- kernel-5.15.0-1072.81 (ubuntu-jammy-azure)
- 5.15.0-1078.87
- 2025-01-21 21:36:15
- 2025-01-24 11:08:32
- K20250121_11
- CVE-2024-39496, CVSSv2 Score: 7.8
- Description:
btrfs: zoned: fix use-after-free due to race with dev replace
- CVE: https://ubuntu.com/security/CVE-2024-39496
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-39496-btrfs-zoned-fix-use-after-free-due-to-race-with-dev-replace.patch
- From: 5.15.0-122.132
- CVE-2024-42228, CVSSv2 Score: 7.0
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://ubuntu.com/security/CVE-2024-42228
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu_vce_cs_reloc.patch
- From: 5.15.0-122.132
- CVE-2024-39494, CVSSv2 Score: 7.8
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://ubuntu.com/security/CVE-2024-39494
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-39494-ima-fix-use-after-free-on-a-dentry-s-dname-name.patch
- From: 5.15.0-122.132
- CVE-2024-42160, CVSSv2 Score: 7.8
- Description:
f2fs: check validation of fault attrs in
- CVE: https://ubuntu.com/security/CVE-2024-42160
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-42160-f2fs-check-validation-of-fault-attrs-in-f2fs_build_fault_attr.patch
- From: 5.15.0-122.132
- CVE-2024-27012, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: restore set elements when delete set fails
- CVE: https://ubuntu.com/security/CVE-2024-27012
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-27012-netfilter-nf-tables-restore-set-elements-when-delete-set-fails.patch
- From: 5.15.0-122.132
- CVE-2024-26677, CVSSv2 Score: 5.5
- Description:
rxrpc: Fix delayed ACKs to not set the reference serial number
- CVE: https://ubuntu.com/security/CVE-2024-26677
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-26677-rxrpc-Fix-delayed-ACKs-to-not-set-the-reference-serial-number.patch
- From: 5.15.0-122.132
- CVE-2024-26677, CVSSv2 Score: 5.5
- Description:
rxrpc: Fix delayed ACKs to not set the reference serial number (Adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26677
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-26677-rxrpc-Fix-delayed-ACKs-to-not-set-the-reference-serial-number-kpatch.patch
- From: 5.15.0-122.132
- CVE-2024-41009, CVSSv2 Score: 5.5
- Description:
bpf: Fix overrunning reservations in ringbuf
- CVE: https://ubuntu.com/security/CVE-2024-41009
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-41009-bpf-Fix-overrunning-reservations-in-ringbuf.patch
- From: 5.15.0-122.132
- CVE-2024-41009, CVSSv2 Score: 5.5
- Description:
bpf: Fix overrunning reservations in ringbuf (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-41009
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-41009-bpf-Fix-overrunning-reservations-in-ringbuf-kpatch.patch
- From: 5.15.0-122.132
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://ubuntu.com/security/CVE-2024-38570
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-38570-01-gfs2-Rename-sd_-glock-kill-_wait.patch
- From: kernel-5.15.0-122.132
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://ubuntu.com/security/CVE-2024-38570
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-38570-02-gfs2-Fix-potential-glock-use-after-free-on-unmount.patch
- From: kernel-5.15.0-122.132
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://ubuntu.com/security/CVE-2024-38570
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-38570-02-gfs2-Fix-potential-glock-use-after-free-on-unmount-kpatch.patch
- From: kernel-5.15.0-122.132
- CVE-2024-38630, CVSSv2 Score: 7.8
- Description:
watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
- CVE: https://ubuntu.com/security/CVE-2024-38630
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-38630-watchdog-cpu5wdt-c-fix-use-after-free-bug-caused-by-cpu5wdt-trigger.patch
- From: 5.15.0-124.134
- CVE-2024-45016, CVSSv2 Score: 5.5
- Description:
netem: fix return value if duplicate enqueue fails
- CVE: https://ubuntu.com/security/CVE-2024-45016
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-45016-netem-fix-return-value-if-duplicate-enqueue-fails.patch
- From: 5.15.0-124.134
- CVE-2024-27397, CVSSv2 Score: 7
- Description:
netfilter: netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://ubuntu.com/security/CVE-2024-27397
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout.patch
- From: 5.15.0-124.134
- CVE-2024-27397, CVSSv2 Score: 7
- Description:
netfilter: netfilter: nf_tables: use timestamp to check for set element timeout kpatch
- CVE: https://ubuntu.com/security/CVE-2024-27397
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout-kpatch.patch
- From: 5.15.0-124.134
- CVE-2024-44986, CVSSv2 Score: 7.8
- Description:
ipv6: fix possible UAF in ip6_finish_output2()
- CVE: https://ubuntu.com/security/CVE-2024-44986
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44986-ipv6-fix-possible-UAF-in-ip6_finish_output2.patch
- From: 5.15.0-125.135
- CVE-2024-44987, CVSSv2 Score: 7.8
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://ubuntu.com/security/CVE-2024-44987
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44987-ipv6-prevent-UAF-in-ip6_send_skb.patch
- From: 5.15.0-125.135
- CVE-2024-44998, CVSSv2 Score: 7.8
- Description:
atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://ubuntu.com/security/CVE-2024-44998
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue_rx.patch
- From: 5.15.0-125.135
- CVE-2024-45026, CVSSv2 Score:
- Description:
Architecture is not supported
- CVE:
- Patch: skipped/CVE-2024-45026.patch
- From:
- CVE-2024-46673, CVSSv2 Score: 7.8
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://ubuntu.com/security/CVE-2024-46673
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46673-scsi-aacraid-Fix-double-free-on-probe-failure.patch
- From: 5.15.0-125.135
- CVE-2024-46725, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: Fix out-of-bounds write warning
- CVE: https://ubuntu.com/security/CVE-2024-46725
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46725-drm-amdgpu-Fix-out-of-bounds-write-warning.patch
- From: 5.15.0-125.135
- CVE-2024-46738, CVSSv2 Score: 7.8
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://ubuntu.com/security/CVE-2024-46738
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46738-VMCI-Fix-use-after-free-when-removing-resource-in-vmci_resource_remove.patch
- From: 5.15.0-125.135
- CVE-2024-46740, CVSSv2 Score: 7.8
- Description:
binder: fix UAF caused by offsets overwrite
- CVE: https://ubuntu.com/security/CVE-2024-46740
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46740-binder-fix-UAF-caused-by-offsets-overwrite.patch
- From: 5.15.0-125.135
- CVE-2024-46744, CVSSv2 Score: 7.8
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://ubuntu.com/security/CVE-2024-46744
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46744-Squashfs-sanity-check-symbolic-link-size.patch
- From: 5.15.0-125.135
- CVE-2024-46746, CVSSv2 Score: 7.8
- Description:
HID: amd_sfh: free driver_data after destroying hid device
