- kernel-5.15.0-1057.65 (ubuntu-jammy-azure)
- 5.15.0-1103.112
- 2026-03-19 21:06:58
- 2026-03-20 09:21:50
- K20260319_18
- CVE-2023-4134
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2023-4134.patch
- From:
- CVE-2023-22995
- Description:
usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core
- CVE: https://ubuntu.com/security/CVE-2023-22995
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-22995-patch-usb-dwc3-dwc3-qcom-add-missing-platform-device-put-in.patch
- From: 5.15.0-100.110
- CVE-2023-51779
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg
- CVE: https://ubuntu.com/security/CVE-2023-51779
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-51779-patch-bluetooth-af-bluetooth-fix-use-after-free-in.patch
- From: 5.15.0-100.110
- CVE-2023-51782
- Description:
net/rose: Fix Use-After-Free in rose_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51782
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-51782-patch-net-rose-fix-use-after-free-in-rose-ioctl.patch
- From: 5.15.0-100.110
- CVE-2023-46343
- Description:
nfc: nci: fix possible NULL pointer dereference in send_acknowledge()
- CVE: https://ubuntu.com/security/CVE-2023-46343
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-46343-patch-nfc-nci-fix-possible-null-pointer-dereference-in.patch
- From: 5.15.0-100.110
- CVE-2023-46862
- Description:
io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid
- CVE: https://ubuntu.com/security/CVE-2023-46862
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-46862-patch-io-uring-fdinfo-lock-sq-thread-while-retrieving-thread.patch
- From: 5.15.0-100.110
- CVE-2024-0607
- Description:
netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()
- CVE: https://ubuntu.com/security/CVE-2024-0607
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2024-0607-patch-netfilter-nf-tables-fix-pointer-math-issue-in.patch
- From: 5.15.0-100.110
- CVE-2023-6121
- Description:
nvmet: nul-terminate the NQNs passed in the connect command
- CVE: https://ubuntu.com/security/CVE-2023-6121
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-6121-patch-nvmet-nul-terminate-the-nqns-passed-in-the-connect-command.patch
- From: 5.15.0-100.110
- CVE-2024-0340
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://ubuntu.com/security/CVE-2024-0340
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2024-0340-patch-vhost-use-kzalloc-instead-of-kmalloc-followed-by.patch
- From: 5.15.0-100.110
- CVE-2023-52854
- Description:
padata: Fix refcnt handling in padata_free_shell()
- CVE: https://ubuntu.com/security/CVE-2023-52854
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-52854-padata-Fix-refcnt-handling-in-padata_free_shell.patch
- From: 5.15.0-100.110
- CVE-2023-52483
- Description:
mctp: perform route lookups under a RCU read-side lock
- CVE: https://ubuntu.com/security/CVE-2023-52483
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-52483-mctp-perform-route-lookups-under-a-RCU-read-side-lock.patch
- From: 5.15.0-100.110
- CVE-2023-52799
- Description:
jfs: fix array-index-out-of-bounds in dbFindLeaf
- CVE: https://ubuntu.com/security/CVE-2023-52799
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-52799-jfs-fix-array-index-out-of-bounds-in-dbFindLeaf.patch
- From: 5.15.0-100.110
- CVE-2024-1085
- Description:
netfilter: nf_tables: check if catch-all set element is active in next generation
- CVE: https://ubuntu.com/security/CVE-2024-1085
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2024-1085-patch-netfilter-nf-tables-check-if-catch-all-set-element-is.patch
- From: 5.15.0-101.111
- CVE-2024-1086
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://ubuntu.com/security/CVE-2024-1086
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2024-1086-patch-netfilter-nf-tables-reject-queue-drop-verdict-parameters.patch
- From: 5.15.0-101.111
- CVE-2023-23000
- Description:
phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function
- CVE: https://ubuntu.com/security/CVE-2023-23000
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2023-23000-patch-phy-tegra-xusb-fix-return-value-of.patch
- From: 5.15.0-101.111
- CVE-2024-24855
- Description:
scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()
- CVE: https://ubuntu.com/security/CVE-2024-24855
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2024-24855-patch-scsi-lpfc-fix-a-possible-data-race-in.patch
- From: 5.15.0-101.111
- CVE-2023-32247
- Description:
ksmbd: destroy expired sessions
- CVE: https://ubuntu.com/security/CVE-2023-32247
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2023-32247-patch-ksmbd-destroy-expired-sessions_beyond_92.102.patch
- From: 5.15.0-101.111
- CVE-2023-32247
- Description:
ksmbd: destroy expired sessions
- CVE: https://ubuntu.com/security/CVE-2023-32247
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2023-32247-patch-ksmbd-destroy-expired-sessions_beyond_92.102-kpatch.patch
- From: 5.15.0-101.111
- CVE-2023-52439
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://ubuntu.com/security/CVE-2023-52439
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52439-uio-Fix-use-after-free-in-uio_open.patch
- From: 5.15.0-102.112
- CVE-2023-52438
- Description:
binder: fix use-after-free in shinker's callback
- CVE: https://ubuntu.com/security/CVE-2023-52438
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52438-binder-fix-use-after-free-in-shinker-s-callback.patch
- From: 5.15.0-102.112
- CVE-2023-52444
- Description:
f2fs: fix to avoid dirent corruption
- CVE: https://ubuntu.com/security/CVE-2023-52444
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52444-patch-f2fs-fix-to-avoid-dirent-corruption.patch
- From: 5.15.0-102.112
- CVE-2023-52436
- Description:
f2fs: explicitly null-terminate the xattr list
- CVE: https://ubuntu.com/security/CVE-2023-52436
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52436-f2fs-explicitly-null-terminate-the-xattr-list.patch
- From: 5.15.0-102.112
- CVE-2023-52449
- Description:
mtd: Fix gluebi NULL pointer dereference caused by ftl notifier
- CVE: https://ubuntu.com/security/CVE-2023-52449
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52449-mtd-Fix-gluebi-NULL-pointer-dereference-caused-by-ftl-notifier.patch
- From: 5.15.0-102.112
- CVE-2023-52458
- Description:
block: add check that partition length needs to be aligned with block size
- CVE: https://ubuntu.com/security/CVE-2023-52458
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52458-block-add-check-that-partition-length-needs-to-be-aligned-with-block-size.patch
- From: 5.15.0-102.112
- CVE-2023-52464
- Description:
EDAC/thunderx: Fix possible out-of-bounds string access
- CVE: https://ubuntu.com/security/CVE-2023-52464
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52464-EDAC-thunderx-Fix-possible-out-of-bounds-string-access.patch
- From: 5.15.0-102.112
- CVE-2023-52469
- Description:
drivers/amd/pm: fix a use-after-free in kv_parse_power_table
- CVE: https://ubuntu.com/security/CVE-2023-52469
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52469-drivers-amd-pm-fix-a-use-after-free-in-kv_parse_power_table.patch
- From: 5.15.0-102.112
- CVE-2024-23850
- Description:
btrfs: do not ASSERT() if the newly created subvolume already got read
- CVE: https://ubuntu.com/security/CVE-2024-23850
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-23850-btrfs-do-not-assert-if-the-newly-created-subvolume-already-got-read.patch
- From: 5.15.0-102.112
- CVE-2024-24860
- Description:
Bluetooth: Fix atomicity violation in {min,max}_key_size_set
- CVE: https://ubuntu.com/security/CVE-2024-24860
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-24860-bluetooth-fix-atomicity-violation-in-min-max-key-size-set.patch
- From: 5.15.0-102.112
- CVE-2024-26591
- Description:
bpf: Fix re-attachment branch in bpf_tracing_prog_attach
- CVE: https://ubuntu.com/security/CVE-2024-26591
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26591-bpf-fix-re-attachment-branch-in-bpf-tracing-prog-attach.patch
- From: 5.15.0-102.112
- CVE-2023-32254
- Description:
ksmbd: fix racy issue under cocurrent smb2 tree disconnect
- CVE: https://ubuntu.com/security/CVE-2023-32254
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-32254-patch-ksmbd-fix-racy-issue-under-cocurrent-smb2-tree-disconnect.patch
- From: 5.15.0-102.112
- CVE-2023-32254
- Description:
ksmbd: fix racy issue under cocurrent smb2 tree disconnect (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-32254
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-32254-patch-ksmbd-fix-racy-issue-under-cocurrent-smb2-tree-disconnect-kpatch.patch
- From: 5.15.0-102.112
- CVE-2023-38427
- Description:
ksmbd: fix out-of-bound read in deassemble_neg_contexts()
- CVE: https://ubuntu.com/security/CVE-2023-38427
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-38427-patch-ksmbd-fix-out-of-bound-read-in-deassemble-neg-contexts.patch
- From: 5.15.0-102.112
- CVE-2023-1194
- Description:
ksmbd: fix out-of-bound read in parse_lease_state()
- CVE: https://ubuntu.com/security/CVE-2023-1194
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-1194-patch-ksmbd-fix-out-of-bound-read-in-parse-lease-state.patch
- From: 5.15.0-102.112
- CVE-2023-52441
- Description:
ksmbd: fix out of bounds in init_smb2_rsp_hdr()
- CVE: https://ubuntu.com/security/CVE-2023-52441
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52441-ksmbd-fix-out-of-bounds-in-init_smb2_rsp_hdr.patch
- From: 5.15.0-102.112
- CVE-2023-52445
- Description:
media: pvrusb2: fix use after free on context disconnection
- CVE: https://ubuntu.com/security/CVE-2023-52445
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context-disconnection.patch
- From: 5.15.0-102.112
- CVE-2024-22705
- Description:
ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()
- CVE: https://ubuntu.com/security/CVE-2024-22705
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-22705-patch-ksmbd-fix-slab-out-of-bounds-in-smb-strndup-from-utf16.patch
- From: 5.15.0-102.112
- CVE-2023-52451
- Description:
powerpc/pseries/memhp: Fix access beyond end of drmem array
- CVE: https://ubuntu.com/security/CVE-2023-52451
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52451-patch-powerpc-pseries-memhp-fix-access-beyond-end-of-drmem-array.patch
- From: 5.15.0-102.112
- CVE-2024-26586
- Description:
mlxsw: spectrum_acl_tcam: Fix stack corruption
- CVE: https://ubuntu.com/security/CVE-2024-26586
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26586-mlxsw-spectrum_acl_tcam-fix-stack-corruption.patch
- From: 5.15.0-102.112
- CVE-2024-26589
- Description:
bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS
- CVE: https://ubuntu.com/security/CVE-2024-26589
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26589-patch-bpf-reject-variable-offset-alu-on-ptr-to-flow-keys.patch
- From: 5.15.0-102.112
- CVE-2023-46838
- Description:
xen-netback: don't produce zero-size SKB frags
- CVE: https://ubuntu.com/security/CVE-2023-46838
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-46838-patch-xen-netback-don-t-produce-zero-size-skb-frags.patch
- From: 5.15.0-102.112
- CVE-2023-52340
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://ubuntu.com/security/CVE-2023-52340
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52340-patch-ipv6-remove-max-size-check-inline-with-ipv4.patch
- From: 5.15.0-102.112
- CVE-2024-23851
- Description:
dm ioctl: log an error if the ioctl structure is corrupted
- CVE: https://ubuntu.com/security/CVE-2024-23851
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-23851-patch-dm-ioctl-log-an-error-if-the-ioctl-structure-is-corrupted.patch
- From: 5.15.0-102.112
- CVE-2023-52429 CVE-2024-23851
- Description:
dm: limit the number of targets and parameter size area
- CVE: https://ubuntu.com/security/CVE-2024-23851
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52429-CVE-2024-23851-patch-dm-limit-the-number-of-targets-and-parameter-size-area.patch
- From: 5.15.0-102.112
- CVE-2023-52443
- Description:
apparmor: avoid crash when parsed profile name is empty
- CVE: https://ubuntu.com/security/CVE-2023-52443
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52443-apparmor-avoid-crash-when-parsed-profile-name-is-empty.patch
- From: 5.15.0-102.112
- CVE-2023-52448
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://ubuntu.com/security/CVE-2023-52448
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52448-gfs2-fix-kernel-NULL-pointer-dereference-in-gfs2_rgrp_dump.patch
- From: 5.15.0-102.112
- CVE-2023-3867
- Description:
binder: ksmbd: add missing compound request handing in some commands
- CVE: https://ubuntu.com/security/CVE-2023-3867
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-3867-ksmbd-add-missing-compound-request-handing_from_83.92.patch
- From: 5.15.0-102.112
- CVE-2024-26597
- Description:
net: qualcomm: rmnet: fix global oob in rmnet_policy
- CVE: https://ubuntu.com/security/CVE-2024-26597
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26597-net-qualcomm-rmnet-fix-global-oob-in-rmnet_policy.patch
- From: 5.15.0-102.112
- CVE-2024-26597
- Description:
net: qualcomm: rmnet: fix global oob in rmnet_policy
- CVE: https://ubuntu.com/security/CVE-2024-26597
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26597-net-qualcomm-rmnet-fix-global-oob-in-rmnet_policy-kpatch.patch
- From: 5.15.0-102.112
- CVE-2024-26598
- Description:
KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache
- CVE: https://ubuntu.com/security/CVE-2024-26598
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26598-kvm-arm64-vgic-its-avoid-potential-uaf.patch
- From: 5.15.0-102.112
- CVE-2024-26631
- Description:
ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
- CVE: https://ubuntu.com/security/CVE-2024-26631
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26631-ipv6-mcast-fix-data-race-in-ipv6_mc_down.patch
- From: 5.15.0-102.112
- CVE-2024-26633
- Description:
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
- CVE: https://ubuntu.com/security/CVE-2024-26633
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26633-ip6_tunnel-fix-NEXTHDR_FRAGMENT-handling-in-ip6_tnl_parse_tlv_enc_lim.patch
- From: 5.15.0-102.112
- CVE-2023-52442
- Description:
ksmdb: use cmd helper variable in smb2_get_ksmbd_tcon()
- CVE: https://ubuntu.com/security/CVE-2023-52442
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52442-1-ksmdb-use-cmd-helper-variable-in-smb2_get_ksmbd_tcon.patch
- From: 5.15.0-102.112
- CVE-2023-52442
- Description:
ksmbd: validate session id and tree id in compound request
- CVE: https://ubuntu.com/security/CVE-2023-52442
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52442-2-ksmbd-validate-session-id-and-tree-id-in-compound-re.patch
- From: 5.15.0-102.112
- CVE-2023-52456
- Description:
serial: imx: fix tx statemachine deadlock
- CVE: https://ubuntu.com/security/CVE-2023-52456
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52456-serial-imx-fix-tx-statemachine-deadlock.patch
- From: 5.15.0-102.112
- CVE-2023-52457
- Description:
serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed
- CVE: https://ubuntu.com/security/CVE-2023-52457
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52457-serial-8250-omap-Don-t-skip-resource-freeing-if-pm_r-107.patch
- From: 5.15.0-102.112
- CVE-2023-52454
- Description:
nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length
- CVE: https://ubuntu.com/security/CVE-2023-52454
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52454-1-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-inva.patch
- From: 5.15.0-102.112
- CVE-2023-52454
- Description:
nvmet-tcp: Fix the H2C expected PDU len calculation
- CVE: https://ubuntu.com/security/CVE-2023-52454
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52454-2-nvmet-tcp-Fix-the-H2C-expected-PDU-len-calculation.patch
- From: 5.15.0-102.112
- CVE-2023-6536
- Description:
nvmet-tcp: fix a crash in nvmet_req_complete()
- CVE: https://ubuntu.com/security/CVE-2023-6536
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-6536-nvmet-tcp-fix-a-crash-in-nvmet_req_complete.patch
- From: 5.15.0-102.112
- CVE-2023-52462
- Description:
bpf: fix check for attempt to corrupt spilled pointer
- CVE: https://ubuntu.com/security/CVE-2023-52462
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52462-bpf-fix-check-for-attempt-to-corrupt-spilled-pointer.patch
- From: 5.15.0-102.112
- CVE-2023-52463
- Description:
Complex adaptation required. Issue can be reproduced with special UEFI implementation only.
- CVE:
- Patch: skipped/CVE-2023-52463.patch
- From:
- CVE-2023-52467
- Description:
mfd: syscon: Fix null pointer dereference in of_syscon_register()
- CVE: https://ubuntu.com/security/CVE-2023-52467
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52467-mfd-syscon-Fix-null-pointer-dereference-in-of_syscon.patch
- From: 5.15.0-102.112
- CVE-2023-52467
- Description:
drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()
- CVE: https://ubuntu.com/security/CVE-2023-52467
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52470-drm-radeon-check-the-alloc_workqueue-return-value-in.patch
- From: 5.15.0-102.112
- CVE-2023-52480
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2023-52480.patch
- From:
- CVE-2023-52609
- Description:
binder: fix race between mmput() and do_exit()
- CVE: https://ubuntu.com/security/CVE-2023-52609
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52609-binder-fix-race-between-mmput-and-do_exit.patch
- From: 5.15.0-102.112
- CVE-2023-52610
- Description:
net/sched: act_ct: fix skb leak and crash on ooo frags
- CVE: https://ubuntu.com/security/CVE-2023-52610
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52610-net-sched-act_ct-fix-skb-leak-and-crash-on-ooo-frags.patch
- From: 5.15.0-102.112
- CVE-2023-52612
- Description:
crypto: scomp - fix req->dst buffer overflow
- CVE: https://ubuntu.com/security/CVE-2023-52612
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52612-crypto-scomp-fix-req-dst-buffer-overflow.patch
- From: 5.15.0-102.112
- CVE-2024-26581
- Description:
netfilter: nft_set_rbtree: skip end interval element from gc
- CVE: https://ubuntu.com/security/CVE-2024-26581
- Patch: ubuntu-jammy/5.15.0-105.115/CVE-2024-26581-netfilter-nft-set-rbtree-skip-end-interval-element-from-gc.patch
- From: 5.15.0-105.115
- CVE-2023-52603
- Description:
UBSAN: array-index-out-of-bounds in dtSplitRoot
- CVE: https://ubuntu.com/security/CVE-2023-52603
- Patch: ubuntu-jammy/5.15.0-105.115/CVE-2023-52603-ubsan-array-index-out-of-bounds-in-dtsplitroot.patch
- From: 5.15.0-105.115
- CVE-2023-52600
- Description:
jfs: fix uaf in jfs_evict_inode
- CVE: https://ubuntu.com/security/CVE-2023-52600
- Patch: ubuntu-jammy/5.15.0-105.115/CVE-2023-52600-jfs-fix-uaf-in-jfs-evict-inode.patch
- From: 5.15.0-105.115
- CVE-2023-24023
- Description:
Bluetooth: Add more enc key size check
- CVE: https://ubuntu.com/security/CVE-2023-24023
- Patch: ubuntu-jammy/5.15.0-105.115/CVE-2023-24023-bluetooth-add-more-enc-key-size-check.patch
- From: 5.4.0-177.197
- CVE-2024-26592
- Description:
ksmbd: fix UAF issue in ksmbd_tcp_new_connection()
- CVE: https://ubuntu.com/security/CVE-2024-26592
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26592-ksmbd-fix-uaf-issue-in-ksmbd-tcp-new-connection-5.15.0-101.111.patch
- From: 5.15.0-106.116
- CVE-2024-26592
- Description:
ksmbd: fix UAF issue in ksmbd_tcp_new_connection() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26592
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26592-ksmbd-fix-uaf-issue-in-ksmbd-tcp-new-connection-kpatch.patch
- From: 5.15.0-106.116
- CVE-2023-52604
- Description:
FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2023-52604
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52604-fs-jfs-ubsan-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-106.116
- CVE-2023-52599
- Description:
jfs: fix array-index-out-of-bounds in diNewExt
- CVE: https://ubuntu.com/security/CVE-2023-52599
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52599-jfs-fix-array-index-out-of-bounds-in-dinewext.patch
- From: 5.15.0-106.116
- CVE-2023-52597
- Description:
KVM: s390: fix setting of fpc register
- CVE: https://ubuntu.com/security/CVE-2023-52597
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52597-kvm-s390-fix-setting-of-fpc-register.patch
- From: 5.15.0-106.116
- CVE-2023-52588
- Description:
f2fs: fix to tag gcing flag on page during block migration
- CVE: https://ubuntu.com/security/CVE-2023-52588
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52588-f2fs-fix-to-tag-gcing-flag-on-page-during-block-migration.patch
- From: 5.15.0-106.116
- CVE-2024-26625
- Description:
llc: call sock_orphan() at release time
- CVE: https://ubuntu.com/security/CVE-2024-26625
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26625-llc-call-sock-orphan-at-release-time.patch
- From: 5.15.0-106.116
- CVE-2023-52606
- Description:
powerpc/lib: Validate size for vector operations
- CVE: https://ubuntu.com/security/CVE-2023-52606
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52606-powerpc-lib-validate-size-for-vector-operations.patch
- From: 5.15.0-106.116
- CVE-2023-52601
- Description:
jfs: fix array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2023-52601
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52601-jfs-fix-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-106.116
- CVE-2024-26593
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://ubuntu.com/security/CVE-2024-26593
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions.patch
- From: 5.15.0-106.116
- CVE-2024-26608
- Description:
ksmbd: fix global oob in ksmbd_nl_policy
- CVE: https://ubuntu.com/security/CVE-2024-26608
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26608-ksmbd-fix-global-oob-in-ksmbd-nl-policy.patch
- From: 5.15.0-106.116
- CVE-2024-26608
- Description:
ksmbd: fix global oob in ksmbd_nl_policy (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26608
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26608-ksmbd-fix-global-oob-in-ksmbd-nl-policy-kpatch.patch
- From: 5.15.0-106.116
- CVE-2024-26641
- Description:
ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
- CVE: https://ubuntu.com/security/CVE-2024-26641
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26641-ip6-tunnel-make-sure-to-pull-inner-header-in-ip6-tnl-rcv.patch
- From: 5.15.0-106.116
- CVE-2024-26660
- Description:
drm/amd/display: Implement bounds check for stream encoder
- CVE: https://ubuntu.com/security/CVE-2024-26660
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26660-drm-amd-display-implement-bounds-check-for-stream-encoder.patch
- From: 5.15.0-106.116
- CVE-2024-26615
- Description:
net/smc: fix illegal rmb_desc access in SMC-D connection dump
- CVE: https://ubuntu.com/security/CVE-2024-26615
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch
- From: 5.15.0-106.116
- CVE-2024-26636
- Description:
llc: make llc_ui_sendmsg() more robust against bonding
- CVE: https://ubuntu.com/security/CVE-2024-26636
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26636-llc-make-llc-ui-sendmsg-more-robust-against-bonding.patch
- From: 5.15.0-106.116
- CVE-2024-26644
- Description:
btrfs: don't abort filesystem when attempting to snapshot
- CVE: https://ubuntu.com/security/CVE-2024-26644
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26644-btrfs-don-t-abort-filesystem-when-attempting-to-snapshot.patch
- From: 5.15.0-106.116
- CVE-2024-26627
- Description:
scsi: core: Move scsi_host_busy() out of host lock for waking
- CVE: https://ubuntu.com/security/CVE-2024-26627
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26627-scsi-core-move-scsi-host-busy-out-of-host-lock-for-waking.patch
- From: 5.15.0-106.116
- CVE-2024-26640
- Description:
tcp: add sanity checks to rx zerocopy
- CVE: https://ubuntu.com/security/CVE-2024-26640
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26640-tcp-add-sanity-checks-to-rx-zerocopy.patch
- From: 5.15.0-106.116
- CVE-2024-26663
- Description:
tipc: Check the bearer type before calling
- CVE: https://ubuntu.com/security/CVE-2024-26663
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26663-tipc-check-the-bearer-type-before-calling.patch
- From: 5.15.0-106.116
- CVE-2024-26606
- Description:
binder: signal epoll threads of self-work
- CVE: https://ubuntu.com/security/CVE-2024-26606
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26606-binder-signal-epoll-threads-of-self-work.patch
- From: 5.15.0-106.116
- CVE-2023-52587
- Description:
IB/ipoib: Fix mcast list locking
- CVE: https://ubuntu.com/security/CVE-2023-52587
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52587-ib-ipoib-fix-mcast-list-locking.patch
- From: 5.15.0-106.116
- CVE-2024-26610
- Description:
wifi: iwlwifi: fix a memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-26610
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26610-wifi-iwlwifi-fix-a-memory-corruption.patch
- From: 5.15.0-106.116
- CVE-2023-52607
- Description:
powerpc/mm: Fix null-pointer dereference in pgtable_cache_add
- CVE: https://ubuntu.com/security/CVE-2023-52607
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52607-powerpc-mm-fix-null-pointer-dereference-in-pgtable-cache-add.patch
- From: 5.15.0-106.116
- CVE-2023-52619
- Description:
pstore/ram: Fix crash when setting number of cpus to an odd
- CVE: https://ubuntu.com/security/CVE-2023-52619
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52619-pstore-ram-fix-crash-when-setting-number-of-cpus-to-an-odd.patch
- From: 5.15.0-106.116
- CVE-2023-52598
- Description:
s390/ptrace: handle setting of fpc register correctly
- CVE: https://ubuntu.com/security/CVE-2023-52598
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52598-s390-ptrace-handle-setting-of-fpc-register-correctly.patch
- From: 5.15.0-106.116
- CVE-2023-52623
- Description:
SUNRPC: Fix a suspicious RCU usage warning
- CVE: https://ubuntu.com/security/CVE-2023-52623
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52623-sunrpc-fix-a-suspicious-rcu-usage-warning.patch
- From: 5.15.0-106.116
- CVE-2023-52583
- Description:
ceph: fix deadlock or deadcode of misusing dget()
- CVE: https://ubuntu.com/security/CVE-2023-52583
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52583-ceph-fix-deadlock-or-deadcode-of-misusing-dget.patch
- From: 5.15.0-106.116
- CVE-2023-52616
- Description:
crypto: lib/mpi - Fix unexpected pointer access in
- CVE: https://ubuntu.com/security/CVE-2023-52616
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52616-crypto-lib-mpi-fix-unexpected-pointer-access-in.patch
- From: 5.15.0-106.116
- CVE-2023-52435
- Description:
net: prevent mss overflow in skb_segment()
- CVE: https://ubuntu.com/security/CVE-2023-52435
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52435-net-prevent-mss-overflow-in-skb-segment.patch
- From: 5.15.0-106.116
- CVE-2023-52631
- Description:
fs/ntfs3: Fix an NULL dereference bug
- CVE: https://ubuntu.com/security/CVE-2023-52631
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52631-fs-ntfs3-fix-an-null-dereference-bug.patch
- From: 5.15.0-106.116
- CVE-2023-52633
- Description:
um: time-travel: fix time corruption
- CVE: https://ubuntu.com/security/CVE-2023-52633
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52633-um-time-travel-fix-time-corruption.patch
- From: 5.15.0-106.116
- CVE-2023-52635
- Description:
PM / devfreq: Synchronize devfreq_monitor_[start/stop]
- CVE: https://ubuntu.com/security/CVE-2023-52635
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52635-pm-devfreq-synchronize-devfreq-monitor-start-stop.patch
- From: 5.15.0-106.116
- CVE-2024-1151
- Description:
net: openvswitch: limit the number of recursions from action sets
- CVE: https://ubuntu.com/security/CVE-2024-1151
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-1151-net-openvswitch-limit-the-number-of-recursions-from-action-sets.patch
- From: 5.15.0-106.116
- CVE-2024-23849
- Description:
net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv
- CVE: https://ubuntu.com/security/CVE-2024-23849
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-23849-net-rds-fix-ubsan-array-index-out-of-bounds-in.patch
- From: 5.15.0-106.116
- CVE-2024-26600
- Description:
phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
- CVE: https://ubuntu.com/security/CVE-2024-26600
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26600-phy-ti-phy-omap-usb2-fix-null-pointer-dereference-for-srp.patch
- From: 5.15.0-106.116
- CVE-2024-26602
- Description:
sched/membarrier: reduce the ability to hammer on sys_membarrier
- CVE: https://ubuntu.com/security/CVE-2024-26602
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
- From: 5.15.0-106.116
- CVE-2023-52638
- Description:
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
- CVE: https://ubuntu.com/security/CVE-2023-52638
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52638-can-j1939-prevent-deadlock-by-changing-j1939-socks-lock-to.patch
- From: 5.15.0-106.116
- CVE-2023-52638
- Description:
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-52638
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52638-can-j1939-prevent-deadlock-by-changing-j1939-socks-lock-to-kpatch.patch
- From: 5.15.0-106.116
- CVE-2023-52622
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://ubuntu.com/security/CVE-2023-52622
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg.patch
- From: 5.15.0-106.116
- CVE-2023-52622
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://ubuntu.com/security/CVE-2023-52622
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg-kpatch.patch
- From: 5.15.0-106.116
- CVE-2024-26635
- Description:
llc: Drop support for ETH_P_TR_802_2.
- CVE: https://ubuntu.com/security/CVE-2024-26635
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26635-llc-drop-support-for-eth-p-tr-802-2.patch
- From: 5.15.0-106.116
- CVE-2024-26635
- Description:
llc: Drop support for ETH_P_TR_802_2 (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26635
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26635-llc-drop-support-for-eth-p-tr-802-2-kpatch.patch
- From: 5.15.0-106.116
- CVE-2023-52489
- Description:
The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.
- CVE:
- Patch: skipped/CVE-2023-52489.patch
- From:
- CVE-2023-52498
- Description:
Power management subsystem - sleep mode. Irrelevant for servers.
- CVE:
- Patch: skipped/CVE-2023-52498.patch
- From:
- CVE-2023-52594
- Description:
wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52594
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52594-wifi-ath9k-Fix-potential-array-index-out-of-bounds-r.patch
- From: 5.15.0-106.116
- CVE-2023-52595
- Description:
wifi: rt2x00: restart beacon queue when hardware reset
- CVE: https://access.redhat.com/security/cve/CVE-2023-52595
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52595-wifi-rt2x00-restart-beacon-queue-when-hardware-reset.patch
- From: 5.15.0-106.116
- CVE-2023-52608
- Description:
firmware: arm_scmi: Check mailbox/SMT channel for consistency
- CVE: https://ubuntu.com/security/CVE-2023-52608
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52608-firmware-arm-scmi-check-mailbox-smt-channel-for-consistency.patch
- From: 5.15.0-106.116
- CVE-2023-52614
- Description:
PM / devfreq: Fix buffer overflow in trans_stat_show
- CVE: https://access.redhat.com/security/cve/CVE-2023-52614
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52614-pm-devfreq-fix-buffer-overflow-in-trans-stat-show.patch
- From: 5.15.0-106.116
- CVE-2023-52615
- Description:
hwrng: core - Fix page fault dead lock on mmap-ed hwrng
- CVE: https://access.redhat.com/security/cve/CVE-2023-52615
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52615-hwrng-core-fix-page-fault-dead-lock-on-mmap-ed-hwrng.patch
- From: 5.15.0-106.116
- CVE-2023-52618
- Description:
block/rnbd-srv: Check for unlikely string overflow
- CVE: https://access.redhat.com/security/cve/CVE-2023-52618
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52618-block-rnbd-srv-check-for-unlikely-string-overflow.patch
- From: 5.15.0-106.116
- CVE-2024-26645
- Description:
tracing: Ensure visibility when inserting an element into tracing_map
- CVE: https://access.redhat.com/security/cve/CVE-2024-26645
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26645-tracing-ensure-visibility-when-inserting-an-element-into-tracing-map.patch
- From: 5.15.0-106.116
- CVE-2024-26675
- Description:
ppp_async: limit MRU to 64K
- CVE: https://ubuntu.com/security/CVE-2024-26675
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26675-ppp-async-limit-mru-to-64k.patch
- From: 5.15.0-106.116
- CVE-2024-26671
- Description:
blk-mq: fix IO hang from sbitmap wakeup race
- CVE: https://ubuntu.com/security/CVE-2024-26671
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26671-blk-mq-fix-io-hang-from-sbitmap-wakeup-race.patch
- From: 5.15.0-106.116
- CVE-2024-26679
- Description:
inet: read sk->sk_family once in inet_recv_error()
- CVE: https://ubuntu.com/security/CVE-2024-26679
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26679-inet-read-sk-sk-family-once-in-inet-recv-error.patch
- From: 5.15.0-106.116
- CVE-2024-26665
- Description:
tunnels: fix out of bounds access when building IPv6 PMTU error
- CVE: https://ubuntu.com/security/CVE-2024-26665
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26665-tunnels-fix-out-of-bounds-access-when-building-ipv6-pmtu-error.patch
- From: 5.15.0-106.116
- CVE-2024-26684
- Description:
net: stmmac: xgmac: fix handling of DPP safety error for DMA channels
- CVE: https://ubuntu.com/security/CVE-2024-26684
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26684-net-stmmac-xgmac-fix-handling-of-dpp-safety-error-for-dma-channels.patch
- From: 5.15.0-106.116
- CVE-2024-26684
- Description:
net: stmmac: xgmac: fix handling of DPP safety error for DMA channels
- CVE: https://ubuntu.com/security/CVE-2024-26684
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26684-net-stmmac-xgmac-fix-handling-of-dpp-safety-error-for-dma-channels-kpatch.patch
- From: 5.15.0-106.116
- CVE-2024-26673
- Description:
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations
- CVE: https://ubuntu.com/security/CVE-2024-26673
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26673-netfilter-nft-ct-sanitize-layer-3-and-4-protocol-number-in-custom-expectations.patch
- From: 5.15.0-106.116
- CVE-2024-26664
- Description:
hwmon: (coretemp) Fix out-of-bounds memory access
- CVE: https://ubuntu.com/security/CVE-2024-26664
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26664-hwmon-coretemp-fix-out-of-bounds-memory-access.patch
- From: 5.15.0-106.116
- CVE-2024-26685
- Description:
nilfs2: fix potential bug in end_buffer_async_write
- CVE: https://ubuntu.com/security/CVE-2024-26685
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26685-nilfs2-fix-potential-bug-in-end-buffer-async-write.patch
- From: 5.15.0-106.116
- CVE-2024-26676
- Description:
af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.
- CVE: https://ubuntu.com/security/CVE-2024-26676
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26676-af-unix-call-kfree-skb-for-dead-unix-sk-oob-skb-in-gc.patch
- From: 5.15.0-106.116
- CVE-2024-26668
- Description:
netfilter: nft_limit: reject configurations that cause integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-26668
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26668-netfilter-nft-limit-reject-configurations-that-cause-integer-overflow-101.patch
- From: 5.15.0-106.116
- CVE-2024-26715
- Description:
usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend
- CVE: https://ubuntu.com/security/CVE-2024-26715
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26715-usb-dwc3-gadget-fix-null-pointer-dereference-in.patch
- From: 5.15.0-106.116
- CVE-2024-26695
- Description:
crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- CVE: https://ubuntu.com/security/CVE-2024-26695
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26695-crypto-ccp-fix-null-pointer-dereference-in.patch
- From: 5.15.0-106.116
- CVE-2024-26704
- Description:
ext4: fix double-free of blocks due to wrong extents moved_len
- CVE: https://ubuntu.com/security/CVE-2024-26704
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26704-ext4-fix-double-free-of-blocks-due-to-wrong-extents.patch
- From: 5.15.0-106.116
- CVE-2024-26702
- Description:
iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC
- CVE: https://ubuntu.com/security/CVE-2024-26702
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26702-iio-magnetometer-rm3100-add-boundary-check-for-the-value.patch
- From: 5.15.0-106.116
- CVE-2024-26697
- Description:
nilfs2: fix data corruption in dsync block recovery for small block sizes
- CVE: https://ubuntu.com/security/CVE-2024-26697
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26697-nilfs2-fix-data-corruption-in-dsync-block-recovery-for-small.patch
- From: 5.15.0-106.116
- CVE-2024-26696
- Description:
nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()
- CVE: https://ubuntu.com/security/CVE-2024-26696
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26696-nilfs2-fix-hang-in-nilfs-lookup-dirty-data-buffers.patch
- From: 5.15.0-106.116
- CVE-2024-26689
- Description:
ceph: prevent use-after-free in encode_cap_msg()
- CVE: https://ubuntu.com/security/CVE-2024-26689
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26689-ceph-prevent-use-after-free-in-encode-cap-msg.patch
- From: 5.15.0-106.116
- CVE-2024-26712
- Description:
Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0
- CVE:
- Patch: skipped/CVE-2024-26712.patch
- From:
- CVE-2023-52491
- Description:
media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run
- CVE: https://ubuntu.com/security/CVE-2023-52491
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52491-media-mtk-jpeg-Fix-use-after-free-bug-due-to-error-path-handling-in-mtk_jpeg_dec_device_run.patch
- From: kernel-5.15.0-106-116
- CVE-2024-26614
- Description:
Complex adaptation required. Network services prevents update because sleeps in inet_csk_accept() function.
