- kernel-6.8.0-1011.12 (ubuntu-noble)
- 6.8.0-1047.50
- 2026-03-25 09:52:54
- 2026-03-27 17:42:17
- K20260325_06
- CVE-2024-35992
- Description:
phy: marvell: a3700-comphy: Fix out of bounds read
- CVE: https://ubuntu.com/security/CVE-2024-35992
- Patch: ubuntu-noble/6.8.0-39.39/CVE-2024-35992-phy-marvell-a3700-comphy-fix-out-of-bounds-read.patch
- From: 6.8.0-39.39
- CVE-2024-36008
- Description:
ipv4: check for NULL idev in ip_route_use_hint()
- CVE: https://ubuntu.com/security/CVE-2024-36008
- Patch: ubuntu-noble/6.8.0-39.39/CVE-2024-36008-ipv4-check-for-null-idev-in-ip-route-use-hint.patch
- From: 6.8.0-39.39
- CVE-2024-36016
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://ubuntu.com/security/CVE-2024-36016
- Patch: ubuntu-noble/6.8.0-39.39/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-gsm0-receive.patch
- From: 6.8.0-39.39
- CVE-2024-35997
- Description:
HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up
- CVE: https://ubuntu.com/security/CVE-2024-35997
- Patch: ubuntu-noble/6.8.0-39.39/CVE-2024-35997-hid-i2c-hid-remove-i2c-hid-read-pending-flag-to-prevent.patch
- From: 6.8.0-39.39
- CVE-2024-35990
- Description:
dma: xilinx_dpdma: Fix locking
- CVE: https://ubuntu.com/security/CVE-2024-35990
- Patch: ubuntu-noble/6.8.0-39.39/CVE-2024-35990-dma-xilinx-dpdma-fix-locking.patch
- From: 6.8.0-39.39
- CVE-2024-35984
- Description:
i2c: smbus: fix NULL function pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-35984
- Patch: ubuntu-noble/6.8.0-39.39/CVE-2024-35984-i2c-smbus-fix-null-function-pointer-dereference.patch
- From: 6.8.0-39.39
- CVE-2024-25742
- Description:
x86/sev: Harden #VC instruction emulation somewhat
- CVE: https://ubuntu.com/security/CVE-2024-25742
- Patch: ubuntu-noble/6.8.0-39.39/CVE-2024-25742-x86-sev-harden-vc-instruction-emulation-somewhat.patch
- From: 6.8.0-39.39
- CVE-2024-25742
- Description:
x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler
- CVE: https://ubuntu.com/security/CVE-2024-25742
- Patch: ubuntu-noble/6.8.0-39.39/CVE-2024-25742-x86-sev-check-for-mwaitx-and-monitorx-opcodes-in-the-vc.patch
- From: 6.8.0-39.39
- CVE-2024-41011
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://ubuntu.com/security/CVE-2024-41011
- Patch: ubuntu-noble/6.8.0-40.40/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 6.8.0-40.40
- CVE-2024-38577
- Description:
rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
- CVE: https://ubuntu.com/security/CVE-2024-38577
- Patch: ubuntu-noble/6.8.0-40.40/CVE-2024-38577-rcu-tasks-fix-show-rcu-tasks-trace-gp-kthread-buffer-overflow.patch
- From: 6.8.0-40.40
- CVE-2024-38562
- Description:
wifi: nl80211: Avoid address calculations via out of bounds array indexing
- CVE: https://ubuntu.com/security/CVE-2024-38562
- Patch: ubuntu-noble/6.8.0-40.40/CVE-2024-38562-wifi-nl80211-avoid-address-calculations-via-out-of-bounds-array-indexing.patch
- From: 6.8.0-40.40
- CVE-2024-38561
- Description:
kunit: Fix kthread reference
- CVE: https://ubuntu.com/security/CVE-2024-38561
- Patch: ubuntu-noble/6.8.0-40.40/CVE-2024-38561-kunit-fix-kthread-reference.patch
- From: 6.8.0-40.40
- CVE-2024-38555
- Description:
net/mlx5: Discard command completions in internal error
- CVE: https://ubuntu.com/security/CVE-2024-38555
- Patch: ubuntu-noble/6.8.0-40.40/CVE-2024-38555-net-mlx5-discard-command-completions-in-internal-error.patch
- From: 6.8.0-40.40
- CVE-2024-38552
- Description:
drm/amd/display: Fix potential index out of bounds in color transformation function
- CVE: https://ubuntu.com/security/CVE-2024-38552
- Patch: ubuntu-noble/6.8.0-40.40/CVE-2024-38552-drm-amd-display-fix-potential-index-out-of-bounds-in-color-transformation-function.patch
- From: 6.8.0-40.40
- CVE-2024-38545
- Description:
RDMA/hns: Fix UAF for cq async event
- CVE: https://ubuntu.com/security/CVE-2024-38545
- Patch: ubuntu-noble/6.8.0-40.40/CVE-2024-38545-rdma-hns-fix-uaf-for-cq-async-event.patch
- From: 6.8.0-40.40
- CVE-2024-36979
- Description:
net: bridge: mst: fix vlan use-after-free
- CVE: https://ubuntu.com/security/CVE-2024-36979
- Patch: ubuntu-noble/6.8.0-40.40/CVE-2024-36979-net-bridge-mst-fix-vlan-use-after-free.patch
- From: 6.8.0-40.40
- CVE-2024-39292
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-39292.patch
- From:
- CVE-2024-39484
- Description:
mmc: davinci: Don't strip remove function when driver is builtin
- CVE: https://ubuntu.com/security/CVE-2024-39484
- Patch: ubuntu-noble/6.8.0-41.41/CVE-2024-39484-mmc-davinci-don-t-strip-remove-function-when-driver-is-builtin.patch
- From: 6.8.0-41.41
- CVE-2024-38630
- Description:
watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
- CVE: https://ubuntu.com/security/CVE-2024-38630
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-38630-watchdog-cpu5wdt-c-fix-use-after-free-bug-caused-by.patch
- From: 6.8.0-44.44
- CVE-2024-38627
- Description:
stm class: Fix a double free in stm_register_device()
- CVE: https://ubuntu.com/security/CVE-2024-38627
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-38627-stm-class-fix-a-double-free-in-stm-register-device.patch
- From: 6.8.0-44.44
- CVE-2024-39291
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-39291.patch
- From:
- CVE-2024-38664
- Description:
drm: zynqmp_dpsub: Always register bridge
- CVE: https://ubuntu.com/security/CVE-2024-38664
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-38664-drm-zynqmp-dpsub-always-register-bridge.patch
- From: 6.8.0-44.44
- CVE-2024-36477
- Description:
tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
- CVE: https://ubuntu.com/security/CVE-2024-36477
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-36477-tpm-tis-spi-account-for-spi-header-when-allocating-tpm-spi.patch
- From: 6.8.0-44.44
- CVE-2024-39277
- Description:
dma-mapping: benchmark: handle NUMA_NO_NODE correctly
- CVE: https://ubuntu.com/security/CVE-2024-39277
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39277-dma-mapping-benchmark-handle-numa-no-node-correctly.patch
- From: 6.8.0-44.44
- CVE-2024-38667
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-38667.patch
- From:
- CVE-2024-39463
- Description:
9p: add missing locking around taking dentry fid list
- CVE: https://ubuntu.com/security/CVE-2024-39463
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39463-9p-add-missing-locking-around-taking-dentry-fid-list.patch
- From: 6.8.0-44.44
- CVE-2024-36978
- Description:
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
- CVE: https://ubuntu.com/security/CVE-2024-36978
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in.patch
- From: 6.8.0-44.44
- CVE-2024-40903
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-40903.patch
- From:
- CVE-2024-39479
- Description:
drm/i915/hwmon: Get rid of devm
- CVE: https://ubuntu.com/security/CVE-2024-39479
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39479-drm-i915-hwmon-get-rid-of-devm.patch
- From: 6.8.0-44.44
- CVE-2024-39480
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://ubuntu.com/security/CVE-2024-39480
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39480-kdb-fix-buffer-overflow-during-tab-complete.patch
- From: 6.8.0-44.44
- CVE-2024-40906
- Description:
net/mlx5: Always stop health timer during driver removal
- CVE: https://ubuntu.com/security/CVE-2024-40906
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-40906-net-mlx5-always-stop-health-timer-during-driver-removal.patch
- From: 6.8.0-44.44
- CVE-2024-40902
- Description:
jfs: xattr: fix buffer overflow for invalid xattr
- CVE: https://ubuntu.com/security/CVE-2024-40902
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-40902-jfs-xattr-fix-buffer-overflow-for-invalid-xattr.patch
- From: 6.8.0-44.44
- CVE-2024-40899
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2024-40899.patch
- From:
- CVE-2024-39510
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2024-39510.patch
- From:
- CVE-2024-39496
- Description:
btrfs: zoned: fix use-after-free due to race with dev replace
- CVE: https://ubuntu.com/security/CVE-2024-39496
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39496-btrfs-zoned-fix-use-after-free-due-to-race-with-dev-replace.patch
- From: 6.8.0-44.44
- CVE-2024-39495
- Description:
greybus: Fix use-after-free bug in gb_interface_release due to race condition.
- CVE: https://ubuntu.com/security/CVE-2024-39495
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39495-greybus-fix-use-after-free-bug-in-gb-interface-release-due.patch
- From: 6.8.0-44.44
- CVE-2024-39494
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://ubuntu.com/security/CVE-2024-39494
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-39494-ima-fix-use-after-free-on-a-dentry-s-dname-name.patch
- From: 6.8.0-44.44
- CVE-2024-36971
- Description:
net: fix __dst_negative_advice() race
- CVE: https://ubuntu.com/security/CVE-2024-36971
- Patch: ubuntu-noble/6.8.0-44.44/CVE-2024-36971-net-fix-dst-negative-advice-race.patch
- From: 6.8.0-44.44
- CVE-2024-42159
- Description:
scsi: mpi3mr: Sanitise num_phys
- CVE: https://ubuntu.com/security/CVE-2024-42159
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42159-scsi-mpi3mr-sanitise-num-phys.patch
- From: 6.8.0-45.45
- CVE-2024-42228
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://ubuntu.com/security/CVE-2024-42228
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling.patch
- From: 6.8.0-45.45
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://ubuntu.com/security/CVE-2024-42154
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 6.8.0-45.45
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://ubuntu.com/security/CVE-2024-42154
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 6.8.0-45.45
- CVE-2024-42224
- Description:
net: dsa: mv88e6xxx: Correct check for empty list
- CVE: https://ubuntu.com/security/CVE-2024-42224
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42224-net-dsa-mv88e6xxx-correct-check-for-empty-list.patch
- From: 6.8.0-45.45
- CVE-2024-42160
- Description:
f2fs: check validation of fault attrs in f2fs_build_fault_attr()
- CVE: https://ubuntu.com/security/CVE-2024-42160
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42160-f2fs-check-validation-of-fault-attrs-in.patch
- From: 6.8.0-45.45
- CVE-2024-42160
- Description:
f2fs: Add inline to f2fs_build_fault_attr() stub
- CVE: https://ubuntu.com/security/CVE-2024-42160
- Patch: ubuntu-noble/6.8.0-45.45/CVE-2024-42160-f2fs-add-inline-to-f2fs-build-fault-attr-stub.patch
- From: 6.8.0-45.45
- CVE-2024-41009
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2024-41009.patch
- From:
- CVE-2024-45016
- Description:
netem: fix return value if duplicate enqueue fails
- CVE: https://ubuntu.com/security/CVE-2024-45016
- Patch: ubuntu-noble/6.8.0-47.47/CVE-2024-45016-netem-fix-return-value-if-duplicate-enqueue-fails.patch
- From: 6.8.0-47.47
- CVE-2024-42104
- Description:
nilfs2: add missing check for inode numbers on directory entries
- CVE: https://ubuntu.com/security/CVE-2024-42104
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-42104-nilfs2-add-missing-check-for-inode-numbers-on-directory-entries.patch
- From: 6.8.0-48.48
- CVE-2024-42094
- Description:
net/iucv: Avoid explicit cpumask var allocation on stack
- CVE: https://ubuntu.com/security/CVE-2024-42094
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-42094-net-iucv-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 6.8.0-48.48
- CVE-2024-42093
- Description:
net/dpaa2: Avoid explicit cpumask var allocation on stack
- CVE: https://ubuntu.com/security/CVE-2024-42093
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-42093-net-dpaa2-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 6.8.0-48.48
- CVE-2024-41096
- Description:
PCI/MSI: Fix UAF in msi_capability_init
- CVE: https://ubuntu.com/security/CVE-2024-41096
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41096-pci-msi-fix-uaf-in-msi-capability-init.patch
- From: 6.8.0-48.48
- CVE-2024-41092
- Description:
drm/i915/gt: Fix potential UAF by revoke of fence registers
- CVE: https://ubuntu.com/security/CVE-2024-41092
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41092-drm-i915-gt-fix-potential-uaf-by-revoke-of-fence-registers.patch
- From: 6.8.0-48.48
- CVE-2024-42161
- Description:
bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
- CVE: https://ubuntu.com/security/CVE-2024-42161
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-42161-bpf-avoid-uninitialized-value-in-bpf-core-read-bitfield.patch
- From: 6.8.0-48.48
- CVE-2024-42136
- Description:
cdrom: rearrange last_media_change check to avoid unintentional overflow
- CVE: https://ubuntu.com/security/CVE-2024-42136
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-42136-cdrom-rearrange-last-media-change-check-to-avoid-unintentional-overflow.patch
- From: 6.8.0-48.48
- CVE-2024-42108
- Description:
net: rswitch: Avoid use-after-free in rswitch_poll()
- CVE: https://ubuntu.com/security/CVE-2024-42108
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-42108-net-rswitch-avoid-use-after-free-in-rswitch-poll.patch
- From: 6.8.0-48.48
- CVE-2024-42271
- Description:
net/iucv: fix use after free in iucv_sock_close()
- CVE: https://ubuntu.com/security/CVE-2024-42271
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv-sock-close.patch
- From: 6.8.0-48.48
- CVE-2024-42280
- Description:
mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://ubuntu.com/security/CVE-2024-42280
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-42280-misdn-fix-a-use-after-free-in-hfcmulti-tx.patch
- From: 6.8.0-48.48
- CVE-2024-41039
- Description:
firmware: cs_dsp: Fix overflow checking of wmfw header
- CVE: https://ubuntu.com/security/CVE-2024-41039
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41039-firmware-cs-dsp-fix-overflow-checking-of-wmfw-header.patch
- From: 6.8.0-48.48
- CVE-2024-41039
- Description:
firmware: cs_dsp: Fix overflow checking of wmfw header
- CVE: https://ubuntu.com/security/CVE-2024-41039
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41039-firmware-cs-dsp-fix-overflow-checking-of-wmfw-header-kpatch.patch
- From: 6.8.0-48.48
- CVE-2024-41046
- Description:
net: ethernet: lantiq_etop: fix double free in detach
- CVE: https://ubuntu.com/security/CVE-2024-41046
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41046-net-ethernet-lantiq-etop-fix-double-free-in-detach.patch
- From: 6.8.0-48.48
- CVE-2024-41049
- Description:
filelock: fix potential use-after-free in posix_lock_inode
- CVE: https://ubuntu.com/security/CVE-2024-41049
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41049-filelock-fix-potential-use-after-free-in-posix-lock-inode.patch
- From: 6.8.0-48.48
- CVE-2024-41061
- Description:
drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport
- CVE: https://ubuntu.com/security/CVE-2024-41061
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41061-drm-amd-display-fix-array-index-out-of-bounds-in-dml2-fclkchangesupport.patch
- From: 6.8.0-48.48
- CVE-2024-41070
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41070.patch
- From:
- CVE-2024-41071
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://ubuntu.com/security/CVE-2024-41071
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41071-wifi-mac80211-avoid-address-calculations-via-out-of-bounds-array-indexing.patch
- From: 6.8.0-48.48
- CVE-2024-41073
- Description:
nvme: avoid double free special payload
- CVE: https://ubuntu.com/security/CVE-2024-41073
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41073-nvme-avoid-double-free-special-payload.patch
- From: 6.8.0-48.48
- CVE-2024-41087
- Description:
ata: libata-core: Fix double free on error
- CVE: https://ubuntu.com/security/CVE-2024-41087
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41087-ata-libata-core-fix-double-free-on-error.patch
- From: 6.8.0-48.48
- CVE-2024-41057
- Description:
netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume()
- CVE: https://ubuntu.com/security/CVE-2024-41057
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41057-netfs-fscache-export-fscache_put_volume-and-add.patch
- From: 6.8.0-48.48
- CVE-2024-41057
- Description:
cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()
- CVE: https://ubuntu.com/security/CVE-2024-41057
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41057-cachefiles-fix-slab-use-after-free-in-cachefiles_withdraw_cookie.patch
- From: 6.8.0-48.48
- CVE-2024-41058
- Description:
cachefiles: fix slab-use-after-free in fscache_withdraw_volume()
- CVE: https://ubuntu.com/security/CVE-2024-41058
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41058-cachefiles-fix-slab-use-after-free-in-fscache_withdraw_volume.patch
- From: 6.8.0-48.48
- CVE-2024-41058
- Description:
cachefiles: fix slab-use-after-free in fscache_withdraw_volume()
- CVE: https://ubuntu.com/security/CVE-2024-41058
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41058-cachefiles-fix-slab-use-after-free-in-fscache-withdraw-volume-kpatch.patch
- From: 6.8.0-48.48
- CVE-2024-42225
- Description:
wifi: mt76: replace skb_put with skb_put_zero
- CVE: https://ubuntu.com/security/CVE-2024-42225
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-42225-wifi-mt76-replace-skb-put-with-skb-put-zero.patch
- From: 6.8.0-48.48
- CVE-2024-43858
- Description:
jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://ubuntu.com/security/CVE-2024-43858
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-43858-jfs-fix-array-index-out-of-bounds-in-difree.patch
- From: 6.8.0-48.48
- CVE-2024-39487
- Description:
bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()
- CVE: https://ubuntu.com/security/CVE-2024-39487
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-39487-bonding-fix-out-of-bounds-read-in-bond-option-arp-ip-targets-set.patch
- From: 6.8.0-48.48
- CVE-2024-41059
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://ubuntu.com/security/CVE-2024-41059
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy-name.patch
- From: 6.8.0-48.48
- CVE-2024-41090
- Description:
tap: add missing verification for short frame
- CVE: https://ubuntu.com/security/CVE-2024-41090
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 6.8.0-48.48
- CVE-2024-41091
- Description:
tun: add missing verification for short frame
- CVE: https://ubuntu.com/security/CVE-2024-41091
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 6.8.0-48.48
- CVE-2024-39486
- Description:
drm/drm_file: Fix pid refcounting race
- CVE: https://ubuntu.com/security/CVE-2024-39486
- Patch: ubuntu-noble/6.8.0-48.48/CVE-2024-39486-drm-drm-file-fix-pid-refcounting-race.patch
- From: 6.8.0-48.48
- CVE-2024-46800
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://ubuntu.com/security/CVE-2024-46800
- Patch: ubuntu-noble/6.8.0-49.49/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 6.8.0-49.49
- CVE-2024-43882
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://ubuntu.com/security/CVE-2024-43882
- Patch: ubuntu-noble/6.8.0-49.49/CVE-2024-43882-exec-Fix-ToCToU-between-perm-check-and-set-uid-gid-usage.patch
- From: 6.8.0-49.49
- CVE-2024-42285
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://ubuntu.com/security/CVE-2024-42285
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-42285-rdma-iwcm-fix-a-use-after-free-related-to-destroying-cm-ids.patch
- From: 6.8.0-50.51
- CVE-2024-42301
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://ubuntu.com/security/CVE-2024-42301
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 6.8.0-50.51
- CVE-2024-46831
- Description:
net: microchip: vcap: Fix use-after-free error in kunit test
- CVE: https://ubuntu.com/security/CVE-2024-46831
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46831-net-microchip-vcap-Fix-use-after-free-error-in-kunit-test.patch
- From: 6.8.0-50.51
- CVE-2024-46743
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://ubuntu.com/security/CVE-2024-46743
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 6.8.0-50.51
- CVE-2024-46743
- Description:
of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one()
- CVE: https://ubuntu.com/security/CVE-2024-46743
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46743-of-irq-Fix-using-uninitialized-variable-addr_len-in-API-of_irq_parse_one.patch
- From: 6.8.0-50.51
- CVE-2024-46723
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46723
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 6.8.0-50.51
- CVE-2024-46724
- Description:
drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://ubuntu.com/security/CVE-2024-46724
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46724-drm-amdgpu-fix-out-of-bounds-read-of-df-v1-7-channel-number.patch
- From: 6.8.0-50.51
- CVE-2024-46747
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://ubuntu.com/security/CVE-2024-46747
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 6.8.0-50.51
- CVE-2024-46731
- Description:
drm/amd/pm: fix the Out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46731
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46731-drm-amd-pm-fix-the-out-of-bounds-read-warning.patch
- From: 6.8.0-50.51
- CVE-2024-46774
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-46774.patch
- From:
- CVE-2024-46858
- Description:
mptcp: pm: Fix uaf in __timer_delete_sync
- CVE: https://ubuntu.com/security/CVE-2024-46858
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46858-mptcp-pm-fix-uaf-in-timer-delete-sync.patch
- From: 6.8.0-50.51
- CVE-2024-46854
- Description:
net: dpaa: Pad packets to ETH_ZLEN
- CVE: https://ubuntu.com/security/CVE-2024-46854
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46854-net-dpaa-pad-packets-to-eth-zlen.patch
- From: 6.8.0-50.51
- CVE-2024-42302
- Description:
Patched function waits for external events, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-42302.patch
- From:
- CVE-2024-42284
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://ubuntu.com/security/CVE-2024-42284
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 6.8.0-50.51
- CVE-2024-43852
- Description:
hwmon: (ltc2991) re-order conditions to fix off by one bug
- CVE: https://ubuntu.com/security/CVE-2024-43852
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-43852-hwmon-ltc2991-re-order-conditions-to-fix-off-by-one-bug.patch
- From: 6.8.0-50.51
- CVE-2024-43843
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-43843.patch
- From:
- CVE-2024-44934
- Description:
net: bridge: mcast: wait for previous gc cycles when removing port
- CVE: https://ubuntu.com/security/CVE-2024-44934
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44934-net-bridge-mcast-wait-for-previous-gc-cycles-when-removing-port.patch
- From: 6.8.0-50.51
- CVE-2024-43900
- Description:
media: xc2028: avoid use-after-free in load_firmware_cb()
- CVE: https://ubuntu.com/security/CVE-2024-43900
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-43900-media-xc2028-avoid-use-after-free-in-load-firmware-cb.patch
- From: 6.8.0-50.51
- CVE-2024-44967
- Description:
drm/mgag200: Bind I2C lifetime to DRM device
- CVE: https://ubuntu.com/security/CVE-2024-44967
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44967-drm-mgag200-bind-i2c-lifetime-to-drm-device.patch
- From: 6.8.0-50.51
- CVE-2024-44977
- Description:
drm/amdgpu: Validate TA binary size
- CVE: https://ubuntu.com/security/CVE-2024-44977
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44977-drm-amdgpu-validate-ta-binary-size.patch
- From: 6.8.0-50.51
- CVE-2024-44978
- Description:
drm/xe: Free job before xe_exec_queue_put
- CVE: https://ubuntu.com/security/CVE-2024-44978
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44978-drm-xe-free-job-before-xe-exec-queue-put.patch
- From: 6.8.0-50.51
- CVE-2024-46673
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://ubuntu.com/security/CVE-2024-46673
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46673-scsi-aacraid-fix-double-free-on-probe-failure.patch
- From: 6.8.0-50.51
- CVE-2024-46757
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46757
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 6.8.0-50.51
- CVE-2024-46725
- Description:
drm/amdgpu: Fix out-of-bounds write warning
- CVE: https://ubuntu.com/security/CVE-2024-46725
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46725-drm-amdgpu-fix-out-of-bounds-write-warning.patch
- From: 6.8.0-50.51
- CVE-2024-46821
- Description:
drm/amd/pm: Fix negative array index read
- CVE: https://ubuntu.com/security/CVE-2024-46821
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46821-drm-amd-pm-fix-negative-array-index-read.patch
- From: 6.8.0-50.51
- CVE-2024-46818
- Description:
drm/amd/display: Check gpio_id before used as array index
- CVE: https://ubuntu.com/security/CVE-2024-46818
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46818-drm-amd-display-check-gpio-id-before-used-as-array-index.patch
- From: 6.8.0-50.51
- CVE-2024-46815
- Description:
drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]
- CVE: https://ubuntu.com/security/CVE-2024-46815
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46815-drm-amd-display-check-num-valid-sets-before-accessing-reader-wm-sets.patch
- From: 6.8.0-50.51
- CVE-2024-46814
- Description:
drm/amd/display: Check msg_id before processing transcation
- CVE: https://ubuntu.com/security/CVE-2024-46814
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46814-drm-amd-display-check-msg-id-before-processing-transcation.patch
- From: 6.8.0-50.51
- CVE-2024-46812
- Description:
drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration
- CVE: https://ubuntu.com/security/CVE-2024-46812
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46812-drm-amd-display-skip-inactive-planes-within-modesupportandsystemconfiguration.patch
- From: 6.8.0-50.51
- CVE-2024-44998
- Description:
atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://ubuntu.com/security/CVE-2024-44998
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue-rx.patch
- From: 6.8.0-50.51
- CVE-2024-43842
- Description:
wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()
- CVE: https://ubuntu.com/security/CVE-2024-43842
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-43842-wifi-rtw89-fix-array-index-mistake-in-rtw89-sta-info-get-iter.patch
- From: 6.8.0-50.51
- CVE-2024-43825
- Description:
iio: Fix the sorting functionality in iio_gts_build_avail_time_table
- CVE: https://ubuntu.com/security/CVE-2024-43825
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-43825-iio-fix-the-sorting-functionality-in-iio-gts-build-avail-time-table.patch
- From: 6.8.0-50.51
- CVE-2024-43873
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://ubuntu.com/security/CVE-2024-43873
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-43873-vhost-vsock-always-initialize-seqpacket-allow.patch
- From: 6.8.0-50.51
- CVE-2024-42314
- Description:
btrfs: fix extent map use-after-free when adding pages to compressed bio
- CVE: https://ubuntu.com/security/CVE-2024-42314
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-42314-btrfs-fix-extent-map-use-after-free-when-adding-pages-to-compressed-bio.patch
- From: 6.8.0-50.51
- CVE-2024-42313
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://ubuntu.com/security/CVE-2024-42313
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 6.8.0-50.51
- CVE-2024-46744
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://ubuntu.com/security/CVE-2024-46744
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46744-squashfs-sanity-check-symbolic-link-size.patch
- From: 6.8.0-50.51
- CVE-2024-46741
- Description:
misc: fastrpc: Fix double free of 'buf' in error path
- CVE: https://ubuntu.com/security/CVE-2024-46741
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46741-misc-fastrpc-fix-double-free-of-buf-in-error-path.patch
- From: 6.8.0-50.51
- CVE-2024-46740
- Description:
binder: fix UAF caused by offsets overwrite
- CVE: https://ubuntu.com/security/CVE-2024-46740
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46740-binder-fix-uaf-caused-by-offsets-overwrite.patch
- From: 6.8.0-50.51
- CVE-2024-46811
- Description:
drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box
- CVE: https://ubuntu.com/security/CVE-2024-46811
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46811-drm-amd-display-fix-index-may-exceed-array-range-within-fpu-update-bw-bounding-box.patch
- From: 6.8.0-50.51
- CVE-2024-46813
- Description:
drm/amd/display: Check link_index before accessing dc->links[]
- CVE: https://ubuntu.com/security/CVE-2024-46813
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46813-drm-amd-display-check-link-index-before-accessing-dc-links.patch
- From: 6.8.0-50.51
- CVE-2024-46830
- Description:
KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS
- CVE: https://ubuntu.com/security/CVE-2024-46830
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46830-kvm-x86-acquire-kvm-srcu-when-handling-kvm-set-vcpu-events.patch
- From: 6.8.0-50.51
- CVE-2024-46845
- Description:
tracing/timerlat: Only clear timer if a kthread exists
- CVE: https://ubuntu.com/security/CVE-2024-46845
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46845-tracing-timerlat-only-clear-timer-if-a-kthread-exists.patch
- From: 6.8.0-50.51
- CVE-2024-46828
- Description:
sched: sch_cake: fix bulk flow accounting logic for host fairness
- CVE: https://ubuntu.com/security/CVE-2024-46828
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46828-sched-sch-cake-fix-bulk-flow-accounting-logic-for-host-fairness.patch
- From: 6.8.0-50.51
- CVE-2024-46836
- Description:
usb: gadget: aspeed_udc: validate endpoint index for ast udc
- CVE: https://ubuntu.com/security/CVE-2024-46836
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46836-usb-gadget-aspeed-udc-validate-endpoint-index-for-ast-udc.patch
- From: 6.8.0-50.51
- CVE-2024-46746
- Description:
HID: amd_sfh: free driver_data after destroying hid device
- CVE: https://ubuntu.com/security/CVE-2024-46746
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46746-hid-amd-sfh-free-driver-data-after-destroying-hid-device.patch
- From: 6.8.0-50.51
- CVE-2024-43888
- Description:
mm: list_lru: fix UAF for memory cgroup
- CVE: https://ubuntu.com/security/CVE-2024-43888
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-43888-mm-list-lru-fix-uaf-for-memory-cgroup.patch
- From: 6.8.0-50.51
- CVE-2024-44941
- Description:
f2fs: fix to cover read extent cache access with lock
- CVE: https://ubuntu.com/security/CVE-2024-44941
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44941-f2fs-fix-to-cover-read-extent-cache-access-with-lock.patch
- From: 6.8.0-50.51
- CVE-2024-46738
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://ubuntu.com/security/CVE-2024-46738
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46738-vmci-fix-use-after-free-when-removing-resource-in-vmci-resource-remove.patch
- From: 6.8.0-50.51
- CVE-2024-46756
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46756
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 6.8.0-50.51
- CVE-2024-46758
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46758
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 6.8.0-50.51
- CVE-2024-46759
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46759
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 6.8.0-50.51
- CVE-2024-45026
- Description:
Architecture is not supported
- CVE:
- Patch: skipped/CVE-2024-45026.patch
- From:
- CVE-2024-44986
- Description:
ipv6: fix possible UAF in ip6_finish_output2()
- CVE: https://ubuntu.com/security/CVE-2024-44986
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44986-ipv6-fix-possible-uaf-in-ip6-finish-output2.patch
- From: 6.8.0-50.51
- CVE-2024-44985
- Description:
ipv6: prevent possible UAF in ip6_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-44985
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-44985-ipv6-prevent-possible-uaf-in-ip6-xmit.patch
- From: 6.8.0-50.51
- CVE-2024-47659
- Description:
smack: tcp: ipv4, fix incorrect labeling
- CVE: https://ubuntu.com/security/CVE-2024-47659
- Patch: ubuntu-noble/6.8.0-50.51/CVE-2024-47659-smack-tcp-ipv4-fix-incorrect-labeling.patch
- From: 6.8.0-50.51
- CVE-2024-49967
- Description:
ext4: no need to continue when the number of entries is 1
- CVE: https://ubuntu.com/security/CVE-2024-49967
- Patch: ubuntu-noble/6.8.0-51.52/CVE-2024-49967-ext4-no-need-to-continue-when-the-number-of-entries-is-1.patch
- From: 6.8.0-51.52
- CVE-2024-53057
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://ubuntu.com/security/CVE-2024-53057
- Patch: ubuntu-noble/6.8.0-51.52/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 6.8.0-51.52
- CVE-2024-50264
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://ubuntu.com/security/CVE-2024-50264
- Patch: ubuntu-noble/6.8.0-51.52/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 6.8.0-51.52
- CVE-2024-53103
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://ubuntu.com/security/CVE-2024-53103
- Patch: ubuntu-noble/6.8.0-52.53/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 6.8.0-52.53
- CVE-2024-53141
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://ubuntu.com/security/CVE-2024-53141