- CVE: https://ubuntu.com/security/CVE-2024-46746
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46746-HID-amd_sfh-free-driver_data-after-destroying-hid-device.patch
- From: 5.15.0-125.135
- CVE-2024-41059, CVSSv2 Score: 7.1
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://ubuntu.com/security/CVE-2024-41059
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy-name.patch
- From: 5.15.0-125.135
- CVE-2024-44999, CVSSv2 Score: 7.1
- Description:
gtp: pull network headers in gtp_dev_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-44999
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44999-gtp-pull-network-headers-in-gtp-dev-xmit.patch
- From: 5.15.0-125.135
- CVE-2024-41090, CVSSv2 Score: 7.1
- Description:
tap: add missing verification for short frame
- CVE: https://ubuntu.com/security/CVE-2024-41090
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.15.0-125.135
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://ubuntu.com/security/CVE-2024-41091
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.15.0-125.135
- CVE-2024-46731, CVSSv2 Score: 7.1
- Description:
drm/amd/pm: fix the Out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46731
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46731-drm-amd-pm-fix-the-out-of-bounds-read-warning.patch
- From: 5.15.0-125.135
- CVE-2024-46723, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46723
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.15.0-125.135
- CVE-2024-46844, CVSSv2 Score: 7.8
- Description:
um: line: always fill *error_out in setup_one_line()
- CVE: https://ubuntu.com/security/CVE-2024-46844
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46844-um-line-always-fill-error-out-in-setup-one-line.patch
- From: 5.15.0-125.135
- CVE-2024-46722, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46722
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.15.0-125.135
- CVE-2024-43882, CVSSv2 Score: 7.0
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://ubuntu.com/security/CVE-2024-43882
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.15.0-125.135
- CVE-2024-46724, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://ubuntu.com/security/CVE-2024-46724
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46724-drm-amdgpu-fix-out-of-bounds-read-of-df-v1-7-channel-number.patch
- From: 5.15.0-125.135
- CVE-2024-46747, CVSSv2 Score: 7.1
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://ubuntu.com/security/CVE-2024-46747
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.15.0-125.135
- CVE-2024-46743, CVSSv2 Score: 7.1
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://ubuntu.com/security/CVE-2024-46743
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.15.0-125.135
- CVE-2024-44983, CVSSv2 Score: 7.1
- Description:
netfilter: flowtable: validate vlan header
- CVE: https://ubuntu.com/security/CVE-2024-44983
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44983-netfilter-flowtable-validate-vlan-header.patch
- From: 5.15.0-125.135
- CVE-2024-36484, CVSSv2 Score: 5.5
- Description:
net: relax socket state check at accept time.
- CVE: https://ubuntu.com/security/CVE-2024-36484
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-36484-net-relax-socket-state-check-at-accept-time.patch
- From: 5.15.0-125.135
- CVE-2024-38602, CVSSv2 Score: 5.5
- Description:
ax25: Fix reference count leak issues of ax25_dev
- CVE: https://ubuntu.com/security/CVE-2024-38602
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-38602-ax25-fix-reference-count-leak-issues-of-ax25-dev.patch
- From: 5.15.0-125.135
- CVE-2024-40915, CVSSv2 Score:
- Description:
CVE patch is for RISCV arch only
- CVE:
- Patch: skipped/CVE-2024-40915.patch
- From:
- CVE-2022-48666, CVSSv2 Score: 7.4
- Description:
scsi: core: Fix a use-after-free
- CVE: https://ubuntu.com/security/CVE-2022-48666
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2022-48666-scsi-core-fix-a-use-after-free.patch
- From: 5.15.0-125.135
- CVE-2022-48666, CVSSv2 Score: 7.4
- Description:
scsi: core: Fix a use-after-free
- CVE: https://ubuntu.com/security/CVE-2022-48666
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2022-48666-scsi-core-fix-a-use-after-free-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-26669, CVSSv2 Score: 5.5
- Description:
net/sched: flower: Fix chain template offload
- CVE: https://ubuntu.com/security/CVE-2024-26669
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26669-net-sched-flower-Fix-chain-template-offload.patch
- From: 5.15.0-125.135
- CVE-2024-26669, CVSSv2 Score: 5.5
- Description:
net/sched: flower: Fix chain template offload
- CVE: https://ubuntu.com/security/CVE-2024-26669
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26669-net-sched-flower-Fix-chain-template-offload-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-41073, CVSSv2 Score: 7.8
- Description:
nvme: avoid double free special payload
- CVE: https://ubuntu.com/security/CVE-2024-41073
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41073-nvme-avoid-double-free-special-payload.patch
- From: 5.15.0-125.135
- CVE-2024-41070, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41070.patch
- From:
- CVE-2024-42284, CVSSv2 Score: 7.8
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://ubuntu.com/security/CVE-2024-42284
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.15.0-125.135
- CVE-2024-42280, CVSSv2 Score: 7.8
- Description:
mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://ubuntu.com/security/CVE-2024-42280
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42280-misdn-fix-a-use-after-free-in-hfcmulti-tx.patch
- From: 5.15.0-125.135
- CVE-2024-42271, CVSSv2 Score: 7.8
- Description:
net/iucv: fix use after free in iucv_sock_close()
- CVE: https://ubuntu.com/security/CVE-2024-42271
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv-sock-close.patch
- From: 5.15.0-125.135
- CVE-2024-41011, CVSSv2 Score: 7.8
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://ubuntu.com/security/CVE-2024-41011
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 5.15.0-125.135
- CVE-2024-41071, CVSSv2 Score: 7.8
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://ubuntu.com/security/CVE-2024-41071
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41071-wifi-mac80211-avoid-address-calculations-via-out-of-bounds-array-indexing.patch
- From: 5.15.0-125.135
- CVE-2024-47659, CVSSv2 Score: 8.8
- Description:
smack: tcp: ipv4, fix incorrect labeling
- CVE: https://ubuntu.com/security/CVE-2024-47659
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-47659-smack-tcp-ipv4-fix-incorrect-labeling.patch
- From: 5.15.0-125.135
- CVE-2024-38577, CVSSv2 Score: 7.8
- Description:
rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
- CVE: https://ubuntu.com/security/CVE-2024-38577
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-38577-rcu-tasks-fix-show-rcu-tasks-trace-gp-kthread-buffer-overflow.patch
- From: 5.15.0-125.135
- CVE-2024-42285, CVSSv2 Score: 7.8