- CVE:
- Patch: skipped/CVE-2024-26614.patch
- From:
- CVE-2023-52642
- Description:
media: rc: bpf attach/detach requires write permission
- CVE: https://ubuntu.com/security/CVE-2023-52642
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52642-media-rc-bpf-attach-detach-requires-write-permission.patch
- From: kernel-5.15.0-106-116
- CVE-2023-52643
- Description:
iio: core: fix memleak in iio_device_register_sysfs
- CVE: https://ubuntu.com/security/CVE-2023-52643
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52643-iio-core-fix-memleak-in-iio_device_register_sysfs.patch
- From: 5.15.0-106.116
- CVE-2024-26825
- Description:
nfc: nci: free rx_data_reassembly skb on NCI device cleanup
- CVE: https://ubuntu.com/security/CVE-2024-26825
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26825-nfc-nci-free-rx_data_reassembly-skb-on-NCI-device-cleanup.patch
- From: 5.15.0-106.116
- CVE-2024-26826
- Description:
mptcp: fix data re-injection from stale subflow
- CVE: https://ubuntu.com/security/CVE-2024-26826
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26826-mptcp-fix-data-re-injection-from-stale-subflow.patch
- From: 5.15.0-106.116
- CVE-2024-26829
- Description:
media: ir_toy: fix a memleak in irtoy_tx
- CVE: https://ubuntu.com/security/CVE-2024-26829
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26829-media-ir_toy-fix-a-memleak-in-irtoy_tx.patch
- From: kernel-5.15.0-106.116
- CVE-26920
- Description:
tracing/trigger: Fix to return error if failed to alloc snapshot
- CVE: https://ubuntu.com/security/CVE-2024-26920
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26920-tracing-trigger-Fix-to-return-error-if-failed-to-alloc-snapshot.patch
- From: kernel-5.15.0-106.116
- CVE-2024-26916
- Description:
Revert "drm/amd: flush any delayed gfxoff on suspend entry"
- CVE: https://ubuntu.com/security/CVE-2024-26916
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26916-Revert-drm-amd-flush-any-delayed-gfxoff-on-suspend-entry.patch
- From: kernel-5.15.0-106.116
- CVE-2023-52492
- Description:
dmaengine: fix NULL pointer in channel unregistration
- CVE: https://ubuntu.com/security/CVE-2023-52492
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52492-dmaengine-fix-null-pointer-in-channel-unregistration.patch
- From: 5.15.0-106.116
- CVE-2023-52493
- Description:
bus: mhi: host: Drop chan lock before queuing buffers
- CVE: https://ubuntu.com/security/CVE-2023-52493
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52493-bus-mhi-host-drop-chan-lock-before-queuing-buffers.patch
- From: 5.15.0-106.116
- CVE-2023-52494
- Description:
bus: mhi: host: Add alignment check for event ring read
- CVE: https://ubuntu.com/security/CVE-2023-52494
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52494-bus-mhi-host-add-alignment-check-for-event-ring-read.patch
- From: 5.15.0-106.116
- CVE-2024-26808
- Description:
netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for
- CVE: https://ubuntu.com/security/CVE-2024-26808
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26808-netfilter-nft-chain-filter-handle-netdev-unregister-for.patch
- From: 5.15.0-106.116
- CVE-2023-52486
- Description:
drm: Don't unref the same fb many times by mistake due to
- CVE: https://ubuntu.com/security/CVE-2023-52486
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52486-drm-don-t-unref-the-same-fb-many-times-by-mistake-due-to.patch
- From: 5.15.0-106.116
- CVE-2023-52602
- Description:
jfs: fix slab-out-of-bounds Read in dtSearch
- CVE: https://ubuntu.com/security/CVE-2023-52602
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52602-jfs-fix-slab-out-of-bounds-read-in-dtsearch.patch
- From: 5.15.0-106.116
- CVE-2024-26717
- Description:
HID: i2c-hid-of: fix NULL-deref on failed power up
- CVE: https://ubuntu.com/security/CVE-2024-26717
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26717-hid-i2c-hid-of-fix-null-deref-on-failed-power-up.patch
- From: 5.15.0-106.116
- CVE-2024-26717
- Description:
HID: i2c-hid-of: fix NULL-deref on failed power up
- CVE: https://ubuntu.com/security/CVE-2024-26717
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26717-hid-i2c-hid-of-fix-null-deref-on-failed-power-up-kpatch.patch
- From: 5.15.0-106.116
- CVE-2024-26720
- Description:
mm/writeback: fix possible divide-by-zero in
- CVE: https://ubuntu.com/security/CVE-2024-26720
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26720-mm-writeback-fix-possible-divide-by-zero-in.patch
- From: 5.15.0-106.116
- N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: 5.15.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- CVE-2024-2201
- Description:
x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
- CVE: https://linux.oracle.com/cve/CVE-2024-2201.html
- Patch: 5.15.0/CVE-2024-2201-x86-bugs-Change-commas-to-semicolons-in-spectre_v2-sysfs-file.patch
- From: kernel-uek-5.15.0-205.149.5.1.el8uek
- CVE-2024-2201
- Description:
x86/bhi: Add support for clearing branch history at syscall entry
- CVE: https://ubuntu.com/security/CVE-2024-2201
- Patch: 5.15.0/CVE-2024-2201-x86-bhi-Add-support-for-clearing-branch-history-at-syscall-entry-jammy.patch
- From: kernel-5.15.0-105.115
- CVE-2024-26707
- Description:
net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()
- CVE: https://ubuntu.com/security/CVE-2024-26707
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26707-net-hsr-remove-warn-once-in-send-hsr-supervision-frame.patch
- From: 5.15.0-106.116
- CVE-2023-47233 CVE-2024-35811
- Description:
wifi: brcmfmac: Fix use-after-free bug in
- CVE: https://ubuntu.com/security/CVE-2024-35811
- Patch: ubuntu-jammy/5.15.0-107.117/CVE-2023-47233-wifi-brcmfmac-fix-use-after-free-bug-in.patch
- From: 5.15.0-107.117
- CVE-2024-26622
- Description:
tomoyo: fix UAF write bug in tomoyo_write_control()
- CVE: https://ubuntu.com/security/CVE-2024-26622
- Patch: ubuntu-jammy/5.15.0-107.117/CVE-2024-26622-tomoyo-fix-uaf-write-bug-in-tomoyo-write-control.patch
- From: 5.15.0-107.117
- CVE-2023-52530
- Description:
wifi: mac80211: fix potential key use-after-free
- CVE: https://ubuntu.com/security/CVE-2023-52530
- Patch: ubuntu-jammy/5.15.0-107.117/CVE-2023-52530-wifi-mac80211-fix-potential-key-use-after-free.patch
- From: 5.15.0-107.117
- CVE-2023-52434
- Description:
smb: client: fix potential OOBs in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52434-smb-client-fix-potential-oobs-in-azure.patch
- From: 5.15.0-112.122
- CVE-2024-0841
- Description:
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-0841
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-0841-fs-hugetlb-fix-null-pointer-dereference-in.patch
- From: 5.15.0-112.122
- CVE-2023-6270 CVE-2024-26898
- Description:
aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
- CVE: https://ubuntu.com/security/CVE-2024-26898
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-6270-aoe-fix-the-potential-use-after-free-problem-in.patch
- From: 5.15.0-112.122
- CVE-2024-26852
- Description:
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
- CVE: https://ubuntu.com/security/CVE-2024-26852
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26852-net-ipv6-avoid-possible-uaf-in-ip6_route_mpath_notify.patch
- From: 5.15.0-112.122
- CVE-2023-52641
- Description:
fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()
- CVE: https://ubuntu.com/security/CVE-2023-52641
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52641-fs-ntfs3-add-null-ptr-dereference-checking-at-the-end-of-5.15.0-97.107.patch
- From: 5.15.0-112.122
- CVE-2023-52640
- Description:
fs/ntfs3: Fix oob in ntfs_listxattr
- CVE: https://ubuntu.com/security/CVE-2023-52640
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52640-fs-ntfs3-fix-oob-in-ntfs-listxattr-5.15.0-97.107.patch
- From: 5.15.0-112.122
- CVE-2023-52620
- Description:
netfilter: nf_tables: disallow timeout for anonymous sets
- CVE: https://ubuntu.com/security/CVE-2023-52620
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52620-netfilter-nf-tables-disallow-timeout-for-anonymous-sets.patch
- From: 5.15.0-112.122
- CVE-2023-52650
- Description:
drm/tegra: dsi: Add missing check for of_find_device_by_node
- CVE: https://ubuntu.com/security/CVE-2023-52650
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52650-drm-tegra-dsi-add-missing-check-for-of-find-device-by-node.patch
- From: 5.15.0-112.122
- CVE-2023-52497
- Description:
erofs: fix lz4 inplace decompression
- CVE: https://ubuntu.com/security/CVE-2023-52497
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52497-erofs-fix-lz4-inplace-decompression.patch
- From: 5.15.0-112.122
- CVE-2023-52644
- Description:
wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is
- CVE: https://ubuntu.com/security/CVE-2023-52644
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52644-wifi-b43-stop-wake-correct-queue-in-dma-tx-path-when-qos-is.patch
- From: 5.15.0-112.122
- CVE-2023-52645
- Description:
pmdomain: mediatek: fix race conditions with genpd
- CVE: https://ubuntu.com/security/CVE-2023-52645
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52645-pmdomain-mediatek-fix-race-conditions-with-genpd.patch
- From: 5.15.0-112.122
- CVE-2023-52652
- Description:
NTB: fix possible name leak in ntb_register_device()
- CVE: https://ubuntu.com/security/CVE-2023-52652
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52652-NTB-fix-possible-name-leak-in-ntb_register_device.patch
- From: 5.15.0-112.122
- CVE-2023-52662
- Description:
drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node
- CVE: https://ubuntu.com/security/CVE-2023-52662
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52662-drm-vmwgfx-fix-a-memleak-in-vmw_gmrid_man_get_node.patch
- From: 5.15.0-112.122
- CVE-2024-26883
- Description:
bpf: Fix stackmap overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26883
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26883-bpf-fix-stackmap-overflow-check-on-32-bit-arches.patch
- From: 5.15.0-112.122
- CVE-2024-26907
- Description:
RDMA/mlx5: Fix fortify source warning while accessing Eth segment
- CVE: https://ubuntu.com/security/CVE-2024-26907
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26907-rdma-mlx5-fix-fortify-source-warning-while-accessing-eth.patch
- From: 5.15.0-112.122
- CVE-2024-26816
- Description:
x86, relocs: Ignore relocations in .notes section
- CVE: https://ubuntu.com/security/CVE-2024-26816
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26816-x86-relocs-ignore-relocations-in-notes-section.patch
- From: 5.15.0-112.122
- CVE-2024-26894
- Description:
ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
- CVE: https://ubuntu.com/security/CVE-2024-26894
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26894-acpi-processor-idle-fix-memory-leak-in.patch
- From: 5.15.0-112.122
- CVE-2024-26884
- Description:
bpf: Fix hashtab overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26884
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26884-bpf-fix-hashtab-overflow-check-on-32-bit-arches.patch
- From: 5.15.0-112.122
- CVE-2024-26885
- Description:
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26885
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26885-bpf-fix-devmap-hash-overflow-check-on-32-bit-arches.patch
- From: 5.15.0-112.122
- CVE-2024-26843
- Description:
EFI Firmware: CVE patch is for EFI firmware which runs at boot time.
- CVE:
- Patch: skipped/CVE-2024-26843.patch
- From:
- CVE-2024-27030
- Description:
octeontx2: CVE patch is outside the scope.
- CVE:
- Patch: skipped/CVE-2024-27030.patch
- From:
- CVE-2024-26736
- Description:
afs: Increase buffer size in afs_update_volume_status()
- CVE: https://ubuntu.com/security/CVE-2024-26736
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26736-afs-Increase-buffer-size-in-afs_update_volume_status.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26735
- Description:
ipv6: sr: fix possible use-after-free and null-ptr-deref
- CVE: https://ubuntu.com/security/CVE-2024-26735
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and-null-ptr-deref.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26659
- Description:
xhci: process isoc TD properly when there was a transaction error mid TD.
- CVE: https://ubuntu.com/security/CVE-2024-26659
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26659-xhci-process-isoc-TD-properly-when-there-was-a-transaction-error-mid-TD.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26659
- Description:
xhci: process isoc TD properly when there was a transaction error mid TD.
- CVE: https://ubuntu.com/security/CVE-2024-26659
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26659-xhci-process-isoc-TD-properly-when-there-was-a-transaction-error-mid-TD-kpatch.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26659
- Description:
xhci: handle isoc Babble and Buffer Overrun events properly
- CVE: https://ubuntu.com/security/CVE-2024-26659
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26659-xhci-handle-isoc-Babble-and-Buffer-Overrun-events-properly.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26651
- Description:
sr9800: Add check for usbnet_get_endpoints
- CVE: https://ubuntu.com/security/CVE-2024-26651
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26651-sr9800-Add-check-for-usbnet_get_endpoints.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26603
- Description:
x86/fpu: Stop relying on userspace for info to fault in xsave buffer
- CVE: https://ubuntu.com/security/CVE-2024-26603
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26603-x86-fpu-Stop-relying-on-userspace-for-info-to-fault-in-xsave-buffer.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26601
- Description:
ext4: regenerate buddy after block freeing failed if under fc replay
- CVE: https://ubuntu.com/security/CVE-2024-26601
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26601-ext4-regenerate-buddy-after-block-freeing-failed-if-under-fc-replay.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26584
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26584.patch
- From:
- CVE-2023-7042
- Description:
wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()
- CVE: https://ubuntu.com/security/CVE-2023-7042
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-7042-wifi-ath10k-fix-NULL-pointer-dereference-in-ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26790
- Description:
dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read
- CVE: https://ubuntu.com/security/CVE-2024-26790
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26790-dmaengine-fsl-qdma-fix-SoC-may-hang-on-16-byte-unaligned-read.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26791
- Description:
btrfs: dev-replace: properly validate device names
- CVE: https://ubuntu.com/security/CVE-2024-26791
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26791-btrfs-dev-replace-properly-validate-device-names.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26792
- Description:
btrfs: fix double free of anonymous device after snapshot creation failure
- CVE: https://ubuntu.com/security/CVE-2024-26792
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26792-btrfs-fix-double-free-of-anonymous-device-after-snapshot-creation-failure.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26793
- Description:
gtp: fix use-after-free and null-ptr-deref in gtp_newlink()
- CVE: https://ubuntu.com/security/CVE-2024-26793
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26793-gtp-fix-use-after-free-and-null-ptr-deref-in-gtp_newlink.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26795
- Description:
RISCV arch not supported.
- CVE:
- Patch: skipped/CVE-2024-26795.patch
- From:
- CVE-2024-26798
- Description:
fbcon: always restore the old font data in fbcon_do_set_font()
- CVE: https://ubuntu.com/security/CVE-2024-26798
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26798-fbcon-always-restore-the-old-font-data-in-fbcon_do_set_font.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26801
- Description:
Bluetooth: Avoid potential use-after-free in hci_error_reset
- CVE: https://ubuntu.com/security/CVE-2024-26801
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26801-Bluetooth-Avoid-potential-use-after-free-in-hci_error_reset.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26802
- Description:
stmmac: Clear variable when destroying workqueue
- CVE: https://ubuntu.com/security/CVE-2024-26802
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26802-stmmac-Clear-variable-when-destroying-workqueue.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26803
- Description:
net: veth: clear GRO when clearing XDP even when down
- CVE: https://ubuntu.com/security/CVE-2024-26803
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26803-net-veth-clear-GRO-when-clearing-XDP-even-when-down.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26804
- Description:
net: ip_tunnel: prevent perpetual headroom growth
- CVE: https://ubuntu.com/security/CVE-2024-26804
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26804-net-ip_tunnel-prevent-perpetual-headroom-growth.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26805
- Description:
netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
- CVE: https://ubuntu.com/security/CVE-2024-26805
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26805-netlink-Fix-kernel-infoleak-after-free-in-__skb_datagram_iter.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26809
- Description:
netfilter: nft_set_pipapo: release elements in clone only from destroy path
- CVE: https://ubuntu.com/security/CVE-2024-26809
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26809-netfilter-nft_set_pipapo-release-elements-in-clone-only-from-destroy-path-106.116.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27390
- Description:
ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down()
- CVE: https://ubuntu.com/security/CVE-2024-27390
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27390-ipv6-mcast-remove-one-synchronize_net-barrier-in-ipv.patch
- From: 5.15.0-112.122
- CVE-2024-27403
- Description:
netfilter: flowtable: simplify route logic
- CVE: https://ubuntu.com/security/CVE-2024-27403
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27403-netfilter-flowtable-simplify-route-logic.patch
- From: 5.15.0-111.121
- CVE-2024-27403
- Description:
netfilter: nft_flow_offload: release dst in case direct xmit path is used
- CVE: https://ubuntu.com/security/CVE-2024-27403
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27403-netfilter-nft_flow_offload-release-dst-in-case-direct-xmit-path-is-used.patch
- From: 5.15.0-111.121
- CVE-2024-27403
- Description:
netfilter: nft_flow_offload: reset dst in route object after setting up flow
- CVE: https://ubuntu.com/security/CVE-2024-27403
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27403-netfilter-nft_flow_offload-reset-dst-in-route-object.patch
- From: 5.15.0-112.122
- CVE-2024-27413
- Description:
efi/capsule-loader: fix incorrect allocation size
- CVE: https://ubuntu.com/security/CVE-2024-27413
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27413-efi-capsule-loader-fix-incorrect-allocation-size.patch
- From: 5.15.0-112.122
- CVE-2024-27417
- Description:
ipv6: fix potential "struct net" leak in inet6_rtm_getaddr()
- CVE: https://ubuntu.com/security/CVE-2024-27417
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27417-ipv6-fix-potential-struct-net-leak-in-inet6_rtm_getaddr.patch
- From: 5.15.0-112.122
- CVE-2024-27419
- Description:
netrom: Fix data-races around sysctl_net_busy_read
- CVE: https://ubuntu.com/security/CVE-2024-27419
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27419-netrom-Fix-data-races-around-sysctl_net_busy_read.patch
- From: 5.15.0-112.122
- CVE-2024-27405
- Description:
usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs
- CVE: https://ubuntu.com/security/CVE-2024-27405
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27405-usb-gadget-ncm-Avoid-dropping-datagrams-of-properly-.patch
- From: 5.15.0-112.122
- CVE-2024-27410
- Description:
wifi: nl80211: reject iftype change with mesh ID change
- CVE: https://ubuntu.com/security/CVE-2024-27410
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27410-wifi-nl80211-reject-iftype-change-with-mesh-ID-change.patch
- From: 5.15.0-112.122
- CVE-2024-27412
- Description:
power: supply: bq27xxx-i2c: Do not free non existing IRQ
- CVE: https://ubuntu.com/security/CVE-2024-27412
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27412-power-supply-bq27xxx-i2c-Do-not-free-non-existing-IR.patch
- From: 5.15.0-112.122
- CVE-2024-27414
- Description:
rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back
- CVE: https://ubuntu.com/security/CVE-2024-27414
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27414-rtnetlink-fix-error-logic-of-IFLA_BRIDGE_FLAGS-writi.patch
- From: 5.15.0-112.122
- CVE-2024-26771
- Description:
dmaengine: ti: edma: Add some null pointer checks to the
- CVE: https://ubuntu.com/security/CVE-2024-26771
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26771-dmaengine-ti-edma-add-some-null-pointer-checks-to-the-5.15.0-97.107.patch
- From: 5.15.0-112.122
- CVE-2024-26772
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
- CVE: https://ubuntu.com/security/CVE-2024-26772
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26772-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 5.15.0-112.122
- CVE-2024-26773
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
- CVE: https://ubuntu.com/security/CVE-2024-26773
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26773-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 5.15.0-112.122
- CVE-2024-26774
- Description:
ext4: avoid dividing by 0 in mb_update_avg_fragment_size()
- CVE: https://ubuntu.com/security/CVE-2024-26774
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26774-ext4-avoid-dividing-by-0-in-mb-update-avg-fragment-size.patch
- From: 5.15.0-112.122
- CVE-2024-26776
- Description:
spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were
- CVE: https://ubuntu.com/security/CVE-2024-26776
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26776-spi-hisi-sfc-v3xx-return-irq-none-if-no-interrupts-were.patch
- From: 5.15.0-112.122
- CVE-2024-26777
- Description:
fbdev: sis: Error out if pixclock equals zero
- CVE: https://ubuntu.com/security/CVE-2024-26777
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26777-fbdev-sis-error-out-if-pixclock-equals-zero.patch
- From: 5.15.0-112.122
- CVE-2024-26778
- Description:
fbdev: savage: Error out if pixclock equals zero
- CVE: https://ubuntu.com/security/CVE-2024-26778
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26778-fbdev-savage-error-out-if-pixclock-equals-zero.patch
- From: 5.15.0-112.122
- CVE-2024-26779
- Description:
wifi: mac80211: fix race condition on enabling fast-xmit
- CVE: https://ubuntu.com/security/CVE-2024-26779
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26779-wifi-mac80211-fix-race-condition-on-enabling-fast-xmit.patch
- From: 5.15.0-112.122
- CVE-2024-26782
- Description:
mptcp: fix double-free on socket dismantle
- CVE: https://ubuntu.com/security/CVE-2024-26782
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26782-mptcp-fix-double-free-on-socket-dismantle.patch
- From: 5.15.0-112.122
- CVE-2024-26787
- Description:
STM32 arch is not supported. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-26787.patch
- From:
- CVE-2024-26788
- Description:
NXP Layerscape SoCs affected only. Unable to fix early initialization.
- CVE:
- Patch: skipped/CVE-2024-26788.patch
- From:
- CVE-2024-26870
- Description:
NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102
- CVE: https://ubuntu.com/security/CVE-2024-26870
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26870-nfsv4-2-fix-nfs4-listxattr-kernel-bug-at-mm-usercopy-c-102.patch
- From: 5.15.0-112.122
- CVE-2024-26878
- Description:
quota: Fix potential NULL pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-26878
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26878-quota-fix-potential-null-pointer-dereference.patch
- From: 5.15.0-112.122
- CVE-2024-26840
- Description:
cachefiles: fix memory leak in cachefiles_add_cache()
- CVE: https://ubuntu.com/security/CVE-2024-26840
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26840-cachefiles-fix-memory-leak-in-cachefiles-add-cache.patch
- From: 5.15.0-112.122
- CVE-2024-26851
- Description:
netfilter: nf_conntrack_h323: Add protection for bmp length
- CVE: https://ubuntu.com/security/CVE-2024-26851
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26851-netfilter-nf-conntrack-h323-add-protection-for-bmp-length.patch
- From: 5.15.0-112.122
- CVE-2024-26863
- Description:
hsr: Fix uninit-value access in hsr_get_node()
- CVE: https://ubuntu.com/security/CVE-2024-26863
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26863-hsr-fix-uninit-value-access-in-hsr-get-node.patch
- From: 5.15.0-112.122
- CVE-2024-26882
- Description:
net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
- CVE: https://ubuntu.com/security/CVE-2024-26882
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26882-net-ip-tunnel-make-sure-to-pull-inner-header-in.patch
- From: 5.15.0-112.122
- CVE-2024-26889
- Description:
Bluetooth: hci_core: Fix possible buffer overflow
- CVE: https://ubuntu.com/security/CVE-2024-26889
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26889-bluetooth-hci-core-fix-possible-buffer-overflow.patch
- From: 5.15.0-112.122
- CVE-2024-26901
- Description:
do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
- CVE: https://ubuntu.com/security/CVE-2024-26901
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26901-do-sys-name-to-handle-use-kzalloc-to-fix-kernel-infoleak.patch
- From: 5.15.0-112.122
- CVE-2024-26906
- Description:
x86/sev-es: Allow copy_from_kernel_nofault() in earlier boot
- CVE: https://ubuntu.com/security/CVE-2024-26906
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26906-x86-sev-es-Allow-copy_from_kernel_nofault-in-earlier.patch
- From: 5.15.0-112.122
- CVE-2024-26906
- Description:
x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()
- CVE: https://ubuntu.com/security/CVE-2024-26906
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26906-x86-mm-disallow-vsyscall-page-read-for-97.patch
- From: 5.15.0-112.122
- CVE-2024-27024
- Description:
net/rds: fix WARNING in rds_conn_connect_if_down
- CVE: https://ubuntu.com/security/CVE-2024-27024
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27024-net-rds-fix-WARNING-in-rds_conn_connect_if_down.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27028
- Description:
spi: spi-mt65xx: Fix NULL pointer access in interrupt handler
- CVE: https://ubuntu.com/security/CVE-2024-27028
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27028-spi-spi-mt65xx-Fix-NULL-pointer-access-in-interrupt-handler.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27034
- Description:
f2fs: replace congestion_wait() calls with io_schedule_timeout()
- CVE: https://ubuntu.com/security/CVE-2024-27034
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27034-f2fs-replace-congestion_wait-calls-with-io_schedule_timeout.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27034
- Description:
f2fs: compress: fix to cover normal cluster write with cp_rwsem
- CVE: https://ubuntu.com/security/CVE-2024-27034
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27034-f2fs-compress-fix-to-cover-normal-cluster-write-with-cp_rwsem.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27037
- Description:
clk: zynq: Prevent null pointer dereference caused by kmalloc failure
- CVE: https://ubuntu.com/security/CVE-2024-27037
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27037-clk-zynq-Prevent-null-pointer-dereference-caused-by-kmalloc-failure.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27038
- Description:
clk: Fix clk_core_get NULL dereference
- CVE: https://ubuntu.com/security/CVE-2024-27038
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27038-clk-Fix-clk_core_get-NULL-dereference.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27039
- Description:
clk: hisilicon: hi3559a: Fix an erroneous devm_kfree()
- CVE: https://ubuntu.com/security/CVE-2024-27039
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27039-clk-hisilicon-hi3559a-Fix-an-erroneous-devm_kfree.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27044
- Description:
drm/amd/display: Fix potential NULL pointer dereferences in 'dcn10_set_output_transfer_func()'
- CVE: https://ubuntu.com/security/CVE-2024-27044
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27044-drm-amd-display-Fix-potential-NULL-pointer-dereferences-in-dcn10_set_output_transfer_func.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27045
- Description:
drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'
- CVE: https://ubuntu.com/security/CVE-2024-27045
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27045-drm-amd-display-Fix-a-potential-buffer-overflow-in-dp_dsc_clock_en_read.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27046
- Description:
nfp: flower: handle acti_netdevs allocation failure
- CVE: https://ubuntu.com/security/CVE-2024-27046
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27046-nfp-flower-handle-acti_netdevs-allocation-failure.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27047
- Description:
net: phy: fix phy_get_internal_delay accessing an empty array
- CVE: https://ubuntu.com/security/CVE-2024-27047
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27047-net-phy-fix-phy_get_internal_delay-accessing-an-empty-array.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26769
- Description:
nvmet-fc: release reference on target port
- CVE: https://ubuntu.com/security/CVE-2024-26769
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26769-0001-nvmet-fc-release-reference-on-target-port.patch
- From: 5.15.0-112.122
- CVE-2024-26769
- Description:
nvmet-fc: avoid deadlock on delete association path
- CVE: https://ubuntu.com/security/CVE-2024-26769
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26769-0002-nvmet-fc-avoid-deadlock-on-delete-association-path-kpatch.patch
- From: 5.15.0-112.122
- CVE-2024-26766
- Description:
IB/hfi1: Fix sdma.h tx->num_descs off-by-one error
- CVE: https://ubuntu.com/security/CVE-2024-26766
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26766-ib-hfi1-fix-sdma-h-tx-num-descs-off-by-one-error.patch
- From: 5.15.0-112.122
- CVE-2024-26752
- Description:
l2tp: pass correct message length to ip6_append_data
- CVE: https://ubuntu.com/security/CVE-2024-26752
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26752-0003-l2tp-pass-correct-message-length-to-ip6-append-data.patch
- From: 5.15.0-112.122
- CVE-2024-26763
- Description:
dm-crypt: don't modify the data when using authenticated
- CVE: https://ubuntu.com/security/CVE-2024-26763
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26763-dm-crypt-don-t-modify-the-data-when-using-authenticated.patch
- From: 5.15.0-112.122
- CVE-2024-26751
- Description:
CVE targets a specific ARM processor.
- CVE:
- Patch: skipped/CVE-2024-26751.patch
- From:
- CVE-2024-26749
- Description:
usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()
- CVE: https://ubuntu.com/security/CVE-2024-26749
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26749-usb-cdns3-fixed-memory-use-after-free-at.patch
- From: 5.15.0-112.122
- CVE-2024-26747
- Description:
usb: roles: fix NULL pointer issue when put module's reference
- CVE: https://ubuntu.com/security/CVE-2024-26747
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26747-usb-roles-fix-null-pointer-issue-when-put-module-s-kpatch.patch
- From: 5.15.0-112.122
- CVE-2024-26748
- Description:
usb: cdns3: fix memory double free when handle zero packet
- CVE: https://ubuntu.com/security/CVE-2024-26748
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26748-usb-cdns3-fix-memory-double-free-when-handle-zero-packet.patch
- From: 5.15.0-112.122
- CVE-2024-26744
- Description:
RDMA/srpt: Support specifying the srpt_service_guid
- CVE: https://access.redhat.com/security/cve/CVE-2024-26744
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26744-rdma-srpt-support-specifying-the-srpt-service-guid-kpatch.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26743
- Description:
RDMA/qedr: Fix qedr_create_user_qp error flow
- CVE: https://ubuntu.com/security/CVE-2024-26743
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26743-rdma-qedr-fix-qedr-create-user-qp-error-flow.patch
- From: 5.15.0-112.122
- CVE-2024-26764
- Description:
fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio
- CVE: https://ubuntu.com/security/CVE-2024-26764
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26764-fs-aio-restrict-kiocb-set-cancel-fn-to-i-o-submitted-via.patch
- From: 5.15.0-112.122
- CVE-2024-26764
- Description:
fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio
- CVE: https://ubuntu.com/security/CVE-2024-26764
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26764-fs-aio-restrict-kiocb-set-cancel-fn-to-i-o-submitted-via-kpatch.patch
- From: 5.15.0-112.122
- CVE-2024-22099
- Description:
Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
- CVE: https://ubuntu.com/security/CVE-2024-22099
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-22099-CVE-2024-26903-bluetooth-rfcomm-fix-null-ptr-deref.patch
- From: 5.15.0-112.122
- CVE-2024-22099
- Description:
Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
- CVE: https://ubuntu.com/security/CVE-2024-22099
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-22099-CVE-2024-26903-bluetooth-rfcomm-fix-null-ptr-deref-kpatch.patch
- From: 5.15.0-112.122
- CVE-2024-27043
- Description:
media: edia: dvbdev: fix a use-after-free
- CVE: https://ubuntu.com/security/CVE-2024-27043
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27043-media-edia-dvbdev-fix-a-use-after-free.patch
- From: 5.15.0-112.122
- CVE-2024-27431
- Description:
cpumap: Zero-initialise xdp_rxq_info struct before running XDP program
- CVE: https://ubuntu.com/security/CVE-2024-27431
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27431-cpumap-zero-initialise-xdp-rxq-info-struct-before-running-xdp-program.patch
- From: 5.15.0-112.122
- CVE-2024-35845
- Description:
wifi: iwlwifi: dbg-tlv: ensure NUL termination
- CVE: https://ubuntu.com/security/CVE-2024-35845
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-35845-wifi-iwlwifi-dbg-tlv-ensure-nul-termination.patch
- From: 5.15.0-112.122
- CVE-2024-35830
- Description:
media: tc358743: register v4l2 async device only after successful setup
- CVE: https://ubuntu.com/security/CVE-2024-35830
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-35830-media-tc358743-register-v4l2-async-device-only-after-successful-setup.patch
- From: 5.15.0-112.122
- CVE-2024-35844
- Description:
f2fs: compress: fix reserve_cblocks counting error when out of space
- CVE: https://ubuntu.com/security/CVE-2024-35844
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-35844-f2fs-compress-fix-reserve-cblocks-counting-error-when-out-of-space.patch
- From: 5.15.0-112.122
- CVE-2024-27432
- Description:
net: ethernet: mtk_eth_soc: fix PPE hanging issue
- CVE: https://ubuntu.com/security/CVE-2024-27432
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27432-net-ethernet-mtk-eth-soc-fix-ppe-hanging-issue.patch
- From: 5.15.0-112.122
- CVE-2024-35829
- Description:
drm/lima: fix a memleak in lima_heap_alloc
- CVE: https://ubuntu.com/security/CVE-2024-35829
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-35829-drm-lima-fix-a-memleak-in-lima-heap-alloc.patch
- From: 5.15.0-112.122
- CVE-2024-35828
- Description:
wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer()
- CVE: https://ubuntu.com/security/CVE-2024-35828
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-35828-wifi-libertas-fix-some-memleaks-in-lbs-allocate-cmd-buffer.patch
- From: 5.15.0-112.122
- CVE-2024-27436
- Description:
ALSA: usb-audio: Stop parsing channels bits when all channels are found.