- Patch: ubuntu-noble/6.8.0-52.53/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 6.8.0-52.53
- CVE-2024-53164
- Description:
net: sched: fix ordering of qlen adjustment
- CVE: https://ubuntu.com/security/CVE-2024-53164
- Patch: ubuntu-noble/6.8.0-52.53/CVE-2024-53164-net-sched-fix-ordering-of-qlen-adjustment.patch
- From: 6.8.0-52.53
- CVE-2024-47685
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://ubuntu.com/security/CVE-2024-47685
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.15.0-127.137
- CVE-2024-47670
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-47670
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.15.0-127.137
- CVE-2024-47675
- Description:
bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()
- CVE: https://ubuntu.com/security/CVE-2024-47675
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47675-bpf-fix-use-after-free-in-bpf-uprobe-multi-link-attach.patch
- From: kernel-6.8.0-54.56
- CVE-2024-47682
- Description:
scsi: sd: Fix off-by-one error in sd_read_block_characteristics()
- CVE: https://ubuntu.com/security/CVE-2024-47682
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47682-scsi-sd-fix-off-by-one-error-in-sd-read-block-characteristics.patch
- From: kernel-6.8.0-54.56
- CVE-2024-47695
- Description:
RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds
- CVE: https://ubuntu.com/security/CVE-2024-47695
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47695-rdma-rtrs-clt-reset-cid-to-con-num-1-to-stay-in-bounds.patch
- From: kernel-6.8.0-54.56
- CVE-2024-47697
- Description:
drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47697
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47697-drivers-media-dvb-frontends-rtl2830-fix-an-out-of-bounds-write-error.patch
- From: 6.8.0-54.56
- CVE-2024-47698
- Description:
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47698
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47698-drivers-media-dvb-frontends-rtl2832-fix-an-out-of-bounds-write-error.patch
- From: 6.8.0-54.56
- CVE-2024-47701
- Description:
ext4: return error on ext4_find_inline_entry
- CVE: https://ubuntu.com/security/CVE-2024-47701
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47701-ext4-return-error-on-ext4_find_inline_entry.patch
- From: 6.8.0-54.56
- CVE-2024-47701
- Description:
ext4: avoid OOB when system.data xattr changes underneath the filesystem
- CVE: https://ubuntu.com/security/CVE-2024-47701
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47701-ext4-avoid-oob-when-system-data-xattr-changes-underneath-the-filesystem.patch
- From: 6.8.0-54.56
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://ubuntu.com/security/CVE-2024-47696
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47696-rdma-iwcm-fix-warning-at-kernel-workqueue-c-check-flush-dependency.patch
- From: 6.8.0-54.56
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://ubuntu.com/security/CVE-2024-47696
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47696-rdma-iwcm-fix-warning-at-kernel-workqueue-c-check-flush-dependency-kpatch.patch
- From: 6.8.0-54.56
- CVE-2024-47691
- Description:
f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()
- CVE: https://ubuntu.com/security/CVE-2024-47691
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47691-f2fs-fix-to-avoid-use-after-free-in-f2fs_stop_gc_thread.patch
- From: 6.8.0-54.56
- CVE-2024-47718
- Description:
[PATCH] wifi: rtw88: always wait for both firmware loading attempts
- CVE: https://ubuntu.com/security/CVE-2024-47718
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47718-wifi-rtw88-always-wait-for-both-firmware-loading-attempts.patch
- From: 6.8.0-54.56
- CVE-2024-47730
- Description:
crypto: hisilicon/qm - inject error before stopping queue
- CVE: https://ubuntu.com/security/CVE-2024-47730
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47730-crypto-hisilicon-qm-inject-error-before-stopping-queue.patch
- From: 6.8.0-54.56
- CVE-2024-47751
- Description:
PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()
- CVE: https://ubuntu.com/security/CVE-2024-47751
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47751-pci-kirin-fix-buffer-overflow-in-kirin-pcie-parse-port.patch
- From: 6.8.0-54.56
- CVE-2024-47750
- Description:
RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08
- CVE: https://ubuntu.com/security/CVE-2024-47750
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47750-rdma-hns-fix-use-after-free-of-rsv-qp-on-hip08.patch
- From: 6.8.0-54.56
- CVE-2024-47748
- Description:
vhost_vdpa: assign irq bypass producer token correctly
- CVE: https://ubuntu.com/security/CVE-2024-47748
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47748-vhost-vdpa-assign-irq-bypass-producer-token-correctly.patch
- From: 6.8.0-54.56
- CVE-2024-47742
- Description:
firmware_loader: Block path traversal
- CVE: https://ubuntu.com/security/CVE-2024-47742
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47742-firmware-loader-block-path-traversal.patch
- From: 6.8.0-54.56
- CVE-2024-47727
- Description:
x86/tdx: Fix "in-kernel MMIO" check
- CVE: https://ubuntu.com/security/CVE-2024-47727
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47727-x86-tdx-fix-in-kernel-mmio-check.patch
- From: 6.8.0-54.56
- CVE-2024-47732
- Description:
crypto: iaa - Fix potential use after free bug
- CVE: https://ubuntu.com/security/CVE-2024-47732
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47732-crypto-iaa-fix-potential-use-after-free-bug.patch
- From: 6.8.0-54.56
- CVE-2024-47745
- Description:
mm: call the security_mmap_file() LSM hook in remap_file_pages()
- CVE: https://ubuntu.com/security/CVE-2024-47745
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47745-mm-call-the-security-mmap-file-lsm-hook-in-remap-file-pages.patch
- From: 6.8.0-54.56
- CVE-2024-47719
- Description:
iommufd: Protect against overflow of ALIGN() during iova allocation
- CVE: https://ubuntu.com/security/CVE-2024-47719
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47719-iommufd-protect-against-overflow-of-align-during-iova-allocation.patch
- From: 6.8.0-54.56
- CVE-2024-47686
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-47686.patch
- From:
- CVE-2024-49997
- Description:
net: ethernet: lantiq_etop: fix memory disclosure
- CVE: https://ubuntu.com/security/CVE-2024-49997
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49997-net-ethernet-lantiq-etop-fix-memory-disclosure.patch
- From: 6.8.0-54.56
- CVE-2024-49995
- Description:
tipc: guard against string buffer overrun
- CVE: https://ubuntu.com/security/CVE-2024-49995
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 6.8.0-54.56
- CVE-2024-50007
- Description:
ALSA: asihpi: Fix potential OOB array access
- CVE: https://ubuntu.com/security/CVE-2024-50007
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-50007-alsa-asihpi-fix-potential-oob-array-access.patch
- From: 6.8.0-54.56
- CVE-2024-49991
- Description:
drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
- CVE: https://ubuntu.com/security/CVE-2024-49991
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49991-drm-amdkfd-amdkfd-free-gtt-mem-clear-the-correct-pointer.patch
- From: 6.8.0-54.56
- CVE-2024-49989
- Description:
drm/amd/display: fix double free issue during amdgpu module unload
- CVE: https://ubuntu.com/security/CVE-2024-49989
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49989-drm-amd-display-fix-double-free-issue-during-amdgpu-module-unload.patch
- From: 6.8.0-54.56
- CVE-2024-50005
- Description:
mac802154: Fix potential RCU dereference issue in mac802154_scan_worker
- CVE: https://ubuntu.com/security/CVE-2024-50005
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-50005-mac802154-fix-potential-rcu-dereference-issue-in-mac802154-scan-worker.patch
- From: 6.8.0-54.56
- CVE-2024-49986
- Description:
Out of scope: android related patch.
- CVE:
- Patch: skipped/CVE-2024-49986.patch
- From:
- CVE-2024-49853
- Description:
firmware: arm_scmi: Fix double free in OPTEE transport
- CVE: https://ubuntu.com/security/CVE-2024-49853
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49853-firmware-arm-scmi-fix-double-free-in-optee-transport-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49852
- Description:
scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
- CVE: https://ubuntu.com/security/CVE-2024-49852
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49852-scsi-elx-libefc-fix-potential-use-after-free-in-efc-nport-vport-del-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49895
- Description:
drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation
- CVE: https://ubuntu.com/security/CVE-2024-49895
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49895-drm-amd-display-fix-index-out-of-bounds-in-dcn30-degamma-hardware-format-translation-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49894
- Description:
drm/amd/display: Fix index out of bounds in degamma hardware format translation
- CVE: https://ubuntu.com/security/CVE-2024-49894
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49894-drm-amd-display-fix-index-out-of-bounds-in-degamma-hardware-format-translation-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49889
- Description:
ext4: avoid use-after-free in ext4_ext_show_leaf()
- CVE: https://ubuntu.com/security/CVE-2024-49889
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49889-ext4-avoid-use-after-free-in-ext4-ext-show-leaf-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49883
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://ubuntu.com/security/CVE-2024-49883
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49882
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://ubuntu.com/security/CVE-2024-49882
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49880
- Description:
ext4: fix off by one issue in alloc_flex_gd()
- CVE: https://ubuntu.com/security/CVE-2024-49880
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49880-ext4-fix-off-by-one-issue-in-alloc-flex-gd-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49884
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://ubuntu.com/security/CVE-2024-49884
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49884-ext4-fix-slab-use-after-free-in-ext4_split_extent_at-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49950
- Description:
Bluetooth: L2CAP: Fix uaf in l2cap_connect
- CVE: https://ubuntu.com/security/CVE-2024-49950
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49950-bluetooth-l2cap-fix-uaf-in-l2cap-connect-39.patch
- From: 6.8.0-54.56
- CVE-2024-49936
- Description:
net/xen-netback: prevent UAF in xenvif_flush_hash()
- CVE: https://ubuntu.com/security/CVE-2024-49936
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49936-net-xen-netback-prevent-uaf-in-xenvif-flush-hash-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49931
- Description:
wifi: ath12k: fix array out-of-bound access in SoC stats
- CVE: https://ubuntu.com/security/CVE-2024-49931
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49931-wifi-ath12k-fix-array-out-of-bound-access-in-soc-stats-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49930
- Description:
wifi: ath11k: fix array out-of-bound access in SoC stats
- CVE: https://ubuntu.com/security/CVE-2024-49930
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49930-wifi-ath11k-fix-array-out-of-bound-access-in-soc-stats-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49969
- Description:
drm/amd/display: Fix index out of bounds in DCN30 color transformation
- CVE: https://ubuntu.com/security/CVE-2024-49969
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49969-drm-amd-display-fix-index-out-of-bounds-in-dcn30-color-transformation-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49983
- Description:
ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free
- CVE: https://ubuntu.com/security/CVE-2024-49983
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49983-ext4-drop-ppath-from-ext4-ext-replay-update-ex-to-avoid-double-free-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49960
- Description:
ext4: fix timer use-after-free on failed mount
- CVE: https://ubuntu.com/security/CVE-2024-49960
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49960-ext4-fix-timer-use-after-free-on-failed-mount-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49966
- Description:
ocfs2: cancel dqi_sync_work before freeing oinfo
- CVE: https://ubuntu.com/security/CVE-2024-49966
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49966-ocfs2-cancel-dqi-sync-work-before-freeing-oinfo-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49982
- Description:
aoe: fix the potential use-after-free problem in more places
- CVE: https://ubuntu.com/security/CVE-2024-49982
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49982-aoe-fix-the-potential-use-after-free-problem-in-more-places-6.8.0-52.53.patch
- From: 6.8.0-54.56
- CVE-2024-49924
- Description:
fbdev: pxafb: Fix possible use after free in pxafb_task()
- CVE: https://ubuntu.com/security/CVE-2024-49924
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49924-fbdev-pxafb-Fix-possible-use-after-free-in-pxafb_task.patch
- From: 6.8.0-54.56
- CVE-2024-47723
- Description:
jfs: fix out-of-bounds in dbNextAG() and diAlloc()
- CVE: https://ubuntu.com/security/CVE-2024-47723
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47723-jfs-fix-out-of-bounds-in-dbNextAG-and-diAlloc.patch
- From: 6.8.0-54.56
- CVE-2024-47747
- Description:
net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2024-47747
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47747-net-seeq-fix-use-after-free-vulnerability-in-ether3-driver-due-to-race-condition.patch
- From: 6.8.0-54.56
- CVE-2024-47757
- Description:
nilfs2: fix potential oob read in nilfs_btree_check_delete()
- CVE: https://ubuntu.com/security/CVE-2024-47757
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47757-nilfs2-fix-potential-oob-read-in-nilfs_btree_check_delete.patch
- From: 6.8.0-54.56
- CVE-2024-49855
- Description:
nbd: fix race between timeout and normal completion
- CVE: https://ubuntu.com/security/CVE-2024-49855
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49855-nbd-fix-race-between-timeout-and-normal-completion.patch
- From: 6.8.0-54.56
- CVE-2024-49860
- Description:
ACPI: sysfs: validate return type of _STR method
- CVE: https://ubuntu.com/security/CVE-2024-49860
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49860-acpi-sysfs-validate-return-type-of-str-method.patch
- From: 6.8.0-54.56
- CVE-2024-49861
- Description:
jfs: fix out-of-bounds in dbNextAG() and diAlloc()
- CVE: https://ubuntu.com/security/CVE-2024-49861
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49861-bpf-fix-helper-writes-to-read-only-maps.patch
- From: 6.8.0-54.56
- CVE-2024-49862
- Description:
powercap: intel_rapl: Fix off by one in get_rpi()
- CVE: https://ubuntu.com/security/CVE-2024-49862
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49862-powercap-intel_rapl-Fix-off-by-one-in-get_rpi.patch
- From: 6.8.0-54.56
- CVE-2024-49874
- Description:
i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2024-49874
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49874-i3c-master-svc-fix-use-after-free-vulnerability-in-svc-i3c-master-driver-due-to-race-condition.patch
- From: 6.8.0-54.56
- CVE-2024-49900
- Description:
jfs: Fix uninit-value access of new_ea in ea_buffer
- CVE: https://ubuntu.com/security/CVE-2024-49900
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49900-jfs-fix-uninit-value-access-of-new-ea-in-ea-buffer.patch
- From: 6.8.0-54.56
- CVE-2024-49903
- Description:
jfs: Fix uaf in dbFreeBits
- CVE: https://ubuntu.com/security/CVE-2024-49903
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49903-jfs-fix-uaf-in-dbfreebits.patch
- From: 6.8.0-54.56
- CVE-2024-49928
- Description:
wifi: rtw89: avoid reading out of bounds when loading TX power FW elements
- CVE: https://ubuntu.com/security/CVE-2024-49928
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49928-wifi-rtw89-avoid-reading-out-of-bounds-when-loading-tx-power-fw-elements.patch
- From: 6.8.0-54.56
- CVE-2024-49981
- Description:
media: venus: fix use after free bug in venus_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-49981
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-49981-media-venus-fix-use-after-free-bug-in-venus-remove-due-to-race-condition.patch
- From: 6.8.0-54.56
- CVE-2024-47741
- Description:
btrfs: fix race setting file private on concurrent lseek using same fd
- CVE: https://ubuntu.com/security/CVE-2024-47741
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47741-btrfs-fix-race-setting-file-private-on-concurrent-lseek-using-same-fd.patch
- From: 6.8.0-54.56
- CVE-2024-47741
- Description:
btrfs: fix race setting file private on concurrent lseek using same fd
- CVE: https://ubuntu.com/security/CVE-2024-47741
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47741-btrfs-fix-race-setting-file-private-on-concurrent-lseek-using-same-fd-kpatch.patch
- From: 6.8.0-54.56
- CVE-2024-41016
- Description:
[PATCH 1/1] ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-41016
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-41016-ocfs2-strict-bound-check-before-memcmp-in-ocfs2_xattr_find_entry.patch
- From: 6.8.0-54.56
- CVE-2024-47671
- Description:
[PATCH 1/1] USB: usbtmc: prevent kernel-usb-infoleak
- CVE: https://ubuntu.com/security/CVE-2024-47671
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47671-USB-usbtmc-prevent-kernel-usb-infoleak.patch
- From: 6.8.0-54.56
- CVE-2024-47672
- Description:
[PATCH 1/1] wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead
- CVE: https://ubuntu.com/security/CVE-2024-47672
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47672-wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmware-is-dead.patch
- From: 6.8.0-54.56
- CVE-2024-47673
- Description:
[PATCH 1/1] wifi: iwlwifi: mvm: pause TCM when the firmware is stopped
- CVE: https://ubuntu.com/security/CVE-2024-47673
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47673-wifi-iwlwifi-mvm-pause-TCM-when-the-firmware-is-stopped.patch
- From: 6.8.0-54.56
- CVE-2024-47677
- Description:
[PATCH 1/1] exfat: resolve memory leak from exfat_create_upcase_table()
- CVE: https://ubuntu.com/security/CVE-2024-47677
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47677-exfat-resolve-memory-leak-from-exfat_create_upcase_table.patch
- From: 6.8.0-54.56
- CVE-2024-47678
- Description:
[PATCH 1/1] icmp: change the order of rate limits
- CVE: https://ubuntu.com/security/CVE-2024-47678
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47678-icmp-change-the-order-of-rate-limits.patch
- From: 6.8.0-54.56
- CVE-2024-47678
- Description:
[PATCH 1/1] icmp: change the order of rate limits
- CVE: https://ubuntu.com/security/CVE-2024-47678
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47678-icmp-change-the-order-of-rate-limits-kpatch.patch
- From: 6.8.0-54.56
- CVE-2024-47679
- Description:
[PATCH 1/1] vfs: fix race between evice_inodes() and find_inode()&iput()
- CVE: https://ubuntu.com/security/CVE-2024-47679
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47679-vfs-fix-race-between-evice_inodes-and-find_inode-iput.patch
- From: 6.8.0-54.56
- CVE-2024-47692
- Description:
[PATCH 1/1] nfsd: return -EINVAL when namelen is 0
- CVE: https://ubuntu.com/security/CVE-2024-47692
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47692-nfsd-return-EINVAL-when-namelen-is-0.patch
- From: 6.8.0-54.56
- CVE-2024-47693
- Description:
[PATCH 1/1] IB/core: Fix ib_cache_setup_one error flow cleanup
- CVE: https://ubuntu.com/security/CVE-2024-47693
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47693-IB-core-Fix-ib_cache_setup_one-error-flow-cleanup.patch
- From: 6.8.0-54.56
- CVE-2023-52917
- Description:
[PATCH] ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir()
- CVE: https://ubuntu.com/security/CVE-2023-52917
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2023-52917-ntb-intel-Fix-the-NULL-vs-IS_ERR-bug-for-debugfs_create_dir.patch
- From: 6.8.0-54.56
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://ubuntu.com/security/CVE-2024-53104
- Patch: ubuntu-noble/6.8.0-55.57/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 6.8.0-55.57
- CVE-2024-50180
- Description:
fbdev: sisfb: Fix strbuf array overflow
- CVE: https://ubuntu.com/security/CVE-2024-50180
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50180-fbdev-sisfb-fix-strbuf-array-overflow.patch
- From: 6.8.0-56.58
- CVE-2024-50186
- Description:
net: explicitly clear the sk pointer, when pf->create fails
- CVE: https://ubuntu.com/security/CVE-2024-50186
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50186-net-explicitly-clear-the-sk-pointer-when-pf-create-fails.patch
- From: 6.8.0-56.58
- CVE-2024-50088
- Description:
btrfs: fix uninitialized pointer free in add_inode_ref()
- CVE: https://ubuntu.com/security/CVE-2024-50088
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50088-btrfs-fix-uninitialized-pointer-free-in-add-inode-ref.patch
- From: 6.8.0-56.58
- CVE-2024-50083
- Description:
tcp: fix mptcp DSS corruption due to large pmtu xmit
- CVE: https://ubuntu.com/security/CVE-2024-50083
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50083-tcp-fix-mptcp-dss-corruption-due-to-large-pmtu-xmit.patch
- From: 6.8.0-56.58
- CVE-2024-56614
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56614
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 6.8.0-56.58
- CVE-2024-53156
- Description:
wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
- CVE: https://ubuntu.com/security/CVE-2024-53156
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-53156-wifi-ath9k-add-range-check-for-conn-rsp-epid-in-htc-connect-service.patch
- From: 6.8.0-56.58
- CVE-2024-53165
- Description:
Out of scope: SuperH architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53165.patch
- From:
- CVE-2024-56582
- Description:
btrfs: fix use-after-free in btrfs_encoded_read_endio()
- CVE: https://ubuntu.com/security/CVE-2024-56582
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-56582-btrfs-fix-use-after-free-in-btrfs-encoded-read-endio.patch
- From: 6.8.0-56.58
- CVE-2024-49865
- Description:
drm/xe/vm: move xa_alloc to prevent UAF
- CVE: https://ubuntu.com/security/CVE-2024-49865
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-49865-drm-xe-vm-move-xa-alloc-to-prevent-uaf.patch
- From: 6.8.0-56.58
- CVE-2024-50055
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://ubuntu.com/security/CVE-2024-50055
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 6.8.0-56.58
- CVE-2024-50047
- Description:
smb: client: fix UAF in async decryption
- CVE: https://ubuntu.com/security/CVE-2024-50047
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50047-smb-client-fix-uaf-in-async-decryption.patch
- From: 6.8.0-56.58
- CVE-2024-50029
- Description:
Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync
- CVE: https://ubuntu.com/security/CVE-2024-50029
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50029-bluetooth-hci-conn-fix-uaf-in-hci-enhanced-setup-sync-39.patch
- From: 6.8.0-56.58
- CVE-2024-50084
- Description:
net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test()
- CVE: https://ubuntu.com/security/CVE-2024-50084
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50084-net-microchip-vcap-api-fix-memory-leaks-in-vcap-api-encode-rule-test.patch
- From: 6.8.0-56.58
- CVE-2024-50074
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://ubuntu.com/security/CVE-2024-50074
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access.patch
- From: 6.8.0-56.58
- CVE-2024-50073
- Description:
tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
- CVE: https://ubuntu.com/security/CVE-2024-50073
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50073-tty-n-gsm-fix-use-after-free-in-gsm-cleanup-mux.patch
- From: 6.8.0-56.58
- CVE-2024-50061
- Description:
i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2024-50061
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50061-i3c-master-cdns-fix-use-after-free-vulnerability-in-cdns-i3c-master-driver-due-to-race-condition.patch
- From: 6.8.0-56.58
- CVE-2024-50059
- Description:
ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-50059
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50059-ntb-ntb-hw-switchtec-fix-use-after-free-vulnerability-in-switchtec-ntb-remove-due-to-race-condition.patch
- From: 6.8.0-56.58
- CVE-2024-50042
- Description:
ice: Fix increasing MSI-X on VF
- CVE: https://ubuntu.com/security/CVE-2024-50042
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50042-ice-fix-increasing-msi-x-on-vf.patch
- From: 6.8.0-56.58
- CVE-2024-50036
- Description:
net: do not delay dst_entries_add() in dst_release()
- CVE: https://ubuntu.com/security/CVE-2024-50036
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50036-net-do-not-delay-dst-entries-add-in-dst-release.patch
- From: 6.8.0-56.58
- CVE-2024-50035
- Description:
ppp: fix ppp_async_encode() illegal access
- CVE: https://ubuntu.com/security/CVE-2024-50035
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50035-ppp-fix-ppp-async-encode-illegal-access.patch
- From: 6.8.0-56.58
- CVE-2024-50033
- Description:
slip: make slhc_remember() more robust against malicious packets
- CVE: https://ubuntu.com/security/CVE-2024-50033
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50033-slip-make-slhc-remember-more-robust-against-malicious-packets.patch
- From: 6.8.0-56.58
- CVE-2024-50063
- Description:
bpf: Prevent tail call between progs attached to different hooks
- CVE: https://ubuntu.com/security/CVE-2024-50063
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50063-bpf-Prevent-tail-call-between-progs-attached-to-different-hooks.patch
- From: 6.8.0-56.58
- CVE-2024-50063
- Description:
bpf: Prevent tail call between progs attached to different hooks
- CVE: https://ubuntu.com/security/CVE-2024-50063
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50063-bpf-Prevent-tail-call-between-progs-attached-to-different-hooks-kpatch.patch
- From: 6.8.0-56.58
- CVE-2024-50066
- Description:
mm/mremap: fix move_normal_pmd/retract_page_tables race
- CVE: https://ubuntu.com/security/CVE-2024-50066
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50066-mm-mremap-fix-move-normal-pmd-retract-page-tables-race.patch
- From: 6.8.0-56.58
- CVE-2024-50193
- Description:
Out of scope: patch for x86_32 arch
- CVE:
- Patch: skipped/CVE-2024-50193.patch
- From:
- CVE-2024-56663
- Description:
wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one
- CVE: https://ubuntu.com/security/CVE-2024-56663
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-56663-wifi-nl80211-fix-nl80211-attr-mlo-link-id-off-by-one.patch
- From: 6.8.0-56.58
- CVE-2024-56663
- Description:
wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one
- CVE: https://ubuntu.com/security/CVE-2024-56663
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-56663-wifi-nl80211-fix-nl80211-attr-mlo-link-id-off-by-one-kpatch.patch
- From: 6.8.0-56.58
- CVE-2024-46795
- Description:
ksmbd: unset the binding mark of a reused connection
- CVE: https://ubuntu.com/security/CVE-2024-46795
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-46795-ksmbd-unset-the-binding-mark-of-a-reused-connection.patch
- From: 6.8.0-56.58
- CVE-2024-50086
- Description:
ksmbd: fix user-after-free from session log off
- CVE: https://ubuntu.com/security/CVE-2024-50086
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50086-ksmbd-fix-user-after-free-from-session-log-off.patch
- From: 6.8.0-56.58
- CVE-2024-50086
- Description:
ksmbd: fix user-after-free from session log off
- CVE: https://ubuntu.com/security/CVE-2024-50086
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50086-ksmbd-fix-user-after-free-from-session-log-off-kpatch.patch
- From: 6.8.0-56.58
- CVE-2024-56598
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://ubuntu.com/security/CVE-2024-56598
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 6.8.0-57.59
- CVE-2024-56595
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2024-56595
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 6.8.0-57.59
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://ubuntu.com/security/CVE-2024-50302
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 6.8.0-57.59
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle.patch
- From: 6.8.0-57.59
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56658
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch.patch
- From: 6.1.123-1
- CVE-2024-57798
- Description:
drm/dp_mst: Skip CSN if topology probing is not done yet (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-57798-drm-dp-mst-skip-csn-if-topology-probing-is-not-done-yet-49.patch
- From: 6.8.0-57.59
- CVE-2024-57798
- Description:
drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-57798-drm-dp-mst-ensure-mst-primary-pointer-is-valid-in-drm-dp-mst-handle-up-req.patch
- From: 6.8.0-57.59
- CVE-2024-56672
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://ubuntu.com/security/CVE-2024-56672
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 6.8.0-57.59
- CVE-2024-53063
- Description:
media: dvbdev: prevent the risk of out of memory access
- CVE: https://ubuntu.com/security/CVE-2024-53063
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-53063-media-dvbdev-prevent-the-risk-of-out-of-memory-access.patch
- From: 6.8.0-57.59
- CVE-2024-50067
- Description:
uprobe: avoid out-of-bounds memory access of fetching args
- CVE: https://ubuntu.com/security/CVE-2024-50067
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50067-uprobe-avoid-out-of-bounds-memory-access-of-fetching-args.patch
- From: 6.8.0-58.60
- CVE-2024-50131
- Description:
tracing: Consider the NULL character when validating the event length
- CVE: https://ubuntu.com/security/CVE-2024-50131
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50131-tracing-consider-the-null-character-when-validating-the-event-length.patch
- From: 6.8.0-58.60
- CVE-2024-50127
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://ubuntu.com/security/CVE-2024-50127
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 6.8.0-58.60
- CVE-2024-50126
- Description:
net: sched: use RCU read-side critical section in taprio_dump()
- CVE: https://ubuntu.com/security/CVE-2024-50126
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50126-net-sched-use-rcu-read-side-critical-section-in-taprio-dump.patch
- From: 6.8.0-58.60
- CVE-2024-50125
- Description:
Bluetooth: SCO: Fix UAF on sco_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-50125
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50125-bluetooth-sco-fix-uaf-on-sco-sock-timeout-39.patch
- From: 6.8.0-58.60
- CVE-2024-50124
- Description:
Bluetooth: ISO: Fix UAF on iso_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-50124
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50124-bluetooth-iso-fix-uaf-on-iso-sock-timeout.patch
- From: 6.8.0-58.60
- CVE-2024-50121
- Description:
nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
- CVE: https://ubuntu.com/security/CVE-2024-50121
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50121-nfsd-cancel-nfsd-shrinker-work-using-sync-mode-in-nfs4-state-shutdown-net.patch
- From: 6.8.0-58.60
- CVE-2024-50051
- Description:
spi: mpc52xx: Add cancel_work_sync before module remove
- CVE: https://ubuntu.com/security/CVE-2024-50051
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50051-spi-mpc52xx-add-cancel-work-sync-before-module-remove.patch
- From: 6.8.0-58.60
- CVE-2024-50209
- Description:
RDMA/bnxt_re: Add a check for memory allocation
- CVE: https://ubuntu.com/security/CVE-2024-50209
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50209-rdma-bnxt-re-add-a-check-for-memory-allocation.patch
- From: 6.8.0-58.60
- CVE-2024-50159
- Description:
firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup()
- CVE: https://ubuntu.com/security/CVE-2024-50159
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50159-firmware-arm-scmi-fix-the-double-free-in-scmi-debugfs-common-setup.patch
- From: 6.8.0-58.60
- CVE-2024-50158
- Description:
RDMA/bnxt_re: Fix out of bound check
- CVE: https://ubuntu.com/security/CVE-2024-50158
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50158-rdma-bnxt-re-fix-out-of-bound-check.patch
- From: 6.8.0-58.60
- CVE-2024-50155
- Description:
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
- CVE: https://ubuntu.com/security/CVE-2024-50155
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50155-netdevsim-use-cond-resched-in-nsim-dev-trap-report-work.patch
- From: 6.8.0-58.60
- CVE-2024-50154
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
- CVE: https://ubuntu.com/security/CVE-2024-50154
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50154-tcp-dccp-don-t-use-timer-pending-in-reqsk-queue-unlink-6.8.0-47.47.patch
- From: 6.8.0-58.60
- CVE-2024-53206
- Description:
tcp: Fix use-after-free of nreq in reqsk_timer_handler().
