-video_usercopy.patch
- From: 5.4.0-73.82
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
Revert "netfilter: x_tables: Switch synchronization to RCU"
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29650
- Patch: ubuntu-focal/5.4.0-73.82/CVE-2021-29650-Revert-netfilter-x_tables-Switch-synchronization-to-RCU.patch
- From: 5.4.0-73.82
- CVE-2021-29650, CVSSv2 Score: 5.5
- Description:
netfilter: x_tables: Use correct memory barriers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29650
- Patch: ubuntu-focal/5.4.0-73.82/CVE-2021-29650-netfilter-x_tables-Use-correct-memory-barriers.patch
- From: 5.4.0-73.82
- CVE-2021-29265, CVSSv2 Score: 4.7
- Description:
usbip: fix stub_dev to check for stream socket
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29265
- Patch: ubuntu-focal/5.4.0-73.82/0003-CVE-2021-29265-usbip-fix-stub_dev-to-check-for-stream-socket.patch
- From: 5.4.0-73.82
- CVE-2021-29265, CVSSv2 Score: 4.7
- Description:
usbip: fix stub_dev usbip_sockfd_store() races leading to gpf
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29265
- Patch: ubuntu-focal/5.4.0-73.82/0004-CVE-2021-29265-usbip-fix-stub_dev-usbip_sockfd_store-races-leading-.patch
- From: 5.4.0-73.82
- CVE-2021-28375, CVSSv2 Score: 7.8
- Description:
misc: fastrpc: restrict user apps from sending kernel RPC messages
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-28375
- Patch: ubuntu-focal/5.4.0-73.82/0005-CVE-2021-28375-misc-fastrpc-restrict-user-apps-from-sending-kernel-.patch
- From: 5.4.0-73.82
- CVE-2021-28660, CVSSv2 Score: 7.8
- Description:
staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-28660
- Patch: ubuntu-focal/5.4.0-73.82/0006-CVE-2021-28660-staging-rtl8188eu-prevent-ssid-overflow-in-rtw_wx_se.patch
- From: 5.4.0-73.82
- CVE-2021-28038, CVSSv2 Score: 6.5
- Description:
Xen/gnttab: handle p2m update errors on a per-slot basis
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-28038
- Patch: ubuntu-focal/5.4.0-73.82/CVE-2021-28038-xsa367-70.78.patch
- From: 5.4.0-73.82
- CVE-2020-25639, CVSSv2 Score: 4.4
- Description:
drm/nouveau: bail out of nouveau_channel_new if channel init
- CVE: https://access.redhat.com/security/cve/CVE-2020-25639
- Patch: ubuntu-focal/5.4.0-73.82/CVE-2020-25639-drm-nouveau-bail-out-of-nouveau_channel_new-if-channel-init-fails.patch
- From: 5.4.0-73.82
- CVE-2021-28950, CVSSv2 Score: 5.5
- Description:
fuse: fix live lock in fuse_iget()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-28950
- Patch: ubuntu-focal/5.4.0-74.83/0001-CVE-2021-28950-fuse-fix-live-lock-in-fuse_iget.patch
- From: 5.4.0-74.83
- CVE-2021-28964, CVSSv2 Score: 4.7
- Description:
btrfs: fix race when cloning extent buffer during rewind of an old
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-28964
- Patch: ubuntu-focal/5.4.0-74.83/0002-CVE-2021-28964-btrfs-fix-race-when-cloning-extent-buffer-during-rew.patch
- From: 5.4.0-74.83
- CVE-2021-29647, CVSSv2 Score: 5.5
- Description:
net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29647
- Patch: ubuntu-focal/5.4.0-74.83/0003-CVE-2021-29647-net-qrtr-fix-__netdev_alloc_skb-call.patch
- From: 5.4.0-74.83
- CVE-2021-28972, CVSSv2 Score: 6.7
- Description:
PCI: rpadlpar: Fix potential drc_name corruption in store functions
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-28972
- Patch: ubuntu-focal/5.4.0-74.83/0004-CVE-2021-28972-PCI-rpadlpar-Fix-potential-drc_name-corruption-in-st.patch
- From: 5.4.0-74.83
- CVE-2021-28971, CVSSv2 Score: 5.5
- Description:
perf/x86/intel: Fix a crash caused by zero PEBS status
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-28971
- Patch: ubuntu-focal/5.4.0-74.83/0005-CVE-2021-28971-perf-x86-intel-Fix-a-crash-caused-by-zero-PEBS-statu.patch
- From: 5.4.0-74.83
- CVE-2021-29264, CVSSv2 Score: 5.5
- Description:
gianfar: fix jumbo packets+napi+rx overrun crash
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29264
- Patch: ubuntu-focal/5.4.0-74.83/0006-CVE-2021-29264-gianfar-fix-jumbo-packets-napi-rx-overrun-crash.patch
- From: 5.4.0-74.83
- CVE-2021-31916, CVSSv2 Score: 6.7
- Description:
dm ioctl: fix out of bounds array access when no devices
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-31916
- Patch: ubuntu-focal/5.4.0-74.83/0007-CVE-2021-31916-dm-ioctl-fix-out-of-bounds-array-access-when-no-devi.patch
- From: 5.4.0-74.83
- CVE-2021-29647, CVSSv2 Score: 5.5
- Description:
net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29647
- Patch: ubuntu-focal/5.4.0-74.83/0008-CVE-2021-29647-net-qrtr-fix-a-kernel-infoleak-in-qrtr_recvmsg.patch
- From: 5.4.0-74.83
- CVE-2021-28688, CVSSv2 Score: 6.5
- Description:
xen-blkback: don't leak persistent grants from xen_blkbk_map()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-28688
- Patch: ubuntu-focal/5.4.0-74.83/0009-CVE-2021-28688-xen-blkback-don-t-leak-persistent-grants-from-xen_bl.patch
- From: 5.4.0-74.83
- CVE-2021-3483, CVSSv2 Score: 7.8
- Description:
firewire: nosy: Fix a use-after-free bug in nosy_ioctl()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3483
- Patch: ubuntu-focal/5.4.0-74.83/0010-CVE-2021-3483-firewire-nosy-Fix-a-use-after-free-bug-in-nosy_ioctl.patch
- From: 5.4.0-74.83
- CVE-2021-29264, CVSSv2 Score: 5.5
- Description:
gianfar: Handle error code at MAC address change
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-29264
- Patch: ubuntu-focal/5.4.0-74.83/0011-CVE-2021-29264-gianfar-Handle-error-code-at-MAC-address-change.patch
- From: 5.4.0-74.83
- CVE-2020-25670, CVSSv2 Score: 5.7
- Description:
nfc: fix refcount leak in llcp_sock_bind()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25670
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2020-25670-nfc-fix-refcount-leak-in-llcp_sock_bind.patch
- From: 5.4.0-74.83
- CVE-2020-25671, CVSSv2 Score: 5.7
- Description:
nfc: fix refcount leak in llcp_sock_connect()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25671
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2020-25671-nfc-fix-refcount-leak-in-llcp_sock_connect.patch
- From: 5.4.0-74.83
- CVE-2020-25672, CVSSv2 Score: 5.7
- Description:
nfc: fix memory leak in llcp_sock_connect()
- CVE: https://access.redhat.com/security/cve/CVE-2020-25672
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2020-25672-nfc-fix-memory-leak-in-llcp_sock_connect.patch
- From: 5.4.0-74.83
- CVE-2020-25673, CVSSv2 Score: 6.3
- Description:
nfc: Avoid endless loops caused by repeated llcp_sock_connect()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-25673
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2020-25673-nfc-Avoid-endless-loops-caused-by-repeated-llcp_sock_connect.patch
- From: 5.4.0-74.83
- CVE-2021-0941, CVSSv2 Score: 6.7
- Description:
bpf: Remove MTU check in __bpf_skb_max_len
- CVE: https://ubuntu.com/security/CVE-2021-0941
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2021-0941-bpf-Remove-MTU-check-in-__bpf_skb_max_len.patch
- From: 5.4.0-144.148
- CVE-2021-3659, CVSSv2 Score: 5.5
- Description:
net: mac802154: Fix general protection fault
- CVE: https://ubuntu.com/security/CVE-2021-3659
- Patch: ubuntu-focal/5.4.0-74.83/CVE-2021-3659-net-mac802154-Fix-general-protection-fault.patch
- From: 5.4.0-144.148
- CVE-2021-22555, CVSSv2 Score: 7.8
- Description:
netfilter: x_tables: fix compat match/target pad out-of-bound write
- CVE: https://ubuntu.com/security/CVE-2021-22555
- Patch: ubuntu-focal/5.4.0-77.86/CVE-2021-22555.patch
- From: v5.12
- CVE-2020-26147, CVSSv2 Score: 5.4
- Description:
mac80211: assure all fragments are encrypted
- CVE: https://ubuntu.com/security/CVE-2020-26147
- Patch: 5.4.0/CVE-2020-26147-mac80211-assure-all-fragments-are-encrypted.patch
- From: kernel-5.4.0-77.86
- CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
ath10k: drop MPDU which has discard flag set by firmware for SDIO
- CVE: https://ubuntu.com/security/CVE-2020-24588
- Patch: 5.8.0/CVE-2020-24588-ath10k-drop-MPDU-which-has-discard-flag-set-by-firmware-for-SDIO.patch
- From: kernel-5.8.0-59.66
- CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
mac80211: drop A-MSDUs on old ciphers
- CVE: https://ubuntu.com/security/CVE-2020-24588
- Patch: 5.4.0/CVE-2020-24588-mac80211-drop-A-MSDUs-on-old-ciphers.patch
- From: kernel-5.4.0-77.86
- CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
cfg80211: mitigate A-MSDU aggregation attacks
- CVE: https://ubuntu.com/security/CVE-2020-24588
- Patch: 5.8.0/CVE-2020-24588-cfg80211-mitigate-A-MSDU-aggregation-attacks.patch
- From: kernel-5.8.0-59.66
- CVE-2020-24588, CVSSv2 Score: 5.3
- Description:
mac80211: properly handle A-MSDUs that start with an RFC 1042 header
- CVE: https://ubuntu.com/security/CVE-2020-24588
- Patch: 5.8.0/CVE-2020-24588-mac80211-properly-handle-A-MSDUs-that-start-with-an-RFC-1042-header.patch
- From: kernel-5.8.0-59.66
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.4.0/CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks.patch
- From: 5.4.0-77.86
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent mixed key and fragment cache attacks (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.8.0/CVE-2020-24587-mac80211-prevent-mixed-key-and-fragment-cache-attacks-kpatch.patch
- From: 5.8.0-59.66
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: prevent attacks on TKIP/WEP as well
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.4.0/CVE-2020-24587-mac80211-prevent-attacks-on-TKIP-WEP-as-well.patch
- From: 5.4.0-77.86
- CVE-2020-24587 CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: extend protection against mixed key and fragment cache attacks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24587
- Patch: 5.4.0/CVE-2020-24587-mac80211-extend-protection-against-mixed-key-and-fragment-cache-attacks.patch
- From: 5.4.0-77.86
- CVE-2020-26139, CVSSv2 Score: 5.3
- Description:
mac80211: do not accept/forward invalid EAPOL frames
- CVE: https://ubuntu.com/security/CVE-2020-26139
- Patch: 5.8.0/CVE-2020-26139-mac80211-do-not-accept-forward-invalid-EAPOL-frames.patch
- From: kernel-5.8.0-59.66
- CVE-2020-26141, CVSSv2 Score: 6.5
- Description:
ath10k: Fix TKIP Michael MIC verification for PCIe
- CVE: https://ubuntu.com/security/CVE-2020-26141
- Patch: 5.8.0/CVE-2020-26141-ath10k-Fix-TKIP-Michael-MIC-verification-for-PCIe.patch
- From: kernel-5.8.0-59.66
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: add CCMP PN replay protection for fragmented frames for PCIe
- CVE: https://ubuntu.com/security/CVE-2020-26145
- Patch: 5.8.0/CVE-2020-26145-ath10k-add-CCMP-PN-replay-protection-for-fragmented-frames-for-PCIe.patch
- From: kernel-5.8.0-59.66
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: drop fragments with multicast DA for SDIO
- CVE: https://ubuntu.com/security/CVE-2020-26145
- Patch: 5.8.0/CVE-2020-26145-ath10k-drop-fragments-with-multicast-DA-for-SDIO.patch
- From: kernel-5.8.0-59.66
- CVE-2020-26145, CVSSv2 Score: 6.5
- Description:
ath10k: drop fragments with multicast DA for PCIe
- CVE: https://ubuntu.com/security/CVE-2020-26145
- Patch: 5.8.0/CVE-2020-26145-ath10k-drop-fragments-with-multicast-DA-for-PCIe.patch
- From: kernel-5.8.0-59.66
- CVE-2021-23133, CVSSv2 Score: 7.0
- Description:
sctp: delay auto_asconf init until binding the first addr
- CVE: https://ubuntu.com/security/CVE-2021-23133
- Patch: 5.4.0/CVE-2021-23133-sctp-delay-auto_asconf-init-until-binding-the-first-addr.patch
- From: kernel-5.4.0-77.86
- CVE-2021-23134, CVSSv2 Score: 7.8
- Description:
net/nfc: fix use-after-free llcp_sock_bind/connect
- CVE: https://ubuntu.com/security/CVE-2021-23134
- Patch: 5.4.0/CVE-2021-23134-net-nfc-fix-use-after-free-llcp_sock_bind-connect.patch
- From: kernel-5.4.0-77.86
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Use correct permission flag for mixed signed bounds arithmetic
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.8.0/CVE-2021-29155-bpf-Use-correct-permission-flag-for-mixed-signed-bounds-arithmetic.patch
- From: kernel-5.8.0-59.66
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Ensure off_reg has no mixed signed bounds for all types
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.8.0/CVE-2021-29155-bpf-Ensure-off_reg-has-no-mixed-signed-bounds-for-all-types.patch
- From: kernel-5.8.0-59.66
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Move off_reg into sanitize_ptr_alu
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.8.0/CVE-2021-29155-bpf-Move-off_reg-into-sanitize_ptr_alu.patch
- From: kernel-5.8.0-59.66
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Rework ptr_limit into alu_limit and add common error path
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.8.0/CVE-2021-29155-bpf-Rework-ptr_limit-into-alu_limit-and-add-common-error-path.patch
- From: kernel-5.8.0-59.66
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Improve verifier error messages for users
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.4.0/CVE-2021-29155-bpf-Improve-verifier-error-messages-for-user.patch
- From: kernel-5.4.0-77.86
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Move sanitize_val_alu out of op switch
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.4.0/CVE-2020-29155-bpf-Move-sanitize_val_alu-out-of-op-switch.patch
- From: kernel-5.4.0-77.86
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Refactor and streamline bounds check into helper
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-29155
- Patch: 5.4.0/CVE-2021-29155-bpf-Refactor-and-streamline-bounds-check-into-helper.patch
- From: kernel-5.4.0-77.86
- CVE-2021-29155, CVSSv2 Score: 5.5
- Description:
bpf: Tighten speculative pointer arithmetic mask
- CVE: https://ubuntu.com/security/CVE-2021-29155
- Patch: 5.4.0/CVE-2021-29155-bpf-Tighten-speculative-pointer-arithmetic-mask.patch
- From: kernel-5.4.0-77.86
- CVE-2021-31829, CVSSv2 Score: 5.5
- Description:
bpf: Fix masking negation logic upon negative dst register
- CVE: https://ubuntu.com/security/CVE-2021-31829
- Patch: 5.8.0/CVE-2021-31829-bpf-Fix-masking-negation-logic-upon-negative-dst-register.patch
- From: kernel-5.8.0-59.66
- CVE-2021-31829, CVSSv2 Score: 5.5
- Description:
bpf: Fix leakage of uninitialized bpf stack under speculation
- CVE: https://ubuntu.com/security/CVE-2021-31829
- Patch: 5.8.0/CVE-2021-31829-bpf-Fix-leakage-of-uninitialized-bpf-stack-under-speculation.patch
- From: kernel-5.8.0-59.66
- CVE-2021-32399, CVSSv2 Score: 7.0
- Description:
bluetooth: eliminate the potential race condition when removing the HCI controller
- CVE: https://ubuntu.com/security/CVE-2021-32399
- Patch: 5.4.0/CVE-2021-32399-bluetooth-eliminate-the-potential-race-condition-when-removing-the-HCI-controller.patch
- From: kernel-5.4.0-77.86
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://ubuntu.com/security/CVE-2021-33034
- Patch: 5.4.0/CVE-2021-33034-Bluetooth-verify-AMP-hci_chan-before-amp_destroy.patch
- From: kernel-5.4.0-77.86
- CVE-2021-33034, CVSSv2 Score: 7.8
- Description:
Bluetooth: verify AMP hci_chan before amp_destroy
- CVE: https://ubuntu.com/security/CVE-2021-33034
- Patch: 5.4.0/CVE-2021-33034-kpatch.patch
- From: kernel-5.4.0-77.86
- CVE-2021-3609, CVSSv2 Score: 7.0
- Description:
UBUNTU: SAUCE: can: bcm: delay release of struct bcm_op after synchronize_rcu
- CVE: https://ubuntu.com/security/CVE-2021-3609
- Patch: 5.8.0/CVE-2021-3609-UBUNTU-SAUCE-can-bcm-delay-release-of-struct-bcm_op-after-synchronize_rcu.patch
- From: kernel-5.8.0-59.66
- CVE-2021-3506, CVSSv2 Score: 7.1
- Description:
f2fs: fix to avoid out-of-bounds memory access
- CVE: https://ubuntu.com/security/CVE-2021-3506
- Patch: 5.4.0/CVE-2021-3506-f2fs-fix-to-avoid-out-of-bounds-memory-access.patch
- From: kernel-5.4.0-77.86
- CVE-2020-24586, CVSSv2 Score: 2.6
- Description:
mac80211: add fragment cache to sta_info
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-24586
- Patch: 5.8.0/CVE-2020-24586-mac80211-add-fragment-cache-to-sta_info-kpatch.patch
- From: kernel-5.8.0-59.66
- CVE-2021-33200, CVSSv2 Score: 7.8
- Description:
bpf: Wrap aux data inside bpf_sanitize_info container
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 5.4.0/CVE-2021-33200-bpf-Wrap-aux-data-inside-bpf_sanitize_info-container.patch
- From: 5.4.0-77.86
- CVE-2021-33200, CVSSv2 Score: 7.8
- Description:
bpf: Fix mask direction swap upon off reg sign change
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 5.4.0/CVE-2021-33200-bpf-Fix-mask-direction-swap-upon-off-reg-sign-change.patch
- From: 5.4.0-77.86
- CVE-2021-33200, CVSSv2 Score: 7.8
- Description:
bpf: No need to simulate speculative domain for immediates
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-33200
- Patch: 5.4.0/CVE-2021-33200-bpf-No-need-to-simulate-speculative-domain-for-immediates.patch
- From: 5.4.0-77.86
- CVE-2021-45486, CVSSv2 Score: 3.5
- Description:
inet: use bigger hash table for IP ID generation
- CVE: https://ubuntu.com/security/CVE-2021-45486
- Patch: ubuntu-focal/5.4.0-77.86/CVE-2021-45486-inet-use-bigger-hash-table-for-IP-ID-generation.patch
- From: kernel-5.4.0-77.86
- CVE-2021-45486, CVSSv2 Score: 3.5
- Description:
inet: use bigger hash table for IP ID generation (adaptation)
- CVE: https://ubuntu.com/security/CVE-2021-45486
- Patch: ubuntu-focal/5.4.0-77.86/CVE-2021-45486-inet-use-bigger-hash-table-for-IP-ID-generation-kpatch.patch
- From: kernel-5.4.0-77.86
- CVE-2020-36312, CVSSv2 Score:
- Description:
KVM: Stop looking for coalesced MMIO zones if the bus is destroyed
- CVE: https://ubuntu.com/security/CVE-2020-36312
- Patch: ubuntu-focal/5.4.0-77.86/CVE-2020-36312-0002-KVM-Stop-looking-for-coalesced-MMIO-zones-if-the-bus.patch
- From: kernel-5.4.0-77.86
- CVE-2021-0129 CVE-2020-26558, CVSSv2 Score: 5.7
- Description:
Bluetooth: SMP: Fail if remote and local public keys are identical
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-0129
- Patch: 5.4.0/CVE-2020-26558-Bluetooth-SMP-Fail-if-remote-and-local-public-keys-are-identical.patch
- From: kernel-5.4.0-77.86
- CVE-2021-33909, CVSSv2 Score: 7.0
- Description:
seq_file: Disallow extremely large seq buffer allocations
- CVE: https://ubuntu.com/security/CVE-2021-33909
- Patch: ubuntu-focal/5.4.0-77.86/CVE-2021-33909.patch
- From: >5.4.0-80.90
- CVE-2021-33098, CVSSv2 Score:
- Description:
ixgbe: fix large MTU request from VF
- CVE: https://ubuntu.com/security/CVE-2021-33098
- Patch: ubuntu-focal/5.4.0-80.90/CVE-2021-33098-ixgbe-fix-large-MTU-request-from-VF.patch
- From: kernel-5.4.0-80.90
- CVE-2021-4157, CVSSv2 Score:
- Description:
pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()
- CVE: https://ubuntu.com/security/CVE-2021-4157
- Patch: ubuntu-focal/5.4.0-80.90/CVE-2021-4157-pNFS-flexfiles-fix-incorrect-size-check-in-decode_nf.patch
- From: kernel-5.4.0-80.90
- CVE-2021-3573, CVSSv2 Score: 7.8
- Description:
Bluetooth: use correct lock to prevent UAF of hdev object
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3573
- Patch: ubuntu-focal/5.4.0-81.91/0001-CVE-2021-3573-Bluetooth-use-correct-lock-to-prevent-UAF-of-hdev-ob.patch
- From: 5.4.0-81.91
- CVE-2021-3587, CVSSv2 Score: 5.1
- Description:
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3587
- Patch: ubuntu-focal/5.4.0-81.91/0002-CVE-2021-3587-nfc-fix-NULL-ptr-dereference-in-llcp_sock_getname-af.patch
- From: 5.4.0-81.91
- CVE-2021-34693, CVSSv2 Score: 5.5
- Description:
can: bcm: fix infoleak in struct bcm_msg_head
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-34693
- Patch: ubuntu-focal/5.4.0-81.91/CVE-2021-34693-can-bcm-fix-infoleak-in-struct-bcm_msg_head.patch
- From: 5.4.0-81.91
- CVE-2021-3564, CVSSv2 Score: 5.5
- Description:
Bluetooth: fix the erroneous flush_work() order
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3564
- Patch: ubuntu-focal/5.4.0-81.91/CVE-2021-3564-Bluetooth-fix-the-erroneous-flush_work-order.patch
- From: 5.4.0-81.91
- CVE-2021-3743, CVSSv2 Score: 6.2
- Description:
net: qrtr: fix OOB Read in qrtr_endpoint_post
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3743
- Patch: 5.4.0/CVE-2021-3743-889018-net-qrtr-fix-OOB-Read-in-qrtr_endpoint_post.patch
- From: kernel-5.4.0-81.91
- CVE-2020-36311, CVSSv2 Score: 5.5
- Description:
KVM: SVM: Periodically schedule when unregistering regions on destroy
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-36311
- Patch: ubuntu-focal/5.4.0-84.94/CVE-2020-36311-KVM-SVM-Periodically-schedule-when-unregistering-regions-on-destroy.patch
- From: 5.4.0-84.94
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
KVM: do not assume PTE is writable after follow_pfn
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-22543
- Patch: ubuntu-focal/5.4.0-84.94/CVE-2021-22543-KVM-do-not-assume-PTE-is-writable-after-follow_pfn.patch
- From: 5.4.0-84.94
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
mm: unexport follow_pte_pmd
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-22543
- Patch: ubuntu-focal/5.4.0-84.94/CVE-2021-22543-mm-unexport-follow_pte_pmd.patch
- From: 5.4.0-84.94
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
mm: simplify follow_pte{,pmd}
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-22543
- Patch: ubuntu-focal/5.4.0-84.94/CVE-2021-22543-mm-simplify-follow_pte-pmd.patch
- From: 5.4.0-84.94
- CVE-2021-22543, CVSSv2 Score: 7.8
- Description:
KVM: do not allow mapping valid but non-reference-counted pages
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-22543
- Patch: ubuntu-focal/5.4.0-84.94/0001-CVE-2021-22543-KVM-do-not-allow-mapping-valid-but-non-reference-cou.patch
- From: 5.4.0-84.94
- CVE-2021-3612, CVSSv2 Score: 7.8
- Description:
Input: joydev - prevent use of not validated data in JSIOCSBTNMAP
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3612
- Patch: ubuntu-focal/5.4.0-84.94/0004-CVE-2021-3612-Input-joydev-prevent-use-of-not-validated-data-in-JS.patch
- From: 5.4.0-84.94
- CVE-2021-3656, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3656
- Patch: ubuntu-focal/5.4.0-84.94/0006-CVE-2021-3653-CVE-2021-3656-UBUNTU-SAUCE-KVM-nSVM-always-intercept-VMLOAD-VMSAVE.patch
- From: 5.4.0-84.94
- CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3653
- Patch: ubuntu-focal/5.4.0-84.94/0008-CVE-2021-3653-CVE-2021-3656-KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-i.patch
- From: 5.4.0-84.94
- CVE-2021-3653, CVSSv2 Score: 8.8
- Description:
KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3653
- Patch: ubuntu-bionic/4.15.0-156.163/CVE-2021-3653-kpatch.patch
- From: 4.15.0-156.163
- CVE-2021-38160, CVSSv2 Score: 7.8
- Description:
virtio_console: Assure used length from device is limited
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38160
- Patch: ubuntu-focal/5.4.0-88.99/0002-CVE-2021-38160-virtio_console-Assure-used-length-from-device-is-lim.patch
- From: 5.4.0-88.99
- CVE-2021-38199, CVSSv2 Score: 6.5
- Description:
NFSv4: Initialise connection to the server in nfs4_alloc_client()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38199
- Patch: ubuntu-focal/5.4.0-88.99/0003-CVE-2021-38199-NFSv4-Initialise-connection-to-the-server-in-nfs4_al.patch
- From: 5.4.0-88.99
- CVE-2021-37576, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2021-37576.patch
- From:
- CVE-2021-38204, CVSSv2 Score: 6.8
- Description:
usb: max-3421: Prevent corruption of freed memory
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38204
- Patch: ubuntu-focal/5.4.0-88.99/0005-CVE-2021-38204-usb-max-3421-Prevent-corruption-of-freed-memory.patch
- From: 5.4.0-88.99
- CVE-2021-38204, CVSSv2 Score: 6.8
- Description:
usb: max-3421: Prevent corruption of freed memory (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38204
- Patch: ubuntu-focal/5.4.0-88.99/CVE-2021-38204-kpatch.patch
- From: 5.4.0-88.99
- CVE-2021-3679, CVSSv2 Score: 5.5
- Description:
tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3679
- Patch: ubuntu-focal/5.4.0-88.99/0007-CVE-2021-3679-tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch
- From: 5.4.0-88.99
- CVE-2021-33624, CVSSv2 Score: 4.7
- Description:
bpf: Inherit expanded/patched seen count from old aux data
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33624
- Patch: ubuntu-focal/5.4.0-88.99/0008-CVE-2021-33624-bpf-Inherit-expanded-patched-seen-count-from-old-aux.patch
- From: 5.4.0-88.99
- CVE-2021-33624, CVSSv2 Score: 4.7
- Description:
bpf: Do not mark insn as seen under speculative path verification
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33624
- Patch: ubuntu-focal/5.4.0-88.99/0009-CVE-2021-33624-bpf-Do-not-mark-insn-as-seen-under-speculative-path-.patch
- From: 5.4.0-88.99
- CVE-2021-33624, CVSSv2 Score: 4.7
- Description:
bpf: Fix leakage under speculation on mispredicted branches
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33624
- Patch: ubuntu-focal/5.4.0-88.99/0010-CVE-2021-33624-bpf-Fix-leakage-under-speculation-on-mispredicted-br.patch
- From: 5.4.0-88.99
- CVE-2021-3732, CVSSv2 Score: 3.3
- Description:
ovl: prevent private clone if bind mount is not allowed
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3732
- Patch: ubuntu-focal/5.4.0-89.100/0001-CVE-2021-3732-ovl-prevent-private-clone-if-bind-mount-is-not-allow.patch
- From: 5.4.0-89.100
- CVE-2021-38205, CVSSv2 Score: 3.3
- Description:
net: xilinx_emaclite: Do not print real IOMEM pointer
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-38205
- Patch: ubuntu-focal/5.4.0-89.100/0002-CVE-2021-38205-net-xilinx_emaclite-Do-not-print-real-IOMEM-pointer.patch
- From: 5.4.0-89.100
- CVE-2021-42008, CVSSv2 Score: 7.8
- Description:
net: 6pack: fix slab-out-of-bounds in decode_data
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-42008
- Patch: ubuntu-focal/5.4.0-89.100/0003-CVE-2021-42008-net-6pack-fix-slab-out-of-bounds-in-decode_data.patch
- From: 5.4.0-89.100
- CVE-2021-3732, CVSSv2 Score: 3.3
- Description:
fs: warn about impending deprecation of mandatory locks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3732
- Patch: ubuntu-focal/5.4.0-89.100/0004-CVE-2021-3732-fs-warn-about-impending-deprecation-of-mandatory-loc.patch
- From: 5.4.0-89.100
- CVE-2021-40490, CVSSv2 Score: 7.0
- Description:
ext4: fix race writing to an inline_data file while its xattrs are
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-40490
- Patch: ubuntu-focal/5.4.0-89.100/0005-CVE-2021-40490-ext4-fix-race-writing-to-an-inline_data-file-while-i.patch
- From: 5.4.0-89.100
- CVE-2021-38198, CVSSv2 Score: 5.5
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow page
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-38198
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2021-38198-KVM-X86-MMU-Use-the-correct-inherited-permissions-to-get-shadow-page.patch
- From: kernel-5.4.0-89.100
- CVE-2021-38198, CVSSv2 Score: 5.5
- Description:
KVM: X86: MMU: Use the correct inherited permissions to get shadow page (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-38198
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2021-38198-kpatch.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath: Use safer key clearing with key cache entries
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath-Use-safer-key-clearing-with-key-cache-entries.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath9k: Clear key cache explicitly on disabling hardware
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath9k-Clear-key-cache-explicitly-on-disabling-hardware.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath: Export ath_hw_keysetmac
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath-Export-ath_hw_keysetmac.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath: Modify ath_key_delete() to not need full key entry
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath-Modify-ath_key_delete-to-not-need-full-key-entry.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath9k: Postpone key cache entry deletion for TXQ frames reference it
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath9k-Postpone-key-cache-entry-deletion-for-TXQ-frames-reference-it.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath9k: Postpone key cache entry deletion for TXQ frames reference it (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath9k-Postpone-key-cache-entry-deletion-for-TXQ-frames-reference-it-kpatch.patch
- From: kernel-5.4.0-89.100
- CVE-2020-3702, CVSSv2 Score: 6.5
- Description:
ath: Export ath_hw_keysetmac (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2020-3702
- Patch: ubuntu-focal/5.4.0-89.100/CVE-2020-3702-ath-Export-ath_hw_keysetmac-kpatch.patch
- From: kernel-5.4.0-89.100
- CVE-2021-3743, CVSSv2 Score: 6.2
- Description:
net: qrtr: fix another OOB Read in qrtr_endpoint_post
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3743
- Patch: 5.4.0/CVE-2021-3743-890387-net-qrtr-fix-another-OOB-Read-in-qrtr_endpoint_pos.patch
- From: kernel-5.4.0-90.101
- CVE-2021-3753, CVSSv2 Score: 6.2
- Description:
vt_kdsetmode: extend console locking
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3753
- Patch: 5.4.0/CVE-2021-3753-890424-vt_kdsetmode-extend-console-locking.patch
- From: kernel-5.4.0-90.101
- CVE-2021-3739, CVSSv2 Score: 6.2
- Description:
btrfs: fix NULL pointer dereference when deleting device by invalid id
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3739
- Patch: 5.4.0/CVE-2021-3739-890430-btrfs-fix-NULL-pointer-dereference-when-deleting-d.patch
- From: kernel-5.4.0-90.101
- CVE-2021-3759, CVSSv2 Score: 5.5
- Description:
memcg: enable accounting of ipc resources
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3759
- Patch: 5.4.0/CVE-2021-3759-890617-memcg-enable-accounting-of-ipc-resources.patch
- From: kernel-5.4.0-90.101
- CVE-2019-19449, CVSSv2 Score: 7.3
- Description:
f2fs: fix wrong total_sections check and fsmeta check
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19449
- Patch: 5.4.0/CVE-2019-19449-890628-f2fs-fix-wrong-total_sections-check-and-fsmeta-che.patch
- From: kernel-5.4.0-90.101
- CVE-2019-19449, CVSSv2 Score: 7.3
- Description:
f2fs: fix to do sanity check on segment/section count
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19449
- Patch: 5.4.0/CVE-2019-19449-890629-f2fs-fix-to-do-sanity-check-on-segment-section-cou.patch
- From: kernel-5.4.0-90.101
- CVE-2021-42252, CVSSv2 Score: 7.8
- Description:
soc: aspeed: lpc-ctrl: Fix boundary check for mmap
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-42252
- Patch: 5.4.0/CVE-2021-42252-890651-soc-aspeed-lpc-ctrl-Fix-boundary-check-for-mmap.patch
- From: kernel-5.4.0-90.101
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/cma: Add missing locking to rdma_accept()
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 5.4.0/CVE-2020-36385-890897-RDMA-cma-Add-missing-locking-to-rdma_accept.patch
- From: kernel-5.4.0-90.101
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Fix the locking of ctx->file
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 5.4.0/CVE-2020-36385-890898-RDMA-ucma-Fix-the-locking-of-ctx-file.patch
- From: kernel-5.4.0-90.101
- CVE-2020-36385, CVSSv2 Score: 7.8
- Description:
RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36385
- Patch: 5.4.0/CVE-2020-36385-890899-RDMA-ucma-Rework-ucma_migrate_id-to-avoid-races-wi.patch
- From: kernel-5.4.0-90.101
- CVE-2021-3428, CVSSv2 Score: 4.4
- Description:
ext4: catch integer overflow in ext4_cache_extents
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3428
- Patch: 4.19.0/CVE-2021-3428-ext4-catch-integer-overflow-in-ext4_cache_extents.patch
- From: v4.19.182
- CVE-2021-34556 CVE-2021-35477, CVSSv2 Score: 4.4
- Description:
bpf: Introduce BPF nospec instruction for mitigating Spectre v4
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-35477
- Patch: 5.4.0/CVE-2021-34556-CVE-2021-35477-890598-bpf-Introduce-BPF-nospec-instruction-for-mitigatin.patch
- From: kernel-5.4.0-90.101
- CVE-2021-34556 CVE-2021-35477, CVSSv2 Score: 4.4
- Description:
bpf: Fix leakage due to insufficient speculative store bypass mitigation
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-35477
- Patch: 5.4.0/CVE-2021-34556-CVE-2021-35477-890599-bpf-Fix-leakage-due-to-insufficient-speculative-st.patch
- From: kernel-5.4.0-90.101
- CVE-2021-34556 CVE-2021-35477, CVSSv2 Score: 4.4
- Description:
bpf: Fix leakage due to insufficient speculative store bypass mitigation (kpatch adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/CVE-2021-35477
- Patch: 5.4.0/CVE-2021-34556-CVE-2021-35477-890599-bpf-Fix-leakage-due-to-insufficient-speculative-st-kpatch-1.patch
- From: kernel-5.4.0-90.101
- CVE-2021-3655, CVSSv2 Score: 3.3
- Description:
sctp: validate chunk size in __rcv_asconf_lookup
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3655
- Patch: ubuntu-focal/5.4.0-91.102/0001-CVE-2021-3655-sctp-validate-chunk-size-in-__rcv_asconf_lookup.patch
- From: 5.4.0-91.102
- CVE-2021-3655, CVSSv2 Score: 3.3
- Description:
sctp: add param size validation for SCTP_PARAM_SET_PRIMARY
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3655
- Patch: ubuntu-focal/5.4.0-91.102/0002-CVE-2021-3655-sctp-add-param-size-validation-for-SCTP_PARAM_SET_PR.patch
- From: 5.4.0-91.102
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
net: hso: fix muxed tty registration
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-37159
- Patch: ubuntu-focal/5.4.0-91.102/0003-CVE-2021-37159-net-hso-fix-muxed-tty-registration.patch
- From: 5.4.0-91.102
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
hso: fix bailout in error case of probe
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-37159
- Patch: ubuntu-focal/5.4.0-91.102/0005-CVE-2021-37159-hso-fix-bailout-in-error-case-of-probe.patch
- From: 5.4.0-91.102
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
usb: hso: fix error handling code of hso_create_net_device
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-37159
- Patch: ubuntu-focal/5.4.0-91.102/0006-CVE-2021-37159-usb-hso-fix-error-handling-code-of-hso_create_net_de.patch
- From: 5.4.0-91.102
- CVE-2021-37159, CVSSv2 Score: 6.4
- Description:
usb: hso: remove the bailout parameter
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-37159
- Patch: ubuntu-focal/5.4.0-91.102/0007-CVE-2021-37159-usb-hso-remove-the-bailout-parameter.patch
- From: 5.4.0-91.102
- CVE-2021-3764 CVE-2021-3744, CVSSv2 Score: 5.5
- Description:
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3744
- Patch: ubuntu-focal/5.4.0-91.102/0008-CVE-2021-3744-CVE-2021-3764-crypto-ccp-fix-resource-leaks-in-ccp_run_aes_gcm_cmd.patch
- From: 5.4.0-91.102
- CVE-2021-20321, CVSSv2 Score: 5.5
- Description:
ovl: fix missing negative dentry check in ovl_rename()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-20321
- Patch: ubuntu-focal/5.4.0-92.103/0001-CVE-2021-20321-ovl-fix-missing-negative-dentry-check-in-ovl_rename.patch
- From: 5.4.0-92.103
- CVE-2021-41864, CVSSv2 Score: 7.8
- Description:
bpf: Fix integer overflow in prealloc_elems_and_freelist()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-41864
- Patch: ubuntu-focal/5.4.0-92.103/0002-CVE-2021-41864-bpf-Fix-integer-overflow-in-prealloc_elems_and_freel.patch
- From: 5.4.0-92.103
- CVE-2021-43056, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2021-43056.patch
- From:
- CVE-2021-3760, CVSSv2 Score: 7.0
- Description:
nfc: nci: fix the UAF of rf_conn_info object
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3760
- Patch: ubuntu-focal/5.4.0-92.103/0005-CVE-2021-3760-nfc-nci-fix-the-UAF-of-rf_conn_info-object.patch
- From: 5.4.0-92.103
- CVE-2021-43389, CVSSv2 Score: 5.5
- Description:
isdn: cpai: check ctr->cnr to avoid array index out of bound
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-43389
- Patch: ubuntu-focal/5.4.0-92.103/0006-CVE-2021-43389-isdn-cpai-check-ctr-cnr-to-avoid-array-index-out-of-.patch
- From: 5.4.0-92.103
- CVE-2021-4002, CVSSv2 Score:
- Description:
Patch should be changed due to inline code in __sched()
- CVE:
- Patch: skipped/CVE-2021-4002.patch
- From:
- CVE-2022-0185, CVSSv2 Score: 7.8
- Description:
UBUNTU: SAUCE: vfs: Out-of-bounds write of heap buffer in fs_context.c
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0185
- Patch: 5.4.0/CVE-2022-0185-UBUNTU-SAUCE-vfs-Out-of-bounds-write-of-heap-buffer-in-fs_context.c.patch
- From: 5.4.0-96.109
- CVE-2022-0185, CVSSv2 Score: 7.8
- Description:
UBUNTU: SAUCE: vfs: test that one given mount param is not larger than PAGE_SIZE
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0185
- Patch: 5.4.0/CVE-2022-0185-UBUNTU-SAUCE-vfs-test-that-one-given-mount-param-is-not-larger-than-PAGE_SIZE.patch
- From: 5.4.0-96.109
- CVE-2021-42739, CVSSv2 Score: 6.7
- Description:
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-42739
- Patch: ubuntu-focal/5.4.0-97.110/0001-CVE-2021-42739-media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch
- From: 5.4.0-97.110
- CVE-2021-3640, CVSSv2 Score: 7.8
- Description:
Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3640
- Patch: ubuntu-focal/5.4.0-97.110/0002-CVE-2021-3640-Bluetooth-sco-Fix-lock_sock-blockage-by-memcpy_from_.patch
- From: 5.4.0-97.110
- CVE-2021-4155, CVSSv2 Score: 5.5
- Description:
xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-4155
- Patch: ubuntu-focal/5.4.0-100.113/0001-CVE-2021-4155-xfs-map-unwritten-blocks-in-XFS_IOC_-ALLOC-FREE-SP-j.patch
- From: 5.4.0-100.113
- CVE-2021-4202, CVSSv2 Score: 7.0
- Description:
NFC: reorder the logic in nfc_{un,}register_device
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-4202
- Patch: ubuntu-focal/5.4.0-100.113/CVE-2021-4202-NFC-reorder-the-logic-in-nfc_unregister_device.patch
- From: 5.4.0-100.113
- CVE-2021-4202, CVSSv2 Score: 7.0
- Description:
NFC: reorganize the functions in nci_request
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-4202
- Patch: ubuntu-focal/5.4.0-100.113/CVE-2021-4202-NFC-reorganize-the-functions-in-nci_request.patch
- From: 5.4.0-100.113
- CVE-2021-4083, CVSSv2 Score: 7.0
- Description:
fget: check that the fd still exists after getting a ref to it
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-4083
- Patch: ubuntu-focal/5.4.0-100.113/0002-CVE-2021-4083-fget-check-that-the-fd-still-exists-after-getting-a-.patch
- From: 5.4.0-100.113