- CVE: https://ubuntu.com/security/CVE-2024-27436
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27436-alsa-usb-audio-stop-parsing-channels-bits-when-all-channels-are-found.patch
- From: 5.15.0-112.122
- CVE-2024-26845
- Description:
scsi: target: core: Add TMF to tmr_list handling
- CVE: https://ubuntu.com/security/CVE-2024-26845
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26845-scsi-target-core-add-tmf-to-tmr-list-handling.patch
- From: 5.15.0-112.122
- CVE-2024-26839
- Description:
IB/hfi1: Fix a memleak in init_credit_return
- CVE: https://ubuntu.com/security/CVE-2024-26839
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26839-ib-hfi1-fix-a-memleak-in-init-credit-return.patch
- From: 5.15.0-112.122
- CVE-2024-26835
- Description:
netfilter: nf_tables: set dormant flag on hook register failure
- CVE: https://ubuntu.com/security/CVE-2024-26835
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26835-netfilter-nf-tables-set-dormant-flag-on-hook-register-failure.patch
- From: 5.15.0-112.122
- CVE-2024-26833
- Description:
drm/amd/display: Fix memory leak in dm_sw_fini()
- CVE: https://ubuntu.com/security/CVE-2024-26833
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26833-drm-amd-display-fix-memory-leak-in-dm-sw-fini.patch
- From: 5.15.0-112.122
- CVE-2024-26915
- Description:
drm/amdgpu: Reset IH OVERFLOW_CLEAR bit
- CVE: https://ubuntu.com/security/CVE-2024-26915
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26915-drm-amdgpu-reset-ih-overflow-clear-bit.patch
- From: 5.15.0-112.122
- CVE-2024-26862
- Description:
packet: annotate data-races around ignore_outgoing
- CVE: https://ubuntu.com/security/CVE-2024-26862
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26862-packet-annotate-data-races-around-ignore-outgoing.patch
- From: 5.15.0-112.122
- CVE-2024-26838
- Description:
RDMA/irdma: Fix KASAN issue with tasklet
- CVE: https://ubuntu.com/security/CVE-2024-26838
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26838-rdma-irdma-fix-kasan-issue-with-tasklet.patch
- From: 5.15.0-112.122
- CVE-2024-26583
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26583.patch
- From:
- CVE-2024-26585
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26585.patch
- From:
- CVE-2024-26856
- Description:
net: sparx5: Fix use after free inside sparx5_del_mact_entry
- CVE: https://ubuntu.com/security/CVE-2024-26856
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26856-net-sparx5-fix-use-after-free-inside-sparx5-del-mact-entry.patch
- From: 5.15.0-112.122
- CVE-2024-26855
- Description:
net: ice: Fix potential NULL pointer dereference in
- CVE: https://ubuntu.com/security/CVE-2024-26855
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26855-net-ice-fix-potential-null-pointer-dereference-in-ice-bridge-setlink.patch
- From: 5.15.0-112.122
- CVE-2024-26881
- Description:
net: hns3: fix kernel crash when 1588 is received on HIP08 devices
- CVE: https://ubuntu.com/security/CVE-2024-26881
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26881-net-hns3-fix-kernel-crash-when-1588-is-received-on-hip08-devices.patch
- From: 5.15.0-112.122
- CVE-2024-26880
- Description:
dm: call the resume method on internal suspend
- CVE: https://ubuntu.com/security/CVE-2024-26880
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26880-dm-call-the-resume-method-on-internal-suspend.patch
- From: 5.15.0-112.122
- CVE-2024-26877
- Description:
crypto: xilinx - call finalize with bh disabled
- CVE: https://ubuntu.com/security/CVE-2024-26877
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26877-crypto-xilinx-call-finalize-with-bh-disabled.patch
- From: 5.15.0-112.122
- CVE-2024-26875
- Description:
media: pvrusb2: fix uaf in pvr2_context_set_notify
- CVE: https://ubuntu.com/security/CVE-2024-26875
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26875-media-pvrusb2-fix-uaf-in-pvr2-context-set-notify.patch
- From: 5.15.0-112.122
- CVE-2024-26874
- Description:
drm/mediatek: Fix a null pointer crash in
- CVE: https://ubuntu.com/security/CVE-2024-26874
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26874-drm-mediatek-fix-a-null-pointer-crash-in-mtk-drm-crtc-finish-page-flip.patch
- From: 5.15.0-112.122
- CVE-2024-26872
- Description:
RDMA/srpt: Do not register event handler until srpt device is fully setup
- CVE: https://ubuntu.com/security/CVE-2024-26872
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26872-rdma-srpt-do-not-register-event-handler-until-srpt-device-is-fully-setup.patch
- From: 5.15.0-112.122
- CVE-2024-26891
- Description:
PCI: Make pci_dev_is_disconnected() helper public for other drivers
- CVE: https://ubuntu.com/security/CVE-2024-26891
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26891-0001-PCI-Make-pci_dev_is_disconnected-helper-public-for-o.patch
- From: 5.15.0-112.122
- CVE-2024-26891
- Description:
iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected
- CVE: https://ubuntu.com/security/CVE-2024-26891
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26891-iommu-vt-d-don-t-issue-ats-invalidation-request-when-device-is-disconnected.patch
- From: 5.15.0-112.122
- CVE-2024-26861
- Description:
wireguard: receive: annotate data-race around receiving_counter.counter
- CVE: https://ubuntu.com/security/CVE-2024-26861
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26861-wireguard-receive-annotate-data-race-around-receiving-counter-counter.patch
- From: 5.15.0-112.122
- CVE-2024-26859
- Description:
net/bnx2x: Prevent access to a freed page in page_pool
- CVE: https://ubuntu.com/security/CVE-2024-26859
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26859-net-bnx2x-prevent-access-to-a-freed-page-in-page-pool.patch
- From: 5.15.0-112.122
- CVE-2024-27051
- Description:
cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's
- CVE: https://ubuntu.com/security/CVE-2024-27051
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27051-cpufreq-brcmstb-avs-cpufreq-add-check-for-cpufreq-cpu-get-s.patch
- From: 5.15.0-112.122
- CVE-2024-27052
- Description:
wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work
- CVE: https://ubuntu.com/security/CVE-2024-27052
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27052-wifi-rtl8xxxu-add-cancel-work-sync-for-c2hcmd-work.patch
- From: 5.15.0-112.122
- CVE-2024-27053
- Description:
wifi: wilc1000: fix RCU usage in connect path
- CVE: https://ubuntu.com/security/CVE-2024-27053
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27053-wifi-wilc1000-fix-rcu-usage-in-connect-path-5.15.0-107.117.patch
- From: 5.15.0-112.122
- CVE-2024-27054
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-27054.patch
- From:
- CVE-2024-27065
- Description:
netfilter: nf_tables: do not compare internal table flags on
- CVE: https://ubuntu.com/security/CVE-2024-27065
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27065-netfilter-nf-tables-do-not-compare-internal-table-flags-on.patch
- From: 5.15.0-112.122
- CVE-2024-27073
- Description:
media: ttpci: fix two memleaks in budget_av_attach
- CVE: https://ubuntu.com/security/CVE-2024-27073
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27073-media-ttpci-fix-two-memleaks-in-budget-av-attach.patch
- From: 5.15.0-112.122
- CVE-2024-27074
- Description:
media: go7007: fix a memleak in go7007_load_encoder
- CVE: https://ubuntu.com/security/CVE-2024-27074
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27074-media-go7007-fix-a-memleak-in-go7007-load-encoder.patch
- From: 5.15.0-112.122
- CVE-2024-27075
- Description:
media: dvb-frontends: avoid stack overflow warnings with
- CVE: https://ubuntu.com/security/CVE-2024-27075
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27075-media-dvb-frontends-avoid-stack-overflow-warnings-with.patch
- From: 5.15.0-112.122
- CVE-2024-27076
- Description:
media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak
- CVE: https://ubuntu.com/security/CVE-2024-27076
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27076-media-imx-csc-scaler-fix-v4l2-ctrl-handler-memory-leak.patch
- From: 5.15.0-112.122
- CVE-2024-27077
- Description:
media: v4l2-mem2mem: fix a memleak in
- CVE: https://ubuntu.com/security/CVE-2024-27077
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27077-media-v4l2-mem2mem-fix-a-memleak-in.patch
- From: 5.15.0-112.122
- CVE-2024-27078
- Description:
media: v4l2-tpg: fix some memleaks in tpg_alloc
- CVE: https://ubuntu.com/security/CVE-2024-27078
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27078-media-v4l2-tpg-fix-some-memleaks-in-tpg-alloc.patch
- From: 5.15.0-112.122
- CVE-2024-27388
- Description:
SUNRPC: fix some memleaks in gssx_dec_option_array
- CVE: https://ubuntu.com/security/CVE-2024-27388
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27388-sunrpc-fix-some-memleaks-in-gssx-dec-option-array.patch
- From: 5.15.0-112.122
- CVE-2024-26733
- Description:
arp: Prevent overflow in arp_req_get().
- CVE: https://ubuntu.com/security/CVE-2024-26733
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26733-arp-prevent-overflow-in-arp-req-get.patch
- From: 5.15.0-112.122
- CVE-2024-26737
- Description:
eBPF: low score UAF with CONFIG_BPF_UNPRIV_DEFAULT_OFF=y by default but needs complex adaptation.
- CVE:
- Patch: skipped/CVE-2024-26737.patch
- From:
- CVE-2024-21823
- Description:
VFIO: Add the SPR_DSA and SPR_IAX devices to the denylist
- CVE: https://ubuntu.com/security/CVE-2024-21823
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-21823-VFIO-Add-the-SPR_DSA-and-SPR_IAX-devices-to-the-denylist.patch
- From: 5.15.0-112.122
- CVE-2024-26897
- Description:
WiFi - Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-26897.patch
- From:
- CVE-2024-26846
- Description:
nvme-fc: do not wait in vain when unloading module
- CVE: https://ubuntu.com/security/CVE-2024-26846
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26846-nvme-fc-do-not-wait-in-vain-when-unloading-module.patch
- From: 5.15.0-112.122
- CVE-2024-26846
- Description:
nvme-fc: do not wait in vain when unloading module
- CVE: https://ubuntu.com/security/CVE-2024-26846
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26846-nvme-fc-do-not-wait-in-vain-when-unloading-module-kpatch.patch
- From: 5.15.0-112.122
- CVE-2024-26857
- Description:
geneve: make sure to pull inner header in geneve_rx()
- CVE: https://ubuntu.com/security/CVE-2024-26857
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26857-geneve-make-sure-to-pull-inner-header-in-geneve-rx.patch
- From: 5.15.0-112.122
- CVE-2024-26879
- Description:
clk: meson: Add missing clocks to axg_clk_regmaps
- CVE: https://ubuntu.com/security/CVE-2024-26879
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26879-clk-meson-add-missing-clocks-to-axg-clk-regmaps.patch
- From: 5.15.0-112.122
- CVE-2024-26879
- Description:
clk: meson: Add missing clocks to axg_clk_regmaps
- CVE: https://ubuntu.com/security/CVE-2024-26879
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26879-clk-meson-add-missing-clocks-to-axg-clk-regmaps-kpatch.patch
- From: 5.15.0-112.122
- CVE-2024-26895
- Description:
wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces
- CVE: https://ubuntu.com/security/CVE-2024-26895
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26895-wifi-wilc1000-prevent-use-after-free-on-vif-when-cleaning-up-all-interfaces-5.15.0-107.117.patch
- From: 5.15.0-112.122
- CVE-2024-26924
- Description:
netfilter: nft_set_pipapo: do not free live element
- CVE: https://ubuntu.com/security/CVE-2024-26924
- Patch: ubuntu-jammy/5.15.0-113.123/CVE-2024-26924-netfilter-nft-set-pipapo-do-not-free-live-element.patch
- From: 5.15.0-113.123
- CVE-2024-26643
- Description:
netfilter: nf_tables: mark set as dead when unbinding
- CVE: https://ubuntu.com/security/CVE-2024-26643
- Patch: ubuntu-jammy/5.15.0-113.123/CVE-2024-26643-netfilter-nf-tables-mark-set-as-dead-when-unbinding.patch
- From: 5.15.0-113.123
- CVE-2024-26828
- Description:
cifs: fix underflow in parse_server_interfaces()
- CVE: https://ubuntu.com/security/CVE-2024-26828
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26828-cifs-fix-underflow-in-parse_server_interfaces-azure1067.patch
- From: 5.15.0-116.126
- CVE-2024-24857 CVE-2024-24858 CVE-2024-24859
- Description:
Bluetooth: Fix TOCTOU in HCI debugfs implementation
- CVE: https://ubuntu.com/security/CVE-2024-24859
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-24857-Bluetooth-Fix-TOCTOU-in-HCI-debugfs-implementation.patch
- From: 5.15.0-116.126
- CVE-2024-26934
- Description:
USB: core: Fix deadlock in usb_deauthorize_interface()
- CVE: https://ubuntu.com/security/CVE-2024-26934
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26934-USB-core-Fix-deadlock-in-usb_deauthorize_interface.patch
- From: 5.15.0-116.126
- CVE-2024-23307
- Description:
md/raid5: fix atomicity violation in raid5_cache_count
- CVE: https://ubuntu.com/security/CVE-2024-23307
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-23307-md-raid5-fix-atomicity-violation-in-raid5_cache_count.patch
- From: 5.15.0-116.126
- CVE-2024-26923
- Description:
af_unix: Do not use atomic ops for unix_sk(sk)->inflight
- CVE: https://ubuntu.com/security/CVE-2024-26923
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26923-01-af_unix-Do-not-use-atomic-ops-for-unix_sk-sk-infligh.patch
- From: 5.15.0-116.126
- CVE-2024-26923
- Description:
af_unix: Fix garbage collector racing against connect()
- CVE: https://ubuntu.com/security/CVE-2024-26923
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26923-02-af_unix-Fix-garbage-collector-racing-against-connect.patch
- From: 5.15.0-116.126
- CVE-2024-24861
- Description:
media: xc4000: Fix atomicity violation in xc4000_get_frequency
- CVE: https://ubuntu.com/security/CVE-2024-24861
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-24861-media-xc4000-Fix-atomicity-violation-in-xc4000_get_frequency.patch
- From: 5.15.0-116.126
- CVE-2024-26929
- Description:
scsi: qla2xxx: Fix double free of fcport
- CVE: https://ubuntu.com/security/CVE-2024-26929
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26929-scsi-qla2xxx-Fix-double-free-of-fcport.patch
- From: 5.15.0-116.126
- CVE-2022-38096
- Description:
drm/vmwgfx: Fix possible null pointer derefence with invalid contexts
- CVE: https://ubuntu.com/security/CVE-2022-38096
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2022-38096-drm-vmwgfx-Fix-possible-null-pointer-derefence-with-invalid-contexts.patch
- From: 5.15.0-116.126
- CVE-2024-27020
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()
- CVE: https://ubuntu.com/security/CVE-2024-27020
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27020-netfilter-nf_tables-Fix-potential-data-race-in-__nft_obj_type_get-105.patch
- From: 5.15.0-116.126
- CVE-2024-27020 CVE-2024-27019
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
- CVE: https://ubuntu.com/security/CVE-2024-27019
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27020-netfilter-nf_tables-Fix-potential-data-race-in-__nft_expr_type_get.patch
- From: 5.15.0-116.126
- CVE-2024-26925
- Description:
netfilter: nf_tables: release batch on table validation from abort path
- CVE: https://ubuntu.com/security/CVE-2024-26925
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26925-01-netfilter-nf_tables-release-batch-on-table-validation-from-abort-path.patch
- From: 5.15.0-116.126
- CVE-2024-26925
- Description:
netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
- CVE: https://ubuntu.com/security/CVE-2024-26925
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26925-02-netfilter-nf_tables-release-mutex-after-nft_gc_seq_end-from-abort-path.patch
- From: 5.15.0-116.126
- CVE-2023-52699
- Description:
sysv: don't call sb_bread() with pointers_lock held
- CVE: https://ubuntu.com/security/CVE-2023-52699
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2023-52699-sysv-dont-call-sb_bread-with-pointers_lock-held.patch
- From: 5.15.0-116.126
- CVE-2024-25739
- Description:
ubi: Check for too small LEB size in VTBL code
- CVE: https://ubuntu.com/security/CVE-2024-25739
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-25739-ubi-Check-for-too-small-LEB-size-in-VTBL-code.patch
- From: 5.15.0-116.126
- CVE-2024-26642
- Description:
netfilter: nf_tables: disallow anonymous set with timeout flag
- CVE: https://ubuntu.com/security/CVE-2024-26642
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with-timeout-flag.patch
- From: 5.15.0-116.126
- CVE-2024-26687
- Description:
xen/events: close evtchn after mapping cleanup
- CVE: https://ubuntu.com/security/CVE-2024-26687
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26687-xen-events-close-evtchn-after-mapping-cleanup.patch
- From: 5.15.0-116.126
- CVE-2024-26817
- Description:
amdkfd: use calloc instead of kzalloc to avoid integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-26817
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26817-amdkfd-use-calloc-instead-of-kzalloc-to-avoid-integer-overflow.patch
- From: 5.15.0-116.126
- CVE-2024-35910
- Description:
tcp_close is sleepable and called from kthread, which may prevent patching and unpatchng.
- CVE:
- Patch: skipped/CVE-2024-35910.patch
- From:
- CVE-2023-52880
- Description:
tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc
- CVE: https://ubuntu.com/security/CVE-2023-52880
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2023-52880-tty-n_gsm-require-CAP_NET_ADMIN-to-attach-N_GSM0710-ldisc.patch
- From: 5.15.0-116.126
- CVE-2024-26629
- Description:
nfsd: fix RELEASE_LOCKOWNER
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26629
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26629-nfsd-fix-RELEASE_LOCKOWNER.patch
- From: 5.10.221-1
- CVE-2024-26629
- Description:
nfsd: don't take fi_lock in nfsd_break_deleg_cb()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26629
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26629-nfsd-dont-take-fi_lock-in-nfsd_break_deleg_cb.patch
- From: 5.10.221-1
- CVE-2024-26958
- Description:
nfs: fix UAF in direct writes
- CVE: https://ubuntu.com/security/CVE-2024-26958
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26958-nfs-fix-uaf-in-direct-writes.patch
- From: 5.15.0-116.126
- CVE-2024-26958
- Description:
nfs: fix UAF in direct writes
- CVE: https://ubuntu.com/security/CVE-2024-26958
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26958-kpatch.patch
- From: 5.15.0-116.126
- CVE-2024-26957
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-26957.patch
- From:
- CVE-2024-26956
- Description:
nilfs2: fix failure to detect DAT corruption in btree and
- CVE: https://ubuntu.com/security/CVE-2024-26956
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26956-nilfs2-fix-failure-to-detect-dat-corruption-in-btree-and-direct-mappings.patch
- From: 5.15.0-116.126
- CVE-2024-26955
- Description:
nilfs2: prevent kernel bug at submit_bh_wbc()
- CVE: https://ubuntu.com/security/CVE-2024-26955
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26955-nilfs2-prevent-kernel-bug-at-submit-bh-wbc.patch
- From: 5.15.0-116.126
- CVE-2024-26951
- Description:
wireguard: netlink: check for dangling peer via is_dead instead of empty list
- CVE: https://ubuntu.com/security/CVE-2024-26951
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26951-wireguard-netlink-check-for-dangling-peer-via-is-dead-instead-of-empty-list.patch
- From: 5.15.0-116.126
- CVE-2024-26950
- Description:
wireguard: netlink: access device through ctx instead of peer
- CVE: https://ubuntu.com/security/CVE-2024-26950
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26950-wireguard-netlink-access-device-through-ctx-instead-of-peer.patch
- From: 5.15.0-116.126
- CVE-2024-26937
- Description:
drm/i915/gt: Reset queue_priority_hint on parking
- CVE: https://ubuntu.com/security/CVE-2024-26937
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26937-drm-i915-gt-reset-queue-priority-hint-on-parking.patch
- From: 5.15.0-116.126
- CVE-2024-26935
- Description:
scsi: core: Fix unremoved procfs host directory regression
- CVE: https://ubuntu.com/security/CVE-2024-26935
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26935-scsi-core-fix-unremoved-procfs-host-directory-regression.patch
- From: 5.15.0-116.126
- CVE-2024-26931
- Description:
scsi: qla2xxx: Fix command flush on cable pull
- CVE: https://ubuntu.com/security/CVE-2024-26931
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26931-scsi-qla2xxx-fix-command-flush-on-cable-pull.patch
- From: 5.15.0-116.126
- CVE-2024-26974
- Description:
crypto: qat - fix double free during reset (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-26974
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26974-01-crypto-qat-fix-double-free-during-reset-5.15.0-113.123.patch
- From: 5.15.0-116.126
- CVE-2024-26974
- Description:
crypto: qat - resolve race condition during AER recovery
- CVE: https://ubuntu.com/security/CVE-2024-26974
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26974-crypto-qat-resolve-race-condition-during-aer-recovery.patch
- From: 5.15.0-116.126
- CVE-2024-26960
- Description:
mm: swap: fix race between free_swap_and_cache() and
- CVE: https://ubuntu.com/security/CVE-2024-26960
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26960-mm-swap-fix-race-between-free-swap-and-cache-and-swapoff-5.15.0-113.123.patch
- From: 5.15.0-116.126
- CVE-2024-26977
- Description:
pci_iounmap(): Fix MMIO mapping leak
- CVE: https://ubuntu.com/security/CVE-2024-26977
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26977-pci-iounmap-fix-mmio-mapping-leak.patch
- From: 5.15.0-116.126
- CVE-2024-26976
- Description:
KVM: Always flush async #PF workqueue when vCPU is being destroyed
- CVE: https://ubuntu.com/security/CVE-2024-26976
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26976-kvm-always-flush-async-pf-workqueue-when-vcpu-is-being-destroyed.patch
- From: 5.15.0-116.126
- CVE-2024-26973
- Description:
fat: fix uninitialized field in nostale filehandles
- CVE: https://ubuntu.com/security/CVE-2024-26973
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26973-fat-fix-uninitialized-field-in-nostale-filehandles.patch
- From: 5.15.0-116.126
- CVE-2024-26964
- Description:
usb: xhci: Add error handling in xhci_map_urb_for_dma
- CVE: https://ubuntu.com/security/CVE-2024-26964
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26964-usb-xhci-add-error-handling-in-xhci-map-urb-for-dma.patch
- From: 5.15.0-116.126
- CVE-2024-27001
- Description:
comedi: vmk80xx: fix incomplete endpoint checking
- CVE: https://ubuntu.com/security/CVE-2024-27001
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27001-comedi-vmk80xx-fix-incomplete-endpoint-checking.patch
- From: 5.15.0-116.126
- CVE-2024-26999
- Description:
serial/pmac_zilog: Remove flawed mitigation for rx irq flood
- CVE: https://ubuntu.com/security/CVE-2024-26999
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26999-serial-pmac-zilog-remove-flawed-mitigation-for-rx-irq-flood.patch
- From: 5.15.0-116.126
- CVE-2024-26996
- Description:
usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error
- CVE: https://ubuntu.com/security/CVE-2024-26996
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26996-usb-gadget-f-ncm-fix-uaf-ncm-object-at-re-bind-after-usb-ep-transport-error.patch
- From: 5.15.0-116.126
- CVE-2024-26994
- Description:
speakup: Avoid crash on very long word
- CVE: https://ubuntu.com/security/CVE-2024-26994
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26994-speakup-avoid-crash-on-very-long-word.patch
- From: 5.15.0-116.126
- CVE-2024-26993
- Description:
fs: sysfs: Fix reference leak in sysfs_break_active_protection()
- CVE: https://ubuntu.com/security/CVE-2024-26993
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26993-fs-sysfs-fix-reference-leak-in-sysfs-break-active-protection.patch
- From: 5.15.0-116.126
- CVE-2024-26989
- Description:
arm64: hibernate: Fix level3 translation fault in swsusp_save()
- CVE: https://ubuntu.com/security/CVE-2024-26989
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26989-arm64-hibernate-fix-level3-translation-fault-in-swsusp-save.patch
- From: 5.15.0-116.126
- CVE-2024-26988
- Description:
Out of scope as the patch is for vmlinux init sections which are discarded after the boot
- CVE:
- Patch: skipped/CVE-2024-26988.patch
- From:
- CVE-2024-26984
- Description:
nouveau: fix instmem race condition around ptr stores
- CVE: https://ubuntu.com/security/CVE-2024-26984
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26984-nouveau-fix-instmem-race-condition-around-ptr-stores.patch
- From: 5.15.0-116.126
- CVE-2024-27000
- Description:
serial: mxs-auart: add spinlock around changing cts state
- CVE: https://ubuntu.com/security/CVE-2024-27000
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27000-serial-mxs-auart-add-spinlock-around-changing-cts-state.patch
- From: 5.15.0-116.126
- CVE-2024-27059
- Description:
USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
- CVE: https://ubuntu.com/security/CVE-2024-27059
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27059-usb-usb-storage-prevent-divide-by-0-error-in-isd200-ata-command.patch
- From: 5.15.0-116.126
- CVE-2024-27393
- Description:
xen-netfront: Add missing skb_mark_for_recycle
- CVE: https://ubuntu.com/security/CVE-2024-27393
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27393-xen-netfront-add-missing-skb-mark-for-recycle.patch
- From: 5.15.0-116.126
- CVE-2024-27015
- Description:
netfilter: flowtable: incorrect pppoe tuple
- CVE: https://ubuntu.com/security/CVE-2024-27015
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27015-netfilter-flowtable-incorrect-pppoe-tuple.patch
- From: 5.15.0-116.126
- CVE-2024-27013
- Description:
tun: limit printing rate when illegal packet received by tun dev
- CVE: https://ubuntu.com/security/CVE-2024-27013
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27013-tun-limit-printing-rate-when-illegal-packet-received-by-tun-dev.patch
- From: 5.15.0-116.126
- CVE-2024-27009
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-27009.patch
- From:
- CVE-2024-27008
- Description:
drm: nv04: Fix out of bounds access
- CVE: https://ubuntu.com/security/CVE-2024-27008
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27008-drm-nv04-fix-out-of-bounds-access.patch
- From: 5.15.0-116.126
- CVE-2024-27396
- Description:
net: gtp: Fix Use-After-Free in gtp_dellink
- CVE: https://ubuntu.com/security/CVE-2024-27396
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27396-net-gtp-fix-use-after-free-in-gtp-dellink.patch
- From: 5.15.0-116.126
- CVE-2024-27395
- Description:
net: openvswitch: Fix Use-After-Free in ovs_ct_exit
- CVE: https://ubuntu.com/security/CVE-2024-27395
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27395-net-openvswitch-fix-use-after-free-in-ovs-ct-exit.patch
- From: 5.15.0-116.126
- CVE-2024-35809
- Description:
PCI: Drop pci_device_remove() test of pci_dev->driver (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-35809
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35809-01-pci-drop-pci-device-remove-test-of-pci-dev-driver-5.15.0-113.123.patch
- From: 5.15.0-116.126
- CVE-2024-35809
- Description:
PCI/PM: Drain runtime-idle callbacks before driver removal
- CVE: https://ubuntu.com/security/CVE-2024-35809
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35809-pci-pm-drain-runtime-idle-callbacks-before-driver-removal.patch
- From: 5.15.0-116.126
- CVE-2024-35806
- Description:
soc: fsl: qbman: Always disable interrupts when taking cgr_lock
- CVE: https://ubuntu.com/security/CVE-2024-35806
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35806-soc-fsl-qbman-always-disable-interrupts-when-taking-cgr-lock.patch
- From: 5.15.0-116.126
- CVE-2024-35805
- Description:
dm snapshot: fix lockup in dm_exception_table_exit
- CVE: https://ubuntu.com/security/CVE-2024-35805
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35805-dm-snapshot-fix-lockup-in-dm-exception-table-exit.patch
- From: 5.15.0-116.126
- CVE-2024-35791
- Description:
KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()
- CVE: https://ubuntu.com/security/CVE-2024-35791
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35791-kvm-svm-flush-pages-under-kvm-lock-to-fix-uaf-in-svm-register-enc-region.patch
- From: 5.15.0-116.126
- CVE-2024-35789
- Description:
wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes
- CVE: https://ubuntu.com/security/CVE-2024-35789
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35789-wifi-mac80211-check-clear-fast-rx-for-non-4addr-sta-vlan-changes.patch
- From: 5.15.0-116.126
- CVE-2024-35796
- Description:
net: ll_temac: platform_get_resource replaced by wrong function
- CVE: https://ubuntu.com/security/CVE-2024-35796
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35796-net-ll-temac-platform-get-resource-replaced-by-wrong-function.patch
- From: 5.15.0-116.126
- CVE-2024-35817
- Description:
drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag
- CVE: https://ubuntu.com/security/CVE-2024-35817
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35817-drm-amdgpu-amdgpu-ttm-gart-bind-set-gtt-bound-flag.patch
- From: 5.15.0-116.126
- CVE-2024-35823
- Description:
vt: fix unicode buffer corruption when deleting characters
- CVE: https://ubuntu.com/security/CVE-2024-35823
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35823-vt-fix-unicode-buffer-corruption-when-deleting-characters.patch
- From: 5.15.0-116.126
- CVE-2024-35815
- Description:
fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion
- CVE: https://ubuntu.com/security/CVE-2024-35815
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35815-fs-aio-check-iocb-aio-rw-before-the-struct-aio-kiocb-conversion.patch
- From: 5.15.0-116.126
- CVE-2024-35822
- Description:
usb: udc: remove warning when queue disabled ep
- CVE: https://ubuntu.com/security/CVE-2024-35822
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35822-usb-udc-remove-warning-when-queue-disabled-ep.patch
- From: 5.15.0-116.126
- CVE-2024-35849
- Description:
btrfs: fix information leak in btrfs_ioctl_logical_to_ino()
- CVE: https://ubuntu.com/security/CVE-2024-35849
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35849-btrfs-fix-information-leak-in-btrfs-ioctl-logical-to-ino.patch
- From: 5.15.0-116.126
- CVE-2024-35847
- Description:
irqchip/gic-v3-its: Prevent double free on error
- CVE: https://ubuntu.com/security/CVE-2024-35847
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35847-irqchip-gic-v3-its-prevent-double-free-on-error.patch
- From: 5.15.0-116.126
- CVE-2024-35879
- Description:
of: dynamic: Synchronize of_changeset_destroy() with the devlink removals
- CVE: https://ubuntu.com/security/CVE-2024-35879
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35879-of-dynamic-synchronize-of-changeset-destroy-with-the-devlink-removals.patch
- From: 5.15.0-116.126
- CVE-2024-35871
- Description:
Out of scope as the patch is for riscv arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-35871.patch
- From:
- CVE-2024-35872
- Description:
mm/secretmem: fix GUP-fast succeeding on secretmem folios
- CVE: https://ubuntu.com/security/CVE-2024-35872
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35872-mm-secretmem-fix-gup-fast-succeeding-on-secretmem-folios.patch
- From: 5.15.0-116.126
- CVE-2024-35877
- Description:
x86/mm/pat: fix VM_PAT handling in COW mappings
- CVE: https://ubuntu.com/security/CVE-2024-35877
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35877-x86-mm-pat-fix-vm-pat-handling-in-cow-mappings.patch
- From: 5.15.0-116.126
- CVE-2024-35857
- Description:
icmp: prevent possible NULL dereferences from icmp_build_probe()
- CVE: https://ubuntu.com/security/CVE-2024-35857
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35857-icmp-prevent-possible-null-dereferences-from-icmp-build-probe.patch
- From: 5.15.0-116.126
- CVE-2024-35855
- Description:
mlxsw: spectrum_acl_tcam: Fix possible use-after-free during
- CVE: https://ubuntu.com/security/CVE-2024-35855
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35855-mlxsw-spectrum-acl-tcam-fix-possible-use-after-free-during-activity-update.patch
- From: 5.15.0-116.126
- CVE-2024-35854
- Description:
mlxsw: spectrum_acl_tcam: Fix possible use-after-free during
- CVE: https://ubuntu.com/security/CVE-2024-35854
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35854-mlxsw-spectrum-acl-tcam-fix-possible-use-after-free-during-rehash.patch
- From: 5.15.0-116.126
- CVE-2024-35853
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak during rehash
- CVE: https://ubuntu.com/security/CVE-2024-35853
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35853-mlxsw-spectrum-acl-tcam-fix-memory-leak-during-rehash.patch
- From: 5.15.0-116.126
- CVE-2024-35852
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak when canceling
- CVE: https://ubuntu.com/security/CVE-2024-35852
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35852-mlxsw-spectrum-acl-tcam-fix-memory-leak-when-canceling-rehash-work.patch
- From: 5.15.0-116.126
- CVE-2024-35898
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
- CVE: https://ubuntu.com/security/CVE-2024-35898
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35898-netfilter-nf-tables-fix-potential-data-race-in-nft-flowtable-type-get.patch
- From: 5.15.0-116.126
- CVE-2024-35896
- Description:
netfilter: validate user input for expected length
- CVE: https://ubuntu.com/security/CVE-2024-35896
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35896-netfilter-validate-user-input-for-expected-length.patch
- From: 5.15.0-116.126
- CVE-2024-35895
- Description:
bpf, sockmap: Prevent lock inversion deadlock in map delete
- CVE: https://ubuntu.com/security/CVE-2024-35895
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35895-bpf-sockmap-prevent-lock-inversion-deadlock-in-map-delete-elem.patch
- From: 5.15.0-116.126
- CVE-2024-35893
- Description:
net/sched: act_skbmod: prevent kernel-infoleak
- CVE: https://ubuntu.com/security/CVE-2024-35893
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35893-net-sched-act-skbmod-prevent-kernel-infoleak.patch
- From: 5.15.0-116.126
- CVE-2024-35888
- Description:
erspan: make sure erspan_base_hdr is present in skb->head
- CVE: https://ubuntu.com/security/CVE-2024-35888
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35888-erspan-make-sure-erspan-base-hdr-is-present-in-skb-head.patch
- From: 5.15.0-116.126
- CVE-2024-35886
- Description:
ipv6: Fix infinite recursion in fib6_dump_done().
- CVE: https://ubuntu.com/security/CVE-2024-35886
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35886-ipv6-fix-infinite-recursion-in-fib6-dump-done.patch
- From: 5.15.0-116.126
- CVE-2024-35885
- Description:
mlxbf_gige: stop interface during shutdown
- CVE: https://ubuntu.com/security/CVE-2024-35885
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35885-mlxbf-gige-stop-interface-during-shutdown.patch
- From: 5.15.0-116.126
- CVE-2024-35890
- Description:
gro: fix ownership transfer
- CVE: https://ubuntu.com/security/CVE-2024-35890
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35890-gro-fix-ownership-transfer.patch
- From: 5.15.0-116.126
- CVE-2024-35912
- Description:
iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-35912
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35912-01-iwlwifi-mvm-rfi-use-kmemdup-to-replace-kzalloc-memcpy-5.15.0-113.123.patch
- From: 5.15.0-116.126
- CVE-2024-35912
- Description:
wifi: iwlwifi: mvm: rfi: fix potential response leaks
- CVE: https://ubuntu.com/security/CVE-2024-35912
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35912-wifi-iwlwifi-mvm-rfi-fix-potential-response-leaks.patch
- From: 5.15.0-116.126
- CVE-2024-35915
- Description:
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
- CVE: https://ubuntu.com/security/CVE-2024-35915
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35915-nfc-nci-fix-uninit-value-in-nci-dev-up-and-nci-ntf-packet.patch
- From: 5.15.0-116.126
- CVE-2024-35902
- Description:
net/rds: fix possible cp null dereference
- CVE: https://ubuntu.com/security/CVE-2024-35902
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35902-net-rds-fix-possible-cp-null-dereference.patch
- From: 5.15.0-116.126
- CVE-2024-35925
- Description:
block: prevent division by zero in blk_rq_stat_sum()
- CVE: https://ubuntu.com/security/CVE-2024-35925
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35925-block-prevent-division-by-zero-in-blk-rq-stat-sum.patch
- From: 5.15.0-116.126
- CVE-2024-35922
- Description:
fbmon: prevent division by zero in fb_videomode_from_videomode()
- CVE: https://ubuntu.com/security/CVE-2024-35922
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35922-fbmon-prevent-division-by-zero-in-fb-videomode-from-videomode.patch
- From: 5.15.0-116.126
- CVE-2024-35918
- Description:
It is not possible to fix this vulnerability using kernel livepatching because it lies below the system call level.
- CVE:
- Patch: skipped/CVE-2024-35918.patch
- From:
- CVE-2024-35901
- Description:
Out of scope as the patch that introduces the vulnerability 2fbbd712baf1 (net: mana: Enable RX path to handle various MTU sizes) is missing from these kernels
- CVE:
- Patch: skipped/CVE-2024-35901.patch
- From:
- CVE-2024-35944
- Description:
VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()
- CVE: https://ubuntu.com/security/CVE-2024-35944
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35944-vmci-fix-memcpy-run-time-warning-in-dg-dispatch-as-host.patch
- From: 5.15.0-116.126
- CVE-2024-35944
- Description:
VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler()
- CVE: https://ubuntu.com/security/CVE-2024-35944
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35944-0001-VMCI-Fix-possible-memcpy-run-time-warning-in-vmci_da.patch
- From: 5.15.0-116.126
- CVE-2024-35940
- Description:
pstore/zone: Add a null pointer check to the psz_kmsg_read
- CVE: https://ubuntu.com/security/CVE-2024-35940
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35940-pstore-zone-add-a-null-pointer-check-to-the-psz-kmsg-read.patch
- From: 5.15.0-116.126
- CVE-2024-35936
- Description:
btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()
- CVE: https://ubuntu.com/security/CVE-2024-35936
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35936-btrfs-handle-chunk-tree-lookup-error-in-btrfs-relocate-sys-chunks.patch
- From: 5.15.0-116.126
- CVE-2024-35935
- Description:
btrfs: send: handle path ref underflow in header iterate_inode_ref()
- CVE: https://ubuntu.com/security/CVE-2024-35935
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35935-btrfs-send-handle-path-ref-underflow-in-header-iterate-inode-ref.patch
- From: 5.15.0-116.126
- CVE-2024-35934
- Description:
net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()
- CVE: https://ubuntu.com/security/CVE-2024-35934
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35934-net-smc-reduce-rtnl-pressure-in-smc-pnet-create-pnetids-list.patch
- From: 5.15.0-116.126
- CVE-2024-35933
- Description:
Bluetooth: btintel: Fix null ptr deref in btintel_read_version
- CVE: https://ubuntu.com/security/CVE-2024-35933
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35933-bluetooth-btintel-fix-null-ptr-deref-in-btintel-read-version.patch
- From: 5.15.0-116.126
- CVE-2024-35930
- Description:
scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()
- CVE: https://ubuntu.com/security/CVE-2024-35930
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35930-scsi-lpfc-fix-possible-memory-leak-in-lpfc-rcv-padisc.patch
- From: 5.15.0-116.126
- CVE-2024-35950
- Description:
drm/client: Fully protect modes[] with dev->mode_config.mutex
- CVE: https://ubuntu.com/security/CVE-2024-35950
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35950-drm-client-fully-protect-modes-with-dev-mode-config-mutex.patch
- From: 5.15.0-116.126
- CVE-2024-35938
- Description:
wifi:ath11k, low score CVE that needs complex adaptation but decreasing MHI Bus' buf-len isn't a typical security fix.