- CVE: https://ubuntu.com/security/CVE-2024-53206
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53206-tcp-Fix-use-after-free-of-nreq-in-reqsk_timer_handler-6.8.0-47.47.patch
- From: 6.8.0-58.60
- CVE-2024-50151
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://ubuntu.com/security/CVE-2024-50151
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 6.8.0-58.60
- CVE-2024-50143
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://ubuntu.com/security/CVE-2024-50143
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50143-udf-fix-uninit-value-use-in-udf-get-fileshortad.patch
- From: 6.8.0-58.60
- CVE-2024-50203
- Description:
Out of scope: ARM64 architecture issue
- CVE:
- Patch: skipped/CVE-2024-50203.patch
- From:
- CVE-2024-50215
- Description:
nvmet-auth: assign dh_key to NULL after kfree_sensitive
- CVE: https://ubuntu.com/security/CVE-2024-50215
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50215-nvmet-auth-assign-dh-key-to-null-after-kfree-sensitive.patch
- From: 6.8.0-58.60
- CVE-2024-50261
- Description:
macsec: Fix use-after-free while sending the offloading packet
- CVE: https://ubuntu.com/security/CVE-2024-50261
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50261-macsec-fix-use-after-free-while-sending-the-offloading-packet.patch
- From: 6.8.0-58.60
- CVE-2024-50262
- Description:
bpf: Fix out-of-bounds write in trie_get_next_key()
- CVE: https://ubuntu.com/security/CVE-2024-50262
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch
- From: 6.8.0-58.60
- CVE-2024-50257
- Description:
netfilter: Fix use-after-free in get_info()
- CVE: https://ubuntu.com/security/CVE-2024-50257
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50257-netfilter-fix-use-after-free-in-get-info.patch
- From: 6.8.0-58.60
- CVE-2024-50246
- Description:
fs/ntfs3: Add rough attr alloc_size check
- CVE: https://ubuntu.com/security/CVE-2024-50246
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50246-fs-ntfs3-add-rough-attr-alloc-size-check.patch
- From: 6.8.0-58.60
- CVE-2024-50242
- Description:
fs/ntfs3: Additional check in ntfs_file_release
- CVE: https://ubuntu.com/security/CVE-2024-50242
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50242-fs-ntfs3-additional-check-in-ntfs-file-release.patch
- From: 6.8.0-58.60
- CVE-2024-50235
- Description:
wifi: cfg80211: clear wdev->cqm_config pointer on free
- CVE: https://ubuntu.com/security/CVE-2024-50235
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50235-wifi-cfg80211-clear-wdev-cqm-config-pointer-on-free.patch
- From: 6.8.0-58.60
- CVE-2024-50222
- Description:
iov_iter: fix copy_page_from_iter_atomic() if KMAP_LOCAL_FORCE_MAP
- CVE: https://ubuntu.com/security/CVE-2024-50222
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50222-iov-iter-fix-copy-page-from-iter-atomic-if-kmap-local-force-map.patch
- From: 6.8.0-58.60
- CVE-2024-50230
- Description:
nilfs2: fix kernel bug due to missing clearing of checked flag
- CVE: https://ubuntu.com/security/CVE-2024-50230
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50230-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-checked-flag.patch
- From: 6.8.0-58.60
- CVE-2024-53059
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-53059
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53059-wifi-iwlwifi-mvm-fix-response-handling-in-iwl-mvm-send-recovery-cmd.patch
- From: 6.8.0-58.60
- CVE-2024-53061
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://ubuntu.com/security/CVE-2024-53061
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 6.8.0-58.60
- CVE-2024-50286
- Description:
ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create
- CVE: https://ubuntu.com/security/CVE-2024-50286
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50286-ksmbd-fix-slab-use-after-free-in-ksmbd-smb2-session-create.patch
- From: 6.8.0-58.60
- CVE-2024-50283
- Description:
ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp
- CVE: https://ubuntu.com/security/CVE-2024-50283
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50283-ksmbd-fix-slab-use-after-free-in-smb3-preauth-hash-rsp.patch
- From: 6.8.0-58.60
- CVE-2024-50282
- Description:
drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
- CVE: https://ubuntu.com/security/CVE-2024-50282
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50282-drm-amdgpu-add-missing-size-check-in-amdgpu-debugfs-gprwave-read.patch
- From: 6.8.0-58.60
- CVE-2024-50280
- Description:
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
- CVE: https://ubuntu.com/security/CVE-2024-50280
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50280-dm-cache-fix-flushing-uninitialized-delayed-work-on-cache-ctr-error.patch
- From: 6.8.0-58.60
- CVE-2024-50276
- Description:
net: vertexcom: mse102x: Fix possible double free of TX skb
- CVE: https://ubuntu.com/security/CVE-2024-50276
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50276-net-vertexcom-mse102x-fix-possible-double-free-of-tx-skb.patch
- From: 6.8.0-58.60
- CVE-2024-50269
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://ubuntu.com/security/CVE-2024-50269
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 6.8.0-58.60
- CVE-2024-50267
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://ubuntu.com/security/CVE-2024-50267
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 6.8.0-58.60
- CVE-2025-21993
- Description:
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
- CVE: https://ubuntu.com/security/CVE-2025-21993
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2025-21993-iscsi-ibft-fix-ubsan-shift-out-of-bounds-warning-in-ibft-attr-show-nic.patch
- From: 6.8.0-58.60
- CVE-2024-56627
- Description:
ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
- CVE: https://ubuntu.com/security/CVE-2024-56627
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56627-ksmbd-fix-out-of-bounds-read-in-ksmbd-vfs-stream-read.patch
- From: 6.8.0-58.60
- CVE-2024-50234
- Description:
wifi: iwlegacy: Clear stale interrupts before resuming device
- CVE: https://ubuntu.com/security/CVE-2024-50234
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50234-wifi-iwlegacy-clear-stale-interrupts-before-resuming-device.patch
- From: 6.8.0-58.60
- CVE-2024-50301
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://ubuntu.com/security/CVE-2024-50301
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 6.8.0-58.60
- CVE-2024-53082
- Description:
virtio_net: Add hash_key_length check
- CVE: https://ubuntu.com/security/CVE-2024-53082
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53082-virtio-net-add-hash-key-length-check.patch
- From: 6.8.0-58.60
- CVE-2024-50279
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50279
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 6.8.0-58.60
- CVE-2024-50275
- Description:
arm64/sve: Discard stale CPU state when handling SVE traps
- CVE: https://ubuntu.com/security/CVE-2024-50275
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50275-arm64-sve-discard-stale-cpu-state-when-handling-sve-traps.patch
- From: 6.8.0-58.60
- CVE-2024-53062
- Description:
media: mgb4: protect driver against spectre
- CVE: https://ubuntu.com/security/CVE-2024-53062
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53062-media-mgb4-protect-driver-against-spectre.patch
- From: 6.8.0-58.60
- CVE-2024-53099
- Description:
bpf: Check validity of link->type in bpf_link_show_fdinfo()
- CVE: https://ubuntu.com/security/CVE-2024-53099
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53099-bpf-check-validity-of-link-type-in-bpf-link-show-fdinfo.patch
- From: 6.8.0-58.60
- CVE-2024-53108
- Description:
drm/amd/display: Adjust VSDB parser for replay feature
- CVE: https://ubuntu.com/security/CVE-2024-53108
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53108-drm-amd-display-adjust-vsdb-parser-for-replay-feature.patch
- From: 6.8.0-58.60
- CVE-2024-53162
- Description:
crypto: qat/qat_4xxx - fix off by one in uof_get_name()
- CVE: https://ubuntu.com/security/CVE-2024-53162
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53162-crypto-qat-qat-4xxx-fix-off-by-one-in-uof-get-name.patch
- From: 6.8.0-58.60
- CVE-2024-53155
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://ubuntu.com/security/CVE-2024-53155
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 6.8.0-58.60
- CVE-2024-56650
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://ubuntu.com/security/CVE-2024-56650
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 6.8.0-58.60
- CVE-2024-50112
- Description:
The ADDRESS_MASKING config option cannot be turned off. LAM (linear address masking) would be fatal for applications using it.
- CVE:
- Patch: skipped/CVE-2024-50112.patch
- From:
- CVE-2024-53166
- Description:
block, bfq: fix bfqq uaf in bfq_limit_depth()
- CVE: https://ubuntu.com/security/CVE-2024-53166
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53166-block-bfq-fix-bfqq-uaf-in-bfq-limit-depth.patch
- From: 6.8.0-58.60
- CVE-2024-53068
- Description:
firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier()
- CVE: https://ubuntu.com/security/CVE-2024-53068
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53068-firmware-arm-scmi-fix-slab-use-after-free-in-scmi-bus-notifier.patch
- From: 6.8.0-58.60
- CVE-2024-53095
- Description:
smb: client: Fix use-after-free of network namespace.
- CVE: https://ubuntu.com/security/CVE-2024-53095
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53095-smb-client-fix-use-after-free-of-network-namespace.patch
- From: 6.8.0-58.60
- CVE-2024-54680
- Description:
smb: client: fix TCP timers deadlock after rmmod
- CVE: https://ubuntu.com/security/CVE-2024-54680
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-54680-smb-client-fix-TCP-timers-deadlock-after-rmmod.patch
- From: 6.8.0-58.60
- CVE-2024-53139
- Description:
sctp: fix possible UAF in sctp_v6_available()
- CVE: https://ubuntu.com/security/CVE-2024-53139
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53139-sctp-fix-possible-uaf-in-sctp-v6-available.patch
- From: 6.8.0-58.60
- CVE-2024-53126
- Description:
vdpa: solidrun: Fix UB bug with devres
- CVE: https://ubuntu.com/security/CVE-2024-53126
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53126-vdpa-solidrun-fix-ub-bug-with-devres.patch
- From: 6.8.0-58.60
- CVE-2024-53096
- Description:
mm: avoid unsafe VMA hook invocation when error arises on mmap hook
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-01-mm-avoid-unsafe-VMA-hook-invocation-when-error-arises-on-mmap-hook.patch
- From: 6.8.0-58.60
- CVE-2024-53096
- Description:
mm: unconditionally close VMAs on error
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-02-mm-unconditionally-close-VMAs-on-error.patch
- From: 6.8.0-58.60
- CVE-2024-53096
- Description:
mm: refactor map_deny_write_exec()
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-03-mm-refactor-map_deny_write_exec.patch
- From: 6.8.0-58.60
- CVE-2024-53096
- Description:
mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-04-mm-refactor-arch_calc_vm_flag_bits-and-arm64-MTE-handling.patch
- From: 6.8.0-58.60
- CVE-2024-53096
- Description:
mm: resolve faulty mmap_region() error path behaviour
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-05-mm-resolve-faulty-mmap_region-error-path-behaviour.patch
- From: 6.8.0-58.60
- CVE-2024-57937
- Description:
mm: reinstate ability to map write-sealed memfd mappings read-only
- CVE: https://ubuntu.com/security/CVE-2024-57937
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57937-mm-reinstate-ability-to-map-write-sealed-memfd-mappings-read-only.patch
- From: 6.8.0-58.60
- CVE-2024-53133
- Description:
drm/amd/display: Handle dml allocation failure to avoid crash
- CVE: https://ubuntu.com/security/CVE-2024-53133
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53133-drm-amd-display-handle-dml-allocation-failure-to-avoid-crash.patch
- From: 6.8.0-58.60
- CVE-2024-53142
- Description:
Patch affects initramfs
- CVE:
- Patch: skipped/CVE-2024-53142.patch
- From:
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://ubuntu.com/security/CVE-2024-53150
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 6.8.0-58.60
- CVE-2024-53168
- Description:
sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket
- CVE: https://ubuntu.com/security/CVE-2024-53168
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53168-sunrpc-fix-one-uaf-issue-caused-by-sunrpc-kernel-tcp-socket.patch
- From: 6.8.0-58.60
- CVE-2024-53171
- Description:
ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit
- CVE: https://ubuntu.com/security/CVE-2024-53171
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53171-ubifs-authentication-fix-use-after-free-in-ubifs-tnc-end-commit.patch
- From: 6.8.0-58.60
- CVE-2024-53173
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://ubuntu.com/security/CVE-2024-53173
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 6.8.0-58.60
- CVE-2024-53174
- Description:
SUNRPC: make sure cache entry active before cache_show
- CVE: https://ubuntu.com/security/CVE-2024-53174
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53174-sunrpc-make-sure-cache-entry-active-before-cache-show.patch
- From: 6.8.0-58.60
- CVE-2024-53185
- Description:
smb: client: fix NULL ptr deref in crypto_aead_setkey()
- CVE: https://ubuntu.com/security/CVE-2024-53185
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53185-smb-client-fix-null-ptr-deref-in-crypto-aead-setkey.patch
- From: 6.8.0-58.60
- CVE-2024-53191
- Description:
wifi: ath12k: fix warning when unbinding
- CVE: https://ubuntu.com/security/CVE-2024-53191
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53191-wifi-ath12k-fix-warning-when-unbinding.patch
- From: 6.8.0-58.60
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 6.8.0-58.60
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix a DMA to stack memory bug
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53197-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch
- From: 6.8.0-58.60
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://ubuntu.com/security/CVE-2024-53203
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53203-usb-typec-fix-potential-array-underflow-in-ucsi-ccg-sync-control.patch
- From: 6.8.0-58.60
- CVE-2024-53208
- Description:
Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync
- CVE: https://ubuntu.com/security/CVE-2024-53208
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53208-bluetooth-mgmt-fix-slab-use-after-free-read-in-set-powered-sync.patch
- From: 6.8.0-58.60
- CVE-2024-53237
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://ubuntu.com/security/CVE-2024-53237
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child.patch
- From: 6.8.0-58.60
- CVE-2024-53227
- Description:
scsi: bfa: Fix use-after-free in bfad_im_module_exit()
- CVE: https://ubuntu.com/security/CVE-2024-53227
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53227-scsi-bfa-fix-use-after-free-in-bfad-im-module-exit.patch
- From: 6.8.0-58.60
- CVE-2024-56538
- Description:
drm: zynqmp_kms: Unplug DRM device before removal
- CVE: https://ubuntu.com/security/CVE-2024-56538
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56538-drm-zynqmp-kms-unplug-drm-device-before-removal-6.8.0-49.49.patch
- From: 6.8.0-58.60
- CVE-2024-53218
- Description:
f2fs: fix race in concurrent f2fs_stop_gc_thread
- CVE: https://ubuntu.com/security/CVE-2024-53218
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53218-f2fs-fix-race-in-concurrent-f2fs-stop-gc-thread-52.53.patch
- From: 6.8.0-58.60
- CVE-2024-53213
- Description:
net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
- CVE: https://ubuntu.com/security/CVE-2024-53213
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53213-net-usb-lan78xx-fix-double-free-issue-with-interrupt-buffer-allocation.patch
- From: 6.8.0-58.60
- CVE-2024-56551
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://ubuntu.com/security/CVE-2024-56551
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 6.8.0-58.60
- CVE-2024-53232
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53232.patch
- From:
- CVE-2024-53228
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53228.patch
- From:
- CVE-2024-50274
- Description:
idpf: avoid vport access in idpf_get_link_ksettings
- CVE: https://ubuntu.com/security/CVE-2024-50274
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50274-idpf-avoid-vport-access-in-idpf-get-link-ksettings.patch
- From: 6.8.0-58.60
- CVE-2024-50274
- Description:
idpf: avoid vport access in idpf_get_link_ksettings
- CVE: https://ubuntu.com/security/CVE-2024-50274
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50274-idpf-avoid-vport-access-in-idpf-get-link-ksettings-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-50221
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-50221.patch
- From:
- CVE-2024-50226
- Description:
cxl/port: Fix use-after-free, permit out-of-order decoder shutdown
- CVE: https://ubuntu.com/security/CVE-2024-50226
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50226-cxl-port-fix-use-after-free-permit-out-of-order-decoder-shutdown.patch
- From: 6.8.0-58.60
- CVE-2024-56606
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56606
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 6.8.0-58.60
- CVE-2024-56608
- Description:
drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'
- CVE: https://ubuntu.com/security/CVE-2024-56608
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56608-drm-amd-display-fix-out-of-bounds-access-in-dcn21-link-encoder-create.patch
- From: 6.8.0-58.60
- CVE-2024-56615
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56615
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 6.8.0-58.60
- CVE-2024-56619
- Description:
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-56619
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56619-nilfs2-fix-potential-out-of-bounds-memory-access-in-nilfs-find-entry.patch
- From: 6.8.0-58.60
- CVE-2024-56626
- Description:
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
- CVE: https://ubuntu.com/security/CVE-2024-56626
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56626-ksmbd-fix-out-of-bounds-write-in-ksmbd-vfs-stream-write.patch
- From: 6.8.0-58.60
- CVE-2024-56631
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://ubuntu.com/security/CVE-2024-56631
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 6.8.0-58.60
- CVE-2024-56635
- Description:
net: avoid potential UAF in default_operstate()
- CVE: https://ubuntu.com/security/CVE-2024-56635
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56635-net-avoid-potential-uaf-in-default-operstate.patch
- From: 6.8.0-58.60
- CVE-2024-56640
- Description:
net/smc: fix LGR and link use-after-free issue
- CVE: https://ubuntu.com/security/CVE-2024-56640
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56640-net-smc-fix-lgr-and-link-use-after-free-issue.patch
- From: 6.8.0-58.60
- CVE-2024-56642
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://ubuntu.com/security/CVE-2024-56642
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 6.8.0-58.60
- CVE-2024-56661
- Description:
tipc: fix NULL deref in cleanup_bearer()
- CVE: https://ubuntu.com/security/CVE-2024-56661
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56661-tipc-fix-NULL-deref-in-cleanup_bearer.patch
- From: 6.8.0-58.60
- CVE-2024-56623
- Description:
low-scored CVE which causes verification conflicts with freezable kthread and cifs reading routines.
- CVE:
- Patch: skipped/CVE-2024-56623.patch
- From:
- CVE-2024-56651
- Description:
can: hi311x: hi3110_can_ist(): fix potential use-after-free
- CVE: https://ubuntu.com/security/CVE-2024-56651
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56651-can-hi311x-hi3110-can-ist-fix-potential-use-after-free.patch
- From: 6.8.0-58.60
- CVE-2024-56765
- Description:
powerpc arch not supported
- CVE:
- Patch: skipped/CVE-2024-56765.patch
- From:
- CVE-2024-56693
- Description:
brd: defer automatic disk creation until module initialization succeeds
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56693-brd-defer-automatic-disk-creation-until-module-initialization-succeeds.patch
- From: 6.8.0-58.60
- CVE-2024-56708
- Description:
EDAC/igen6: Avoid segmentation fault on module unload
- CVE: https://ubuntu.com/security/CVE-2024-56708
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56708-edac-igen6-avoid-segmentation-fault-on-module-unload.patch
- From: 6.8.0-58.60
- CVE-2024-56678
- Description:
powerpc: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-56678.patch
- From:
- CVE-2024-56704
- Description:
9p/xen: fix release of IRQ
- CVE: https://ubuntu.com/security/CVE-2024-56704
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 6.8.0-58.60
- CVE-2024-57850
- Description:
jffs2: Prevent rtime decompress memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-57850
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57850-jffs2-prevent-rtime-decompress-memory-corruption.patch
- From: 6.8.0-58.60
- CVE-2024-57850
- Description:
jffs2: Fix rtime decompressor
- CVE: https://ubuntu.com/security/CVE-2024-57850
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57850-jffs2-Fix-rtime-decompressor.patch
- From: 6.8.0-58.60
- CVE-2024-56772
- Description:
kunit: string-stream: Fix a UAF bug in kunit_init_suite()
- CVE: https://ubuntu.com/security/CVE-2024-56772
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56772-kunit-string-stream-fix-a-uaf-bug-in-kunit-init-suite.patch
- From: 6.8.0-58.60
- CVE-2024-56775
- Description:
drm/amd/display: Fix handling of plane refcount
- CVE: https://ubuntu.com/security/CVE-2024-56775
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56775-drm-amd-display-fix-handling-of-plane-refcount.patch
- From: 6.8.0-58.60
- CVE-2025-21700
- Description:
net: sched: Disallow replacing of child qdisc from one parent to another
- CVE: https://ubuntu.com/security/CVE-2025-21700
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2025-21700-net-sched-disallow-replacing-of-child-qdisc-from-one-parent-to-another.patch
- From: 6.8.0-58.60
- CVE-2024-50115
- Description:
KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
- CVE: https://ubuntu.com/security/CVE-2024-50115
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50115-kvm-nsvm-ignore-ncr3-4-0-when-loading-pdptes-from-memory.patch
- From: 6.8.0-58.60
- CVE-2024-50250
- Description:
iomap: improve shared block detection in iomap_unshare_iter
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-iomap-improve-shared-block-detection-in-iomap_unshare_iter.patch
- From: 6.8.0-58.60
- CVE-2024-50250
- Description:
iomap: don't bother unsharing delalloc extents
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-iomap-don-t-bother-unsharing-delalloc-extents.patch
- From: 6.8.0-58.60
- CVE-2024-50250
- Description:
iomap: share iomap_unshare_iter predicate code with fsdax
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-iomap-share-iomap_unshare_iter-predicate-code-with-fsdax.patch
- From: 6.8.0-58.60
- CVE-2024-50250
- Description:
fsdax: remove zeroing code from dax_unshare_iter
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-fsdax-remove-zeroing-code-from-dax_unshare_iter.patch
- From: 6.8.0-58.60
- CVE-2024-50250
- Description:
fsdax: dax_unshare_iter needs to copy entire blocks
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-fsdax-dax-unshare-iter-needs-to-copy-entire-blocks.patch
- From: 6.8.0-58.60
- CVE-2024-50247
- Description:
fs/ntfs3: Check if more than chunk-size bytes are written
- CVE: https://ubuntu.com/security/CVE-2024-50247
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50247-fs-ntfs3-check-if-more-than-chunk-size-bytes-are-written.patch
- From: 6.8.0-58.60
- CVE-2024-50278
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_bit-when-resizing.patch
- From: 6.8.0-58.60
- CVE-2024-50278
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 6.8.0-58.60
- CVE-2024-50268
- Description:
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-50268
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50268-usb-typec-fix-potential-out-of-bounds-in-ucsi-ccg-update-set-new-cam-cmd.patch
- From: 6.8.0-58.60
- CVE-2024-41014
- Description:
xfs: add bounds checking to xlog_recover_process_data
- CVE: https://ubuntu.com/security/CVE-2024-41014
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-41014-xfs-add-bounds-checking-to-xlog-recover-process-data.patch
- From: 6.8.0-58.60
- CVE-2024-50128
- Description:
net: wwan: fix global oob in wwan_rtnl_policy
- CVE: https://ubuntu.com/security/CVE-2024-50128
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50128-net-wwan-fix-global-oob-in-wwan-rtnl-policy.patch
- From: 6.8.0-58.60
- CVE-2024-50128
- Description:
net: wwan: fix global oob in wwan_rtnl_policy
- CVE: https://ubuntu.com/security/CVE-2024-50128
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50128-net-wwan-fix-global-oob-in-wwan-rtnl-policy-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-53194
- Description:
PCI: Fix use-after-free of slot->bus on hot remove
- CVE: https://ubuntu.com/security/CVE-2024-53194
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53194-pci-fix-use-after-free-of-slot-bus-on-hot-remove.patch
- From: 6.8.0-58.60
- CVE-2024-53194
- Description:
PCI: Fix use-after-free of slot->bus on hot remove
- CVE: https://ubuntu.com/security/CVE-2024-53194
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53194-pci-fix-use-after-free-of-slot-bus-on-hot-remove-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53239-alsa-6fire-release-resources-at-card-release.patch
- From: 6.8.0-58.60
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53239-alsa-6fire-release-resources-at-card-release-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-56548
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times.patch
- From: 6.8.0-58.60
- CVE-2024-56548
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-53177
- Description:
smb: prevent use-after-free due to open_cached_dir error paths
- CVE: https://ubuntu.com/security/CVE-2024-53177
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53177-smb-prevent-use-after-free-due-to-open_cached_dir-er.patch
- From: 6.8.0-58.60
- CVE-2024-53177
- Description:
smb: prevent use-after-free due to open_cached_dir error paths
- CVE: https://ubuntu.com/security/CVE-2024-53177
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53177-smb-prevent-use-after-free-due-to-open_cached_dir-er-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-56600
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://ubuntu.com/security/CVE-2024-56600
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 6.8.0-58.60
- CVE-2024-56581
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://ubuntu.com/security/CVE-2024-56581
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 6.8.0-58.60
- CVE-2024-56558
- Description:
nfsd: make sure exp active before svc_export_show
- CVE: https://ubuntu.com/security/CVE-2024-56558
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56558-nfsd-make-sure-exp-active-before-svc-export-show.patch
- From: 6.8.0-58.60
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://ubuntu.com/security/CVE-2024-56605
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 6.8.0-58.60
- CVE-2024-58009
- Description:
Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc
- CVE: https://ubuntu.com/security/CVE-2024-58009
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-58009-bluetooth-l2cap-handle-null-sock-pointer-in-l2cap.patch
- From: 6.8.0-58.60
- CVE-2024-56604
- Description:
Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()
- CVE: https://ubuntu.com/security/CVE-2024-56604
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56604-bluetooth-rfcomm-avoid-leaving-dangling-sk-pointer-in-rfcomm-sock-alloc.patch
- From: 6.8.0-58.60
- CVE-2024-56603
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://ubuntu.com/security/CVE-2024-56603
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 6.8.0-58.60
- CVE-2024-56602
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://ubuntu.com/security/CVE-2024-56602
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 6.8.0-58.60
- CVE-2024-56601
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56601
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 6.8.0-58.60
- CVE-2024-56596
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://ubuntu.com/security/CVE-2024-56596
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 6.8.0-58.60
- CVE-2024-50130
- Description:
netfilter: bpf: must hold reference on net namespace
- CVE: https://ubuntu.com/security/CVE-2024-50130
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50130-netfilter-bpf-must-hold-reference-on-net-namespace.patch
- From: 6.8.0-58.60
- CVE-2024-50130
- Description:
netfilter: bpf: must hold reference on net namespace kpatch
- CVE: https://ubuntu.com/security/CVE-2024-50130
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50130-netfilter-bpf-must-hold-reference-on-net-namespace-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-50251
- Description:
netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
- CVE: https://ubuntu.com/security/CVE-2024-50251
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50251-netfilter-nft-payload-sanitize-offset-and-length-before-calling-skb-checksum.patch
- From: 6.8.0-58.60
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch-noble.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2024-44955
- Description:
drm/amd/display: Don't refer to dc_sink in is_dsc_need_re_compute
- CVE: https://ubuntu.com/security/CVE-2024-44955
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-44955-drm-amd-display-don-t-refer-to-dc-sink-in-is-dsc-need-re-compute.patch
- From: 6.8.0-58.60
- CVE-2024-42122
- Description:
drm/amd/display: Add NULL pointer check for kzalloc
- CVE: https://ubuntu.com/security/CVE-2024-42122
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-42122-drm-amd-display-add-null-pointer-check-for-kzalloc.patch
- From: 6.8.0-58.60
- CVE-2022-49034
- Description:
Out of scope: SuperH arch not supported.
