- kernel-6.8.0-51.52 (ubuntu-noble)
- 6.8.0-59.61
- 2025-06-09 00:00:41
- 2025-06-09 11:51:10
- K20250609_01
- CVE-2024-53103, CVSSv2 Score: 7.8
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://ubuntu.com/security/CVE-2024-53103
- Patch: ubuntu-noble/6.8.0-52.53/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 6.8.0-52.53
- CVE-2024-53141, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://ubuntu.com/security/CVE-2024-53141
- Patch: ubuntu-noble/6.8.0-52.53/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 6.8.0-52.53
- CVE-2024-53164, CVSSv2 Score: 5.5
- Description:
net: sched: fix ordering of qlen adjustment
- CVE: https://ubuntu.com/security/CVE-2024-53164
- Patch: ubuntu-noble/6.8.0-52.53/CVE-2024-53164-net-sched-fix-ordering-of-qlen-adjustment.patch
- From: 6.8.0-52.53
- CVE-2024-47685, CVSSv2 Score: 9.1
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://ubuntu.com/security/CVE-2024-47685
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.15.0-127.137
- CVE-2024-47670, CVSSv2 Score: 7.8
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-47670
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.15.0-127.137
- CVE-2024-47675, CVSSv2 Score: 7.8
- Description:
bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()
- CVE: https://ubuntu.com/security/CVE-2024-47675
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47675-bpf-fix-use-after-free-in-bpf-uprobe-multi-link-attach.patch
- From: kernel-6.8.0-54.56
- CVE-2024-47682, CVSSv2 Score: 7.8
- Description:
scsi: sd: Fix off-by-one error in sd_read_block_characteristics()
- CVE: https://ubuntu.com/security/CVE-2024-47682
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47682-scsi-sd-fix-off-by-one-error-in-sd-read-block-characteristics.patch
- From: kernel-6.8.0-54.56
- CVE-2024-47695, CVSSv2 Score: 7.8
- Description:
RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds
- CVE: https://ubuntu.com/security/CVE-2024-47695
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47695-rdma-rtrs-clt-reset-cid-to-con-num-1-to-stay-in-bounds.patch
- From: kernel-6.8.0-54.56
- CVE-2024-47697, CVSSv2 Score: 7.8
- Description:
drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47697
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47697-drivers-media-dvb-frontends-rtl2830-fix-an-out-of-bounds-write-error.patch
- From: 6.8.0-54.56
- CVE-2024-47698, CVSSv2 Score: 7.8
- Description:
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47698
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47698-drivers-media-dvb-frontends-rtl2832-fix-an-out-of-bounds-write-error.patch
- From: 6.8.0-54.56
- CVE-2024-47701, CVSSv2 Score: 7.8
- Description:
ext4: return error on ext4_find_inline_entry
- CVE: https://ubuntu.com/security/CVE-2024-47701
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47701-ext4-return-error-on-ext4_find_inline_entry.patch
- From: 6.8.0-54.56
- CVE-2024-47701, CVSSv2 Score: 7.8
- Description:
ext4: avoid OOB when system.data xattr changes underneath the filesystem
- CVE: https://ubuntu.com/security/CVE-2024-47701
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47701-ext4-avoid-oob-when-system-data-xattr-changes-underneath-the-filesystem.patch
- From: 6.8.0-54.56
- CVE-2024-47696, CVSSv2 Score: 7.8
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://ubuntu.com/security/CVE-2024-47696
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47696-rdma-iwcm-fix-warning-at-kernel-workqueue-c-check-flush-dependency.patch
- From: 6.8.0-54.56
- CVE-2024-47696, CVSSv2 Score: 7.8
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://ubuntu.com/security/CVE-2024-47696
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47696-rdma-iwcm-fix-warning-at-kernel-workqueue-c-check-flush-dependency-kpatch.patch
- From: 6.8.0-54.56
- CVE-2024-47691, CVSSv2 Score: 7.8
- Description:
f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()
- CVE: https://ubuntu.com/security/CVE-2024-47691
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47691-f2fs-fix-to-avoid-use-after-free-in-f2fs_stop_gc_thread.patch
- From: 6.8.0-54.56
- CVE-2024-47718, CVSSv2 Score: 7.8
- Description:
[PATCH] wifi: rtw88: always wait for both firmware loading attempts
- CVE: https://ubuntu.com/security/CVE-2024-47718
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47718-wifi-rtw88-always-wait-for-both-firmware-loading-attempts.patch
- From: 6.8.0-54.56
- CVE-2024-47730, CVSSv2 Score: 7.8
- Description:
crypto: hisilicon/qm - inject error before stopping queue
- CVE: https://ubuntu.com/security/CVE-2024-47730
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47730-crypto-hisilicon-qm-inject-error-before-stopping-queue.patch
- From: 6.8.0-54.56
- CVE-2024-47751, CVSSv2 Score: 7.8
- Description:
PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()
- CVE: https://ubuntu.com/security/CVE-2024-47751
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47751-pci-kirin-fix-buffer-overflow-in-kirin-pcie-parse-port.patch
- From: 6.8.0-54.56
- CVE-2024-47750, CVSSv2 Score: 7.8
- Description:
RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08
- CVE: https://ubuntu.com/security/CVE-2024-47750
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47750-rdma-hns-fix-use-after-free-of-rsv-qp-on-hip08.patch
- From: 6.8.0-54.56
- CVE-2024-47748, CVSSv2 Score: 7.8
- Description:
vhost_vdpa: assign irq bypass producer token correctly
- CVE: https://ubuntu.com/security/CVE-2024-47748
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47748-vhost-vdpa-assign-irq-bypass-producer-token-correctly.patch
- From: 6.8.0-54.56
- CVE-2024-47742, CVSSv2 Score: 7.8
- Description:
firmware_loader: Block path traversal
- CVE: https://ubuntu.com/security/CVE-2024-47742
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47742-firmware-loader-block-path-traversal.patch
- From: 6.8.0-54.56
- CVE-2024-47727, CVSSv2 Score: 7.8
- Description:
x86/tdx: Fix "in-kernel MMIO" check
- CVE: https://ubuntu.com/security/CVE-2024-47727
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47727-x86-tdx-fix-in-kernel-mmio-check.patch
- From: 6.8.0-54.56
- CVE-2024-47732, CVSSv2 Score: 7.8
- Description:
crypto: iaa - Fix potential use after free bug
- CVE: https://ubuntu.com/security/CVE-2024-47732
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47732-crypto-iaa-fix-potential-use-after-free-bug.patch
- From: 6.8.0-54.56
- CVE-2024-47745, CVSSv2 Score: 7.8
- Description:
mm: call the security_mmap_file() LSM hook in remap_file_pages()
- CVE: https://ubuntu.com/security/CVE-2024-47745
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47745-mm-call-the-security-mmap-file-lsm-hook-in-remap-file-pages.patch
- From: 6.8.0-54.56