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://ubuntu.com/security/CVE-2024-42285
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42285-RDMA-iwcm-Fix-a-use-after-free-related-to-destroying-CM-IDs.patch
- From: 5.15.0-125.135
- CVE-2024-42301, CVSSv2 Score: 7.8
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://ubuntu.com/security/CVE-2024-42301
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 5.15.0-125.135
- CVE-2024-42302, CVSSv2 Score:
- Description:
Patched function waits for external events, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-42302.patch
- From:
- CVE-2024-42313, CVSSv2 Score: 7.8
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://ubuntu.com/security/CVE-2024-42313
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 5.15.0-125.135
- CVE-2024-43858, CVSSv2 Score: 7.8
- Description:
jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://ubuntu.com/security/CVE-2024-43858
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43858-jfs-fix-array-index-out-of-bounds-in-difree.patch
- From: 5.15.0-125.135
- CVE-2024-43873, CVSSv2 Score: 7.8
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://ubuntu.com/security/CVE-2024-43873
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43873-vhost-vsock-always-initialize-seqpacket-allow.patch
- From: 5.15.0-125.135
- CVE-2024-43873, CVSSv2 Score: 7.8
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://ubuntu.com/security/CVE-2024-43873
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43873-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-44934, CVSSv2 Score: 7.8
- Description:
net: bridge: mcast: wait for previous gc cycles when removing port
- CVE: https://ubuntu.com/security/CVE-2024-44934
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44934-net-bridge-mcast-wait-for-previous-gc-cycles-when-removing-port.patch
- From: 5.15.0-125.135
- CVE-2024-44974, CVSSv2 Score: 7.8
- Description:
mptcp: pm: avoid possible UaF when selecting endp
- CVE: https://ubuntu.com/security/CVE-2024-44974
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44974-mptcp-pm-avoid-possible-UaF-when-selecting-endp.patch
- From: 5.15.0-125.135
- CVE-2024-44985, CVSSv2 Score: 7.8
- Description:
ipv6: prevent possible UAF in ip6_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-44985
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44985-ipv6-prevent-possible-UAF-in-ip6_xmit.patch
- From: 5.15.0-125.135
- CVE-2024-41015, CVSSv2 Score: 5.5
- Description:
ocfs2: add bounds checking to ocfs2_check_dir_entry()
- CVE: https://ubuntu.com/security/CVE-2024-41015
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41015-ocfs2-add-bounds-checking-to-ocfs2-check-dir-entry.patch
- From: 5.15.0-125.135
- CVE-2024-41017, CVSSv2 Score: 5.5
- Description:
jfs: don't walk off the end of ealist
- CVE: https://ubuntu.com/security/CVE-2024-41017
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41017-jfs-don-t-walk-off-the-end-of-ealist.patch
- From: 5.15.0-125.135
- CVE-2024-41019, CVSSv2 Score: 5.5
- Description:
fs/ntfs3: Validate ff offset
- CVE: https://ubuntu.com/security/CVE-2024-41019
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41019-fs-ntfs3-validate-ff-offset.patch
- From: 5.15.0-125.135
- CVE-2024-41020, CVSSv2 Score: 5.5
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://ubuntu.com/security/CVE-2024-41020
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41020-filelock-Remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 5.15.0-125.135
- CVE-2024-41022, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
- CVE: https://ubuntu.com/security/CVE-2024-41022
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41022-drm-amdgpu-fix-signedness-bug-in-sdma-v4-0-process-trap-irq.patch
- From: 5.15.0-125.135
- CVE-2024-41042, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://ubuntu.com/security/CVE-2024-41042
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41042-netfilter-nf-tables-prefer-nft-chain-validate.patch
- From: 5.15.0-125.135
- CVE-2024-41060, CVSSv2 Score: 5.5
- Description:
drm/radeon: check bo_va->bo is non-NULL before using it
- CVE: https://ubuntu.com/security/CVE-2024-41060
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41060-drm-radeon-check-bo-va-bo-is-non-null-before-using-it.patch
- From: 5.15.0-125.135
- CVE-2024-41063, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
- CVE: https://ubuntu.com/security/CVE-2024-41063
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41063-bluetooth-hci-core-cancel-all-works-upon-hci-unregister-dev.patch
- From: 5.15.0-125.135
- CVE-2024-41064, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41064.patch
- From:
- CVE-2024-41065, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41065.patch
- From:
- CVE-2024-41068, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-41068.patch
- From:
- CVE-2024-41072, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
- CVE: https://ubuntu.com/security/CVE-2024-41072
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41072-wifi-cfg80211-wext-add-extra-siocsiwscan-data-check.patch
- From: 5.15.0-125.135
- CVE-2024-41077, CVSSv2 Score: 5.5
- Description:
null_blk: fix validation of block size
- CVE: https://ubuntu.com/security/CVE-2024-41077
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41077-null-blk-fix-validation-of-block-size.patch
- From: 5.15.0-125.135
- CVE-2024-41078, CVSSv2 Score: 5.5
- Description:
btrfs: qgroup: fix quota root leak after quota disable failure
- CVE: https://ubuntu.com/security/CVE-2024-41078
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41078-btrfs-qgroup-fix-quota-root-leak-after-quota-disable-failure.patch
- From: 5.15.0-125.135
- CVE-2024-41081, CVSSv2 Score: 5.5
- Description:
ila: block BH in ila_output()
- CVE: https://ubuntu.com/security/CVE-2024-41081
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41081-ila-block-bh-in-ila-output.patch
- From: 5.15.0-125.135
- CVE-2024-41098, CVSSv2 Score: 5.5
- Description:
ata: libata-core: Fix null pointer dereference on error
- CVE: https://ubuntu.com/security/CVE-2024-41098
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41098-ata-libata-core-fix-null-pointer-dereference-on-error.patch
- From: 5.15.0-125.135
- CVE-2024-42114, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
- CVE: https://ubuntu.com/security/CVE-2024-42114
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values.patch
- From: 5.15.0-125.135
- CVE-2024-42114, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-42114
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42246, CVSSv2 Score: 5.5
- Description:
net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
- CVE: https://ubuntu.com/security/CVE-2024-42246
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42246-net-sunrpc-remap-eperm-in-case-of-connection-failure-in-xs-tcp-setup-socket.patch
- From: 5.15.0-125.135
- CVE-2024-42126, CVSSv2 Score:
- Description:
powerpc arch not supported.