- CVE:
- Patch: skipped/CVE-2024-35938.patch
- From:
- CVE-2024-35982
- Description:
batman-adv: Avoid infinite loop trying to resize local TT
- CVE: https://ubuntu.com/security/CVE-2024-35982
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35982-batman-adv-avoid-infinite-loop-trying-to-resize-local-tt.patch
- From: 5.15.0-116.126
- CVE-2024-35978
- Description:
Bluetooth: Fix memory leak in hci_req_sync_complete()
- CVE: https://ubuntu.com/security/CVE-2024-35978
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35978-bluetooth-fix-memory-leak-in-hci-req-sync-complete.patch
- From: 5.15.0-116.126
- CVE-2024-35976
- Description:
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
- CVE: https://ubuntu.com/security/CVE-2024-35976
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35976-xsk-validate-user-input-for-xdp-umem-completion-fill-ring.patch
- From: 5.15.0-116.126
- CVE-2024-35973
- Description:
geneve: fix header validation in geneve[6]_xmit_skb
- CVE: https://ubuntu.com/security/CVE-2024-35973
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35973-geneve-fix-header-validation-in-geneve-6-xmit-skb.patch
- From: 5.15.0-116.126
- CVE-2024-35973
- Description:
geneve: fix header validation in geneve[6]_xmit_skb
- CVE: https://ubuntu.com/security/CVE-2024-35973
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35973-geneve-fix-header-validation-in-geneve-6-xmit-skb-kpatch.patch
- From: 5.15.0-116.126
- CVE-2024-35970
- Description:
Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem..
- CVE:
- Patch: skipped/CVE-2024-35970.patch
- From:
- CVE-2024-35969
- Description:
ipv6: fix race condition between ipv6_get_ifaddr and
- CVE: https://ubuntu.com/security/CVE-2024-35969
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35969-ipv6-fix-race-condition-between-ipv6-get-ifaddr-and-ipv6-del-addr.patch
- From: 5.15.0-116.126
- CVE-2024-35960
- Description:
net/mlx5: Properly link new fs rules into the tree
- CVE: https://ubuntu.com/security/CVE-2024-35960
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35960-net-mlx5-properly-link-new-fs-rules-into-the-tree.patch
- From: 5.15.0-116.126
- CVE-2024-35984
- Description:
i2c: smbus: fix NULL function pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-35984
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35984-i2c-smbus-fix-null-function-pointer-dereference.patch
- From: 5.15.0-116.126
- CVE-2024-35988
- Description:
Out of scope as the patch is for riscv arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-35988.patch
- From:
- CVE-2024-36008
- Description:
ipv4: check for NULL idev in ip_route_use_hint()
- CVE: https://ubuntu.com/security/CVE-2024-36008
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36008-ipv4-check-for-null-idev-in-ip-route-use-hint.patch
- From: 5.15.0-116.126
- CVE-2024-36007
- Description:
mlxsw: spectrum_acl_tcam: Fix warning during rehash
- CVE: https://ubuntu.com/security/CVE-2024-36007
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36007-mlxsw-spectrum-acl-tcam-fix-warning-during-rehash.patch
- From: 5.15.0-116.126
- CVE-2024-36006
- Description:
mlxsw: spectrum_acl_tcam: Fix incorrect list API usage
- CVE: https://ubuntu.com/security/CVE-2024-36006
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36006-mlxsw-spectrum-acl-tcam-fix-incorrect-list-api-usage.patch
- From: 5.15.0-116.126
- CVE-2024-36005
- Description:
netfilter: nf_tables: honor table dormant flag from netdev release event path
- CVE: https://ubuntu.com/security/CVE-2024-36005
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36005-netfilter-nf-tables-honor-table-dormant-flag-from-netdev-release-event-path.patch
- From: 5.15.0-116.126
- CVE-2024-35990
- Description:
dma: xilinx_dpdma: Fix locking
- CVE: https://ubuntu.com/security/CVE-2024-35990
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35990-dma-xilinx-dpdma-fix-locking.patch
- From: 5.15.0-116.126
- CVE-2024-35989
- Description:
dmaengine: idxd: Fix oops during rmmod on single-CPU platforms
- CVE: https://ubuntu.com/security/CVE-2024-35989
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35989-dmaengine-idxd-fix-oops-during-rmmod-on-single-cpu-platforms.patch
- From: 5.15.0-116.126
- CVE-2024-35997
- Description:
HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up
- CVE: https://ubuntu.com/security/CVE-2024-35997
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35997-hid-i2c-hid-remove-i2c-hid-read-pending-flag-to-prevent-lock-up.patch
- From: 5.15.0-116.126
- CVE-2024-26926
- Description:
binder: check offset alignment in binder_get_object()
- CVE: https://ubuntu.com/security/CVE-2024-26926
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26926-binder-check-offset-alignment-in-binder-get-object.patch
- From: 5.15.0-116.126
- CVE-2024-26810
- Description:
vfio/pci: Lock external INTx masking ops
- CVE: https://ubuntu.com/security/CVE-2024-26810
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26810-vfio-pci-lock-external-intx-masking-ops.patch
- From: 5.15.0-116.126
- CVE-2024-26814
- Description:
vfio/fsl-mc: Block calling interrupt handler without trigger
- CVE: https://ubuntu.com/security/CVE-2024-26814
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26814-vfio-fsl-mc-block-calling-interrupt-handler-without-trigger.patch
- From: 5.15.0-116.126
- CVE-2024-36025
- Description:
scsi: qla2xxx: Fix off by one in qla_edif_app_getstats()
- CVE: https://ubuntu.com/security/CVE-2024-36025
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36025-scsi-qla2xxx-fix-off-by-one-in-qla-edif-app-getstats.patch
- From: 5.15.0-116.126
- CVE-2024-36029
- Description:
mmc: sdhci-msm: pervent access to suspended controller
- CVE: https://ubuntu.com/security/CVE-2024-36029
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36029-mmc-sdhci-msm-pervent-access-to-suspended-controller.patch
- From: 5.15.0-116.126
- CVE-2024-27437
- Description:
vfio/pci: Disable auto-enable of exclusive INTx IRQ
- CVE: https://ubuntu.com/security/CVE-2024-27437
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27437-0001-vfio-pci-Disable-auto-enable-of-exclusive-INTx-IRQ.patch
- From: 5.15.0-116.126
- CVE-2024-26961
- Description:
mac802154: fix llsec key resources release in mac802154_llsec_key_del
- CVE: https://ubuntu.com/security/CVE-2024-26961
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26961-mac802154-fix-llsec-key-resources-release-in_new.patch
- From: 5.15.0-116.126
- CVE-2024-26961
- Description:
mac802154: fix llsec key resources release in mac802154_llsec_key_del
- CVE: https://ubuntu.com/security/CVE-2024-26961
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26961-mac802154-fix-llsec-key-resources-release-in_new-kpatch.patch
- From: 5.15.0-116.126
- CVE-2024-35807
- Description:
ext4: fix corruption during on-line resize
- CVE: https://ubuntu.com/security/CVE-2024-35807
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35807-ext4-fix-corruption-during-on-line-resize-5.15.0-97.107.patch
- From: 5.15.0-116.126
- CVE-2024-35804
- Description:
KVM: x86: Mark target gfn of emulated atomic instruction as dirty
- CVE: https://ubuntu.com/security/CVE-2024-35804
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35804-kvm-x86-mark-target-gfn-of-emulated-atomic-instruction-as-dirty-5.15.0-113.123.patch
- From: 5.15.0-116.126
- CVE-2024-35821
- Description:
ubifs: Set page uptodate in the correct place
- CVE: https://ubuntu.com/security/CVE-2024-35821
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35821-ubifs-set-page-uptodate-in-the-correct-place.patch
- From: 5.15.0-116.126
- CVE-2024-35825
- Description:
usb: gadget: ncm: Fix handling of zero block length packets
- CVE: https://ubuntu.com/security/CVE-2024-35825
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35825-usb-gadget-ncm-fix-handling-of-zero-block-length-packets.patch
- From: 5.15.0-116.126
- CVE-2024-35899
- Description:
netfilter: nf_tables: flush pending destroy work before exit_net release
- CVE: https://ubuntu.com/security/CVE-2024-35899
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35899-netfilter-nf-tables-flush-pending-destroy-work-before-exit-net-release.patch
- From: 5.15.0-116.126
- CVE-2024-35897
- Description:
netfilter: nf_tables: discard table flag update with pending basechain deletion
- CVE: https://ubuntu.com/security/CVE-2024-35897
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35897-netfilter-nf-tables-discard-table-flag-update-with-pending-basechain-deletion.patch
- From: 5.15.0-116.126
- CVE-2024-35851
- Description:
Bluetooth: qca: fix NULL-deref on non-serdev suspend
- CVE: https://ubuntu.com/security/CVE-2024-35851
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35851-bluetooth-qca-fix-null-deref-on-non-serdev-suspend.patch
- From: 5.15.0-116.126
- CVE-2024-26922
- Description:
drm/amdgpu: validate the parameters of bo mapping operations more clearly
- CVE: https://ubuntu.com/security/CVE-2024-26922
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26922-drm-amdgpu-validate-the-parameters-of-bo-mapping-operations-more-clearly.patch
- From: 5.15.0-116.126
- CVE-2024-35907
- Description:
mlxbf_gige: call request_irq() after NAPI initialized
- CVE: https://ubuntu.com/security/CVE-2024-35907
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35907-mlxbf-gige-call-request-irq-after-napi-initialized-5.15.0-101.111.patch
- From: 5.15.0-116.126
- CVE-2024-35905
- Description:
bpf: Fix verification of indirect var-off stack access (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-35905
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35905-bpf-fix-verification-of-indirect-var-off-stack-access-5.15.0-101.111.patch
- From: 5.15.0-116.126
- CVE-2024-35905
- Description:
bpf: Protect against int overflow for stack access size
- CVE: https://ubuntu.com/security/CVE-2024-35905
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35905-bpf-protect-against-int-overflow-for-stack-access-size.patch
- From: 5.15.0-116.126
- CVE-2024-36020
- Description:
i40e: fix vf may be used uninitialized in this function warning
- CVE: https://ubuntu.com/security/CVE-2024-36020
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36020-i40e-fix-vf-may-be-used-uninitialized-in-this-function-warning.patch
- From: 5.15.0-116.126
- CVE-2024-35955
- Description:
kprobes: Fix possible use-after-free issue on kprobe registration
- CVE: https://ubuntu.com/security/CVE-2024-35955
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35955-kprobes-fix-possible-use-after-free-issue-on-kprobe-registration.patch
- From: 5.15.0-116.126
- CVE-2024-36016
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://ubuntu.com/security/CVE-2024-36016
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-gsm0-receive.patch
- From: 5.15.0-117.127
- CVE-2024-26952
- Description:
ksmbd: fix potencial out-of-bounds when buffer offset is
- CVE: https://ubuntu.com/security/CVE-2024-26952
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-26952-ksmbd-fix-potencial-out-of-bounds-when-buffer-offset-is-5.15.0-101.111.patch
- From: 5.15.0-117.127
- CVE-2023-52752
- Description:
smb: client: fix use-after-free bug in
- CVE: https://ubuntu.com/security/CVE-2023-52752
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2023-52752-smb-client-fix-use-after-free-bug-in-azure.patch
- From: 5.15.0-117.127
- CVE-2024-26886
- Description:
Bluetooth: af_bluetooth: Fix deadlock
- CVE: https://ubuntu.com/security/CVE-2024-26886
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-26886-bluetooth-af-bluetooth-fix-deadlock.patch
- From: 5.15.0-117.127
- CVE-2024-25742
- Description:
x86/sev: Harden #VC instruction emulation somewhat
- CVE: https://ubuntu.com/security/CVE-2024-25742
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-25742-x86-sev-harden-vc-instruction-emulation-somewhat.patch
- From: 5.15.0-117.127
- CVE-2024-25742
- Description:
x86/sev: Check for MWAITX and MONITORX opcodes in the #VC
- CVE: https://ubuntu.com/security/CVE-2024-25742
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-25742-x86-sev-check-for-mwaitx-and-monitorx-opcodes-in-the-vc.patch
- From: 5.15.0-117.127
- CVE-2024-27017
- Description:
netfilter: nft_set_pipapo: constify lookup fn args where
- CVE: https://ubuntu.com/security/CVE-2024-27017
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-27017-netfilter-nft-set-pipapo-constify-lookup-fn-args-where-5.15.0-105.115.patch
- From: 5.15.0-117.127
- CVE-2024-27017
- Description:
netfilter: nft_set_pipapo: walk over current view on netlink
- CVE: https://ubuntu.com/security/CVE-2024-27017
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-27017-netfilter-nft-set-pipapo-walk-over-current-view-on-netlink.patch
- From: 5.15.0-117.127
- CVE-2024-27017
- Description:
netfilter: nf_tables: missing iterator type in lookup walk
- CVE: https://ubuntu.com/security/CVE-2024-27017
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-27017-netfilter-nf-tables-missing-iterator-type-in-lookup-walk.patch
- From: 5.15.0-117.127
- CVE-2024-26980
- Description:
ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf
- CVE: https://ubuntu.com/security/CVE-2024-26980
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-26980-ksmbd-fix-slab-out-of-bounds-in-smb2-allocate-rsp-buf-5.15.0-101.111.patch
- From: 5.15.0-118.128
- CVE-2024-26936
- Description:
ksmbd: validate request buffer size in
- CVE: https://ubuntu.com/security/CVE-2024-26936
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-26936-ksmbd-validate-request-buffer-size-in-5.15.0-101.111.patch
- From: 5.15.0-118.128
- CVE-2024-35848
- Description:
eeprom: at24: Probe for DDR3 thermal sensor in the SPD case (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-35848
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-35848-01-eeprom-at24-probe-for-ddr3-thermal-sensor-in-the-spd-case-5.15.0-117.127.patch
- From: 5.15.0-118.128
- CVE-2024-35848
- Description:
eeprom: at24: Use dev_err_probe for nvmem register failure (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-35848
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-35848-02-eeprom-at24-use-dev-err-probe-for-nvmem-register-failure-5.15.0-117.127.patch
- From: 5.15.0-118.128
- CVE-2024-35848
- Description:
eeprom: at24: fix memory corruption race condition
- CVE: https://ubuntu.com/security/CVE-2024-35848
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-35848-eeprom-at24-fix-memory-corruption-race-condition.patch
- From: 5.15.0-118.128
- CVE-2024-27398
- Description:
Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-27398
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-27398-bluetooth-fix-use-after-free-bugs-caused-by-sco-sock-timeout.patch
- From: 5.15.0-118.128
- CVE-2024-27399
- Description:
Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
- CVE: https://ubuntu.com/security/CVE-2024-27399
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-27399-bluetooth-l2cap-fix-null-ptr-deref-in-l2cap-chan-timeout.patch
- From: 5.15.0-118.128
- CVE-2024-27401
- Description:
firewire: nosy: ensure user_length is taken into account when
- CVE: https://ubuntu.com/security/CVE-2024-27401
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-27401-firewire-nosy-ensure-user-length-is-taken-into-account-when.patch
- From: 5.15.0-118.128
- CVE-2024-35947
- Description:
dyndbg: fix old BUG_ON in >control parser
- CVE: https://ubuntu.com/security/CVE-2024-35947
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-35947-dyndbg-fix-old-bug-on-in-control-parser.patch
- From: 5.15.0-118.128
- CVE-2024-26900
- Description:
md: fix kmemleak of rdev->serial
- CVE: https://ubuntu.com/security/CVE-2024-26900
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-26900-md-fix-kmemleak-of-rdev-serial.patch
- From: 5.15.0-118.128
- CVE-2024-36967
- Description:
KEYS: trusted: Fix memory leak in tpm2_key_encode()
- CVE: https://ubuntu.com/security/CVE-2024-36967
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36967-keys-trusted-fix-memory-leak-in-tpm2-key-encode.patch
- From: 5.15.0-118.128
- CVE-2024-36975
- Description:
KEYS: trusted: Do not use WARN when encode fails
- CVE: https://ubuntu.com/security/CVE-2024-36975
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36975-keys-trusted-do-not-use-warn-when-encode-fails.patch
- From: 5.15.0-118.128
- CVE-2024-36965
- Description:
remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
- CVE: https://ubuntu.com/security/CVE-2024-36965
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36965-remoteproc-mediatek-make-sure-ipi-buffer-fits-in-l2tcm.patch
- From: 5.15.0-118.128
- CVE-2024-36883
- Description:
net: fix out-of-bounds access in ops_init
- CVE: https://ubuntu.com/security/CVE-2024-36883
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36883-net-fix-out-of-bounds-access-in-ops-init.patch
- From: 5.15.0-118.128
- CVE-2024-36886
- Description:
tipc: fix UAF in error path
- CVE: https://ubuntu.com/security/CVE-2024-36886
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36886-tipc-fix-uaf-in-error-path.patch
- From: 5.15.0-118.128
- CVE-2024-36960
- Description:
drm/vmwgfx: Fix invalid reads in fence signaled events
- CVE: https://ubuntu.com/security/CVE-2024-36960
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36960-drm-vmwgfx-fix-invalid-reads-in-fence-signaled-events.patch
- From: 5.15.0-118.128
- CVE-2024-36969
- Description:
drm/amd/display: Fix division by zero in setup_dsc_config
- CVE: https://ubuntu.com/security/CVE-2024-36969
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36969-drm-amd-display-fix-division-by-zero-in-setup-dsc-config.patch
- From: 5.15.0-118.128
- CVE-2024-38600
- Description:
ALSA: Fix deadlocks with kctl removals at disconnection
- CVE: https://ubuntu.com/security/CVE-2024-38600
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-38600-alsa-fix-deadlocks-with-kctl-removals-at-disconnection.patch
- From: 5.15.0-118.128
- CVE-2024-36906
- Description:
arm: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-36906.patch
- From:
- CVE-2024-36905
- Description:
tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
- CVE: https://ubuntu.com/security/CVE-2024-36905
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36905-tcp-defer-shutdown-send-shutdown-for-tcp-syn-recv-sockets.patch
- From: 5.15.0-118.128
- CVE-2024-36904
- Description:
tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().
- CVE: https://ubuntu.com/security/CVE-2024-36904
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36904-tcp-use-refcount-inc-not-zero-in-tcp-twsk-unique.patch
- From: 5.15.0-118.128
- CVE-2024-36017
- Description:
rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
- CVE: https://ubuntu.com/security/CVE-2024-36017
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36017-rtnetlink-correct-nested-ifla-vf-vlan-list-attribute-validation.patch
- From: 5.15.0-118.128
- CVE-2024-36902
- Description:
ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
- CVE: https://ubuntu.com/security/CVE-2024-36902
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36902-ipv6-fib6-rules-avoid-possible-null-dereference-in-fib6-rule-action.patch
- From: 5.15.0-118.128
- CVE-2024-36897
- Description:
drm/amd/display: Atom Integrated System Info v2_2 for DCN35
- CVE: https://ubuntu.com/security/CVE-2024-36897
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36897-drm-amd-display-atom-integrated-system-info-v2-2-for-dcn35.patch
- From: 5.15.0-118.128
- CVE-2024-36889
- Description:
mptcp: ensure snd_nxt is properly initialized on connect
- CVE: https://ubuntu.com/security/CVE-2024-36889
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36889-mptcp-ensure-snd-nxt-is-properly-initialized-on-connect.patch
- From: 5.15.0-118.128
- CVE-2024-36880
- Description:
Bluetooth: qca: add missing firmware sanity checks
- CVE: https://ubuntu.com/security/CVE-2024-36880
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36880-bluetooth-qca-add-missing-firmware-sanity-checks.patch
- From: 5.15.0-118.128
- CVE-2024-36928
- Description:
s390: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-36928.patch
- From:
- CVE-2024-36938
- Description:
bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
- CVE: https://ubuntu.com/security/CVE-2024-36938
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36938-bpf-skmsg-fix-null-pointer-dereference-in-sk-psock-skb-ingress-enqueue.patch
- From: 5.15.0-118.128
- CVE-2024-36934
- Description:
bna: ensure the copied buf is NUL terminated
- CVE: https://ubuntu.com/security/CVE-2024-36934
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36934-bna-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.15.0-118.128
- CVE-2024-36931
- Description:
s390: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-36931.patch
- From:
- CVE-2024-36929
- Description:
net: core: reject skb_copy(_expand) for fraglist GSO skbs
- CVE: https://ubuntu.com/security/CVE-2024-36929
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36929-net-core-reject-skb-copy-expand-for-fraglist-gso-skbs.patch
- From: 5.15.0-118.128
- CVE-2024-36919
- Description:
scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload
- CVE: https://ubuntu.com/security/CVE-2024-36919
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36919-scsi-bnx2fc-remove-spin-lock-bh-while-releasing-resources-after-upload.patch
- From: 5.15.0-118.128
- CVE-2024-36916
- Description:
blk-iocost: avoid out of bounds shift
- CVE: https://ubuntu.com/security/CVE-2024-36916
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36916-blk-iocost-avoid-out-of-bounds-shift.patch
- From: 5.15.0-118.128
- CVE-2024-36953
- Description:
KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-36953
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36953-01-kvm-arm64-vgic-v2-use-cpuid-from-userspace-as-vcpu-id-5.15.0-117.127.patch
- From: 5.15.0-118.128
- CVE-2024-36953
- Description:
KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()
- CVE: https://ubuntu.com/security/CVE-2024-36953
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36953-kvm-arm64-vgic-v2-check-for-non-null-vcpu-in-vgic-v2-parse-attr.patch
- From: 5.15.0-118.128
- CVE-2024-36941
- Description:
wifi: nl80211: don't free NULL coalescing rule
- CVE: https://ubuntu.com/security/CVE-2024-36941
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36941-wifi-nl80211-don-t-free-null-coalescing-rule.patch
- From: 5.15.0-118.128
- CVE-2024-36940
- Description:
pinctrl: core: delete incorrect free in pinctrl_enable()
- CVE: https://ubuntu.com/security/CVE-2024-36940
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36940-pinctrl-core-delete-incorrect-free-in-pinctrl-enable.patch
- From: 5.15.0-118.128
- CVE-2024-36955
- Description:
ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()
- CVE: https://ubuntu.com/security/CVE-2024-36955
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36955-alsa-hda-intel-sdw-acpi-fix-usage-of-device-get-named-child-node.patch
- From: 5.15.0-118.128
- CVE-2024-36954
- Description:
tipc: fix a possible memleak in tipc_buf_append
- CVE: https://ubuntu.com/security/CVE-2024-36954
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36954-tipc-fix-a-possible-memleak-in-tipc-buf-append.patch
- From: 5.15.0-118.128
- CVE-2024-36952
- Description:
scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
- CVE: https://ubuntu.com/security/CVE-2024-36952
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36952-scsi-lpfc-move-npiv-s-transport-unregistration-to-after-resource-clean-up.patch
- From: 5.15.0-118.128
- CVE-2024-36950
- Description:
firewire: ohci: mask bus reset interrupts between ISR and bottom half
- CVE: https://ubuntu.com/security/CVE-2024-36950
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36950-firewire-ohci-mask-bus-reset-interrupts-between-isr-and-bottom-half.patch
- From: 5.15.0-118.128
- CVE-2024-36947
- Description:
qibfs: fix dentry leak
- CVE: https://ubuntu.com/security/CVE-2024-36947
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36947-qibfs-fix-dentry-leak.patch
- From: 5.15.0-118.128
- CVE-2024-36946
- Description:
phonet: fix rtm_phonet_notify() skb allocation
- CVE: https://ubuntu.com/security/CVE-2024-36946
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36946-phonet-fix-rtm-phonet-notify-skb-allocation.patch
- From: 5.15.0-118.128
- CVE-2024-36957
- Description:
octeontx2-af: avoid off-by-one read from userspace
- CVE: https://ubuntu.com/security/CVE-2024-36957
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36957-octeontx2-af-avoid-off-by-one-read-from-userspace.patch
- From: 5.15.0-118.128
- CVE-2024-36964
- Description:
fs/9p: only translate RWX permissions for plain 9P2000
- CVE: https://ubuntu.com/security/CVE-2024-36964
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36964-fs-9p-only-translate-rwx-permissions-for-plain-9p2000.patch
- From: 5.15.0-118.128
- CVE-2023-52585
- Description:
drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
- CVE: https://ubuntu.com/security/CVE-2023-52585
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2023-52585-drm-amdgpu-fix-possible-null-dereference-in-amdgpu-ras-query-error-status-helper.patch
- From: 5.15.0-118.128
- CVE-2024-36933
- Description:
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
- CVE: https://ubuntu.com/security/CVE-2024-36933
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36933-nsh-restore-skb-protocol-data-mac-header-for-outer-header-in-nsh-gso-segment.patch
- From: 5.15.0-118.128
- CVE-2024-36959
- Description:
pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()
- CVE: https://ubuntu.com/security/CVE-2024-36959
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36959-pinctrl-devicetree-fix-refcount-leak-in-pinctrl-dt-to-map.patch
- From: 5.15.0-118.128
- CVE-2024-26921
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- CVE:
- Patch: skipped/CVE-2024-26921.patch
- From:
- CVE-2023-52629
- Description:
Out of scope - related to SuperH
- CVE:
- Patch: skipped/CVE-2023-52629.patch
- From:
- CVE-2023-52760
- Description:
gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
- CVE: https://ubuntu.com/security/CVE-2023-52760
- Patch: ubuntu-jammy/5.15.0-119.129/CVE-2023-52760-gfs2-fix-slab-use-after-free-in-gfs2-qd-dealloc.patch
- From: 5.15.0-119.129
- CVE-2024-26680
- Description:
net: atlantic: Fix DMA mapping for PTP hwts ring
- CVE: https://ubuntu.com/security/CVE-2024-26680
- Patch: ubuntu-jammy/5.15.0-119.129/CVE-2024-26680-net-atlantic-fix-dma-mapping-for-ptp-hwts-ring.patch
- From: 5.15.0-119.129
- CVE-2024-26830
- Description:
Fixed function sleeps and executed in kthread, which may prevent patching/unpatching. Low score CVE.
- CVE:
- Patch: skipped/CVE-2024-26830.patch
- From:
- CVE-2024-36901
- Description:
ipv6: prevent NULL dereference in ip6_output()
- CVE: https://ubuntu.com/security/CVE-2024-36901
- Patch: ubuntu-jammy/5.15.0-119.129/CVE-2024-36901-ipv6-prevent-null-dereference-in-ip6-output.patch
- From: 5.15.0-119.129
- CVE-2024-39292
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-39292.patch
- From:
- CVE-2024-39484
- Description:
mmc: davinci: Don't strip remove function when driver is
- CVE: https://ubuntu.com/security/CVE-2024-39484
- Patch: ubuntu-jammy/5.15.0-119.129/CVE-2024-39484-mmc-davinci-don-t-strip-remove-function-when-driver-is-kpatch.patch
- From: 5.15.0-119.129
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://ubuntu.com/security/CVE-2024-42154
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 5.15.0-121.131
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://ubuntu.com/security/CVE-2024-42154
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42154-tcp_metrics-validate-source-addr-length-kpatch.patch
- From: 5.15.0-121.131
- CVE-2024-36978
- Description:
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
- CVE: https://ubuntu.com/security/CVE-2024-36978
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in.patch
- From: 5.15.0-121.131
- CVE-2024-38552
- Description:
drm/amd/display: Fix potential index out of bounds in color transformation function
- CVE: https://ubuntu.com/security/CVE-2024-38552
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38552-drm-amd-display-fix-potential-index-out-of-bounds-in-color.patch
- From: 5.15.0-121.131
- CVE-2024-38555
- Description:
net/mlx5: Discard command completions in internal error
- CVE: https://ubuntu.com/security/CVE-2024-38555
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38555-net-mlx5-discard-command-completions-in-internal-error.patch
- From: 5.15.0-121.131
- CVE-2024-38583
- Description:
nilfs2: We cannot patch functions that sleep in kthread().
- CVE:
- Patch: skipped/CVE-2024-38583.patch
- From:
- CVE-2024-38627
- Description:
stm class: Fix a double free in stm_register_device()
- CVE: https://ubuntu.com/security/CVE-2024-38627
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38627-stm-class-fix-a-double-free-in-stm-register-device.patch
- From: 5.15.0-121.131
- CVE-2024-39480
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://ubuntu.com/security/CVE-2024-39480
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39480-kdb-fix-buffer-overflow-during-tab-complete.patch
- From: 5.15.0-121.131
- CVE-2024-39495
- Description:
greybus: Fix use-after-free bug in gb_interface_release due to race condition.
- CVE: https://ubuntu.com/security/CVE-2024-39495
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39495-greybus-fix-use-after-free-bug-in-gb-interface-release-due.patch
- From: 5.15.0-121.131
- CVE-2024-39277
- Description:
dma-mapping: benchmark: handle NUMA_NO_NODE correctly
- CVE: https://ubuntu.com/security/CVE-2024-39277
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39277-dma-mapping-benchmark-handle-numa-no-node-correctly.patch
- From: 5.15.0-121.131
- CVE-2024-38381
- Description:
Out of scope as the patch is for NFC/Android
- CVE:
- Patch: skipped/CVE-2024-38381.patch
- From:
- CVE-2024-42093
- Description:
net/dpaa2: Avoid explicit cpumask var allocation on stack
- CVE: https://ubuntu.com/security/CVE-2024-42093
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42093-net-dpaa2-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.15.0-121.131
- CVE-2024-42094
- Description:
net/iucv: Avoid explicit cpumask var allocation on stack
- CVE: https://ubuntu.com/security/CVE-2024-42094
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42094-net-iucv-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.15.0-121.131
- CVE-2024-42104
- Description:
nilfs2: add missing check for inode numbers on directory
- CVE: https://ubuntu.com/security/CVE-2024-42104
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42104-nilfs2-add-missing-check-for-inode-numbers-on-directory.patch
- From: 5.15.0-121.131
- CVE-2024-42161
- Description:
BPF selftest fix, not a kernel code.
- CVE:
- Patch: skipped/CVE-2024-42161.patch
- From:
- CVE-2024-42224
- Description:
net: dsa: mv88e6xxx: Correct check for empty list
- CVE: https://ubuntu.com/security/CVE-2024-42224
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42224-net-dsa-mv88e6xxx-correct-check-for-empty-list.patch
- From: 5.15.0-121.131
- CVE-2024-42225
- Description:
wifi: mt76: replace skb_put with skb_put_zero
- CVE: https://ubuntu.com/security/CVE-2024-42225
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42225-wifi-mt76-replace-skb-put-with-skb-put-zero.patch
- From: 5.15.0-121.131
- CVE-2024-39471
- Description:
drm/amdgpu: add error handle to avoid out-of-bounds
- CVE: https://ubuntu.com/security/CVE-2024-39471
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39471-drm-amdgpu-add-error-handle-to-avoid-out-of-bounds.patch
- From: 5.15.0-121.131
- CVE-2024-39487
- Description:
bonding: Fix out-of-bounds read in
- CVE: https://ubuntu.com/security/CVE-2024-39487
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39487-bonding-fix-out-of-bounds-read-in.patch
- From: 5.15.0-121.131
- CVE-2024-41040
- Description:
net/sched: Fix UAF when resolving a clash
- CVE: https://ubuntu.com/security/CVE-2024-41040
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41040-net-sched-fix-uaf-when-resolving-a-clash.patch
- From: 5.15.0-121.131
- CVE-2022-48772
- Description:
media: lgdt3306a: Add a check against null-pointer-def
- CVE: https://ubuntu.com/security/CVE-2022-48772
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2022-48772-media-lgdt3306a-add-a-check-against-null-pointer-def.patch
- From: 5.15.0-121.131
- CVE-2023-52884
- Description:
Patched functions sleep and are called from a kthread. Trackpad suspend/resume fix.
- CVE:
- Patch: skipped/CVE-2023-52884.patch
- From:
- CVE-2023-52887
- Description:
net: can: j1939: enhanced error handling for tightly received
- CVE: https://ubuntu.com/security/CVE-2023-52887
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2023-52887-net-can-j1939-enhanced-error-handling-for-tightly-received.patch
- From: 5.15.0-121.131
- CVE-2024-23848
- Description:
media: cec: cec-api: add locking in cec_release()
- CVE: https://ubuntu.com/security/CVE-2024-23848
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-23848-media-cec-cec-api-add-locking-in-cec_release.patch
- From: 5.15.0-121.131
- CVE-2024-25741
- Description:
usb: gadget: printer: fix races against disable
- CVE: https://ubuntu.com/security/CVE-2024-25741
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-25741-usb-gadget-printer-fix-races-against-disable.patch
- From: 5.15.0-121.131
- CVE-2024-31076
- Description:
genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU
- CVE: https://ubuntu.com/security/CVE-2024-31076
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-31076-genirq-cpuhotplug-x86-vector-prevent-vector-leak-during-cpu.patch
- From: 5.15.0-121.131
- CVE-2024-33621
- Description:
ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound
- CVE: https://ubuntu.com/security/CVE-2024-33621
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-33621-ipvlan-dont-use-skb-sk-in-ipvlan-process-v-46-outbound-97.patch
- From: 5.15.0-121.131
- CVE-2024-33847
- Description:
f2fs: compress: don't allow unaligned truncation on released
- CVE: https://ubuntu.com/security/CVE-2024-33847
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-33847-f2fs-compress-don-t-allow-unaligned-truncation-on-released.patch
- From: 5.15.0-121.131
- CVE-2024-34027
- Description:
f2fs: compress: fix to cover
- CVE: https://ubuntu.com/security/CVE-2024-34027
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-34027-f2fs-compress-fix-to-cover.patch
- From: 5.15.0-121.131
- CVE-2024-34777
- Description:
dma-mapping: benchmark: fix node id validation
- CVE: https://ubuntu.com/security/CVE-2024-34777
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-34777-dma-mapping-benchmark-fix-node-id-validation.patch
- From: 5.15.0-121.131
- CVE-2024-36489
- Description:
tls: fix missing memory barrier in tls_init
- CVE: https://ubuntu.com/security/CVE-2024-36489
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36489-tls-fix-missing-memory-barrier-in-tls-init.patch
- From: 5.15.0-121.131
- CVE-2024-36015
- Description:
ppdev: Add an error check in register_device
- CVE: https://ubuntu.com/security/CVE-2024-36015
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36015-ppdev-add-an-error-check-in-register-device.patch
- From: 5.15.0-121.131
- CVE-2024-36032
- Description:
Bluetooth: qca: fix info leak when fetching fw build id
- CVE: https://ubuntu.com/security/CVE-2024-36032
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36032-bluetooth-qca-fix-info-leak-when-fetching-fw-build-id.patch
- From: 5.15.0-121.131
- CVE-2024-36014
- Description:
drm/arm/malidp: fix a possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-36014
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36014-drm-arm-malidp-fix-a-possible-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-36270
- Description:
netfilter: tproxy: bail out if IP has been disabled on the device
- CVE: https://ubuntu.com/security/CVE-2024-36270
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been-disabled-on-the-device.patch
- From: 5.15.0-121.131
- CVE-2024-36894
- Description:
usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete
- CVE: https://ubuntu.com/security/CVE-2024-36894
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36894-usb-gadget-f-fs-fix-race-between-aio-cancel-and-aio-request-complete.patch
- From: 5.15.0-121.131
- CVE-2024-36286
- Description:
netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()
- CVE: https://ubuntu.com/security/CVE-2024-36286
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36286-netfilter-nfnetlink-queue-acquire-rcu-read-lock-in-instance-destroy-rcu.patch
- From: 5.15.0-121.131
- CVE-2024-35927
- Description:
drm: Check output polling initialized before disabling
- CVE: https://ubuntu.com/security/CVE-2024-35927
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-35927-drm-Check-output-polling-initialized-before-disabling.patch
- From: 5.15.0-121.131
- CVE-2024-35927
- Description:
drm: Check output polling initialized before disabling
- CVE: https://ubuntu.com/security/CVE-2024-35927
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-35927-drm-Check-polling-initialized-before-enabling-in-drm_helper_probe_single_connector_modes.patch
- From: 5.15.0-121.131
- CVE-2024-35972
- Description:
Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem.