- CVE:
- Patch: skipped/CVE-2022-49034.patch
- From:
- CVE-2024-57874
- Description:
arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL
- CVE: https://ubuntu.com/security/CVE-2024-57874
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57874-arm64-ptrace-fix-partial-setregset-for-nt-arm-tagged-addr-ctrl.patch
- From: 6.8.0-58.60
- CVE-2024-45828
- Description:
i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request
- CVE: https://ubuntu.com/security/CVE-2024-45828
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-45828-i3c-mipi-i3c-hci-mask-ring-interrupts-before-ring-stop-request.patch
- From: 6.8.0-58.60
- CVE-2024-43098
- Description:
i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock
- CVE: https://ubuntu.com/security/CVE-2024-43098
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-43098-i3c-use-i3cdev-desc-info-instead-of-calling-i3c-device-get-info-to-avoid-deadlock.patch
- From: 6.8.0-58.60
- CVE-2024-41935
- Description:
f2fs: fix to shrink read extent node in batches
- CVE: https://ubuntu.com/security/CVE-2024-41935
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-41935-f2fs-fix-to-shrink-read-extent-node-in-batches.patch
- From: 6.8.0-58.60
- CVE-2024-41932
- Description:
sched: fix warning in sched_setaffinity
- CVE: https://ubuntu.com/security/CVE-2024-41932
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-41932-sched-fix-warning-in-sched-setaffinity.patch
- From: 6.8.0-58.60
- CVE-2024-56644
- Description:
net/ipv6: release expired exception dst cached in socket
- CVE: https://ubuntu.com/security/CVE-2024-56644
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56644-net-ipv6-release-expired-exception-dst-cached-in-socket.patch
- From: 6.8.0-58.60
- CVE-2024-56780
- Description:
quota: flush quota_release_work upon quota writeback
- CVE: https://ubuntu.com/security/CVE-2024-56780
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56780-quota-flush-quota-release-work-upon-quota-writeback.patch
- From: 6.8.0-58.60
- CVE-2024-57838
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57838.patch
- From:
- CVE-2024-57849
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57849.patch
- From:
- CVE-2024-56787
- Description:
Out of scope as the patch is for i.MX SoC
- CVE:
- Patch: skipped/CVE-2024-56787.patch
- From:
- CVE-2024-57843
- Description:
virtio-net: fix overflow inside virtnet_rq_alloc
- CVE: https://ubuntu.com/security/CVE-2024-57843
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57843-virtio-net-fix-overflow-inside-virtnet-rq-alloc.patch
- From: 6.8.0-58.60
- CVE-2024-56785
- Description:
Out of scope: MIPS architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-56785.patch
- From:
- CVE-2024-56781
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-56781.patch
- From:
- CVE-2024-56782
- Description:
ACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration()
- CVE: https://ubuntu.com/security/CVE-2024-56782
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56782-acpi-x86-add-adev-null-check-to-acpi-quirk-skip-serdev-enumeration.patch
- From: 6.8.0-58.60
- CVE-2024-57872
- Description:
scsi: ufs: pltfrm: Dellocate HBA during ufshcd_pltfrm_remove()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2024-57872
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57872-scsi-ufs-pltfrm-dellocate-hba-during-ufshcd-pltfrm-remove.patch
- From: 6.8.0-58.60
- CVE-2024-50150
- Description:
usb: typec: altmode should keep reference to parent
- CVE: https://ubuntu.com/security/CVE-2024-50150
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50150-usb-typec-altmode-should-keep-reference-to-parent.patch
- From: 6.8.0-58.60
- CVE-2024-50150
- Description:
usb: typec: altmode should keep reference to parent
- CVE: https://ubuntu.com/security/CVE-2024-50150
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50150-usb-typec-altmode-should-keep-reference-to-parent-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-56664
- Description:
Revert "bpf, sockmap: Prevent lock inversion deadlock in map delete elem"
- CVE: https://ubuntu.com/security/CVE-2024-56664
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56664-revert-bpf-sockmap-prevent-lock-inversion-deadlock-in-map-delete-elem-6.8.0-49.49.patch
- From: 6.8.0-60.63
- CVE-2024-56664
- Description:
bpf, sockmap: Fix race between element replace and close()
- CVE: https://ubuntu.com/security/CVE-2024-56664
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56664-bpf-sockmap-fix-race-between-element-replace-and-close.patch
- From: 6.8.0-60.63
- CVE-2024-56662
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://ubuntu.com/security/CVE-2024-56662
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi-nfit-ctl.patch
- From: 6.8.0-60.63
- CVE-2024-57900
- Description:
Complex adaptation required
- CVE:
- Patch: skipped/CVE-2024-57900.patch
- From:
- CVE-2025-21652
- Description:
ipvlan: Fix use-after-free in ipvlan_get_iflink().
- CVE: https://ubuntu.com/security/CVE-2025-21652
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2025-21652-ipvlan-fix-use-after-free-in-ipvlan-get-iflink.patch
- From: 6.8.0-60.63
- CVE-2024-57926
- Description:
drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err
- CVE: https://ubuntu.com/security/CVE-2024-57926
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57926-drm-mediatek-set-private-all-drm-private-i-drm-to-null-if-mtk-drm-bind-returns-err.patch
- From: 6.8.0-60.63
- CVE-2024-57925
- Description:
ksmbd: fix a missing return value check bug
- CVE: https://ubuntu.com/security/CVE-2024-57925
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57925-ksmbd-fix-a-missing-return-value-check-bug.patch
- From: 6.8.0-60.63
- CVE-2024-57912
- Description:
iio: pressure: zpa2326: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57912
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57912-iio-pressure-zpa2326-fix-information-leak-in-triggered-buffer.patch
- From: 6.8.0-60.63
- CVE-2024-57911
- Description:
iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57911
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57911-iio-dummy-iio-simply-dummy-buffer-fix-information-leak-in-triggered-buffer.patch
- From: 6.8.0-60.63
- CVE-2024-57910
- Description:
iio: light: vcnl4035: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57910
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57910-iio-light-vcnl4035-fix-information-leak-in-triggered-buffer.patch
- From: 6.8.0-60.63
- CVE-2024-57908
- Description:
iio: imu: kmx61: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57908
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57908-iio-imu-kmx61-fix-information-leak-in-triggered-buffer.patch
- From: 6.8.0-60.63
- CVE-2024-57907
- Description:
iio: adc: rockchip_saradc: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57907
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57907-iio-adc-rockchip-saradc-fix-information-leak-in-triggered-buffer.patch
- From: 6.8.0-60.63
- CVE-2024-57906
- Description:
iio: adc: ti-ads8688: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57906
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57906-iio-adc-ti-ads8688-fix-information-leak-in-triggered-buffer.patch
- From: 6.8.0-60.63
- CVE-2025-21650
- Description:
net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue
- CVE: https://ubuntu.com/security/CVE-2025-21650
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2025-21650-net-hns3-fixed-hclge-fetch-pf-reg-accesses-bar-space-out-of-bounds-issue.patch
- From: 6.8.0-60.63
- CVE-2024-56675
- Description:
bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors
- CVE: https://ubuntu.com/security/CVE-2024-56675
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56675-bpf-fix-uaf-via-mismatching-bpf-prog-attachment-rcu-flavors.patch
- From: 6.8.0-60.63
- CVE-2024-58087
- Description:
ksmbd: fix racy issue from session lookup and expire
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-58087-ksmbd-fix-racy-issue-from-session-lookup-and-expire.patch
- From: 6.8.0-60.63
- CVE-2024-56652
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2024-56652.patch
- From:
- CVE-2024-56764
- Description:
ublk: detach gendisk from ublk device if add_disk() fails
- CVE: https://ubuntu.com/security/CVE-2024-56764
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56764-ublk-detach-gendisk-from-ublk-device-if-add-disk-fails.patch
- From: 6.8.0-60.63
- CVE-2024-56759
- Description:
btrfs: fix use-after-free when COWing tree bock and tracing is enabled
- CVE: https://ubuntu.com/security/CVE-2024-56759
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56759-btrfs-fix-use-after-free-when-cowing-tree-bock-and-tracing-is-enabled-6.8.0-49.49.patch
- From: 6.8.0-60.63
- CVE-2024-53179
- Description:
smb: client: fix use-after-free of signing key
- CVE: https://ubuntu.com/security/CVE-2024-53179
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-53179-smb-client-fix-use-after-free-of-signing-key-6.8.0-59.61.patch
- From: 6.8.0-60.63
- CVE-2024-57801
- Description:
net/mlx5e: Skip restore TC rules for vport rep without loaded flag
- CVE: https://ubuntu.com/security/CVE-2024-57801
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57801-net-mlx5e-skip-restore-tc-rules-for-vport-rep-without-loaded-flag.patch
- From: 6.8.0-60.63
- CVE-2024-57892
- Description:
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
- CVE: https://ubuntu.com/security/CVE-2024-57892
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57892-ocfs2-fix-slab-use-after-free-due-to-dangling-pointer-dqi-priv.patch
- From: 6.8.0-60.63
- CVE-2024-57887
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57887.patch
- From:
- CVE-2024-56718
- Description:
net/smc: protect link down work from execute after lgr freed
- CVE: https://ubuntu.com/security/CVE-2024-56718
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56718-net-smc-protect-link-down-work-from-execute-after-lgr-freed.patch
- From: 6.8.0-60.63
- CVE-2024-56716
- Description:
netdevsim: prevent bad user input in nsim_dev_health_break_write()
- CVE: https://ubuntu.com/security/CVE-2024-56716
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56716-netdevsim-prevent-bad-user-input-in-nsim-dev-health-break-write.patch
- From: 6.8.0-60.63
- CVE-2024-56715
- Description:
ionic: Fix netdev notifier unregister on failure
- CVE: https://ubuntu.com/security/CVE-2024-56715
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56715-ionic-fix-netdev-notifier-unregister-on-failure.patch
- From: 6.8.0-60.63
- CVE-2024-56710
- Description:
ceph: fix memory leak in ceph_direct_read_write()
- CVE: https://ubuntu.com/security/CVE-2024-56710
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56710-ceph-fix-memory-leak-in-ceph-direct-read-write.patch
- From: 6.8.0-60.63
- CVE-2024-56767
- Description:
dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset
- CVE: https://ubuntu.com/security/CVE-2024-56767
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56767-dmaengine-at-xdmac-avoid-null-prt-deref-in-at-xdmac-prep-dma-memset.patch
- From: 6.8.0-60.63
- CVE-2024-56763
- Description:
tracing: Prevent bad count for tracing_cpumask_write
- CVE: https://ubuntu.com/security/CVE-2024-56763
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56763-tracing-prevent-bad-count-for-tracing-cpumask-write.patch
- From: 6.8.0-60.63
- CVE-2024-56760
- Description:
PCI/MSI: Handle lack of irqdomain gracefully
- CVE: https://ubuntu.com/security/CVE-2024-56760
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56760-pci-msi-handle-lack-of-irqdomain-gracefully.patch
- From: 6.8.0-60.63
- CVE-2024-56758
- Description:
btrfs: check folio mapping after unlock in relocate_one_folio()
- CVE: https://ubuntu.com/security/CVE-2024-56758
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-56758-btrfs-check-folio-mapping-after-unlock-in-relocate-one-folio.patch
- From: 6.8.0-60.63
- CVE-2024-57903
- Description:
net: restrict SO_REUSEPORT to inet sockets
- CVE: https://ubuntu.com/security/CVE-2024-57903
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57903-net-restrict-so-reuseport-to-inet-sockets.patch
- From: 6.8.0-60.63
- CVE-2024-57899
- Description:
wifi: mac80211: fix mbss changed flags corruption on 32 bit systems
- CVE: https://ubuntu.com/security/CVE-2024-57899
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57899-wifi-mac80211-fix-mbss-changed-flags-corruption-on-32-bit-systems.patch
- From: 6.8.0-60.63
- CVE-2024-57897
- Description:
drm/amdkfd: Correct the migration DMA map direction
- CVE: https://ubuntu.com/security/CVE-2024-57897
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57897-drm-amdkfd-correct-the-migration-dma-map-direction.patch
- From: 6.8.0-60.63
- CVE-2024-57895
- Description:
ksmbd: set ATTR_CTIME flags when setting mtime
- CVE: https://ubuntu.com/security/CVE-2024-57895
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57895-ksmbd-set-attr-ctime-flags-when-setting-mtime.patch
- From: 6.8.0-60.63
- CVE-2024-57898
- Description:
wifi: cfg80211: clear link ID from bitmap during link delete after clean up
- CVE: https://ubuntu.com/security/CVE-2024-57898
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57898-wifi-cfg80211-clear-link-id-from-bitmap-during-link-delete-after-clean-up.patch
- From: 6.8.0-60.63
- CVE-2024-57913
- Description:
usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
- CVE: https://ubuntu.com/security/CVE-2024-57913
- Patch: ubuntu-noble/6.8.0-60.63/CVE-2024-57913-usb-gadget-f-fs-remove-warn-on-in-functionfs-bind.patch
- From: 6.8.0-60.63
- CVE-2024-57904
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57904.patch
- From:
- CVE-2025-21683
- Description:
bpf: Fix bpf_sk_select_reuseport() memory leak
- CVE: https://ubuntu.com/security/CVE-2025-21683
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21683-bpf-fix-bpf-sk-select-reuseport-memory-leak.patch
- From: 6.8.0-62.65
- CVE-2025-21681
- Description:
openvswitch: fix lockup on tx to unregistering netdev with carrier
- CVE: https://ubuntu.com/security/CVE-2025-21681
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21681-openvswitch-fix-lockup-on-tx-to-unregistering-netdev-with-carrier.patch
- From: 6.8.0-62.65
- CVE-2025-21680
- Description:
pktgen: Avoid out-of-bounds access in get_imix_entries
- CVE: https://ubuntu.com/security/CVE-2025-21680
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21680-pktgen-avoid-out-of-bounds-access-in-get-imix-entries.patch
- From: 6.8.0-62.65
- CVE-2025-21676
- Description:
net: fec: handle page_pool_dev_alloc_pages error
- CVE: https://ubuntu.com/security/CVE-2025-21676
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21676-net-fec-handle-page-pool-dev-alloc-pages-error.patch
- From: 6.8.0-62.65
- CVE-2025-21675
- Description:
net/mlx5: Clear port select structure when fail to create
- CVE: https://ubuntu.com/security/CVE-2025-21675
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21675-net-mlx5-clear-port-select-structure-when-fail-to-create.patch
- From: 6.8.0-62.65
- CVE-2025-21674
- Description:
net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel
- CVE: https://ubuntu.com/security/CVE-2025-21674
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21674-net-mlx5e-fix-inversion-dependency-warning-while-enabling-ipsec-tunnel.patch
- From: 6.8.0-62.65
- CVE-2025-21697
- Description:
drm/v3d: Ensure job pointer is set to NULL after job completion
- CVE: https://ubuntu.com/security/CVE-2025-21697
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21697-drm-v3d-ensure-job-pointer-is-set-to-null-after-job-completion.patch
- From: 6.8.0-62.65
- CVE-2025-21665
- Description:
filemap: avoid truncating 64-bit offset to 32 bits
- CVE: https://ubuntu.com/security/CVE-2025-21665
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21665-filemap-avoid-truncating-64-bit-offset-to-32-bits.patch
- From: 6.8.0-62.65
- CVE-2025-21692
- Description:
net: sched: fix ets qdisc OOB Indexing
- CVE: https://ubuntu.com/security/CVE-2025-21692
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21692-net-sched-fix-ets-qdisc-oob-indexing.patch
- From: 6.8.0-62.65
- CVE-2025-21691
- Description:
cachestat: fix page cache statistics permission checking
- CVE: https://ubuntu.com/security/CVE-2025-21691
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21691-cachestat-fix-page-cache-statistics-permission-checking.patch
- From: 6.8.0-62.65
- CVE-2024-57951
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://ubuntu.com/security/CVE-2024-57951
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2024-57951-hrtimers-handle-cpu-state-correctly-on-hotplug.patch
- From: 6.8.0-62.65
- CVE-2024-57951
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://ubuntu.com/security/CVE-2024-57951
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2024-57951-hrtimers-handle-cpu-state-correctly-on-hotplug-kpatch.patch
- From: 6.8.0-62.65
- CVE-2024-57948
- Description:
mac802154: check local interfaces before deleting sdata list
- CVE: https://ubuntu.com/security/CVE-2024-57948
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2024-57948-mac802154-check-local-interfaces-before-deleting-sdata-list.patch
- From: 6.8.0-62.65
- CVE-2025-21667
- Description:
iomap: avoid avoid truncating 64-bit offset to 32 bits
- CVE: https://ubuntu.com/security/CVE-2025-21667
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21667-iomap-avoid-avoid-truncating-64-bit-offset-to-32-bits.patch
- From: 6.8.0-62.65
- CVE-2025-21670
- Description:
vsock/bpf: return early if transport is not assigned
- CVE: https://ubuntu.com/security/CVE-2025-21670
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21670-vsock-bpf-return-early-if-transport-is-not-assigned.patch
- From: 6.8.0-62.65
- CVE-2025-21669
- Description:
vsock/virtio: discard packets if the transport changes
- CVE: https://ubuntu.com/security/CVE-2025-21669
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21669-vsock-virtio-discard-packets-if-the-transport-changes.patch
- From: 6.8.0-62.65
- CVE-2025-21666
- Description:
vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
- CVE: https://ubuntu.com/security/CVE-2025-21666
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21666-vsock-prevent-null-ptr-deref-in-vsock-has-data-has-space.patch
- From: 6.8.0-62.65
- CVE-2025-21694
- Description:
fs/proc: fix softlockup in __read_vmcore
- CVE: https://ubuntu.com/security/CVE-2025-21694
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21694-fs-proc-fix-softlockup-in-read-vmcore.patch
- From: 6.8.0-62.65
- CVE-2025-21694
- Description:
fs/proc: fix softlockup in __read_vmcore (part 2)
- CVE: https://ubuntu.com/security/CVE-2025-21694
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21694-fs-proc-fix-softlockup-in-read-vmcore-part-2.patch
- From: 6.8.0-62.65
- CVE-2025-21668
- Description:
Out of scope as the patch is for i.MX SoC
- CVE:
- Patch: skipped/CVE-2025-21668.patch
- From:
- CVE-2024-57949
- Description:
Patch is on ARM64 architecture, which this distro does not support.
- CVE:
- Patch: skipped/CVE-2024-57949.patch
- From:
- CVE-2024-57924
- Description:
fs: relax assertions on failure to encode file handles
- CVE: https://ubuntu.com/security/CVE-2024-57924
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2024-57924-fs-relax-assertions-on-failure-to-encode-file-handles.patch
- From: 6.8.0-62.65
- CVE-2024-53124
- Description:
net: fix data-races around sk->sk_forward_alloc
- CVE: https://ubuntu.com/security/CVE-2024-53124
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2024-53124-net-fix-data-races-around-sk-sk-forward-alloc.patch
- From: 6.8.0-62.65
- CVE-2025-21682
- Description:
eth: bnxt: always recalculate features after XDP clearing, fix null-deref
- CVE: https://ubuntu.com/security/CVE-2025-21682
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21682-eth-bnxt-always-recalculate-features-after-xdp-clearing-fix-null-deref.patch
- From: 6.8.0-62.65
- CVE-2025-21672
- Description:
afs: Fix merge preference rule failure condition
- CVE: https://ubuntu.com/security/CVE-2025-21672
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21672-afs-fix-merge-preference-rule-failure-condition.patch
- From: 6.8.0-62.65
- CVE-2025-21943
- Description:
gpio: aggregator: protect driver attr handlers against module unload
- CVE: https://ubuntu.com/security/CVE-2025-21943
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21943-gpio-aggregator-protect-driver-attr-handlers-against-module-unload.patch
- From: 6.8.0-62.65
- CVE-2024-50157
- Description:
RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop
- CVE: https://ubuntu.com/security/CVE-2024-50157
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2024-50157-rdma-bnxt-re-avoid-cpu-lockups-due-fifo-occupancy-check-loop.patch
- From: 6.8.0-62.65
- CVE-2025-21699
- Description:
gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
- CVE: https://ubuntu.com/security/CVE-2025-21699
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21699-gfs2-truncate-address-space-when-flipping-gfs2-dif-jdata-flag.patch
- From: 6.8.0-62.65
- CVE-2025-21690
- Description:
scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
- CVE: https://ubuntu.com/security/CVE-2025-21690
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21690-scsi-storvsc-ratelimit-warning-logs-to-prevent-vm-denial-of-service.patch
- From: 6.8.0-62.65
- CVE-2025-21689
- Description:
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
- CVE: https://ubuntu.com/security/CVE-2025-21689
- Patch: ubuntu-noble/6.8.0-62.65/CVE-2025-21689-usb-serial-quatech2-fix-null-ptr-deref-in-qt2-process-read-urb.patch
- From: 6.8.0-62.65
- CVE-2025-22088
- Description:
RDMA/erdma: Prevent use-after-free in erdma_accept_newconn()
- CVE: https://ubuntu.com/security/CVE-2025-22088
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-22088-rdma-erdma-prevent-use-after-free-in-erdma-accept-newconn.patch
- From: 6.8.0-63.66
- CVE-2025-37932
- Description:
sch_htb: make htb_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37932
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37932-sch-htb-make-htb-qlen-notify-idempotent.patch
- From: 6.8.0-63.66
- CVE-2025-37997
- Description:
netfilter: ipset: fix region locking in hash types
- CVE: https://ubuntu.com/security/CVE-2025-37997
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37997-netfilter-ipset-fix-region-locking-in-hash-types.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-codel-remove-sch-q-qlen-check-before-qdisc-tree-reduce-backlog.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
sch_htb: make htb_deactivate() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-sch-htb-make-htb-deactivate-idempotent.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
sch_drr: make drr_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-sch-drr-make-drr-qlen-notify-idempotent.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
sch_hfsc: make hfsc_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-sch-hfsc-make-hfsc-qlen-notify-idempotent.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
sch_qfq: make qfq_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-sch-qfq-make-qfq-qlen-notify-idempotent.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
sch_qfq: make qfq_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-sch-qfq-make-qfq-qlen-notify-idempotent-kpatch.patch
- From: 6.8.0-63.66
- CVE-2025-37798
- Description:
sch_ets: make est_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37798-sch-ets-make-est-qlen-notify-idempotent.patch
- From: 6.8.0-63.66
- CVE-2025-37890
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37890
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-37890-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-with-netem-as-child-qdisc.patch
- From: 6.8.0-63.66
- CVE-2025-38000
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://ubuntu.com/security/CVE-2025-38000
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-38000-sch-hfsc-fix-qlen-accounting-bug-when-using-peek-in-hfsc-enqueue.patch
- From: 6.8.0-63.66
- CVE-2025-38001
- Description:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
- CVE: https://ubuntu.com/security/CVE-2025-38001
- Patch: ubuntu-noble/6.8.0-63.66/CVE-2025-38001-net-sched-hfsc-address-reentrant-enqueue-adding-class-to-eltree-twice.patch
- From: 6.8.0-63.66
- CVE-2025-21731
- Description:
nbd: don't allow reconnect after disconnect
- CVE: https://ubuntu.com/security/CVE-2025-21731
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21731-nbd-don-t-allow-reconnect-after-disconnect.patch
- From: 6.8.0-64.67
- CVE-2024-57996
- Description:
net_sched: sch_sfq: don't allow 1 packet limit
- CVE: https://ubuntu.com/security/CVE-2024-57996
- Patch: ubuntu-noble/6.8.0-79.79/CVE-2024-57996-net_sched-sch_sfq-don-t-allow-1-packet-limit.patch
- From: 6.8.0-79.79
- CVE-2025-21812
- Description:
ax25: rcu protect dev->ax25_ptr
- CVE: https://ubuntu.com/security/CVE-2025-21812
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21812-ax25-rcu-protect-dev-ax25-ptr-6.8.0-39.39.patch
- From: 6.8.0-64.67
- CVE-2025-21812
- Description:
ax25: rcu protect dev->ax25_ptr
- CVE: https://ubuntu.com/security/CVE-2025-21812
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21812-ax25-rcu-protect-dev-ax25-ptr-kpatch-6.8.0-39.39.patch
- From: 6.8.0-64.67
- CVE-2025-21711
- Description:
net/rose: prevent integer overflows in rose_setsockopt()
- CVE: https://ubuntu.com/security/CVE-2025-21711
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21711-net-rose-prevent-integer-overflows-in-rose-setsockopt.patch
- From: 6.8.0-64.67
- CVE-2025-21727
- Description:
padata: fix UAF in padata_reorder
- CVE: https://ubuntu.com/security/CVE-2025-21727
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21727-padata-fix-uaf-in-padata-reorder.patch
- From: 6.8.0-64.67
- CVE-2025-21726
- Description:
padata: add pd get/put refcnt helper
- CVE: https://ubuntu.com/security/CVE-2025-21726
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21726-padata-add-pd-get-put-refcnt-helper.patch
- From: 6.8.0-64.67
- CVE-2025-21726
- Description:
padata: avoid UAF for reorder_work
- CVE: https://ubuntu.com/security/CVE-2025-21726
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21726-padata-avoid-uaf-for-reorder-work.patch
- From: 6.8.0-64.67
- CVE-2024-58034
- Description:
memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code()
- CVE: https://ubuntu.com/security/CVE-2024-58034
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58034-memory-tegra20-emc-fix-an-of-node-reference-bug-in-tegra-emc-find-node-by-ram-code.patch
- From: 6.8.0-64.67
- CVE-2024-57984
- Description:
Hot-join not supported
- CVE:
- Patch: skipped/CVE-2024-57984.patch
- From:
- CVE-2025-21811
- Description:
nilfs2: protect access to buffers with no active references
- CVE: https://ubuntu.com/security/CVE-2025-21811
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21811-nilfs2-protect-access-to-buffers-with-no-active-references.patch
- From: 6.8.0-64.67
- CVE-2024-58069
- Description:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
- CVE: https://ubuntu.com/security/CVE-2024-58069
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58069-rtc-pcf85063-fix-potential-oob-write-in-pcf85063-nvmem-read.patch
- From: 6.8.0-64.67
- CVE-2025-21718
- Description:
net: rose: fix timer races against user threads
- CVE: https://ubuntu.com/security/CVE-2025-21718
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21718-net-rose-fix-timer-races-against-user-threads.patch
- From: 6.8.0-64.67
- CVE-2025-21715
- Description:
net: davicom: fix UAF in dm9000_drv_remove
- CVE: https://ubuntu.com/security/CVE-2025-21715
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21715-net-davicom-fix-uaf-in-dm9000-drv-remove.patch
- From: 6.8.0-64.67
- CVE-2024-57980
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://ubuntu.com/security/CVE-2024-57980
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 6.8.0-64.67
- CVE-2024-57979
- Description:
PPS for embedded GPS devices. Irrelevant for servers.