- CVE:
- Patch: skipped/CVE-2024-42126.patch
- From:
- CVE-2024-42259, CVSSv2 Score: 5.5
- Description:
drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
- CVE: https://ubuntu.com/security/CVE-2024-42259
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42259-drm-i915-gem-fix-virtual-memory-mapping-boundaries-calculation.patch
- From: 5.15.0-125.135
- CVE-2024-43839, CVSSv2 Score: 7.8
- Description:
bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
- CVE: https://ubuntu.com/security/CVE-2024-43839
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43839-bna-adjust-name-buf-size-of-bna-tcb-and-bna-ccb-structures.patch
- From: 5.15.0-125.135
- CVE-2024-46782, CVSSv2 Score: 7.8
- Description:
ila: call nf_unregister_net_hooks() sooner
- CVE: https://ubuntu.com/security/CVE-2024-46782
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46782-ila-call-nf_unregister_net_hooks-sooner-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-42265, CVSSv2 Score: 5.5
- Description:
protect the fetch of ->fd[fd] in do_dup2() from mispredictions
- CVE: https://ubuntu.com/security/CVE-2024-42265
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42265-protect-the-fetch-of-fd-fd-in-do-dup2-from-mispredictions.patch
- From: 5.15.0-125.135
- CVE-2024-42267, CVSSv2 Score:
- Description:
RISCV arch not supported.
- CVE:
- Patch: skipped/CVE-2024-42267.patch
- From:
- CVE-2024-42269, CVSSv2 Score: 5.5
- Description:
netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init().
- CVE: https://ubuntu.com/security/CVE-2024-42269
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42269-netfilter-iptables-fix-potential-null-ptr-deref-in-ip6table-nat-table-init.patch
- From: 5.15.0-125.135
- CVE-2024-42277, CVSSv2 Score: 5.5
- Description:
iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en
- CVE: https://ubuntu.com/security/CVE-2024-42277
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42277-iommu-sprd-avoid-null-deref-in-sprd-iommu-hw-en.patch
- From: 5.15.0-125.135
- CVE-2024-42281, CVSSv2 Score: 5.5
- Description:
bpf: Fix a segment issue when downgrading gso_size
- CVE: https://ubuntu.com/security/CVE-2024-42281
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42281-bpf-fix-a-segment-issue-when-downgrading-gso-size.patch
- From: 5.15.0-125.135
- CVE-2024-42283, CVSSv2 Score: 5.5
- Description:
net: nexthop: Initialize all fields in dumped nexthops
- CVE: https://ubuntu.com/security/CVE-2024-42283
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42283-net-nexthop-initialize-all-fields-in-dumped-nexthops.patch
- From: 5.15.0-125.135
- CVE-2024-42296, CVSSv2 Score: 5.5
- Description:
f2fs: fix return value of f2fs_convert_inline_inode()
- CVE: https://ubuntu.com/security/CVE-2024-42296
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42296-f2fs-fix-return-value-of-f2fs-convert-inline-inode.patch
- From: 5.15.0-125.135
- CVE-2024-42287, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Complete command early within lock
- CVE: https://ubuntu.com/security/CVE-2024-42287
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42287-scsi-qla2xxx-complete-command-early-within-lock.patch
- From: 5.15.0-125.135
- CVE-2024-42272, CVSSv2 Score: 5.5
- Description:
sched: act_ct: take care of padding in struct zones_ht_key
- CVE: https://ubuntu.com/security/CVE-2024-42272
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42272-sched-act_ct-take-care-of-padding-in-struct-zones_ht_key-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-42297, CVSSv2 Score: 5.5
- Description:
f2fs: fix to don't dirty inode for readonly filesystem
- CVE: https://ubuntu.com/security/CVE-2024-42297
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42297-f2fs-fix-to-don-t-dirty-inode-for-readonly-filesystem.patch
- From: 5.15.0-125.135
- CVE-2024-42299, CVSSv2 Score: 5.5
- Description:
fs/ntfs3: Update log->page_{mask,bits} if log->page_size changed
- CVE: https://ubuntu.com/security/CVE-2024-42299
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42299-fs-ntfs3-update-log-page-mask-bits-if-log-page-size-changed.patch
- From: 5.15.0-125.135
- CVE-2024-42292, CVSSv2 Score: 5.5
- Description:
kobject_uevent: Fix OOB access within zap_modalias_env()
- CVE: https://ubuntu.com/security/CVE-2024-42292
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42292-kobject-uevent-fix-oob-access-within-zap-modalias-env.patch
- From: 5.15.0-125.135
- CVE-2024-42288, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Fix for possible memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-42288
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42288-scsi-qla2xxx-fix-for-possible-memory-corruption.patch
- From: 5.15.0-125.135
- CVE-2024-42286, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: validate nvme_local_port correctly
- CVE: https://ubuntu.com/security/CVE-2024-42286
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42286-scsi-qla2xxx-validate-nvme-local-port-correctly.patch
- From: 5.15.0-125.135
- CVE-2024-42295, CVSSv2 Score: 5.5
- Description:
nilfs2: handle inconsistent state in nilfs_btnode_create_block()
- CVE: https://ubuntu.com/security/CVE-2024-42295
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42295-nilfs2-handle-inconsistent-state-in-nilfs-btnode-create-block.patch
- From: 5.15.0-125.135
- CVE-2024-46804, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Add array index check for hdcp ddc access
- CVE: https://ubuntu.com/security/CVE-2024-46804
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46804-drm-amd-display-add-array-index-check-for-hdcp-ddc-access.patch
- From: 5.15.0-125.135
- CVE-2024-46818, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Check gpio_id before used as array index
- CVE: https://ubuntu.com/security/CVE-2024-46818
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46818-drm-amd-display-check-gpio-id-before-used-as-array-index.patch
- From: 5.15.0-125.135
- CVE-2024-46814, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Check msg_id before processing transcation
- CVE: https://ubuntu.com/security/CVE-2024-46814
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46814-drm-amd-display-check-msg-id-before-processing-transcation.patch
- From: 5.15.0-125.135
- CVE-2024-46800, CVSSv2 Score: 7.8