- CVE:
- Patch: skipped/CVE-2024-35972.patch
- From:
- CVE-2024-38559
- Description:
scsi: qedf: Ensure the copied buf is NUL terminated
- CVE: https://ubuntu.com/security/CVE-2024-38559
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38559-scsi-qedf-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.15.0-121.131
- CVE-2024-38558
- Description:
net: openvswitch: fix overwriting ct original tuple for ICMPv6
- CVE: https://ubuntu.com/security/CVE-2024-38558
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38558-net-openvswitch-fix-overwriting-ct-original-tuple-for-icmpv6.patch
- From: 5.15.0-121.131
- CVE-2024-38550
- Description:
ASoC: kirkwood: Fix potential NULL dereference
- CVE: https://ubuntu.com/security/CVE-2024-38550
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38550-asoc-kirkwood-fix-potential-null-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-38549
- Description:
drm/mediatek: Add 0 size check to mtk_drm_gem_obj
- CVE: https://ubuntu.com/security/CVE-2024-38549
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38549-drm-mediatek-add-0-size-check-to-mtk-drm-gem-obj.patch
- From: 5.15.0-121.131
- CVE-2024-38548
- Description:
drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-38548
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38548-drm-bridge-cdns-mhdp8546-fix-possible-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-38547
- Description:
media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries
- CVE: https://ubuntu.com/security/CVE-2024-38547
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38547-media-atomisp-ssh-css-fix-a-null-pointer-dereference-in-load-video-binaries.patch
- From: 5.15.0-121.131
- CVE-2024-38546
- Description:
drm: vc4: Fix possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-38546
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38546-drm-vc4-fix-possible-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-36974
- Description:
net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
- CVE: https://ubuntu.com/security/CVE-2024-36974
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36974-net-sched-taprio-always-validate-tca-taprio-attr-priomap.patch
- From: 5.15.0-121.131
- CVE-2024-37078
- Description:
nilfs2: fix potential kernel bug due to lack of writeback
- CVE: https://ubuntu.com/security/CVE-2024-37078
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-37078-nilfs2-fix-potential-kernel-bug-due-to-lack-of-writeback-flag-waiting.patch
- From: 5.15.0-121.131
- CVE-2024-38586
- Description:
r8169: Fix possible ring buffer corruption on fragmented Tx packets.
- CVE: https://ubuntu.com/security/CVE-2024-38586
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38586-r8169-fix-possible-ring-buffer-corruption-on-fragmented-tx-packets.patch
- From: 5.15.0-121.131
- CVE-2024-38582
- Description:
nilfs2: fix unexpected freezing of nilfs_segctor_sync() (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-38582
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38582-01-nilfs2-fix-unexpected-freezing-of-nilfs-segctor-sync-5.15.0-119.129.patch
- From: 5.15.0-121.131
- CVE-2024-38582
- Description:
nilfs2: fix potential hang in nilfs_detach_log_writer()
- CVE: https://ubuntu.com/security/CVE-2024-38582
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38582-nilfs2-fix-potential-hang-in-nilfs-detach-log-writer.patch
- From: 5.15.0-121.131
- CVE-2024-38580
- Description:
epoll: be better about file lifetimes
- CVE: https://ubuntu.com/security/CVE-2024-38580
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38580-epoll-be-better-about-file-lifetimes.patch
- From: 5.15.0-121.131
- CVE-2024-38579
- Description:
crypto: bcm - Fix pointer arithmetic
- CVE: https://ubuntu.com/security/CVE-2024-38579
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38579-crypto-bcm-fix-pointer-arithmetic.patch
- From: 5.15.0-121.131
- CVE-2024-38578
- Description:
ecryptfs: Fix buffer size for tag 66 packet
- CVE: https://ubuntu.com/security/CVE-2024-38578
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38578-ecryptfs-fix-buffer-size-for-tag-66-packet.patch
- From: 5.15.0-121.131
- CVE-2024-38573
- Description:
cppc_cpufreq: Fix possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-38573
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38573-cppc-cpufreq-fix-possible-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-38571
- Description:
thermal/drivers/tsens: Fix null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-38571
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38571-thermal-drivers-tsens-fix-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-38560
- Description:
scsi: bfa: Ensure the copied buf is NUL terminated
- CVE: https://ubuntu.com/security/CVE-2024-38560
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38560-scsi-bfa-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.15.0-121.131
- CVE-2024-38587
- Description:
speakup: Fix sizeof() vs ARRAY_SIZE() bug
- CVE: https://ubuntu.com/security/CVE-2024-38587
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38587-speakup-fix-sizeof-vs-array-size-bug.patch
- From: 5.15.0-121.131
- CVE-2024-38601
- Description:
ring-buffer: Fix a race between readers and resize checks
- CVE: https://ubuntu.com/security/CVE-2024-38601
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38601-ring-buffer-fix-a-race-between-readers-and-resize-checks.patch
- From: 5.15.0-121.131
- CVE-2024-38599
- Description:
jffs2: prevent xattr node from overflowing the eraseblock
- CVE: https://ubuntu.com/security/CVE-2024-38599
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38599-jffs2-prevent-xattr-node-from-overflowing-the-eraseblock.patch
- From: 5.15.0-121.131
- CVE-2024-38596
- Description:
af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
- CVE: https://ubuntu.com/security/CVE-2024-38596
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38596-af-unix-fix-data-races-in-unix-release-sock-unix-stream-sendmsg.patch
- From: 5.15.0-121.131
- CVE-2024-38591
- Description:
RDMA/hns: Fix deadlock on SRQ async events.
- CVE: https://ubuntu.com/security/CVE-2024-38591
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38591-rdma-hns-fix-deadlock-on-srq-async-events.patch
- From: 5.15.0-121.131
- CVE-2024-38590
- Description:
RDMA/hns: Modify the print level of CQE error
- CVE: https://ubuntu.com/security/CVE-2024-38590
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38590-rdma-hns-modify-the-print-level-of-cqe-error.patch
- From: 5.15.0-121.131
- CVE-2024-38605
- Description:
ALSA: core: Fix NULL module pointer assignment at card init
- CVE: https://ubuntu.com/security/CVE-2024-38605
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38605-alsa-core-fix-null-module-pointer-assignment-at-card-init.patch
- From: 5.15.0-121.131
- CVE-2024-38607
- Description:
macintosh/via-macii: Fix "BUG: sleeping function called from invalid context"
- CVE: https://ubuntu.com/security/CVE-2024-38607
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38607-macintosh-via-macii-fix-bug-sleeping-function-called-from-invalid-context.patch
- From: 5.15.0-121.131
- CVE-2024-38613
- Description:
Out of scope as the patch is for m68k arch only, x86_64, arm64 is not affected
- CVE:
- Patch: skipped/CVE-2024-38613.patch
- From:
- CVE-2024-38612
- Description:
Vulnerability affects OS during boot time and can't be closed via livepatching.
- CVE:
- Patch: skipped/CVE-2024-38612.patch
- From:
- CVE-2024-38623
- Description:
Patch changes global data size, which may lead to FS errors. Low-score CVE requires complex adaptation.
- CVE:
- Patch: skipped/CVE-2024-38623.patch
- From:
- CVE-2024-38621
- Description:
media: stk1160: fix bounds checking in stk1160_copy_video()
- CVE: https://ubuntu.com/security/CVE-2024-38621
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38621-media-stk1160-fix-bounds-checking-in-stk1160-copy-video.patch
- From: 5.15.0-121.131
- CVE-2024-38618
- Description:
ALSA: timer: Set lower bound of start tick time
- CVE: https://ubuntu.com/security/CVE-2024-38618
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38618-alsa-timer-set-lower-bound-of-start-tick-time.patch
- From: 5.15.0-121.131
- CVE-2024-38637
- Description:
greybus: lights: check return of get_channel_from_mode
- CVE: https://ubuntu.com/security/CVE-2024-38637
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38637-greybus-lights-check-return-of-get-channel-from-mode.patch
- From: 5.15.0-121.131
- CVE-2024-38635
- Description:
soundwire: cadence: fix invalid PDI offset
- CVE: https://ubuntu.com/security/CVE-2024-38635
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38635-soundwire-cadence-fix-invalid-pdi-offset.patch
- From: 5.15.0-121.131
- CVE-2024-38633
- Description:
serial: max3100: Update uart_driver_registered on driver removal
- CVE: https://ubuntu.com/security/CVE-2024-38633
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38633-serial-max3100-update-uart-driver-registered-on-driver-removal.patch
- From: 5.15.0-121.131
- CVE-2024-38780
- Description:
dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
- CVE: https://ubuntu.com/security/CVE-2024-38780
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38780-dma-buf-sw-sync-don-t-enable-irq-from-sync-print-obj.patch
- From: 5.15.0-121.131
- CVE-2024-38659
- Description:
enic: Validate length of nl attributes in enic_set_vf_port
- CVE: https://ubuntu.com/security/CVE-2024-38659
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38659-enic-validate-length-of-nl-attributes-in-enic-set-vf-port.patch
- From: 5.15.0-121.131
- CVE-2024-38662
- Description:
bpf: Allow delete from sockmap/sockhash only if update is allowed
- CVE: https://ubuntu.com/security/CVE-2024-38662
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38662-bpf-allow-delete-from-sockmap-sockhash-only-if-update-is-allowed.patch
- From: 5.15.0-121.131
- CVE-2024-39276
- Description:
ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()
- CVE: https://ubuntu.com/security/CVE-2024-39276
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39276-ext4-fix-mb-cache-entry-s-e-refcnt-leak-in-ext4-xattr-block-cache-find.patch
- From: 5.15.0-121.131
- CVE-2024-38661
- Description:
Out of scope as the patch is for s390 arch only, x86_64, arm64 is not affected
- CVE:
- Patch: skipped/CVE-2024-38661.patch
- From:
- CVE-2024-39490
- Description:
ipv6: sr: fix missing sk_buff release in seg6_input_core
- CVE: https://ubuntu.com/security/CVE-2024-39490
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39490-ipv6-sr-fix-missing-sk-buff-release-in-seg6-input-core.patch
- From: 5.15.0-121.131
- CVE-2024-39489
- Description:
ipv6: sr: fix memleak in seg6_hmac_init_algo
- CVE: https://ubuntu.com/security/CVE-2024-39489
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39489-ipv6-sr-fix-memleak-in-seg6-hmac-init-algo.patch
- From: 5.15.0-121.131
- CVE-2024-39467
- Description:
f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode()
- CVE: https://ubuntu.com/security/CVE-2024-39467
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39467-f2fs-fix-to-do-sanity-check-on-i-xattr-nid-in-sanity-check-inode.patch
- From: 5.15.0-121.131
- CVE-2024-39466
- Description:
thermal/drivers/qcom/lmh: Check for SCM availability at probe
- CVE: https://ubuntu.com/security/CVE-2024-39466
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39466-thermal-drivers-qcom-lmh-check-for-scm-availability-at-probe.patch
- From: 5.15.0-121.131
- CVE-2024-39475
- Description:
fbdev: savage: Handle err return when savagefb_check_var failed
- CVE: https://ubuntu.com/security/CVE-2024-39475
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39475-fbdev-savage-handle-err-return-when-savagefb-check-var-failed.patch
- From: 5.15.0-121.131
- CVE-2024-39301
- Description:
net/9p: fix uninit-value in p9_client_rpc()
- CVE: https://ubuntu.com/security/CVE-2024-39301
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39301-net-9p-fix-uninit-value-in-p9-client-rpc.patch
- From: 5.15.0-121.131
- CVE-2024-39468
- Description:
smb: client: fix deadlock in smb2_find_smb_tcon()
- CVE: https://ubuntu.com/security/CVE-2024-39468
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39468-smb-client-fix-deadlock-in-smb2-find-smb-tcon.patch
- From: 5.15.0-121.131
- CVE-2024-39493
- Description:
crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- CVE: https://ubuntu.com/security/CVE-2024-39493
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39493-crypto-qat-fix-adf-dev-reset-sync-memory-leak.patch
- From: 5.15.0-121.131
- CVE-2024-39506
- Description:
liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
- CVE: https://ubuntu.com/security/CVE-2024-39506
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39506-liquidio-adjust-a-null-pointer-handling-path-in-lio-vf-rep-copy-packet.patch
- From: 5.15.0-121.131
- CVE-2024-39505
- Description:
drm/komeda: check for error-valued pointer
- CVE: https://ubuntu.com/security/CVE-2024-39505
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39505-drm-komeda-check-for-error-valued-pointer.patch
- From: 5.15.0-121.131
- CVE-2024-39501
- Description:
drivers: core: synchronize really_probe() and dev_uevent()
- CVE: https://ubuntu.com/security/CVE-2024-39501
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39501-drivers-core-synchronize-really-probe-and-dev-uevent.patch
- From: 5.15.0-121.131
- CVE-2024-39499
- Description:
vmci: prevent speculation leaks by sanitizing event in event_deliver()
- CVE: https://ubuntu.com/security/CVE-2024-39499
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39499-vmci-prevent-speculation-leaks-by-sanitizing-event-in-event-deliver.patch
- From: 5.15.0-121.131
- CVE-2024-39509
- Description:
HID: core: remove unnecessary WARN_ON() in implement()
- CVE: https://ubuntu.com/security/CVE-2024-39509
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39509-hid-core-remove-unnecessary-warn-on-in-implement.patch
- From: 5.15.0-121.131
- CVE-2024-40912
- Description:
wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()
- CVE: https://ubuntu.com/security/CVE-2024-40912
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40912-wifi-mac80211-fix-deadlock-in-ieee80211-sta-ps-deliver-wakeup.patch
- From: 5.15.0-121.131
- CVE-2024-40911
- Description:
wifi: cfg80211: Lock wiphy in cfg80211_get_station
- CVE: https://ubuntu.com/security/CVE-2024-40911
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40911-wifi-cfg80211-lock-wiphy-in-cfg80211-get-station.patch
- From: 5.15.0-121.131
- CVE-2024-40929
- Description:
wifi: iwlwifi: mvm: check n_ssids before accessing the ssids
- CVE: https://ubuntu.com/security/CVE-2024-40929
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40929-wifi-iwlwifi-mvm-check-n-ssids-before-accessing-the-ssids.patch
- From: 5.15.0-121.131
- CVE-2024-40908
- Description:
bpf: Set run context for rawtp test_run callback
- CVE: https://ubuntu.com/security/CVE-2024-40908
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40908-bpf-set-run-context-for-rawtp-test-run-callback.patch
- From: 5.15.0-121.131
- CVE-2024-40905
- Description:
ipv6: fix possible race in __fib6_drop_pcpu_from()
- CVE: https://ubuntu.com/security/CVE-2024-40905
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40905-ipv6-fix-possible-race-in-fib6-drop-pcpu-from.patch
- From: 5.15.0-121.131
- CVE-2024-40904
- Description:
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log
- CVE: https://ubuntu.com/security/CVE-2024-40904
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40904-usb-class-cdc-wdm-fix-cpu-lockup-caused-by-excessive-log-messages.patch
- From: 5.15.0-121.131
- CVE-2024-40901
- Description:
scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
- CVE: https://ubuntu.com/security/CVE-2024-40901
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40901-scsi-mpt3sas-avoid-test-set-bit-operating-in-non-allocated-memory.patch
- From: 5.15.0-121.131
- CVE-2024-40942
- Description:
wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects
- CVE: https://ubuntu.com/security/CVE-2024-40942
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40942-wifi-mac80211-mesh-fix-leak-of-mesh-preq-queue-objects.patch
- From: 5.15.0-121.131
- CVE-2024-40941
- Description:
wifi: iwlwifi: mvm: don't read past the mfuart notifcation
- CVE: https://ubuntu.com/security/CVE-2024-40941
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40941-wifi-iwlwifi-mvm-don-t-read-past-the-mfuart-notifcation.patch
- From: 5.15.0-121.131
- CVE-2024-40945
- Description:
iommu: Return right value in iommu_sva_bind_device()
- CVE: https://ubuntu.com/security/CVE-2024-40945
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40945-iommu-return-right-value-in-iommu-sva-bind-device.patch
- From: 5.15.0-121.131
- CVE-2024-40945
- Description:
iommu: Return right value in iommu_sva_bind_device()
- CVE: https://ubuntu.com/security/CVE-2024-40945
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40945-iommu-return-right-value-in-iommu-sva-bind-device-kpatch.patch
- From: 5.15.0-121.131
- CVE-2024-40932
- Description:
drm/exynos/vidi: fix memory leak in .get_modes()
- CVE: https://ubuntu.com/security/CVE-2024-40932
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40932-drm-exynos-vidi-fix-memory-leak-in-get-modes.patch
- From: 5.15.0-121.131
- CVE-2024-40943
- Description:
ocfs2: fix races between hole punching and AIO+DIO
- CVE: https://ubuntu.com/security/CVE-2024-40943
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40943-ocfs2-fix-races-between-hole-punching-and-aio-dio.patch
- From: 5.15.0-121.131
- CVE-2024-40959
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://ubuntu.com/security/CVE-2024-40959
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40959-xfrm6-check-ip6-dst-idev-return-value-in-xfrm6-get-saddr.patch
- From: 5.15.0-121.131
- CVE-2024-40957
- Description:
seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors
- CVE: https://ubuntu.com/security/CVE-2024-40957
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40957-seg6-fix-parameter-passing-when-calling-nf-hook-in-end-dx4-and-end-dx6-behaviors.patch
- From: 5.15.0-121.131
- CVE-2024-40978
- Description:
scsi: qedi: Fix crash while reading debugfs attribute
- CVE: https://ubuntu.com/security/CVE-2024-40978
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40978-scsi-qedi-fix-crash-while-reading-debugfs-attribute.patch
- From: 5.15.0-121.131
- CVE-2024-40976
- Description:
drm/lima: mask irqs in timeout path before hard reset
- CVE: https://ubuntu.com/security/CVE-2024-40976
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40976-drm-lima-mask-irqs-in-timeout-path-before-hard-reset.patch
- From: 5.15.0-121.131
- CVE-2024-40974
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-40974.patch
- From:
- CVE-2024-40971
- Description:
f2fs: remove clear SB_INLINECRYPT flag in default_options
- CVE: https://ubuntu.com/security/CVE-2024-40971
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40971-f2fs-remove-clear-sb-inlinecrypt-flag-in-default-options.patch
- From: 5.15.0-121.131
- CVE-2024-40968
- Description:
MIPS related CVE.
- CVE:
- Patch: skipped/CVE-2024-40968.patch
- From:
- CVE-2024-40967
- Description:
serial: imx: Introduce timeout when waiting on transmitter empty
- CVE: https://ubuntu.com/security/CVE-2024-40967
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40967-serial-imx-introduce-timeout-when-waiting-on-transmitter-empty.patch
- From: 5.15.0-121.131
- CVE-2024-40963
- Description:
Out of scope as the patch is for MIPS arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-40963.patch
- From:
- CVE-2024-40961
- Description:
ipv6: prevent possible NULL deref in fib6_nh_init()
- CVE: https://ubuntu.com/security/CVE-2024-40961
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40961-ipv6-prevent-possible-null-deref-in-fib6-nh-init.patch
- From: 5.15.0-121.131
- CVE-2024-40960
- Description:
ipv6: prevent possible NULL dereference in rt6_probe()
- CVE: https://ubuntu.com/security/CVE-2024-40960
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40960-ipv6-prevent-possible-null-dereference-in-rt6-probe.patch
- From: 5.15.0-121.131
- CVE-2024-41002
- Description:
crypto: hisilicon/sec - Fix memory leak for sec resource release
- CVE: https://ubuntu.com/security/CVE-2024-41002
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41002-crypto-hisilicon-sec-fix-memory-leak-for-sec-resource-release.patch
- From: 5.15.0-121.131
- CVE-2024-40981
- Description:
batman-adv: bypass empty buckets in batadv_purge_orig_ref()
- CVE: https://ubuntu.com/security/CVE-2024-40981
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40981-batman-adv-bypass-empty-buckets-in-batadv-purge-orig-ref.patch
- From: 5.15.0-121.131
- CVE-2024-41004
- Description:
tracing: Build event generation tests only as modules
- CVE: https://ubuntu.com/security/CVE-2024-41004
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41004-tracing-build-event-generation-tests-only-as-modules.patch
- From: 5.15.0-121.131
- CVE-2024-41004
- Description:
tracing: Build event generation tests only as modules
- CVE: https://ubuntu.com/security/CVE-2024-41004
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41004-tracing-Build-event-generation-tests-only-as-modules-kpatch.patch
- From: 5.15.0-121.131
- CVE-2024-40983
- Description:
tipc: force a dst refcount before doing decryption
- CVE: https://ubuntu.com/security/CVE-2024-40983
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40983-tipc-force-a-dst-refcount-before-doing-decryption.patch
- From: 5.15.0-121.131
- CVE-2024-40984
- Description:
ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs.
- CVE: https://ubuntu.com/security/CVE-2024-40984
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40984-acpica-revert-acpica-avoid-info-mapping-multiple-bars-your-kernel-is-fine.patch
- From: 5.15.0-121.131
- CVE-2024-40990
- Description:
RDMA/mlx5: Add check for srq max_sge attribute
- CVE: https://ubuntu.com/security/CVE-2024-40990
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40990-rdma-mlx5-add-check-for-srq-max-sge-attribute.patch
- From: 5.15.0-121.131
- CVE-2024-40988
- Description:
drm/radeon: fix UBSAN warning in kv_dpm.c
- CVE: https://ubuntu.com/security/CVE-2024-40988
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40988-drm-radeon-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 5.15.0-121.131
- CVE-2024-40987
- Description:
drm/amdgpu: fix UBSAN warning in kv_dpm.c
- CVE: https://ubuntu.com/security/CVE-2024-40987
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40987-drm-amdgpu-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 5.15.0-121.131
- CVE-2024-41005
- Description:
netpoll: Fix race condition in netpoll_owner_active
- CVE: https://ubuntu.com/security/CVE-2024-41005
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41005-netpoll-fix-race-condition-in-netpoll-owner-active.patch
- From: 5.15.0-121.131
- CVE-2024-41044
- Description:
ppp: reject claimed-as-LCP but actually malformed packets
- CVE: https://ubuntu.com/security/CVE-2024-41044
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41044-ppp-reject-claimed-as-lcp-but-actually-malformed-packets.patch
- From: 5.15.0-121.131
- CVE-2024-41041
- Description:
udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
- CVE: https://ubuntu.com/security/CVE-2024-41041
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41041-udp-set-sock-rcu-free-earlier-in-udp-lib-get-port.patch
- From: 5.15.0-121.131
- CVE-2024-41027
- Description:
Fix userfaultfd_api to return EINVAL as expected
- CVE: https://ubuntu.com/security/CVE-2024-41027
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41027-fix-userfaultfd-api-to-return-einval-as-expected.patch
- From: 5.15.0-121.131
- CVE-2024-41097
- Description:
usb: atm: cxacru: fix endpoint checking in cxacru_bind()
- CVE: https://ubuntu.com/security/CVE-2024-41097
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41097-usb-atm-cxacru-fix-endpoint-checking-in-cxacru-bind.patch
- From: 5.15.0-121.131
- CVE-2024-41095
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
- CVE: https://ubuntu.com/security/CVE-2024-41095
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41095-drm-nouveau-dispnv04-fix-null-pointer-dereference-in-nv17-tv-get-ld-modes.patch
- From: 5.15.0-121.131
- CVE-2024-41093
- Description:
drm/amdgpu: avoid using null object of framebuffer
- CVE: https://ubuntu.com/security/CVE-2024-41093
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41093-drm-amdgpu-avoid-using-null-object-of-framebuffer.patch
- From: 5.15.0-121.131
- CVE-2024-41089
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
- CVE: https://ubuntu.com/security/CVE-2024-41089
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41089-drm-nouveau-dispnv04-fix-null-pointer-dereference-in-nv17-tv-get-hd-modes.patch
- From: 5.15.0-121.131
- CVE-2024-41055
- Description:
The patch affects too much kernel code. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-41055.patch
- From:
- CVE-2024-42090
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
- CVE: https://ubuntu.com/security/CVE-2024-42090
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42090-pinctrl-fix-deadlock-in-create-pinctrl-when-handling-eprobe-defer.patch
- From: 5.15.0-121.131
- CVE-2024-42089
- Description:
ASoC: fsl-asoc-card: set priv->pdev before using it
- CVE: https://ubuntu.com/security/CVE-2024-42089
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42089-asoc-fsl-asoc-card-set-priv-pdev-before-using-it.patch
- From: 5.15.0-121.131
- CVE-2024-42087
- Description:
drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep
- CVE: https://ubuntu.com/security/CVE-2024-42087
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42087-drm-panel-ilitek-ili9881c-fix-warning-with-gpio-controllers-that-sleep.patch
- From: 5.15.0-121.131
- CVE-2024-42092
- Description:
gpio: davinci: Validate the obtained number of IRQs
- CVE: https://ubuntu.com/security/CVE-2024-42092
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42092-gpio-davinci-validate-the-obtained-number-of-irqs.patch
- From: 5.15.0-121.131
- CVE-2024-42096
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://ubuntu.com/security/CVE-2024-42096
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 5.15.0-121.131
- CVE-2024-42086
- Description:
iio: chemical: bme680: Fix overflows in compensate() functions
- CVE: https://ubuntu.com/security/CVE-2024-42086
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42086-iio-chemical-bme680-fix-overflows-in-compensate-functions.patch
- From: 5.15.0-121.131
- CVE-2024-42084
- Description:
ftruncate: pass a signed offset
- CVE: https://ubuntu.com/security/CVE-2024-42084
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42084-ftruncate-pass-a-signed-offset.patch
- From: 5.15.0-121.131
- CVE-2024-42098
- Description:
crypto: ecdh - explicitly zeroize private_key
- CVE: https://ubuntu.com/security/CVE-2024-42098
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42098-crypto-ecdh-explicitly-zeroize-private-key.patch
- From: 5.15.0-121.131
- CVE-2024-42097
- Description:
ALSA: emux: improve patch ioctl data validation
- CVE: https://ubuntu.com/security/CVE-2024-42097
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42097-alsa-emux-improve-patch-ioctl-data-validation.patch
- From: 5.15.0-121.131
- CVE-2024-42120
- Description:
drm/amd/display: Check pipe offset before setting vblank
- CVE: https://ubuntu.com/security/CVE-2024-42120
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42120-drm-amd-display-check-pipe-offset-before-setting-vblank.patch
- From: 5.15.0-121.131
- CVE-2024-42119
- Description:
drm/amd/display: Skip finding free audio for unknown engine_id
- CVE: https://ubuntu.com/security/CVE-2024-42119
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42119-drm-amd-display-skip-finding-free-audio-for-unknown-engine-id.patch
- From: 5.15.0-121.131
- CVE-2024-42115
- Description:
jffs2: Fix potential illegal address access in jffs2_free_inode
- CVE: https://ubuntu.com/security/CVE-2024-42115
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42115-jffs2-fix-potential-illegal-address-access-in-jffs2-free-inode.patch
- From: 5.15.0-121.131
- CVE-2024-42101
- Description:
drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
- CVE: https://ubuntu.com/security/CVE-2024-42101
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42101-drm-nouveau-fix-null-pointer-dereference-in-nouveau-connector-get-modes.patch
- From: 5.15.0-121.131
- CVE-2024-42127
- Description:
drm/lima: fix shared irq handling on driver remove
- CVE: https://ubuntu.com/security/CVE-2024-42127
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42127-drm-lima-fix-shared-irq-handling-on-driver-remove.patch
- From: 5.15.0-121.131
- CVE-2024-42124
- Description:
scsi: qedf: Make qedf_execute_tmf() non-preemptible
- CVE: https://ubuntu.com/security/CVE-2024-42124
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42124-scsi-qedf-make-qedf-execute-tmf-non-preemptible.patch
- From: 5.15.0-121.131
- CVE-2024-42140
- Description:
Arch riscv is not supported.
- CVE:
- Patch: skipped/CVE-2024-42140.patch
- From:
- CVE-2024-42131
- Description:
mm: avoid overflows in dirty throttling logic
- CVE: https://ubuntu.com/security/CVE-2024-42131
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42131-mm-avoid-overflows-in-dirty-throttling-logic.patch
- From: 5.15.0-121.131
- CVE-2024-42152
- Description:
nvmet: fix a possible leak when destroy a ctrl during qp
- CVE: https://ubuntu.com/security/CVE-2024-42152
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42152-nvmet-fix-a-possible-leak-when-destroy-a-ctrl-during-qp-establishment.patch
- From: 5.15.0-121.131
- CVE-2024-42130
- Description:
nfc/nci: Add the inconsistency check between the input data length and count
- CVE: https://ubuntu.com/security/CVE-2024-42130
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42130-nfc-nci-add-the-inconsistency-check-between-the-input-data-length-and-count.patch
- From: 5.15.0-121.131
- CVE-2024-42229
- Description:
crypto: aead,cipher - zeroize key buffer after use
- CVE: https://ubuntu.com/security/CVE-2024-42229
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42229-crypto-aead-cipher-zeroize-key-buffer-after-use.patch
- From: 5.15.0-121.131
- CVE-2024-42223
- Description:
media: dvb-frontends: tda10048: Fix integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-42223
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42223-media-dvb-frontends-tda10048-fix-integer-overflow.patch
- From: 5.15.0-121.131
- CVE-2024-42157
- Description:
s390 architecture related CVE.