- CVE:
- Patch: skipped/CVE-2024-57979.patch
- From:
- CVE-2024-58055
- Description:
usb: gadget: f_tcm: Don't free command immediately
- CVE: https://ubuntu.com/security/CVE-2024-58055
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58055-usb-gadget-f-tcm-don-t-free-command-immediately.patch
- From: 6.8.0-64.67
- CVE-2024-57974
- Description:
udp: Deal with race between UDP socket address change and rehash
- CVE: https://ubuntu.com/security/CVE-2024-57974
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-57974-udp-deal-with-race-between-udp-socket-address-change-and-rehash.patch
- From: 6.8.0-64.67
- CVE-2024-57990
- Description:
wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc
- CVE: https://ubuntu.com/security/CVE-2024-57990
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-57990-wifi-mt76-mt7925-fix-a-potential-array-index-out-of-bounds-issue-for-clc.patch
- From: 6.8.0-64.67
- CVE-2024-57990
- Description:
wifi: mt76: mt7925: fix off by one in mt7925_load_clc()
- CVE: https://ubuntu.com/security/CVE-2024-57990
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-57990-wifi-mt76-mt7925-fix-off-by-one-in-mt7925-load-clc.patch
- From: 6.8.0-64.67
- CVE-2025-21798
- Description:
not_affected
- CVE:
- Patch: skipped/CVE-2025-21798.patch
- From:
- CVE-2025-21722
- Description:
nilfs2: do not force clear folio if buffer is referenced
- CVE: https://ubuntu.com/security/CVE-2025-21722
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21722-nilfs2-do-not-force-clear-folio-if-buffer-is-referenced-6.8.0-57.59.patch
- From: 6.8.0-64.67
- CVE-2025-21721
- Description:
nilfs2: handle errors that nilfs_prepare_chunk() may return
- CVE: https://ubuntu.com/security/CVE-2025-21721
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21721-nilfs2-handle-errors-that-nilfs-prepare-chunk-may-return-6.8.0-55.57.patch
- From: 6.8.0-64.67
- CVE-2024-57982
- Description:
xfrm: state: fix out-of-bounds read during lookup
- CVE: https://ubuntu.com/security/CVE-2024-57982
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-57982-xfrm-state-fix-out-of-bounds-read-during-lookup.patch
- From: 6.8.0-64.67
- CVE-2024-57953
- Description:
not_affected
- CVE:
- Patch: skipped/CVE-2024-57953.patch
- From:
- CVE-2024-58057
- Description:
idpf: convert workqueues to unbound
- CVE: https://ubuntu.com/security/CVE-2024-58057
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58057-idpf-convert-workqueues-to-unbound.patch
- From: 6.8.0-64.67
- CVE-2025-21809
- Description:
rxrpc, afs: Fix peer hash locking vs RCU callback
- CVE: https://ubuntu.com/security/CVE-2025-21809
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21809-rxrpc-afs-fix-peer-hash-locking-vs-rcu-callback.patch
- From: 6.8.0-64.67
- CVE-2025-21801
- Description:
net: ravb: Fix missing rtnl lock in suspend/resume path
- CVE: https://ubuntu.com/security/CVE-2025-21801
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21801-net-ravb-fix-missing-rtnl-lock-in-suspend-resume-path.patch
- From: 6.8.0-64.67
- CVE-2025-21714
- Description:
RDMA/mlx5: Fix implicit ODP use after free
- CVE: https://ubuntu.com/security/CVE-2025-21714
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21714-rdma-mlx5-fix-implicit-odp-use-after-free.patch
- From: 6.8.0-64.67
- CVE-2024-57975
- Description:
btrfs: do proper folio cleanup when run_delalloc_nocow() failed
- CVE: https://ubuntu.com/security/CVE-2024-57975
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-57975-btrfs-do-proper-folio-cleanup-when-run-delalloc-nocow-failed-6.8.0-49.49.patch
- From: 6.8.0-64.67
- CVE-2024-49887
- Description:
f2fs: fix to handle segment allocation failure correctly
- CVE: https://ubuntu.com/security/CVE-2024-49887
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-49887-f2fs-fix-to-handle-segment-allocation-failure-correctly-6.8.0-41.41.patch
- From: 6.8.0-64.67
- CVE-2024-49887
- Description:
f2fs: fix to don't panic system for no free segment fault injection
- CVE: https://ubuntu.com/security/CVE-2024-49887
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-49887-f2fs-fix-to-don-t-panic-system-for-no-free-segment-fault-injection-6.8.0-41.41.patch
- From: 6.8.0-64.67
- CVE-2025-21754
- Description:
btrfs: fix assertion failure when splitting ordered extent after transaction abort
- CVE: https://ubuntu.com/security/CVE-2025-21754
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21754-btrfs-fix-assertion-failure-when-splitting-ordered-extent-after-transaction-abort.patch
- From: 6.8.0-64.67
- CVE-2025-21753
- Description:
btrfs: fix use-after-free when attempting to join an aborted transaction
- CVE: https://ubuntu.com/security/CVE-2025-21753
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21753-btrfs-fix-use-after-free-when-attempting-to-join-an-aborted-transaction.patch
- From: 6.8.0-64.67
- CVE-2024-58019
- Description:
nvkm/gsp: correctly advance the read pointer of GSP message queue
- CVE: https://ubuntu.com/security/CVE-2024-58019
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58019-nvkm-gsp-correctly-advance-the-read-pointer-of-gsp-message-queue.patch
- From: 6.8.0-64.67
- CVE-2024-58018
- Description:
nvkm: correctly calculate the available space of the GSP cmdq buffer
- CVE: https://ubuntu.com/security/CVE-2024-58018
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58018-nvkm-correctly-calculate-the-available-space-of-the-gsp-cmdq-buffer.patch
- From: 6.8.0-64.67
- CVE-2024-58017
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2024-58017.patch
- From:
- CVE-2024-58016
- Description:
safesetid: check size of policy writes
- CVE: https://ubuntu.com/security/CVE-2024-58016
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58016-safesetid-check-size-of-policy-writes.patch
- From: 6.8.0-64.67
- CVE-2024-58014
- Description:
wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()
- CVE: https://ubuntu.com/security/CVE-2024-58014
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58014-wifi-brcmsmac-add-gain-range-check-to-wlc-phy-iqcal-gainparams-nphy.patch
- From: 6.8.0-64.67
- CVE-2024-58085
- Description:
tomoyo: don't emit warning in tomoyo_write_control()
- CVE: https://ubuntu.com/security/CVE-2024-58085
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58085-tomoyo-don-t-emit-warning-in-tomoyo-write-control.patch
- From: 6.8.0-64.67
- CVE-2025-21750
- Description:
wifi: brcmfmac: Check the return value of of_property_read_string_index()
- CVE: https://ubuntu.com/security/CVE-2025-21750
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21750-wifi-brcmfmac-check-the-return-value-of-of-property-read-string-index.patch
- From: 6.8.0-64.67
- CVE-2024-58013
- Description:
Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync
- CVE: https://ubuntu.com/security/CVE-2024-58013
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58013-bluetooth-mgmt-fix-slab-use-after-free-read-in-mgmt-remove-adv-monitor-sync.patch
- From: 6.8.0-64.67
- CVE-2024-58011
- Description:
platform/x86: int3472: Check for adev == NULL
- CVE: https://ubuntu.com/security/CVE-2024-58011
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58011-platform-x86-int3472-check-for-adev-null.patch
- From: 6.8.0-64.67
- CVE-2024-58077
- Description:
ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback
- CVE: https://ubuntu.com/security/CVE-2024-58077
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58077-asoc-soc-pcm-don-t-use-soc-pcm-ret-on-prepare-callback.patch
- From: 6.8.0-64.67
- CVE-2025-21820
- Description:
tty: xilinx_uartps: split sysrq handling
- CVE: https://ubuntu.com/security/CVE-2025-21820
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21820-tty-xilinx-uartps-split-sysrq-handling.patch
- From: 6.8.0-64.67
- CVE-2025-21749
- Description:
net: rose: lock the socket in rose_bind()
- CVE: https://ubuntu.com/security/CVE-2025-21749
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21749-net-rose-lock-the-socket-in-rose-bind.patch
- From: 6.8.0-64.67
- CVE-2024-58010
- Description:
binfmt_flat: Fix integer overflow bug on 32 bit systems
- CVE: https://ubuntu.com/security/CVE-2024-58010
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58010-binfmt-flat-fix-integer-overflow-bug-on-32-bit-systems.patch
- From: 6.8.0-64.67
- CVE-2024-58083
- Description:
KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- CVE: https://ubuntu.com/security/CVE-2024-58083
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58083-kvm-explicitly-verify-target-vcpu-is-online-in-kvm-get-vcpu.patch
- From: 6.8.0-64.67
- CVE-2025-21748
- Description:
ksmbd: fix integer overflows on 32 bit systems
- CVE: https://ubuntu.com/security/CVE-2025-21748
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21748-ksmbd-fix-integer-overflows-on-32-bit-systems.patch
- From: 6.8.0-64.67
- CVE-2025-21743
- Description:
usbnet: ipheth: fix possible overflow in DPE length check
- CVE: https://ubuntu.com/security/CVE-2025-21743
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21743-usbnet-ipheth-fix-possible-overflow-in-dpe-length-check.patch
- From: 6.8.0-64.67
- CVE-2025-21742
- Description:
usbnet: ipheth: use static NDP16 location in URB
- CVE: https://ubuntu.com/security/CVE-2025-21742
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21742-usbnet-ipheth-use-static-ndp16-location-in-urb.patch
- From: 6.8.0-64.67
- CVE-2024-58007
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-58007.patch
- From:
- CVE-2025-21739
- Description:
scsi: ufs: core: Fix use-after free in init error and remove paths
- CVE: https://ubuntu.com/security/CVE-2025-21739
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21739-scsi-ufs-core-Fix-use-after-free-in-init-error-and-remove-paths-57.patch
- From: 6.8.0-64.67
- CVE-2025-21739
- Description:
scsi: ufs: core: Fix use-after free in init error and remove paths
- CVE: https://ubuntu.com/security/CVE-2025-21739
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21739-scsi-ufs-core-Fix-use-after-free-in-init-error-and-remove-paths-kpatch-57.patch
- From: 6.8.0-64.67
- CVE-2024-58079
- Description:
media: uvcvideo: Fix crash during unbind if gpio unit is in use
- CVE: https://ubuntu.com/security/CVE-2024-58079
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58079-media-uvcvideo-fix-crash-during-unbind-if-gpio-unit-is-in-use-6.8.0-57.59.patch
- From: 6.8.0-64.67
- CVE-2024-58079
- Description:
media: uvcvideo: Fix crash during unbind if gpio unit is in use (kpatch adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-58079
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58079-media-uvcvideo-fix-crash-during-unbind-if-gpio-unit-is-in-use-kpatch-6.8.0-57.59.patch
- From: 6.8.0-64.67
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58002-media-uvcvideo-Only-save-async-fh-if-success.patch
- From: 6.8.0-64.67
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers.patch
- From: 6.8.0-64.67
- CVE-2024-58002
- Description:
media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-kpatch.patch
- From: 6.8.0-64.67
- CVE-2025-21735
- Description:
NFC: nci: Add bounds checking in nci_hci_create_pipe()
- CVE: https://ubuntu.com/security/CVE-2025-21735
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21735-nfc-nci-add-bounds-checking-in-nci-hci-create-pipe.patch
- From: 6.8.0-64.67
- CVE-2025-21732
- Description:
RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error
- CVE: https://ubuntu.com/security/CVE-2025-21732
- Patch: ubuntu-noble/6.8.0-64.67/CVE-2025-21732-rdma-mlx5-fix-a-race-for-an-odp-mr-which-leads-to-cqe-with-error-39.patch
- From: 6.8.0-64.67
- CVE-2025-37974
- Description:
unsupported_arch_s390
- CVE:
- Patch: skipped/CVE-2025-37974.patch
- From:
- CVE-2025-37797
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class handling
- CVE: https://ubuntu.com/security/CVE-2025-37797
- Patch: ubuntu-noble/6.8.0-71.71/CVE-2025-37797-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-handling.patch
- From: 6.8.0-71.71
- CVE-2025-38083
- Description:
net_sched: prio: fix a race in prio_tune()
- CVE: https://ubuntu.com/security/CVE-2025-38083
- Patch: ubuntu-noble/6.8.0-71.71/CVE-2025-38083-net-sched-prio-fix-a-race-in-prio-tune.patch
- From: 6.8.0-71.71
- CVE-2025-21796
- Description:
nfsd: clear acl_access/acl_default after releasing them
- CVE: https://ubuntu.com/security/CVE-2025-21796
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21796-nfsd-clear-acl-access-acl-default-after-releasing-them.patch
- From: 6.8.0-78.78
- CVE-2025-21795
- Description:
NFSD: fix hang in nfsd4_shutdown_callback
- CVE: https://ubuntu.com/security/CVE-2025-21795
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21795-nfsd-fix-hang-in-nfsd4-shutdown-callback.patch
- From: 6.8.0-78.78
- CVE-2025-21791
- Description:
vrf: use RCU protection in l3mdev_l3_out()
- CVE: https://ubuntu.com/security/CVE-2025-21791
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21791-vrf-use-rcu-protection-in-l3mdev-l3-out.patch
- From: 6.8.0-78.78
- CVE-2025-21785
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2024-57834
- Description:
media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread
- CVE: https://ubuntu.com/security/CVE-2024-57834
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2024-57834-media-vidtv-fix-a-null-ptr-deref-in-vidtv-mux-stop-thread.patch
- From: 6.8.0-78.78
- CVE-2024-54458
- Description:
scsi: ufs: bsg: Set bsg_queue to NULL after removal
- CVE: https://ubuntu.com/security/CVE-2024-54458
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2024-54458-scsi-ufs-bsg-set-bsg-queue-to-null-after-removal.patch
- From: 6.8.0-78.78
- CVE-2024-54456
- Description:
NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client()
- CVE: https://ubuntu.com/security/CVE-2024-54456
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2024-54456-nfs-fix-potential-buffer-overflowin-nfs-sysfs-link-rpc-client.patch
- From: 6.8.0-78.78
- CVE-2025-21782
- Description:
orangefs: fix a oob in orangefs_debug_write
- CVE: https://ubuntu.com/security/CVE-2025-21782
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21782-orangefs-fix-a-oob-in-orangefs-debug-write.patch
- From: 6.8.0-78.78
- CVE-2025-21780
- Description:
drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
- CVE: https://ubuntu.com/security/CVE-2025-21780
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21780-drm-amdgpu-avoid-buffer-overflow-attach-in-smu-sys-set-pp-table.patch
- From: 6.8.0-78.78
- CVE-2025-21772
- Description:
partitions: mac: fix handling of bogus partition table
- CVE: https://ubuntu.com/security/CVE-2025-21772
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21772-partitions-mac-fix-handling-of-bogus-partition-table.patch
- From: 6.8.0-78.78
- CVE-2025-21767
- Description:
clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context
- CVE: https://ubuntu.com/security/CVE-2025-21767
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21767-clocksource-use-migrate-disable-to-avoid-calling-get-random-u32-in-atomic-context.patch
- From: 6.8.0-78.78
- CVE-2025-21767
- Description:
clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context kpatch
- CVE: https://ubuntu.com/security/CVE-2025-21767
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21767-clocksource-use-migrate-disable-to-avoid-calling-get-random-u32-in-atomic-context-kpatch.patch
- From: 6.8.0-78.78
- CVE-2025-21764
- Description:
ndisc: use RCU protection in ndisc_alloc_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21764
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21764-ndisc-use-rcu-protection-in-ndisc-alloc-skb.patch
- From: 6.8.0-78.78
- CVE-2025-21763
- Description:
neighbour: use RCU protection in __neigh_notify()
- CVE: https://ubuntu.com/security/CVE-2025-21763
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21763-neighbour-use-rcu-protection-in-neigh-notify.patch
- From: 6.8.0-78.78
- CVE-2025-21762
- Description:
net: add dev_net_rcu() helper
- CVE: https://ubuntu.com/security/CVE-2025-21762
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21762-0001-net-add-dev_net_rcu-helper.patch
- From: 6.8.0-78.78
- CVE-2025-21762
- Description:
arp: use RCU protection in arp_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-21762
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21762-arp-use-rcu-protection-in-arp-xmit.patch
- From: 6.8.0-78.78
- CVE-2025-21761
- Description:
openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
- CVE: https://ubuntu.com/security/CVE-2025-21761
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21761-openvswitch-use-rcu-protection-in-ovs-vport-cmd-fill-info.patch
- From: 6.8.0-78.78
- CVE-2025-21760
- Description:
ndisc: extend RCU protection in ndisc_send_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21760
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21760-ndisc-extend-rcu-protection-in-ndisc-send-skb.patch
- From: 6.8.0-78.78
- CVE-2025-21759
- Description:
ipv6: mcast: extend RCU protection in igmp6_send()
- CVE: https://ubuntu.com/security/CVE-2025-21759
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21759-ipv6-mcast-extend-rcu-protection-in-igmp6-send.patch
- From: 6.8.0-78.78
- CVE-2025-21758
- Description:
ipv6: mcast: add RCU protection to mld_newpack()
- CVE: https://ubuntu.com/security/CVE-2025-21758
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21758-ipv6-mcast-add-rcu-protection-to-mld-newpack.patch
- From: 6.8.0-78.78
- CVE-2025-21836
- Description:
io_uring/kbuf: reallocate buf lists on upgrade
- CVE: https://ubuntu.com/security/CVE-2025-21836
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21836-io-uring-kbuf-reallocate-buf-lists-on-upgrade.patch
- From: 6.8.0-78.78
- CVE-2025-21786
- Description:
Complex adaptation required
- CVE:
- Patch: skipped/CVE-2025-21786.patch
- From:
- CVE-2025-21838
- Description:
usb: gadget: core: flush gadget workqueue after device removal
- CVE: https://ubuntu.com/security/CVE-2025-21838
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21838-usb-gadget-core-flush-gadget-workqueue-after-device-removal.patch
- From: 6.8.0-78.78
- CVE-2025-21866
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21866.patch
- From:
- CVE-2025-21858
- Description:
geneve: Fix use-after-free in geneve_find_dev().
- CVE: https://ubuntu.com/security/CVE-2025-21858
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21858-geneve-fix-use-after-free-in-geneve-find-dev.patch
- From: 6.8.0-78.78
- CVE-2025-21857
- Description:
net/sched: cls_api: fix error handling causing NULL dereference
- CVE: https://ubuntu.com/security/CVE-2025-21857
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21857-net-sched-cls-api-fix-error-handling-causing-null-dereference.patch
- From: 6.8.0-78.78
- CVE-2025-21856
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21856.patch
- From:
- CVE-2025-21855
- Description:
ibmvnic: Don't reference skb after sending to VIOS
- CVE: https://ubuntu.com/security/CVE-2025-21855
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21855-ibmvnic-don-t-reference-skb-after-sending-to-vios.patch
- From: 6.8.0-78.78
- CVE-2025-21854
- Description:
sockmap, vsock: For connectible sockets allow only connected
- CVE: https://ubuntu.com/security/CVE-2025-21854
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21854-sockmap-vsock-for-connectible-sockets-allow-only-connected-6.8.0-57.59.patch
- From: 6.8.0-78.78
- CVE-2025-21864
- Description:
tcp: drop secpath at the same time as we currently drop dst
- CVE: https://ubuntu.com/security/CVE-2025-21864
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21864-tcp-drop-secpath-at-the-same-time-as-we-currently-drop-dst.patch
- From: 6.8.0-78.78
- CVE-2025-21867
- Description:
bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
- CVE: https://ubuntu.com/security/CVE-2025-21867
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21867-bpf-test-run-fix-use-after-free-issue-in-eth-skb-pkt-type.patch
- From: 6.8.0-78.78
- CVE-2024-58088
- Description:
bpf: Fix deadlock when freeing cgroup storage
- CVE: https://ubuntu.com/security/CVE-2024-58088
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2024-58088-bpf-fix-deadlock-when-freeing-cgroup-storage.patch
- From: 6.8.0-78.78
- CVE-2025-21863
- Description:
io_uring: prevent opcode speculation
- CVE: https://ubuntu.com/security/CVE-2025-21863
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21863-io-uring-prevent-opcode-speculation.patch
- From: 6.8.0-78.78
- CVE-2025-21871
- Description:
tee: optee: Fix supplicant wait loop
- CVE: https://ubuntu.com/security/CVE-2025-21871
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21871-tee-optee-fix-supplicant-wait-loop.patch
- From: 6.8.0-78.78
- CVE-2025-21848
- Description:
nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
- CVE: https://ubuntu.com/security/CVE-2025-21848
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21848-nfp-bpf-add-check-for-nfp-app-ctrl-msg-alloc.patch
- From: 6.8.0-78.78
- CVE-2025-21847
- Description:
ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data()
- CVE: https://ubuntu.com/security/CVE-2025-21847
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21847-asoc-sof-stream-ipc-check-for-cstream-nullity-in-sof-ipc-msg-data.patch
- From: 6.8.0-78.78
- CVE-2025-21844
- Description:
smb: client: Add check for next_buffer in receive_encrypted_standard()
- CVE: https://ubuntu.com/security/CVE-2025-21844
- Patch: ubuntu-noble/6.8.0-78.78/CVE-2025-21844-smb-client-add-check-for-next-buffer-in-receive-encrypted-standard.patch
- From: 6.8.0-78.78
- CVE-2025-21869
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21869.patch
- From:
- CVE-2025-21887
- Description:
ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up
- CVE: https://ubuntu.com/security/CVE-2025-21887
- Patch: ubuntu-noble/6.8.0-79.79/CVE-2025-21887-ovl-fix-uaf-in-ovl-dentry-update-reval-by-moving-dput-in-ovl-link-up.patch
- From: 6.8.0-79.79
- CVE-2025-38350
- Description:
net/sched: Always pass notifications when child class becomes empty
- CVE: https://ubuntu.com/security/CVE-2025-38350
- Patch: ubuntu-noble/6.8.0-79.79/CVE-2025-38350-net-sched-always-pass-notifications-when-child-class-becomes-empty.patch
- From: 6.8.0-79.79
- CVE-2025-37752
- Description:
net_sched: sch_sfq: move the limit validation
- CVE: https://ubuntu.com/security/CVE-2025-37752
- Patch: ubuntu-noble/6.8.0-79.79/CVE-2025-37752-net-sched-sch-sfq-move-the-limit-validation-63.66.patch
- From: 6.8.0-79.79
- CVE-2025-21945
- Description:
ksmbd: fix use-after-free in smb2_lock
- CVE: https://ubuntu.com/security/CVE-2025-21945
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21945-ksmbd-fix-use-after-free-in-smb2-lock.patch
- From: 6.8.0-84.84
- CVE-2025-21944
- Description:
ksmbd: fix bug on trap in smb2_lock
- CVE: https://ubuntu.com/security/CVE-2025-21944
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21944-ksmbd-fix-bug-on-trap-in-smb2-lock.patch
- From: 6.8.0-84.84
- CVE-2025-21934
- Description:
rapidio: fix an API misues when rio_add_net() fails
- CVE: https://ubuntu.com/security/CVE-2025-21934
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21934-rapidio-fix-an-api-misues-when-rio-add-net-fails.patch
- From: 6.8.0-84.84
- CVE-2025-21929
- Description:
HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove()
- CVE: https://ubuntu.com/security/CVE-2025-21929
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21929-hid-intel-ish-hid-fix-use-after-free-issue-in-hid-ishtp-cl-remove.patch
- From: 6.8.0-84.84
- CVE-2025-21928
- Description:
HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
- CVE: https://ubuntu.com/security/CVE-2025-21928
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21928-hid-intel-ish-hid-fix-use-after-free-issue-in-ishtp-hid-remove.patch
- From: 6.8.0-84.84
- CVE-2025-21915
- Description:
cdx: Fix possible UAF error in driver_override_show()
- CVE: https://ubuntu.com/security/CVE-2025-21915
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21915-cdx-fix-possible-uaf-error-in-driver-override-show.patch
- From: 6.8.0-84.84
- CVE-2025-21979
- Description:
wifi: cfg80211: cancel wiphy_work before freeing wiphy
- CVE: https://ubuntu.com/security/CVE-2025-21979
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21979-wifi-cfg80211-cancel-wiphy-work-before-freeing-wiphy.patch
- From: 6.8.0-84.84
- CVE-2025-21979
- Description:
wifi: cfg80211: init wiphy_work before allocating rfkill fails
- CVE: https://ubuntu.com/security/CVE-2025-21979
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21979-wifi-cfg80211-init-wiphy_work-before-allocating-rfkill-fails.patch
- From: 6.8.0-84.84
- CVE-2025-21968
- Description:
drm/amd/display: Fix slab-use-after-free on hdcp_work
- CVE: https://ubuntu.com/security/CVE-2025-21968
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21968-drm-amd-display-fix-slab-use-after-free-on-hdcp-work.patch
- From: 6.8.0-84.84
- CVE-2025-21966
- Description:
dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature
- CVE: https://ubuntu.com/security/CVE-2025-21966
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21966-dm-flakey-fix-memory-corruption-in-optional-corrupt-bio-byte-feature.patch
- From: 6.8.0-84.84
- CVE-2025-22004
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://ubuntu.com/security/CVE-2025-22004
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 6.8.0-84.84
- CVE-2025-21881
- Description:
uprobes: Reject the shared zeropage in uprobe_write_opcode()
- CVE: https://ubuntu.com/security/CVE-2025-21881
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21881-uprobes-reject-the-shared-zeropage-in-uprobe-write-opcode.patch
- From: 6.8.0-84.84
- CVE-2025-21899
- Description:
tracing: Fix bad hist from corrupting named_triggers list
- CVE: https://ubuntu.com/security/CVE-2025-21899
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21899-tracing-fix-bad-hist-from-corrupting-named-triggers-list.patch
- From: 6.8.0-84.84
- CVE-2025-21889
- Description:
perf/core: Add RCU read lock protection to perf_iterate_ctx()
- CVE: https://ubuntu.com/security/CVE-2025-21889
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21889-perf-core-add-rcu-read-lock-protection-to-perf-iterate-ctx.patch
- From: 6.8.0-84.84
- CVE-2025-21905
- Description:
wifi: iwlwifi: limit printed string from FW file
- CVE: https://ubuntu.com/security/CVE-2025-21905
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21905-wifi-iwlwifi-limit-printed-string-from-fw-file.patch
- From: 6.8.0-84.84
- CVE-2025-21926
- Description:
net: gso: fix ownership in __udp_gso_segment
- CVE: https://ubuntu.com/security/CVE-2025-21926
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21926-net-gso-fix-ownership-in-udp-gso-segment.patch
- From: 6.8.0-84.84
- CVE-2025-21920
- Description:
vlan: enforce underlying device type
- CVE: https://ubuntu.com/security/CVE-2025-21920
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21920-vlan-enforce-underlying-device-type.patch
- From: 6.8.0-84.84
- CVE-2025-21920
- Description:
vlan: enforce underlying device type
- CVE: https://ubuntu.com/security/CVE-2025-21920
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21920-vlan-enforce-underlying-device-type-kpatch.patch
- From: 6.8.0-84.84
- CVE-2025-22005
- Description:
ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw().
- CVE: https://ubuntu.com/security/CVE-2025-22005
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-22005-ipv6-fix-memleak-of-nhc-pcpu-rth-output-in-fib-check-nh-v6-gw.patch
- From: 6.8.0-84.84
- CVE-2025-21997
- Description:
xsk: fix an integer overflow in xp_create_and_assign_umem()
- CVE: https://ubuntu.com/security/CVE-2025-21997
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21997-xsk-fix-an-integer-overflow-in-xp-create-and-assign-umem.patch
- From: 6.8.0-84.84
- CVE-2025-21995
- Description:
drm/sched: Fix fence reference count leak
- CVE: https://ubuntu.com/security/CVE-2025-21995
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21995-drm-sched-fix-fence-reference-count-leak.patch
- From: 6.8.0-84.84
- CVE-2025-21999
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://ubuntu.com/security/CVE-2025-21999
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode.patch
- From: 6.8.0-84.84
- CVE-2025-21999
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://ubuntu.com/security/CVE-2025-21999
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode-kpatch.patch
- From: 6.8.0-84.84
- CVE-2025-21927
- Description:
nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()
- CVE: https://ubuntu.com/security/CVE-2025-21927
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21927-nvme-tcp-fix-potential-memory-corruption-in-nvme-tcp-recv-pdu-6.8.0-52.53.patch
- From: 6.8.0-84.84
- CVE-2025-21969
- Description:
Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd
- CVE: https://ubuntu.com/security/CVE-2025-21969
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21969-bluetooth-l2cap-fix-slab-use-after-free-read-in-l2cap-send-cmd-6.8.0-39.39.patch
- From: 6.8.0-84.84
- CVE-2025-21969
- Description:
Bluetooth: L2CAP: Fix corrupted list in hci_chan_del
- CVE: https://ubuntu.com/security/CVE-2025-21969
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21969-Bluetooth-L2CAP-Fix-corrupted-list-in-hci_chan_del-6.8.0-39.39.patch
- From: 6.8.0-84.84
- CVE-2025-21991
- Description:
x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
- CVE: https://ubuntu.com/security/CVE-2025-21991
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21991-x86-microcode-amd-fix-out-of-bounds-on-systems-with-cpu-less-numa-nodes.patch
- From: 6.8.0-84.84
- CVE-2025-22047
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-22047.patch
- From:
- CVE-2025-21919
- Description:
sched/fair: Fix potential memory corruption in child_cfs_rq_on_list
- CVE: https://ubuntu.com/security/CVE-2025-21919
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21919-sched-fair-Fix-potential-memory-corruption-in-child_cfs_rq_on_list.patch
- From: 6.8.0-84.84
- CVE-2025-21967
- Description:
ksmbd: fix use-after-free in ksmbd_free_work_struct
- CVE: https://ubuntu.com/security/CVE-2025-21967
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21967-smbd-fix-use-after-free-in-ksmbd_free_work_struct-m-52.53.patch
- From: 6.8.0-84.84
- CVE-2025-21967
- Description:
ksmbd: fix use-after-free in ksmbd_free_work_struct
- CVE: https://ubuntu.com/security/CVE-2025-21967
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21967-smbd-fix-use-after-free-in-ksmbd_free_work_struct-m-kpatch.patch
- From: 6.8.0-84.84
- CVE-2025-21955
- Description:
ksmbd: prevent connection release during oplock break notification
- CVE: https://ubuntu.com/security/CVE-2025-21955
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21955-ksmbd-prevent-connection-release-during-oplock-break-notification-6.8.0-52.53.patch
- From: 6.8.0-84.84
- CVE-2025-21955
- Description:
ksmbd: prevent connection release during oplock break notification
- CVE: https://ubuntu.com/security/CVE-2025-21955
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21955-ksmbd-prevent-connection-release-during-oplock-break-notification-kpatch.patch
- From: 6.8.0-84.84
- CVE-2025-21898
- Description:
ftrace: Avoid potential division by zero in function_stat_show()
- CVE: https://ubuntu.com/security/CVE-2025-21898
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21898-ftrace-avoid-potential-division-by-zero-in-function-stat-show.patch
- From: 6.8.0-84.84
- CVE-2025-21878
- Description:
i2c: npcm: disable interrupt enable bit before devm_request_irq
- CVE: https://ubuntu.com/security/CVE-2025-21878
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21878-i2c-npcm-disable-interrupt-enable-bit-before-devm-request-irq.patch
- From: 6.8.0-84.84
- CVE-2025-21877
- Description:
usbnet: gl620a: fix endpoint checking in genelink_bind()
- CVE: https://ubuntu.com/security/CVE-2025-21877
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21877-usbnet-gl620a-fix-endpoint-checking-in-genelink-bind.patch
- From: 6.8.0-84.84
- CVE-2025-21875
- Description:
mptcp: always handle address removal under msk socket lock
- CVE: https://ubuntu.com/security/CVE-2025-21875
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21875-mptcp-always-handle-address-removal-under-msk-socket-lock.patch
- From: 6.8.0-84.84
- CVE-2025-21873
- Description:
scsi: ufs: core: bsg: Fix crash when arpmb command fails
- CVE: https://ubuntu.com/security/CVE-2025-21873
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21873-scsi-ufs-core-bsg-fix-crash-when-arpmb-command-fails.patch
- From: 6.8.0-84.84
- CVE-2025-21892
- Description:
RDMA/mlx5: Fix the recovery flow of the UMR QP
- CVE: https://ubuntu.com/security/CVE-2025-21892
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21892-rdma-mlx5-fix-the-recovery-flow-of-the-umr-qp.patch
- From: 6.8.0-84.84
- CVE-2025-21888
- Description:
RDMA/mlx5: Fix a WARN during dereg_mr for DM type
- CVE: https://ubuntu.com/security/CVE-2025-21888
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21888-rdma-mlx5-fix-a-warn-during-dereg-mr-for-dm-type.patch
- From: 6.8.0-84.84
- CVE-2025-21890
- Description:
idpf: fix checksums set in idpf_rx_rsc()
- CVE: https://ubuntu.com/security/CVE-2025-21890
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21890-idpf-fix-checksums-set-in-idpf-rx-rsc.patch
- From: 6.8.0-84.84
- CVE-2025-21880
- Description:
drm/xe/userptr: fix EFAULT handling
- CVE: https://ubuntu.com/security/CVE-2025-21880
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21880-drm-xe-userptr-fix-efault-handling.patch
- From: 6.8.0-84.84
- CVE-2025-21913
- Description:
x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()
- CVE: https://ubuntu.com/security/CVE-2025-21913
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21913-x86-amd-nb-use-rdmsr-safe-in-amd-get-mmconfig-range.patch
- From: 6.8.0-84.84
- CVE-2025-21935
- Description:
rapidio: add check for rio_add_net() in rio_scan_alloc_net()
- CVE: https://ubuntu.com/security/CVE-2025-21935
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21935-rapidio-add-check-for-rio-add-net-in-rio-scan-alloc-net.patch
- From: 6.8.0-84.84
- CVE-2025-21930
- Description:
wifi: iwlwifi: mvm: don't try to talk to a dead firmware
- CVE: https://ubuntu.com/security/CVE-2025-21930
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21930-wifi-iwlwifi-mvm-don-t-try-to-talk-to-a-dead-firmware.patch
- From: 6.8.0-84.84
- CVE-2025-21904
- Description:
caif_virtio: fix wrong pointer check in cfv_probe()
- CVE: https://ubuntu.com/security/CVE-2025-21904
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21904-caif-virtio-fix-wrong-pointer-check-in-cfv-probe.patch
- From: 6.8.0-84.84
- CVE-2025-21925
- Description:
llc: do not use skb_get() before dev_queue_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-21925
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21925-llc-do-not-use-skb-get-before-dev-queue-xmit.patch
- From: 6.8.0-84.84
- CVE-2025-21903
- Description:
mctp i3c: handle NULL header address
- CVE: https://ubuntu.com/security/CVE-2025-21903
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21903-mctp-i3c-handle-null-header-address.patch
- From: 6.8.0-84.84
- CVE-2025-21918
- Description:
usb: typec: ucsi: Fix NULL pointer access
- CVE: https://ubuntu.com/security/CVE-2025-21918
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21918-usb-typec-ucsi-fix-null-pointer-access.patch
- From: 6.8.0-84.84
- CVE-2025-21917
- Description:
usb: renesas_usbhs: Flush the notify_hotplug_work
- CVE: https://ubuntu.com/security/CVE-2025-21917
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21917-usb-renesas-usbhs-flush-the-notify-hotplug-work.patch
- From: 6.8.0-84.84
- CVE-2025-21914
- Description:
slimbus: messaging: Free transaction ID in delayed interrupt scenario
- CVE: https://ubuntu.com/security/CVE-2025-21914
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21914-slimbus-messaging-free-transaction-id-in-delayed-interrupt-scenario.patch
- From: 6.8.0-84.84
- CVE-2025-21891
- Description:
ipvlan: ensure network headers are in skb linear part
- CVE: https://ubuntu.com/security/CVE-2025-21891
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21891-ipvlan-ensure-network-headers-are-in-skb-linear-part-6.8.0-83.83.patch
- From: 6.8.0-84.84
- CVE-2025-21883
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2025-21883.patch
- From:
- CVE-2025-21885
- Description:
RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers
- CVE: https://ubuntu.com/security/CVE-2025-21885
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21885-rdma-bnxt-re-fix-the-page-details-for-the-srq-created-by-kernel-consumers.patch
- From: 6.8.0-84.84
- CVE-2025-21961
- Description:
eth: bnxt: fix truesize for mb-xdp-pass case
- CVE: https://ubuntu.com/security/CVE-2025-21961
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21961-eth-bnxt-fix-truesize-for-mb-xdp-pass-case-6.8.0-39.39.patch
- From: 6.8.0-84.84
- CVE-2025-21960
- Description:
eth: bnxt: do not update checksum in bnxt_xdp_build_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21960
- Patch: ubuntu-noble/6.8.0-84.84/CVE-2025-21960-eth-bnxt-do-not-update-checksum-in-bnxt-xdp-build-skb-6.8.0-39.39.patch
- From: 6.8.0-84.84
- CVE-2025-37785
- Description:
ext4: fix OOB read when checking dotdot dir
- CVE: https://ubuntu.com/security/CVE-2025-37785
- Patch: ubuntu-noble/6.8.0-85.85/CVE-2025-37785-ext4-fix-oob-read-when-checking-dotdot-dir.patch
- From: 6.8.0-85.85
- CVE-2025-38618
- Description:
vsock: Do not allow binding to VMADDR_PORT_ANY
- CVE: https://ubuntu.com/security/CVE-2025-38618
- Patch: ubuntu-noble/6.8.0-85.85/CVE-2025-38618-vsock-do-not-allow-binding-to-vmaddr-port-any.patch
- From: 6.8.0-85.85
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://ubuntu.com/security/CVE-2025-38477
- Patch: ubuntu-noble/6.8.0-85.85/CVE-2025-38477-net-sched-sch-qfq-fix-race-condition-on-qfq-aggregate.patch
- From: 6.8.0-85.85
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class
- CVE: https://ubuntu.com/security/CVE-2025-38477
- Patch: ubuntu-noble/6.8.0-85.85/CVE-2025-38477-net-sched-sch-qfq-avoid-triggering-might-sleep-in-atomic-context-in-qfq-delete-class.patch
- From: 6.8.0-85.85
- CVE-2025-37756
- Description:
net: tls: explicitly disallow disconnect
- CVE: https://ubuntu.com/security/CVE-2025-37756
- Patch: ubuntu-noble/6.8.0-85.85/CVE-2025-37756-net-tls-explicitly-disallow-disconnect.patch
- From: 6.8.0-85.85
- CVE-2025-38617
- Description:
net/packet: fix a race in packet_set_ring() and packet_notifier()
- CVE: https://ubuntu.com/security/CVE-2025-38617
- Patch: ubuntu-noble/6.8.0-85.85/CVE-2025-38617-net-packet-fix-a-race-in-packet_set_ring-and-packet_notifier.patch
- From: 6.8.0-85.85
- CVE-2025-39682
- Description:
tls: fix handling of zero-length records on the rx_list
- CVE: https://ubuntu.com/security/CVE-2025-39682
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-39682-tls-fix-handling-of-zero-length-records-on-the-rx-list.patch
- From: 6.8.0-86.87
- CVE-2025-22020
- Description:
memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
- CVE: https://ubuntu.com/security/CVE-2025-22020
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22020-memstick-rtsx-usb-ms-fix-slab-use-after-free-in-rtsx-usb-ms-drv-remove.patch
- From: 6.8.0-86.87
- CVE-2025-37937
- Description:
objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds()
- CVE: https://ubuntu.com/security/CVE-2025-37937
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-37937-objtool-media-dib8000-prevent-divide-by-zero-in-dib8000-set-dds.patch
- From: 6.8.0-86.87
- CVE-2025-22058
- Description:
udp: Fix memory accounting leak.