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://ubuntu.com/security/CVE-2024-46800
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.15.0-125.135
- CVE-2024-46798, CVSSv2 Score: 7.8
- Description:
ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://ubuntu.com/security/CVE-2024-46798
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46798-asoc-dapm-fix-uaf-for-snd-soc-pcm-runtime-object.patch
- From: 5.15.0-125.135
- CVE-2024-46759, CVSSv2 Score: 7.8
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46759
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2024-46758, CVSSv2 Score: 7.8
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46758
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2024-46757, CVSSv2 Score: 7.8
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46757
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2024-46756, CVSSv2 Score: 7.8
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46756
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2023-52889, CVSSv2 Score: 5.5
- Description:
apparmor: Fix null pointer deref when receiving skb during sock creation
- CVE: https://ubuntu.com/security/CVE-2023-52889
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2023-52889-apparmor-fix-null-pointer-deref-when-receiving-skb-during-sock-creation.patch
- From: 5.15.0-125.135
- CVE-2023-52918, CVSSv2 Score: 5.5
- Description:
media: pci: cx23885: check cx23885_vdev_init() return
- CVE: https://ubuntu.com/security/CVE-2023-52918
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2023-52918-media-pci-cx23885-check-cx23885-vdev-init-return.patch
- From: 5.15.0-125.135
- CVE-2024-26661, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'
- CVE: https://ubuntu.com/security/CVE-2024-26661
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26661-drm-amd-display-Add-NULL-test-for-timing-generator-i.patch
- From: 5.15.0-125.135
- CVE-2024-38611, CVSSv2 Score: 5.5
- Description:
media: i2c: et8ek8: Don't strip remove function when driver is builtin
- CVE: https://ubuntu.com/security/CVE-2024-38611
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-38611-media-i2c-et8ek8-don-t-strip-remove-function-when-driver-is-builtin.patch
- From: 5.15.0-125.135
- CVE-2024-39472, CVSSv2 Score: 5.5
- Description:
xfs: fix log recovery buffer allocation for the legacy h_size fixup
- CVE: https://ubuntu.com/security/CVE-2024-39472
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-39472-xfs-fix-log-recovery-buffer-allocation-for-the-legacy-h-size-fixup.patch
- From: 5.15.0-125.135
- CVE-2024-41012, CVSSv2 Score: 6.3
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://ubuntu.com/security/CVE-2024-41012
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41012-filelock-remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 5.15.0-125.135
- CVE-2024-42289, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: During vport delete send async logout explicitly
- CVE: https://ubuntu.com/security/CVE-2024-42289
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42289-scsi-qla2xxx-during-vport-delete-send-async-logout-explicitly.patch
- From: 5.15.0-125.135
- CVE-2024-44940, CVSSv2 Score: 7.8
- Description:
fou: remove warn in gue_gro_receive on unsupported protocol
- CVE: https://ubuntu.com/security/CVE-2024-44940
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-44940-fou-remove-warn-in-gue-gro-receive-on-unsupported-protocol-5.15.0-124.134.patch
- From: 5.15.0-127.137
- CVE-2024-38667, CVSSv2 Score:
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-38667.patch
- From:
- CVE-2024-44942, CVSSv2 Score: 7.8
- Description:
f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC
- CVE: https://ubuntu.com/security/CVE-2024-44942
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-44942-f2fs-fix-to-do-sanity-check-on-f2fs-inline-data-flag-in-inode-during-gc.patch
- From: 5.15.0-127.137
- CVE-2024-46853, CVSSv2 Score: 7.8
- Description:
spi: nxp-fspi: fix the KASAN report out-of-bounds bug
- CVE: https://ubuntu.com/security/CVE-2024-46853
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46853-spi-nxp-fspi-fix-the-kasan-report-out-of-bounds-bug.patch
- From: 5.15.0-127.137
- CVE-2024-46852, CVSSv2 Score: 7.8
- Description:
dma-buf: heaps: Fix off-by-one in CMA heap fault handler
- CVE: https://ubuntu.com/security/CVE-2024-46852
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46852-dma-buf-heaps-fix-off-by-one-in-cma-heap-fault-handler.patch
- From: 5.15.0-127.137
- CVE-2024-46849, CVSSv2 Score: 7.8
- Description:
ASoC: meson: axg-card: fix 'use-after-free'
- CVE: https://ubuntu.com/security/CVE-2024-46849
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46849-asoc-meson-axg-card-fix-use-after-free.patch
- From: 5.15.0-127.137
- CVE-2024-47685, CVSSv2 Score: 9.1
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://ubuntu.com/security/CVE-2024-47685
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.15.0-127.137
- CVE-2024-39463, CVSSv2 Score: 7.8
- Description:
9p: add missing locking around taking dentry fid list
- CVE: https://ubuntu.com/security/CVE-2024-39463
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-39463-9p-add-missing-locking-around-taking-dentry-fid-list.patch
- From: 5.15.0-127.137
- CVE-2024-49966, CVSSv2 Score: 7.8
- Description:
ocfs2: cancel dqi_sync_work before freeing oinfo
- CVE: https://ubuntu.com/security/CVE-2024-49966
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49966-ocfs2-cancel-dqi-sync-work-before-freeing-oinfo.patch
- From: 5.15.0-127.137
- CVE-2024-49936, CVSSv2 Score: 7.8
- Description:
net/xen-netback: prevent UAF in xenvif_flush_hash()
- CVE: https://ubuntu.com/security/CVE-2024-49936
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49936-net-xen-netback-prevent-uaf-in-xenvif-flush-hash.patch
- From: 5.15.0-127.137
- CVE-2024-49930, CVSSv2 Score: 7.8
- Description:
wifi: ath11k: fix array out-of-bound access in SoC stats
- CVE: https://ubuntu.com/security/CVE-2024-49930
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49930-wifi-ath11k-fix-array-out-of-bound-access-in-soc-stats.patch
- From: 5.15.0-127.137
- CVE-2024-49924, CVSSv2 Score: 7.8
- Description:
fbdev: pxafb: Fix possible use after free in pxafb_task()