- CVE-2024-47719, CVSSv2 Score: 7.8
- Description:
iommufd: Protect against overflow of ALIGN() during iova allocation
- CVE: https://ubuntu.com/security/CVE-2024-47719
- Patch: ubuntu-noble/6.8.0-54.56/CVE-2024-47719-iommufd-protect-against-overflow-of-align-during-iova-allocation.patch
- From: 6.8.0-54.56
- CVE-2024-53104, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://ubuntu.com/security/CVE-2024-53104
- Patch: ubuntu-noble/6.8.0-55.57/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 6.8.0-55.57
- CVE-2024-50180, CVSSv2 Score: 7.8
- Description:
fbdev: sisfb: Fix strbuf array overflow
- CVE: https://ubuntu.com/security/CVE-2024-50180
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50180-fbdev-sisfb-fix-strbuf-array-overflow.patch
- From: 6.8.0-56.58
- CVE-2024-50186, CVSSv2 Score: 7.8
- Description:
net: explicitly clear the sk pointer, when pf->create fails
- CVE: https://ubuntu.com/security/CVE-2024-50186
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50186-net-explicitly-clear-the-sk-pointer-when-pf-create-fails.patch
- From: 6.8.0-56.58
- CVE-2024-50088, CVSSv2 Score: 7.8
- Description:
btrfs: fix uninitialized pointer free in add_inode_ref()
- CVE: https://ubuntu.com/security/CVE-2024-50088
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50088-btrfs-fix-uninitialized-pointer-free-in-add-inode-ref.patch
- From: 6.8.0-56.58
- CVE-2024-50085, CVSSv2 Score: 7.8
- Description:
mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow
- CVE: https://ubuntu.com/security/CVE-2024-50085
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50085-mptcp-pm-fix-uaf-read-in-mptcp-pm-nl-rm-addr-or-subflow.patch
- From: 6.8.0-56.58
- CVE-2024-50083, CVSSv2 Score: 7.5
- Description:
tcp: fix mptcp DSS corruption due to large pmtu xmit
- CVE: https://ubuntu.com/security/CVE-2024-50083
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50083-tcp-fix-mptcp-dss-corruption-due-to-large-pmtu-xmit.patch
- From: 6.8.0-56.58
- CVE-2024-56614, CVSSv2 Score: 7.8
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56614
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 6.8.0-56.58
- CVE-2024-53156, CVSSv2 Score: 7.8
- Description:
wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
- CVE: https://ubuntu.com/security/CVE-2024-53156
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-53156-wifi-ath9k-add-range-check-for-conn-rsp-epid-in-htc-connect-service.patch
- From: 6.8.0-56.58
- CVE-2024-53165, CVSSv2 Score:
- Description:
Out of scope: SuperH architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53165.patch
- From:
- CVE-2024-56582, CVSSv2 Score: 7.8
- Description:
btrfs: fix use-after-free in btrfs_encoded_read_endio()
- CVE: https://ubuntu.com/security/CVE-2024-56582
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-56582-btrfs-fix-use-after-free-in-btrfs-encoded-read-endio.patch
- From: 6.8.0-56.58
- CVE-2024-49865, CVSSv2 Score: 7.8
- Description:
drm/xe/vm: move xa_alloc to prevent UAF
- CVE: https://ubuntu.com/security/CVE-2024-49865
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-49865-drm-xe-vm-move-xa-alloc-to-prevent-uaf.patch
- From: 6.8.0-56.58
- CVE-2024-50055, CVSSv2 Score: 7.8
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://ubuntu.com/security/CVE-2024-50055
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 6.8.0-56.58
- CVE-2024-50047, CVSSv2 Score: 7.8
- Description:
smb: client: fix UAF in async decryption
- CVE: https://ubuntu.com/security/CVE-2024-50047
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50047-smb-client-fix-uaf-in-async-decryption.patch
- From: 6.8.0-56.58
- CVE-2024-50029, CVSSv2 Score: 7.8
- Description:
Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync
- CVE: https://ubuntu.com/security/CVE-2024-50029
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50029-bluetooth-hci-conn-fix-uaf-in-hci-enhanced-setup-sync.patch
- From: 6.8.0-56.58
- CVE-2024-50084, CVSSv2 Score: 7.8
- Description:
net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test()
- CVE: https://ubuntu.com/security/CVE-2024-50084
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50084-net-microchip-vcap-api-fix-memory-leaks-in-vcap-api-encode-rule-test.patch
- From: 6.8.0-56.58
- CVE-2024-50074, CVSSv2 Score: 7.8
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://ubuntu.com/security/CVE-2024-50074
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access.patch
- From: 6.8.0-56.58
- CVE-2024-50073, CVSSv2 Score: 7.8
- Description:
tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
- CVE: https://ubuntu.com/security/CVE-2024-50073
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50073-tty-n-gsm-fix-use-after-free-in-gsm-cleanup-mux.patch
- From: 6.8.0-56.58
- CVE-2024-50061, CVSSv2 Score: 7.0
- Description:
i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2024-50061
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50061-i3c-master-cdns-fix-use-after-free-vulnerability-in-cdns-i3c-master-driver-due-to-race-condition.patch
- From: 6.8.0-56.58
- CVE-2024-50059, CVSSv2 Score: 7.0
- Description:
ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-50059
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50059-ntb-ntb-hw-switchtec-fix-use-after-free-vulnerability-in-switchtec-ntb-remove-due-to-race-condition.patch
- From: 6.8.0-56.58
- CVE-2024-50042, CVSSv2 Score: 7.1
- Description:
ice: Fix increasing MSI-X on VF
- CVE: https://ubuntu.com/security/CVE-2024-50042
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50042-ice-fix-increasing-msi-x-on-vf.patch
- From: 6.8.0-56.58
- CVE-2024-50036, CVSSv2 Score: 7.0
- Description:
net: do not delay dst_entries_add() in dst_release()
- CVE: https://ubuntu.com/security/CVE-2024-50036
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50036-net-do-not-delay-dst-entries-add-in-dst-release.patch
- From: 6.8.0-56.58
- CVE-2024-50035, CVSSv2 Score: 7.1
- Description:
ppp: fix ppp_async_encode() illegal access
- CVE: https://ubuntu.com/security/CVE-2024-50035
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50035-ppp-fix-ppp-async-encode-illegal-access.patch
- From: 6.8.0-56.58
- CVE-2024-50033, CVSSv2 Score: 7.1
- Description:
slip: make slhc_remember() more robust against malicious packets
- CVE: https://ubuntu.com/security/CVE-2024-50033
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50033-slip-make-slhc-remember-more-robust-against-malicious-packets.patch
- From: 6.8.0-56.58
- CVE-2024-50066, CVSSv2 Score: 7.0
- Description:
mm/mremap: fix move_normal_pmd/retract_page_tables race
- CVE: https://ubuntu.com/security/CVE-2024-50066
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50066-mm-mremap-fix-move-normal-pmd-retract-page-tables-race.patch