- CVE:
- Patch: skipped/CVE-2024-42157.patch
- From:
- CVE-2024-42236
- Description:
usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()
- CVE: https://ubuntu.com/security/CVE-2024-42236
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42236-usb-gadget-configfs-prevent-oob-read-write-in-usb-string-copy.patch
- From: 5.15.0-121.131
- CVE-2024-42232
- Description:
libceph: fix race between delayed_work() and ceph_monc_stop()
- CVE: https://ubuntu.com/security/CVE-2024-42232
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42232-libceph-fix-race-between-delayed-work-and-ceph-monc-stop.patch
- From: 5.15.0-121.131
- CVE-2024-42247
- Description:
wireguard: allowedips: avoid unaligned 64-bit memory accesses
- CVE: https://ubuntu.com/security/CVE-2024-42247
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42247-wireguard-allowedips-avoid-unaligned-64-bit-memory-accesses.patch
- From: 5.15.0-121.131
- CVE-2024-36971
- Description:
net: fix __dst_negative_advice() race
- CVE: https://ubuntu.com/security/CVE-2024-36971
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36971-net-fix-dst-negative-advice-race-107.patch
- From: 5.15.0-121.131
- CVE-2024-41049
- Description:
filelock: fix potential use-after-free in posix_lock_inode
- CVE: https://ubuntu.com/security/CVE-2024-41049
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41049-filelock-fix-potential-use-after-free-in-posix-lock-inode.patch
- From: 5.15.0-121.131
- CVE-2024-41046
- Description:
net: ethernet: lantiq_etop: fix double free in detach
- CVE: https://ubuntu.com/security/CVE-2024-41046
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41046-net-ethernet-lantiq-etop-fix-double-free-in-detach-5.15.0-119.129.patch
- From: 5.15.0-121.131
- CVE-2024-40902
- Description:
jfs: xattr: fix buffer overflow for invalid xattr
- CVE: https://ubuntu.com/security/CVE-2024-40902
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40902-jfs-xattr-fix-buffer-overflow-for-invalid-xattr.patch
- From: 5.15.0-121.131
- CVE-2024-41000
- Description:
block/ioctl: prefer different overflow check
- CVE: https://ubuntu.com/security/CVE-2024-41000
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41000-block-ioctl-prefer-different-overflow-check.patch
- From: 5.15.0-121.131
- CVE-2024-40958
- Description:
netns: Make get_net_ns() handle zero refcount net
- CVE: https://ubuntu.com/security/CVE-2024-40958
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40958-netns-make-get-net-ns-handle-zero-refcount-net.patch
- From: 5.15.0-121.131
- CVE-2024-40994
- Description:
Applies to 32-bit systems only that we don't cover
- CVE:
- Patch: skipped/CVE-2024-40994.patch
- From:
- CVE-2024-40956
- Description:
dmaengine: idxd: Fix possible Use-After-Free in
- CVE: https://ubuntu.com/security/CVE-2024-40956
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40956-dmaengine-idxd-fix-possible-use-after-free-in.patch
- From: 5.15.0-121.131
- CVE-2024-40954
- Description:
net: do not leave a dangling sk pointer, when socket creation
- CVE: https://ubuntu.com/security/CVE-2024-40954
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40954-net-do-not-leave-a-dangling-sk-pointer-when-socket-creation.patch
- From: 5.15.0-121.131
- CVE-2024-41092
- Description:
drm/i915/gt: Fix potential UAF by revoke of fence registers
- CVE: https://ubuntu.com/security/CVE-2024-41092
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41092-drm-i915-gt-fix-potential-uaf-by-revoke-of-fence-registers.patch
- From: 5.15.0-121.131
- CVE-2024-41087
- Description:
ata: libata-core: Fix double free on error
- CVE: https://ubuntu.com/security/CVE-2024-41087
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41087-ata-libata-core-fix-double-free-on-error.patch
- From: 5.15.0-121.131
- CVE-2024-39496
- Description:
btrfs: zoned: fix use-after-free due to race with dev replace
- CVE: https://ubuntu.com/security/CVE-2024-39496
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-39496-btrfs-zoned-fix-use-after-free-due-to-race-with-dev-replace.patch
- From: 5.15.0-122.132
- CVE-2024-42228
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://ubuntu.com/security/CVE-2024-42228
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu_vce_cs_reloc.patch
- From: 5.15.0-122.132
- CVE-2024-39494
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://ubuntu.com/security/CVE-2024-39494
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-39494-ima-fix-use-after-free-on-a-dentry-s-dname-name-97.patch
- From: 5.15.0-122.132
- CVE-2024-42160
- Description:
f2fs: check validation of fault attrs in
- CVE: https://ubuntu.com/security/CVE-2024-42160
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-42160-f2fs-check-validation-of-fault-attrs-in-f2fs_build_fault_attr.patch
- From: 5.15.0-122.132
- CVE-2024-27012
- Description:
netfilter: nf_tables: restore set elements when delete set fails
- CVE: https://ubuntu.com/security/CVE-2024-27012
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-27012-netfilter-nf-tables-restore-set-elements-when-delete-set-fails-101.patch
- From: 5.15.0-122.132
- CVE-2024-26677
- Description:
rxrpc: Fix delayed ACKs to not set the reference serial number
- CVE: https://ubuntu.com/security/CVE-2024-26677
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-26677-rxrpc-Fix-delayed-ACKs-to-not-set-the-reference-serial-number.patch
- From: 5.15.0-122.132
- CVE-2024-26677
- Description:
rxrpc: Fix delayed ACKs to not set the reference serial number (Adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26677
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-26677-rxrpc-Fix-delayed-ACKs-to-not-set-the-reference-serial-number-kpatch.patch
- From: 5.15.0-122.132
- CVE-2024-41009
- Description:
bpf: Fix overrunning reservations in ringbuf
- CVE: https://ubuntu.com/security/CVE-2024-41009
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-41009-bpf-Fix-overrunning-reservations-in-ringbuf.patch
- From: 5.15.0-122.132
- CVE-2024-41009
- Description:
bpf: Fix overrunning reservations in ringbuf (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-41009
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-41009-bpf-Fix-overrunning-reservations-in-ringbuf-kpatch.patch
- From: 5.15.0-122.132
- CVE-2024-38570
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://ubuntu.com/security/CVE-2024-38570
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-38570-01-gfs2-Rename-sd_-glock-kill-_wait.patch
- From: kernel-5.15.0-122.132
- CVE-2024-38570
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://ubuntu.com/security/CVE-2024-38570
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-38570-02-gfs2-Fix-potential-glock-use-after-free-on-unmount.patch
- From: kernel-5.15.0-122.132
- CVE-2024-38570
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://ubuntu.com/security/CVE-2024-38570
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-38570-02-gfs2-Fix-potential-glock-use-after-free-on-unmount-kpatch.patch
- From: kernel-5.15.0-122.132
- CVE-2024-38630
- Description:
watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
- CVE: https://ubuntu.com/security/CVE-2024-38630
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-38630-watchdog-cpu5wdt-c-fix-use-after-free-bug-caused-by-cpu5wdt-trigger.patch
- From: 5.15.0-124.134
- CVE-2024-45016
- Description:
netem: fix return value if duplicate enqueue fails
- CVE: https://ubuntu.com/security/CVE-2024-45016
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-45016-netem-fix-return-value-if-duplicate-enqueue-fails.patch
- From: 5.15.0-124.134
- CVE-2024-44986
- Description:
ipv6: fix possible UAF in ip6_finish_output2()
- CVE: https://ubuntu.com/security/CVE-2024-44986
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44986-ipv6-fix-possible-UAF-in-ip6_finish_output2.patch
- From: 5.15.0-125.135
- CVE-2024-44987
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://ubuntu.com/security/CVE-2024-44987
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44987-ipv6-prevent-UAF-in-ip6_send_skb.patch
- From: 5.15.0-125.135
- CVE-2024-44998
- Description:
atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://ubuntu.com/security/CVE-2024-44998
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue_rx.patch
- From: 5.15.0-125.135
- CVE-2024-45026
- Description:
Architecture is not supported
- CVE:
- Patch: skipped/CVE-2024-45026.patch
- From:
- CVE-2024-46673
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://ubuntu.com/security/CVE-2024-46673
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46673-scsi-aacraid-Fix-double-free-on-probe-failure.patch
- From: 5.15.0-125.135
- CVE-2024-46725
- Description:
drm/amdgpu: Fix out-of-bounds write warning
- CVE: https://ubuntu.com/security/CVE-2024-46725
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46725-drm-amdgpu-Fix-out-of-bounds-write-warning.patch
- From: 5.15.0-125.135
- CVE-2024-46738
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://ubuntu.com/security/CVE-2024-46738
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46738-VMCI-Fix-use-after-free-when-removing-resource-in-vmci_resource_remove.patch
- From: 5.15.0-125.135
- CVE-2024-46740
- Description:
binder: fix UAF caused by offsets overwrite
- CVE: https://ubuntu.com/security/CVE-2024-46740
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46740-binder-fix-UAF-caused-by-offsets-overwrite.patch
- From: 5.15.0-125.135
- CVE-2024-46744
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://ubuntu.com/security/CVE-2024-46744
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46744-Squashfs-sanity-check-symbolic-link-size.patch
- From: 5.15.0-125.135
- CVE-2024-46746
- Description:
HID: amd_sfh: free driver_data after destroying hid device
- CVE: https://ubuntu.com/security/CVE-2024-46746
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46746-HID-amd_sfh-free-driver_data-after-destroying-hid-device.patch
- From: 5.15.0-125.135
- CVE-2024-41059
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://ubuntu.com/security/CVE-2024-41059
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy-name.patch
- From: 5.15.0-125.135
- CVE-2024-44999
- Description:
gtp: pull network headers in gtp_dev_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-44999
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44999-gtp-pull-network-headers-in-gtp-dev-xmit.patch
- From: 5.15.0-125.135
- CVE-2024-41090
- Description:
tap: add missing verification for short frame
- CVE: https://ubuntu.com/security/CVE-2024-41090
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.15.0-125.135
- CVE-2024-41091
- Description:
tun: add missing verification for short frame
- CVE: https://ubuntu.com/security/CVE-2024-41091
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.15.0-125.135
- CVE-2024-46731
- Description:
drm/amd/pm: fix the Out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46731
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46731-drm-amd-pm-fix-the-out-of-bounds-read-warning.patch
- From: 5.15.0-125.135
- CVE-2024-46723
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46723
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.15.0-125.135
- CVE-2024-46844
- Description:
um: line: always fill *error_out in setup_one_line()
- CVE: https://ubuntu.com/security/CVE-2024-46844
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46844-um-line-always-fill-error-out-in-setup-one-line.patch
- From: 5.15.0-125.135
- CVE-2024-46722
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46722
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.15.0-125.135
- CVE-2024-43882
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://ubuntu.com/security/CVE-2024-43882
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.15.0-125.135
- CVE-2024-46724
- Description:
drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://ubuntu.com/security/CVE-2024-46724
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46724-drm-amdgpu-fix-out-of-bounds-read-of-df-v1-7-channel-number.patch
- From: 5.15.0-125.135
- CVE-2024-46747
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://ubuntu.com/security/CVE-2024-46747
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.15.0-125.135
- CVE-2024-46743
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://ubuntu.com/security/CVE-2024-46743
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.15.0-125.135
- CVE-2024-44983
- Description:
netfilter: flowtable: validate vlan header
- CVE: https://ubuntu.com/security/CVE-2024-44983
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44983-netfilter-flowtable-validate-vlan-header.patch
- From: 5.15.0-125.135
- CVE-2024-38602
- Description:
ax25: Fix reference count leak issues of ax25_dev
- CVE: https://ubuntu.com/security/CVE-2024-38602
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-38602-ax25-fix-reference-count-leak-issues-of-ax25-dev.patch
- From: 5.15.0-125.135
- CVE-2024-40915
- Description:
CVE patch is for RISCV arch only
- CVE:
- Patch: skipped/CVE-2024-40915.patch
- From:
- CVE-2022-48666
- Description:
scsi: core: Fix a use-after-free
- CVE: https://ubuntu.com/security/CVE-2022-48666
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2022-48666-scsi-core-fix-a-use-after-free.patch
- From: 5.15.0-125.135
- CVE-2022-48666
- Description:
scsi: core: Fix a use-after-free
- CVE: https://ubuntu.com/security/CVE-2022-48666
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2022-48666-scsi-core-fix-a-use-after-free-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-26669
- Description:
net/sched: flower: Fix chain template offload
- CVE: https://ubuntu.com/security/CVE-2024-26669
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26669-net-sched-flower-Fix-chain-template-offload.patch
- From: 5.15.0-125.135
- CVE-2024-26669
- Description:
net/sched: flower: Fix chain template offload
- CVE: https://ubuntu.com/security/CVE-2024-26669
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26669-net-sched-flower-Fix-chain-template-offload-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-41073
- Description:
nvme: avoid double free special payload
- CVE: https://ubuntu.com/security/CVE-2024-41073
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41073-nvme-avoid-double-free-special-payload.patch
- From: 5.15.0-125.135
- CVE-2024-41070
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41070.patch
- From:
- CVE-2024-42284
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://ubuntu.com/security/CVE-2024-42284
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.15.0-125.135
- CVE-2024-42280
- Description:
mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://ubuntu.com/security/CVE-2024-42280
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42280-misdn-fix-a-use-after-free-in-hfcmulti-tx.patch
- From: 5.15.0-125.135
- CVE-2024-42271
- Description:
net/iucv: fix use after free in iucv_sock_close()
- CVE: https://ubuntu.com/security/CVE-2024-42271
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv-sock-close.patch
- From: 5.15.0-125.135
- CVE-2024-41011
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://ubuntu.com/security/CVE-2024-41011
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 5.15.0-125.135
- CVE-2024-41071
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://ubuntu.com/security/CVE-2024-41071
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41071-wifi-mac80211-avoid-address-calculations-via-out-of-bounds-array-indexing.patch
- From: 5.15.0-125.135
- CVE-2024-47659
- Description:
smack: tcp: ipv4, fix incorrect labeling
- CVE: https://ubuntu.com/security/CVE-2024-47659
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-47659-smack-tcp-ipv4-fix-incorrect-labeling.patch
- From: 5.15.0-125.135
- CVE-2024-38577
- Description:
rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
- CVE: https://ubuntu.com/security/CVE-2024-38577
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-38577-rcu-tasks-fix-show-rcu-tasks-trace-gp-kthread-buffer-overflow.patch
- From: 5.15.0-125.135
- CVE-2024-42285
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://ubuntu.com/security/CVE-2024-42285
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42285-RDMA-iwcm-Fix-a-use-after-free-related-to-destroying-CM-IDs.patch
- From: 5.15.0-125.135
- CVE-2024-42301
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://ubuntu.com/security/CVE-2024-42301
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 5.15.0-125.135
- CVE-2024-42302
- Description:
Patched function waits for external events, which may prevent patching/unpatching.
- CVE:
- Patch: skipped/CVE-2024-42302.patch
- From:
- CVE-2024-42313
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://ubuntu.com/security/CVE-2024-42313
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 5.15.0-125.135
- CVE-2024-43858
- Description:
jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://ubuntu.com/security/CVE-2024-43858
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43858-jfs-fix-array-index-out-of-bounds-in-difree.patch
- From: 5.15.0-125.135
- CVE-2024-43873
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://ubuntu.com/security/CVE-2024-43873
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43873-vhost-vsock-always-initialize-seqpacket-allow.patch
- From: 5.15.0-125.135
- CVE-2024-43873
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://ubuntu.com/security/CVE-2024-43873
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43873-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-44934
- Description:
net: bridge: mcast: wait for previous gc cycles when removing port
- CVE: https://ubuntu.com/security/CVE-2024-44934
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44934-net-bridge-mcast-wait-for-previous-gc-cycles-when-removing-port.patch
- From: 5.15.0-125.135
- CVE-2024-44974
- Description:
mptcp: pm: avoid possible UaF when selecting endp
- CVE: https://ubuntu.com/security/CVE-2024-44974
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44974-mptcp-pm-avoid-possible-UaF-when-selecting-endp.patch
- From: 5.15.0-125.135
- CVE-2024-44985
- Description:
ipv6: prevent possible UAF in ip6_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-44985
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44985-ipv6-prevent-possible-UAF-in-ip6_xmit.patch
- From: 5.15.0-125.135
- CVE-2024-41015
- Description:
ocfs2: add bounds checking to ocfs2_check_dir_entry()
- CVE: https://ubuntu.com/security/CVE-2024-41015
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41015-ocfs2-add-bounds-checking-to-ocfs2-check-dir-entry.patch
- From: 5.15.0-125.135
- CVE-2024-41017
- Description:
jfs: don't walk off the end of ealist
- CVE: https://ubuntu.com/security/CVE-2024-41017
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41017-jfs-don-t-walk-off-the-end-of-ealist.patch
- From: 5.15.0-125.135
- CVE-2024-41019
- Description:
fs/ntfs3: Validate ff offset
- CVE: https://ubuntu.com/security/CVE-2024-41019
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41019-fs-ntfs3-validate-ff-offset.patch
- From: 5.15.0-125.135
- CVE-2024-41020
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://ubuntu.com/security/CVE-2024-41020
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41020-filelock-Remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 5.15.0-125.135
- CVE-2024-41022
- Description:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
- CVE: https://ubuntu.com/security/CVE-2024-41022
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41022-drm-amdgpu-fix-signedness-bug-in-sdma-v4-0-process-trap-irq.patch
- From: 5.15.0-125.135
- CVE-2024-41042
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://ubuntu.com/security/CVE-2024-41042
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41042-netfilter-nf-tables-prefer-nft-chain-validate.patch
- From: 5.15.0-125.135
- CVE-2024-41060
- Description:
drm/radeon: check bo_va->bo is non-NULL before using it
- CVE: https://ubuntu.com/security/CVE-2024-41060
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41060-drm-radeon-check-bo-va-bo-is-non-null-before-using-it.patch
- From: 5.15.0-125.135
- CVE-2024-41063
- Description:
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
- CVE: https://ubuntu.com/security/CVE-2024-41063
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41063-bluetooth-hci-core-cancel-all-works-upon-hci-unregister-dev.patch
- From: 5.15.0-125.135
- CVE-2024-41064
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41064.patch
- From:
- CVE-2024-41065
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41065.patch
- From:
- CVE-2024-41068
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-41068.patch
- From:
- CVE-2024-41072
- Description:
wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
- CVE: https://ubuntu.com/security/CVE-2024-41072
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41072-wifi-cfg80211-wext-add-extra-siocsiwscan-data-check.patch
- From: 5.15.0-125.135
- CVE-2024-41077
- Description:
null_blk: fix validation of block size
- CVE: https://ubuntu.com/security/CVE-2024-41077
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41077-null-blk-fix-validation-of-block-size.patch
- From: 5.15.0-125.135
- CVE-2024-41078
- Description:
btrfs: qgroup: fix quota root leak after quota disable failure
- CVE: https://ubuntu.com/security/CVE-2024-41078
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41078-btrfs-qgroup-fix-quota-root-leak-after-quota-disable-failure.patch
- From: 5.15.0-125.135
- CVE-2024-41081
- Description:
ila: block BH in ila_output()
- CVE: https://ubuntu.com/security/CVE-2024-41081
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41081-ila-block-bh-in-ila-output.patch
- From: 5.15.0-125.135
- CVE-2024-41098
- Description:
ata: libata-core: Fix null pointer dereference on error
- CVE: https://ubuntu.com/security/CVE-2024-41098
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41098-ata-libata-core-fix-null-pointer-dereference-on-error.patch
- From: 5.15.0-125.135
- CVE-2024-42114
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
- CVE: https://ubuntu.com/security/CVE-2024-42114
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values.patch
- From: 5.15.0-125.135
- CVE-2024-42114
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-42114
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42246
- Description:
net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
- CVE: https://ubuntu.com/security/CVE-2024-42246
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42246-net-sunrpc-remap-eperm-in-case-of-connection-failure-in-xs-tcp-setup-socket.patch
- From: 5.15.0-125.135
- CVE-2024-42126
- Description:
powerpc arch not supported.
- CVE:
- Patch: skipped/CVE-2024-42126.patch
- From:
- CVE-2024-42259
- Description:
drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
- CVE: https://ubuntu.com/security/CVE-2024-42259
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42259-drm-i915-gem-fix-virtual-memory-mapping-boundaries-calculation.patch
- From: 5.15.0-125.135
- CVE-2024-43839
- Description:
bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
- CVE: https://ubuntu.com/security/CVE-2024-43839
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43839-bna-adjust-name-buf-size-of-bna-tcb-and-bna-ccb-structures.patch
- From: 5.15.0-125.135
- CVE-2024-46782
- Description:
ila: call nf_unregister_net_hooks() sooner
- CVE: https://ubuntu.com/security/CVE-2024-46782
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46782-ila-call-nf_unregister_net_hooks-sooner-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-42265
- Description:
protect the fetch of ->fd[fd] in do_dup2() from mispredictions
- CVE: https://ubuntu.com/security/CVE-2024-42265
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42265-protect-the-fetch-of-fd-fd-in-do-dup2-from-mispredictions.patch
- From: 5.15.0-125.135
- CVE-2024-42267
- Description:
RISCV arch not supported.
- CVE:
- Patch: skipped/CVE-2024-42267.patch
- From:
- CVE-2024-42269
- Description:
netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init().
- CVE: https://ubuntu.com/security/CVE-2024-42269
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42269-netfilter-iptables-fix-potential-null-ptr-deref-in-ip6table-nat-table-init.patch
- From: 5.15.0-125.135
- CVE-2024-42270
- Description:
netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init().
- CVE: https://ubuntu.com/security/CVE-2024-42270
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42270-netfilter-iptables-fix-null-ptr-deref-in-iptable-nat-table-init.patch
- From: 5.15.0-125.135
- CVE-2024-42277
- Description:
iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en
- CVE: https://ubuntu.com/security/CVE-2024-42277
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42277-iommu-sprd-avoid-null-deref-in-sprd-iommu-hw-en.patch
- From: 5.15.0-125.135
- CVE-2024-42281
- Description:
bpf: Fix a segment issue when downgrading gso_size
- CVE: https://ubuntu.com/security/CVE-2024-42281
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42281-bpf-fix-a-segment-issue-when-downgrading-gso-size.patch
- From: 5.15.0-125.135
- CVE-2024-42283
- Description:
net: nexthop: Initialize all fields in dumped nexthops
- CVE: https://ubuntu.com/security/CVE-2024-42283
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42283-net-nexthop-initialize-all-fields-in-dumped-nexthops.patch
- From: 5.15.0-125.135
- CVE-2024-42296
- Description:
f2fs: fix return value of f2fs_convert_inline_inode()
- CVE: https://ubuntu.com/security/CVE-2024-42296
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42296-f2fs-fix-return-value-of-f2fs-convert-inline-inode.patch
- From: 5.15.0-125.135
- CVE-2024-42287
- Description:
scsi: qla2xxx: Complete command early within lock
- CVE: https://ubuntu.com/security/CVE-2024-42287
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42287-scsi-qla2xxx-complete-command-early-within-lock.patch
- From: 5.15.0-125.135
- CVE-2024-46771
- Description:
can: bcm: Remove proc entry when dev is unregistered.
- CVE: https://ubuntu.com/security/CVE-2024-46771
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46771-can-bcm-remove-proc-entry-when-dev-is-unregistered.patch
- From: 5.15.0-125.135
- CVE-2024-42297
- Description:
f2fs: fix to don't dirty inode for readonly filesystem
- CVE: https://ubuntu.com/security/CVE-2024-42297
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42297-f2fs-fix-to-don-t-dirty-inode-for-readonly-filesystem.patch
- From: 5.15.0-125.135
- CVE-2024-42299
- Description:
fs/ntfs3: Update log->page_{mask,bits} if log->page_size changed
- CVE: https://ubuntu.com/security/CVE-2024-42299
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42299-fs-ntfs3-update-log-page-mask-bits-if-log-page-size-changed.patch
- From: 5.15.0-125.135
- CVE-2024-42292
- Description:
kobject_uevent: Fix OOB access within zap_modalias_env()
- CVE: https://ubuntu.com/security/CVE-2024-42292
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42292-kobject-uevent-fix-oob-access-within-zap-modalias-env.patch
- From: 5.15.0-125.135
- CVE-2024-42288
- Description:
scsi: qla2xxx: Fix for possible memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-42288
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42288-scsi-qla2xxx-fix-for-possible-memory-corruption.patch
- From: 5.15.0-125.135
- CVE-2024-42286
- Description:
scsi: qla2xxx: validate nvme_local_port correctly
- CVE: https://ubuntu.com/security/CVE-2024-42286
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42286-scsi-qla2xxx-validate-nvme-local-port-correctly.patch
- From: 5.15.0-125.135
- CVE-2024-42295
- Description:
nilfs2: handle inconsistent state in nilfs_btnode_create_block()
- CVE: https://ubuntu.com/security/CVE-2024-42295
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42295-nilfs2-handle-inconsistent-state-in-nilfs-btnode-create-block.patch
- From: 5.15.0-125.135
- CVE-2024-46804
- Description:
drm/amd/display: Add array index check for hdcp ddc access
- CVE: https://ubuntu.com/security/CVE-2024-46804
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46804-drm-amd-display-add-array-index-check-for-hdcp-ddc-access-5.15.0-119.129.patch
- From: 5.15.0-125.135
- CVE-2024-46818
- Description:
drm/amd/display: Check gpio_id before used as array index
- CVE: https://ubuntu.com/security/CVE-2024-46818
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46818-drm-amd-display-check-gpio-id-before-used-as-array-index.patch
- From: 5.15.0-125.135
- CVE-2024-46814
- Description:
drm/amd/display: Check msg_id before processing transcation
- CVE: https://ubuntu.com/security/CVE-2024-46814
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46814-drm-amd-display-check-msg-id-before-processing-transcation.patch
- From: 5.15.0-125.135
- CVE-2024-46800
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://ubuntu.com/security/CVE-2024-46800
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.15.0-125.135
- CVE-2024-46798
- Description:
ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://ubuntu.com/security/CVE-2024-46798
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46798-asoc-dapm-fix-uaf-for-snd-soc-pcm-runtime-object.patch
- From: 5.15.0-125.135
- CVE-2024-46759
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46759
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2024-46758
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46758
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2024-46757
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46757
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2024-46756
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46756
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2023-52889
- Description:
apparmor: Fix null pointer deref when receiving skb during sock creation
- CVE: https://ubuntu.com/security/CVE-2023-52889
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2023-52889-apparmor-fix-null-pointer-deref-when-receiving-skb-during-sock-creation.patch
- From: 5.15.0-125.135
- CVE-2023-52918
- Description:
media: pci: cx23885: check cx23885_vdev_init() return
- CVE: https://ubuntu.com/security/CVE-2023-52918
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2023-52918-media-pci-cx23885-check-cx23885-vdev-init-return.patch
- From: 5.15.0-125.135
- CVE-2024-26661
- Description:
drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'
- CVE: https://ubuntu.com/security/CVE-2024-26661
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26661-drm-amd-display-Add-NULL-test-for-timing-generator-i.patch
- From: 5.15.0-125.135
- CVE-2024-38611
- Description:
media: i2c: et8ek8: Don't strip remove function when driver is builtin
- CVE: https://ubuntu.com/security/CVE-2024-38611
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-38611-media-i2c-et8ek8-don-t-strip-remove-function-when-driver-is-builtin.patch
- From: 5.15.0-125.135
- CVE-2024-39472
- Description:
xfs: fix log recovery buffer allocation for the legacy h_size fixup
- CVE: https://ubuntu.com/security/CVE-2024-39472
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-39472-xfs-fix-log-recovery-buffer-allocation-for-the-legacy-h-size-fixup.patch
- From: 5.15.0-125.135
- CVE-2024-41012
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://ubuntu.com/security/CVE-2024-41012
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41012-filelock-remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 5.15.0-125.135
- CVE-2024-42289
- Description:
scsi: qla2xxx: During vport delete send async logout explicitly
- CVE: https://ubuntu.com/security/CVE-2024-42289
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42289-scsi-qla2xxx-during-vport-delete-send-async-logout-explicitly.patch
- From: 5.15.0-125.135
- CVE-2024-42304
- Description:
ext4: make sure the first directory block is not a hole
- CVE: https://ubuntu.com/security/CVE-2024-42304
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42304-ext4-make-sure-the-first-directory-block-is-not-a-hole.patch
- From: 5.15.0-125.135
- CVE-2024-42305
- Description:
ext4: check dot and dotdot of dx_root before making dir indexed
- CVE: https://ubuntu.com/security/CVE-2024-42305
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42305-ext4-check-dot-and-dotdot-of-dx-root-before-making-dir-indexed.patch
- From: 5.15.0-125.135
- CVE-2024-42306
- Description:
udf: Avoid using corrupted block bitmap buffer
- CVE: https://ubuntu.com/security/CVE-2024-42306
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42306-udf-avoid-using-corrupted-block-bitmap-buffer.patch
- From: 5.15.0-125.135
- CVE-2024-42309
- Description:
drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes
- CVE: https://ubuntu.com/security/CVE-2024-42309
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42309-drm-gma500-fix-null-pointer-dereference-in-psb-intel-lvds-get-modes.patch
- From: 5.15.0-125.135
- CVE-2024-42310
- Description:
drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes
- CVE: https://ubuntu.com/security/CVE-2024-42310
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42310-drm-gma500-fix-null-pointer-dereference-in-cdv-intel-lvds-get-modes.patch
- From: 5.15.0-125.135
- CVE-2024-42311
- Description:
hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
- CVE: https://ubuntu.com/security/CVE-2024-42311
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42311-hfs-fix-to-initialize-fields-of-hfs-inode-info-after-hfs-alloc-inode.patch
- From: 5.15.0-125.135
- CVE-2024-42312
- Description:
sysctl: always initialize i_uid/i_gid
- CVE: https://ubuntu.com/security/CVE-2024-42312
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42312-sysctl-always-initialize-i-uid-i-gid.patch
- From: 5.15.0-125.135
- CVE-2024-43828
- Description:
ext4: fix infinite loop when replaying fast_commit
- CVE: https://ubuntu.com/security/CVE-2024-43828
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43828-ext4-fix-infinite-loop-when-replaying-fast-commit.patch
- From: 5.15.0-125.135
- CVE-2024-43854
- Description:
block: initialize integrity buffer to zero before writing it to media
- CVE: https://ubuntu.com/security/CVE-2024-43854
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch
- From: 5.15.0-125.135
- CVE-2024-43849
- Description:
soc: qcom: pdr: protect locator_addr with the main mutex
- CVE: https://ubuntu.com/security/CVE-2024-43849
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43849-soc-qcom-pdr-protect-locator-addr-with-the-main-mutex.patch
- From: 5.15.0-125.135
- CVE-2024-43846
- Description:
lib: objagg: Fix general protection fault
- CVE: https://ubuntu.com/security/CVE-2024-43846
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43846-lib-objagg-fix-general-protection-fault.patch
- From: 5.15.0-125.135
- CVE-2024-43834
- Description:
xdp: fix invalid wait context of page_pool_destroy()
- CVE: https://ubuntu.com/security/CVE-2024-43834
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43834-xdp-fix-invalid-wait-context-of-page-pool-destroy.patch
- From: 5.15.0-125.135
- CVE-2024-43830
- Description:
leds: trigger: Unregister sysfs attributes before calling deactivate()
- CVE: https://ubuntu.com/security/CVE-2024-43830
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43830-leds-trigger-unregister-sysfs-attributes-before-calling-deactivate.patch
- From: 5.15.0-125.135
- CVE-2024-43829
- Description:
drm/qxl: Add check for drm_cvt_mode
- CVE: https://ubuntu.com/security/CVE-2024-43829
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43829-drm-qxl-add-check-for-drm-cvt-mode.patch
- From: 5.15.0-125.135
- CVE-2024-43856
- Description:
dma: fix call order in dmam_free_coherent
- CVE: https://ubuntu.com/security/CVE-2024-43856
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43856-dma-fix-call-order-in-dmam-free-coherent.patch
- From: 5.15.0-125.135
- CVE-2024-43853
- Description:
cgroup/cpuset: Prevent UAF in proc_cpuset_show()
- CVE: https://ubuntu.com/security/CVE-2024-43853
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43853-cgroup-cpuset-prevent-uaf-in-proc-cpuset-show.patch
- From: 5.15.0-125.135
- CVE-2024-43835
- Description:
virtio_net: Fix napi_skb_cache_put warning
- CVE: https://ubuntu.com/security/CVE-2024-43835
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43835-virtio-net-fix-napi-skb-cache-put-warning.patch
- From: 5.15.0-125.135
- CVE-2024-43883
- Description:
usb: vhci-hcd: Do not drop references before new references are gained
- CVE: https://ubuntu.com/security/CVE-2024-43883
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43883-usb-vhci-hcd-do-not-drop-references-before-new-references-are-gained.patch
- From: 5.15.0-125.135
- CVE-2024-43884
- Description:
Bluetooth: MGMT: Add error handling to pair_device()
- CVE: https://ubuntu.com/security/CVE-2024-43884
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43884-bluetooth-mgmt-add-error-handling-to-pair-device.patch
- From: 5.15.0-125.135
- CVE-2024-43889
- Description:
Out of scope: This CVE modified the __init function which won't be available to patch as it is used during bootup time.
- CVE:
- Patch: skipped/CVE-2024-43889.patch
- From:
- CVE-2024-43893
- Description:
serial: core: check uartclk for zero to avoid divide by zero
- CVE: https://ubuntu.com/security/CVE-2024-43893
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43893-serial-core-check-uartclk-for-zero-to-avoid-divide-by-zero.patch
- From: 5.15.0-125.135
- CVE-2024-43894
- Description:
drm/client: fix null pointer dereference in drm_client_modeset_probe
- CVE: https://ubuntu.com/security/CVE-2024-43894
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43894-drm-client-fix-null-pointer-dereference-in-drm-client-modeset-probe.patch
- From: 5.15.0-125.135
- CVE-2024-43902
- Description:
drm/amd/display: Add null checker before passing variables
- CVE: https://ubuntu.com/security/CVE-2024-43902
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43902-drm-amd-display-add-null-checker-before-passing-variables.patch
- From: 5.15.0-125.135
- CVE-2024-43905
- Description:
drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr
- CVE: https://ubuntu.com/security/CVE-2024-43905
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43905-drm-amd-pm-fix-the-null-pointer-dereference-for-vega10-hwmgr.patch
- From: 5.15.0-125.135
- CVE-2024-43907
- Description:
drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules
- CVE: https://ubuntu.com/security/CVE-2024-43907
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43907-drm-amdgpu-pm-fix-the-null-pointer-dereference-in-apply-state-adjust-rules.patch
- From: 5.15.0-125.135
- CVE-2024-44944
- Description:
netfilter: ctnetlink: use helper function to calculate expect ID
- CVE: https://ubuntu.com/security/CVE-2024-44944
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44944-netfilter-ctnetlink-use-helper-function-to-calculate-expect-id.patch
- From: 5.15.0-125.135
- CVE-2024-43914
- Description:
md/raid5: avoid BUG_ON() while continue reshape after reassembling
- CVE: https://ubuntu.com/security/CVE-2024-43914
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43914-md-raid5-avoid-bug-on-while-continue-reshape-after-reassembling.patch
- From: 5.15.0-125.135
- CVE-2024-43909
- Description:
drm/amdgpu/pm: Fix the null pointer dereference for smu7
- CVE: https://ubuntu.com/security/CVE-2024-43909
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43909-drm-amdgpu-pm-fix-the-null-pointer-dereference-for-smu7-101.patch
- From: 5.15.0-125.135
- CVE-2024-43908
- Description:
drm/amdgpu: Fix the null pointer dereference to ras_manager
- CVE: https://ubuntu.com/security/CVE-2024-43908
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43908-drm-amdgpu-fix-the-null-pointer-dereference-to-ras-manager.patch
- From: 5.15.0-125.135
- CVE-2024-44954
- Description:
ALSA: line6: Fix racy access to midibuf
- CVE: https://ubuntu.com/security/CVE-2024-44954
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44954-alsa-line6-fix-racy-access-to-midibuf.patch
- From: 5.15.0-125.135
- CVE-2024-44952
- Description:
Patch introduced a deadlock and was reverted.
- CVE:
- Patch: skipped/CVE-2024-44952.patch
- From:
- CVE-2024-44948
- Description:
x86/mtrr: Check if fixed MTRRs exist before saving them
- CVE: https://ubuntu.com/security/CVE-2024-44948
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44948-x86-mtrr-check-if-fixed-mtrrs-exist-before-saving-them.patch
- From: 5.15.0-125.135
- CVE-2024-44947
- Description:
fuse: Initialize beyond-EOF page contents before setting uptodate
- CVE: https://ubuntu.com/security/CVE-2024-44947
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44947-fuse-initialize-beyond-eof-page-contents-before-setting-uptodate.patch
- From: 5.15.0-125.135
- CVE-2024-44935
- Description:
sctp: Fix null-ptr-deref in reuseport_add_sock().
- CVE: https://ubuntu.com/security/CVE-2024-44935
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44935-sctp-fix-null-ptr-deref-in-reuseport-add-sock.patch
- From: 5.15.0-125.135
- CVE-2024-43860
- Description:
remoteproc: imx_rproc: Skip over memory region when node value is NULL
- CVE: https://ubuntu.com/security/CVE-2024-43860
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43860-remoteproc-imx-rproc-skip-over-memory-region-when-node-value-is-null.patch
- From: 5.15.0-125.135
- CVE-2024-43861
- Description:
net: usb: qmi_wwan: fix memory leak for not ip packets
- CVE: https://ubuntu.com/security/CVE-2024-43861
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43861-net-usb-qmi-wwan-fix-memory-leak-for-not-ip-packets.patch
- From: 5.15.0-125.135
- CVE-2024-43863
- Description:
drm/vmwgfx: Fix a deadlock in dma buf fence polling
- CVE: https://ubuntu.com/security/CVE-2024-43863
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43863-drm-vmwgfx-fix-a-deadlock-in-dma-buf-fence-polling.patch
- From: 5.15.0-125.135
- CVE-2024-43863
- Description:
drm/vmwgfx: Fix a deadlock in dma buf fence polling kpatch
- CVE: https://ubuntu.com/security/CVE-2024-43863
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43863-drm-vmwgfx-fix-a-deadlock-in-dma-buf-fence-polling-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-43867
- Description:
drm/nouveau: prime: fix refcount underflow
- CVE: https://ubuntu.com/security/CVE-2024-43867
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43867-drm-nouveau-prime-fix-refcount-underflow.patch
- From: 5.15.0-125.135
- CVE-2024-43869
- Description:
The patch for CVE-2025-37747 reverts the patch for this CVE.
- CVE:
- Patch: skipped/CVE-2024-43869.patch
- From:
- CVE-2024-43870
- Description:
perf: Fix event leak upon exit
- CVE: https://ubuntu.com/security/CVE-2024-43870
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43870-perf-fix-event-leak-upon-exit.patch
- From: 5.15.0-125.135
- CVE-2024-43871
- Description:
devres: Fix memory leakage caused by driver API devm_free_percpu()
- CVE: https://ubuntu.com/security/CVE-2024-43871
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43871-devres-fix-memory-leakage-caused-by-driver-api-devm-free-percpu.patch
- From: 5.15.0-125.135
- CVE-2024-43879
- Description:
wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()
- CVE: https://ubuntu.com/security/CVE-2024-43879
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43879-wifi-cfg80211-handle-2x996-ru-allocation-in-cfg80211-calculate-bitrate-he.patch
- From: 5.15.0-125.135
- CVE-2024-43880
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning
- CVE: https://ubuntu.com/security/CVE-2024-43880
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43880-mlxsw-spectrum-acl-erp-fix-object-nesting-warning.patch
- From: 5.15.0-125.135
- CVE-2024-43880
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning kpatch
- CVE: https://ubuntu.com/security/CVE-2024-43880
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43880-mlxsw-spectrum-acl-erp-fix-object-nesting-warning-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-46675
- Description:
usb: dwc3: core: Prevent USB core invalid event buffer address access
- CVE: https://ubuntu.com/security/CVE-2024-46675
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46675-usb-dwc3-core-prevent-usb-core-invalid-event-buffer-address-access.patch
- From: 5.15.0-125.135
- CVE-2024-46702
- Description:
thunderbolt: Mark XDomain as unplugged when router is removed
- CVE: https://ubuntu.com/security/CVE-2024-46702
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46702-thunderbolt-mark-xdomain-as-unplugged-when-router-is-removed.patch
- From: 5.15.0-125.135
- CVE-2024-45028
- Description:
mmc: mmc_test: Fix NULL dereference on allocation failure
- CVE: https://ubuntu.com/security/CVE-2024-45028
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-45028-mmc-mmc-test-fix-null-dereference-on-allocation-failure.patch
- From: 5.15.0-125.135
- CVE-2024-46685
- Description:
pinctrl: single: fix potential NULL dereference in pcs_get_function()
- CVE: https://ubuntu.com/security/CVE-2024-46685
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46685-pinctrl-single-fix-potential-null-dereference-in-pcs-get-function.patch
- From: 5.15.0-125.135
- CVE-2024-46679
- Description:
ethtool: check device is present when getting link settings
- CVE: https://ubuntu.com/security/CVE-2024-46679
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46679-ethtool-check-device-is-present-when-getting-link-settings.patch
- From: 5.15.0-125.135
- CVE-2024-46677
- Description:
gtp: fix a potential NULL pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-46677
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46677-gtp-fix-a-potential-null-pointer-dereference.patch
- From: 5.15.0-125.135
- CVE-2024-46676
- Description:
nfc: pn533: Add poll mod list filling check
- CVE: https://ubuntu.com/security/CVE-2024-46676
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46676-nfc-pn533-add-poll-mod-list-filling-check.patch
- From: 5.15.0-125.135
- CVE-2024-46689
- Description:
soc: qcom: cmd-db: Map shared memory as WC, not WB
- CVE: https://ubuntu.com/security/CVE-2024-46689
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46689-soc-qcom-cmd-db-map-shared-memory-as-wc-not-wb.patch
- From: 5.15.0-125.135
- CVE-2024-44960
- Description:
usb: gadget: core: Check for unset descriptor
- CVE: https://ubuntu.com/security/CVE-2024-44960
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44960-usb-gadget-core-check-for-unset-descriptor.patch
- From: 5.15.0-125.135
- CVE-2024-44965
- Description:
x86/mm: Fix pti_clone_pgtable() alignment assumption
- CVE: https://ubuntu.com/security/CVE-2024-44965
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44965-x86-mm-fix-pti-clone-pgtable-alignment-assumption.patch
- From: 5.15.0-125.135
- CVE-2024-44966
- Description:
binfmt_flat: Fix corruption when not offsetting data start
- CVE: https://ubuntu.com/security/CVE-2024-44966
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44966-binfmt-flat-fix-corruption-when-not-offsetting-data-start.patch
- From: 5.15.0-125.135
- CVE-2024-44969
- Description:
s390 arch not supported.