- CVE: https://ubuntu.com/security/CVE-2025-22058
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22058-udp-fix-memory-accounting-leak.patch
- From: 6.8.0-86.87
- CVE-2025-22035
- Description:
tracing: Fix use-after-free in print_graph_function_flags during tracer switching
- CVE: https://ubuntu.com/security/CVE-2025-22035
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22035-tracing-fix-use-after-free-in-print-graph-function-flags-during-tracer-switching.patch
- From: 6.8.0-86.87
- CVE-2025-40114
- Description:
iio: light: Add check for array bounds in veml6075_read_int_time_ms
- CVE: https://ubuntu.com/security/CVE-2025-40114
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-40114-iio-light-add-check-for-array-bounds-in-veml6075-read-int-time-ms.patch
- From: 6.8.0-86.87
- CVE-2025-22068
- Description:
ublk: make sure ubq->canceling is set when queue is frozen
- CVE: https://ubuntu.com/security/CVE-2025-22068
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22068-ublk-make-sure-ubq-canceling-is-set-when-queue-is-frozen.patch
- From: 6.8.0-86.87
- CVE-2025-22065
- Description:
idpf: fix adapter NULL pointer dereference on reboot
- CVE: https://ubuntu.com/security/CVE-2025-22065
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22065-idpf-fix-adapter-null-pointer-dereference-on-reboot.patch
- From: 6.8.0-86.87
- CVE-2025-22065
- Description:
idpf: protect shutdown from reset
- CVE: https://ubuntu.com/security/CVE-2025-22065
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22065-idpf-protect-shutdown-from-reset.patch
- From: 6.8.0-86.87
- CVE-2025-22036
- Description:
exfat: fix random stack corruption after get_block
- CVE: https://ubuntu.com/security/CVE-2025-22036
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22036-exfat-fix-random-stack-corruption-after-get-block.patch
- From: 6.8.0-86.87
- CVE-2025-22018
- Description:
atm: Fix NULL pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-22018
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22018-atm-fix-null-pointer-dereference.patch
- From: 6.8.0-86.87
- CVE-2025-22021
- Description:
netfilter: socket: Lookup orig tuple for IPv6 SNAT
- CVE: https://ubuntu.com/security/CVE-2025-22021
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22021-netfilter-socket-lookup-orig-tuple-for-ipv6-snat.patch
- From: 6.8.0-86.87
- CVE-2024-58092
- Description:
nfsd: fix legacy client tracking initialization
- CVE: https://ubuntu.com/security/CVE-2024-58092
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2024-58092-nfsd-fix-legacy-client-tracking-initialization.patch
- From: 6.8.0-86.87
- CVE-2025-22019
- Description:
bcachefs: bch2_ioctl_subvolume_destroy() fixes
- CVE: https://ubuntu.com/security/CVE-2025-22019
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22019-bcachefs-bch2-ioctl-subvolume-destroy-fixes.patch
- From: 6.8.0-86.87
- CVE-2025-23138
- Description:
watch_queue: fix pipe accounting mismatch
- CVE: https://ubuntu.com/security/CVE-2025-23138
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-23138-watch-queue-fix-pipe-accounting-mismatch.patch
- From: 6.8.0-86.87
- CVE-2025-23136
- Description:
thermal: int340x: Add NULL check for adev
- CVE: https://ubuntu.com/security/CVE-2025-23136
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-23136-thermal-int340x-add-null-check-for-adev.patch
- From: 6.8.0-86.87
- CVE-2025-22095
- Description:
PCI: brcmstb: Fix error path after a call to regulator_bulk_get()
- CVE: https://ubuntu.com/security/CVE-2025-22095
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22095-pci-brcmstb-fix-error-path-after-a-call-to-regulator-bulk-get.patch
- From: 6.8.0-86.87
- CVE-2025-38240
- Description:
drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr
- CVE: https://ubuntu.com/security/CVE-2025-38240
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-38240-drm-mediatek-dp-drm-err-dev-err-in-hpd-path-to-avoid-null-ptr.patch
- From: 6.8.0-86.87
- CVE-2025-22075
- Description:
rtnetlink: Allocate vfinfo size for VF GUIDs when supported
- CVE: https://ubuntu.com/security/CVE-2025-22075
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22075-rtnetlink-allocate-vfinfo-size-for-vf-guids-when-supported.patch
- From: 6.8.0-86.87
- CVE-2023-53034
- Description:
ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans
- CVE: https://ubuntu.com/security/CVE-2023-53034
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2023-53034-ntb-hw-switchtec-fix-shift-out-of-bounds-in-switchtec-ntb-mw-set-trans.patch
- From: 6.8.0-86.87
- CVE-2025-22038
- Description:
ksmbd: validate zero num_subauth before sub_auth is accessed
- CVE: https://ubuntu.com/security/CVE-2025-22038
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22038-ksmbd-validate-zero-num-subauth-before-sub-auth-is-accessed.patch
- From: 6.8.0-86.87
- CVE-2025-22039
- Description:
ksmbd: fix overflow in dacloffset bounds check
- CVE: https://ubuntu.com/security/CVE-2025-22039
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22039-ksmbd-fix-overflow-in-dacloffset-bounds-check.patch
- From: 6.8.0-86.87
- CVE-2025-22041
- Description:
ksmbd: fix use-after-free in ksmbd_sessions_deregister()
- CVE: https://ubuntu.com/security/CVE-2025-22041
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22041-ksmbd-fix-use-after-free-in-ksmbd-sessions-deregister.patch
- From: 6.8.0-86.87
- CVE-2025-22090
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2025-22090.patch
- From:
- CVE-2025-38575
- Description:
ksmbd: use aead_request_free to match aead_request_alloc
- CVE: https://ubuntu.com/security/CVE-2025-38575
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-38575-ksmbd-use-aead-request-free-to-match-aead-request-alloc.patch
- From: 6.8.0-86.87
- CVE-2025-22097
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://ubuntu.com/security/CVE-2025-22097
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error.patch
- From: 6.8.0-86.87
- CVE-2025-22097
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://ubuntu.com/security/CVE-2025-22097
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error-kpatch.patch
- From: 6.8.0-86.87
- CVE-2025-22056
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2025-22056.patch
- From:
- CVE-2025-22055
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://ubuntu.com/security/CVE-2025-22055
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow.patch
- From: 6.8.0-86.87
- CVE-2025-22055
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://ubuntu.com/security/CVE-2025-22055
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow-kpatch.patch
- From: 6.8.0-86.87
- CVE-2025-22040
- Description:
ksmbd: fix session use-after-free in multichannel connection
- CVE: https://ubuntu.com/security/CVE-2025-22040
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22040-ksmbd-fix-session-use-after-free-in-multichannel-connection.patch
- From: 6.8.0-86.87
- CVE-2025-22040
- Description:
ksmbd: fix session use-after-free in multichannel connection
- CVE: https://ubuntu.com/security/CVE-2025-22040
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22040-ksmbd-fix-session-use-after-free-in-multichannel-connection-kpatch-55.patch
- From: 6.8.0-86.87
- CVE-2025-38152
- Description:
remoteproc: core: Clear table_sz when rproc_shutdown
- CVE: https://ubuntu.com/security/CVE-2025-38152
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-38152-remoteproc-core-clear-table-sz-when-rproc-shutdown.patch
- From: 6.8.0-86.87
- CVE-2025-22086
- Description:
RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow
- CVE: https://ubuntu.com/security/CVE-2025-22086
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22086-rdma-mlx5-fix-mlx5-poll-one-cur-qp-update-flow.patch
- From: 6.8.0-86.87
- CVE-2025-22083
- Description:
vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint
- CVE: https://ubuntu.com/security/CVE-2025-22083
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22083-vhost-scsi-fix-handling-of-multiple-calls-to-vhost-scsi-set-endpoint.patch
- From: 6.8.0-86.87
- CVE-2025-22081
- Description:
fs/ntfs3: Fix a couple integer overflows on 32bit systems
- CVE: https://ubuntu.com/security/CVE-2025-22081
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22081-fs-ntfs3-fix-a-couple-integer-overflows-on-32bit-systems.patch
- From: 6.8.0-86.87
- CVE-2025-22080
- Description:
fs/ntfs3: Prevent integer overflow in hdr_first_de()
- CVE: https://ubuntu.com/security/CVE-2025-22080
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22080-fs-ntfs3-prevent-integer-overflow-in-hdr-first-de.patch
- From: 6.8.0-86.87
- CVE-2025-22079
- Description:
ocfs2: validate l_tree_depth to avoid out-of-bounds access
- CVE: https://ubuntu.com/security/CVE-2025-22079
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22079-ocfs2-validate-l-tree-depth-to-avoid-out-of-bounds-access.patch
- From: 6.8.0-86.87
- CVE-2025-22066
- Description:
ASoC: imx-card: Add NULL check in imx_card_probe()
- CVE: https://ubuntu.com/security/CVE-2025-22066
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22066-asoc-imx-card-add-null-check-in-imx-card-probe.patch
- From: 6.8.0-86.87
- CVE-2025-22064
- Description:
netfilter: nf_tables: don't unregister hook when table is dormant
- CVE: https://ubuntu.com/security/CVE-2025-22064
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22064-netfilter-nf-tables-don-t-unregister-hook-when-table-is-dormant.patch
- From: 6.8.0-86.87
- CVE-2025-22063
- Description:
netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets
- CVE: https://ubuntu.com/security/CVE-2025-22063
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22063-netlabel-fix-null-pointer-exception-caused-by-calipso-on-ipv4-sockets.patch
- From: 6.8.0-86.87
- CVE-2025-38637
- Description:
net_sched: skbprio: Remove overly strict queue assertions
- CVE: https://ubuntu.com/security/CVE-2025-38637
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-38637-net-sched-skbprio-remove-overly-strict-queue-assertions.patch
- From: 6.8.0-86.87
- CVE-2025-22057
- Description:
net: decrease cached dst counters in dst_release
- CVE: https://ubuntu.com/security/CVE-2025-22057
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22057-net-decrease-cached-dst-counters-in-dst-release.patch
- From: 6.8.0-86.87
- CVE-2025-22054
- Description:
arcnet: Add NULL check in com20020pci_probe()
- CVE: https://ubuntu.com/security/CVE-2025-22054
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22054-arcnet-add-null-check-in-com20020pci-probe.patch
- From: 6.8.0-86.87
- CVE-2025-22053
- Description:
net: ibmveth: make veth_pool_store stop hanging
- CVE: https://ubuntu.com/security/CVE-2025-22053
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22053-net-ibmveth-make-veth-pool-store-stop-hanging.patch
- From: 6.8.0-86.87
- CVE-2025-22045
- Description:
x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs
- CVE: https://ubuntu.com/security/CVE-2025-22045
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22045-x86-mm-fix-flush-tlb-range-when-used-for-zapping-normal-pmds.patch
- From: 6.8.0-86.87
- CVE-2025-22044
- Description:
acpi: nfit: fix narrowing conversion in acpi_nfit_ctl
- CVE: https://ubuntu.com/security/CVE-2025-22044
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22044-acpi-nfit-fix-narrowing-conversion-in-acpi-nfit-ctl.patch
- From: 6.8.0-86.87
- CVE-2025-22042
- Description:
ksmbd: add bounds check for create lease context
- CVE: https://ubuntu.com/security/CVE-2025-22042
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22042-ksmbd-add-bounds-check-for-create-lease-context.patch
- From: 6.8.0-86.87
- CVE-2025-22033
- Description:
arm64: Don't call NULL in do_compat_alignment_fixup()
- CVE: https://ubuntu.com/security/CVE-2025-22033
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22033-arm64-don-t-call-null-in-do-compat-alignment-fixup.patch
- From: 6.8.0-86.87
- CVE-2025-22027
- Description:
media: streamzap: fix race between device disconnection and urb callback
- CVE: https://ubuntu.com/security/CVE-2025-22027
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22027-media-streamzap-fix-race-between-device-disconnection-and-urb-callback.patch
- From: 6.8.0-86.87
- CVE-2025-22025
- Description:
nfsd: put dl_stid if fail to queue dl_recall
- CVE: https://ubuntu.com/security/CVE-2025-22025
- Patch: ubuntu-noble/6.8.0-86.87/CVE-2025-22025-nfsd-put-dl-stid-if-fail-to-queue-dl-recall.patch
- From: 6.8.0-86.87
- CVE-2025-38118
- Description:
Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete
- CVE: https://ubuntu.com/security/CVE-2025-38118
- Patch: ubuntu-noble/6.8.0-87.88/CVE-2025-38118-bluetooth-mgmt-fix-uaf-on-mgmt-remove-adv-monitor-complete.patch
- From: 6.8.0-87.88
- CVE-2025-38118
- Description:
Bluetooth: MGMT: Fix sparse errors
- CVE: https://ubuntu.com/security/CVE-2025-38118
- Patch: ubuntu-noble/6.8.0-87.88/CVE-2025-38118-bluetooth-mgmt-fix-sparse-errors.patch
- From: 6.8.0-87.88
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://ubuntu.com/security/CVE-2025-38352
- Patch: ubuntu-noble/6.8.0-87.88/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle-posix-cpu-timers-and-posix-cpu-timer-del.patch
- From: 6.8.0-87.88
- CVE-2025-37838
- Description:
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2025-37838
- Patch: ubuntu-noble/6.8.0-87.88/CVE-2025-37838-hsi-ssi-protocol-fix-use-after-free-vulnerability-in-ssi-protocol-driver-due-to-race-condition.patch
- From: 6.8.0-87.88
- CVE-2025-38616
- Description:
tls: handle data disappearing from under the TLS ULP
- CVE: https://ubuntu.com/security/CVE-2025-38616
- Patch: ubuntu-noble/6.8.0-88.89/CVE-2025-38616-tls-handle-data-disappearing-from-under-the-tls-ulp.patch
- From: 6.8.0-88.89
- CVE-2025-38678
- Description:
netfilter: nf_tables: reject duplicate device on updates
- CVE: https://ubuntu.com/security/CVE-2025-38678
- Patch: ubuntu-noble/6.8.0-88.89/CVE-2025-38678-netfilter-nf-tables-reject-duplicate-device-on-updates.patch
- From: 6.8.0-88.89
- CVE-2025-38227
- Description:
media: vidtv: Terminating the subsequent process of initialization failure
- CVE: https://ubuntu.com/security/CVE-2025-38227
- Patch: ubuntu-noble/6.8.0-88.89/CVE-2025-38227-media-vidtv-terminating-the-subsequent-process-of-initialization-failure.patch
- From: 6.8.0-88.89
- CVE-2025-21729
- Description:
wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion
- CVE: https://ubuntu.com/security/CVE-2025-21729
- Patch: ubuntu-noble/6.8.0-88.89/CVE-2025-21729-wifi-rtw89-fix-race-between-cancel-hw-scan-and-hw-scan-completion.patch
- From: 6.8.0-88.89
- CVE-2025-40018
- Description:
ipvs: Defer ip_vs_ftp unregister during netns cleanup
- CVE: https://ubuntu.com/security/CVE-2025-40018
- Patch: ubuntu-noble/6.8.0-90.91/CVE-2025-40018-ipvs-defer-ip-vs-ftp-unregister-during-netns-cleanup.patch
- From: 6.8.0-90.91
- CVE-2025-37958
- Description:
mm/huge_memory: fix dereferencing invalid pmd migration entry
- CVE: https://ubuntu.com/security/CVE-2025-37958
- Patch: ubuntu-noble/6.8.0-90.91/CVE-2025-37958-mm-huge-memory-fix-dereferencing-invalid-pmd-migration-entry.patch
- From: 6.8.0-90.91
- CVE-2025-39993
- Description:
media: rc: fix races with imon_disconnect()
- CVE: https://ubuntu.com/security/CVE-2025-39993
- Patch: ubuntu-noble/6.8.0-90.91/CVE-2025-39993-media-rc-fix-races-with-imon-disconnect.patch
- From: 6.8.0-90.91
- CVE-2025-39698
- Description:
io_uring/futex: ensure io_futex_wait() cleans up properly on failure
- CVE: https://ubuntu.com/security/CVE-2025-39698
- Patch: ubuntu-noble/6.8.0-94.96/CVE-2025-39698-io-uring-futex-ensure-io-futex-wait-cleans-up-properly-on-failure.patch
- From: 6.8.0-94.96
- CVE-2025-38561
- Description:
ksmbd: fix Preauh_HashValue race condition
- CVE: https://ubuntu.com/security/CVE-2025-38561
- Patch: ubuntu-noble/6.8.0-94.96/CVE-2025-38561-ksmbd-fix-preauh-hashvalue-race-condition.patch
- From: 6.8.0-94.96
- CVE-2025-40019
- Description:
crypto: essiv - Check ssize for decryption and in-place encryption
- CVE: https://ubuntu.com/security/CVE-2025-40019
- Patch: ubuntu-noble/6.8.0-94.96/CVE-2025-40019-crypto-essiv-check-ssize-for-decryption-and-in-place-encryption.patch
- From: 6.8.0-94.96
- CVE-2025-22037
- Description:
ksmbd: mark SMB2_SESSION_EXPIRED to session when destroying previous session
- CVE: https://ubuntu.com/security/CVE-2025-22037
- Patch: ubuntu-noble/6.8.0-101.101/CVE-2025-22037-ksmbd-mark-smb2-session-expired-to-session-when-destroying-previous-session.patch
- From: 6.8.0-101.101
- CVE-2025-22037
- Description:
ksmbd: mark SMB2_SESSION_EXPIRED to session when destroying previous session
- CVE: https://ubuntu.com/security/CVE-2025-22037
- Patch: ubuntu-noble/6.8.0-101.101/CVE-2025-22037-ksmbd-mark-smb2-session-expired-to-session-when-destroying-previous-session-header-optimization.patch
- From: 6.8.0-101.101
- CVE-2025-22037
- Description:
ksmbd: fix race condition between destroy_previous_session() and smb2 operations()
- CVE: https://ubuntu.com/security/CVE-2025-22037
- Patch: ubuntu-noble/6.8.0-101.101/CVE-2025-22037-ksmbd-fix-race-condition-between-destroy-previous-session-and-smb2-operations.patch
- From: 6.8.0-101.101
- CVE-2025-22037
- Description:
ksmbd: fix null pointer dereference in alloc_preauth_hash()
- CVE: https://ubuntu.com/security/CVE-2025-22037
- Patch: ubuntu-noble/6.8.0-101.101/CVE-2025-22037-ksmbd-fix-null-pointer-dereference-in-alloc-preauth-hash.patch
- From: 6.8.0-101.101
- CVE-2025-22037
- Description:
ksmbd: fix null pointer dereference in alloc_preauth_hash()
- CVE: https://ubuntu.com/security/CVE-2025-22037
- Patch: ubuntu-noble/6.8.0-101.101/CVE-2025-22037-ksmbd-fix-null-pointer-dereference-in-alloc-preauth-hash-kpatch.patch
- From: 6.8.0-101.101
- CVE-2025-37899
- Description:
ksmbd: fix use-after-free in session logoff
- CVE: https://ubuntu.com/security/CVE-2025-37899
- Patch: ubuntu-noble/6.8.0-101.101/CVE-2025-37899-ksmbd-fix-use-after-free-in-session-logoff.patch
- From: 6.8.0-101.101
- CVE-2025-37757
- Description:
tipc: fix memory leak in tipc_link_xmit
- CVE: https://ubuntu.com/security/CVE-2025-37757
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37757-tipc-fix-memory-leak-in-tipc-link-xmit.patch
- From: 6.8.0-100.100
- CVE-2025-37749
- Description:
net: ppp: Add bound checking for skb data on ppp_sync_txmung
- CVE: https://ubuntu.com/security/CVE-2025-37749
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37749-net-ppp-add-bound-checking-for-skb-data-on-ppp-sync-txmung.patch
- From: 6.8.0-100.100
- CVE-2025-37859
- Description:
page_pool: avoid infinite loop to schedule delayed worker
- CVE: https://ubuntu.com/security/CVE-2025-37859
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37859-page-pool-avoid-infinite-loop-to-schedule-delayed-worker.patch
- From: 6.8.0-100.100
- CVE-2025-37943
- Description:
wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi
- CVE: https://ubuntu.com/security/CVE-2025-37943
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37943-wifi-ath12k-fix-invalid-data-access-in-ath12k-dp-rx-h-undecap-nwifi.patch
- From: 6.8.0-100.100
- CVE-2025-37854
- Description:
drm/amdkfd: Fix mode1 reset crash issue
- CVE: https://ubuntu.com/security/CVE-2025-37854
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37854-drm-amdkfd-fix-mode1-reset-crash-issue.patch
- From: 6.8.0-100.100
- CVE-2025-23159
- Description:
media: venus: hfi: add a check to handle OOB in sfr region
- CVE: https://ubuntu.com/security/CVE-2025-23159
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-23159-media-venus-hfi-add-a-check-to-handle-oob-in-sfr-region.patch
- From: 6.8.0-100.100
- CVE-2025-23158
- Description:
media: venus: hfi: add check to handle incorrect queue size
- CVE: https://ubuntu.com/security/CVE-2025-23158
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-23158-media-venus-hfi-add-check-to-handle-incorrect-queue-size.patch
- From: 6.8.0-100.100
- CVE-2025-37849
- Description:
KVM: arm64: Tear down vGIC on failed vCPU creation
- CVE: https://ubuntu.com/security/CVE-2025-37849
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37849-kvm-arm64-tear-down-vgic-on-failed-vcpu-creation.patch
- From: 6.8.0-100.100
- CVE-2025-37840
- Description:
mtd: rawnand: brcmnand: fix PM resume warning
- CVE: https://ubuntu.com/security/CVE-2025-37840
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37840-mtd-rawnand-brcmnand-fix-pm-resume-warning.patch
- From: 6.8.0-100.100
- CVE-2025-23157
- Description:
media: venus: hfi_parser: add check to avoid out of bound access
- CVE: https://ubuntu.com/security/CVE-2025-23157
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-23157-media-venus-hfi-parser-add-check-to-avoid-out-of-bound-access.patch
- From: 6.8.0-100.100
- CVE-2025-23156
- Description:
media: venus: hfi_parser: refactor hfi packet parsing logic
- CVE: https://ubuntu.com/security/CVE-2025-23156
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-23156-media-venus-hfi-parser-refactor-hfi-packet-parsing-logic.patch
- From: 6.8.0-100.100
- CVE-2025-23151
- Description:
bus: mhi: host: Fix race between unprepare and queue_buf
- CVE: https://ubuntu.com/security/CVE-2025-23151
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-23151-bus-mhi-host-fix-race-between-unprepare-and-queue-buf.patch
- From: 6.8.0-100.100
- CVE-2025-23150
- Description:
ext4: fix off-by-one error in do_split
- CVE: https://ubuntu.com/security/CVE-2025-23150
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-23150-ext4-fix-off-by-one-error-in-do-split.patch
- From: 6.8.0-100.100
- CVE-2025-37839
- Description:
jbd2: remove wrong sb->s_sequence check
- CVE: https://ubuntu.com/security/CVE-2025-37839
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37839-jbd2-remove-wrong-sb-s-sequence-check.patch
- From: 6.8.0-100.100
- CVE-2025-37892
- Description:
mtd: inftlcore: Add error check for inftl_read_oob()
- CVE: https://ubuntu.com/security/CVE-2025-37892
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37892-mtd-inftlcore-add-error-check-for-inftl-read-oob.patch
- From: 6.8.0-100.100
- CVE-2025-37940
- Description:
ftrace: Add cond_resched() to ftrace_graph_set_hash()
- CVE: https://ubuntu.com/security/CVE-2025-37940
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37940-ftrace-add-cond-resched-to-ftrace-graph-set-hash.patch
- From: 6.8.0-100.100
- CVE-2025-37796
- Description:
wifi: at76c50x: fix use after free access in at76_disconnect
- CVE: https://ubuntu.com/security/CVE-2025-37796
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37796-wifi-at76c50x-fix-use-after-free-access-in-at76-disconnect.patch
- From: 6.8.0-100.100
- CVE-2025-37982
- Description:
wifi: wl1251: fix memory leak in wl1251_tx_work
- CVE: https://ubuntu.com/security/CVE-2025-37982
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37982-wifi-wl1251-fix-memory-leak-in-wl1251-tx-work.patch
- From: 6.8.0-100.100
- CVE-2025-37789
- Description:
net: openvswitch: fix nested key length validation in the set() action
- CVE: https://ubuntu.com/security/CVE-2025-37789
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37789-net-openvswitch-fix-nested-key-length-validation-in-the-set-action.patch
- From: 6.8.0-100.100
- CVE-2025-37864
- Description:
net: dsa: clean up FDB, MDB, VLAN entries on unbind
- CVE: https://ubuntu.com/security/CVE-2025-37864
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37864-net-dsa-clean-up-FDB-MDB-VLAN-entries-on-unbind.patch
- From: 6.8.0-100.100
- CVE-2025-37786
- Description:
net: dsa: free routing table on probe failure
- CVE: https://ubuntu.com/security/CVE-2025-37786
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37786-net-dsa-free-routing-table-on-probe-failure.patch
- From: 6.8.0-100.100
- CVE-2025-37786
- Description:
net: dsa: free routing table on probe failure
- CVE: https://ubuntu.com/security/CVE-2025-37786
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37786-net-dsa-free-routing-table-on-probe-failure-kpatch.patch
- From: 6.8.0-100.100
- CVE-2025-37780
- Description:
isofs: Prevent the use of too small fid
- CVE: https://ubuntu.com/security/CVE-2025-37780
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37780-isofs-prevent-the-use-of-too-small-fid.patch
- From: 6.8.0-100.100
- CVE-2025-37863
- Description:
ovl: don't allow datadir only
- CVE: https://ubuntu.com/security/CVE-2025-37863
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37863-ovl-don-t-allow-datadir-only.patch
- From: 6.8.0-100.100
- CVE-2025-37846
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-37846.patch
- From:
- CVE-2025-37831
- Description:
cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate()
- CVE: https://ubuntu.com/security/CVE-2025-37831
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37831-cpufreq-apple-soc-fix-null-ptr-deref-in-apple-soc-cpufreq-get-rate.patch
- From: 6.8.0-100.100
- CVE-2025-37989
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2025-37989.patch
- From:
- CVE-2025-37823
- Description:
net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
- CVE: https://ubuntu.com/security/CVE-2025-37823
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37823-net-sched-hfsc-fix-a-potential-uaf-in-hfsc-dequeue-too.patch
- From: 6.8.0-100.100
- CVE-2025-37817
- Description:
mcb: fix a double free bug in chameleon_parse_gdd()
- CVE: https://ubuntu.com/security/CVE-2025-37817
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37817-mcb-fix-a-double-free-bug-in-chameleon-parse-gdd.patch
- From: 6.8.0-100.100
- CVE-2025-37885
- Description:
KVM: x86: Reset IRTE to host control if *new* route isn't postable
- CVE: https://ubuntu.com/security/CVE-2025-37885
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37885-kvm-x86-reset-irte-to-host-control-if-new-route-isn-t-postable.patch
- From: 6.8.0-100.100
- CVE-2025-37985
- Description:
USB: wdm: close race between wdm_open and wdm_wwan_port_stop
- CVE: https://ubuntu.com/security/CVE-2025-37985
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37985-usb-wdm-close-race-between-wdm-open-and-wdm-wwan-port-stop.patch
- From: 6.8.0-100.100
- CVE-2025-37983
- Description:
qibfs: fix _another_ leak
- CVE: https://ubuntu.com/security/CVE-2025-37983
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37983-qibfs-fix-another-leak.patch
- From: 6.8.0-100.100
- CVE-2025-37803
- Description:
udmabuf: fix a buf size overflow issue during udmabuf creation
- CVE: https://ubuntu.com/security/CVE-2025-37803
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37803-udmabuf-fix-a-buf-size-overflow-issue-during-udmabuf-creation.patch
- From: 6.8.0-100.100
- CVE-2025-37878
- Description:
perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init
- CVE: https://ubuntu.com/security/CVE-2025-37878
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37878-perf-core-fix-warn-on-ctx-in-free-event-for-partial-init.patch
- From: 6.8.0-100.100
- CVE-2025-37799
- Description:
vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp
- CVE: https://ubuntu.com/security/CVE-2025-37799
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37799-vmxnet3-fix-malformed-packet-sizing-in-vmxnet3-process-xdp.patch
- From: 6.8.0-100.100
- CVE-2025-37869
- Description:
drm/xe: Use local fence in error path of xe_migrate_clear
- CVE: https://ubuntu.com/security/CVE-2025-37869
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37869-drm-xe-use-local-fence-in-error-path-of-xe-migrate-clear.patch
- From: 6.8.0-100.100
- CVE-2025-37944
- Description:
wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process
- CVE: https://ubuntu.com/security/CVE-2025-37944
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37944-wifi-ath12k-fix-invalid-entry-fetch-in-ath12k-dp-mon-srng-process.patch
- From: 6.8.0-100.100
- CVE-2025-37930
- Description:
drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()
- CVE: https://ubuntu.com/security/CVE-2025-37930
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37930-drm-nouveau-fix-warn-on-in-nouveau-fence-context-kill.patch
- From: 6.8.0-100.100
- CVE-2025-37936
- Description:
perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value.