- From: 6.8.0-56.58
- CVE-2024-50193, CVSSv2 Score:
- Description:
Out of scope: patch for x86_32 arch
- CVE:
- Patch: skipped/CVE-2024-50193.patch
- From:
- CVE-2024-56663, CVSSv2 Score: 7.1
- Description:
wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one
- CVE: https://ubuntu.com/security/CVE-2024-56663
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-56663-wifi-nl80211-fix-nl80211-attr-mlo-link-id-off-by-one.patch
- From: 6.8.0-56.58
- CVE-2024-56663, CVSSv2 Score: 7.1
- Description:
wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one
- CVE: https://ubuntu.com/security/CVE-2024-56663
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-56663-wifi-nl80211-fix-nl80211-attr-mlo-link-id-off-by-one-kpatch.patch
- From: 6.8.0-56.58
- CVE-2024-50086, CVSSv2 Score: 7.0
- Description:
ksmbd: fix user-after-free from session log off
- CVE: https://ubuntu.com/security/CVE-2024-50086
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50086-ksmbd-fix-user-after-free-from-session-log-off.patch
- From: 6.8.0-56.58
- CVE-2024-50086, CVSSv2 Score: 7.0
- Description:
ksmbd: fix user-after-free from session log off
- CVE: https://ubuntu.com/security/CVE-2024-50086
- Patch: ubuntu-noble/6.8.0-56.58/CVE-2024-50086-ksmbd-fix-user-after-free-from-session-log-off-kpatch.patch
- From: 6.8.0-56.58
- CVE-2024-56598, CVSSv2 Score: 7.8
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://ubuntu.com/security/CVE-2024-56598
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 6.8.0-57.59
- CVE-2024-56595, CVSSv2 Score: 7.8
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2024-56595
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 6.8.0-57.59
- CVE-2024-50302, CVSSv2 Score: 7.8
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://ubuntu.com/security/CVE-2024-50302
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 6.8.0-57.59
- CVE-2024-56658, CVSSv2 Score: 7.8
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle.patch
- From: 6.8.0-57.59
- CVE-2024-56658, CVSSv2 Score: 7.8
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56658
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch.patch
- From: 6.1.123-1
- CVE-2024-57798, CVSSv2 Score: 7.8
- Description:
drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-57798-drm-dp-mst-ensure-mst-primary-pointer-is-valid-in-drm-dp-mst-handle-up-req.patch
- From: 6.8.0-57.59
- CVE-2024-56672, CVSSv2 Score: 7.8
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://ubuntu.com/security/CVE-2024-56672
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 6.8.0-57.59
- CVE-2024-53063, CVSSv2 Score: 5.5
- Description:
media: dvbdev: prevent the risk of out of memory access
- CVE: https://ubuntu.com/security/CVE-2024-53063
- Patch: ubuntu-noble/6.8.0-57.59/CVE-2024-53063-media-dvbdev-prevent-the-risk-of-out-of-memory-access.patch
- From: 6.8.0-57.59
- CVE-2024-50067, CVSSv2 Score: 7.8
- Description:
uprobe: avoid out-of-bounds memory access of fetching args
- CVE: https://ubuntu.com/security/CVE-2024-50067
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50067-uprobe-avoid-out-of-bounds-memory-access-of-fetching-args.patch
- From: 6.8.0-58.60
- CVE-2024-50131, CVSSv2 Score: 7.8
- Description:
tracing: Consider the NULL character when validating the event length
- CVE: https://ubuntu.com/security/CVE-2024-50131
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50131-tracing-consider-the-null-character-when-validating-the-event-length.patch
- From: 6.8.0-58.60
- CVE-2024-50127, CVSSv2 Score: 7.8
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://ubuntu.com/security/CVE-2024-50127
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 6.8.0-58.60
- CVE-2024-50126, CVSSv2 Score: 7.8
- Description:
net: sched: use RCU read-side critical section in taprio_dump()
- CVE: https://ubuntu.com/security/CVE-2024-50126
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50126-net-sched-use-rcu-read-side-critical-section-in-taprio-dump.patch
- From: 6.8.0-58.60
- CVE-2024-50125, CVSSv2 Score: 7.8
- Description:
Bluetooth: SCO: Fix UAF on sco_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-50125
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50125-bluetooth-sco-fix-uaf-on-sco-sock-timeout.patch
- From: 6.8.0-58.60
- CVE-2024-50124, CVSSv2 Score: 7.8
- Description:
Bluetooth: ISO: Fix UAF on iso_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-50124
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50124-bluetooth-iso-fix-uaf-on-iso-sock-timeout.patch
- From: 6.8.0-58.60
- CVE-2024-50121, CVSSv2 Score: 7.8
- Description:
nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
- CVE: https://ubuntu.com/security/CVE-2024-50121
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50121-nfsd-cancel-nfsd-shrinker-work-using-sync-mode-in-nfs4-state-shutdown-net.patch
- From: 6.8.0-58.60
- CVE-2024-50051, CVSSv2 Score: 7.8
- Description:
spi: mpc52xx: Add cancel_work_sync before module remove
- CVE: https://ubuntu.com/security/CVE-2024-50051
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50051-spi-mpc52xx-add-cancel-work-sync-before-module-remove.patch
- From: 6.8.0-58.60
- CVE-2024-50209, CVSSv2 Score: 7.8
- Description:
RDMA/bnxt_re: Add a check for memory allocation
- CVE: https://ubuntu.com/security/CVE-2024-50209
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50209-rdma-bnxt-re-add-a-check-for-memory-allocation.patch
- From: 6.8.0-58.60
- CVE-2024-50159, CVSSv2 Score: 7.8
- Description:
firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup()
- CVE: https://ubuntu.com/security/CVE-2024-50159
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50159-firmware-arm-scmi-fix-the-double-free-in-scmi-debugfs-common-setup.patch
- From: 6.8.0-58.60
- CVE-2024-50158, CVSSv2 Score: 7.8
- Description:
RDMA/bnxt_re: Fix out of bound check
- CVE: https://ubuntu.com/security/CVE-2024-50158
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50158-rdma-bnxt-re-fix-out-of-bound-check.patch
- From: 6.8.0-58.60
- CVE-2024-50155, CVSSv2 Score: 7.8
- Description:
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
- CVE: https://ubuntu.com/security/CVE-2024-50155
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50155-netdevsim-use-cond-resched-in-nsim-dev-trap-report-work.patch
- From: 6.8.0-58.60
- CVE-2024-50154, CVSSv2 Score: 7.8
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
- CVE: https://ubuntu.com/security/CVE-2024-50154
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50154-tcp-dccp-don-t-use-timer-pending-in-reqsk-queue-unlink.patch
- From: 6.8.0-58.60
- CVE-2024-53206, CVSSv2 Score: 7.8
- Description:
tcp: Fix use-after-free of nreq in reqsk_timer_handler().