- CVE:
- Patch: skipped/CVE-2024-44969.patch
- From:
- CVE-2024-44971
- Description:
net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register()
- CVE: https://ubuntu.com/security/CVE-2024-44971
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44971-net-dsa-bcm-sf2-fix-a-possible-memory-leak-in-bcm-sf2-mdio-register.patch
- From: 5.15.0-125.135
- CVE-2024-44982
- Description:
drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails
- CVE: https://ubuntu.com/security/CVE-2024-44982
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44982-drm-msm-dpu-cleanup-fb-if-dpu-format-populate-layout-fails.patch
- From: 5.15.0-125.135
- CVE-2024-44988
- Description:
net: dsa: mv88e6xxx: Fix out-of-bound access
- CVE: https://ubuntu.com/security/CVE-2024-44988
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44988-net-dsa-mv88e6xxx-fix-out-of-bound-access.patch
- From: 5.15.0-125.135
- CVE-2024-44989
- Description:
bonding: fix xfrm real_dev null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-44989
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44989-bonding-fix-xfrm-real-dev-null-pointer-dereference.patch
- From: 5.15.0-125.135
- CVE-2024-44990
- Description:
bonding: fix null pointer deref in bond_ipsec_offload_ok
- CVE: https://ubuntu.com/security/CVE-2024-44990
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44990-bonding-fix-null-pointer-deref-in-bond-ipsec-offload-ok.patch
- From: 5.15.0-125.135
- CVE-2024-45006
- Description:
xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
- CVE: https://ubuntu.com/security/CVE-2024-45006
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-45006-xhci-fix-panther-point-null-pointer-deref-at-full-speed-re-enumeration.patch
- From: 5.15.0-125.135
- CVE-2024-45003
- Description:
vfs: Don't evict inode under the inode lru traversing context
- CVE: https://ubuntu.com/security/CVE-2024-45003
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-45003-vfs-don-t-evict-inode-under-the-inode-lru-traversing-context.patch
- From: 5.15.0-125.135
- CVE-2024-45025
- Description:
fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE
- CVE: https://ubuntu.com/security/CVE-2024-45025
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-45025-fix-bitmap-corruption-on-close-range-with-close-range-unshare.patch
- From: 5.15.0-125.135
- CVE-2024-45021
- Description:
memcg_write_event_control(): fix a user-triggerable oops
- CVE: https://ubuntu.com/security/CVE-2024-45021
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-45021-memcg-write-event-control-fix-a-user-triggerable-oops.patch
- From: 5.15.0-125.135
- CVE-2024-45018
- Description:
netfilter: flowtable: initialise extack before use
- CVE: https://ubuntu.com/security/CVE-2024-45018
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-45018-netfilter-flowtable-initialise-extack-before-use.patch
- From: 5.15.0-125.135
- CVE-2024-44995
- Description:
net: hns3: fix a deadlock problem when config TC during resetting
- CVE: https://ubuntu.com/security/CVE-2024-44995
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44995-net-hns3-fix-a-deadlock-problem-when-config-tc-during-resetting.patch
- From: 5.15.0-125.135
- CVE-2024-45008
- Description:
Input: MT - limit max slots
- CVE: https://ubuntu.com/security/CVE-2024-45008
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-45008-input-mt-limit-max-slots.patch
- From: 5.15.0-125.135
- CVE-2024-46714
- Description:
drm/amd/display: Skip wbscl_set_scaler_filter if filter is null
- CVE: https://ubuntu.com/security/CVE-2024-46714
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46714-drm-amd-display-skip-wbscl-set-scaler-filter-if-filter-is-null.patch
- From: 5.15.0-125.135
- CVE-2024-46719
- Description:
usb: typec: ucsi: Fix null pointer dereference in trace
- CVE: https://ubuntu.com/security/CVE-2024-46719
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46719-usb-typec-ucsi-fix-null-pointer-dereference-in-trace.patch
- From: 5.15.0-125.135
- CVE-2024-46721
- Description:
apparmor: fix possible NULL pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-46721
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46721-apparmor-fix-possible-null-pointer-dereference.patch
- From: 5.15.0-125.135
- CVE-2024-46732
- Description:
drm/amd/display: Assign linear_pitch_alignment even for VM
- CVE: https://ubuntu.com/security/CVE-2024-46732
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46732-drm-amd-display-assign-linear-pitch-alignment-even-for-vm.patch
- From: 5.15.0-125.135
- CVE-2024-46737
- Description:
nvmet-tcp: fix kernel crash if commands allocation fails
- CVE: https://ubuntu.com/security/CVE-2024-46737
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46737-nvmet-tcp-fix-kernel-crash-if-commands-allocation-fails.patch
- From: 5.15.0-125.135
- CVE-2024-46739
- Description:
uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind
- CVE: https://ubuntu.com/security/CVE-2024-46739
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46739-uio-hv-generic-fix-kernel-null-pointer-dereference-in-hv-uio-rescind.patch
- From: 5.15.0-125.135
- CVE-2024-46745
- Description:
Input: uinput - reject requests with unreasonable number of slots
- CVE: https://ubuntu.com/security/CVE-2024-46745
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46745-input-uinput-reject-requests-with-unreasonable-number-of-slots.patch
- From: 5.15.0-125.135
- CVE-2024-46750
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-46750.patch
- From:
- CVE-2024-46752
- Description:
btrfs: replace BUG_ON() with error handling at update_ref_for_cow()
- CVE: https://ubuntu.com/security/CVE-2024-46752
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46752-btrfs-replace-bug-on-with-error-handling-at-update-ref-for-cow.patch
- From: 5.15.0-125.135
- CVE-2024-46755
- Description:
wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()
- CVE: https://ubuntu.com/security/CVE-2024-46755
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46755-wifi-mwifiex-do-not-return-unused-priv-in-mwifiex-get-priv-by-id.patch
- From: 5.15.0-125.135
- CVE-2024-46817
- Description:
drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6
- CVE: https://ubuntu.com/security/CVE-2024-46817
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46817-drm-amd-display-stop-amdgpu-dm-initialize-when-stream-nums-greater-than-6.patch
- From: 5.15.0-125.135
- CVE-2024-46815
- Description:
drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]
- CVE: https://ubuntu.com/security/CVE-2024-46815
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46815-drm-amd-display-check-num-valid-sets-before-accessing-reader-wm-sets.patch
- From: 5.15.0-125.135
- CVE-2024-46807
- Description:
drm/amd/amdgpu: Check tbo resource pointer
- CVE: https://ubuntu.com/security/CVE-2024-46807
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46807-drm-amd-amdgpu-check-tbo-resource-pointer.patch
- From: 5.15.0-125.135
- CVE-2024-46819
- Description:
drm/amdgpu: the warning dereferencing obj for nbio_v7_4
- CVE: https://ubuntu.com/security/CVE-2024-46819
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46819-drm-amdgpu-the-warning-dereferencing-obj-for-nbio-v7-4.patch
- From: 5.15.0-125.135
- CVE-2024-46810
- Description:
drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ
- CVE: https://ubuntu.com/security/CVE-2024-46810
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46810-drm-bridge-tc358767-check-if-fully-initialized-before-signalling-hpd-event-via-irq.patch
- From: 5.15.0-125.135
- CVE-2024-46822
- Description:
arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry
- CVE: https://ubuntu.com/security/CVE-2024-46822
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46822-arm64-acpi-harden-get-cpu-for-acpi-id-against-missing-cpu-entry.patch
- From: 5.15.0-125.135
- CVE-2024-46829
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2024-46829.patch
- From:
- CVE-2024-46828
- Description:
sched: sch_cake: fix bulk flow accounting logic for host fairness
- CVE: https://ubuntu.com/security/CVE-2024-46828
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46828-sched-sch-cake-fix-bulk-flow-accounting-logic-for-host-fairness.patch
- From: 5.15.0-125.135
- CVE-2024-46832
- Description:
Out of scope: MIPS architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-46832.patch
- From:
- CVE-2024-46840
- Description:
btrfs: clean up our handling of refs == 0 in snapshot delete
- CVE: https://ubuntu.com/security/CVE-2024-46840
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46840-btrfs-clean-up-our-handling-of-refs-0-in-snapshot-delete.patch
- From: 5.15.0-125.135
- CVE-2024-47660
- Description:
fsnotify: clear PARENT_WATCHED flags lazily
- CVE: https://ubuntu.com/security/CVE-2024-47660
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-47660-fsnotify-clear-parent-watched-flags-lazily-5.15.0-113.123.patch
- From: 5.15.0-125.135
- CVE-2024-47663
- Description:
staging: iio: frequency: ad9834: Validate frequency parameter value
- CVE: https://ubuntu.com/security/CVE-2024-47663
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-47663-staging-iio-frequency-ad9834-validate-frequency-parameter-value.patch
- From: 5.15.0-125.135
- CVE-2024-47665
- Description:
i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup
- CVE: https://ubuntu.com/security/CVE-2024-47665
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-47665-i3c-mipi-i3c-hci-error-out-instead-on-bug-on-in-ibi-dma-setup.patch
- From: 5.15.0-125.135
- CVE-2024-47667
- Description:
PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)
- CVE: https://ubuntu.com/security/CVE-2024-47667
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-47667-pci-keystone-add-workaround-for-errata-i2037-am65x-sr-1-0.patch
- From: 5.15.0-125.135
- CVE-2024-47668
- Description:
lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
- CVE: https://ubuntu.com/security/CVE-2024-47668
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-47668-lib-generic-radix-tree-c-fix-rare-race-in-genradix-ptr-alloc.patch
- From: 5.15.0-125.135
- CVE-2024-47669
- Description:
nilfs2: fix state management in error path of log writing function
- CVE: https://ubuntu.com/security/CVE-2024-47669
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-47669-nilfs2-fix-state-management-in-error-path-of-log-writing-function.patch
- From: 5.15.0-125.135
- CVE-2024-26607
- Description:
drm/bridge: sii902x: Fix probing race issue
- CVE: https://ubuntu.com/security/CVE-2024-26607
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26607-drm-bridge-sii902x-fix-probing-race-issue.patch
- From: 5.4.0-200.220
- CVE-2024-26893
- Description:
firmware: arm_scmi: Fix double free in SMC transport cleanup path
- CVE: https://ubuntu.com/security/CVE-2024-26893
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26893-firmware-arm-scmi-fix-double-free-in-smc-transport-cleanup-path.patch
- From: 5.15.0-125.135
- CVE-2024-46805
- Description:
drm/amdgpu: fix the waring dereferencing hive
- CVE: https://ubuntu.com/security/CVE-2024-46805
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46805-drm-amdgpu-fix-the-waring-dereferencing-hive.patch
- From: 5.15.0-125.135
- CVE-2024-46791
- Description:
can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open
- CVE: https://ubuntu.com/security/CVE-2024-46791
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46791-can-mcp251x-fix-deadlock-if-an-interrupt-occurs-during-mcp251x-open.patch
- From: 5.15.0-125.135
- CVE-2024-46781
- Description:
nilfs2: fix missing cleanup on rollforward recovery error
- CVE: https://ubuntu.com/security/CVE-2024-46781
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46781-nilfs2-fix-missing-cleanup-on-rollforward-recovery-error.patch
- From: 5.15.0-125.135
- CVE-2024-46777
- Description:
udf: Avoid excessive partition lengths
- CVE: https://ubuntu.com/security/CVE-2024-46777
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46777-udf-avoid-excessive-partition-lengths.patch
- From: 5.15.0-125.135
- CVE-2024-46783
- Description:
tcp_bpf: fix return value of tcp_bpf_sendmsg()
- CVE: https://ubuntu.com/security/CVE-2024-46783
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46783-tcp-bpf-fix-return-value-of-tcp-bpf-sendmsg.patch
- From: 5.15.0-125.135
- CVE-2024-46761
- Description:
pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv
- CVE: https://ubuntu.com/security/CVE-2024-46761
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46761-pci-hotplug-pnv-php-fix-hotplug-driver-crash-on-powernv.patch
- From: 5.15.0-125.135
- CVE-2024-46763
- Description:
fou: Fix null-ptr-deref in GRO.
- CVE: https://ubuntu.com/security/CVE-2024-46763
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46763-fou-fix-null-ptr-deref-in-gro.patch
- From: 5.15.0-125.135
- CVE-2024-46780
- Description:
nilfs2: protect references to superblock parameters exposed in sysfs
- CVE: https://ubuntu.com/security/CVE-2024-46780
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46780-nilfs2-replace-snprintf-in-show-functions-with-sysfs_emit.patch
- From: 5.15.0-125.135
- CVE-2024-46780
- Description:
nilfs2: protect references to superblock parameters exposed in sysfs
- CVE: https://ubuntu.com/security/CVE-2024-46780
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46780-nilfs2-protect-references-to-superblock-parameters-exposed-in-sysfs.patch
- From: 5.15.0-125.135
- CVE-2024-26800
- Description:
This CVE fixes CVE-2024-26584 that creates stack unsafety under network load
- CVE:
- Patch: skipped/CVE-2024-26800.patch
- From:
- CVE-2024-43841
- Description:
wifi: virt_wifi: don't use strlen() in const context
- CVE: https://ubuntu.com/security/CVE-2024-43841
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43841-wifi-virt_wifi-avoid-reporting-connection-success-with-wrong-SSID.patch
- From: 5.15.0-125.135
- CVE-2024-43841
- Description:
wifi: virt_wifi: don't use strlen() in const context
- CVE: https://ubuntu.com/security/CVE-2024-43841
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43841-wifi-virt_wifi-don-t-use-strlen-in-const-context.patch
- From: 5.15.0-125.135
- CVE-2024-43841
- Description:
wifi: virt_wifi: don't use strlen() in const context
- CVE: https://ubuntu.com/security/CVE-2024-43841
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43841-wifi-virt_wifi-avoid-reporting-connection-success-with-wrong-SSID-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-46795
- Description:
ksmbd: unset the binding mark of a reused connection
- CVE: https://ubuntu.com/security/CVE-2024-46795
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46795-ksmbd-unset-the-binding-mark-of-a-reused-connection.patch
- From: 5.15.0-125.135
- CVE-2024-44940
- Description:
fou: remove warn in gue_gro_receive on unsupported protocol
- CVE: https://ubuntu.com/security/CVE-2024-44940
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-44940-fou-remove-warn-in-gue-gro-receive-on-unsupported-protocol-5.15.0-124.134.patch
- From: 5.15.0-127.137
- CVE-2024-38667
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-38667.patch
- From:
- CVE-2024-44942
- Description:
f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC
- CVE: https://ubuntu.com/security/CVE-2024-44942
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-44942-f2fs-fix-to-do-sanity-check-on-f2fs-inline-data-flag-in-inode-during-gc.patch
- From: 5.15.0-127.137
- CVE-2024-46853
- Description:
spi: nxp-fspi: fix the KASAN report out-of-bounds bug
- CVE: https://ubuntu.com/security/CVE-2024-46853
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46853-spi-nxp-fspi-fix-the-kasan-report-out-of-bounds-bug.patch
- From: 5.15.0-127.137
- CVE-2024-46852
- Description:
dma-buf: heaps: Fix off-by-one in CMA heap fault handler
- CVE: https://ubuntu.com/security/CVE-2024-46852
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46852-dma-buf-heaps-fix-off-by-one-in-cma-heap-fault-handler.patch
- From: 5.15.0-127.137
- CVE-2024-46849
- Description:
ASoC: meson: axg-card: fix 'use-after-free'
- CVE: https://ubuntu.com/security/CVE-2024-46849
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46849-asoc-meson-axg-card-fix-use-after-free.patch
- From: 5.15.0-127.137
- CVE-2024-47685
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://ubuntu.com/security/CVE-2024-47685
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.15.0-127.137
- CVE-2024-39463
- Description:
9p: add missing locking around taking dentry fid list
- CVE: https://ubuntu.com/security/CVE-2024-39463
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-39463-9p-add-missing-locking-around-taking-dentry-fid-list.patch
- From: 5.15.0-127.137
- CVE-2024-49966
- Description:
ocfs2: cancel dqi_sync_work before freeing oinfo
- CVE: https://ubuntu.com/security/CVE-2024-49966
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49966-ocfs2-cancel-dqi-sync-work-before-freeing-oinfo.patch
- From: 5.15.0-127.137
- CVE-2024-49936
- Description:
net/xen-netback: prevent UAF in xenvif_flush_hash()
- CVE: https://ubuntu.com/security/CVE-2024-49936
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49936-net-xen-netback-prevent-uaf-in-xenvif-flush-hash.patch
- From: 5.15.0-127.137
- CVE-2024-49930
- Description:
wifi: ath11k: fix array out-of-bound access in SoC stats
- CVE: https://ubuntu.com/security/CVE-2024-49930
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49930-wifi-ath11k-fix-array-out-of-bound-access-in-soc-stats.patch
- From: 5.15.0-127.137
- CVE-2024-49924
- Description:
fbdev: pxafb: Fix possible use after free in pxafb_task()
- CVE: https://ubuntu.com/security/CVE-2024-49924
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49924-fbdev-pxafb-fix-possible-use-after-free-in-pxafb-task.patch
- From: 5.15.0-127.137
- CVE-2024-49895
- Description:
drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation
- CVE: https://ubuntu.com/security/CVE-2024-49895
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49895-drm-amd-display-fix-index-out-of-bounds-in-dcn30-degamma-hardware-format-translation.patch
- From: 5.15.0-127.137
- CVE-2024-49894
- Description:
drm/amd/display: Fix index out of bounds in degamma hardware format translation
- CVE: https://ubuntu.com/security/CVE-2024-49894
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49894-drm-amd-display-fix-index-out-of-bounds-in-degamma-hardware-format-translation.patch
- From: 5.15.0-127.137
- CVE-2024-49889
- Description:
ext4: avoid use-after-free in ext4_ext_show_leaf()
- CVE: https://ubuntu.com/security/CVE-2024-49889
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49889-ext4-avoid-use-after-free-in-ext4-ext-show-leaf.patch
- From: 5.15.0-127.137
- CVE-2024-49884
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://ubuntu.com/security/CVE-2024-49884
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49884-ext4-fix-slab-use-after-free-in-ext4-split-extent-at.patch
- From: 5.15.0-127.137
- CVE-2024-49883
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://ubuntu.com/security/CVE-2024-49883
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 5.15.0-127.137
- CVE-2024-49882
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://ubuntu.com/security/CVE-2024-49882
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path.patch
- From: 5.15.0-127.137
- CVE-2024-47670
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-47670
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.15.0-127.137
- CVE-2024-47718
- Description:
wifi: rtw88: always wait for both firmware loading attempts
- CVE: https://ubuntu.com/security/CVE-2024-47718
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47718-wifi-rtw88-always-wait-for-both-firmware-loading-attempts.patch
- From: 5.15.0-127.137
- CVE-2024-47701
- Description:
ext4: avoid OOB when system.data xattr changes underneath the filesystem
- CVE: https://ubuntu.com/security/CVE-2024-47701
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47701-ext4-avoid-oob-when-system-data-xattr-changes-underneath-the-filesystem.patch
- From: 5.15.0-127.137
- CVE-2024-47698
- Description:
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47698
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47698-drivers-media-dvb-frontends-rtl2832-fix-an-out-of-bounds-write-error.patch
- From: 5.15.0-127.137
- CVE-2024-47697
- Description:
drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
- CVE: https://ubuntu.com/security/CVE-2024-47697
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47697-drivers-media-dvb-frontends-rtl2830-fix-an-out-of-bounds-write-error.patch
- From: 5.15.0-127.137
- CVE-2024-49852
- Description:
scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
- CVE: https://ubuntu.com/security/CVE-2024-49852
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49852-scsi-elx-libefc-fix-potential-use-after-free-in-efc-nport-vport-del.patch
- From: 5.15.0-127.137
- CVE-2024-47695
- Description:
RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds
- CVE: https://ubuntu.com/security/CVE-2024-47695
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47695-rdma-rtrs-clt-reset-cid-to-con-num-1-to-stay-in-bounds.patch
- From: 5.15.0-127.137
- CVE-2024-47742
- Description:
firmware_loader: Block path traversal
- CVE: https://ubuntu.com/security/CVE-2024-47742
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47742-firmware-loader-block-path-traversal.patch
- From: 5.15.0-127.137
- CVE-2024-49997
- Description:
net: ethernet: lantiq_etop: fix memory disclosure
- CVE: https://ubuntu.com/security/CVE-2024-49997
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49997-net-ethernet-lantiq-etop-fix-memory-disclosure.patch
- From: 5.15.0-127.137
- CVE-2024-38538
- Description:
net: bridge: xmit: make sure we have at least eth header len bytes
- CVE: https://ubuntu.com/security/CVE-2024-38538
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-header-len-bytes.patch
- From: 5.15.0-127.137
- CVE-2024-49995
- Description:
tipc: guard against string buffer overrun
- CVE: https://ubuntu.com/security/CVE-2024-49995
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 5.15.0-127.137
- CVE-2024-50007
- Description:
ALSA: asihpi: Fix potential OOB array access
- CVE: https://ubuntu.com/security/CVE-2024-50007
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50007-alsa-asihpi-fix-potential-oob-array-access.patch
- From: 5.15.0-127.137
- CVE-2024-49967
- Description:
ext4: no need to continue when the number of entries is 1
- CVE: https://ubuntu.com/security/CVE-2024-49967
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49967-ext4-no-need-to-continue-when-the-number-of-entries-is-1.patch
- From: 5.15.0-127.137
- CVE-2024-49983
- Description:
ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free
- CVE: https://ubuntu.com/security/CVE-2024-49983
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49983-ext4-drop-ppath-from-ext4-ext-replay-update-ex-to-avoid-double-free.patch
- From: 5.15.0-127.137
- CVE-2024-49982
- Description:
aoe: fix the potential use-after-free problem in more places
- CVE: https://ubuntu.com/security/CVE-2024-49982
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49982-aoe-fix-the-potential-use-after-free-problem-in-more-places.patch
- From: 5.15.0-127.137
- CVE-2024-50180
- Description:
fbdev: sisfb: Fix strbuf array overflow
- CVE: https://ubuntu.com/security/CVE-2024-50180
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50180-fbdev-sisfb-fix-strbuf-array-overflow.patch
- From: 5.15.0-127.137
- CVE-2024-50186
- Description:
net: explicitly clear the sk pointer, when pf->create fails
- CVE: https://ubuntu.com/security/CVE-2024-50186
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50186-net-explicitly-clear-the-sk-pointer-when-pf-create-fails.patch
- From: 5.15.0-127.137
- CVE-2024-49969
- Description:
drm/amd/display: Fix index out of bounds in DCN30 color transformation
- CVE: https://ubuntu.com/security/CVE-2024-49969
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49969-drm-amd-display-fix-index-out-of-bounds-in-dcn30-color-transformation.patch
- From: 5.15.0-127.137
- CVE-2024-46858
- Description:
mptcp: pm: Fix uaf in __timer_delete_sync
- CVE: https://ubuntu.com/security/CVE-2024-46858
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46858-mptcp-pm-fix-uaf-in-timer-delete-sync.patch
- From: 5.15.0-127.137
- CVE-2024-46859
- Description:
Rare Panasonic laptop hardware; patch requires struct adaptation for minimal impact
- CVE:
- Patch: skipped/CVE-2024-46859.patch
- From:
- CVE-2024-46854
- Description:
net: dpaa: Pad packets to ETH_ZLEN
- CVE: https://ubuntu.com/security/CVE-2024-46854
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46854-net-dpaa-pad-packets-to-eth-zlen.patch
- From: 5.15.0-127.137
- CVE-2024-47723
- Description:
jfs: fix array-index-out-of-bounds in diAlloc
- CVE: https://linux.oracle.com/cve/CVE-2024-47723.html
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47723-jfs-fix-array-index-out-of-bounds-in-diAlloc.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47723
- Description:
jfs: fix out-of-bounds in dbNextAG() and diAlloc()
- CVE: https://ubuntu.com/security/CVE-2024-47723
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47723-jfs-fix-out-of-bounds-in-dbnextag-and-dialloc.patch
- From: 5.15.0-127.137
- CVE-2024-47747
- Description:
net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2024-47747
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47747-net-seeq-fix-use-after-free-vulnerability-in-ether3-driver-due-to-race-condition.patch
- From: 5.15.0-127.137
- CVE-2024-49860
- Description:
ACPI: sysfs: validate return type of _STR method
- CVE: https://ubuntu.com/security/CVE-2024-49860
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49860-acpi-sysfs-validate-return-type-of-str-method.patch
- From: 5.15.0-127.137
- CVE-2024-49903
- Description:
jfs: Fix uaf in dbFreeBits
- CVE: https://ubuntu.com/security/CVE-2024-49903
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49903-jfs-fix-uaf-in-dbfreebits.patch
- From: 5.15.0-127.137
- CVE-2024-49900
- Description:
jfs: Fix uninit-value access of new_ea in ea_buffer
- CVE: https://ubuntu.com/security/CVE-2024-49900
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49900-jfs-fix-uninit-value-access-of-new-ea-in-ea-buffer.patch
- From: 5.15.0-127.137
- CVE-2024-50035
- Description:
ppp: fix ppp_async_encode() illegal access
- CVE: https://ubuntu.com/security/CVE-2024-50035
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50035-ppp-fix-ppp-async-encode-illegal-access.patch
- From: 5.15.0-127.137
- CVE-2024-50033
- Description:
slip: make slhc_remember() more robust against malicious packets
- CVE: https://ubuntu.com/security/CVE-2024-50033
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50033-slip-make-slhc-remember-more-robust-against-malicious-packets.patch
- From: 5.15.0-127.137
- CVE-2024-49981
- Description:
media: venus: fix use after free bug in venus_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-49981
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49981-media-venus-fix-use-after-free-bug-in-venus-remove-due-to-race-condition.patch
- From: 5.15.0-127.137
- CVE-2024-47757
- Description:
nilfs2: fix potential oob read in nilfs_btree_check_delete()
- CVE: https://ubuntu.com/security/CVE-2024-47757
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47757-nilfs2-fix-potential-oob-read-in-nilfs-btree-check-delete.patch
- From: 5.15.0-127.137
- CVE-2024-50059
- Description:
ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2024-50059
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50059-ntb-ntb-hw-switchtec-fix-use-after-free-vulnerability-in-switchtec-ntb-remove-due-to-race-condition.patch
- From: 5.15.0-127.137
- CVE-2024-47748
- Description:
vhost_vdpa: assign irq bypass producer token correctly
- CVE: https://ubuntu.com/security/CVE-2024-47748
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47748-vhost_vdpa-assign-irq-bypass-producer-token-correctly.patch
- From: 5.15.0-127.137
- CVE-2023-52917
- Description:
ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir()
- CVE: https://ubuntu.com/security/CVE-2023-52917
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2023-52917-ntb-intel-fix-the-null-vs-is-err-bug-for-debugfs-create-dir.patch
- From: 5.15.0-127.137
- CVE-2024-47692
- Description:
nfsd: return -EINVAL when namelen is 0
- CVE: https://ubuntu.com/security/CVE-2024-47692
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47692-nfsd-return-einval-when-namelen-is-0-5.15.0-113.123.patch
- From: 5.15.0-127.137
- CVE-2024-27072
- Description:
media: usbtv: Remove useless locks in usbtv_video_free()
- CVE: https://ubuntu.com/security/CVE-2024-27072
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-27072-media-usbtv-remove-useless-locks-in-usbtv-video-free.patch
- From: 5.15.0-127.137
- CVE-2024-38544
- Description:
RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt
- CVE: https://ubuntu.com/security/CVE-2024-38544
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-38544-rdma-rxe-fix-seg-fault-in-rxe-comp-queue-pkt.patch
- From: 5.15.0-127.137
- CVE-2024-38545
- Description:
HNS RoCE driver for China-specific Hisilicon/Kunpeng ARM SoCs
- CVE:
- Patch: skipped/CVE-2024-38545.patch
- From:
- CVE-2024-47693
- Description:
IB/core: Fix ib_cache_setup_one error flow cleanup
- CVE: https://ubuntu.com/security/CVE-2024-47693
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47693-ib-core-fix-ib-cache-setup-one-error-flow-cleanup.patch
- From: 5.15.0-127.137
- CVE-2023-52532
- Description:
net: mana: Fix TX CQE error handling
- CVE: https://ubuntu.com/security/CVE-2023-52532
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2023-52532-net-mana-Fix-TX-CQE-error-handling.patch
- From: 5.15.0-127.137
- CVE-2023-52639
- Description:
s390 architecture is not supported
- CVE:
- Patch: skipped/CVE-2023-52639.patch
- From:
- CVE-2024-26947
- Description:
ARM related CVE
- CVE:
- Patch: skipped/CVE-2024-26947.patch
- From:
- CVE-2024-35904
- Description:
Affects only __init function for a built-in component, so patching will have no effect
- CVE:
- Patch: skipped/CVE-2024-35904.patch
- From:
- CVE-2024-36893
- Description:
usb: typec: tcpm: Check for port partner validity before consuming it
- CVE: https://ubuntu.com/security/CVE-2024-36893
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-36893-usb-typec-tcpm-check-for-port-partner-validity-before-consuming-it.patch
- From: 5.15.0-127.137
- CVE-2024-41016
- Description:
ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-41016
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-41016-ocfs2-strict-bound-check-before-memcmp-in-ocfs2-xattr-find-entry.patch
- From: 5.15.0-127.137
- CVE-2024-42079
- Description:
gfs2: Fix NULL pointer dereference in gfs2_log_flush
- CVE: https://ubuntu.com/security/CVE-2024-42079
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-42079-gfs2-fix-null-pointer-dereference-in-gfs2-log-flush.patch
- From: 5.15.0-127.137
- CVE-2024-42156
- Description:
Out of scope: s390 is not supported
- CVE:
- Patch: skipped/CVE-2024-42156.patch
- From:
- CVE-2024-42158
- Description:
Out of scope: s390 is not supported
- CVE:
- Patch: skipped/CVE-2024-42158.patch
- From:
- CVE-2024-44931
- Description:
gpio: prevent potential speculation leaks in gpio_device_get_desc()
- CVE: https://ubuntu.com/security/CVE-2024-44931
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-44931-gpio-prevent-potential-speculation-leaks-in-gpio-device-get-desc.patch
- From: 5.15.0-127.137
- CVE-2024-46695
- Description:
selinux,smack: don't bypass permissions check in inode_setsecctx hook
- CVE: https://ubuntu.com/security/CVE-2024-46695
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46695-selinux-smack-don-t-bypass-permissions-check-in-inode-setsecctx-hook.patch
- From: 5.15.0-127.137
- CVE-2024-46855
- Description:
netfilter: nft_socket: fix sk refcount leaks
- CVE: https://ubuntu.com/security/CVE-2024-46855
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46855-netfilter-nft-socket-fix-sk-refcount-leaks.patch
- From: 5.15.0-127.137
- CVE-2024-47671
- Description:
USB: usbtmc: prevent kernel-usb-infoleak
- CVE: https://ubuntu.com/security/CVE-2024-47671
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47671-usb-usbtmc-prevent-kernel-usb-infoleak.patch
- From: 5.15.0-127.137
- CVE-2024-47672
- Description:
wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead
- CVE: https://ubuntu.com/security/CVE-2024-47672
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47672-wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmware-is-dead.patch
- From: 5.15.0-127.137
- CVE-2024-47673
- Description:
wifi: iwlwifi: mvm: pause TCM when the firmware is stopped
- CVE: https://ubuntu.com/security/CVE-2024-47673
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47673-wifi-iwlwifi-mvm-pause-tcm-when-the-firmware-is-stopped.patch
- From: 5.15.0-127.137
- CVE-2024-47674
- Description:
mm: avoid leaving partial pfn mappings around in error case
- CVE: https://ubuntu.com/security/CVE-2024-47674
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47674-mm-avoid-leaving-partial-pfn-mappings-around-in-error-case.patch
- From: 5.15.0-127.137
- CVE-2024-47679
- Description:
vfs: fix race between evice_inodes() and find_inode()&iput()
- CVE: https://ubuntu.com/security/CVE-2024-47679
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47679-vfs-fix-race-between-evice-inodes-and-find-inode-iput.patch
- From: 5.15.0-127.137
- CVE-2024-47684
- Description:
tcp: check skb is non-NULL in tcp_rto_delta_us()
- CVE: https://ubuntu.com/security/CVE-2024-47684
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47684-tcp-check-skb-is-non-null-in-tcp-rto-delta-us.patch
- From: 5.15.0-127.137
- CVE-2024-47684
- Description:
tcp: check skb is non-NULL in tcp_rto_delta_us()
- CVE: https://ubuntu.com/security/CVE-2024-47684
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47684-tcp-check-skb-is-non-null-in-tcp-rto-delta-us-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-47699
- Description:
nilfs2: fix potential null-ptr-deref in nilfs_btree_insert()
- CVE: https://ubuntu.com/security/CVE-2024-47699
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47699-nilfs2-fix-potential-null-ptr-deref-in-nilfs-btree-insert.patch
- From: 5.15.0-127.137
- CVE-2024-47699
- Description:
nilfs2: determine empty node blocks as corrupted
- CVE: https://ubuntu.com/security/CVE-2024-47699
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47699-nilfs2-determine-empty-node-blocks-as-corrupted.patch
- From: 5.15.0-127.137
- CVE-2024-47705
- Description:
block: fix potential invalid pointer dereference in blk_add_partition
- CVE: https://ubuntu.com/security/CVE-2024-47705
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47705-block-fix-potential-invalid-pointer-dereference-in-blk-add-partition.patch
- From: 5.15.0-127.137
- CVE-2024-49959
- Description:
jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error
- CVE: https://ubuntu.com/security/CVE-2024-49959
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49959-jbd2-stop-waiting-for-space-when-jbd2-cleanup-journal-tail-returns-error.patch
- From: 5.15.0-127.137
- CVE-2024-49958
- Description:
ocfs2: reserve space for inline xattr before attaching reflink tree
- CVE: https://ubuntu.com/security/CVE-2024-49958
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49958-ocfs2-reserve-space-for-inline-xattr-before-attaching-reflink-tree.patch
- From: 5.15.0-127.137
- CVE-2024-49965
- Description:
ocfs2: remove unreasonable unlock in ocfs2_read_blocks
- CVE: https://ubuntu.com/security/CVE-2024-49965
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49965-ocfs2-remove-unreasonable-unlock-in-ocfs2-read-blocks.patch
- From: 5.15.0-127.137
- CVE-2024-49954
- Description:
static_call: Replace pointless WARN_ON() in static_call_module_notify()
- CVE: https://ubuntu.com/security/CVE-2024-49954
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49954-static-call-replace-pointless-warn-on-in-static-call-module-notify.patch
- From: 5.15.0-127.137
- CVE-2024-49962
- Description:
ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package()
- CVE: https://ubuntu.com/security/CVE-2024-49962
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49962-acpica-check-null-return-of-acpi-allocate-zeroed-in-acpi-db-convert-to-package.patch
- From: 5.15.0-127.137
- CVE-2024-49955
- Description:
ACPI: battery: Fix possible crash when unregistering a battery hook
- CVE: https://ubuntu.com/security/CVE-2024-49955
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49955-acpi-battery-fix-possible-crash-when-unregistering-a-battery-hook.patch
- From: 5.15.0-127.137
- CVE-2024-49957
- Description:
ocfs2: fix null-ptr-deref when journal load failed.