- CVE: https://ubuntu.com/security/CVE-2024-49924
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49924-fbdev-pxafb-fix-possible-use-after-free-in-pxafb-task.patch
- From: 5.15.0-127.137
- CVE-2024-49895, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation
- CVE: https://ubuntu.com/security/CVE-2024-49895
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49895-drm-amd-display-fix-index-out-of-bounds-in-dcn30-degamma-hardware-format-translation.patch
- From: 5.15.0-127.137
- CVE-2024-49894, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix index out of bounds in degamma hardware format translation
- CVE: https://ubuntu.com/security/CVE-2024-49894
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49894-drm-amd-display-fix-index-out-of-bounds-in-degamma-hardware-format-translation.patch
- From: 5.15.0-127.137
- CVE-2024-49889, CVSSv2 Score: 7.8
- Description:
ext4: avoid use-after-free in ext4_ext_show_leaf()
- CVE: https://ubuntu.com/security/CVE-2024-49889
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49889-ext4-avoid-use-after-free-in-ext4-ext-show-leaf.patch
- From: 5.15.0-127.137
- CVE-2024-49884, CVSSv2 Score: 7.8
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://ubuntu.com/security/CVE-2024-49884
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49884-ext4-fix-slab-use-after-free-in-ext4-split-extent-at.patch
- From: 5.15.0-127.137
- CVE-2024-49883, CVSSv2 Score: 7.8
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://ubuntu.com/security/CVE-2024-49883
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 5.15.0-127.137
- CVE-2024-49882, CVSSv2 Score: 7.8
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://ubuntu.com/security/CVE-2024-49882
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path.patch
- From: 5.15.0-127.137
- CVE-2024-47670, CVSSv2 Score: 7.8
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-47670
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.15.0-127.137
- CVE-2024-47718, CVSSv2 Score: 7.8
- Description:
wifi: rtw88: always wait for both firmware loading attempts
- CVE: https://ubuntu.com/security/CVE-2024-47718
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47718-wifi-rtw88-always-wait-for-both-firmware-loading-attempts.patch
- From: 5.15.0-127.137
- CVE-2024-47701, CVSSv2 Score: 7.8
- Description:
ext4: avoid OOB when system.data xattr changes underneath the filesystem
- CVE: https://ubuntu.com/security/CVE-2024-47701
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47701-ext4-avoid-oob-when-system-data-xattr-changes-underneath-the-filesystem.patch
- From: 5.15.0-127.137
- CVE-2024-47698, CVSSv2 Score: 7.8
- Description:
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47698
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47698-drivers-media-dvb-frontends-rtl2832-fix-an-out-of-bounds-write-error.patch
- From: 5.15.0-127.137
- CVE-2024-47697, CVSSv2 Score: 7.8
- Description:
drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47697
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47697-drivers-media-dvb-frontends-rtl2830-fix-an-out-of-bounds-write-error.patch
- From: 5.15.0-127.137
- CVE-2024-49852, CVSSv2 Score: 7.8
- Description:
scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
- CVE: https://ubuntu.com/security/CVE-2024-49852
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49852-scsi-elx-libefc-fix-potential-use-after-free-in-efc-nport-vport-del.patch
- From: 5.15.0-127.137
- CVE-2024-47695, CVSSv2 Score: 7.8
- Description:
RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds
- CVE: https://ubuntu.com/security/CVE-2024-47695
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47695-rdma-rtrs-clt-reset-cid-to-con-num-1-to-stay-in-bounds.patch
- From: 5.15.0-127.137
- CVE-2024-47742, CVSSv2 Score: 7.8
- Description:
firmware_loader: Block path traversal
- CVE: https://ubuntu.com/security/CVE-2024-47742
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47742-firmware-loader-block-path-traversal.patch
- From: 5.15.0-127.137
- CVE-2024-49997, CVSSv2 Score: 7.5
- Description:
net: ethernet: lantiq_etop: fix memory disclosure
- CVE: https://ubuntu.com/security/CVE-2024-49997
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49997-net-ethernet-lantiq-etop-fix-memory-disclosure.patch
- From: 5.15.0-127.137
- CVE-2024-38538, CVSSv2 Score: 7.1
- Description:
net: bridge: xmit: make sure we have at least eth header len bytes
- CVE: https://ubuntu.com/security/CVE-2024-38538
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-header-len-bytes.patch
- From: 5.15.0-127.137
- CVE-2024-49995, CVSSv2 Score: 7.8
- Description:
tipc: guard against string buffer overrun
- CVE: https://ubuntu.com/security/CVE-2024-49995
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 5.15.0-127.137
- CVE-2024-50007, CVSSv2 Score: 7.8
- Description:
ALSA: asihpi: Fix potential OOB array access
- CVE: https://ubuntu.com/security/CVE-2024-50007
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50007-alsa-asihpi-fix-potential-oob-array-access.patch
- From: 5.15.0-127.137
- CVE-2024-49967, CVSSv2 Score: 7.8
- Description:
ext4: no need to continue when the number of entries is 1
- CVE: https://ubuntu.com/security/CVE-2024-49967
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49967-ext4-no-need-to-continue-when-the-number-of-entries-is-1.patch
- From: 5.15.0-127.137
- CVE-2024-49983, CVSSv2 Score: 7.8
- Description:
ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free
- CVE: https://ubuntu.com/security/CVE-2024-49983
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49983-ext4-drop-ppath-from-ext4-ext-replay-update-ex-to-avoid-double-free.patch
- From: 5.15.0-127.137
- CVE-2024-49982, CVSSv2 Score: 7.8
- Description:
aoe: fix the potential use-after-free problem in more places
- CVE: https://ubuntu.com/security/CVE-2024-49982
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49982-aoe-fix-the-potential-use-after-free-problem-in-more-places.patch
- From: 5.15.0-127.137
- CVE-2024-50180, CVSSv2 Score: 7.8
- Description:
fbdev: sisfb: Fix strbuf array overflow
- CVE: https://ubuntu.com/security/CVE-2024-50180
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50180-fbdev-sisfb-fix-strbuf-array-overflow.patch
- From: 5.15.0-127.137