- CVE-2021-4202, CVSSv2 Score: 7.0
- Description:
NFC: add NCI_UNREG flag to eliminate the race
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-4202
- Patch: ubuntu-focal/5.4.0-100.113/0003-CVE-2021-4202-NFC-add-NCI_UNREG-flag-to-eliminate-the-race.patch
- From: 5.4.0-100.113
- CVE-2021-43975, CVSSv2 Score: 6.7
- Description:
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-43975
- Patch: ubuntu-focal/5.4.0-100.113/0004-CVE-2021-43975-atlantic-Fix-OOB-read-and-write-in-hw_atl_utils_fw_r.patch
- From: 5.4.0-100.113
- CVE-2021-4202, CVSSv2 Score: 7.0
- Description:
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-4202
- Patch: ubuntu-focal/5.4.0-100.113/0005-CVE-2021-4202-nfc-fix-potential-NULL-pointer-deref-in-nfc_genl_dum.patch
- From: 5.4.0-100.113
- CVE-2021-39685, CVSSv2 Score: 8.4
- Description:
USB: gadget: detect too-big endpoint 0 requests
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-39685
- Patch: ubuntu-focal/5.4.0-100.113/0006-CVE-2021-39685-USB-gadget-detect-too-big-endpoint-0-requests.patch
- From: 5.4.0-100.113
- CVE-2021-39685, CVSSv2 Score: 8.4
- Description:
USB: gadget: zero allocate endpoint 0 buffers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-39685
- Patch: ubuntu-focal/5.4.0-100.113/0007-CVE-2021-39685-USB-gadget-zero-allocate-endpoint-0-buffers.patch
- From: 5.4.0-100.113
- CVE-2021-22600, CVSSv2 Score: 7.8
- Description:
net/packet: rx_owner_map depends on pg_vec
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-22600
- Patch: ubuntu-focal/5.4.0-100.113/0008-CVE-2021-22600-net-packet-rx_owner_map-depends-on-pg_vec.patch
- From: 5.4.0-100.113
- CVE-2022-22942, CVSSv2 Score: 7.0
- Description:
UBUNTU: SAUCE: drm/vmwgfx: Fix stale file descriptors on failed usercopy
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-22942
- Patch: ubuntu-focal/5.4.0-100.113/CVE-2022-22942-UBUNTU-SAUCE-drm-vmwgfx-Fix-stale-file-descriptors-on-failed-usercopy.patch
- From: 5.4.0-100.113
- CVE-2021-39685, CVSSv2 Score: 8.4
- Description:
USB: gadget: bRequestType is a bitfield, not a enum
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-39685
- Patch: ubuntu-focal/5.4.0-100.113/0009-CVE-2021-39685-USB-gadget-bRequestType-is-a-bitfield-not-a-enum.patch
- From: 5.4.0-100.113
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0330
- Patch: ubuntu-focal/5.4.0-100.113/0010-CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store.patch
- From: 5.4.0-100.113
- CVE-2022-0330, CVSSv2 Score: 7.0
- Description:
drm/i915: Flush TLBs before releasing backing store (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0330
- Patch: ubuntu-focal/5.4.0-100.113/CVE-2022-0330-kpatch.patch
- From: 5.4.0-100.113
- CVE-2022-25636, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables_offload: incorrect flow offload action array
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-25636
- Patch: ubuntu-focal/5.4.0-104.118/0001-CVE-2022-25636-netfilter-nf_tables_offload-incorrect-flow-offload-a.patch
- From: 5.4.0-104.118
- CVE-2022-25636, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables_offload: incorrect flow offload action array (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-25636
- Patch: ubuntu-focal/5.4.0-104.118/CVE-2022-25636-kpatch.patch
- From: 5.4.0-104.118
- CVE-2022-0001, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2022-0001.patch
- From:
- CVE-2022-0002, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2022-0002.patch
- From:
- CVE-2022-0435, CVSSv2 Score: 7.1
- Description:
remote stack overflow in Linux kernel
- CVE: https://ubuntu.com/security/CVE-2022-0435
- Patch: 5.4.0/CVE-2022-0435.patch
- From: kernel-5.4.0-105.119
- CVE-2022-0847, CVSSv2 Score: 7.8
- Description:
lib/iov_iter: initialize "flags" in new pipe_buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-0847
- Patch: 4.18.0/CVE-2022-0847-lib-iov_iter-initialize-flags-in-new-pipe_buffer.patch
- From: >kernel-4.18.0-348.12.2.el8_5
- CVE-2021-4135, CVSSv2 Score: 4.7
- Description:
netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2011-4315
- Patch: 5.10.0/CVE-2021-4135-netdevsim-Zero-initialize-memory-for-new-maps-value-in-function-nsim_bpf_map_alloc.patch
- From: kernel-5.10.92-1
- CVE-2021-43976, CVSSv2 Score: 4.6
- Description:
mwifiex: Fix skb_over_panic in mwifiex_usb_recv()
- CVE: https://access.redhat.com/security/cve/CVE-2021-43976
- Patch: 4.5.0/CVE-2021-43976-mwifiex-fix-skb-over-panic-in-mwifiex-usb-recv.patch
- From: 5.4.0-105.119
- CVE-2021-44733, CVSSv2 Score: 7.4
- Description:
- CVE: https://access.redhat.com/security/cve/CVE-2021-44733
- Patch: 5.4.17/CVE-2021-44733-tee-handle-lookup-of-shm-with-reference-count.patch
- From: kernel-uek-5.4.17-2136.304.4.1
- CVE-2021-44733, CVSSv2 Score: 7.4
- Description:
- CVE: https://access.redhat.com/security/cve/CVE-2021-44733
- Patch: 5.4.17/CVE-2021-44733-kpatch.patch
- From: kernel-uek-5.4.17-2136.304.4.1
- CVE-2021-45095, CVSSv2 Score: 5.5
- Description:
phonet: refcount leak in pep_sock_accep
- CVE: https://access.redhat.com/security/cve/CVE-2021-45095
- Patch: 5.10.0/CVE-2021-45095-phonet-refcount-leak-in-pep_sock_accep.patch
- From: kernel-5.10.92-1
- CVE-2022-0492, CVSSv2 Score: 7.0
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 5.4.17/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 5.4.17-2136.302.7.2.3
- CVE-2022-0516, CVSSv2 Score:
- Description:
s390 is unsupported
- CVE:
- Patch: skipped/CVE-2022-0516.patch
- From:
- CVE-2022-1055, CVSSv2 Score:
- Description:
net: sched: fix use-after-free in tc_new_tfilter()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1055
- Patch: ubuntu-focal/5.4.0-107.121/0001-CVE-2022-1055-net-sched-fix-use-after-free-in-tc_new_tfilter.patch
- From: 5.4.0-107.121
- CVE-2022-27666, CVSSv2 Score: 7.8
- Description:
esp: Fix possible buffer overflow in ESP transformation
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-27666
- Patch: ubuntu-focal/5.4.0-107.121/0002-CVE-2022-27666-esp-Fix-possible-buffer-overflow-in-ESP-transformati.patch
- From: 5.4.0-107.121
- CVE-2022-0617, CVSSv2 Score: 5.5
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0617
- Patch: ubuntu-focal/5.4.0-109.123/0001-CVE-2022-0617-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: 5.4.0-109.123
- CVE-2022-0617, CVSSv2 Score: 5.5
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-0617
- Patch: ubuntu-focal/5.4.0-109.123/0002-CVE-2022-0617-udf-Fix-NULL-ptr-deref-when-converting-from-inline-f.patch
- From: 5.4.0-109.123
- CVE-2022-24448, CVSSv2 Score: 3.3
- Description:
NFSv4: Handle case where the lookup of a directory fails
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-24448
- Patch: ubuntu-focal/5.4.0-109.123/0003-CVE-2022-24448-NFSv4-Handle-case-where-the-lookup-of-a-directory-fa.patch
- From: 5.4.0-109.123
- CVE-2022-24448, CVSSv2 Score: 3.3
- Description:
NFSv4: nfs_atomic_open() can race when looking up a non-regular file
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-24448
- Patch: ubuntu-focal/5.4.0-109.123/0004-CVE-2022-24448-NFSv4-nfs_atomic_open-can-race-when-looking-up-a-non.patch
- From: 5.4.0-109.123
- CVE-2022-24448, CVSSv2 Score: 3.3
- Description:
NFS: LOOKUP_DIRECTORY is also ok with symlinks
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-24448
- Patch: ubuntu-focal/5.4.0-109.123/CVE-2022-24448-NFS-LOOKUP_DIRECTORY-is-also-ok-with-symlinks.patch
- From: 5.4.0-109.123
- CVE-2022-24959, CVSSv2 Score: 5.5
- Description:
yam: fix a memory leak in yam_siocdevprivate()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-24959
- Patch: ubuntu-focal/5.4.0-109.123/0007-CVE-2022-24959-yam-fix-a-memory-leak-in-yam_siocdevprivate.patch
- From: 5.4.0-109.123
- CVE-2022-26490, CVSSv2 Score: 7.8
- Description:
[PATCH] nfc: st21nfca: Fix potential buffer overflows in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-26490
- Patch: ubuntu-focal/5.4.0-110.124/0001-CVE-2022-26490-nfc-st21nfca-Fix-potential-buffer-overflows-in-EVT_T.patch
- From: 5.4.0-110.124
- CVE-2022-27223, CVSSv2 Score: 8.8
- Description:
USB: gadget: validate endpoint index for xilinx udc
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-27223
- Patch: ubuntu-focal/5.4.0-110.124/0002-CVE-2022-27223-USB-gadget-validate-endpoint-index-for-xilinx-udc.patch
- From: 5.4.0-110.124
- CVE-2022-25258, CVSSv2 Score: 4.6
- Description:
[PATCH] USB: gadget: validate interface OS descriptor requests
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-25258
- Patch: ubuntu-focal/5.4.0-110.124/0003-CVE-2022-25258-USB-gadget-validate-interface-OS-descriptor-requests.patch
- From: 5.4.0-110.124
- CVE-2022-25375, CVSSv2 Score: 5.5
- Description:
usb: gadget: rndis: check size of RNDIS_MSG_SET command
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-25375
- Patch: ubuntu-focal/5.4.0-110.124/0004-CVE-2022-25375-usb-gadget-rndis-check-size-of-RNDIS_MSG_SET-command.patch
- From: 5.4.0-110.124
- CVE-2022-20008, CVSSv2 Score: 4.6
- Description:
mmc: block: fix read single on recovery logic
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-20008
- Patch: ubuntu-focal/5.4.0-110.124/0005-CVE-2022-20008-mmc-block-fix-read-single-on-recovery-logic.patch
- From: 5.4.0-110.124
- CVE-2022-1016, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: initialize registers in nft_do_chain()
- CVE: https://access.redhat.com/security/cve/CVE-2022-1016
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2022-1016-netfilter-nf_tables-initialize-registers-in-nft_do_chain.patch
- From: 5.4.0-110.124
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: Add a dedicated mutex for the clients list
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-Add-a-dedicated-mutex-for-the-clients-list.patch
- From: 5.4.0-110.124
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: clean up all clients on device removal
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-clean-up-all-clients-on-device-removal.patch
- From: 5.4.0-110.124
- CVE-2020-27820, CVSSv2 Score: 4.7
- Description:
drm/nouveau: Add a dedicated mutex for the clients list (adaptation)
- CVE: https://ubuntu.com/security/CVE-2020-27820
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2020-27820-drm-nouveau-Add-a-dedicated-mutex-for-the-clients-kpatch.patch
- From: 5.4.0-110.124
- CVE-2021-26401, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26401.patch
- From:
- CVE-2022-2964, CVSSv2 Score: 7.8
- Description:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-2964
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2022-2964-net-usb-ax88179_178a-Fix-out-of-bounds-accesses-in-RX-fixup.patch
- From: 5.4.0-110.124
- CVE-2022-0487, CVSSv2 Score: 5.5
- Description:
moxart: fix potential use-after-free on remove path
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-0487
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2022-0487-moxart-fix-potential-use-after-free-on-remove-path.patch
- From: 5.4.0-110.124
- CVE-2022-0487, CVSSv2 Score: 5.5
- Description:
memstick: rtsx_usb_ms: fix UAF
- CVE: https://access.redhat.com/security/cve/CVE-2022-0487
- Patch: ubuntu-focal/5.4.0-110.124/CVE-2022-0487-memstick-rtsx_usb_ms-fix-UAF.patch
- From: 5.4.0-110.124
- CVE-2022-1116, CVSSv2 Score: 7.8
- Description:
io_uring: fix fs->users overflow
- CVE: https://ubuntu.com/security/CVE-2022-1116
- Patch: 5.4.0/CVE-2022-1116-io_uring-fix-fs.users-overflow.patch
- From: 5.4.0-113.127
- CVE-2022-30594, CVSSv2 Score: 7.8
- Description:
ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on
- CVE: https://ubuntu.com/security/CVE-2022-30594
- Patch: 5.4.0/CVE-2022-30594-ptrace-check-pt_suspend_seccomp-permission-on-pt_seized.patch
- From: 5.4.0-113.127
- CVE-2022-29581, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: fix netns refcount changes in
- CVE: https://ubuntu.com/security/CVE-2022-29581
- Patch: 5.4.0/CVE-2022-29581-cls_u32-fix-netns-refcount-changes-in-u32_change.patch
- From: 5.4.0-113.127
- CVE-2022-21499, CVSSv2 Score:
- Description:
Not affected without certain conditions - Secure Boot, configured kgdb/kdb. Complex adaptation
- CVE:
- Patch: skipped/CVE-2022-21499.patch
- From:
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: Use open-time cgroup namespace for process migration perm checks
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 5.4.0/CVE-2021-4197-cgroup-Use-open-time-credentials-for-process-migraton-perm.patch
- From: 5.4.181
- CVE-2021-4197, CVSSv2 Score: 6.3
- Description:
cgroup: Use open-time cgroup namespace for process migration perm checks(adaptation).
- CVE: https://access.redhat.com/security/cve/cve-2021-4197
- Patch: 5.4.0/CVE-2021-4197-cgroup-Use-open-time-credentials-for-process-migraton-perm-kpatch.patch
- From: 5.4.17-2136.308.7
- CVE-2022-1353, CVSSv2 Score: 7.1
- Description:
af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1353
- Patch: 5.10.0/CVE-2022-1353-af_key-add-__GFP_ZERO-flag-for-compose_sadb_supported-in-function-pfkey_register.patch
- From: 5.10.113-1
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: use true,false for bool variable
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/1329-fuse-use-true-false-for-bool-variable.patch
- From: kernel-4.18.0-348.el8
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: fix pipe buffer lifetime for direct_io
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/13194-fuse-fix-pipe-buffer-lifetime-for-direct_io.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2022-1011, CVSSv2 Score: 7.0
- Description:
fuse: fix pipe buffer lifetime for direct_io (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/cve-2022-1011
- Patch: 4.18.0/13194-fuse-fix-pipe-buffer-lifetime-for-direct_io-240-kpatch-1.patch
- From: kernel-4.18.0-372.9.1.el8
- CVE-2022-1158, CVSSv2 Score: N/A
- Description:
KVM: x86/mmu: do compare-and-exchange of gPTE via the user
- CVE: https://access.redhat.com/security/cve/CVE-2022-1158
- Patch: 5.4.17/CVE-2022-1158-KVM-x86-mmu-do-compare-and-exchange-of-gPTE-via-the-user-2102.patch
- From: 5.4.17-2136.306.1.3
- CVE-2022-1198, CVSSv2 Score: 5.1
- Description:
drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1198
- Patch: 5.10.0/CVE-2022-1198-drivers-hamradio-6pack-fix-UAF-bug-caused-by-mod_timer.patch
- From: 5.10.113-1
- CVE-2022-1516, CVSSv2 Score: 5.5
- Description:
net/x25: Fix null-ptr-deref caused by x25_disconnect
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1516
- Patch: 5.10.0/CVE-2022-1516-net-x25-Fix-null-ptr-deref-caused-by-x25_disconnect.patch
- From: 5.10.113-1
- CVE-2022-1966, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow non-stateful expression in sets earlier
- CVE: https://access.redhat.com/security/cve/cve-2022-1966
- Patch: 5.4.0/CVE-2022-1966-netfilter-nf_tables-disallow-non-stateful-expression-in-sets.patch
- From: linux_5.4.0-117.132
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: use init_tag from inithdr for ABORT chunk
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3772
- Patch: 5.10.0/978291-sctp-use-init_tag-from-inithdr-for-ABORT-chunk.patch
- From: v5.10.76
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: fix the processing for INIT_ACK chunk
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3772
- Patch: 5.10.0/978292-sctp-fix-the-processing-for-INIT_ACK-chunk.patch
- From: v5.10.76
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: fix the processing for COOKIE_ECHO chunk
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3772
- Patch: 5.10.0/978293-sctp-fix-the-processing-for-COOKIE_ECHO-chunk.patch
- From: v5.10.76
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_violation
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3772
- Patch: 5.10.0/978294-sctp-add-vtag-check-in-sctp_sf_violation.patch
- From: v5.10.76
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_do_8_5_1_E_sa
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3772
- Patch: 5.10.0/978295-sctp-add-vtag-check-in-sctp_sf_do_8_5_1_E_sa.patch
- From: v5.10.76
- CVE-2021-3772, CVSSv2 Score: 5.9
- Description:
sctp: add vtag check in sctp_sf_ootb
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-3772
- Patch: 5.10.0/978296-sctp-add-vtag-check-in-sctp_sf_ootb.patch
- From: v5.10.76
- CVE-2022-26966, CVSSv2 Score: 4.6
- Description:
sr9700: sanity check for packet length
- CVE: https://access.redhat.com/security/cve/CVE-2022-26966
- Patch: 5.4.17/CVE-2022-26966-sr9700-sanity-check-for-packet-length.patch
- From: 5.4.17-2136.306.1.3
- CVE-2022-24958, CVSSv2 Score: 6.2
- Description:
usb: gadget: clear related members when goto fail
- CVE: https://access.redhat.com/security/cve/CVE-2022-24958
- Patch: 5.10.0/CVE-2022-24958-2.patch
- From: 4.19.235-1
- CVE-2022-23040, CVSSv2 Score: 7.0
- Description:
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23040
- Patch: 5.4.0/CVE-2022-23040-xen-xenbus-dont-let-xenbus_grant_ring-remove-grants-in-error-case.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23036 CVE-2022-23038, CVSSv2 Score: 7.0
- Description:
xen/grant-table: add gnttab_try_end_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23036
- Patch: 5.4.0/CVE-2022-23036-CVE-2022-23038-xen-grant-table-add-gnttab_try_end_foreign_access.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23036, CVSSv2 Score: 7.0
- Description:
xen/blkfront: don't use gnttab_query_foreign_access() for mapped status
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23036
- Patch: 5.4.0/CVE-2022-23036-xen-blkfront-dont-use-gnttab_query_foreign_access-for-mapped-status-99.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23038, CVSSv2 Score: 7.0
- Description:
xen/scsifront: don't use gnttab_query_foreign_access() for mapped status
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23038
- Patch: 5.4.0/CVE-2022-23038-xen-scsifront-dont-use-gnttab_query_foreign_access-for-mapped-status.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23039, CVSSv2 Score: 7.0
- Description:
xen/gntalloc: don't use gnttab_query_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23037
- Patch: 5.4.0/CVE-2022-23039-xen-gntalloc-dont-use-gnttab_query_foreign_access.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23041, CVSSv2 Score: 7.0
- Description:
xen: remove gnttab_query_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: 5.4.0/CVE-2022-23041-xen-remove-gnttab_query_foreign_access.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23041, CVSSv2 Score: 7.0
- Description:
xen/9p: use alloc/free_pages_exact()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: 5.4.0/CVE-2022-23041-xen-9p-use-alloc-free_pages_exact.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23041, CVSSv2 Score: 7.0
- Description:
xen/pvcalls: use alloc/free_pages_exact()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: 5.4.0/CVE-2022-23041-xen-pvcalls-use-alloc-free_pages_exact.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23041, CVSSv2 Score: 7.0
- Description:
xen/gnttab: fix gnttab_end_foreign_access() without page specified