- CVE: https://ubuntu.com/security/CVE-2024-53206
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53206-tcp-Fix-use-after-free-of-nreq-in-reqsk_timer_handler.patch
- From: 6.8.0-58.60
- CVE-2024-50151, CVSSv2 Score: 7.8
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://ubuntu.com/security/CVE-2024-50151
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 6.8.0-58.60
- CVE-2024-50143, CVSSv2 Score: 7.8
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://ubuntu.com/security/CVE-2024-50143
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50143-udf-fix-uninit-value-use-in-udf-get-fileshortad.patch
- From: 6.8.0-58.60
- CVE-2024-50203, CVSSv2 Score:
- Description:
Out of scope: ARM64 architecture issue
- CVE:
- Patch: skipped/CVE-2024-50203.patch
- From:
- CVE-2024-50215, CVSSv2 Score: 7.8
- Description:
nvmet-auth: assign dh_key to NULL after kfree_sensitive
- CVE: https://ubuntu.com/security/CVE-2024-50215
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50215-nvmet-auth-assign-dh-key-to-null-after-kfree-sensitive.patch
- From: 6.8.0-58.60
- CVE-2024-50261, CVSSv2 Score: 7.8
- Description:
macsec: Fix use-after-free while sending the offloading packet
- CVE: https://ubuntu.com/security/CVE-2024-50261
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50261-macsec-fix-use-after-free-while-sending-the-offloading-packet.patch
- From: 6.8.0-58.60
- CVE-2024-50262, CVSSv2 Score: 7.8
- Description:
bpf: Fix out-of-bounds write in trie_get_next_key()
- CVE: https://ubuntu.com/security/CVE-2024-50262
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch
- From: 6.8.0-58.60
- CVE-2024-50257, CVSSv2 Score: 7.8
- Description:
netfilter: Fix use-after-free in get_info()
- CVE: https://ubuntu.com/security/CVE-2024-50257
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50257-netfilter-fix-use-after-free-in-get-info.patch
- From: 6.8.0-58.60
- CVE-2024-50246, CVSSv2 Score: 7.8
- Description:
fs/ntfs3: Add rough attr alloc_size check
- CVE: https://ubuntu.com/security/CVE-2024-50246
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50246-fs-ntfs3-add-rough-attr-alloc-size-check.patch
- From: 6.8.0-58.60
- CVE-2024-50242, CVSSv2 Score: 7.8
- Description:
fs/ntfs3: Additional check in ntfs_file_release
- CVE: https://ubuntu.com/security/CVE-2024-50242
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50242-fs-ntfs3-additional-check-in-ntfs-file-release.patch
- From: 6.8.0-58.60
- CVE-2024-50235, CVSSv2 Score: 7.8
- Description:
wifi: cfg80211: clear wdev->cqm_config pointer on free
- CVE: https://ubuntu.com/security/CVE-2024-50235
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50235-wifi-cfg80211-clear-wdev-cqm-config-pointer-on-free.patch
- From: 6.8.0-58.60
- CVE-2024-50222, CVSSv2 Score: 7.8
- Description:
iov_iter: fix copy_page_from_iter_atomic() if KMAP_LOCAL_FORCE_MAP
- CVE: https://ubuntu.com/security/CVE-2024-50222
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50222-iov-iter-fix-copy-page-from-iter-atomic-if-kmap-local-force-map.patch
- From: 6.8.0-58.60
- CVE-2024-50230, CVSSv2 Score: 7.8
- Description:
nilfs2: fix kernel bug due to missing clearing of checked flag
- CVE: https://ubuntu.com/security/CVE-2024-50230
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50230-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-checked-flag.patch
- From: 6.8.0-58.60
- CVE-2024-53059, CVSSv2 Score: 7.8
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-53059
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53059-wifi-iwlwifi-mvm-fix-response-handling-in-iwl-mvm-send-recovery-cmd.patch
- From: 6.8.0-58.60
- CVE-2024-53061, CVSSv2 Score: 7.8
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://ubuntu.com/security/CVE-2024-53061
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 6.8.0-58.60
- CVE-2024-50286, CVSSv2 Score: 7.8
- Description:
ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create
- CVE: https://ubuntu.com/security/CVE-2024-50286
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50286-ksmbd-fix-slab-use-after-free-in-ksmbd-smb2-session-create.patch
- From: 6.8.0-58.60
- CVE-2024-50283, CVSSv2 Score: 7.8
- Description:
ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp
- CVE: https://ubuntu.com/security/CVE-2024-50283
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50283-ksmbd-fix-slab-use-after-free-in-smb3-preauth-hash-rsp.patch
- From: 6.8.0-58.60
- CVE-2024-50282, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
- CVE: https://ubuntu.com/security/CVE-2024-50282
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50282-drm-amdgpu-add-missing-size-check-in-amdgpu-debugfs-gprwave-read.patch
- From: 6.8.0-58.60
- CVE-2024-50280, CVSSv2 Score: 7.8
- Description:
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
- CVE: https://ubuntu.com/security/CVE-2024-50280
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50280-dm-cache-fix-flushing-uninitialized-delayed-work-on-cache-ctr-error.patch
- From: 6.8.0-58.60
- CVE-2024-50276, CVSSv2 Score: 7.8
- Description:
net: vertexcom: mse102x: Fix possible double free of TX skb
- CVE: https://ubuntu.com/security/CVE-2024-50276