- CVE-2024-50186, CVSSv2 Score: 7.8
- Description:
net: explicitly clear the sk pointer, when pf->create fails
- CVE: https://ubuntu.com/security/CVE-2024-50186
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50186-net-explicitly-clear-the-sk-pointer-when-pf-create-fails.patch
- From: 5.15.0-127.137
- CVE-2024-49969, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix index out of bounds in DCN30 color transformation
- CVE: https://ubuntu.com/security/CVE-2024-49969
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49969-drm-amd-display-fix-index-out-of-bounds-in-dcn30-color-transformation.patch
- From: 5.15.0-127.137
- CVE-2024-46858, CVSSv2 Score: 7.0
- Description:
mptcp: pm: Fix uaf in __timer_delete_sync
- CVE: https://ubuntu.com/security/CVE-2024-46858
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46858-mptcp-pm-fix-uaf-in-timer-delete-sync.patch
- From: 5.15.0-127.137
- CVE-2024-46854, CVSSv2 Score: 7.1
- Description:
net: dpaa: Pad packets to ETH_ZLEN
- CVE: https://ubuntu.com/security/CVE-2024-46854
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46854-net-dpaa-pad-packets-to-eth-zlen.patch
- From: 5.15.0-127.137
- CVE-2024-47723, CVSSv2 Score: 7.1
- Description:
jfs: fix out-of-bounds in dbNextAG() and diAlloc()
- CVE: https://ubuntu.com/security/CVE-2024-47723
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47723-jfs-fix-out-of-bounds-in-dbnextag-and-dialloc.patch
- From: 5.15.0-127.137
- CVE-2024-47747, CVSSv2 Score: 7.0
- Description:
net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2024-47747
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47747-net-seeq-fix-use-after-free-vulnerability-in-ether3-driver-due-to-race-condition.patch
- From: 5.15.0-127.137
- CVE-2024-49860, CVSSv2 Score: 7.1
- Description:
ACPI: sysfs: validate return type of _STR method
- CVE: https://ubuntu.com/security/CVE-2024-49860
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49860-acpi-sysfs-validate-return-type-of-str-method.patch
- From: 5.15.0-127.137
- CVE-2024-49903, CVSSv2 Score: 7.0
- Description:
jfs: Fix uaf in dbFreeBits
- CVE: https://ubuntu.com/security/CVE-2024-49903
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49903-jfs-fix-uaf-in-dbfreebits.patch
- From: 5.15.0-127.137
- CVE-2024-49900, CVSSv2 Score: 7.1
- Description:
jfs: Fix uninit-value access of new_ea in ea_buffer
- CVE: https://ubuntu.com/security/CVE-2024-49900
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49900-jfs-fix-uninit-value-access-of-new-ea-in-ea-buffer.patch
- From: 5.15.0-127.137
- CVE-2024-50035, CVSSv2 Score: 7.1
- Description:
ppp: fix ppp_async_encode() illegal access
- CVE: https://ubuntu.com/security/CVE-2024-50035
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50035-ppp-fix-ppp-async-encode-illegal-access.patch
- From: 5.15.0-127.137
- CVE-2024-50033, CVSSv2 Score: 7.1
- Description:
slip: make slhc_remember() more robust against malicious packets
- CVE: https://ubuntu.com/security/CVE-2024-50033
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50033-slip-make-slhc-remember-more-robust-against-malicious-packets.patch
- From: 5.15.0-127.137
- CVE-2024-49981, CVSSv2 Score: 7.0
- Description:
media: venus: fix use after free bug in venus_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-49981
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49981-media-venus-fix-use-after-free-bug-in-venus-remove-due-to-race-condition.patch
- From: 5.15.0-127.137
- CVE-2024-47757, CVSSv2 Score: 7.1
- Description:
nilfs2: fix potential oob read in nilfs_btree_check_delete()
- CVE: https://ubuntu.com/security/CVE-2024-47757
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47757-nilfs2-fix-potential-oob-read-in-nilfs-btree-check-delete.patch
- From: 5.15.0-127.137
- CVE-2024-50059, CVSSv2 Score: 7.0
- Description:
ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-50059
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50059-ntb-ntb-hw-switchtec-fix-use-after-free-vulnerability-in-switchtec-ntb-remove-due-to-race-condition.patch
- From: 5.15.0-127.137
- CVE-2024-47748, CVSSv2 Score: 7.8
- Description:
vhost_vdpa: assign irq bypass producer token correctly
- CVE: https://ubuntu.com/security/CVE-2024-47748
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47748-vhost_vdpa-assign-irq-bypass-producer-token-correctly.patch
- From: 5.15.0-127.137
- CVE-2023-52917, CVSSv2 Score: 5.5
- Description:
ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir()
- CVE: https://ubuntu.com/security/CVE-2023-52917
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2023-52917-ntb-intel-fix-the-null-vs-is-err-bug-for-debugfs-create-dir.patch
- From: 5.15.0-127.137
- CVE-2024-47692, CVSSv2 Score: 6.5
- Description:
nfsd: return -EINVAL when namelen is 0
- CVE: https://ubuntu.com/security/CVE-2024-47692
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47692-nfsd-return-einval-when-namelen-is-0.patch
- From: 5.15.0-127.137
- CVE-2024-27072, CVSSv2 Score: 5.5
- Description:
media: usbtv: Remove useless locks in usbtv_video_free()
- CVE: https://ubuntu.com/security/CVE-2024-27072
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-27072-media-usbtv-remove-useless-locks-in-usbtv-video-free.patch
- From: 5.15.0-127.137
- CVE-2023-52904, CVSSv2 Score: 5.5
- Description:
ALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate()
- CVE: https://ubuntu.com/security/CVE-2023-52904
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2023-52904-alsa-usb-audio-fix-possible-null-pointer-dereference-in-snd-usb-pcm-has-fixed-rate.patch
- From: 5.15.0-127.137
- CVE-2024-38544, CVSSv2 Score: 6.3
- Description:
RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt
- CVE: https://ubuntu.com/security/CVE-2024-38544
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-38544-rdma-rxe-fix-seg-fault-in-rxe-comp-queue-pkt.patch
- From: 5.15.0-127.137
- CVE-2024-47693, CVSSv2 Score: 6.5
- Description:
IB/core: Fix ib_cache_setup_one error flow cleanup
- CVE: https://ubuntu.com/security/CVE-2024-47693
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47693-ib-core-fix-ib-cache-setup-one-error-flow-cleanup.patch
- From: 5.15.0-127.137
- CVE-2023-52532, CVSSv2 Score: 5.5
- Description:
net: mana: Fix TX CQE error handling