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: 5.4.0/CVE-2022-23041-xen-gnttab-fix-gnttab_end_foreign_access-without-page-specified.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23042, CVSSv2 Score: 7.0
- Description:
xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23042
- Patch: 5.4.0/CVE-2022-23042-xen-netfront-react-properly-to-failing-gnttab_end_foreign_access_ref-99.patch
- From: kernel-5.4.0-117.132
- CVE-2022-23041, CVSSv2 Score: 7.0
- Description:
xen/gnttab: fix gnttab_end_foreign_access() without page specified (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: 5.4.17/CVE-2022-23041-kpatch.patch
- From: 4.15.0-177.186
- CVE-2022-23042, CVSSv2 Score: 7.0
- Description:
xen/netfront: react properly to failing gnttab_end_foreign_access_ref() (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23042
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23042-kpatch.patch
- From: 4.15.0-177.186
- CVE-2022-28356, CVSSv2 Score: 7.5
- Description:
llc: fix netdevice reference leaks in llc_ui_bind()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-28356
- Patch: 5.10.0/CVE-2022-28356-llc-fix-netdevice-reference-leaks-in-llc_ui_bind.patch
- From: 5.10.113-1
- CVE-2022-28389, CVSSv2 Score: 7.8
- Description:
can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-28389
- Patch: 5.10.0/CVE-2022-28389-can-mcba_usb-mcba_usb_start_xmit-fix-double-dev_kfree_skb-in-error-path.patch
- From: 5.10.113-1
- CVE-2022-28390, CVSSv2 Score: 7.8
- Description:
can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-28390
- Patch: 5.10.0/CVE-2022-28390-can-ems_usb-ems_usb_start_xmit-fix-double-dev_kfree_skb-in-error-path.patch
- From: 5.10.113-1
- CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21127, CVSSv2 Score: 6.1
- Description:
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- CVE: https://access.redhat.com/security/cve/cve-2022-21127
- Patch: mmio-enable.patch
- From: 5.18
- CVE-2022-28388, CVSSv2 Score: 7.8
- Description:
can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-28388
- Patch: ubuntu-focal/5.4.0-121.137/0001-CVE-2022-28388-can-usb_8dev-usb_8dev_start_xmit-fix-double-dev_kfre.patch
- From: 5.4.0-121.137
- CVE-2022-1199, CVSSv2 Score: 7.5
- Description:
ax25: improve the incomplete fix to avoid UAF and NPD bugs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1199
- Patch: ubuntu-focal/5.4.0-122.138/CVE-2022-1199-ax25-NPD-bug-when-detaching-AX25-device.patch
- From: N/A
- CVE-2022-1199, CVSSv2 Score: 7.5
- Description:
ax25: improve the incomplete fix to avoid UAF and NPD bugs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1199
- Patch: ubuntu-focal/5.4.0-122.138/CVE-2022-1199-ax25-improve-the-incomplete-fix-to-avoid-UAF-and-NPD-bugs.patch
- From: N/A
- CVE-2022-1199, CVSSv2 Score: 7.5
- Description:
ax25: improve the incomplete fix to avoid UAF and NPD bugs
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1199
- Patch: ubuntu-focal/5.4.0-122.138/CVE-2022-1199-ax25-Fix-NULL-pointer-dereference-in-ax25_kill_by_device.patch
- From: N/A
- CVE-2022-1204, CVSSv2 Score: 5.1
- Description:
[PATCH] ax25: add refcount in ax25_dev to avoid UAF bugs
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1204
- Patch: ubuntu-focal/5.4.0-122.138/0001-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-add-refcount-in-ax25_dev-to-avoid-UAF-bugs.patch
- From: 5.4.0-122.138
- CVE-2022-1204, CVSSv2 Score: 5.1
- Description:
[PATCH] ax25: fix reference count leaks of ax25_dev
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1204
- Patch: ubuntu-focal/5.4.0-122.138/0002-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-fix-reference-count-leaks-of-ax25_dev.patch
- From: 5.4.0-122.138
- CVE-2022-1204, CVSSv2 Score: 5.1
- Description:
[PATCH] ax25: fix UAF bugs of net_device caused by rebinding
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1204
- Patch: ubuntu-focal/5.4.0-122.138/0003-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-fix-UAF-bugs-of-net_device-caused-by-rebinding-.patch
- From: 5.4.0-122.138
- CVE-2022-1204, CVSSv2 Score: 5.1
- Description:
[PATCH] ax25: Fix refcount leaks caused by ax25_cb_del()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1204
- Patch: ubuntu-focal/5.4.0-122.138/0004-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-Fix-refcount-leaks-caused-by-ax25_cb_del.patch
- From: 5.4.0-122.138
- CVE-2022-1204, CVSSv2 Score: 5.1
- Description:
[PATCH] ax25: fix UAF bug in ax25_send_control()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1204
- Patch: ubuntu-focal/5.4.0-122.138/0005-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-fix-UAF-bug-in-ax25_send_control.patch
- From: 5.4.0-122.138
- CVE-2022-1199, CVSSv2 Score: 5.1
- Description:
[PATCH] ax25: fix NPD bug in ax25_disconnect
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1199
- Patch: ubuntu-focal/5.4.0-122.138/0006-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-fix-NPD-bug-in-ax25_disconnect.patch
- From: 5.4.0-122.138
- CVE-2022-1205, CVSSv2 Score: 5.1
- Description:
[PATCH] ax25: Fix NULL pointer dereferences in ax25 timers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1205
- Patch: ubuntu-focal/5.4.0-122.138/0007-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-Fix-NULL-pointer-dereferences-in-ax25-timers.patch
- From: 5.4.0-122.138
- CVE-2022-1205, CVSSv2 Score: 5.1
- Description:
[PATCH] ax25: Fix UAF bugs in ax25 timers
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1205
- Patch: ubuntu-focal/5.4.0-122.138/0008-CVE-2022-1199-CVE-2022-1204-CVE-2022-1205-ax25-Fix-UAF-bugs-in-ax25-timers.patch
- From: 5.4.0-122.138
- CVE-2022-1204, CVSSv2 Score: 5.1
- Description:
ax25: add refcount in ax25_dev to avoid UAF bugs (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1204
- Patch: 5.10.0/CVE-2022-1204-kpatch.patch
- From: 5.10.113-1
- CVE-2022-33981, CVSSv2 Score: 3.3
- Description:
floppy: disable FDRAWCMD by default
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-33981
- Patch: ubuntu-focal/5.4.0-122.138/0009-CVE-2022-33981-floppy-disable-FDRAWCMD-by-default.patch
- From: 5.4.0-122.138
- CVE-2022-33981, CVSSv2 Score: 3.3
- Description:
floppy: disable FDRAWCMD by default (adaptation)
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-33981
- Patch: ubuntu-focal/5.4.0-122.138/CVE-2022-33981-kpatch.patch
- From: 5.4.0-122.138
- CVE-2022-1195, CVSSv2 Score: 5.5
- Description:
hamradio: defer 6pack kfree after unregister_netdev
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1195
- Patch: ubuntu-focal/5.4.0-122.138/0010-CVE-2022-1195-hamradio-defer-6pack-kfree-after-unregister_netdev.patch
- From: 5.4.0-122.138
- CVE-2022-1195, CVSSv2 Score: 5.5
- Description:
hamradio: remove needs_free_netdev to avoid UAF
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1195
- Patch: ubuntu-focal/5.4.0-122.138/0011-CVE-2022-1195-hamradio-remove-needs_free_netdev-to-avoid-UAF.patch
- From: 5.4.0-122.138
- CVE-2022-1652, CVSSv2 Score: 7.8
- Description:
floppy: use a statically allocated error counter
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: ubuntu-focal/5.4.0-124.140/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter.patch
- From: 5.4.0-124.140
- CVE-2022-1652, CVSSv2 Score: 7.8
- Description:
floppy: use a statically allocated error counter (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: ubuntu-focal/5.4.0-124.140/CVE-2022-1652-kpatch.patch
- From: 5.4.0-124.140
- CVE-2022-1734, CVSSv2 Score: 7.0
- Description:
nfc: nfcmrvl: main: reorder destructive operations in
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1734
- Patch: ubuntu-focal/5.4.0-124.140/0001-CVE-2022-1734-nfc-nfcmrvl-main-reorder-destructive-operations-in-n.patch
- From: 5.4.0-124.140
- CVE-2022-28893, CVSSv2 Score: 7.8
- Description:
[PATCH] SUNRPC: Ensure we flush any closed sockets before
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-28893
- Patch: ubuntu-focal/5.4.0-124.140/0002-CVE-2022-28893-SUNRPC-Ensure-we-flush-any-closed-sockets-before-xs_.patch
- From: 5.4.0-124.140
- CVE-2022-28893, CVSSv2 Score: 7.8
- Description:
[PATCH] SUNRPC: Don't leak sockets in xs_local_connect()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-28893
- Patch: ubuntu-focal/5.4.0-124.140/0003-CVE-2022-28893-SUNRPC-Don-t-leak-sockets-in-xs_local_connect.patch
- From: 5.4.0-124.140
- CVE-2022-1679, CVSSv2 Score: 7.8
- Description:
[PATCH v4 1/2] ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1679
- Patch: ubuntu-focal/5.4.0-124.140/0004-CVE-2022-1679-UBUNTU-SAUCE-ath9k-fix-use-after-free-in-ath9k_hif_u.patch
- From: 5.4.0-124.140
- CVE-2022-1974, CVSSv2 Score: 6.8
- Description:
nfc: replace improper check device_is_registered() in netlink related
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1974
- Patch: ubuntu-focal/5.4.0-124.140/0006-CVE-2022-1974-nfc-replace-improper-check-device_is_registered-in-n.patch
- From: 5.4.0-124.140
- CVE-2022-1975, CVSSv2 Score: 4.5
- Description:
NFC: netlink: fix sleep in atomic bug when firmware download timeout
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1975
- Patch: ubuntu-focal/5.4.0-124.140/0007-CVE-2022-1975-NFC-netlink-fix-sleep-in-atomic-bug-when-firmware-do.patch
- From: 5.4.0-124.140
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1048
- Patch: ubuntu-focal/5.4.0-124.140/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-hw_params-and-hw_free-calls.patch
- From: 5.4.0-124.140
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent read/write and buffer changes
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1048
- Patch: ubuntu-focal/5.4.0-124.140/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-read-write-and-buffer-changes.patch
- From: 5.4.0-124.140
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1048
- Patch: ubuntu-focal/5.4.0-124.140/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prepare-and-hw_params-hw_free-calls.patch
- From: 5.4.0-124.140
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent prealloc proc writes
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-1048
- Patch: ubuntu-focal/5.4.0-124.140/0009-CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prealloc-proc-wr.patch
- From: 5.4.0-124.140
- CVE-2022-1048, CVSSv2 Score: 7.0
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.4.17/CVE-2022-1048-kpatch.patch
- From: 5.4.17-2136.308.7
- CVE-2022-34918, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: stricter validation of element data
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-34918
- Patch: ubuntu-focal/5.4.0-124.140/0010-CVE-2022-34918-netfilter-nf_tables-stricter-validation-of-element-d.patch
- From: 5.4.0-124.140
- CVE-2022-2588, CVSSv2 Score: 7.8
- Description:
UBUNTU: SAUCE: net_sched: cls_route: remove from list when handle is 0
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-2588
- Patch: ubuntu-focal/5.4.0-124.140/CVE-2022-2588-UBUNTU-SAUCE-net_sched-cls_route-remove-from-list-when-handle-is-0.patch
- From: 5.4.0-124.140
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
UBUNTU: SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- CVE: https://access.redhat.com/security/cve/cve-2022-2586
- Patch: ubuntu-focal/5.4.0-124.140/0011-CVE-2022-2586-UBUNTU-SAUCE-netfilter-nf_tables-do-not-allow-SET_ID.patch
- From: 5.4.0-124.140
- CVE-2022-2586, CVSSv2 Score: 6.7
- Description:
UBUNTU: SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another table
- CVE: https://access.redhat.com/security/cve/cve-2022-2586
- Patch: ubuntu-focal/5.4.0-124.140/0012-CVE-2022-2586-UBUNTU-SAUCE-netfilter-nf_tables-do-not-allow-RULE_I.patch
- From: 5.4.0-124.140
- CVE-2021-33656, CVSSv2 Score: 7.8
- Description:
vt: drop old FONT ioctls
- CVE: https://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-33656
- Patch: ubuntu-focal/5.4.0-125.141/0005-vt-drop-old-FONT-ioctls.patch
- From: 5.4.0-125.141
- CVE-2021-33061, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2021-33061.patch
- From:
- CVE-2022-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Disallow setting font bigger than screen size
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33655
- Patch: 5.4.0/CVE-2021-33655-fbcon-disallow-setting-font-bigger-than-screen-size.patch
- From: 5.4.209-116.363
- CVE-2022-33655, CVSSv2 Score: 6.7
- Description:
fbcon: Prevent that screen size is smaller than font size
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33655
- Patch: 5.4.0/CVE-2021-33655-fbcon-prevent-that-screen-size-is-smaller-than-font-size.patch
- From: 5.4.209-116.363
- CVE-2022-33655, CVSSv2 Score: 6.7
- Description:
fbmem: Check virtual screen sizes in fb_set_var()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33655
- Patch: 5.4.0/CVE-2021-33655-fbmem-check-virtual-screen-sizes-in-fb_set_var.patch
- From: 5.4.209-116.363
- CVE-2022-32296, CVSSv2 Score: 3.3
- Description:
tcp: change source port randomizarion at connect() time
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-32296
- Patch: 5.4.0/CVE-2022-32296-tcp-change-source-port-randomizarion-at-connect-time.patch
- From: 5.4.0-126.142
- CVE-2022-1012, CVSSv2 Score: 8.2
- Description:
secure_seq: use the 64 bits of the siphash for port offset
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1012
- Patch: 5.4.0/CVE-2022-1012-secure_seq-use-the-64-bits-of-the-siphash-for-port-offset-1.patch
- From: 5.4.0-126.142
- CVE-2022-1012, CVSSv2 Score: 8.2
- Description:
tcp: use different parts of the port_offset for index and
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1012
- Patch: 5.4.0/CVE-2022-1012-tcp-use-different-parts-of-the-port_offset-for-index-and-offset.patch
- From: 5.4.0-126.142
- CVE-2022-32296, CVSSv2 Score: 3.3
- Description:
tcp: increase source port perturb table to 2^16
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-32296
- Patch: 5.4.0/CVE-2022-32296-tcp-dynamically-allocate-the-perturb-table-used-by-source-ports.patch
- From: 5.4.0-126.142
- CVE-2022-32296, CVSSv2 Score: 3.3
- Description:
tcp: increase source port perturb table to 2^16
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-32296
- Patch: 5.4.0/CVE-2022-32296-tcp-increase-source-port-perturb-table-to-2-16.patch
- From: 5.4.0-126.142
- CVE-2022-32296, CVSSv2 Score: 3.3
- Description:
tcp: change source port randomizarion at connect() time (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-32296
- Patch: 5.4.0/CVE-2022-32296-tcp-change-source-port-randomizarion-at-connect-time-kpatch.patch
- From: 5.4.0-126.142
- CVE-2022-1729, CVSSv2 Score: 7.0
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://access.redhat.com/security/cve/CVE-2022-1729
- Patch: 5.4.17/CVE-2022-1729-perf-Fix-sys-perf-event-open-race-against-itself.patch
- From: 5.4.17-2136.307.3.2.el8uek
- CVE-2022-2503, CVSSv2 Score: 6.7
- Description:
dm verity: set DM_TARGET_IMMUTABLE feature flag
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2503
- Patch: 5.4.0/CVE-2022-2503-dm-verity-set-DM_TARGET_IMMUTABLE-feature-flag.patch
- From: 5.4.0-126.142
- CVE-2022-2503, CVSSv2 Score: 6.7
- Description:
dm verity: set DM_TARGET_IMMUTABLE feature flag (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2503
- Patch: 5.4.0/CVE-2022-2503-kpatch.patch
- From: 5.4.0-126.142
- CVE-2022-36946, CVSSv2 Score: 7.5
- Description:
netfilter: nf_queue: do not allow packet truncation below
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-36946
- Patch: 5.10.0/CVE-2022-36946-netfilter-nf_queue-do-not-allow-packet-truncation-below.patch
- From: 5.10.136-1
- CVE-2022-3577, CVSSv2 Score: 7.8
- Description:
HID: bigben: fix slab-out-of-bounds Write in bigben_probe
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3577
- Patch: ubuntu-focal/5.4.0-125.141/CVE-2022-3577-hid-bigben-fix-slab-out-of-bounds-write-in-bigben_probe.patch
- From: 5.4.0-126.142
- CVE-2022-3115, CVSSv2 Score: 5.5
- Description:
drm: mali-dp: potential dereference of null pointer
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-3115
- Patch: ubuntu-focal/5.4.0-126.142/CVE-2022-3115-drm-mali-dp-potential-dereference-of-null-pointer.patch
- From: 5.4.0-126.142
- CVE-2021-4159, CVSSv2 Score: 4.4
- Description:
bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-4159
- Patch: 4.14.0/CVE-2021-4159-bpf-Verifer-adjust_scalar_min_max_vals-to-always-call.patch
- From: kernel-4.14.273-207.502.amzn2
- CVE-2022-20369, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-20369.patch
- From:
- CVE-2022-2318, CVSSv2 Score: 5.5
- Description:
net: rose: fix UAF bugs caused by timer handler
- CVE: https://access.redhat.com/security/cve/CVE-2022-2318
- Patch: 5.4.0/CVE-2022-2318-net-rose-fix-UAF-bugs-caused-by-timer-handler.patch
- From: 5.4.0-126.142
- CVE-2022-2318, CVSSv2 Score: 5.5
- Description:
net: rose: fix UAF bugs caused by timer handler (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2318
- Patch: 5.15.0/CVE-2022-2318-net-rose-fix-UAF-bugs-caused-by-timer-handler-kpatch.patch
- From: 5.15.0-48.54
- CVE-2022-26365, CVSSv2 Score: 7.1
- Description:
xen/blkfront: fix leaking data in shared pages
- CVE: https://ubuntu.com/security/CVE-2022-26365
- Patch: 5.4.0/CVE-2022-26365-xen-blkfront-fix-leaking-data-in-shared-pages-2.patch
- From: 5.4.0-126.142
- CVE-2022-3176, CVSSv2 Score: 7.8
- Description:
io_uring: disable polling pollfree files
- CVE: https://access.redhat.com/security/cve/CVE-2022-3176
- Patch: 5.4.0/CVE-2022-3176-io_uring-disable-polling-pollfree-files.patch
- From: 5.4.0-126.142
- CVE-2022-3176, CVSSv2 Score: 7.8
- Description:
io_uring: disable polling pollfree files (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-3176
- Patch: 5.4.0/CVE-2022-3176-io_uring-disable-polling-pollfree-files-kpatch.patch
- From: 5.4.0-126.142
- CVE-2022-33740, CVSSv2 Score: 7.1
- Description:
xen/netfront: fix leaking data in shared pages
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33740
- Patch: 5.4.0/CVE-2022-33740-xen-netfront-fix-leaking-data-in-shared-pages.patch
- From: v5.4
- CVE-2022-33741, CVSSv2 Score: 7.1
- Description:
xen/netfront: force data bouncing when backend is untrusted
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33741
- Patch: 5.4.0/CVE-2022-33741-xen-netfront-force-data-bouncing-when-backend-is-untrusted-2.patch
- From: 5.4.0-126.142
- CVE-2022-33741, CVSSv2 Score: 7.1
- Description:
xen/netfront: force data bouncing when backend is untrusted (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-33741
- Patch: 5.4.0/CVE-2022-33741-xen-netfront-force-data-bouncing-when-backend-is-untrusted-kpatch-2.patch
- From: 5.4.0-126.142
- CVE-2022-33742, CVSSv2 Score: 7.1
- Description:
xen/blkfront: force data bouncing when backend is untrusted
- CVE: https://ubuntu.com/security/CVE-2022-33742
- Patch: 5.4.0/CVE-2022-33742-xen-blkfront-force-data-bouncing-when-backend-is-untrusted.patch
- From: 5.4.0-126.142
- CVE-2022-33742, CVSSv2 Score: 7.1
- Description:
xen/blkfront: force data bouncing when backend is untrusted (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33742
- Patch: 5.4.0/CVE-2022-33742-kpatch.patch
- From: 5.4.0-126.142
- CVE-2022-33744, CVSSv2 Score:
- Description:
Out of scope - ARM architecture.