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50276-net-vertexcom-mse102x-fix-possible-double-free-of-tx-skb.patch
- From: 6.8.0-58.60
- CVE-2024-50269, CVSSv2 Score: 7.8
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://ubuntu.com/security/CVE-2024-50269
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 6.8.0-58.60
- CVE-2024-50267, CVSSv2 Score: 7.8
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://ubuntu.com/security/CVE-2024-50267
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 6.8.0-58.60
- CVE-2025-21993, CVSSv2 Score: 7.1
- Description:
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
- CVE: https://ubuntu.com/security/CVE-2025-21993
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2025-21993-iscsi-ibft-fix-ubsan-shift-out-of-bounds-warning-in-ibft-attr-show-nic.patch
- From: 6.8.0-58.60
- CVE-2024-56627, CVSSv2 Score: 7.1
- Description:
ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
- CVE: https://ubuntu.com/security/CVE-2024-56627
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56627-ksmbd-fix-out-of-bounds-read-in-ksmbd-vfs-stream-read.patch
- From: 6.8.0-58.60
- CVE-2024-50234, CVSSv2 Score: 7.0
- Description:
wifi: iwlegacy: Clear stale interrupts before resuming device
- CVE: https://ubuntu.com/security/CVE-2024-50234
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50234-wifi-iwlegacy-clear-stale-interrupts-before-resuming-device.patch
- From: 6.8.0-58.60
- CVE-2024-50301, CVSSv2 Score: 7.1
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://ubuntu.com/security/CVE-2024-50301
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 6.8.0-58.60
- CVE-2024-53082, CVSSv2 Score: 7.1
- Description:
virtio_net: Add hash_key_length check
- CVE: https://ubuntu.com/security/CVE-2024-53082
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53082-virtio-net-add-hash-key-length-check.patch
- From: 6.8.0-58.60
- CVE-2024-50279, CVSSv2 Score: 7.1
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50279
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 6.8.0-58.60
- CVE-2024-50275, CVSSv2 Score: 7.0
- Description:
arm64/sve: Discard stale CPU state when handling SVE traps
- CVE: https://ubuntu.com/security/CVE-2024-50275
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50275-arm64-sve-discard-stale-cpu-state-when-handling-sve-traps.patch
- From: 6.8.0-58.60
- CVE-2024-53062, CVSSv2 Score: 7.1
- Description:
media: mgb4: protect driver against spectre
- CVE: https://ubuntu.com/security/CVE-2024-53062
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53062-media-mgb4-protect-driver-against-spectre.patch
- From: 6.8.0-58.60
- CVE-2024-53099, CVSSv2 Score: 7.1
- Description:
bpf: Check validity of link->type in bpf_link_show_fdinfo()
- CVE: https://ubuntu.com/security/CVE-2024-53099
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53099-bpf-check-validity-of-link-type-in-bpf-link-show-fdinfo.patch
- From: 6.8.0-58.60
- CVE-2024-53108, CVSSv2 Score: 7.1
- Description:
drm/amd/display: Adjust VSDB parser for replay feature
- CVE: https://ubuntu.com/security/CVE-2024-53108
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53108-drm-amd-display-adjust-vsdb-parser-for-replay-feature.patch
- From: 6.8.0-58.60
- CVE-2024-53162, CVSSv2 Score: 7.1
- Description:
crypto: qat/qat_4xxx - fix off by one in uof_get_name()
- CVE: https://ubuntu.com/security/CVE-2024-53162
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53162-crypto-qat-qat-4xxx-fix-off-by-one-in-uof-get-name.patch
- From: 6.8.0-58.60
- CVE-2024-53155, CVSSv2 Score: 7.1
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://ubuntu.com/security/CVE-2024-53155
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 6.8.0-58.60
- CVE-2024-56721, CVSSv2 Score: 7.1
- Description:
x86/CPU/AMD: Terminate the erratum_1386_microcode array
- CVE: https://ubuntu.com/security/CVE-2024-56721
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56721-x86-cpu-amd-terminate-the-erratum-1386-microcode-array.patch
- From: 6.8.0-58.60
- CVE-2024-56650, CVSSv2 Score: 7.1
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://ubuntu.com/security/CVE-2024-56650
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 6.8.0-58.60
- CVE-2024-50112, CVSSv2 Score:
- Description:
The ADDRESS_MASKING config option cannot be turned off. LAM (linear address masking) would be fatal for applications using it.
- CVE:
- Patch: skipped/CVE-2024-50112.patch
- From:
- CVE-2024-53166, CVSSv2 Score: 7.8
- Description:
block, bfq: fix bfqq uaf in bfq_limit_depth()
- CVE: https://ubuntu.com/security/CVE-2024-53166
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53166-block-bfq-fix-bfqq-uaf-in-bfq-limit-depth.patch
- From: 6.8.0-58.60
- CVE-2024-53068, CVSSv2 Score: 7.8
- Description:
firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier()
- CVE: https://ubuntu.com/security/CVE-2024-53068
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53068-firmware-arm-scmi-fix-slab-use-after-free-in-scmi-bus-notifier.patch
- From: 6.8.0-58.60
- CVE-2024-53095, CVSSv2 Score: 7.8
- Description:
smb: client: Fix use-after-free of network namespace.