- CVE: https://ubuntu.com/security/CVE-2023-52532
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2023-52532-net-mana-Fix-TX-CQE-error-handling.patch
- From: 5.15.0-127.137
- CVE-2023-52639, CVSSv2 Score:
- Description:
s390 architecture is not supported
- CVE:
- Patch: skipped/CVE-2023-52639.patch
- From:
- CVE-2024-26947, CVSSv2 Score:
- Description:
ARM related CVE
- CVE:
- Patch: skipped/CVE-2024-26947.patch
- From:
- CVE-2024-35904, CVSSv2 Score:
- Description:
Affects only __init function for a built-in component, so patching will have no effect
- CVE:
- Patch: skipped/CVE-2024-35904.patch
- From:
- CVE-2024-36893, CVSSv2 Score: 5.5
- Description:
usb: typec: tcpm: Check for port partner validity before consuming it
- CVE: https://ubuntu.com/security/CVE-2024-36893
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-36893-usb-typec-tcpm-check-for-port-partner-validity-before-consuming-it.patch
- From: 5.15.0-127.137
- CVE-2024-38632, CVSSv2 Score: 5.5
- Description:
vfio/pci: fix potential memory leak in vfio_intx_enable()
- CVE: https://ubuntu.com/security/CVE-2024-38632
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-38632-vfio-pci-fix-potential-memory-leak-in-vfio-intx-enable.patch
- From: 5.15.0-127.137
- CVE-2024-41016, CVSSv2 Score: 5.5
- Description:
ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-41016
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-41016-ocfs2-strict-bound-check-before-memcmp-in-ocfs2-xattr-find-entry.patch
- From: 5.15.0-127.137
- CVE-2024-42079, CVSSv2 Score: 5.5
- Description:
gfs2: Fix NULL pointer dereference in gfs2_log_flush
- CVE: https://ubuntu.com/security/CVE-2024-42079
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-42079-gfs2-fix-null-pointer-dereference-in-gfs2-log-flush.patch
- From: 5.15.0-127.137
- CVE-2024-42156, CVSSv2 Score:
- Description:
Out of scope: s390 is not supported
- CVE:
- Patch: skipped/CVE-2024-42156.patch
- From:
- CVE-2024-42158, CVSSv2 Score:
- Description:
Out of scope: s390 is not supported
- CVE:
- Patch: skipped/CVE-2024-42158.patch
- From:
- CVE-2024-44931, CVSSv2 Score: 5.5
- Description:
gpio: prevent potential speculation leaks in gpio_device_get_desc()
- CVE: https://ubuntu.com/security/CVE-2024-44931
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-44931-gpio-prevent-potential-speculation-leaks-in-gpio-device-get-desc.patch
- From: 5.15.0-127.137
- CVE-2024-46695, CVSSv2 Score: 5.5
- Description:
selinux,smack: don't bypass permissions check in inode_setsecctx hook
- CVE: https://ubuntu.com/security/CVE-2024-46695
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46695-selinux-smack-don-t-bypass-permissions-check-in-inode-setsecctx-hook.patch
- From: 5.15.0-127.137
- CVE-2020-12351 CVE-2020-12352 CVE-2020-24490, CVSSv2 Score: 8.8
- Description:
UBUNTU: [Config] Disable BlueZ highspeed support
- CVE: https://ubuntu.com/security/CVE-2020-24490
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2020-12351-CVE-2020-12352-CVE-2020-24490-kpatch.patch
- From: 5.15.0-130.140
- CVE-2024-40910, CVSSv2 Score: 5.5
- Description:
ax25: Fix refcount imbalance on inbound connections
- CVE: https://ubuntu.com/security/CVE-2024-40910
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-40910-ax25-fix-refcount-imbalance-on-inbound-connections.patch
- From: 5.15.0-130.140
- CVE-2024-53057, CVSSv2 Score: 7.8
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://ubuntu.com/security/CVE-2024-53057
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 5.15.0-130.140
- CVE-2024-40973, CVSSv2 Score: 5.5
- Description:
media: mtk-vcodec: potential null pointer deference in SCP
- CVE: https://ubuntu.com/security/CVE-2024-40973
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-40973-media-mtk-vcodec-potential-null-pointer-deference-in-scp.patch
- From: 5.15.0-130.140
- CVE-2024-35967, CVSSv2 Score: 5.5
- Description:
Bluetooth: SCO: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35967
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35967-bluetooth-sco-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-35966, CVSSv2 Score: 5.5
- Description:
Bluetooth: RFCOMM: Fix not validating setsockopt user
- CVE: https://ubuntu.com/security/CVE-2024-35966
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35966-bluetooth-rfcomm-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-35965, CVSSv2 Score: 5.5
- Description:
Bluetooth: L2CAP: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35965
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35965-bluetooth-l2cap-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-35963, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_sock: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35963
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35963-bluetooth-hci-sock-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-38553, CVSSv2 Score: 5.5
- Description:
net: fec: remove .ndo_poll_controller to avoid deadlocks
- CVE: https://ubuntu.com/security/CVE-2024-38553
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-38553-net-fec-remove-ndo-poll-controller-to-avoid-deadlocks.patch
- From: 5.15.0-130.140
- CVE-2024-38553, CVSSv2 Score: 5.5
- Description:
net: fec: remove .ndo_poll_controller to avoid deadlocks
- CVE: https://ubuntu.com/security/CVE-2024-38553
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-38553-net-fec-remove-ndo-poll-controller-to-avoid-deadlocks-kpatch.patch
- From: 5.15.0-130.140
- CVE-2024-50264, CVSSv2 Score: 7.8
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://ubuntu.com/security/CVE-2024-50264
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 5.15.0-130.140
- CVE-2024-43904, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing
- CVE: https://ubuntu.com/security/CVE-2024-43904
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-43904-drm-amd-display-add-null-checks-for-stream-and-plane-before-dereferencing.patch
- From: 5.15.0-130.140
- CVE-2024-26822, CVSSv2 Score: 5.5
- Description:
smb: client: set correct id, uid and cruid for multiuser automounts
- CVE: https://ubuntu.com/security/CVE-2024-26822
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-26822-smb-client-set-correct-id-uid-and-cruid-for-multiuser-automounts-azure-dfs.patch
- From: 5.15.0-130.140