- CVE:
- Patch: skipped/CVE-2022-33744.patch
- From:
- CVE-2022-36879, CVSSv2 Score: 5.5
- Description:
xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-36879
- Patch: 5.10.0/CVE-2022-36879-xfrm-xfrm_policy-fix-a-possible-double-xfrm_pols_put-in.patch
- From: 5.10.136-1
- CVE-2022-20566, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put
- CVE: https://ubuntu.com/security/CVE-2022-20566
- Patch: ubuntu-focal/5.4.0-128.144/CVE-2022-20566-bluetooth-L2CAP-fix-use-after-free-caused-by-l2cap_chan_put.patch
- From: 5.4.0-128.144
- CVE-2022-1462, CVSSv2 Score: 6.3
- Description:
tty: extract tty_flip_buffer_commit() from tty_flip_buffer_push()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1462
- Patch: ubuntu-focal/5.4.0-128.144/CVE-2022-1462-tty-extract-tty_flip_buffer_commit-from-tty_flip_buffer_push.patch
- From: 5.4.0-128.144
- CVE-2022-1462, CVSSv2 Score: 6.3
- Description:
tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1462
- Patch: ubuntu-focal/5.4.0-128.144/CVE-2022-1462-tty-use-new-tty_insert_flip_string_and_push_buffer-in-pty_write.patch
- From: 5.4.0-128.144
- CVE-2022-2602, CVSSv2 Score: 8.8
- Description:
io_uring/af_unix: defer registered files gc to io_uring release
- CVE: https://www.zerodayinitiative.com/advisories/ZDI-22-1462/
- Patch: 5.4.0/CVE-2022-2602-io_uring-af_unix-defer-registered-files-gc.patch
- From: 5.4.0-131.147
- CVE-2022-2602, CVSSv2 Score: 8.8
- Description:
io_uring/af_unix: defer registered files gc to io_uring release
- CVE: https://www.zerodayinitiative.com/advisories/ZDI-22-1462/
- Patch: 5.4.0/CVE-2022-2602-io_uring-af_unix-defer-registered-files-gc-kpatch.patch
- From: 5.4.0-131.147
- CVE-2022-2602, CVSSv2 Score: 8.8
- Description:
UBUNTU: SAUCE: io_uring/af_unix: fix memleak during unix GC
- CVE: https://www.zerodayinitiative.com/advisories/ZDI-22-1462/
- Patch: 5.4.0/CVE-2022-2602-io_uring-af_unix-fix-memleak-during-unix-GC.patch
- From: 5.4.0-131.147
- CVE-2022-41674, CVSSv2 Score: 8.1
- Description:
wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-41674
- Patch: 5.4.0/CVE-2022-41674-wifi-cfg80211-fix-u8-overflow-in-cfg80211_update_notlisted_nontrans.patch
- From: 5.4.0-131.147
- CVE-2022-42720, CVSSv2 Score: 7.8
- Description:
wifi: cfg80211: fix BSS refcounting bugs
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-42720
- Patch: 5.4.0/CVE-2022-42720-wifi-cfg80211-fix-BSS-refcounting-bugs-1.patch
- From: 5.4.0-131.147
- CVE-2022-42721, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: avoid nontransmitted BSS list corruption
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-42721
- Patch: 5.4.0/CVE-2022-42721-wifi-cfg80211-avoid-nontransmitted-BSS-list-corruption-1.patch
- From: 5.4.0-131.147
- CVE-2022-40768, CVSSv2 Score: 5.5
- Description:
scsi: stex: Properly zero out the passthrough command structure
- CVE: https://ubuntu.com/security/CVE-2022-40768
- Patch: ubuntu-focal/5.4.0-132.148/0001-CVE-2022-40768-scsi-stex-Properly-zero-out-the-passthrough-command-.patch
- From: 5.4.0-132.148
- CVE-2022-3028, CVSSv2 Score: 7.0
- Description:
[PATCH] af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://ubuntu.com/security/CVE-2022-3028
- Patch: ubuntu-focal/5.4.0-132.148/0002-CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
- From: 5.4.0-132.148
- CVE-2022-41222, CVSSv2 Score: 7.0
- Description:
mm/mremap: hold the rmap lock in write mode when moving page table
- CVE: https://ubuntu.com/security/CVE-2022-41222
- Patch: ubuntu-focal/5.4.0-132.148/0003-CVE-2022-41222-mm-mremap-hold-the-rmap-lock-in-write-mode-when-movi.patch
- From: 5.4.0-132.148
- CVE-2022-20422, CVSSv2 Score:
- Description:
ARM related CVE.
- CVE:
- Patch: skipped/CVE-2022-20422.patch
- From:
- CVE-2022-3625, CVSSv2 Score: 7.8
- Description:
devlink: Fix use-after-free after a failed reload
- CVE: https://ubuntu.com/security/CVE-2022-3625
- Patch: ubuntu-focal/5.4.0-132.148/0007-CVE-2022-3625-devlink-Fix-use-after-free-after-a-failed-reload.patch
- From: 5.4.0-132.148
- CVE-2022-3635, CVSSv2 Score: 7.0
- Description:
atm: idt77252: fix use-after-free bugs caused by tst_timer
- CVE: https://ubuntu.com/security/CVE-2022-3635
- Patch: ubuntu-focal/5.4.0-132.148/0008-CVE-2022-3635-atm-idt77252-fix-use-after-free-bugs-caused-by-tst_t.patch
- From: 5.4.0-132.148
- CVE-2022-2978, CVSSv2 Score: 7.8
- Description:
fs: fix UAF/GPF bug in nilfs_mdt_destroy
- CVE: https://ubuntu.com/security/CVE-2022-2978
- Patch: ubuntu-focal/5.4.0-132.148/0001-CVE-2022-2978-fs-fix-UAF-GPF-bug-in-nilfs_mdt_destroy.patch
- From: 5.4.0-132.148
- CVE-2022-42719, CVSSv2 Score: 8.8
- Description:
wifi: mac80211: don't parse mbssid in assoc response
- CVE: https://ubuntu.com/security/CVE-2022-42719
- Patch: ubuntu-focal/5.4.0-132.148/0001-mac80211-mlme-find-auth-challenge-directly.patch
- From: 5.4.0-132.148
- CVE-2022-42719, CVSSv2 Score: 8.8
- Description:
wifi: mac80211: don't parse mbssid in assoc response
- CVE: https://ubuntu.com/security/CVE-2022-42719
- Patch: ubuntu-focal/5.4.0-132.148/0002-wifi-mac80211-don-t-parse-mbssid-in-assoc-response.patch
- From: 5.4.0-132.148
- CVE-2022-42719, CVSSv2 Score: 8.8
- Description:
wifi: mac80211: fix MBSSID parsing use-after-free
- CVE: https://ubuntu.com/security/CVE-2022-42719
- Patch: ubuntu-focal/5.4.0-132.148/0003-wifi-mac80211-fix-MBSSID-parsing-use-after-free.patch
- From: 5.4.0-132.148
- CVE-2022-42719, CVSSv2 Score: 8.8
- Description:
adaptation
- CVE: https://ubuntu.com/security/CVE-2022-42719
- Patch: ubuntu-focal/5.4.0-132.148/CVE-2022-42719-kpatch.patch
- From: 5.4.0-132.148
- CVE-2022-39188, CVSSv2 Score: 4.7
- Description:
mm: Fix TLB flush for not-first PFNMAP mappings in unmap_region()
- CVE: https://ubuntu.com/security/CVE-2022-39188
- Patch: ubuntu-focal/5.4.0-132.148/0001-mm-Force-TLB-flush-for-PFNMAP-mappings-before-unlink.patch
- From: 5.4.0-132.148
- CVE-2022-39188, CVSSv2 Score: 4.7
- Description:
mm: Fix TLB flush for not-first PFNMAP mappings in unmap_region()
- CVE: https://ubuntu.com/security/CVE-2022-39188
- Patch: ubuntu-focal/5.4.0-132.148/0001-mm-Fix-TLB-flush-for-not-first-PFNMAP-mappings-in-un.patch
- From: 5.4.0-132.148
- CVE-2022-29900, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-29900.patch
- From:
- CVE-2022-29901, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-29901.patch
- From:
- CVE-2022-26373, CVSSv2 Score:
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-26373.patch
- From:
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: add missing compat KVM_CLEAR_DIRTY_LOG
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: ubuntu-focal/5.4.0-132.148/CVE-2022-2153-KVM-add-missing-compat-KVM_CLEAR_DIRTY_LOG.patch
- From: 5.4.0-132.148
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: Add infrastructure and macro to mark VM as bugged
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: ubuntu-focal/5.4.0-132.148/0001-KVM-Add-infrastructure-and-macro-to-mark-VM-as-bugge.patch
- From: 5.4.0-132.148
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
[PATCH] KVM: x86: Check lapic_in_kernel() before attempting to set a
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: ubuntu-focal/5.4.0-132.148/0002-KVM-x86-Check-lapic_in_kernel-before-attempting-to-s.patch
- From: 5.4.0-132.148
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: x86: Avoid theoretical NULL pointer dereference in
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: ubuntu-focal/5.4.0-132.148/0003-KVM-x86-Avoid-theoretical-NULL-pointer-dereference-i.patch
- From: 5.4.0-132.148
- CVE-2022-2153, CVSSv2 Score: 5.5
- Description:
KVM: x86: Check lapic_in_kernel() before attempting to set a ( adaptation )
- CVE: https://ubuntu.com/security/CVE-2022-2153
- Patch: ubuntu-focal/5.4.0-132.148/CVE-2022-2153-kpatch-81.patch
- From: 5.4.0-132.148
- CVE-2022-3594, CVSSv2 Score: 7.5
- Description:
r8152: Rate limit overflow messages
- CVE: https://ubuntu.com/security/CVE-2022-3594
- Patch: ubuntu-focal/5.4.0-135.152/0001-CVE-2022-3594-r8152-Rate-limit-overflow-messages.patch
- From: 5.4.0-135.152
- CVE-2022-3564, CVSSv2 Score: 8.0
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://ubuntu.com/security/CVE-2022-3564
- Patch: ubuntu-focal/5.4.0-135.152/0003-CVE-2022-3564-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_r.patch
- From: 5.4.0-135.152
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-focal/5.4.0-135.152/0001-mISDN-fix-use-after-free-bugs-in-l1oip-timer-handler.patch
- From: 5.4.0-135.152
- CVE-2022-3565, CVSSv2 Score: 8.0
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-focal/5.4.0-135.152/CVE-2022-3565-kpatch.patch
- From: 5.4.0-135.152
- CVE-2022-3621, CVSSv2 Score: 7.5
- Description:
nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
- CVE: https://ubuntu.com/security/CVE-2022-3621
- Patch: ubuntu-focal/5.4.0-135.152/0008-CVE-2022-3621-nilfs2-fix-NULL-pointer-dereference-at-nilfs_bmap_lo.patch
- From: 5.4.0-135.152
- CVE-2022-3061, CVSSv2 Score: 5.5
- Description:
video: fbdev: i740fb: Error out if 'pixclock' equals zero
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
- Patch: 5.10.0/CVE-2022-3061.patch
- From: v5.18
- CVE-2022-40307, CVSSv2 Score: 4.7
- Description:
efi: capsule-loader: Fix use-after-free in efi_capsule_write
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-40307
- Patch: 4.19.0/CVE-2022-40307-efi-capsule-loader-fix-use-after-free-in-efi_capsule_write.patch
- From: 4.19.260-1
- CVE-2022-40307, CVSSv2 Score: 4.7
- Description:
efi: capsule-loader: Fix use-after-free in efi_capsule_write (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-40307
- Patch: 4.19.0/CVE-2022-40307-efi-capsule-loader-fix-use-after-free-in-efi_capsule_write-kpatch.patch
- From: 4.19.260-1
- CVE-2022-20421, CVSSv2 Score: 7.8
- Description:
binder: fix UAF of ref->proc caused by race condition
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-20421
- Patch: 5.10.0/CVE-2022-20421.patch
- From: v5.19
- CVE-2022-2663, CVSSv2 Score: 5.3
- Description:
netfilter: nf_conntrack_irc: Tighten matching on DCC message
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
- Patch: 5.10.0/CVE-2022-2663.patch
- From: v5.19
- CVE-2022-3303, CVSSv2 Score: 4.7
- Description:
ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3303
- Patch: 5.10.0/CVE-2022-3303.patch
- From: v5.19
- CVE-2022-4095, CVSSv2 Score: 6.3
- Description:
staging: rtl8712: fix use after free bugs
- CVE: https://ubuntu.com/security/CVE-2022-4095
- Patch: ubuntu-focal/5.4.0-136.153/0003-CVE-2022-4095-staging-rtl8712-fix-use-after-free-bugs.patch
- From: 5.4.0-136.153
- CVE-2022-3586, CVSSv2 Score: 5.5
- Description:
sch_sfb: Don't assume the skb is still around after enqueueing to child
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3586
- Patch: 5.10.0/CVE-2022-3586-sch_sfb-Don-t-assume-the-skb-is-still-around-after-enqueueing-to-child.patch
- From: kernel-5.10.149-1
- CVE-2022-3586, CVSSv2 Score: 5.5
- Description:
sch_sfb: Also store skb len before calling child enqueue
- CVE: https://ubuntu.com/security/CVE-2022-3586
- Patch: ubuntu-focal/5.4.0-136.153/0006-CVE-2022-3586-sch_sfb-Also-store-skb-len-before-calling-child-enqu.patch
- From: 5.4.0-136.153
- CVE-2022-39842, CVSSv2 Score: 6.1
- Description:
pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-39842
- Patch: 5.4.0/CVE-2022-39842.patch
- From: v5.19
- CVE-2022-43750, CVSSv2 Score: 7.8
- Description:
usb: mon: make mmapped memory read only
- CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
- Patch: 4.14.0/CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
- From: 5.19.15
- CVE-2022-3646, CVSSv2 Score: 5.3
- Description:
nilfs2: fix leak of nilfs_root in case of writer thread creation failure
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-3646.html
- Patch: 5.4.0/CVE-2022-3646-nilfs2-fix-NULL-pointer-dereference-at-nilfs_bmap_lo.patch
- From: kernel-5.4.219-126.410
- CVE-2022-4662, CVSSv2 Score: 5.5
- Description:
USB: core: Prevent nested device-reset calls (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-4662
- Patch: ubuntu-focal/5.4.0-133.149/CVE-2022-4662-USB-core-Prevent-nested-device-reset-calls.patch
- From: kernel-5.4.0-133.149
- CVE-2022-4662, CVSSv2 Score: 5.5
- Description:
USB: core: Prevent nested device-reset calls (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-4662
- Patch: ubuntu-focal/5.4.0-133.149/CVE-2022-4662-usb-core-prevent-nested-device-reset-calls-kpatch.patch
- From: kernel-5.4.0-133.149
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://ubuntu.com/security/CVE-2022-42896
- Patch: ubuntu-focal/5.4.0-137.154/0001-CVE-2022-42896-CVE-2022-45934-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
- From: 5.4.0-137.154
- CVE-2022-3643, CVSSv2 Score: 10.0
- Description:
xen/netback: Ensure protocol headers don't fall in the non-linear area
- CVE: https://ubuntu.com/security/CVE-2022-3643
- Patch: 5.15.0/CVE-2022-3643-0001-xen-netback-Ensure-protocol-headers-don-t-fall-in-th.patch
- From: 5.15.0-58.64
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: 5.15.0/CVE-2022-42896-0002-Bluetooth-L2CAP-Fix-l2cap_global_chan_by_psm.patch
- From: 5.15.0-58.64
- CVE-2022-45934, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: 5.15.0/CVE-2022-45934-0001-Bluetooth-L2CAP-Fix-u8-overflow.patch
- From: 5.15.0-58.64
- CVE-2022-43945, CVSSv2 Score: 8.8
- Description:
NFSD: Cap rsize_bop result based on send buffer size
- CVE: https://ubuntu.com/security/CVE-2022-43945
- Patch: ubuntu-focal/5.4.0-137.154/0004-CVE-2022-43945-NFSD-Cap-rsize_bop-result-based-on-send-buffer-size.patch
- From: 5.4.0-137.154
- CVE-2022-3649, CVSSv2 Score: 7.0
- Description:
nilfs2: fix use-after-free bug of struct nilfs_root
- CVE: https://ubuntu.com/security/CVE-2022-3649
- Patch: ubuntu-focal/5.4.0-139.156/0001-CVE-2022-3649-nilfs2-fix-use-after-free-bug-of-struct-nilfs_root.patch
- From: 5.4.0-139.156
- CVE-2023-20928, CVSSv2 Score: 7.8
- Description:
binder: fix UAF of alloc->vma in race with munmap()
- CVE: https://ubuntu.com/security/CVE-2023-20928
- Patch: ubuntu-focal/5.4.0-139.156/0002-binder-fix-UAF-of-alloc-vma-in-race-with-munmap.patch
- From: 5.4.0-139.156
- CVE-2022-3640, CVSSv2 Score: 8.8
- Description:
[PATCH] Bluetooth: L2CAP: Fix attempting to access uninitialized
- CVE: https://ubuntu.com/security/CVE-2022-3640
- Patch: ubuntu-focal/5.4.0-139.156/0004-CVE-2022-3640-Bluetooth-L2CAP-fix-use-after-free-in-l2cap_conn_del.patch
- From: 5.4.0-139.156
- CVE-2022-42895, CVSSv2 Score: 6.5
- Description:
[PATCH] Bluetooth: L2CAP: Fix attempting to access uninitialized
- CVE: https://ubuntu.com/security/CVE-2022-42895
- Patch: ubuntu-focal/5.4.0-139.156/0005-CVE-2022-42895-Bluetooth-L2CAP-Fix-attempting-to-access-uninitializ.patch
- From: 5.4.0-139.156
- CVE-2022-41850, CVSSv2 Score: 4.7
- Description:
roccat: Fix use-after-free in roccat_read()
- CVE: https://ubuntu.com/security/CVE-2022-41850
- Patch: ubuntu-focal/5.4.0-139.156/0006-CVE-2022-41850-HID-roccat-Fix-use-after-free-in-roccat_read.patch
- From: 5.4.0-139.156
- CVE-2022-3628, CVSSv2 Score: 6.6
- Description:
wifi: brcmfmac: Fix potential buffer overflow in
- CVE: https://ubuntu.com/security/CVE-2022-3628
- Patch: ubuntu-focal/5.4.0-139.156/0007-CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf.patch
- From: 5.4.0-139.156
- CVE-2022-41849, CVSSv2 Score: 4.2
- Description:
fbdev: smscufx: Fix use-after-free in ufx_ops_open()
- CVE: https://ubuntu.com/security/CVE-2022-41849
- Patch: ubuntu-focal/5.4.0-139.156/0008-CVE-2022-41849-fbdev-smscufx-Fix-use-after-free-in-ufx_ops_open.patch
- From: 5.4.0-139.156
- CVE-2022-3545, CVSSv2 Score: 7.8
- Description:
nfp: fix use-after-free in area_cache_get()
- CVE: https://ubuntu.com/security/CVE-2022-3545
- Patch: 5.10.0/CVE-2022-3545-nfp-fix-use-after-free0in-area_cache_get.patch
- From: 5.10.162-1
- CVE-2023-0266, CVSSv2 Score: 7.8
- Description:
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
- CVE: https://ubuntu.com/security/CVE-2023-0266
- Patch: 5.4.0/CVE-2023-0266-alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch
- From: 5.4.0-144.161
- CVE-2022-36280, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Validate the box size for the snooped cursor
- CVE: https://ubuntu.com/security/CVE-2022-36280
- Patch: 5.10.0/CVE-2022-36280-drm-vmwgfx-validate-the-box-size-for-snooped-cursor.patch
- From: 5.10.162-1
- CVE-2022-41218, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix UAF due to refcount races at releasing
- CVE: https://ubuntu.com/security/CVE-2022-41218
- Patch: 5.10.0/CVE-2022-41218-media-dvb-core-fix-UAF-due-to-refcount-races-at-releasing.patch
- From: 5.10.162-1
- CVE-2022-47929, CVSSv2 Score: 5.5
- Description:
net: sched: disallow noqueue for qdisc classes
- CVE: https://ubuntu.com/security/CVE-2022-47929
- Patch: 5.10.0/CVE-2022-47929-net-sched-disallow-noqueue-for-qdisc-classes.patch
- From: 5.10.162-1
- CVE-2023-0394, CVSSv2 Score: 5.5
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://ubuntu.com/security/CVE-2023-0394
- Patch: 5.10.0/CVE-2023-0394-ipv6-raw-deduct-extension-header-length-in-rawv6_push_pending_frames.patch
- From: 5.10.162-1
- CVE-2023-23454, CVSSv2 Score: 5.5
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://ubuntu.com/security/CVE-2023-23454
- Patch: 5.4.0/CVE-2023-23454-net-sched-cbq-dont-intepret-cls-results-when-asked-t.patch
- From: 5.4.0-144.161
- CVE-2023-23455, CVSSv2 Score: 5.5
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://ubuntu.com/security/CVE-2023-23455
- Patch: 5.10.0/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 5.10.162-1
- CVE-2023-0045, CVSSv2 Score:
- Description:
x86/bugs: Flush IBP in ib_prctl_set()
- CVE: https://ubuntu.com/security/CVE-2023-0045
- Patch: 5.4.0/CVE-2023-0045-x86-bugs-flush-ibp-in-ib_prctl_set.patch
- From: 5.4.0-144.161
- CVE-2023-0461, CVSSv2 Score: 7.8
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://ubuntu.com/security/CVE-2023-0461
- Patch: 5.4.0/CVE-2023-0461-net-ulp-prevent-ulp-without-clone-op-from-entering-the-listen-status.patch
- From: 5.4.0-144.161
- CVE-2022-3424, CVSSv2 Score: 7.8
- Description:
misc: sgi-gru: fix use-after-free error in gru_set_context_option
- CVE: https://ubuntu.com/security/CVE-2022-3424
- Patch: 5.4.0/CVE-2022-3424-misc-sgi-gru-fix-use-after-free-error-in-gru_set_con.patch
- From: 5.4.0-144.161
- CVE-2022-3623, CVSSv2 Score: 7.5
- Description:
mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page
- CVE: https://ubuntu.com/security/CVE-2022-3623
- Patch: 5.4.0/CVE-2022-3623-mm-hugetlb-fix-races-when-looking-up-a-CONT-PTE-PMD-size-hugetlb-page.patch
- From: 5.4.0-144.161
- CVE-2022-3521, CVSSv2 Score: 2.5
- Description:
kcm: avoid potential race in kcm_tx_work
- CVE: https://ubuntu.com/security/CVE-2022-3521
- Patch: 5.4.0/CVE-2022-3521-kcm-void-potential-race-in-kcm_tx_work.patch
- From: 5.4.0-144.161
- CVE-2022-3435, CVSSv2 Score: 4.3
- Description:
ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference
- CVE: https://ubuntu.com/security/CVE-2022-3435
- Patch: 5.4.0/001-CVE-2022-3435-ipv4-Handle-attempt-to-delete-multipath-route-when-fib_info-contains-an-nh-reference-1.patch
- From: 5.4.0-144.161
- CVE-2022-3435, CVSSv2 Score: 4.3
- Description:
ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference
- CVE: https://ubuntu.com/security/CVE-2022-3435
- Patch: 5.4.0/0002-CVE-2022-3435-ipv4-Fix-route-deletion-when-nexthop-info-is-not-specified-1.patch
- From: 5.4.0-144.161
- CVE-2022-47520, CVSSv2 Score: 7.1
- Description:
- CVE: https://ubuntu.com/security/CVE-2022-47520
- Patch: 5.4.0/CVE-2022-47520-wifi-wilc1000-validate-pairwise-and-authentication-suite-offsets.patch
- From: 5.4.0-144.161
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://linux.oracle.com/cve/CVE-2022-4378.html
- Patch: 4.14.35/CVE-2022-4378-0200-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: 4.14.35-2047.520.3.1
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://linux.oracle.com/cve/CVE-2022-4378.html
- Patch: 4.14.35/CVE-2022-4378-0300-proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-C-strings.patch
- From: 4.14.35-2047.520.3.1
- CVE-2022-4139, CVSSv2 Score: 7.0
- Description:
drm/i915: fix TLB invalidation for Gen12 video and compute engines
- CVE: https://ubuntu.com/security/CVE-2022-4139
- Patch: 5.4.0/CVE-2022-4139-drm-i915-fix-TLB-invalidation-for-Gen12-video-and-compute-engines-1.patch
- From: 5.4.0-144.161
- CVE-2021-3669, CVSSv2 Score: 5.5
- Description:
ipc: replace costly bailout check in sysvipc_find_ipc()
- CVE: https://ubuntu.com/security/CVE-2021-3669
- Patch: ubuntu-focal/5.4.0-146.163/CVE-2021-3669-ipc-replace-costly-bailout-check-in-sysvipc_find_ipc.patch
- From: 5.4.0-146.163
- CVE-2022-2196, CVSSv2 Score: 8.8
- Description:
KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- CVE: https://ubuntu.com/security/CVE-2022-2196
- Patch: ubuntu-focal/5.4.0-146.163/CVE-2022-2196-KVM-VMX-Execute-IBPB-on-emulated-VM-exit-when-guest-.patch
- From: 5.4.0-146.163
- CVE-2022-4382, CVSSv2 Score: 6.4
- Description:
USB: gadgetfs: Fix race between mounting and unmounting
- CVE: https://ubuntu.com/security/CVE-2022-4382
- Patch: ubuntu-focal/5.4.0-146.163/CVE-2022-4382-USB-gadgetfs-Fix-race-between-mounting-and-unmountin.patch
- From: 5.4.0-146.163
- CVE-2023-23559, CVSSv2 Score: 7.8
- Description:
wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
- CVE: https://ubuntu.com/security/CVE-2023-23559
- Patch: ubuntu-focal/5.4.0-146.163/CVE-2023-23559-wifi-rndis_wlan-Prevent-buffer-overflow-in-rndis_que.patch
- From: 5.4.0-146.163
- n/a, CVSSv2 Score: n/a
- Description:
USB: move snd_usb_pipe_sanity_check into the USB core
- CVE: n/a
- Patch: 5.4.0/introduce_usb_pipe_type_check.patch
- From: 5.10
- n/a, CVSSv2 Score: n/a
- Description:
USB: add usb_control_msg_send() and usb_control_msg_recv()
- CVE: n/a
- Patch: 5.10.0/usb-add-usb_control_msg_send-and-usb_control_msg_recv.patch
- From: 5.10
- CVE-2023-1281, CVSSv2 Score: 7.8
- Description:
net/sched: tcindex: update imperfect hash filters respecting rcu
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1281
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-1281-net-sched-tcindex-update-imperfect-hash-filters-respecting-rcu.patch
- From: 5.4.0-147.164
- CVE-2023-1073, CVSSv2 Score: 6.6
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1073
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-1073-hid-check-empty-report_list-in-hid_validate_values.patch
- From: 5.4.0-147.164
- CVE-2022-3108, CVSSv2 Score: 5.5
- Description:
drm/amdkfd: Check for null pointer after calling kmemdup
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3108
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2022-3108-drm-amdkfd-Check-for-null-pointer-after-calling-kmemdup.patch
- From: 5.4.0-147.164
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-4129
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2022-4129-l2tp-serialize-access-to-sk_user_data-with-sk_callback_lock.patch
- From: 5.4.0-147.164
- CVE-2023-1074, CVSSv2 Score: 5.5
- Description:
sctp: fail if no bound addresses can be used for a given scope
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1074
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-given-scope.patch
- From: 5.4.0-147.164
- CVE-2023-26545, CVSSv2 Score: 4.7
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-26545
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: 5.4.0-147.164
- CVE-2022-3903, CVSSv2 Score: 4.6
- Description:
media: mceusb: Use new usb_control_msg_*() routines
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3903
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2022-3903-media-mceusb-use-new-usb_control_msg-routines-1.patch
- From: 5.4.0-147.164
- CVE-2023-0458, CVSSv2 Score: 4.7
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://ubuntu.com/security/CVE-2023-0458
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-0458-prlimit-do_prlimit-needs-to-have-a-speculation-check.patch
- From: 5.4.0-147.164
- CVE-2023-1829, CVSSv2 Score:
- Description:
Complex adaptation is required, mainline retired tcindex.