- CVE: https://ubuntu.com/security/CVE-2024-53095
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53095-smb-client-fix-use-after-free-of-network-namespace.patch
- From: 6.8.0-58.60
- CVE-2024-54680, CVSSv2 Score: 7.8
- Description:
smb: client: fix TCP timers deadlock after rmmod
- CVE: https://ubuntu.com/security/CVE-2024-54680
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-54680-smb-client-fix-TCP-timers-deadlock-after-rmmod.patch
- From: 6.8.0-58.60
- CVE-2024-53139, CVSSv2 Score: 7.8
- Description:
sctp: fix possible UAF in sctp_v6_available()
- CVE: https://ubuntu.com/security/CVE-2024-53139
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53139-sctp-fix-possible-uaf-in-sctp-v6-available.patch
- From: 6.8.0-58.60
- CVE-2024-53126, CVSSv2 Score: 7.8
- Description:
vdpa: solidrun: Fix UB bug with devres
- CVE: https://ubuntu.com/security/CVE-2024-53126
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53126-vdpa-solidrun-fix-ub-bug-with-devres.patch
- From: 6.8.0-58.60
- CVE-2024-53096, CVSSv2 Score: 7.8
- Description:
mm: avoid unsafe VMA hook invocation when error arises on mmap hook
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-01-mm-avoid-unsafe-VMA-hook-invocation-when-error-arises-on-mmap-hook.patch
- From: 6.8.0-58.60
- CVE-2024-53096, CVSSv2 Score: 7.8
- Description:
mm: unconditionally close VMAs on error
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-02-mm-unconditionally-close-VMAs-on-error.patch
- From: 6.8.0-58.60
- CVE-2024-53096, CVSSv2 Score: 7.8
- Description:
mm: refactor map_deny_write_exec()
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-03-mm-refactor-map_deny_write_exec.patch
- From: 6.8.0-58.60
- CVE-2024-53096, CVSSv2 Score: 7.8
- Description:
mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-04-mm-refactor-arch_calc_vm_flag_bits-and-arm64-MTE-handling.patch
- From: 6.8.0-58.60
- CVE-2024-53096, CVSSv2 Score: 7.8
- Description:
mm: resolve faulty mmap_region() error path behaviour
- CVE: https://ubuntu.com/security/CVE-2024-53096
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53096-05-mm-resolve-faulty-mmap_region-error-path-behaviour.patch
- From: 6.8.0-58.60
- CVE-2024-57937, CVSSv2 Score: 5.5
- Description:
mm: reinstate ability to map write-sealed memfd mappings read-only
- CVE: https://ubuntu.com/security/CVE-2024-57937
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57937-mm-reinstate-ability-to-map-write-sealed-memfd-mappings-read-only.patch
- From: 6.8.0-58.60
- CVE-2024-53133, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Handle dml allocation failure to avoid crash
- CVE: https://ubuntu.com/security/CVE-2024-53133
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53133-drm-amd-display-handle-dml-allocation-failure-to-avoid-crash.patch
- From: 6.8.0-58.60
- CVE-2024-53142, CVSSv2 Score:
- Description:
Patch affects initramfs
- CVE:
- Patch: skipped/CVE-2024-53142.patch
- From:
- CVE-2024-53150, CVSSv2 Score: 7.8
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://ubuntu.com/security/CVE-2024-53150
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 6.8.0-58.60
- CVE-2024-53168, CVSSv2 Score: 7.8
- Description:
sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket
- CVE: https://ubuntu.com/security/CVE-2024-53168
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53168-sunrpc-fix-one-uaf-issue-caused-by-sunrpc-kernel-tcp-socket.patch
- From: 6.8.0-58.60
- CVE-2024-53171, CVSSv2 Score: 7.8
- Description:
ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit
- CVE: https://ubuntu.com/security/CVE-2024-53171
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53171-ubifs-authentication-fix-use-after-free-in-ubifs-tnc-end-commit.patch
- From: 6.8.0-58.60
- CVE-2024-53173, CVSSv2 Score: 7.8
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://ubuntu.com/security/CVE-2024-53173
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 6.8.0-58.60
- CVE-2024-53174, CVSSv2 Score: 7.8
- Description:
SUNRPC: make sure cache entry active before cache_show
- CVE: https://ubuntu.com/security/CVE-2024-53174
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53174-sunrpc-make-sure-cache-entry-active-before-cache-show.patch
- From: 6.8.0-58.60
- CVE-2024-53185, CVSSv2 Score: 7.8
- Description:
smb: client: fix NULL ptr deref in crypto_aead_setkey()
- CVE: https://ubuntu.com/security/CVE-2024-53185
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53185-smb-client-fix-null-ptr-deref-in-crypto-aead-setkey.patch
- From: 6.8.0-58.60
- CVE-2024-53191, CVSSv2 Score: 7.8
- Description:
wifi: ath12k: fix warning when unbinding
- CVE: https://ubuntu.com/security/CVE-2024-53191
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53191-wifi-ath12k-fix-warning-when-unbinding.patch
- From: 6.8.0-58.60
- CVE-2024-53197, CVSSv2 Score: 7.8
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 6.8.0-58.60
- CVE-2024-53197, CVSSv2 Score: 7.8
- Description:
ALSA: usb-audio: Fix a DMA to stack memory bug
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53197-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch
- From: 6.8.0-58.60
- CVE-2024-53203, CVSSv2 Score: 7.8
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://ubuntu.com/security/CVE-2024-53203
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53203-usb-typec-fix-potential-array-underflow-in-ucsi-ccg-sync-control.patch
- From: 6.8.0-58.60
- CVE-2024-53208, CVSSv2 Score: 7.8
- Description:
Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync
- CVE: https://ubuntu.com/security/CVE-2024-53208
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53208-bluetooth-mgmt-fix-slab-use-after-free-read-in-set-powered-sync.patch
- From: 6.8.0-58.60
- CVE-2024-53237, CVSSv2 Score: 7.8
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://ubuntu.com/security/CVE-2024-53237
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child.patch
- From: 6.8.0-58.60
- CVE-2024-53227, CVSSv2 Score: 7.8
- Description:
scsi: bfa: Fix use-after-free in bfad_im_module_exit()
- CVE: https://ubuntu.com/security/CVE-2024-53227
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53227-scsi-bfa-fix-use-after-free-in-bfad-im-module-exit.patch
- From: 6.8.0-58.60
- CVE-2024-56538, CVSSv2 Score: 7.8
- Description:
drm: zynqmp_kms: Unplug DRM device before removal
- CVE: https://ubuntu.com/security/CVE-2024-56538
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56538-drm-zynqmp-kms-unplug-drm-device-before-removal.patch
- From: 6.8.0-58.60
- CVE-2024-53218, CVSSv2 Score: 7.8
- Description:
f2fs: fix race in concurrent f2fs_stop_gc_thread
- CVE: https://ubuntu.com/security/CVE-2024-53218
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53218-f2fs-fix-race-in-concurrent-f2fs-stop-gc-thread-52.53.patch
- From: 6.8.0-58.60
- CVE-2024-53213, CVSSv2 Score: 7.8
- Description:
net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
- CVE: https://ubuntu.com/security/CVE-2024-53213