- CVE: https://ubuntu.com/security/CVE-2025-37936
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37936-perf-x86-intel-kvm-mask-pebs-enable-loaded-for-guest-with-vcpu-s-value.patch
- From: 6.8.0-100.100
- CVE-2025-37901
- Description:
irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs
- CVE: https://ubuntu.com/security/CVE-2025-37901
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37901-irqchip-qcom-mpm-prevent-crash-when-trying-to-handle-non-wake-gpios.patch
- From: 6.8.0-100.100
- CVE-2025-37990
- Description:
wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()
- CVE: https://ubuntu.com/security/CVE-2025-37990
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37990-wifi-brcm80211-fmac-add-error-handling-for-brcmf-usb-dl-writeimage.patch
- From: 6.8.0-100.100
- CVE-2025-37928
- Description:
dm-bufio: don't schedule in atomic context
- CVE: https://ubuntu.com/security/CVE-2025-37928
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37928-dm-bufio-don-t-schedule-in-atomic-context.patch
- From: 6.8.0-100.100
- CVE-2025-37897
- Description:
wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release
- CVE: https://ubuntu.com/security/CVE-2025-37897
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37897-wifi-plfxlc-remove-erroneous-assert-in-plfxlc-mac-release.patch
- From: 6.8.0-100.100
- CVE-2025-37921
- Description:
vxlan: vnifilter: Fix unlocked deletion of default FDB entry
- CVE: https://ubuntu.com/security/CVE-2025-37921
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37921-vxlan-vnifilter-fix-unlocked-deletion-of-default-fdb-entry.patch
- From: 6.8.0-100.100
- CVE-2025-37917
- Description:
net: ethernet: mtk-star-emac: fix spinlock recursion issues on rx/tx poll
- CVE: https://ubuntu.com/security/CVE-2025-37917
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37917-net-ethernet-mtk-star-emac-fix-spinlock-recursion-issues-on-rx-tx-poll.patch
- From: 6.8.0-100.100
- CVE-2025-37913
- Description:
net_sched: qfq: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37913
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37913-net-sched-qfq-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 6.8.0-100.100
- CVE-2025-37935
- Description:
net: ethernet: mtk_eth_soc: fix SER panic with 4GB+ RAM
- CVE: https://ubuntu.com/security/CVE-2025-37935
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37935-net-ethernet-mtk-eth-soc-fix-ser-panic-with-4gb-ram.patch
- From: 6.8.0-100.100
- CVE-2025-37933
- Description:
octeon_ep: Fix host hang issue during device reboot
- CVE: https://ubuntu.com/security/CVE-2025-37933
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37933-octeon-ep-fix-host-hang-issue-during-device-reboot.patch
- From: 6.8.0-100.100
- CVE-2025-37905
- Description:
firmware: arm_scmi: Balance device refcount when destroying devices
- CVE: https://ubuntu.com/security/CVE-2025-37905
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37905-firmware-arm-scmi-balance-device-refcount-when-destroying-devices.patch
- From: 6.8.0-100.100
- CVE-2025-37900
- Description:
iommu: Fix two issues in iommu_copy_struct_from_user()
- CVE: https://ubuntu.com/security/CVE-2025-37900
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37900-iommu-fix-two-issues-in-iommu-copy-struct-from-user.patch
- From: 6.8.0-100.100
- CVE-2025-37973
- Description:
wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation
- CVE: https://ubuntu.com/security/CVE-2025-37973
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37973-wifi-cfg80211-fix-out-of-bounds-access-during-multi-link-element-defragmentation.patch
- From: 6.8.0-100.100
- CVE-2025-37952
- Description:
ksmbd: Fix UAF in __close_file_table_ids
- CVE: https://ubuntu.com/security/CVE-2025-37952
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37952-ksmbd-fix-uaf-in-close-file-table-ids.patch
- From: 6.8.0-100.100
- CVE-2025-37998
- Description:
openvswitch: Fix unsafe attribute parsing in output_userspace()
- CVE: https://ubuntu.com/security/CVE-2025-37998
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37998-openvswitch-fix-unsafe-attribute-parsing-in-output-userspace.patch
- From: 6.8.0-100.100
- CVE-2025-37961
- Description:
ipvs: fix uninit-value for saddr in do_output_route4
- CVE: https://ubuntu.com/security/CVE-2025-37961
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37961-ipvs-fix-uninit-value-for-saddr-in-do-output-route4.patch
- From: 6.8.0-100.100
- CVE-2025-37959
- Description:
bpf: Scrub packet on bpf_redirect_peer
- CVE: https://ubuntu.com/security/CVE-2025-37959
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37959-bpf-scrub-packet-on-bpf-redirect-peer.patch
- From: 6.8.0-100.100
- CVE-2025-37972
- Description:
Input: mtk-pmic-keys - fix possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-37972
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37972-input-mtk-pmic-keys-fix-possible-null-pointer-dereference.patch
- From: 6.8.0-100.100
- CVE-2025-37970
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo
- CVE: https://ubuntu.com/security/CVE-2025-37970
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37970-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-fifo.patch
- From: 6.8.0-100.100
- CVE-2025-37969
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo
- CVE: https://ubuntu.com/security/CVE-2025-37969
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37969-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-tagged-fifo.patch
- From: 6.8.0-100.100
- CVE-2025-37951
- Description:
drm/v3d: Add job to pending list if the reset was skipped
- CVE: https://ubuntu.com/security/CVE-2025-37951
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37951-drm-v3d-add-job-to-pending-list-if-the-reset-was-skipped.patch
- From: 6.8.0-100.100
- CVE-2025-37995
- Description:
module: ensure that kobject_put() is safe for module type kobjects
- CVE: https://ubuntu.com/security/CVE-2025-37995
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37995-module-ensure-that-kobject-put-is-safe-for-module-type-kobjects.patch
- From: 6.8.0-100.100
- CVE-2025-37957
- Description:
KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception
- CVE: https://ubuntu.com/security/CVE-2025-37957
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37957-kvm-svm-forcibly-leave-smm-mode-on-shutdown-interception.patch
- From: 6.8.0-100.100
- CVE-2025-38024
- Description:
RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug
- CVE: https://ubuntu.com/security/CVE-2025-38024
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38024-rdma-rxe-fix-slab-use-after-free-read-in-rxe-queue-cleanup-bug.patch
- From: 6.8.0-100.100
- CVE-2025-38007
- Description:
HID: uclogic: Add NULL check in uclogic_input_configured()
- CVE: https://ubuntu.com/security/CVE-2025-38007
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38007-hid-uclogic-add-null-check-in-uclogic-input-configured.patch
- From: 6.8.0-100.100
- CVE-2025-38020
- Description:
net/mlx5e: Disable MACsec offload for uplink representor profile
- CVE: https://ubuntu.com/security/CVE-2025-38020
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38020-net-mlx5e-disable-macsec-offload-for-uplink-representor-profile.patch
- From: 6.8.0-100.100
- CVE-2025-38095
- Description:
dma-buf: insert memory barrier before updating num_fences
- CVE: https://ubuntu.com/security/CVE-2025-38095
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38095-dma-buf-insert-memory-barrier-before-updating-num-fences.patch
- From: 6.8.0-100.100
- CVE-2025-38009
- Description:
wifi: mt76: disable napi on driver removal
- CVE: https://ubuntu.com/security/CVE-2025-38009
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38009-wifi-mt76-disable-napi-on-driver-removal.patch
- From: 6.8.0-100.100
- CVE-2025-37968
- Description:
iio: light: opt3001: fix deadlock due to concurrent flag access
- CVE: https://ubuntu.com/security/CVE-2025-37968
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-37968-iio-light-opt3001-fix-deadlock-due-to-concurrent-flag-access.patch
- From: 6.8.0-100.100
- CVE-2025-38075
- Description:
scsi: target: iscsi: Fix timeout on deleted connection
- CVE: https://ubuntu.com/security/CVE-2025-38075
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38075-scsi-target-iscsi-fix-timeout-on-deleted-connection.patch
- From: 6.8.0-100.100
- CVE-2025-38048
- Description:
virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN
- CVE: https://ubuntu.com/security/CVE-2025-38048
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38048-virtio-ring-fix-data-race-by-tagging-event-triggered-as-racy-for-kcsan.patch
- From: 6.8.0-100.100
- CVE-2025-38074
- Description:
vhost-scsi: protect vq->log_used with vq->mutex
- CVE: https://ubuntu.com/security/CVE-2025-38074
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38074-vhost-scsi-protect-vq-log-used-with-vq-mutex.patch
- From: 6.8.0-100.100
- CVE-2025-38081
- Description:
spi-rockchip: Fix register out of bounds access
- CVE: https://ubuntu.com/security/CVE-2025-38081
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38081-spi-rockchip-fix-register-out-of-bounds-access.patch
- From: 6.8.0-100.100
- CVE-2025-38072
- Description:
libnvdimm/labels: Fix divide error in nd_label_data_init()
- CVE: https://ubuntu.com/security/CVE-2025-38072
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38072-libnvdimm-labels-fix-divide-error-in-nd-label-data-init.patch
- From: 6.8.0-100.100
- CVE-2025-38045
- Description:
wifi: iwlwifi: fix debug actions order
- CVE: https://ubuntu.com/security/CVE-2025-38045
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38045-wifi-iwlwifi-fix-debug-actions-order.patch
- From: 6.8.0-100.100
- CVE-2025-38066
- Description:
dm cache: prevent BUG_ON by blocking retries on failed device resumes
- CVE: https://ubuntu.com/security/CVE-2025-38066
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38066-dm-cache-prevent-bug-on-by-blocking-retries-on-failed-device-resumes.patch
- From: 6.8.0-100.100
- CVE-2025-38065
- Description:
Affects only 32bit systems
- CVE:
- Patch: skipped/CVE-2025-38065.patch
- From:
- CVE-2025-38044
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-38044.patch
- From:
- CVE-2025-38043
- Description:
Patch targets ARM architecture, which this distro does not support.
- CVE:
- Patch: skipped/CVE-2025-38043.patch
- From:
- CVE-2025-38063
- Description:
dm: fix unconditional IO throttle caused by REQ_PREFLUSH
- CVE: https://ubuntu.com/security/CVE-2025-38063
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38063-dm-fix-unconditional-io-throttle-caused-by-req-preflush.patch
- From: 6.8.0-100.100
- CVE-2025-38061
- Description:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
- CVE: https://ubuntu.com/security/CVE-2025-38061
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38061-net-pktgen-fix-access-outside-of-user-given-buffer-in-pktgen-thread-write.patch
- From: 6.8.0-100.100
- CVE-2025-38039
- Description:
net/mlx5e: Avoid WARN_ON when configuring MQPRIO with HTB offload enabled
- CVE: https://ubuntu.com/security/CVE-2025-38039
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38039-net-mlx5e-avoid-warn-on-when-configuring-mqprio-with-htb-offload-enabled.patch
- From: 6.8.0-100.100
- CVE-2025-38037
- Description:
vxlan: Annotate FDB data races
- CVE: https://ubuntu.com/security/CVE-2025-38037
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38037-vxlan-annotate-fdb-data-races.patch
- From: 6.8.0-100.100
- CVE-2025-38035
- Description:
nvmet-tcp: don't restore null sk_state_change
- CVE: https://ubuntu.com/security/CVE-2025-38035
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38035-nvmet-tcp-don-t-restore-null-sk-state-change.patch
- From: 6.8.0-100.100
- CVE-2025-38079
- Description:
crypto: algif_hash - fix double free in hash_accept
- CVE: https://ubuntu.com/security/CVE-2025-38079
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38079-crypto-algif-hash-fix-double-free-in-hash-accept.patch
- From: 6.8.0-100.100
- CVE-2025-38078
- Description:
ALSA: pcm: Fix race of buffer access at PCM OSS layer
- CVE: https://ubuntu.com/security/CVE-2025-38078
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38078-alsa-pcm-fix-race-of-buffer-access-at-pcm-oss-layer.patch
- From: 6.8.0-100.100
- CVE-2025-38077
- Description:
platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()
- CVE: https://ubuntu.com/security/CVE-2025-38077
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38077-platform-x86-dell-wmi-sysman-avoid-buffer-overflow-in-current-password-store.patch
- From: 6.8.0-100.100
- CVE-2025-38051
- Description:
smb: client: Fix use-after-free in cifs_fill_dirent
- CVE: https://ubuntu.com/security/CVE-2025-38051
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38051-smb-client-fix-use-after-free-in-cifs-fill-dirent.patch
- From: 6.8.0-100.100
- CVE-2025-38236
- Description:
Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem..
- CVE:
- Patch: skipped/CVE-2025-38236.patch
- From:
- CVE-2025-38265
- Description:
serial: jsm: fix NPE during jsm_uart_port_init
- CVE: https://ubuntu.com/security/CVE-2025-38265
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38265-serial-jsm-fix-npe-during-jsm-uart-port-init.patch
- From: 6.8.0-100.100
- CVE-2025-38170
- Description:
arm64/fpsimd: Discard stale CPU state when handling SME traps
- CVE: https://ubuntu.com/security/CVE-2025-38170
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38170-arm64-fpsimd-discard-stale-cpu-state-when-handling-sme-traps.patch
- From: 6.8.0-100.100
- CVE-2025-38295
- Description:
perf/amlogic: Replace smp_processor_id() with raw_smp_processor_id() in meson_ddr_pmu_create()
- CVE: https://ubuntu.com/security/CVE-2025-38295
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38295-perf-amlogic-replace-smp-processor-id-with-raw-smp-processor-id-in-meson-ddr-pmu-create.patch
- From: 6.8.0-100.100
- CVE-2025-38293
- Description:
wifi: ath11k: fix node corruption in ar->arvifs list
- CVE: https://ubuntu.com/security/CVE-2025-38293
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38293-wifi-ath11k-fix-node-corruption-in-ar-arvifs-list.patch
- From: 6.8.0-100.100
- CVE-2025-38290
- Description:
wifi: ath12k: fix node corruption in ar->arvifs list
- CVE: https://ubuntu.com/security/CVE-2025-38290
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38290-wifi-ath12k-fix-node-corruption-in-ar-arvifs-list.patch
- From: 6.8.0-100.100
- CVE-2025-38160
- Description:
clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()
- CVE: https://ubuntu.com/security/CVE-2025-38160
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38160-clk-bcm-rpi-add-null-check-in-raspberrypi-clk-register.patch
- From: 6.8.0-100.100
- CVE-2025-38286
- Description:
pinctrl: at91: Fix possible out-of-boundary access
- CVE: https://ubuntu.com/security/CVE-2025-38286
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38286-pinctrl-at91-fix-possible-out-of-boundary-access.patch
- From: 6.8.0-100.100
- CVE-2025-38159
- Description:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38159
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38159-wifi-rtw88-fix-the-para-buffer-size-to-avoid-reading-out-of-bounds.patch
- From: 6.8.0-100.100
- CVE-2025-39890
- Description:
wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event
- CVE: https://ubuntu.com/security/CVE-2025-39890
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39890-wifi-ath12k-fix-memory-leak-in-ath12k-service-ready-ext-event.patch
- From: 6.8.0-100.100
- CVE-2025-38157
- Description:
wifi: ath9k_htc: Abort software beacon handling if disabled
- CVE: https://ubuntu.com/security/CVE-2025-38157
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38157-wifi-ath9k-htc-abort-software-beacon-handling-if-disabled.patch
- From: 6.8.0-100.100
- CVE-2025-38280
- Description:
bpf: Avoid __bpf_prog_ret0_warn when jit fails
- CVE: https://ubuntu.com/security/CVE-2025-38280
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38280-bpf-avoid-bpf-prog-ret0-warn-when-jit-fails.patch
- From: 6.8.0-100.100
- CVE-2025-38146
- Description:
net: openvswitch: Fix the dead loop of MPLS parse
- CVE: https://ubuntu.com/security/CVE-2025-38146
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38146-net-openvswitch-fix-the-dead-loop-of-mpls-parse.patch
- From: 6.8.0-100.100
- CVE-2025-38313
- Description:
bus: fsl-mc: fix double-free on mc_dev
- CVE: https://ubuntu.com/security/CVE-2025-38313
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38313-bus-fsl-mc-fix-double-free-on-mc-dev.patch
- From: 6.8.0-100.100
- CVE-2025-38312
- Description:
fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()
- CVE: https://ubuntu.com/security/CVE-2025-38312
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38312-fbdev-core-fbcvt-avoid-division-by-0-in-fb-cvt-hperiod.patch
- From: 6.8.0-100.100
- CVE-2025-38126
- Description:
net: stmmac: make sure that ptp_rate is not 0 before configuring timestamping
- CVE: https://ubuntu.com/security/CVE-2025-38126
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38126-net-stmmac-make-sure-that-ptp-rate-is-not-0-before-configuring-timestamping.patch
- From: 6.8.0-100.100
- CVE-2025-38307
- Description:
ASoC: Intel: avs: Verify content returned by parse_int_array()
- CVE: https://ubuntu.com/security/CVE-2025-38307
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38307-asoc-intel-avs-verify-content-returned-by-parse-int-array.patch
- From: 6.8.0-100.100
- CVE-2025-38109
- Description:
net/mlx5: Fix ECVF vports unload on shutdown flow
- CVE: https://ubuntu.com/security/CVE-2025-38109
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38109-net-mlx5-fix-ecvf-vports-unload-on-shutdown-flow.patch
- From: 6.8.0-100.100
- CVE-2025-38108
- Description:
net_sched: red: fix a race in __red_change()
- CVE: https://ubuntu.com/security/CVE-2025-38108
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38108-net-sched-red-fix-a-race-in-red-change.patch
- From: 6.8.0-100.100
- CVE-2025-38102
- Description:
VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify
- CVE: https://ubuntu.com/security/CVE-2025-38102
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38102-vmci-fix-race-between-vmci-host-setup-notify-and-vmci-ctx-unset-notify.patch
- From: 6.8.0-100.100
- CVE-2025-38292
- Description:
wifi: ath12k: fix invalid access to memory
- CVE: https://ubuntu.com/security/CVE-2025-38292
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38292-wifi-ath12k-fix-invalid-access-to-memory.patch
- From: 6.8.0-100.100
- CVE-2025-38129
- Description:
page_pool: Fix use-after-free in page_pool_recycle_in_ring
- CVE: https://ubuntu.com/security/CVE-2025-38129
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38129-page-pool-fix-use-after-free-in-page-pool-recycle-in-ring.patch
- From: 6.8.0-100.100
- CVE-2025-38125
- Description:
net: stmmac: make sure that ptp_rate is not 0 before configuring EST
- CVE: https://ubuntu.com/security/CVE-2025-38125
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38125-net-stmmac-make-sure-that-ptp-rate-is-not-0-before-configuring-est.patch
- From: 6.8.0-100.100
- CVE-2025-38101
- Description:
ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set()
- CVE: https://ubuntu.com/security/CVE-2025-38101
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38101-ring-buffer-fix-buffer-locking-in-ring-buffer-subbuf-order-set.patch
- From: 6.8.0-100.100
- CVE-2025-38430
- Description:
nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request
- CVE: https://ubuntu.com/security/CVE-2025-38430
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38430-nfsd-nfsd4-spo-must-allow-must-check-this-is-a-v4-compound-request.patch
- From: 6.8.0-100.100
- CVE-2025-38231
- Description:
nfsd: Initialize ssc before laundromat_work to prevent NULL dereference
- CVE: https://ubuntu.com/security/CVE-2025-38231
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38231-nfsd-initialize-ssc-before-laundromat-work-to-prevent-null-dereference.patch
- From: 6.8.0-100.100
- CVE-2025-38337
- Description:
jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata()
- CVE: https://ubuntu.com/security/CVE-2025-38337
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38337-jbd2-fix-data-race-and-null-ptr-deref-in-jbd2-journal-dirty-metadata.patch
- From: 6.8.0-100.100
- CVE-2025-38229
- Description:
media: cxusb: no longer judge rbuf when the write fails
- CVE: https://ubuntu.com/security/CVE-2025-38229
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38229-media-cxusb-no-longer-judge-rbuf-when-the-write-fails.patch
- From: 6.8.0-100.100
- CVE-2025-38226
- Description:
media: vivid: Change the siize of the composing
- CVE: https://ubuntu.com/security/CVE-2025-38226
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38226-media-vivid-change-the-siize-of-the-composing.patch
- From: 6.8.0-100.100
- CVE-2025-38336
- Description:
ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330
- CVE: https://ubuntu.com/security/CVE-2025-38336
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38336-ata-pata-via-force-pio-for-atapi-devices-on-vt6415-vt6330.patch
- From: 6.8.0-100.100
- CVE-2025-38222
- Description:
ext4: inline: fix len overflow in ext4_prepare_inline_data
- CVE: https://ubuntu.com/security/CVE-2025-38222
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38222-ext4-inline-fix-len-overflow-in-ext4-prepare-inline-data.patch
- From: 6.8.0-100.100
- CVE-2025-38428
- Description:
Input: ims-pcu - check record size in ims_pcu_flash_firmware()
- CVE: https://ubuntu.com/security/CVE-2025-38428
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38428-input-ims-pcu-check-record-size-in-ims-pcu-flash-firmware.patch
- From: 6.8.0-100.100
- CVE-2025-38416
- Description:
NFC: nci: uart: Set tty->disc_data only in success path
- CVE: https://ubuntu.com/security/CVE-2025-38416
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38416-nfc-nci-uart-set-tty-disc-data-only-in-success-path.patch
- From: 6.8.0-100.100
- CVE-2025-38215
- Description:
fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var
- CVE: https://ubuntu.com/security/CVE-2025-38215
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38215-fbdev-fix-do-register-framebuffer-to-prevent-null-ptr-deref-in-fb-videomode-to-var.patch
- From: 6.8.0-100.100
- CVE-2025-38214
- Description:
fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var
- CVE: https://ubuntu.com/security/CVE-2025-38214
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38214-fbdev-fix-fb-set-var-to-prevent-null-ptr-deref-in-fb-videomode-to-var.patch
- From: 6.8.0-100.100
- CVE-2025-38212
- Description:
ipc: fix to protect IPCS lookups using RCU
- CVE: https://ubuntu.com/security/CVE-2025-38212
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38212-ipc-fix-to-protect-ipcs-lookups-using-rcu.patch
- From: 6.8.0-100.100
- CVE-2025-38346
- Description:
ftrace: Fix UAF when lookup kallsym after ftrace disabled
- CVE: https://ubuntu.com/security/CVE-2025-38346
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38346-ftrace-fix-uaf-when-lookup-kallsym-after-ftrace-disabled.patch
- From: 6.8.0-100.100
- CVE-2025-38086
- Description:
net: ch9200: fix uninitialised access during mii_nway_restart
- CVE: https://ubuntu.com/security/CVE-2025-38086
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38086-net-ch9200-fix-uninitialised-access-during-mii-nway-restart.patch
- From: 6.8.0-100.100
- CVE-2025-38208
- Description:
smb: client: add NULL check in automount_fullpath
- CVE: https://ubuntu.com/security/CVE-2025-38208
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38208-smb-client-add-null-check-in-automount-fullpath.patch
- From: 6.8.0-100.100
- CVE-2025-38422
- Description:
net: lan743x: Modify the EEPROM and OTP size for PCI1xxxx devices
- CVE: https://ubuntu.com/security/CVE-2025-38422
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38422-net-lan743x-modify-the-eeprom-and-otp-size-for-pci1xxxx-devices.patch
- From: 6.8.0-100.100
- CVE-2025-38425
- Description:
i2c: tegra: check msg length in SMBUS block read
- CVE: https://ubuntu.com/security/CVE-2025-38425
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38425-i2c-tegra-check-msg-length-in-smbus-block-read.patch
- From: 6.8.0-100.100
- CVE-2025-38334
- Description:
x86/sgx: Prevent attempts to reclaim poisoned pages
- CVE: https://ubuntu.com/security/CVE-2025-38334
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38334-x86-sgx-prevent-attempts-to-reclaim-poisoned-pages.patch
- From: 6.8.0-100.100
- CVE-2025-38342
- Description:
software node: Correct a OOB check in software_node_get_reference_args()
- CVE: https://ubuntu.com/security/CVE-2025-38342
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38342-software-node-correct-a-oob-check-in-software-node-get-reference-args.patch
- From: 6.8.0-100.100
- CVE-2025-38332
- Description:
scsi: lpfc: Use memcpy() for BIOS version
- CVE: https://ubuntu.com/security/CVE-2025-38332
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38332-scsi-lpfc-use-memcpy-for-bios-version.patch
- From: 6.8.0-100.100
- CVE-2025-38200
- Description:
i40e: fix MMIO write access to an invalid page in i40e_clear_hw
- CVE: https://ubuntu.com/security/CVE-2025-38200
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38200-i40e-fix-mmio-write-access-to-an-invalid-page-in-i40e-clear-hw.patch
- From: 6.8.0-100.100
- CVE-2025-38198
- Description:
fbcon: Make sure modelist not set on unregistered console
- CVE: https://ubuntu.com/security/CVE-2025-38198
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38198-fbcon-make-sure-modelist-not-set-on-unregistered-console.patch
- From: 6.8.0-100.100
- CVE-2025-38197
- Description:
platform/x86: dell_rbu: Fix list usage
- CVE: https://ubuntu.com/security/CVE-2025-38197
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38197-platform-x86-dell-rbu-fix-list-usage.patch
- From: 6.8.0-100.100
- CVE-2025-38090
- Description:
drivers/rapidio/rio_cm.c: prevent possible heap overwrite
- CVE: https://ubuntu.com/security/CVE-2025-38090
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38090-drivers-rapidio-rio-cm-c-prevent-possible-heap-overwrite.patch
- From: 6.8.0-100.100
- CVE-2025-38194
- Description:
jffs2: check that raw node were preallocated before writing summary
- CVE: https://ubuntu.com/security/CVE-2025-38194
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38194-jffs2-check-that-raw-node-were-preallocated-before-writing-summary.patch
- From: 6.8.0-100.100
- CVE-2025-38328
- Description:
jffs2: check jffs2_prealloc_raw_node_refs() result in few other places
- CVE: https://ubuntu.com/security/CVE-2025-38328
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38328-jffs2-check-jffs2-prealloc-raw-node-refs-result-in-few-other-places.patch
- From: 6.8.0-100.100
- CVE-2025-38192
- Description:
net: clear the dst when changing skb protocol
- CVE: https://ubuntu.com/security/CVE-2025-38192
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38192-net-clear-the-dst-when-changing-skb-protocol.patch
- From: 6.8.0-100.100
- CVE-2025-38420
- Description:
wifi: carl9170: do not ping device which has failed to load firmware
- CVE: https://ubuntu.com/security/CVE-2025-38420
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38420-wifi-carl9170-do-not-ping-device-which-has-failed-to-load-firmware.patch
- From: 6.8.0-100.100
- CVE-2025-38324
- Description:
mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu().