- CVE:
- Patch: skipped/CVE-2023-1829.patch
- From:
- CVE-2023-0459, CVSSv2 Score:
- Description:
Safety check failed for copy_from_user; zendesk:191568
- CVE:
- Patch: skipped/CVE-2023-0459.patch
- From:
- CVE-2023-1075, CVSSv2 Score: 3.3
- Description:
net/tls: tls_is_tx_ready() checked list_entry
- CVE: https://ubuntu.com/security/CVE-2023-1075
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-1075-patch-net-tls-tls-is-tx-ready-checked-list-entry.patch
- From: 5.4.0-149.166
- CVE-2023-1513, CVSSv2 Score: 3.3
- Description:
kvm: initialize all of the kvm_debugregs structure before sending it
- CVE: https://ubuntu.com/security/CVE-2023-1513
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-1513-patch-kvm-initialize-all-of-the-kvm-debugregs-structure-before.patch
- From: 5.4.0-149.166
- CVE-2023-1078, CVSSv2 Score: 7.8
- Description:
rds: rds_rm_zerocopy_callback() use list_first_entry()
- CVE: https://ubuntu.com/security/CVE-2023-1078
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-1078-patch-rds-rds-rm-zerocopy-callback-use-list-first-entry.patch
- From: 5.4.0-149.166
- CVE-2023-2162, CVSSv2 Score: 5.5
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost
- CVE: https://ubuntu.com/security/CVE-2023-2162
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-2162-patch-scsi-iscsi-tcp-fix-uaf-during-login-when-accessing-the.patch
- From: 5.4.0-149.166
- CVE-2023-32269, CVSSv2 Score: 6.7
- Description:
netrom: Fix use-after-free caused by accept on already connected
- CVE: https://ubuntu.com/security/CVE-2023-32269
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-32269-patch-netrom-fix-use-after-free-caused-by-accept-on-already.patch
- From: 5.4.0-149.166
- CVE-2023-1118, CVSSv2 Score: 7.8
- Description:
[PATCH] media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
- CVE: https://ubuntu.com/security/CVE-2023-1118
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-1118-patch-media-rc-fix-use-after-free-bugs-caused-by-ene-tx-irqsim.patch
- From: 5.4.0-149.166
- CVE-2023-1380, CVSSv2 Score: 7.8
- Description:
wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
- CVE: https://ubuntu.com/security/CVE-2023-1380
- Patch: ubuntu-focal/5.4.0-150.167/CVE-2023-1380-wifi-brcmfmac-slab-out-of-bounds-read-in-brcmf_get_a.patch
- From: 5.4.0-150.167
- CVE-2023-30456, CVSSv2 Score: 7.8
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://ubuntu.com/security/CVE-2023-1380
- Patch: ubuntu-focal/5.4.0-150.167/CVE-2023-30456-KVM-nVMX-add-missing-consistency-checks-for-CR0-and-.patch
- From: 5.4.0-150.167
- CVE-2023-31436, CVSSv2 Score: 7.1
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://ubuntu.com/security/CVE-2023-31436
- Patch: ubuntu-focal/5.4.0-150.167/CVE-2023-31436-net-sched-sch_qfq-prevent-slab-out-of-bounds-in-qfq_.patch
- From: 5.4.0-150.167
- CVE-2023-32233, CVSSv2 Score: 6.5
- Description:
netfilter: nf_tables: deactivate anonymous set from
- CVE: https://ubuntu.com/security/CVE-2023-32233
- Patch: ubuntu-focal/5.4.0-150.167/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-pr.patch
- From: 5.4.0-150.167
- CVE-2023-35788, CVSSv2 Score: 7.8
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://ubuntu.com/security/CVE-2023-35788
- Patch: ubuntu-jammy/5.15.0-76.83/CVE-2023-35788-patch-net-sched-flower-fix-possible-oob-write-in.patch
- From: 5.15.0-76.83
- CVE-2023-3090, CVSSv2 Score: 7.8
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://ubuntu.com/security/CVE-2023-3090
- Patch: ubuntu-focal/5.4.0-155.172/CVE-2023-3090-ipvlan-fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 5.4.0-155.172
- CVE-2023-3390, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- CVE: https://ubuntu.com/security/CVE-2023-3390
- Patch: ubuntu-focal/5.4.0-155.172/CVE-2023-3390-netfilter-nf_tables-incorrect-error-path-handling-with-NFT_MSG_NEWRULE.patch
- From: 5.4.0-155.172
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://ubuntu.com/security/CVE-2023-35001
- Patch: ubuntu-focal/5.4.0-155.172/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
- From: 5.4.0-155.172
- CVE-2023-32629, CVSSv2 Score: 7.8
- Description:
overlayfs: Skip permission checking for trusted.overlayfs.* xattrs
- CVE: https://ubuntu.com/security/CVE-2023-32629
- Patch: ubuntu-focal/5.4.0-155.172/CVE-2023-32629-overlayfs-skip-permission-checking-for-trusted-overlayfs-xattrs.patch
- From: 5.4.0-155.172
- CVE-2023-3141, CVSSv2 Score: 7.1
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2023-3141
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-3141-patch-memstick-r592-fix-uaf-bug-in-r592-remove-due-to-race.patch
- From: 5.4.0-156.173
- CVE-2023-3111, CVSSv2 Score: 7.8
- Description:
btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()
- CVE: https://ubuntu.com/security/CVE-2023-3111
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-3111-btrfs-unset-reloc-control-if-transaction-commit-fails-in-prepare_to_relocate.patch
- From: 5.4.0-156.173
- CVE-2023-1611, CVSSv2 Score: 6.3
- Description:
[PATCH] btrfs: fix race between quota disable and quota assign ioctls
- CVE: https://ubuntu.com/security/CVE-2023-1611
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-1611-patch-btrfs-fix-race-between-quota-disable-and-quota-assign-ioctls.patch
- From: 5.4.0-156.173
- CVE-2022-0168, CVSSv2 Score: 4.4
- Description:
cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
- CVE: https://ubuntu.com/security/CVE-2022-0168
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-0168-patch-cifs-fix-null-ptr-dereference-in-smb2-ioctl-query-info.patch
- From: 5.4.0-156.173
- CVE-2023-0590, CVSSv2 Score: 4.7
- Description:
net: sched: fix race condition in qdisc_graft()
- CVE: https://ubuntu.com/security/CVE-2023-0590
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-0590-patch-net-sched-fix-race-condition-in-qdisc-graft.patch
- From: 5.4.0-156.173
- CVE-2023-2194, CVSSv2 Score: 6.7
- Description:
[PATCH] i2c: xgene-slimpro: Fix out-of-bounds bug in
- CVE: https://ubuntu.com/security/CVE-2023-2194
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-2194-patch-i2c-xgene-slimpro-fix-out-of-bounds-bug-in.patch
- From: 5.4.0-156.173
- CVE-2023-33203, CVSSv2 Score: 6.4
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race
- CVE: https://ubuntu.com/security/CVE-2023-33203
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-33203-patch-net-qcom-emac-fix-use-after-free-bug-in-emac-remove-due-to.patch
- From: 5.4.0-156.173
- CVE-2023-30772, CVSSv2 Score: 6.4
- Description:
power: supply: da9150: Fix use after free bug in
- CVE: https://ubuntu.com/security/CVE-2023-30772
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-30772-patch-power-supply-da9150-fix-use-after-free-bug-in.patch
- From: 5.4.0-156.173
- CVE-2023-28466, CVSSv2 Score: 7.0
- Description:
net: tls: fix possible race condition between
- CVE: https://ubuntu.com/security/CVE-2023-28466
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-28466-patch-net-tls-fix-possible-race-condition-between.patch
- From: 5.4.0-156.173
- CVE-2023-2124, CVSSv2 Score: 7.8
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://ubuntu.com/security/CVE-2023-2124
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-2124-patch-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: 5.4.0-156.173
- CVE-2020-36691, CVSSv2 Score: 5.5
- Description:
netlink: limit recursion depth in policy validation
- CVE: https://ubuntu.com/security/CVE-2020-36691
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2020-36691-patch-netlink-limit-recursion-depth-in-policy-validation-1.patch
- From: 5.4.0-156.173
- CVE-2022-4269, CVSSv2 Score: 5.5
- Description:
[PATCH] act_mirred: use the backlog for nested calls to mirred
- CVE: https://ubuntu.com/security/CVE-2022-4269
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-4269-patch-act-mirred-use-the-backlog-for-nested-calls-to-mirred.patch
- From: 5.4.0-156.173
- CVE-2023-1855, CVSSv2 Score: 6.3
- Description:
hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to
- CVE: https://ubuntu.com/security/CVE-2023-1855
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-1855-patch-hwmon-xgene-fix-use-after-free-bug-in-xgene-hwmon-remove.patch
- From: 5.4.0-156.173
- CVE-2023-1990, CVSSv2 Score: 4.7
- Description:
nfc: st-nci: Fix use after free bug in ndlc_remove due to race
- CVE: https://ubuntu.com/security/CVE-2023-1990
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-1990-patch-nfc-st-nci-fix-use-after-free-bug-in-ndlc-remove-due-to.patch
- From: 5.4.0-156.173
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: verify dir block before splitting it
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-ext4-verify-dir-block-before-splitting-it.patch
- From: 5.4.0-156.173
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: avoid cycles in directory h-tree
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-ext4-avoid-cycles-in-directory-h-tree.patch
- From: 5.4.0-156.173
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: make variable "count" signed
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-make-variable-count-signed.patch
- From: 5.4.0-156.173
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: check if directory block is within i_size
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-04-ext4-check-if-directory-block-is-within-i_size-1.patch
- From: 5.4.0-156.173
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: make sure ext4_append() always allocates new block
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-05-ext4-make-sure-ext4_append-always-allocates-new-block.patch
- From: 5.4.0-156.173
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: fix check for block being out of directory size
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-06-ext4-fix-check-for-block-being-out-of-directory-size.patch
- From: 5.4.0-156.173
- CVE-2022-27672, CVSSv2 Score: 5.6
- Description:
x86/speculation: Identify processors vulnerable to SMT RSB predictions
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: smt_rsb-enable.patch
- From: N/A
- CVE-2022-27672, CVSSv2 Score: 4.7
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug
- CVE: https://ubuntu.com/security/CVE-2022-27672
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug.patch
- From: 5.4.0-156.173
- CVE-2022-27672, CVSSv2 Score: 4.7
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-27672
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug-kpatch.patch
- From: 5.4.0-156.173
- CVE-2022-40982, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-40982.patch
- From:
- CVE-2023-3776, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: Fix improper refcount update leads to
- CVE: https://ubuntu.com/security/CVE-2023-3776
- Patch: ubuntu-focal/5.4.0-159.176/CVE-2023-3776-patch-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 5.4.0-159.176
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://ubuntu.com/security/CVE-2023-3611
- Patch: ubuntu-focal/5.4.0-159.176/CVE-2023-3611-patch-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
- From: 5.4.0-159.176
- CVE-2023-3609, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://ubuntu.com/security/CVE-2023-3609
- Patch: ubuntu-focal/5.4.0-159.176/CVE-2023-3609-patch-net-sched-cls-u32-fix-reference-counter-leak-leading-to.patch
- From: 5.4.0-159.176
- CVE-2023-20593, CVSSv2 Score: 6.5
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: zenbleed-enable.patch
- From: N/A
- CVE-2023-21255, CVSSv2 Score: 7.8
- Description:
binder: fix UAF caused by faulty buffer cleanup
- CVE: https://ubuntu.com/security/CVE-2023-21255
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-21255-patch-binder-fix-uaf-caused-by-faulty-buffer-cleanup-3.patch
- From: 5.4.0-162.179
- CVE-2023-35828, CVSSv2 Score: 7.0
- Description:
usb: gadget: udc: renesas_usb3: Fix use after free bug in
- CVE: https://ubuntu.com/security/CVE-2023-35828
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-35828-patch-usb-gadget-udc-renesas-usb3-fix-use-after-free-bug-in.patch
- From: 5.4.0-162.179
- CVE-2023-35823, CVSSv2 Score: 7.0
- Description:
media: saa7134: fix use after free bug in saa7134_finidev due to race
- CVE: https://ubuntu.com/security/CVE-2023-35823
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-35823-patch-media-saa7134-fix-use-after-free-bug-in-saa7134-finidev-due.patch
- From: 5.4.0-162.179
- CVE-2023-2163, CVSSv2 Score: 8.8
- Description:
bpf: Fix incorrect verifier pruning due to missing register precision
- CVE: https://ubuntu.com/security/CVE-2023-2163
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-2163-patch-bpf-fix-incorrect-verifier-pruning-due-to-missing-register.patch
- From: 5.4.0-162.179
- CVE-2023-3268, CVSSv2 Score: 7.1
- Description:
relayfs: fix out-of-bounds access in relay_file_read
- CVE: https://ubuntu.com/security/CVE-2023-3268
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-3268-patch-relayfs-fix-out-of-bounds-access-in-relay-file-read.patch
- From: 5.4.0-162.179
- CVE-2023-35824, CVSSv2 Score: 7.0
- Description:
media: dm1105: Fix use after free bug in dm1105_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2023-35824
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-35824-media-dm1105-fix-use-after-free-bug-in-dm1105_remove-due-to-race-condition.patch
- From: 5.4.0-162.179
- CVE-2023-2002, CVSSv2 Score: 6.8
- Description:
bluetooth: Perform careful capability checks in hci_sock_ioctl()
- CVE: https://ubuntu.com/security/CVE-2023-2002
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-2002-bluetooth-perform-careful-capability-checks-in-hci_sock_ioctl.patch
- From: 5.4.0-162.179
- CVE-2023-31084, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
- CVE: https://ubuntu.com/security/CVE-2023-31084
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-31084-media-dvb-core-fix-kernel-WARNING-for-blocking-operation-in-wait_event.patch
- From: 5.4.0-162.179
- CVE-2023-2269, CVSSv2 Score: 4.4
- Description:
dm ioctl: fix nested locking in table_clear() to remove deadlock concern
- CVE: https://ubuntu.com/security/CVE-2023-2269
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-2269-dm-ioctl-fix-nested-locking-in-table_clear-to-remove-deadlock-concern.patch
- From: 5.4.0-162.179
- CVE-2023-40283, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
- CVE: https://ubuntu.com/security/CVE-2023-40283
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-40283-patch-bluetooth-l2cap-fix-use-after-free-in-l2cap-sock-ready-cb.patch
- From: 5.4.0-163.180
- CVE-2023-4128, CVSSv2 Score: 7.8
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4128
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-4128-patch-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.4.0-163.180
- CVE-2023-4128, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4128
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-4128-patch-net-sched-cls-fw-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.4.0-163.180
- CVE-2023-4128, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4128
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-4128-patch-net-sched-cls-u32-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.4.0-163.180
- CVE-2023-20588, CVSSv2 Score: 5.5
- Description:
x86/CPU/AMD: Do not leak quotient data after a division by 0
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-20588.html
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-20588-x86-CPU-AMD-Do-not-leak-quotient-data-after-a-division-by-0.patch
- From: kernel-4.14.322-244.539.amzn2
- CVE-2023-1206, CVSSv2 Score:
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-3338, CVSSv2 Score:
- Description:
The patch remove functionality.