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53213-net-usb-lan78xx-fix-double-free-issue-with-interrupt-buffer-allocation.patch
- From: 6.8.0-58.60
- CVE-2024-56551, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://ubuntu.com/security/CVE-2024-56551
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 6.8.0-58.60
- CVE-2024-53232, CVSSv2 Score:
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53232.patch
- From:
- CVE-2024-53228, CVSSv2 Score:
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53228.patch
- From:
- CVE-2024-50274, CVSSv2 Score: 7.8
- Description:
idpf: avoid vport access in idpf_get_link_ksettings
- CVE: https://ubuntu.com/security/CVE-2024-50274
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50274-idpf-avoid-vport-access-in-idpf-get-link-ksettings.patch
- From: 6.8.0-58.60
- CVE-2024-50274, CVSSv2 Score: 7.8
- Description:
idpf: avoid vport access in idpf_get_link_ksettings
- CVE: https://ubuntu.com/security/CVE-2024-50274
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50274-idpf-avoid-vport-access-in-idpf-get-link-ksettings-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-50221, CVSSv2 Score:
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-50221.patch
- From:
- CVE-2024-50226, CVSSv2 Score: 7.8
- Description:
cxl/port: Fix use-after-free, permit out-of-order decoder shutdown
- CVE: https://ubuntu.com/security/CVE-2024-50226
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50226-cxl-port-fix-use-after-free-permit-out-of-order-decoder-shutdown.patch
- From: 6.8.0-58.60
- CVE-2024-56606, CVSSv2 Score: 7.8
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56606
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 6.8.0-58.60
- CVE-2024-56608, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'
- CVE: https://ubuntu.com/security/CVE-2024-56608
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56608-drm-amd-display-fix-out-of-bounds-access-in-dcn21-link-encoder-create.patch
- From: 6.8.0-58.60
- CVE-2024-56615, CVSSv2 Score: 7.8
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56615
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 6.8.0-58.60
- CVE-2024-56619, CVSSv2 Score: 7.8
- Description:
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-56619
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56619-nilfs2-fix-potential-out-of-bounds-memory-access-in-nilfs-find-entry.patch
- From: 6.8.0-58.60
- CVE-2024-56626, CVSSv2 Score: 7.8
- Description:
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
- CVE: https://ubuntu.com/security/CVE-2024-56626
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56626-ksmbd-fix-out-of-bounds-write-in-ksmbd-vfs-stream-write.patch
- From: 6.8.0-58.60
- CVE-2024-56631, CVSSv2 Score: 7.8
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://ubuntu.com/security/CVE-2024-56631
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 6.8.0-58.60
- CVE-2024-56635, CVSSv2 Score: 7.8
- Description:
net: avoid potential UAF in default_operstate()
- CVE: https://ubuntu.com/security/CVE-2024-56635
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56635-net-avoid-potential-uaf-in-default-operstate.patch
- From: 6.8.0-58.60
- CVE-2024-56640, CVSSv2 Score: 7.8
- Description:
net/smc: fix LGR and link use-after-free issue
- CVE: https://ubuntu.com/security/CVE-2024-56640
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56640-net-smc-fix-lgr-and-link-use-after-free-issue.patch
- From: 6.8.0-58.60
- CVE-2024-56642, CVSSv2 Score: 7.8
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://ubuntu.com/security/CVE-2024-56642
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 6.8.0-58.60
- CVE-2024-56661, CVSSv2 Score: 7.8
- Description:
tipc: fix NULL deref in cleanup_bearer()
- CVE: https://ubuntu.com/security/CVE-2024-56661
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56661-tipc-fix-NULL-deref-in-cleanup_bearer.patch
- From: 6.8.0-58.60
- CVE-2024-56651, CVSSv2 Score: 7.8
- Description:
can: hi311x: hi3110_can_ist(): fix potential use-after-free
- CVE: https://ubuntu.com/security/CVE-2024-56651
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56651-can-hi311x-hi3110-can-ist-fix-potential-use-after-free.patch
- From: 6.8.0-58.60
- CVE-2024-56765, CVSSv2 Score:
- Description:
powerpc arch not supported
- CVE:
- Patch: skipped/CVE-2024-56765.patch
- From:
- CVE-2024-56693, CVSSv2 Score: 7.8
- Description:
brd: defer automatic disk creation until module initialization succeeds
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56693-brd-defer-automatic-disk-creation-until-module-initialization-succeeds.patch
- From: 6.8.0-58.60
- CVE-2024-56708, CVSSv2 Score: 7.8
- Description:
EDAC/igen6: Avoid segmentation fault on module unload
- CVE: https://ubuntu.com/security/CVE-2024-56708
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56708-edac-igen6-avoid-segmentation-fault-on-module-unload.patch
- From: 6.8.0-58.60
- CVE-2024-56678, CVSSv2 Score:
- Description:
powerpc: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-56678.patch
- From:
- CVE-2024-56704, CVSSv2 Score: 7.8
- Description:
9p/xen: fix release of IRQ
- CVE: https://ubuntu.com/security/CVE-2024-56704
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 6.8.0-58.60
- CVE-2024-57850, CVSSv2 Score: 7.8
- Description:
jffs2: Prevent rtime decompress memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-57850
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57850-jffs2-prevent-rtime-decompress-memory-corruption.patch
- From: 6.8.0-58.60
- CVE-2024-57850, CVSSv2 Score: 7.8
- Description:
jffs2: Fix rtime decompressor
- CVE: https://ubuntu.com/security/CVE-2024-57850
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-57850-jffs2-Fix-rtime-decompressor.patch
- From: 6.8.0-58.60
- CVE-2024-56772, CVSSv2 Score: 7.8
- Description:
kunit: string-stream: Fix a UAF bug in kunit_init_suite()
- CVE: https://ubuntu.com/security/CVE-2024-56772
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56772-kunit-string-stream-fix-a-uaf-bug-in-kunit-init-suite.patch
- From: 6.8.0-58.60
- CVE-2024-56775, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix handling of plane refcount
- CVE: https://ubuntu.com/security/CVE-2024-56775
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56775-drm-amd-display-fix-handling-of-plane-refcount.patch
- From: 6.8.0-58.60
- CVE-2025-21700, CVSSv2 Score: 7.8
- Description:
net: sched: Disallow replacing of child qdisc from one parent to another
- CVE: https://ubuntu.com/security/CVE-2025-21700
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2025-21700-net-sched-disallow-replacing-of-child-qdisc-from-one-parent-to-another.patch
- From: 6.8.0-58.60
- CVE-2024-50115, CVSSv2 Score: 7.1
- Description:
KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
- CVE: https://ubuntu.com/security/CVE-2024-50115
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50115-kvm-nsvm-ignore-ncr3-4-0-when-loading-pdptes-from-memory.patch