- CVE: https://ubuntu.com/security/CVE-2025-38324
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38324-mpls-use-rcu-dereference-rtnl-in-mpls-route-input-rcu.patch
- From: 6.8.0-100.100
- CVE-2025-38184
- Description:
tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer
- CVE: https://ubuntu.com/security/CVE-2025-38184
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38184-tipc-fix-null-ptr-deref-when-acquiring-remote-ip-of-ethernet-bearer.patch
- From: 6.8.0-100.100
- CVE-2025-38181
- Description:
calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().
- CVE: https://ubuntu.com/security/CVE-2025-38181
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38181-calipso-fix-null-ptr-deref-in-calipso-req-set-del-attr.patch
- From: 6.8.0-100.100
- CVE-2025-38424
- Description:
perf: Fix sample vs do_exit()
- CVE: https://ubuntu.com/security/CVE-2025-38424
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38424-perf-fix-sample-vs-do-exit.patch
- From: 6.8.0-100.100
- CVE-2025-38320
- Description:
arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth()
- CVE: https://ubuntu.com/security/CVE-2025-38320
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38320-arm64-ptrace-fix-stack-out-of-bounds-read-in-regs-get-kernel-stack-nth.patch
- From: 6.8.0-100.100
- CVE-2025-38436
- Description:
drm/scheduler: signal scheduled fence when kill job
- CVE: https://ubuntu.com/security/CVE-2025-38436
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38436-drm-scheduler-signal-scheduled-fence-when-kill-job.patch
- From: 6.8.0-100.100
- CVE-2025-38257
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-38257.patch
- From:
- CVE-2025-38245
- Description:
atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().
- CVE: https://ubuntu.com/security/CVE-2025-38245
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38245-atm-release-atm-dev-mutex-after-removing-procfs-in-atm-dev-deregister.patch
- From: 6.8.0-100.100
- CVE-2025-38239
- Description:
scsi: megaraid_sas: Fix invalid node index
- CVE: https://ubuntu.com/security/CVE-2025-38239
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38239-scsi-megaraid-sas-fix-invalid-node-index.patch
- From: 6.8.0-100.100
- CVE-2025-38363
- Description:
drm/tegra: Fix a possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-38363
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38363-drm-tegra-fix-a-possible-null-pointer-dereference.patch
- From: 6.8.0-100.100
- CVE-2025-38361
- Description:
drm/amd/display: Check dce_hwseq before dereferencing it
- CVE: https://ubuntu.com/security/CVE-2025-38361
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38361-drm-amd-display-check-dce-hwseq-before-dereferencing-it.patch
- From: 6.8.0-100.100
- CVE-2025-23155
- Description:
net: stmmac: Fix accessing freed irq affinity_hint
- CVE: https://ubuntu.com/security/CVE-2025-23155
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-23155-net-stmmac-fix-accessing-freed-irq-affinity-hint.patch
- From: 6.8.0-100.100
- CVE-2025-38375
- Description:
virtio-net: ensure the received length does not exceed allocated size
- CVE: https://ubuntu.com/security/CVE-2025-38375
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38375-virtio-net-ensure-the-received-length-does-not-exceed-allocated-size.patch
- From: 6.8.0-100.100
- CVE-2025-38403
- Description:
vsock/vmci: Clear the vmci transport packet properly when initializing it
- CVE: https://ubuntu.com/security/CVE-2025-38403
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38403-vsock-vmci-clear-the-vmci-transport-packet-properly-when-initializing-it.patch
- From: 6.8.0-100.100
- CVE-2025-38387
- Description:
RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert
- CVE: https://ubuntu.com/security/CVE-2025-38387
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38387-rdma-mlx5-initialize-obj-event-obj-sub-list-before-xa-insert.patch
- From: 6.8.0-100.100
- CVE-2025-38412
- Description:
platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks
- CVE: https://ubuntu.com/security/CVE-2025-38412
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38412-platform-x86-dell-wmi-sysman-fix-wmi-data-block-retrieval-in-sysfs-callbacks.patch
- From: 6.8.0-100.100
- CVE-2025-38385
- Description:
net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect
- CVE: https://ubuntu.com/security/CVE-2025-38385
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38385-net-usb-lan78xx-fix-warn-in-netif-napi-del-locked-on-disconnect.patch
- From: 6.8.0-100.100
- CVE-2025-38389
- Description:
drm/i915/gt: Fix timeline left held on VMA alloc error
- CVE: https://ubuntu.com/security/CVE-2025-38389
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38389-drm-i915-gt-fix-timeline-left-held-on-vma-alloc-error.patch
- From: 6.8.0-100.100
- CVE-2025-38377
- Description:
rose: fix dangling neighbour pointers in rose_rt_device_down()
- CVE: https://ubuntu.com/security/CVE-2025-38377
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38377-rose-fix-dangling-neighbour-pointers-in-rose-rt-device-down.patch
- From: 6.8.0-100.100
- CVE-2025-38399
- Description:
scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()
- CVE: https://ubuntu.com/security/CVE-2025-38399
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38399-scsi-target-fix-null-pointer-dereference-in-core-scsi3-decode-spec-i-port.patch
- From: 6.8.0-100.100
- CVE-2025-38386
- Description:
ACPICA: Refuse to evaluate a method if arguments are missing
- CVE: https://ubuntu.com/security/CVE-2025-38386
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38386-acpica-refuse-to-evaluate-a-method-if-arguments-are-missing.patch
- From: 6.8.0-100.100
- CVE-2025-38402
- Description:
idpf: return 0 size for RSS key if not supported
- CVE: https://ubuntu.com/security/CVE-2025-38402
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38402-idpf-return-0-size-for-rss-key-if-not-supported.patch
- From: 6.8.0-100.100
- CVE-2025-38408
- Description:
genirq/irq_sim: Initialize work context pointers properly
- CVE: https://ubuntu.com/security/CVE-2025-38408
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38408-genirq-irq-sim-initialize-work-context-pointers-properly.patch
- From: 6.8.0-100.100
- CVE-2025-38466
- Description:
perf: Revert to requiring CAP_SYS_ADMIN for uprobes
- CVE: https://ubuntu.com/security/CVE-2025-38466
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38466-perf-revert-to-requiring-cap-sys-admin-for-uprobes.patch
- From: 6.8.0-100.100
- CVE-2025-38464
- Description:
tipc: Fix use-after-free in tipc_conn_close().
- CVE: https://ubuntu.com/security/CVE-2025-38464
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38464-tipc-fix-use-after-free-in-tipc-conn-close.patch
- From: 6.8.0-100.100
- CVE-2025-38463
- Description:
tcp: Correct signedness in skb remaining space calculation
- CVE: https://ubuntu.com/security/CVE-2025-38463
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38463-tcp-correct-signedness-in-skb-remaining-space-calculation.patch
- From: 6.8.0-100.100
- CVE-2025-38457
- Description:
net/sched: Abort __tc_modify_qdisc if parent class does not exist
- CVE: https://ubuntu.com/security/CVE-2025-38457
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38457-net-sched-abort-tc-modify-qdisc-if-parent-class-does-not-exist.patch
- From: 6.8.0-100.100
- CVE-2025-38456
- Description:
ipmi:msghandler: Fix potential memory corruption in ipmi_create_user()
- CVE: https://ubuntu.com/security/CVE-2025-38456
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38456-ipmi-msghandler-fix-potential-memory-corruption-in-ipmi-create-user.patch
- From: 6.8.0-100.100
- CVE-2025-38455
- Description:
KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight
- CVE: https://ubuntu.com/security/CVE-2025-38455
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38455-kvm-svm-reject-sev-es-intra-host-migration-if-vcpu-creation-is-in-flight.patch
- From: 6.8.0-100.100
- CVE-2025-38445
- Description:
md/raid1: Fix stack memory use after return in raid1_reshape
- CVE: https://ubuntu.com/security/CVE-2025-38445
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38445-md-raid1-fix-stack-memory-use-after-return-in-raid1-reshape.patch
- From: 6.8.0-100.100
- CVE-2025-38443
- Description:
nbd: fix uaf in nbd_genl_connect() error path
- CVE: https://ubuntu.com/security/CVE-2025-38443
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38443-nbd-fix-uaf-in-nbd-genl-connect-error-path.patch
- From: 6.8.0-100.100
- CVE-2025-38439
- Description:
bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT
- CVE: https://ubuntu.com/security/CVE-2025-38439
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38439-bnxt-en-set-dma-unmap-len-correctly-for-xdp-redirect.patch
- From: 6.8.0-100.100
- CVE-2025-38521
- Description:
drm/imagination: Fix kernel crash when hard resetting the GPU
- CVE: https://ubuntu.com/security/CVE-2025-38521
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38521-drm-imagination-fix-kernel-crash-when-hard-resetting-the-gpu.patch
- From: 6.8.0-100.100
- CVE-2025-38511
- Description:
drm/xe/pf: Clear all LMTT pages on alloc
- CVE: https://ubuntu.com/security/CVE-2025-38511
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38511-drm-xe-pf-clear-all-lmtt-pages-on-alloc.patch
- From: 6.8.0-100.100
- CVE-2025-38497
- Description:
usb: gadget: configfs: Fix OOB read on empty string write
- CVE: https://ubuntu.com/security/CVE-2025-38497
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38497-usb-gadget-configfs-fix-oob-read-on-empty-string-write.patch
- From: 6.8.0-100.100
- CVE-2025-38496
- Description:
dm-bufio: fix sched in atomic context
- CVE: https://ubuntu.com/security/CVE-2025-38496
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38496-dm-bufio-fix-sched-in-atomic-context.patch
- From: 6.8.0-100.100
- CVE-2025-38493
- Description:
tracing/osnoise: Fix crash in timerlat_dump_stack()
- CVE: https://ubuntu.com/security/CVE-2025-38493
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38493-tracing-osnoise-fix-crash-in-timerlat-dump-stack.patch
- From: 6.8.0-100.100
- CVE-2025-38538
- Description:
dmaengine: nbpfaxi: Fix memory corruption in probe()
- CVE: https://ubuntu.com/security/CVE-2025-38538
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38538-dmaengine-nbpfaxi-fix-memory-corruption-in-probe.patch
- From: 6.8.0-100.100
- CVE-2025-38488
- Description:
smb: client: fix use-after-free in crypt_message when using async crypto
- CVE: https://ubuntu.com/security/CVE-2025-38488
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38488-smb-client-fix-use-after-free-in-crypt-message-when-using-async-crypto.patch
- From: 6.8.0-100.100
- CVE-2025-38530
- Description:
comedi: pcl812: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38530
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38530-comedi-pcl812-fix-bit-shift-out-of-bounds.patch
- From: 6.8.0-100.100
- CVE-2025-38529
- Description:
comedi: aio_iiro_16: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38529
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38529-comedi-aio-iiro-16-fix-bit-shift-out-of-bounds.patch
- From: 6.8.0-100.100
- CVE-2025-38483
- Description:
comedi: das16m1: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38483
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38483-comedi-das16m1-fix-bit-shift-out-of-bounds.patch
- From: 6.8.0-100.100
- CVE-2025-38482
- Description:
comedi: das6402: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38482
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38482-comedi-das6402-fix-bit-shift-out-of-bounds.patch
- From: 6.8.0-100.100
- CVE-2025-38527
- Description:
smb: client: fix use-after-free in cifs_oplock_break
- CVE: https://ubuntu.com/security/CVE-2025-38527
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38527-smb-client-fix-use-after-free-in-cifs-oplock-break.patch
- From: 6.8.0-100.100
- CVE-2025-38526
- Description:
ice: add NULL check in eswitch lag check
- CVE: https://ubuntu.com/security/CVE-2025-38526
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38526-ice-add-null-check-in-eswitch-lag-check.patch
- From: 6.8.0-100.100
- CVE-2025-38474
- Description:
usb: net: sierra: check for no status endpoint
- CVE: https://ubuntu.com/security/CVE-2025-38474
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38474-usb-net-sierra-check-for-no-status-endpoint.patch
- From: 6.8.0-100.100
- CVE-2025-38473
- Description:
Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()
- CVE: https://ubuntu.com/security/CVE-2025-38473
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38473-bluetooth-fix-null-ptr-deref-in-l2cap-sock-resume-cb.patch
- From: 6.8.0-100.100
- CVE-2025-38550
- Description:
ipv6: mcast: Delay put pmc->idev in mld_del_delrec()
- CVE: https://ubuntu.com/security/CVE-2025-38550
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38550-ipv6-mcast-delay-put-pmc-idev-in-mld-del-delrec.patch
- From: 6.8.0-100.100
- CVE-2025-38468
- Description:
net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree
- CVE: https://ubuntu.com/security/CVE-2025-38468
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38468-net-sched-return-null-when-htb-lookup-leaf-encounters-an-empty-rbtree.patch
- From: 6.8.0-100.100
- CVE-2025-38335
- Description:
PEEMPT_RT config isn't enabled
- CVE:
- Patch: skipped/CVE-2025-38335.patch
- From:
- CVE-2025-38668
- Description:
regulator: core: fix NULL dereference on unbind due to stale coupling data
- CVE: https://ubuntu.com/security/CVE-2025-38668
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38668-regulator-core-fix-null-dereference-on-unbind-due-to-stale-coupling-data.patch
- From: 6.8.0-100.100
- CVE-2025-38668
- Description:
regulator: core: fix NULL dereference on unbind due to stale coupling data kpatch
- CVE: https://ubuntu.com/security/CVE-2025-38668
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38668-regulator-core-fix-null-dereference-on-unbind-due-to-stale-coupling-data-kpatch.patch
- From: 6.8.0-100.100
- CVE-2025-38664
- Description:
ice: Fix a null pointer dereference in ice_copy_and_init_pkg()
- CVE: https://ubuntu.com/security/CVE-2025-38664
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38664-ice-fix-a-null-pointer-dereference-in-ice-copy-and-init-pkg.patch
- From: 6.8.0-100.100
- CVE-2025-38650
- Description:
hfsplus: remove mutex_lock check in hfsplus_free_extents
- CVE: https://ubuntu.com/security/CVE-2025-38650
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38650-hfsplus-remove-mutex-lock-check-in-hfsplus-free-extents.patch
- From: 6.8.0-100.100
- CVE-2025-38609
- Description:
PM / devfreq: Check governor before using governor->name
- CVE: https://ubuntu.com/security/CVE-2025-38609
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38609-pm-devfreq-check-governor-before-using-governor-name.patch
- From: 6.8.0-100.100
- CVE-2025-38646
- Description:
wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band
- CVE: https://ubuntu.com/security/CVE-2025-38646
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38646-wifi-rtw89-avoid-null-dereference-when-rx-problematic-packet-on-unsupported-6-ghz-band.patch
- From: 6.8.0-100.100
- CVE-2025-38604
- Description:
wifi: rtl818x: Kill URBs before clearing tx status queue
- CVE: https://ubuntu.com/security/CVE-2025-38604
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38604-wifi-rtl818x-kill-urbs-before-clearing-tx-status-queue.patch
- From: 6.8.0-100.100
- CVE-2025-38601
- Description:
wifi: ath11k: clear initialized flag for deinit-ed srng lists
- CVE: https://ubuntu.com/security/CVE-2025-38601
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38601-wifi-ath11k-clear-initialized-flag-for-deinit-ed-srng-lists.patch
- From: 6.8.0-100.100
- CVE-2025-38645
- Description:
net/mlx5: Check device memory pointer before usage
- CVE: https://ubuntu.com/security/CVE-2025-38645
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38645-net-mlx5-check-device-memory-pointer-before-usage.patch
- From: 6.8.0-100.100
- CVE-2025-38553
- Description:
net/sched: Restrict conditions for adding duplicating netems to qdisc tree
- CVE: https://ubuntu.com/security/CVE-2025-38553
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38553-net-sched-restrict-conditions-for-adding-duplicating-netems-to-qdisc-tree.patch
- From: 6.8.0-100.100
- CVE-2025-38644
- Description:
wifi: mac80211: reject TDLS operations when station is not associated
- CVE: https://ubuntu.com/security/CVE-2025-38644
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38644-wifi-mac80211-reject-tdls-operations-when-station-is-not-associated.patch
- From: 6.8.0-100.100
- CVE-2025-38590
- Description:
net/mlx5e: Remove skb secpath if xfrm state is not found
- CVE: https://ubuntu.com/security/CVE-2025-38590
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38590-net-mlx5e-remove-skb-secpath-if-xfrm-state-is-not-found.patch
- From: 6.8.0-100.100
- CVE-2025-38581
- Description:
crypto: ccp - Fix crash when rebind ccp device for ccp.ko
- CVE: https://ubuntu.com/security/CVE-2025-38581
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38581-crypto-ccp-fix-crash-when-rebind-ccp-device-for-ccp-ko.patch
- From: 6.8.0-100.100
- CVE-2025-38579
- Description:
f2fs: fix KMSAN uninit-value in extent_info usage
- CVE: https://ubuntu.com/security/CVE-2025-38579
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38579-f2fs-fix-kmsan-uninit-value-in-extent-info-usage.patch
- From: 6.8.0-100.100
- CVE-2025-39730
- Description:
NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
- CVE: https://ubuntu.com/security/CVE-2025-39730
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39730-nfs-fix-filehandle-bounds-checking-in-nfs-fh-to-dentry.patch
- From: 6.8.0-100.100
- CVE-2025-38572
- Description:
ipv6: reject malicious packets in ipv6_gso_segment()
- CVE: https://ubuntu.com/security/CVE-2025-38572
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38572-ipv6-reject-malicious-packets-in-ipv6-gso-segment.patch
- From: 6.8.0-100.100
- CVE-2025-38555
- Description:
usb: gadget : fix use-after-free in composite_dev_cleanup()
- CVE: https://ubuntu.com/security/CVE-2025-38555
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38555-usb-gadget-fix-use-after-free-in-composite-dev-cleanup.patch
- From: 6.8.0-100.100
- CVE-2025-38660
- Description:
parse_longname(): strrchr() expects NUL-terminated string
- CVE: https://ubuntu.com/security/CVE-2025-38660
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38660-parse-longname-strrchr-expects-nul-terminated-string.patch
- From: 6.8.0-100.100
- CVE-2025-38585
- Description:
staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int()
- CVE: https://ubuntu.com/security/CVE-2025-38585
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38585-staging-media-atomisp-fix-stack-buffer-overflow-in-gmin-get-var-int.patch
- From: 6.8.0-100.100
- CVE-2025-38728
- Description:
smb3: fix for slab out of bounds on mount to ksmbd
- CVE: https://ubuntu.com/security/CVE-2025-38728
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38728-smb3-fix-for-slab-out-of-bounds-on-mount-to-ksmbd.patch
- From: 6.8.0-100.100
- CVE-2025-38724
- Description:
nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
- CVE: https://ubuntu.com/security/CVE-2025-38724
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38724-nfsd-handle-get-client-locked-failure-in-nfsd4-setclientid-confirm.patch
- From: 6.8.0-100.100
- CVE-2025-39756
- Description:
fs: Prevent file descriptor table allocations exceeding INT_MAX
- CVE: https://ubuntu.com/security/CVE-2025-39756
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39756-fs-prevent-file-descriptor-table-allocations-exceeding-int-max.patch
- From: 6.8.0-100.100
- CVE-2025-38718
- Description:
sctp: linearize cloned gso packets in sctp_rcv
- CVE: https://ubuntu.com/security/CVE-2025-38718
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38718-sctp-linearize-cloned-gso-packets-in-sctp-rcv.patch
- From: 6.8.0-100.100
- CVE-2025-38715
- Description:
hfs: fix slab-out-of-bounds in hfs_bnode_read()
- CVE: https://ubuntu.com/security/CVE-2025-38715
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38715-hfs-fix-slab-out-of-bounds-in-hfs-bnode-read.patch
- From: 6.8.0-100.100
- CVE-2025-38714
- Description:
hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()
- CVE: https://ubuntu.com/security/CVE-2025-38714
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38714-hfsplus-fix-slab-out-of-bounds-in-hfsplus-bnode-read.patch
- From: 6.8.0-100.100
- CVE-2025-38706
- Description:
ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()
- CVE: https://ubuntu.com/security/CVE-2025-38706
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38706-asoc-core-check-for-rtd-null-in-snd-soc-remove-pcm-runtime.patch
- From: 6.8.0-100.100
- CVE-2025-39750
- Description:
wifi: ath12k: Correct tid cleanup when tid setup fails
- CVE: https://ubuntu.com/security/CVE-2025-39750
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39750-wifi-ath12k-correct-tid-cleanup-when-tid-setup-fails.patch
- From: 6.8.0-100.100
- CVE-2025-39761
- Description:
wifi: ath12k: Decrement TID on RX peer frag setup error handling
- CVE: https://ubuntu.com/security/CVE-2025-39761
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39761-wifi-ath12k-decrement-tid-on-rx-peer-frag-setup-error-handling.patch
- From: 6.8.0-100.100
- CVE-2025-38702
- Description:
fbdev: fix potential buffer overflow in do_register_framebuffer()
- CVE: https://ubuntu.com/security/CVE-2025-38702
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38702-fbdev-fix-potential-buffer-overflow-in-do-register-framebuffer.patch
- From: 6.8.0-100.100
- CVE-2025-38701
- Description:
ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr
- CVE: https://ubuntu.com/security/CVE-2025-38701
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38701-ext4-do-not-bug-when-inline-data-fl-lacks-system-data-xattr.patch
- From: 6.8.0-100.100
- CVE-2025-38700
- Description:
scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated
- CVE: https://ubuntu.com/security/CVE-2025-38700
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38700-scsi-libiscsi-initialize-iscsi-conn-dd-data-only-if-memory-is-allocated.patch
- From: 6.8.0-100.100
- CVE-2025-38699
- Description:
scsi: bfa: Double-free fix
- CVE: https://ubuntu.com/security/CVE-2025-38699
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38699-scsi-bfa-double-free-fix.patch
- From: 6.8.0-100.100
- CVE-2025-38699
- Description:
scsi: bfa: Double-free fix
- CVE: https://ubuntu.com/security/CVE-2025-38699
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38699-scsi-bfa-double-free-fix-kpatch.patch
- From: 6.8.0-100.100
- CVE-2025-39743
- Description:
jfs: truncate good inode pages when hard link is 0
- CVE: https://ubuntu.com/security/CVE-2025-39743
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39743-jfs-truncate-good-inode-pages-when-hard-link-is-0.patch
- From: 6.8.0-100.100
- CVE-2025-39742
- Description:
RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()
- CVE: https://ubuntu.com/security/CVE-2025-39742
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39742-rdma-hfi1-fix-possible-divide-by-zero-in-find-hw-thread-mask.patch
- From: 6.8.0-100.100
- CVE-2025-38695
- Description:
scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure
- CVE: https://ubuntu.com/security/CVE-2025-38695
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38695-scsi-lpfc-check-for-hdwq-null-ptr-when-cleaning-up-lpfc-vport-structure.patch
- From: 6.8.0-100.100
- CVE-2025-38694
- Description:
media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()
- CVE: https://ubuntu.com/security/CVE-2025-38694
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38694-media-dvb-frontends-dib7090p-fix-null-ptr-deref-in-dib7090p-rw-on-apb.patch
- From: 6.8.0-100.100
- CVE-2025-38693
- Description:
media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar
- CVE: https://ubuntu.com/security/CVE-2025-38693
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38693-media-dvb-frontends-w7090p-fix-null-ptr-deref-in-w7090p-tuner-write-serpar-and-w7090p-tuner-read-serpar.patch
- From: 6.8.0-100.100
- CVE-2025-38692
- Description:
exfat: add cluster chain loop check for dir
- CVE: https://ubuntu.com/security/CVE-2025-38692
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38692-exfat-add-cluster-chain-loop-check-for-dir.patch
- From: 6.8.0-100.100
- CVE-2025-38691
- Description:
pNFS: Fix uninited ptr deref in block/scsi layout
- CVE: https://ubuntu.com/security/CVE-2025-38691
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38691-pnfs-fix-uninited-ptr-deref-in-block-scsi-layout.patch
- From: 6.8.0-100.100
- CVE-2025-38688
- Description:
iommufd: Prevent ALIGN() overflow
- CVE: https://ubuntu.com/security/CVE-2025-38688
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38688-iommufd-prevent-align-overflow.patch
- From: 6.8.0-100.100
- CVE-2025-39760
- Description:
usb: core: config: Prevent OOB read in SS endpoint companion parsing
- CVE: https://ubuntu.com/security/CVE-2025-39760
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39760-usb-core-config-prevent-oob-read-in-ss-endpoint-companion-parsing.patch
- From: 6.8.0-100.100
- CVE-2025-39738
- Description:
btrfs: do not allow relocation of partially dropped subvolumes
- CVE: https://ubuntu.com/security/CVE-2025-39738
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39738-btrfs-do-not-allow-relocation-of-partially-dropped-subvolumes.patch
- From: 6.8.0-100.100
- CVE-2025-38685
- Description:
fbdev: Fix vmalloc out-of-bounds write in fast_imageblit
- CVE: https://ubuntu.com/security/CVE-2025-38685
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38685-fbdev-fix-vmalloc-out-of-bounds-write-in-fast-imageblit.patch
- From: 6.8.0-100.100
- CVE-2025-38680
- Description:
media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()
- CVE: https://ubuntu.com/security/CVE-2025-38680
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38680-media-uvcvideo-fix-1-byte-out-of-bounds-read-in-uvc-parse-format.patch
- From: 6.8.0-100.100
- CVE-2025-39790
- Description:
bus: mhi: host: Detect events pointing to unexpected TREs
- CVE: https://ubuntu.com/security/CVE-2025-39790
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39790-bus-mhi-host-detect-events-pointing-to-unexpected-tres.patch
- From: 6.8.0-100.100
- CVE-2025-39721
- Description:
crypto: qat - flush misc workqueue during device shutdown
- CVE: https://ubuntu.com/security/CVE-2025-39721
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39721-crypto-qat-flush-misc-workqueue-during-device-shutdown.patch
- From: 6.8.0-100.100
- CVE-2025-39718
- Description:
vsock/virtio: Validate length in packet header before skb_put()
- CVE: https://ubuntu.com/security/CVE-2025-39718
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39718-vsock-virtio-validate-length-in-packet-header-before-skb-put.patch
- From: 6.8.0-100.100
- CVE-2025-39711
- Description:
media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls
- CVE: https://ubuntu.com/security/CVE-2025-39711
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39711-media-ivsc-fix-crash-at-shutdown-due-to-missing-mei-cldev-disable-calls.patch
- From: 6.8.0-100.100
- CVE-2025-39710
- Description:
media: venus: Add a check for packet size after reading from shared memory
- CVE: https://ubuntu.com/security/CVE-2025-39710
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39710-media-venus-add-a-check-for-packet-size-after-reading-from-shared-memory.patch
- From: 6.8.0-100.100
- CVE-2025-39702
- Description:
ipv6: sr: Fix MAC comparison to be constant-time
- CVE: https://ubuntu.com/security/CVE-2025-39702
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39702-ipv6-sr-fix-mac-comparison-to-be-constant-time.patch
- From: 6.8.0-100.100
- CVE-2025-38681
- Description:
mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()
- CVE: https://ubuntu.com/security/CVE-2025-38681
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38681-mm-ptdump-take-the-memory-hotplug-lock-inside-ptdump-walk-pgd.patch
- From: 6.8.0-100.100
- CVE-2025-39694
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-39694.patch
- From:
- CVE-2025-39691
- Description:
fs/buffer: fix use-after-free when call bh_read() helper
- CVE: https://ubuntu.com/security/CVE-2025-39691
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39691-fs-buffer-fix-use-after-free-when-call-bh-read-helper.patch
- From: 6.8.0-100.100
- CVE-2025-39689
- Description:
ftrace: Also allocate and copy hash for reading of filter files
- CVE: https://ubuntu.com/security/CVE-2025-39689
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39689-ftrace-also-allocate-and-copy-hash-for-reading-of-filter-files.patch
- From: 6.8.0-100.100
- CVE-2025-39685
- Description:
comedi: pcl726: Prevent invalid irq number
- CVE: https://ubuntu.com/security/CVE-2025-39685
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39685-comedi-pcl726-prevent-invalid-irq-number.patch
- From: 6.8.0-100.100
- CVE-2025-39687
- Description:
iio: light: as73211: Ensure buffer holes are zeroed
- CVE: https://ubuntu.com/security/CVE-2025-39687
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39687-iio-light-as73211-ensure-buffer-holes-are-zeroed.patch
- From: 6.8.0-100.100
- CVE-2025-39673
- Description:
ppp: fix race conditions in ppp_fill_forward_path
- CVE: https://ubuntu.com/security/CVE-2025-39673
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-39673-ppp-fix-race-conditions-in-ppp-fill-forward-path.patch
- From: 6.8.0-100.100
- CVE-2025-38735
- Description:
gve: prevent ethtool ops after shutdown
- CVE: https://ubuntu.com/security/CVE-2025-38735
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38735-gve-prevent-ethtool-ops-after-shutdown.patch
- From: 6.8.0-100.100
- CVE-2025-38732
- Description:
netfilter: nf_reject: don't leak dst refcount for loopback packets
- CVE: https://ubuntu.com/security/CVE-2025-38732
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38732-netfilter-nf-reject-don-t-leak-dst-refcount-for-loopback-packets.patch
- From: 6.8.0-100.100
- CVE-2025-38710
- Description:
gfs2: Validate i_depth for exhash directories
- CVE: https://ubuntu.com/security/CVE-2025-38710
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38710-gfs2-validate-i-depth-for-exhash-directories.patch
- From: 6.8.0-100.100
- CVE-2025-38704
- Description:
rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access
- CVE: https://ubuntu.com/security/CVE-2025-38704
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38704-rcu-nocb-fix-possible-invalid-rdp-s-nocb-cb-kthread-pointer-access.patch
- From: 6.8.0-100.100
- CVE-2025-38686
- Description:
userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry
- CVE: https://ubuntu.com/security/CVE-2025-38686
- Patch: ubuntu-noble/6.8.0-100.100/CVE-2025-38686-userfaultfd-fix-a-crash-in-uffdio-move-when-pmd-is-a-migration-entry.patch
- From: 6.8.0-100.100