- CVE:
- Patch: skipped/CVE-2023-3338.patch
- From:
- CVE-2023-3863, CVSSv2 Score: 4.1
- Description:
[PATCH] nfc: llcp: simplify llcp_sock_connect() error paths
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-3863-nfc-llcp-simplify-llcp_sock_connect-error-paths.patch
- From: 5.4.0-164.181
- CVE-2023-3863, CVSSv2 Score: 4.1
- Description:
[PATCH] net: nfc: Fix use-after-free caused by nfc_llcp_find_local
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-3863-patch-net-nfc-fix-use-after-free-caused-by-nfc-llcp-find-local.patch
- From: 5.4.0-164.181
- CVE-2023-3212, CVSSv2 Score: 4.4
- Description:
gfs2: Don't deref jdesc in evict
- CVE: https://ubuntu.com/security/CVE-2023-3212
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-3212-patch-gfs2-don-t-deref-jdesc-in-evict.patch
- From: 5.4.0-164.181
- CVE-2023-4622, CVSSv2 Score: 7.0
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://ubuntu.com/security/CVE-2023-4622
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4622-patch-af-unix-fix-null-ptr-deref-in-unix-stream-sendpage.patch
- From: 5.4.0-165.182
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://ubuntu.com/security/CVE-2023-4623
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4623-patch-net-sched-sch-hfsc-ensure-inner-classes-have-fsc-curve.patch
- From: 5.4.0-165.182
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue.patch
- From: 5.4.0-165.182
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue-kpatch.patch
- From: 5.4.0-165.182
- CVE-2023-42753, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for
- CVE: https://ubuntu.com/security/CVE-2023-42753
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
- From: 5.4.0-165.182
- CVE-2023-42752, CVSSv2 Score: 5.5
- Description:
igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU
- CVE: https://ubuntu.com/security/CVE-2023-42752
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42752-patch-igmp-limit-igmpv3-newpack-packet-size-to-ip-max-mtu.patch
- From: 5.4.0-165.182
- CVE-2023-4881, CVSSv2 Score:
- Description:
CVE was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.
- CVE:
- Patch: skipped/CVE-2023-4881.patch
- From:
- CVE-2023-42755, CVSSv2 Score:
- Description:
The patch removes functionality.
- CVE:
- Patch: skipped/CVE-2023-42755.patch
- From:
- CVE-2023-42756, CVSSv2 Score: 4.7
- Description:
netfilter: ipset: Add schedule point in call_ad().
- CVE: https://ubuntu.com/security/CVE-2023-42756
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42756-netfilter-ipset-Add-schedule-point-in-call_ad.patch
- From: 5.4.0-165.182
- CVE-2023-42756, CVSSv2 Score: 4.7
- Description:
netfilter: ipset: Fix race between IPSET_CMD_CREATE and
- CVE: https://ubuntu.com/security/CVE-2023-42756
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42756-patch-netfilter-ipset-fix-race-between-ipset-cmd-create-and.patch
- From: 5.4.0-165.182
- CVE-2023-34319, CVSSv2 Score: 7.8
- Description:
xen/netback: Fix buffer overrun triggered by unusual packet
- CVE: https://ubuntu.com/security/CVE-2023-34319
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-34319-patch-xen-netback-fix-buffer-overrun-triggered-by-unusual-packet-155.patch
- From: 5.4.0-165.182
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in
- CVE: https://ubuntu.com/security/CVE-2023-31083
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-31083-patch-bluetooth-hci-ldisc-check-hci-uart-proto-ready-flag-in.patch
- From: 5.4.0-166.183
- CVE-2023-4132, CVSSv2 Score: 5.5
- Description:
media: usb: siano: Fix use after free bugs caused by do_submit_urb (dependency)
- CVE: https://ubuntu.com/security/CVE-2023-4132
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-4132-media-usb-siano-Fix-use-after-free-bugs-caused-by-do_submit_urb.patch
- From: 5.4.0-166.183
- CVE-2023-4132, CVSSv2 Score: 5.5
- Description:
media: usb: siano: Fix warning due to null work_func_t function
- CVE: https://ubuntu.com/security/CVE-2023-4132
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-4132-patch-media-usb-siano-fix-warning-due-to-null-work-func-t.patch
- From: 5.4.0-166.183
- CVE-2023-0597, CVSSv2 Score:
- Description:
Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
- CVE:
- Patch: skipped/CVE-2023-0597.patch
- From:
- CVE-2023-3772, CVSSv2 Score: 4.4
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://ubuntu.com/security/CVE-2023-3772
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-3772-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: 5.4.0-166.183
- CVE-2023-31085, CVSSv2 Score: 5.5
- Description:
ubi: Refuse attaching if mtd's erasesize is 0
- CVE: https://ubuntu.com/security/CVE-2023-31085
- Patch: ubuntu-focal/5.4.0-167.184/CVE-2023-31085-ubi-Refuse-attaching-if-mtd-s-erasesize-is-0.patch
- From: 5.4.0-167.184
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://ubuntu.com/security/CVE-2023-45871
- Patch: ubuntu-focal/5.4.0-167.184/CVE-2023-45871-patch-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 5.4.0-167.184
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-45871
- Patch: ubuntu-focal/5.4.0-167.184/CVE-2023-45871-kpatch.patch
- From: 5.4.0-167.184
- CVE-2023-6176, CVSSv2 Score: 7.8
- Description:
net/tls: do not free tls_rec on async operation in
- CVE: https://ubuntu.com/security/CVE-2023-6176
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-6176-patch-net-tls-do-not-free-tls-rec-on-async-operation-in.patch
- From: 5.4.0-169.187
- CVE-2023-39189, CVSSv2 Score: 6.0
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39189
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39189-patch-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 5.4.0-169.187
- CVE-2023-39193, CVSSv2 Score: 6.1
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://ubuntu.com/security/CVE-2023-39193
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39193-patch-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 5.4.0-169.187
- CVE-2023-39192, CVSSv2 Score: 6.7
- Description:
netfilter: xt_u32: validate user space input
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39192-patch-netfilter-xt-u32-validate-user-space-input.patch
- From: 5.4.0-169.187
- CVE-2023-39192, CVSSv2 Score: 6.7
- Description:
netfilter: xt_u32: validate user space input (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39192-netfilter-xt-u32-validate-user-space-input-kpatch.patch
- From: 5.4.0-169.187
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://ubuntu.com/security/CVE-2023-5717
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5717-patch-perf-disallow-mis-matched-inherited-group-reads.patch
- From: 5.4.0-169.187
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://ubuntu.com/security/CVE-2023-5717
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch.patch
- From: 5.4.0-169.187
- CVE-2023-5178, CVSSv2 Score: 8.8
- Description:
nvmet-tcp: move send/recv error handling in the send/recv methods instead of call-sites
- CVE: https://ubuntu.com/security/CVE-2023-5178
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5178-0001-nvmet-tcp-move-send-recv-error-handling-in-the-send-.patch
- From: 5.4.0-169.187
- CVE-2023-5178, CVSSv2 Score: 8.8
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://ubuntu.com/security/CVE-2023-5178
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5178-patch-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 5.4.0-169.187
- CVE-2023-42754, CVSSv2 Score: 5.5
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://ubuntu.com/security/CVE-2023-42754
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-42754-patch-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 5.4.0-169.187
- CVE-2023-39194, CVSSv2 Score: 4.4
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39194
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39194-patch-net-xfrm-fix-xfrm-address-filter-oob-read.patch
- From: 5.4.0-169.187
- CVE-2023-3006, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2023-3006.patch
- From:
- CVE-2023-6040, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: Reject tables of unsupported family
- CVE: https://ubuntu.com/security/CVE-2023-6040
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6040-netfilter-nf_tables-Reject-tables-of-unsupported-family-165.patch
- From: 5.4.0-170.188
- CVE-2023-6606, CVSSv2 Score: 7.1
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://ubuntu.com/security/CVE-2023-6606
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6606-smb-client-fix-OOB-in-smbCalcSize.patch
- From: 5.4.0-170.188
- CVE-2023-6931, CVSSv2 Score: 7.0
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://ubuntu.com/security/CVE-2023-6931
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6931-perf-Fix-perf_event_validate_size.patch
- From: 5.4.0-170.188
- CVE-2023-6931, CVSSv2 Score: 7.0
- Description:
perf: Fix perf_event_validate_size() lockdep splat
- CVE: https://ubuntu.com/security/CVE-2023-6931
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6931-perf-Fix-perf_event_validate_size-lockdep-splat.patch
- From: 5.4.0-170.188
- CVE-2023-6932, CVSSv2 Score: 7.0
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://ubuntu.com/security/CVE-2023-6932
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
- From: 5.4.0-170.188
- CVE-2023-35827, CVSSv2 Score: 7.0
- Description:
ravb: Fix use-after-free issue in ravb_tx_timeout_work()
- CVE: https://ubuntu.com/security/CVE-2023-35827
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-35827-patch-ravb-fix-use-after-free-issue-in-ravb-tx-timeout-work.patch
- From: 5.4.0-171.189
- CVE-2023-46343, CVSSv2 Score: 5.5
- Description:
nfc: nci: fix possible NULL pointer dereference in send_acknowledge()
- CVE: https://ubuntu.com/security/CVE-2023-46343
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-46343-patch-nfc-nci-fix-possible-null-pointer-dereference-in.patch
- From: 5.4.0-171.189
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://ubuntu.com/security/CVE-2023-45863
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-45863-patch-kobject-fix-slab-out-of-bounds-in-fill-kobj-path.patch
- From: 5.4.0-171.189
- CVE-2023-34324, CVSSv2 Score: 4.9
- Description:
xen/events: replace evtchn_rwlock with RCU
- CVE: https://ubuntu.com/security/CVE-2023-34324
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-34324-xen-events-replace-evtchn_rwlock-with-RCU-kpatch.patch
- From: 5.4.0-171.189
- CVE-2024-0646, CVSSv2 Score: 7.8
- Description:
net: tls, update curr on splice as well
- CVE: https://ubuntu.com/security/CVE-2024-0646
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2024-0646-patch-net-tls-update-curr-on-splice-as-well.patch
- From: 5.4.0-172.190
- CVE-2024-0565, CVSSv2 Score: 7.4
- Description:
smb: client: fix OOB in receive_encrypted_standard()
- CVE: https://ubuntu.com/security/CVE-2024-0565
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2024-0565-patch-smb-client-fix-oob-in-receive-encrypted-standard.patch
- From: 5.4.0-172.190
- CVE-2023-6915, CVSSv2 Score: 5.5
- Description:
ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://ubuntu.com/security/CVE-2023-6915
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2023-6915-patch-ida-fix-crash-in-ida-free-when-the-bitmap-is-empty.patch
- From: 5.4.0-172.190
- CVE-2023-51781, CVSSv2 Score: 7.0
- Description:
appletalk: Fix Use-After-Free in atalk_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51781
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2023-51781-patch-appletalk-fix-use-after-free-in-atalk-ioctl.patch
- From: 5.4.0-172.190
- CVE-2023-22995, CVSSv2 Score: 7.8
- Description:
usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core
- CVE: https://ubuntu.com/security/CVE-2023-22995
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-22995-patch-usb-dwc3-dwc3-qcom-add-missing-platform-device-put-in.patch
- From: 5.4.0-173.191
- CVE-2023-51779, CVSSv2 Score: 7.0
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg
- CVE: https://ubuntu.com/security/CVE-2023-51779
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-51779-patch-bluetooth-af-bluetooth-fix-use-after-free-in.patch
- From: 5.4.0-173.191
- CVE-2021-44879, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check on inode type during garbage collection
- CVE: https://ubuntu.com/security/CVE-2021-44879
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2021-44879-patch-f2fs-fix-to-do-sanity-check-on-inode-type-during-garbage.patch
- From: 5.4.0-173.191
- CVE-2023-4244, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-6121, CVSSv2 Score: 4.3
- Description:
nvmet: nul-terminate the NQNs passed in the connect command
- CVE: https://ubuntu.com/security/CVE-2023-6121
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-6121-patch-nvmet-nul-terminate-the-nqns-passed-in-the-connect-command.patch
- From: 5.4.0-173.191
- CVE-2023-51782, CVSSv2 Score: 7.0
- Description:
net/rose: Fix Use-After-Free in rose_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51782
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-51782-patch-net-rose-fix-use-after-free-in-rose-ioctl.patch
- From: 5.4.0-173.191
- CVE-2023-51780, CVSSv2 Score: 8.1
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51780
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-51780-patch-atm-fix-use-after-free-in-do-vcc-ioctl.patch
- From: 5.4.0-173.191
- CVE-2024-0340, CVSSv2 Score: 5.5
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://ubuntu.com/security/CVE-2024-0340
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-0340-CVE-2024-0340-patch-vhost-use-kzalloc-instead-of-kmalloc-followed-by.patch
- From: 5.4.0-173.191
- CVE-2024-1086, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://ubuntu.com/security/CVE-2024-1086
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2024-1086-patch-netfilter-nf-tables-reject-queue-drop-verdict-parameters-5.4.0-167.184.patch
- From: 5.4.0-174.193
- CVE-2023-23000, CVSSv2 Score: 5.5
- Description:
phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function
- CVE: https://ubuntu.com/security/CVE-2023-23000
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2023-23000-patch-phy-tegra-xusb-fix-return-value-of.patch
- From: 5.4.0-174.193
- CVE-2023-23004, CVSSv2 Score: 5.5
- Description:
malidp: Fix NULL vs IS_ERR() checking
- CVE: https://ubuntu.com/security/CVE-2023-23004
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2023-23004-patch-malidp-fix-null-vs-is-err-checking.patch
- From: 5.4.0-174.193
- CVE-2024-24855, CVSSv2 Score: 4.7
- Description:
scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()
- CVE: https://ubuntu.com/security/CVE-2024-24855
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2024-24855-patch-scsi-lpfc-fix-a-possible-data-race-in.patch
- From: 5.4.0-174.193
- CVE-2023-52454, CVSSv2 Score: N/A
- Description:
nvmet-tcp: add bounds check on Transfer Tag
- CVE: https://ubuntu.com/security/CVE-2023-52454
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52454-03-nvmet-tcp-add-bounds-check-on-Transfer-Tag.patch
- From: 5.4.0-176.196
- CVE-2023-52454, CVSSv2 Score: N/A
- Description:
nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length
- CVE: https://ubuntu.com/security/CVE-2023-52454
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52454-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-invalid-H2C-PDU-length.patch
- From: 5.4.0-176.196
- CVE-2023-52470, CVSSv2 Score: 4.4
- Description:
drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()
- CVE: https://ubuntu.com/security/CVE-2023-52470
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52470-drm-radeon-check-the-alloc_workqueue-return-value-in-radeon_crtc_init.patch
- From: 5.4.0-176.196
- CVE-2023-52609, CVSSv2 Score: 4.1
- Description:
binder: fix race between mmput() and do_exit()
- CVE: https://ubuntu.com/security/CVE-2023-52609
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52609-binder-fix-race-between-mmput-and-do_exit.patch
- From: 5.4.0-176.196
- CVE-2023-52612, CVSSv2 Score: 6.0
- Description:
crypto: scomp - fix req->dst buffer overflow
- CVE: https://ubuntu.com/security/CVE-2023-52612
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52612-crypto-scomp-fix-req-dst-buffer-overflow.patch
- From: 5.4.0-176.196
- CVE-2024-26597, CVSSv2 Score: 7.1
- Description:
net: qualcomm: rmnet: fix global oob in rmnet_policy
- CVE: https://ubuntu.com/security/CVE-2024-26597
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-26597-net-qualcomm-rmnet-fix-global-oob-in-rmnet_policy.patch
- From: 5.4.0-176.196
- CVE-2024-26597, CVSSv2 Score: N/A
- Description:
net: qualcomm: rmnet: fix global oob in rmnet_policy
- CVE: https://ubuntu.com/security/CVE-2024-26597
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-26597-net-qualcomm-rmnet-fix-global-oob-in-rmnet_policy-kpatch.patch
- From: 5.4.0-176.196
- CVE-2024-26633, CVSSv2 Score: 5.5
- Description:
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
- CVE: https://ubuntu.com/security/CVE-2024-26633
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-26633-ip6_tunnel-fix-NEXTHDR_FRAGMENT-handling-in-ip6_tnl_parse_tlv_enc_lim.patch
- From: 5.4.0-176.196
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://ubuntu.com/security/CVE-2023-52340
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52340-patch-ipv6-remove-max-size-check-inline-with-ipv4.patch
- From: 5.4.0-176.196
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://ubuntu.com/security/CVE-2023-52340
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52340-fix-decnet-function-declaration.patch
- From: 5.4.0-176.196
- CVE-2024-23851, CVSSv2 Score: 5.5
- Description:
dm ioctl: log an error if the ioctl structure is corrupted
- CVE: https://ubuntu.com/security/CVE-2024-23851
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-23851-patch-dm-ioctl-log-an-error-if-the-ioctl-structure-is-corrupted.patch
- From: 5.4.0-176.196
- CVE-2023-52429 CVE-2024-23851, CVSSv2 Score: 5.5
- Description:
dm: limit the number of targets and parameter size area
- CVE: https://ubuntu.com/security/CVE-2024-23851
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52429-CVE-2024-23851-patch-dm-limit-the-number-of-targets-and-parameter-size-area.patch
- From: 5.4.0-176.196
- CVE-2023-52443, CVSSv2 Score: 5.5
- Description:
apparmor: avoid crash when parsed profile name is empty
- CVE: https://ubuntu.com/security/CVE-2023-52443
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52443-apparmor-avoid-crash-when-parsed-profile-name-is-empty.patch
- From: 5.4.0-176.196
- CVE-2023-52448, CVSSv2 Score: 5.5
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://ubuntu.com/security/CVE-2023-52448
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52448-gfs2-fix-kernel-NULL-pointer-dereference-in-gfs2_rgrp_dump.patch
- From: 5.4.0-176.196
- CVE-2023-52449, CVSSv2 Score: 5.5
- Description:
mtd: Fix gluebi NULL pointer dereference caused by ftl
- CVE: https://ubuntu.com/security/CVE-2023-52449
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52449-mtd-fix-gluebi-NULL-pointer-dereference-caused-by-ftl-notifier.patch
- From: 5.4.0-176.196
- CVE-2023-52436, CVSSv2 Score: 4.5
- Description:
f2fs: explicitly null-terminate the xattr list
- CVE: https://ubuntu.com/security/CVE-2023-52436
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52436-f2fs-explicitly-null-terminate-the-xattr-list.patch
- From: 5.4.0-176.196
- CVE-2023-52469, CVSSv2 Score: 7.8
- Description:
drivers/amd/pm: fix a use-after-free in kv_parse_power_table
- CVE: https://ubuntu.com/security/CVE-2023-52469
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52469-drivers-amd-pm-fix-a-use-after-free-in-kv_parse_power_table.patch
- From: 5.4.0-176.196
- CVE-2023-52464, CVSSv2 Score: 7.8
- Description:
EDAC/thunderx: Fix possible out-of-bounds string access
- CVE: https://ubuntu.com/security/CVE-2023-52464
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52464-edac-thunderx-fix-possible-out-of-bounds-string-access.patch
- From: 5.4.0-176.196
- CVE-2024-0607, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()
- CVE: https://ubuntu.com/security/CVE-2024-0607
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-0607-patch-netfilter-nf-tables-fix-pointer-math-issue-in.patch
- From: 5.4.0-176.196
- CVE-2023-52438, CVSSv2 Score:
- Description:
Out of scope. Android related patch.