- From: 6.8.0-58.60
- CVE-2024-50250, CVSSv2 Score: 7.1
- Description:
iomap: improve shared block detection in iomap_unshare_iter
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-iomap-improve-shared-block-detection-in-iomap_unshare_iter.patch
- From: 6.8.0-58.60
- CVE-2024-50250, CVSSv2 Score: 7.1
- Description:
iomap: don't bother unsharing delalloc extents
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-iomap-don-t-bother-unsharing-delalloc-extents.patch
- From: 6.8.0-58.60
- CVE-2024-50250, CVSSv2 Score: 7.1
- Description:
iomap: share iomap_unshare_iter predicate code with fsdax
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-iomap-share-iomap_unshare_iter-predicate-code-with-fsdax.patch
- From: 6.8.0-58.60
- CVE-2024-50250, CVSSv2 Score: 7.1
- Description:
fsdax: remove zeroing code from dax_unshare_iter
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-fsdax-remove-zeroing-code-from-dax_unshare_iter.patch
- From: 6.8.0-58.60
- CVE-2024-50250, CVSSv2 Score: 7.1
- Description:
fsdax: dax_unshare_iter needs to copy entire blocks
- CVE: https://ubuntu.com/security/CVE-2024-50250
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50250-fsdax-dax-unshare-iter-needs-to-copy-entire-blocks.patch
- From: 6.8.0-58.60
- CVE-2024-50247, CVSSv2 Score: 7.1
- Description:
fs/ntfs3: Check if more than chunk-size bytes are written
- CVE: https://ubuntu.com/security/CVE-2024-50247
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50247-fs-ntfs3-check-if-more-than-chunk-size-bytes-are-written.patch
- From: 6.8.0-58.60
- CVE-2024-50278, CVSSv2 Score: 7.1
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_bit-when-resizing.patch
- From: 6.8.0-58.60
- CVE-2024-50278, CVSSv2 Score: 7.1
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 6.8.0-58.60
- CVE-2024-50268, CVSSv2 Score: 7.1
- Description:
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-50268
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50268-usb-typec-fix-potential-out-of-bounds-in-ucsi-ccg-update-set-new-cam-cmd.patch
- From: 6.8.0-58.60
- CVE-2024-41014, CVSSv2 Score: 7.1
- Description:
xfs: add bounds checking to xlog_recover_process_data
- CVE: https://ubuntu.com/security/CVE-2024-41014
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-41014-xfs-add-bounds-checking-to-xlog-recover-process-data.patch
- From: 6.8.0-58.60
- CVE-2024-50128, CVSSv2 Score: 7.1
- Description:
net: wwan: fix global oob in wwan_rtnl_policy
- CVE: https://ubuntu.com/security/CVE-2024-50128
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50128-net-wwan-fix-global-oob-in-wwan-rtnl-policy.patch
- From: 6.8.0-58.60
- CVE-2024-50128, CVSSv2 Score: 7.1
- Description:
net: wwan: fix global oob in wwan_rtnl_policy
- CVE: https://ubuntu.com/security/CVE-2024-50128
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-50128-net-wwan-fix-global-oob-in-wwan-rtnl-policy-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-53194, CVSSv2 Score: 7.8
- Description:
PCI: Fix use-after-free of slot->bus on hot remove
- CVE: https://ubuntu.com/security/CVE-2024-53194
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53194-pci-fix-use-after-free-of-slot-bus-on-hot-remove.patch
- From: 6.8.0-58.60
- CVE-2024-53194, CVSSv2 Score: 7.8
- Description:
PCI: Fix use-after-free of slot->bus on hot remove
- CVE: https://ubuntu.com/security/CVE-2024-53194
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53194-pci-fix-use-after-free-of-slot-bus-on-hot-remove-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-53239, CVSSv2 Score: 7.8
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53239-alsa-6fire-release-resources-at-card-release.patch
- From: 6.8.0-58.60
- CVE-2024-53239, CVSSv2 Score: 7.8
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53239-alsa-6fire-release-resources-at-card-release-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-56548, CVSSv2 Score: 7.8
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times.patch
- From: 6.8.0-58.60
- CVE-2024-56548, CVSSv2 Score: 7.8
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-53177, CVSSv2 Score: 7.8
- Description:
smb: prevent use-after-free due to open_cached_dir error paths
- CVE: https://ubuntu.com/security/CVE-2024-53177
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53177-smb-prevent-use-after-free-due-to-open_cached_dir-er.patch
- From: 6.8.0-58.60
- CVE-2024-53177, CVSSv2 Score: 7.8
- Description:
smb: prevent use-after-free due to open_cached_dir error paths
- CVE: https://ubuntu.com/security/CVE-2024-53177
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-53177-smb-prevent-use-after-free-due-to-open_cached_dir-er-kpatch.patch
- From: 6.8.0-58.60
- CVE-2024-56600, CVSSv2 Score: 7.8
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://ubuntu.com/security/CVE-2024-56600
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 6.8.0-58.60
- CVE-2024-56581, CVSSv2 Score: 7.8
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://ubuntu.com/security/CVE-2024-56581
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 6.8.0-58.60
- CVE-2024-56558, CVSSv2 Score: 7.8
- Description:
nfsd: make sure exp active before svc_export_show
- CVE: https://ubuntu.com/security/CVE-2024-56558
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56558-nfsd-make-sure-exp-active-before-svc-export-show.patch
- From: 6.8.0-58.60
- CVE-2024-56605, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://ubuntu.com/security/CVE-2024-56605
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 6.8.0-58.60
- CVE-2024-58009, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc
- CVE: https://ubuntu.com/security/CVE-2024-58009
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-58009-bluetooth-l2cap-handle-null-sock-pointer-in-l2cap.patch
- From: 6.8.0-58.60
- CVE-2024-56604, CVSSv2 Score: 7.8
- Description:
Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()
- CVE: https://ubuntu.com/security/CVE-2024-56604
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56604-bluetooth-rfcomm-avoid-leaving-dangling-sk-pointer-in-rfcomm-sock-alloc.patch
- From: 6.8.0-58.60
- CVE-2024-56603, CVSSv2 Score: 7.8
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://ubuntu.com/security/CVE-2024-56603
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 6.8.0-58.60
- CVE-2024-56602, CVSSv2 Score: 7.8
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://ubuntu.com/security/CVE-2024-56602
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 6.8.0-58.60
- CVE-2024-56601, CVSSv2 Score: 7.8
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56601
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 6.8.0-58.60
- CVE-2024-56596, CVSSv2 Score: 7.8
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://ubuntu.com/security/CVE-2024-56596
- Patch: ubuntu-noble/6.8.0-58.60/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 6.8.0-58.60