- CVE:
- Patch: skipped/CVE-2023-52438.patch
- From:
- CVE-2023-52439, CVSSv2 Score: 7.8
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://ubuntu.com/security/CVE-2023-52439
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52439-uio-Fix-use-after-free-in-uio_open.patch
- From: 5.4.0-176.196
- CVE-2023-52444, CVSSv2 Score: 7.8
- Description:
f2fs: fix to avoid dirent corruption
- CVE: https://ubuntu.com/security/CVE-2023-52444
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52444-patch-f2fs-fix-to-avoid-dirent-corruption.patch
- From: 5.4.0-176.196
- CVE-2023-52445, CVSSv2 Score: 7.8
- Description:
media: pvrusb2: fix use after free on context disconnection
- CVE: https://ubuntu.com/security/CVE-2023-52445
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context-disconne.patch
- From: 5.4.0-176.196
- CVE-2023-52451, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52451.patch
- From:
- CVE-2023-46838, CVSSv2 Score: 7.5
- Description:
xen-netback: don't produce zero-size SKB frags
- CVE: https://ubuntu.com/security/CVE-2023-46838
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-46838-patch-xen-netback-don-t-produce-zero-size-skb-frags.patch
- From: 5.4.0-176.196
- CVE-2024-26589, CVSSv2 Score: 7.8
- Description:
bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS
- CVE: https://ubuntu.com/security/CVE-2024-26589
- Patch: ubuntu-focal/5.4.0-177.197/CVE-2024-26589-patch-bpf-reject-variable-offset-alu-on-ptr-to-flow-keys.patch
- From: 5.4.0-177.197
- CVE-2023-52603, CVSSv2 Score: 7.1
- Description:
UBSAN: array-index-out-of-bounds in dtSplitRoot
- CVE: https://ubuntu.com/security/CVE-2023-52603
- Patch: ubuntu-focal/5.4.0-177.197/CVE-2023-52603-patch-ubsan-array-index-out-of-bounds-in-dtsplitroot.patch
- From: 5.4.0-177.197
- CVE-2023-52600, CVSSv2 Score: 7.8
- Description:
jfs: fix uaf in jfs_evict_inode
- CVE: https://ubuntu.com/security/CVE-2023-52600
- Patch: ubuntu-focal/5.4.0-177.197/CVE-2023-52600-patch-jfs-fix-uaf-in-jfs-evict-inode-1.patch
- From: 5.4.0-177.197
- CVE-2023-24023, CVSSv2 Score: 6.8
- Description:
Bluetooth: Add more enc key size check
- CVE: https://ubuntu.com/security/CVE-2023-24023
- Patch: ubuntu-focal/5.4.0-177.197/CVE-2023-24023-bluetooth-add-more-enc-key-size-check.patch
- From: 5.4.0-177.197
- CVE-2023-52604, CVSSv2 Score: 7.8
- Description:
FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2023-52604
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52604-fs-jfs-ubsan-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.4.0-181.201
- CVE-2023-52601, CVSSv2 Score: 7.1
- Description:
jfs: fix array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2023-52601
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52601-jfs-fix-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.4.0-181.201
- CVE-2023-52587, CVSSv2 Score: 6.0
- Description:
IB/ipoib: Fix mcast list locking
- CVE: https://ubuntu.com/security/CVE-2023-52587
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52587-ib-ipoib-fix-mcast-list-locking.patch
- From: 5.4.0-181.201
- CVE-2024-26593, CVSSv2 Score: 7.1
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://ubuntu.com/security/CVE-2024-26593
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions.patch
- From: 5.4.0-181.201
- CVE-2023-52606, CVSSv2 Score: 7.1
- Description:
powerpc/lib: Validate size for vector operations
- CVE: https://ubuntu.com/security/CVE-2023-52606
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52606-powerpc-lib-validate-size-for-vector-operations.patch
- From: 5.4.0-181.201
- CVE-2023-52599, CVSSv2 Score: 7.1
- Description:
jfs: fix array-index-out-of-bounds in diNewExt
- CVE: https://ubuntu.com/security/CVE-2023-52599
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52599-jfs-fix-array-index-out-of-bounds-in-dinewext.patch
- From: 5.4.0-181.201
- CVE-2023-52598, CVSSv2 Score: 6.0
- Description:
s390/ptrace: handle setting of fpc register correctly
- CVE: https://ubuntu.com/security/CVE-2023-52598
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52598-s390-ptrace-handle-setting-of-fpc-register-correctly.patch
- From: 5.4.0-181.201
- CVE-2023-52597, CVSSv2 Score: 7.1
- Description:
KVM: s390: fix setting of fpc register
- CVE: https://ubuntu.com/security/CVE-2023-52597
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52597-kvm-s390-fix-setting-of-fpc-register.patch
- From: 5.4.0-181.201
- CVE-2024-26625, CVSSv2 Score: 7.8
- Description:
llc: call sock_orphan() at release time
- CVE: https://ubuntu.com/security/CVE-2024-26625
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26625-llc-call-sock-orphan-at-release-time.patch
- From: 5.4.0-181.201
- CVE-2024-26598, CVSSv2 Score: 7.8
- Description:
KVM: arm64: vgic-its: Avoid potential UAF in LPI translation
- CVE: https://ubuntu.com/security/CVE-2024-26598
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26598-kvm-arm64-vgic-its-avoid-potential-uaf-in-lpi-translation.patch
- From: 5.4.0-181.201
- CVE-2023-52435, CVSSv2 Score: 5.5
- Description:
net: prevent mss overflow in skb_segment()
- CVE: https://ubuntu.com/security/CVE-2023-52435
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52435-net-prevent-mss-overflow-in-skb-segment.patch
- From: 5.4.0-181.201
- CVE-2023-52583, CVSSv2 Score: 5.5
- Description:
ceph: fix deadlock or deadcode of misusing dget()
- CVE: https://ubuntu.com/security/CVE-2023-52583
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52583-ceph-fix-deadlock-or-deadcode-of-misusing-dget.patch
- From: 5.4.0-181.201
- CVE-2023-52607, CVSSv2 Score: 5.5
- Description:
powerpc/mm: Fix null-pointer dereference in pgtable_cache_add
- CVE: https://ubuntu.com/security/CVE-2023-52607
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52607-powerpc-mm-fix-null-pointer-dereference-in-pgtable-cache-add.patch
- From: 5.4.0-181.201
- CVE-2023-52623, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix a suspicious RCU usage warning
- CVE: https://ubuntu.com/security/CVE-2023-52623
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52623-sunrpc-fix-a-suspicious-rcu-usage-warning.patch
- From: 5.4.0-181.201
- CVE-2024-23849, CVSSv2 Score: 5.5
- Description:
net/rds: Fix UBSAN: array-index-out-of-bounds in
- CVE: https://ubuntu.com/security/CVE-2024-23849
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-23849-net-rds-fix-ubsan-array-index-out-of-bounds-in.patch
- From: 5.4.0-181.201
- CVE-2024-26600, CVSSv2 Score: 5.5
- Description:
phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
- CVE: https://ubuntu.com/security/CVE-2024-26600
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26600-phy-ti-phy-omap-usb2-fix-null-pointer-dereference-for-srp.patch
- From: 5.4.0-181.201
- CVE-2024-26602, CVSSv2 Score: 5.5
- Description:
sched/membarrier: reduce the ability to hammer on
- CVE: https://ubuntu.com/security/CVE-2024-26602
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
- From: 5.4.0-181.201
- CVE-2023-52637, CVSSv2 Score: 5.5
- Description:
can: j1939: Fix UAF in j1939_sk_match_filter during
- CVE: https://ubuntu.com/security/CVE-2023-52637
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52637-can-j1939-fix-uaf-in-j1939-sk-match-filter-during-2.patch
- From: 5.4.0-181.201
- CVE-2023-52637, CVSSv2 Score: 5.5
- Description:
can: j1939: Fix UAF in j1939_sk_match_filter during (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-52637
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52637-can-j1939-fix-uaf-in-j1939-sk-match-filter-during-kpatch.patch
- From: 5.4.0-181.201
- CVE-2023-52622, CVSSv2 Score: 5.5
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://ubuntu.com/security/CVE-2023-52622
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg.patch
- From: 5.4.0-181.201
- CVE-2023-52622, CVSSv2 Score: 5.5
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://ubuntu.com/security/CVE-2023-52622
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg-kpatch.patch
- From: 5.4.0-181.201
- CVE-2024-26606, CVSSv2 Score: 5.5
- Description:
binder: signal epoll threads of self-work
- CVE: https://ubuntu.com/security/CVE-2024-26606
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26606-binder-signal-epoll-threads-of-self-work.patch
- From: 5.4.0-181.201
- CVE-2024-26615, CVSSv2 Score: 5.5
- Description:
net/smc: fix illegal rmb_desc access in SMC-D connection dump
- CVE: https://ubuntu.com/security/CVE-2024-26615
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch
- From: 5.4.0-181.201
- CVE-2024-26635, CVSSv2 Score: 5.5
- Description:
llc: Drop support for ETH_P_TR_802_2.
- CVE: https://ubuntu.com/security/CVE-2024-26635
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26635-llc-drop-support-for-eth-p-tr-802-2.patch
- From: 5.4.0-181.201
- CVE-2024-26635, CVSSv2 Score: 5.5
- Description:
llc: Drop support for ETH_P_TR_802_2 (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26635
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26635-llc-drop-support-for-eth-p-tr-802-2-kpatch.patch
- From: 5.4.0-181.201
- CVE-2024-26636, CVSSv2 Score: 5.5
- Description:
llc: make llc_ui_sendmsg() more robust against bonding
- CVE: https://ubuntu.com/security/CVE-2024-26636
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26636-llc-make-llc-ui-sendmsg-more-robust-against-bonding.patch
- From: 5.4.0-181.201
- CVE-2024-26663, CVSSv2 Score: 5.5
- Description:
tipc: Check the bearer type before calling
- CVE: https://ubuntu.com/security/CVE-2024-26663
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26663-tipc-check-the-bearer-type-before-calling.patch
- From: 5.4.0-181.201
- CVE-2024-26671, CVSSv2 Score: 5.5
- Description:
blk-mq: fix IO hang from sbitmap wakeup race
- CVE: https://ubuntu.com/security/CVE-2024-26671
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26671-blk-mq-fix-io-hang-from-sbitmap-wakeup-race.patch
- From: 5.4.0-181.201
- CVE-2024-26673, CVSSv2 Score: 5.5
- Description:
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in
- CVE: https://ubuntu.com/security/CVE-2024-26673
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26673-netfilter-nft-ct-sanitize-layer-3-and-4-protocol-number-in.patch
- From: 5.4.0-181.201
- CVE-2024-26675, CVSSv2 Score: 5.5
- Description:
ppp_async: limit MRU to 64K
- CVE: https://ubuntu.com/security/CVE-2024-26675
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26675-ppp-async-limit-mru-to-64k.patch
- From: 5.4.0-181.201
- CVE-2024-26679, CVSSv2 Score: 5.5
- Description:
inet: read sk->sk_family once in inet_recv_error()
- CVE: https://ubuntu.com/security/CVE-2024-26679
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26679-inet-read-sk-sk-family-once-in-inet-recv-error.patch
- From: 5.4.0-181.201
- CVE-2024-26685, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential bug in end_buffer_async_write
- CVE: https://ubuntu.com/security/CVE-2024-26685
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26685-nilfs2-fix-potential-bug-in-end-buffer-async-write-1.patch
- From: 5.4.0-181.201
- CVE-2024-26696, CVSSv2 Score: 5.5
- Description:
nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()
- CVE: https://ubuntu.com/security/CVE-2024-26696
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26696-nilfs2-fix-hang-in-nilfs-lookup-dirty-data-buffers.patch
- From: 5.4.0-181.201
- CVE-2024-26697, CVSSv2 Score: 5.5
- Description:
nilfs2: fix data corruption in dsync block recovery for small
- CVE: https://ubuntu.com/security/CVE-2024-26697
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26697-nilfs2-fix-data-corruption-in-dsync-block-recovery-for-small.patch
- From: 5.4.0-181.201
- CVE-2024-26702, CVSSv2 Score: 5.5
- Description:
iio: magnetometer: rm3100: add boundary check for the value
- CVE: https://ubuntu.com/security/CVE-2024-26702
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26702-iio-magnetometer-rm3100-add-boundary-check-for-the-value.patch
- From: 5.4.0-181.201
- CVE-2024-26704, CVSSv2 Score: 5.5
- Description:
ext4: fix double-free of blocks due to wrong extents
- CVE: https://ubuntu.com/security/CVE-2024-26704
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26704-ext4-fix-double-free-of-blocks-due-to-wrong-extents.patch
- From: 5.4.0-181.201
- CVE-2024-26720, CVSSv2 Score: 5.5
- Description:
mm/writeback: fix possible divide-by-zero in
- CVE: https://ubuntu.com/security/CVE-2024-26720
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26720-mm-writeback-fix-possible-divide-by-zero-in.patch
- From: 5.4.0-181.201
- CVE-2023-52602, CVSSv2 Score: 4.7
- Description:
jfs: fix slab-out-of-bounds Read in dtSearch
- CVE: https://ubuntu.com/security/CVE-2023-52602
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52602-jfs-fix-slab-out-of-bounds-read-in-dtsearch.patch
- From: 5.4.0-181.201
- CVE-2023-52486, CVSSv2 Score: 4.4
- Description:
drm: Don't unref the same fb many times by mistake due to
- CVE: https://ubuntu.com/security/CVE-2023-52486
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52486-drm-don-t-unref-the-same-fb-many-times-by-mistake-due-to.patch
- From: 5.4.0-181.201
- CVE-2023-47233, CVSSv2 Score: 4.3
- Description:
wifi: brcmfmac: Fix use-after-free bug in
- CVE: https://ubuntu.com/security/CVE-2023-47233
- Patch: ubuntu-focal/5.4.0-182.202/CVE-2023-47233-wifi-brcmfmac-fix-use-after-free-bug-in.patch
- From: 5.4.0-182.202
- CVE-2024-26622, CVSSv2 Score: 7.8
- Description:
tomoyo: fix UAF write bug in tomoyo_write_control()
- CVE: https://ubuntu.com/security/CVE-2024-26622
- Patch: ubuntu-focal/5.4.0-182.202/CVE-2024-26622-tomoyo-fix-uaf-write-bug-in-tomoyo-write-control.patch
- From: 5.4.0-182.202
- CVE-2023-52530, CVSSv2 Score: 7.1
- Description:
wifi: mac80211: fix potential key use-after-free
- CVE: https://ubuntu.com/security/CVE-2023-52530
- Patch: ubuntu-focal/5.4.0-182.202/CVE-2023-52530-wifi-mac80211-fix-potential-key-use-after-free.patch
- From: 5.4.0-182.202
- CVE-2024-26614, CVSSv2 Score:
- Description:
Complex adaptation required. Network services prevents update because sleeps in inet_csk_accept() function.
- CVE:
- Patch: skipped/CVE-2024-26614.patch
- From:
- CVE-2024-0841 CVE-2024-26688, CVSSv2 Score: 5.5
- Description:
fs,hugetlb: fix NULL pointer dereference in
- CVE: https://ubuntu.com/security/CVE-2024-26688
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-0841-CVE-2024-26688-fs-hugetlb-fix-null-pointer-dereference-in.patch
- From: 5.4.0-186.206
- CVE-2021-47063, CVSSv2 Score: 6.7
- Description:
drm: bridge/panel: Cleanup connector on bridge detach
- CVE: https://ubuntu.com/security/CVE-2021-47063
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2021-47063-drm-bridge-panel-cleanup-connector-on-bridge-detach.patch
- From: 5.4.0-186.206
- CVE-2024-26733, CVSSv2 Score: 5.5
- Description:
arp: Prevent overflow in arp_req_get().
- CVE: https://ubuntu.com/security/CVE-2024-26733
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26733-arp-prevent-overflow-in-arp-req-get.patch
- From: 5.4.0-186.206
- CVE-2024-26736, CVSSv2 Score: 5.5
- Description:
afs: Increase buffer size in afs_update_volume_status()
- CVE: https://ubuntu.com/security/CVE-2024-26736
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26736-afs-increase-buffer-size-in-afs-update-volume-status.patch
- From: 5.4.0-186.206
- CVE-2024-26735, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix possible use-after-free and null-ptr-deref
- CVE: https://ubuntu.com/security/CVE-2024-26735
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and-null-ptr-deref.patch
- From: 5.4.0-186.206
- CVE-2023-52504, CVSSv2 Score:
- Description:
Unable to fix early initialization before enabling SMP d35652a5fc9944784f6f50a5c979518ff8dacf61
- CVE:
- Patch: skipped/CVE-2023-52504.patch
- From:
- CVE-2024-26712, CVSSv2 Score:
- Description:
Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0
- CVE:
- Patch: skipped/CVE-2024-26712.patch
- From:
- CVE-2024-26748, CVSSv2 Score: 5.5
- Description:
usb: cdns3: fix memory double free when handle zero packet
- CVE: https://ubuntu.com/security/CVE-2024-26748
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26748-usb-cdns3-fix-memory-double-free-when-handle-zero-packet.patch
- From: 5.4.0-186.206
- CVE-2024-26749, CVSSv2 Score: 5.5
- Description:
usb: cdns3: fixed memory use after free at
- CVE: https://ubuntu.com/security/CVE-2024-26749
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26749-usb-cdns3-fixed-memory-use-after-free-at.patch
- From: 5.4.0-186.206
- CVE-2024-26751, CVSSv2 Score: 5.5
- Description:
ARM: ep93xx: Add terminator to gpiod_lookup_table
- CVE: https://ubuntu.com/security/CVE-2024-26751
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26751-arm-ep93xx-add-terminator-to-gpiod-lookup-table.patch
- From: 5.4.0-186.206
- CVE-2024-26754, CVSSv2 Score: 5.5
- Description:
gtp: fix use-after-free and null-ptr-deref in
- CVE: https://ubuntu.com/security/CVE-2024-26754
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26754-gtp-fix-use-after-free-and-null-ptr-deref-in.patch
- From: 5.4.0-186.206
- CVE-2024-26763, CVSSv2 Score: 5.5
- Description:
dm-crypt: don't modify the data when using authenticated
- CVE: https://ubuntu.com/security/CVE-2024-26763
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26763-dm-crypt-don-t-modify-the-data-when-using-authenticated.patch
- From: 5.4.0-186.206
- CVE-2024-26764, CVSSv2 Score: 5.5
- Description:
fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via
- CVE: https://ubuntu.com/security/CVE-2024-26764
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26764-fs-aio-restrict-kiocb-set-cancel-fn-to-i-o-submitted-via.patch
- From: 5.4.0-186.206
- CVE-2024-26766, CVSSv2 Score: N/A
- Description:
IB/hfi1: Fix sdma.h tx->num_descs off-by-one error
- CVE: https://ubuntu.com/security/CVE-2024-26766
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26766-ib-hfi1-fix-sdma-h-tx-num-descs-off-by-one-errors-pre166.patch
- From: 5.4.0-165.182
- CVE-2024-26766, CVSSv2 Score: 5.5
- Description:
IB/hfi1: Fix sdma.h tx->num_descs off-by-one error
- CVE: https://ubuntu.com/security/CVE-2024-26766
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26766-ib-hfi1-fix-sdma-h-tx-num-descs-off-by-one-error.patch
- From: 5.4.0-186.206
- CVE-2024-26752, CVSSv2 Score: 5.5
- Description:
l2tp: pass correct message length to ip6_append_data
- CVE: https://ubuntu.com/security/CVE-2024-26752
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26752-l2tp-pass-correct-message-length-to-ip6-append-data-171.patch
- From: 5.4.0-186.206
- CVE-2024-26793, CVSSv2 Score: 5.5
- Description:
gtp: fix use-after-free and null-ptr-deref in gtp_newlink()
- CVE: https://ubuntu.com/security/CVE-2024-26793
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26793-gtp-fix-use-after-free-and-null-ptr-deref-in-gtp-newlink.patch
- From: 5.4.0-186.206
- CVE-2024-26778, CVSSv2 Score: 5.5
- Description:
fbdev: savage: Error out if pixclock equals zero
- CVE: https://ubuntu.com/security/CVE-2024-26778
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26778-fbdev-savage-error-out-if-pixclock-equals-zero.patch
- From: 5.4.0-186.206
- CVE-2024-26779, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: fix race condition on enabling fast-xmit
- CVE: https://ubuntu.com/security/CVE-2024-26779
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26779-wifi-mac80211-fix-race-condition-on-enabling-fast-xmit.patch
- From: 5.4.0-186.206
- CVE-2024-26777, CVSSv2 Score: 5.5
- Description:
fbdev: sis: Error out if pixclock equals zero
- CVE: https://ubuntu.com/security/CVE-2024-26777
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26777-fbdev-sis-error-out-if-pixclock-equals-zero.patch
- From: 5.4.0-186.206
- CVE-2024-26773, CVSSv2 Score: 5.5
- Description:
ext4: avoid allocating blocks from corrupted group in
- CVE: https://ubuntu.com/security/CVE-2024-26773
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26773-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 5.4.0-186.206
- CVE-2024-26772, CVSSv2 Score: 5.5
- Description:
ext4: avoid allocating blocks from corrupted group in
- CVE: https://ubuntu.com/security/CVE-2024-26772
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26772-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 5.4.0-186.206
- CVE-2024-26791, CVSSv2 Score: 5.5
- Description:
btrfs: dev-replace: properly validate device names
- CVE: https://ubuntu.com/security/CVE-2024-26791
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26791-btrfs-dev-replace-properly-validate-device-names.patch
- From: 5.4.0-186.206
- CVE-2024-26788, CVSSv2 Score: 5.5
- Description:
dmaengine: fsl-qdma: init irq after reg initialization
- CVE: https://ubuntu.com/security/CVE-2024-26788
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26788-dmaengine-fsl-qdma-init-irq-after-reg-initialization.patch
- From: 5.4.0-186.206
- CVE-2024-26790, CVSSv2 Score: 5.5
- Description:
dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned
- CVE: https://ubuntu.com/security/CVE-2024-26790
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26790-dmaengine-fsl-qdma-fix-soc-may-hang-on-16-byte-unaligned.patch
- From: 5.4.0-186.206
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A