- CVE: https://ubuntu.com/security/CVE-2024-49957
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49957-ocfs2-fix-null-ptr-deref-when-journal-load-failed.patch
- From: 5.15.0-127.137
- CVE-2024-49949
- Description:
net: avoid potential underflow in qdisc_pkt_len_init() with UFO
- CVE: https://ubuntu.com/security/CVE-2024-49949
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49949-net-avoid-potential-underflow-in-qdisc-pkt-len-init-with-ufo.patch
- From: 5.15.0-127.137
- CVE-2024-49952
- Description:
netfilter: nf_tables: prevent nf_skb_duplicated corruption
- CVE: https://ubuntu.com/security/CVE-2024-49952
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49952-netfilter-nf-tables-prevent-nf-skb-duplicated-corruption.patch
- From: 5.15.0-127.137
- CVE-2024-49851
- Description:
tpm: Clean up TPM space after command failure
- CVE: https://ubuntu.com/security/CVE-2024-49851
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49851-tpm-clean-up-tpm-space-after-command-failure.patch
- From: 5.15.0-127.137
- CVE-2024-47749
- Description:
RDMA/cxgb4: Added NULL check for lookup_atid
- CVE: https://ubuntu.com/security/CVE-2024-47749
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47749-rdma-cxgb4-added-null-check-for-lookup-atid.patch
- From: 5.15.0-127.137
- CVE-2024-49858
- Description:
Out of scope: EFI libstub fix, running kernels not vulnerable.
- CVE:
- Patch: skipped/CVE-2024-49858.patch
- From:
- CVE-2024-47740
- Description:
f2fs: Require FMODE_WRITE for atomic write ioctls
- CVE: https://ubuntu.com/security/CVE-2024-47740
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47740-f2fs-require-fmode-write-for-atomic-write-ioctls.patch
- From: 5.15.0-127.137
- CVE-2024-49868
- Description:
btrfs: fix a NULL pointer dereference when failed to start a new trasacntion
- CVE: https://ubuntu.com/security/CVE-2024-49868
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49868-btrfs-fix-a-null-pointer-dereference-when-failed-to-start-a-new-trasacntion.patch
- From: 5.15.0-127.137
- CVE-2024-49867
- Description:
btrfs: wait for fixup workers before stopping cleaner kthread during umount
- CVE: https://ubuntu.com/security/CVE-2024-49867
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49867-btrfs-wait-for-fixup-workers-before-stopping-cleaner-kthread-during-umount.patch
- From: 5.15.0-127.137
- CVE-2024-49866
- Description:
tracing/timerlat: Fix a race during cpuhp processing
- CVE: https://ubuntu.com/security/CVE-2024-49866
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49866-tracing-timerlat-fix-a-race-during-cpuhp-processing.patch
- From: 5.15.0-127.137
- CVE-2024-49856
- Description:
x86/sgx: Fix deadlock in SGX NUMA node search
- CVE: https://ubuntu.com/security/CVE-2024-49856
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49856-x86-sgx-fix-deadlock-in-sgx-numa-node-search.patch
- From: 5.15.0-127.137
- CVE-2024-49863
- Description:
vhost/scsi: null-ptr-dereference in vhost_scsi_get_req()
- CVE: https://ubuntu.com/security/CVE-2024-49863
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49863-vhost-scsi-null-ptr-dereference-in-vhost-scsi-get-req.patch
- From: 5.15.0-127.137
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://ubuntu.com/security/CVE-2024-47696
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47696-RDMA-iwcm-Fix-WARNING-at_kernel-workqueue.c-check_flush_dependency.patch
- From: 5.15.0-127.137
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://ubuntu.com/security/CVE-2024-47696
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47696-RDMA-iwcm-Fix-WARNING-at_kernel-workqueue.c-check_flush_dependency-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-49963
- Description:
Out of scope as the patch is for arm64 arch only, x86_64 not affected
- CVE:
- Patch: skipped/CVE-2024-49963.patch
- From:
- CVE-2024-36968
- Description:
Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
- CVE: https://ubuntu.com/security/CVE-2024-36968
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-36968-bluetooth-l2cap-fix-div-by-zero-in-l2cap-le-flowctl-init.patch
- From: 5.15.0-127.137
- CVE-2024-36968
- Description:
Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-36968
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-36968-bluetooth-l2cap-fix-div-by-zero-in-l2cap-le-flowctl-init-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-50181
- Description:
Out of scope, i.MX SoC is not supported
- CVE:
- Patch: skipped/CVE-2024-50181.patch
- From:
- CVE-2024-47706
- Description:
block, bfq: fix possible UAF for bfqq->bic with merge chain
- CVE: https://ubuntu.com/security/CVE-2024-47706
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47706-block-bfq-fix-possible-UAF-for-bfqq-bic-with-merge-chain.patch
- From: 5.15.0-127.137
- CVE-2024-47709
- Description:
can: bcm: Clear bo->bcm_proc_read after remove_proc_entry()
- CVE: https://ubuntu.com/security/CVE-2024-47709
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47709-can-bcm-Clear-bo-bcm_proc_read-after-remove_proc_entry.patch
- From: 5.15.0-127.137
- CVE-2024-47710
- Description:
sock_map: Add a cond_resched() in sock_hash_free()
- CVE: https://ubuntu.com/security/CVE-2024-47710
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47710-sock_map-Add-a-cond_resched-in-sock_hash_free.patch
- From: 5.15.0-127.137
- CVE-2024-47712
- Description:
wifi: wilc1000: fix ies_len type in connect path
- CVE: https://ubuntu.com/security/CVE-2024-47712
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47712-wifi-wilc1000-fix-ies_len-type-in-connect-path-107.117.patch
- From: 5.15.0-127.137
- CVE-2024-47712
- Description:
wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param
- CVE: https://ubuntu.com/security/CVE-2024-47712
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47712-wifi-wilc1000-fix-potential-RCU-dereference-issue-in-wilc_parse_join_bss_param-107.117.patch
- From: 5.15.0-127.137
- CVE-2024-47713
- Description:
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
- CVE: https://ubuntu.com/security/CVE-2024-47713
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47713-wifi-mac80211-use-two-phase-skb-reclamation-in-ieee80211_do_stop.patch
- From: 5.15.0-127.137
- CVE-2024-47720
- Description:
drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func
- CVE: https://ubuntu.com/security/CVE-2024-47720
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47720-drm-amd-display-Add-null-check-for-set_output_gamma-in-dcn30_set_output_transfer_func.patch
- From: 5.15.0-127.137
- CVE-2024-47734
- Description:
bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()
- CVE: https://ubuntu.com/security/CVE-2024-47734
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47734-bonding-Fix-unnecessary-warnings-and-logs-from-bond_xdp_get_xmit_slave.patch
- From: 5.15.0-127.137
- CVE-2024-47735
- Description:
RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled
- CVE: https://ubuntu.com/security/CVE-2024-47735
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47735-RDMA-hns-Fix-spin_unlock_irqrestore-called-with-IRQs-enabled.patch
- From: 5.15.0-127.137
- CVE-2024-47737
- Description:
nfsd: call cache_put if xdr_reserve_space returns NULL
- CVE: https://ubuntu.com/security/CVE-2024-47737
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47737-nfsd-call-cache-put-if-xdr-reserve-space-returns-null.patch
- From: 5.15.0-127.137
- CVE-2024-47739
- Description:
padata: use integer wrap around to prevent deadlock on seq_nr overflow
- CVE: https://ubuntu.com/security/CVE-2024-47739
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47739-padata-use-integer-wrap-around-to-prevent-deadlock-on-seq_nr-overflow.patch
- From: 5.15.0-127.137
- CVE-2024-49878
- Description:
resource: fix region_intersects() vs add_memory_driver_managed()
- CVE: https://ubuntu.com/security/CVE-2024-49878
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49878-resource-fix-region-intersects-vs-add-memory-driver-managed.patch
- From: 5.15.0-127.137
- CVE-2024-49879
- Description:
drm: omapdrm: Add missing check for alloc_ordered_workqueue
- CVE: https://ubuntu.com/security/CVE-2024-49879
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49879-drm-omapdrm-add-missing-check-for-alloc-ordered-workqueue.patch
- From: 5.15.0-127.137
- CVE-2024-49881
- Description:
ext4: update orig_path in ext4_find_extent()
- CVE: https://ubuntu.com/security/CVE-2024-49881
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49881-ext4-update-orig-path-in-ext4-find-extent.patch
- From: 5.15.0-127.137
- CVE-2024-49886
- Description:
platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug
- CVE: https://ubuntu.com/security/CVE-2024-49886
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49886-platform-x86-isst-fix-the-kasan-report-slab-out-of-bounds-bug.patch
- From: 5.15.0-127.137
- CVE-2024-49890
- Description:
drm/amd/pm: ensure the fw_info is not null before using it
- CVE: https://ubuntu.com/security/CVE-2024-49890
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49890-drm-amd-pm-ensure-the-fw-info-is-not-null-before-using-it.patch
- From: 5.15.0-127.137
- CVE-2024-49892
- Description:
drm/amd/display: Initialize get_bytes_per_element's default to 1
- CVE: https://ubuntu.com/security/CVE-2024-49892
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49892-drm-amd-display-initialize-get-bytes-per-element-s-default-to-1.patch
- From: 5.15.0-127.137
- CVE-2024-49896
- Description:
drm/amd/display: Check stream before comparing them
- CVE: https://ubuntu.com/security/CVE-2024-49896
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49896-drm-amd-display-check-stream-before-comparing-them.patch
- From: 5.15.0-127.137
- CVE-2024-50093
- Description:
[PATCH] thermal: intel: int340x: processor: Fix warning during module unload
- CVE: https://ubuntu.com/security/CVE-2024-50093
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50093-thermal-intel-int340x-processor-Fix-warning-during-module-unload.patch
- From: 5.15.0-127.137
- CVE-2023-52621
- Description:
[PATCH 1/1] bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
- CVE: https://ubuntu.com/security/CVE-2023-52621
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2023-52621-bpf-Check-rcu_read_lock_trace_held-before-calling-bpf-map-helpers.patch
- From: 5.15.0-127.137
- CVE-2024-50045
- Description:
[PATCH 1/1] netfilter: br_netfilter: fix panic with metadata_dst skb
- CVE: https://ubuntu.com/security/CVE-2024-50045
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50045-netfilter-br_netfilter-fix-panic-with-metadata_dst-skb.patch
- From: 5.15.0-127.137
- CVE-2024-50049
- Description:
[PATCH 1/1] drm/amd/display: Check null pointer before dereferencing se
- CVE: https://ubuntu.com/security/CVE-2024-50049
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50049-drm-amd-display-Check-null-pointer-before-dereferencing-se.patch
- From: 5.15.0-127.137
- CVE-2024-50062
- Description:
[PATCH 1/1] RDMA/rtrs-srv: Avoid null pointer deref during path
- CVE: https://ubuntu.com/security/CVE-2024-50062
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50062-RDMA-rtrs-srv-Avoid-null-pointer-deref-during-path-establishment.patch
- From: 5.15.0-127.137
- CVE-2024-50095
- Description:
[PATCH 1/1] RDMA/mad: Improve handling of timed out WRs of mad agent
- CVE: https://ubuntu.com/security/CVE-2024-50095
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50095-RDMA-mad-Improve-handling-of-timed-out-WRs-of-mad-agent.patch
- From: 5.15.0-127.137
- CVE-2024-50096
- Description:
[PATCH 1/1] nouveau/dmem: Fix vulnerability in migrate_to_ram upon
- CVE: https://ubuntu.com/security/CVE-2024-50096
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50096-nouveau-dmem-Fix-vulnerability-in-migrate_to_ram-upon-copy-error.patch
- From: 5.15.0-127.137
- CVE-2024-50179
- Description:
[PATCH 1/1] ceph: remove the incorrect Fw reference check when
- CVE: https://ubuntu.com/security/CVE-2024-50179
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50179-ceph-remove-the-incorrect-Fw-reference-check-when-dirtying-pages.patch
- From: 5.15.0-127.137
- CVE-2024-50184
- Description:
[PATCH 1/1] virtio_pmem: Check device status before requesting flush
- CVE: https://ubuntu.com/security/CVE-2024-50184
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50184-virtio_pmem-Check-device-status-before-requesting-flush.patch
- From: 5.15.0-127.137
- CVE-2024-50188
- Description:
[PATCH 1/1] net: phy: dp83869: fix memory corruption when enabling
- CVE: https://ubuntu.com/security/CVE-2024-50188
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50188-net-phy-dp83869-fix-memory-corruption-when-enabling-fiber.patch
- From: 5.15.0-127.137
- CVE-2024-50191
- Description:
[PATCH 1/1] ext4: don't set SB_RDONLY after filesystem errors
- CVE: https://ubuntu.com/security/CVE-2024-50191
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50191-ext4-don-t-set-SB_RDONLY-after-filesystem-errors.patch
- From: 5.15.0-127.137
- CVE-2024-49875
- Description:
nfsd: map the EBADMSG to nfserr_io to avoid warning
- CVE: https://ubuntu.com/security/CVE-2024-49875
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49875-nfsd-map-the-ebadmsg-to-nfserr-io-to-avoid-warning-kpatch-115.125.patch
- From: 5.15.0-127.137
- CVE-2024-49902
- Description:
jfs: check if leafidx greater than num leaves per dmap tree
- CVE: https://ubuntu.com/security/CVE-2024-49902
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49902-jfs-check-if-leafidx-greater-than-num-leaves-per-dmap-tree.patch
- From: 5.15.0-127.137
- CVE-2024-49907
- Description:
drm/amd/display: Check null pointers before using dc->clk_mgr
- CVE: https://ubuntu.com/security/CVE-2024-49907
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49907-drm-amd-display-check-null-pointers-before-using-dc-clk-mgr.patch
- From: 5.15.0-127.137
- CVE-2024-49913
- Description:
drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream
- CVE: https://ubuntu.com/security/CVE-2024-49913
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49913-drm-amd-display-add-null-check-for-top-pipe-to-program-in-commit-planes-for-stream.patch
- From: 5.15.0-127.137
- CVE-2024-49927
- Description:
x86/ioapic: Handle allocation failures gracefully
- CVE: https://ubuntu.com/security/CVE-2024-49927
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49927-x86-ioapic-handle-allocation-failures-gracefully.patch
- From: 5.15.0-127.137
- CVE-2024-49933
- Description:
blk_iocost: fix more out of bound shifts
- CVE: https://ubuntu.com/security/CVE-2024-49933
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49933-blk-iocost-fix-more-out-of-bound-shifts.patch
- From: 5.15.0-127.137
- CVE-2024-49935
- Description:
Low-score CVE changes a kthread, which may prevent patching/unpatching
- CVE:
- Patch: skipped/CVE-2024-49935.patch
- From:
- CVE-2024-49938
- Description:
wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
- CVE: https://ubuntu.com/security/CVE-2024-49938
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49938-wifi-ath9k-htc-use-skb-set-length-for-resetting-urb-before-resubmit.patch
- From: 5.15.0-127.137
- CVE-2024-49944
- Description:
sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start
- CVE: https://ubuntu.com/security/CVE-2024-49944
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49944-sctp-set-sk-state-back-to-closed-if-autobind-fails-in-sctp-listen-start.patch
- From: 5.15.0-127.137
- CVE-2024-49944
- Description:
sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start
- CVE: https://ubuntu.com/security/CVE-2024-49944
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49944-sctp-ensure-sk_state-is-set-to-CLOSED-if-hashing-fails-in-sctp_listen_start.patch
- From: 5.15.0-127.137
- CVE-2024-49946
- Description:
ppp: do not assume bh is held in ppp_channel_bridge_input()
- CVE: https://ubuntu.com/security/CVE-2024-49946
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49946-ppp-do-not-assume-bh-is-held-in-ppp-channel-bridge-input.patch
- From: 5.15.0-127.137
- CVE-2024-49948
- Description:
net: add more sanity checks to qdisc_pkt_len_init()
- CVE: https://ubuntu.com/security/CVE-2024-49948
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49948-net-add-more-sanity-checks-to-qdisc-pkt-len-init.patch
- From: 5.15.0-127.137
- CVE-2024-49871
- Description:
Input: adp5589-keys - fix NULL pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-49871
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49871-input-adp5589-keys-fix-null-pointer-dereference-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-50046
- Description:
[PATCH] NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()
- CVE: https://ubuntu.com/security/CVE-2024-50046
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50046-NFSv4-Prevent-NULL-pointer-dereference-in-nfs42_complete_copies.patch
- From: 5.15.0-127.137
- CVE-2024-50046
- Description:
[PATCH] NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()
- CVE: https://ubuntu.com/security/CVE-2024-50046
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50046-NFSv4-Prevent-NULL-pointer-dereference-in-nfs42_complete_copies-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-50189
- Description:
When introduced by live-patching, patch causes more problems than it fixes. Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2024-50189.patch
- From:
- CVE-2024-47690
- Description:
f2fs: get rid of online repaire on corrupted directory
- CVE: https://ubuntu.com/security/CVE-2024-47690
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47690-f2fs-get-rid-of-online-repaire-on-corrupted-directory-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-49975
- Description:
uprobes: fix kernel info leak via "[uprobes]" vma
- CVE: https://ubuntu.com/security/CVE-2024-49975
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49975-uprobes-fix-kernel-info-leak-via-uprobes-vma-5.15.0-124.134.patch
- From: 5.15.0-127.137
- CVE-2024-49985
- Description:
i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume
- CVE: https://ubuntu.com/security/CVE-2024-49985
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-49985-i2c-stm32f7-do-not-prepare-unprepare-clock-during-runtime-suspend-resume.patch
- From: 5.15.0-127.137
- CVE-2024-50000
- Description:
net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()
- CVE: https://ubuntu.com/security/CVE-2024-50000
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50000-net-mlx5e-fix-null-deref-in-mlx5e-tir-builder-alloc.patch
- From: 5.15.0-127.137
- CVE-2024-50001
- Description:
net/mlx5: Fix error path in multi-packet WQE transmit
- CVE: https://ubuntu.com/security/CVE-2024-50001
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50001-net-mlx5-fix-error-path-in-multi-packet-wqe-transmit.patch
- From: 5.15.0-127.137
- CVE-2024-50003
- Description:
drm/amd/display: Fix system hang while resume with TBT monitor
- CVE: https://ubuntu.com/security/CVE-2024-50003
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50003-drm-amd-display-fix-system-hang-while-resume-with-tbt-monitor.patch
- From: 5.15.0-127.137
- CVE-2024-50006
- Description:
ext4: fix i_data_sem unlock order in ext4_ind_migrate()
- CVE: https://ubuntu.com/security/CVE-2024-50006
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50006-ext4-fix-i-data-sem-unlock-order-in-ext4-ind-migrate.patch
- From: 5.15.0-127.137
- CVE-2024-50008
- Description:
wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext()
- CVE: https://ubuntu.com/security/CVE-2024-50008
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50008-wifi-mwifiex-fix-memcpy-field-spanning-write-warning-in-mwifiex-cmd-802-11-scan-ext.patch
- From: 5.15.0-127.137
- CVE-2024-50008
- Description:
wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext()
- CVE: https://ubuntu.com/security/CVE-2024-50008
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50008-wifi-mwifiex-fix-memcpy-field-spanning-write-warning-in-mwifiex-cmd-802-11-scan-ext-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-50002
- Description:
[PATCH] static_call: Handle module init failure correctly in static_call_del_module()
- CVE: https://ubuntu.com/security/CVE-2024-50002
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50002-static_call-Handle-module-init-failure-correctly-in-static_call_del_module.patch
- From: 5.15.0-127.137
- CVE-2024-50013
- Description:
exfat: fix memory leak in exfat_load_bitmap()
- CVE: https://ubuntu.com/security/CVE-2024-50013
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50013-exfat-fix-memory-leak-in-exfat-load-bitmap.patch
- From: 5.15.0-127.137
- CVE-2024-50019
- Description:
kthread: unpark only parked kthread
- CVE: https://ubuntu.com/security/CVE-2024-50019
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50019-kthread-unpark-only-parked-kthread.patch
- From: 5.15.0-127.137
- CVE-2024-50024
- Description:
net: Fix an unsafe loop on the list
- CVE: https://ubuntu.com/security/CVE-2024-50024
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50024-net-fix-an-unsafe-loop-on-the-list-kpatch.patch
- From: 5.15.0-127.137
- CVE-2024-50031
- Description:
drm/v3d: Stop the active perfmon before being destroyed
- CVE: https://ubuntu.com/security/CVE-2024-50031
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50031-drm-v3d-stop-the-active-perfmon-before-being-destroyed.patch
- From: 5.15.0-127.137
- CVE-2024-50040
- Description:
igb: Do not bring the device up after non-fatal error
- CVE: https://ubuntu.com/security/CVE-2024-50040
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50040-igb-do-not-bring-the-device-up-after-non-fatal-error.patch
- From: 5.15.0-127.137
- CVE-2024-50041
- Description:
i40e: Fix macvlan leak by synchronizing access to mac_filter_hash
- CVE: https://ubuntu.com/security/CVE-2024-50041
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50041-i40e-fix-macvlan-leak-by-synchronizing-access-to-mac-filter-hash.patch
- From: 5.15.0-127.137
- CVE-2024-50044
- Description:
Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change
- CVE: https://ubuntu.com/security/CVE-2024-50044
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50044-bluetooth-rfcomm-fix-possible-deadlock-in-rfcomm-sk-state-change.patch
- From: 5.15.0-127.137
- CVE-2024-50039
- Description:
net/sched: accept TCA_STAB only for root qdisc
- CVE: https://ubuntu.com/security/CVE-2024-50039
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50039-net-sched-accept-TCA_STAB-only-for-root-qdisc.patch
- From: 5.15.0-127.137
- CVE-2024-50039
- Description:
net/sched: accept TCA_STAB only for root qdisc
- CVE: https://ubuntu.com/security/CVE-2024-50039
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-50039-net-sched-accept-TCA_STAB-only-for-root-qdisc-kpatch.patch
- From: 5.15.0-127.137
- CVE-2020-12351 CVE-2020-12352 CVE-2020-24490
- Description:
UBUNTU: [Config] Disable BlueZ highspeed support
- CVE: https://ubuntu.com/security/CVE-2020-24490
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2020-12351-CVE-2020-12352-CVE-2020-24490-kpatch.patch
- From: 5.15.0-130.140
- CVE-2024-40910
- Description:
ax25: Fix refcount imbalance on inbound connections
- CVE: https://ubuntu.com/security/CVE-2024-40910
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-40910-ax25-fix-refcount-imbalance-on-inbound-connections.patch
- From: 5.15.0-130.140
- CVE-2024-53057
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://ubuntu.com/security/CVE-2024-53057
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 5.15.0-130.140
- CVE-2024-40973
- Description:
media: mtk-vcodec: potential null pointer deference in SCP
- CVE: https://ubuntu.com/security/CVE-2024-40973
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-40973-media-mtk-vcodec-potential-null-pointer-deference-in-scp.patch
- From: 5.15.0-130.140
- CVE-2024-35967
- Description:
Bluetooth: SCO: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35967
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35967-bluetooth-sco-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-35966
- Description:
Bluetooth: RFCOMM: Fix not validating setsockopt user
- CVE: https://ubuntu.com/security/CVE-2024-35966
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35966-bluetooth-rfcomm-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-35965
- Description:
Bluetooth: L2CAP: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35965
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35965-bluetooth-l2cap-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-35963
- Description:
Bluetooth: hci_sock: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35963
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35963-bluetooth-hci-sock-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-38553
- Description:
net: fec: remove .ndo_poll_controller to avoid deadlocks
- CVE: https://ubuntu.com/security/CVE-2024-38553
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-38553-net-fec-remove-ndo-poll-controller-to-avoid-deadlocks.patch
- From: 5.15.0-130.140
- CVE-2024-38553
- Description:
net: fec: remove .ndo_poll_controller to avoid deadlocks
- CVE: https://ubuntu.com/security/CVE-2024-38553
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-38553-net-fec-remove-ndo-poll-controller-to-avoid-deadlocks-kpatch.patch
- From: 5.15.0-130.140
- CVE-2024-50264
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://ubuntu.com/security/CVE-2024-50264
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 5.15.0-130.140
- CVE-2024-43904
- Description:
drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing
- CVE: https://ubuntu.com/security/CVE-2024-43904
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-43904-drm-amd-display-add-null-checks-for-stream-and-plane-before-dereferencing.patch
- From: 5.15.0-130.140
- CVE-2024-26822
- Description:
smb: client: set correct id, uid and cruid for multiuser automounts
- CVE: https://ubuntu.com/security/CVE-2024-26822
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-26822-smb-client-set-correct-id-uid-and-cruid-for-multiuser-automounts-azure-dfs.patch
- From: 5.15.0-130.140
- CVE-2024-53164
- Description:
net: sched: fix ordering of qlen adjustment
- CVE: https://ubuntu.com/security/CVE-2024-53164
- Patch: ubuntu-jammy/5.15.0-131.141/CVE-2024-53164-net-sched-fix-ordering-of-qlen-adjustment.patch
- From: 5.15.0-131.141
- CVE-2024-53141
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://ubuntu.com/security/CVE-2024-53141
- Patch: ubuntu-jammy/5.15.0-131.141/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 5.15.0-131.141
- CVE-2024-53103
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://ubuntu.com/security/CVE-2024-53103
- Patch: ubuntu-jammy/5.15.0-131.141/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 5.15.0-131.141
- CVE-2024-56672
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://ubuntu.com/security/CVE-2024-56672
- Patch: ubuntu-jammy/5.15.0-134.145/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 5.15.0-134.145
- CVE-2024-56672
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://ubuntu.com/security/CVE-2024-56672
- Patch: ubuntu-jammy/5.15.0-134.145/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online-kpatch.patch
- From: 5.15.0-134.145
- CVE-2024-50074
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://ubuntu.com/security/CVE-2024-50074
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access.patch
- From: 5.15.0-133.144
- CVE-2024-50085
- Description:
mptcp: pm: only decrement add_addr_accepted for MPJ req
- CVE: https://ubuntu.com/security/CVE-2024-50085
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50085-mptcp-pm-only-decrement-add_addr_accepted-for-MPJ-req-119.patch
- From: 5.15.0-133.144
- CVE-2024-50085
- Description:
mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow
- CVE: https://ubuntu.com/security/CVE-2024-50085
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50085-mptcp-pm-fix-uaf-read-in-mptcp-pm-nl-rm-addr-or-subflow-119.patch
- From: 5.15.0-133.144
- CVE-2024-35887
- Description:
ax25: fix use-after-free bugs caused by ax25_ds_del_timer
- CVE: https://ubuntu.com/security/CVE-2024-35887
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-35887-ax25-fix-use-after-free-bugs-caused-by-ax25-ds-del-timer.patch
- From: 5.15.0-133.144
- CVE-2024-50209
- Description:
RDMA/bnxt_re: Add a check for memory allocation
- CVE: https://ubuntu.com/security/CVE-2024-50209
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50209-rdma-bnxt-re-add-a-check-for-memory-allocation.patch
- From: 5.15.0-133.144
- CVE-2024-50154
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
- CVE: https://ubuntu.com/security/CVE-2024-50154
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50154-tcp-dccp-don-t-use-timer-pending-in-reqsk-queue-unlink-119.patch
- From: 5.15.0-133.144
- CVE-2024-50131
- Description:
tracing: Consider the NULL character when validating the event length
- CVE: https://ubuntu.com/security/CVE-2024-50131
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50131-tracing-consider-the-null-character-when-validating-the-event-length.patch
- From: 5.15.0-133.144
- CVE-2024-50127
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://ubuntu.com/security/CVE-2024-50127
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 5.15.0-133.144
- CVE-2024-50143
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://ubuntu.com/security/CVE-2024-50143
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50143-udf-fix-uninit-value-use-in-udf-get-fileshortad.patch
- From: 5.15.0-133.144
- CVE-2024-50151
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://ubuntu.com/security/CVE-2024-50151
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 5.15.0-133.144
- CVE-2024-50115
- Description:
KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
- CVE: https://ubuntu.com/security/CVE-2024-50115
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50115-kvm-nsvm-ignore-ncr3-4-0-when-loading-pdptes-from-memory.patch
- From: 5.15.0-133.144
- CVE-2024-50247
- Description:
fs/ntfs3: Check if more than chunk-size bytes are written
- CVE: https://ubuntu.com/security/CVE-2024-50247
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50247-fs-ntfs3-check-if-more-than-chunk-size-bytes-are-written.patch
- From: 5.15.0-133.144
- CVE-2024-50234
- Description:
wifi: iwlegacy: Clear stale interrupts before resuming device
- CVE: https://ubuntu.com/security/CVE-2024-50234
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50234-wifi-iwlegacy-clear-stale-interrupts-before-resuming-device.patch
- From: 5.15.0-133.144
- CVE-2024-50279
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50279
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 5.15.0-133.144
- CVE-2024-50278
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_bit-when-resizing.patch
- From: 5.15.0-133.144
- CVE-2024-50278
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 5.15.0-133.144
- CVE-2024-50036
- Description:
net: do not delay dst_entries_add() in dst_release()
- CVE: https://ubuntu.com/security/CVE-2024-50036
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50036-net-do-not-delay-dst-entries-add-in-dst-release.patch
- From: 5.15.0-133.144
- CVE-2024-50268
- Description:
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-50268
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50268-usb-typec-fix-potential-out-of-bounds-in-ucsi-ccg-update-set-new-cam-cmd.patch
- From: 5.15.0-133.144
- CVE-2024-50301
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://ubuntu.com/security/CVE-2024-50301
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 5.15.0-133.144
- CVE-2024-53059
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-53059
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53059-wifi-iwlwifi-mvm-fix-response-handling-in-iwl-mvm-send-recovery-cmd.patch
- From: 5.15.0-133.144
- CVE-2024-50262
- Description:
bpf: Fix out-of-bounds write in trie_get_next_key()
- CVE: https://ubuntu.com/security/CVE-2024-50262
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch
- From: 5.15.0-133.144
- CVE-2024-50230
- Description:
nilfs2: fix kernel bug due to missing clearing of checked flag
- CVE: https://ubuntu.com/security/CVE-2024-50230
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50230-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-checked-flag.patch
- From: 5.15.0-133.144
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://ubuntu.com/security/CVE-2024-53104
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 5.15.0-133.144
- CVE-2024-50269
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://ubuntu.com/security/CVE-2024-50269
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 5.15.0-133.144
- CVE-2024-50267
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://ubuntu.com/security/CVE-2024-50267
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 5.15.0-133.144
- CVE-2024-50083
- Description:
tcp: fix mptcp DSS corruption due to large pmtu xmit
- CVE: https://ubuntu.com/security/CVE-2024-50083
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50083-tcp-fix-mptcp-dss-corruption-due-to-large-pmtu-xmit.patch
- From: 5.15.0-133.144
- CVE-2024-53061
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://ubuntu.com/security/CVE-2024-53061
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 5.15.0-133.144
- ubuntu-jammy/5.15.0-133.144/CVE-2024-50282-drm-amdgpu-add-missing-size-check-in-amdgpu-debugfs-gprwave-read.patch
- Description:
The fix for this CVE was reverted in upstream Ubuntu kernel by the following commit (b0feddb6759a) Revert "drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()"
- CVE:
- Patch: skipped/ubuntu-jammy/5.15.0-133.144/CVE-2024-50282-drm-amdgpu-add-missing-size-check-in-amdgpu-debugfs-gprwave-read.patch
- From:
- CVE-2024-50257
- Description:
netfilter: Fix use-after-free in get_info()
- CVE: https://ubuntu.com/security/CVE-2024-50257
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50257-netfilter-fix-use-after-free-in-get-info.patch
- From: 5.15.0-133.144
- CVE-2024-40953
- Description:
KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()
- CVE: https://ubuntu.com/security/CVE-2024-40953
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-40953-kvm-fix-a-data-race-on-last-boosted-vcpu-in-kvm-vcpu-on-spin.patch
- From: 5.15.0-133.144
- CVE-2024-39497
- Description:
drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)
- CVE: https://ubuntu.com/security/CVE-2024-39497
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-39497-drm-shmem-helper-fix-bug-on-on-mmap-prot-write-map-private.patch
- From: 5.15.0-133.144
- CVE-2024-42252
- Description:
closures: Change BUG_ON() to WARN_ON()
- CVE: https://ubuntu.com/security/CVE-2024-42252
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-42252-closures-change-bug-on-to-warn-on.patch
- From: 5.15.0-133.144
- CVE-2024-41066
- Description:
ibmvnic: Add tx check to prevent skb leak
- CVE: https://ubuntu.com/security/CVE-2024-41066
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-41066-ibmvnic-add-tx-check-to-prevent-skb-leak.patch
- From: 5.15.0-133.144
- CVE-2024-50251
- Description:
netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
- CVE: https://ubuntu.com/security/CVE-2024-50251
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50251-netfilter-nft-payload-sanitize-offset-and-length-before-calling-skb-checksum.patch
- From: 5.15.0-133.144
- CVE-2023-52913
- Description:
drm/i915: Fix potential context UAFs
- CVE: https://ubuntu.com/security/CVE-2023-52913
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2023-52913-drm-i915-fix-potential-context-uafs.patch
- From: 5.15.0-133.144
- CVE-2024-41080
- Description:
io_uring: fix possible deadlock in io_register_iowq_max_workers()
- CVE: https://ubuntu.com/security/CVE-2024-41080
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-41080-io-uring-fix-possible-deadlock-in-io-register-iowq-max-workers.patch
- From: 5.15.0-133.144
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://ubuntu.com/security/CVE-2024-50302
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 5.15.0-133.144
- CVE-2024-26718
- Description:
dm-crypt, dm-verity: disable tasklets
- CVE: https://ubuntu.com/security/CVE-2024-26718
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-26718-dm-crypt-dm-verity-disable-tasklets.patch
- From: 5.15.0-133.144
- CVE-2024-26718
- Description:
dm-crypt, dm-verity: disable tasklets (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26718
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-26718-dm-crypt-dm-verity-disable-tasklets-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-50099
- Description:
arm64: probes: Remove broken LDR (literal) uprobe support
- CVE: https://ubuntu.com/security/CVE-2024-50099
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50099-arm64-probes-remove-broken-ldr-literal-uprobe-support.patch
- From: 5.15.0-133.144
- CVE-2024-50082
- Description:
blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
- CVE: https://ubuntu.com/security/CVE-2024-50082
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50082-blk-rq-qos-fix-crash-on-rq-qos-wait-vs-rq-qos-wake-function-race.patch
- From: 5.15.0-133.144
- CVE-2024-50010
- Description:
exec: don't WARN for racy path_noexec check
- CVE: https://ubuntu.com/security/CVE-2024-50010
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50010-exec-don-t-warn-for-racy-path-noexec-check.patch
- From: 5.15.0-133.144
- CVE-2024-50110
- Description:
xfrm: fix one more kernel-infoleak in algo dumping
- CVE: https://ubuntu.com/security/CVE-2024-50110
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50110-xfrm-fix-one-more-kernel-infoleak-in-algo-dumping.patch
- From: 5.15.0-133.144
- CVE-2024-50058
- Description:
serial: protect uart_port_dtr_rts() in uart_shutdown() too
- CVE: https://ubuntu.com/security/CVE-2024-50058
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50058-serial-protect-uart-port-dtr-rts-in-uart-shutdown-too.patch
- From: 5.15.0-133.144
- CVE-2024-50103
- Description:
ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
- CVE: https://ubuntu.com/security/CVE-2024-50103
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50103-asoc-qcom-fix-null-dereference-in-asoc-qcom-lpass-cpu-platform-probe.patch
- From: 5.15.0-133.144
- CVE-2024-50072
- Description:
Out of scope: x86 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-50072.patch
- From:
- CVE-2024-50116
- Description:
nilfs2: fix kernel bug due to missing clearing of buffer delay flag
- CVE: https://ubuntu.com/security/CVE-2024-50116
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50116-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-buffer-delay-flag.patch
- From: 5.15.0-133.144
- CVE-2024-42291
- Description:
ice: Add a per-VF limit on number of FDIR filters
- CVE: https://ubuntu.com/security/CVE-2024-42291
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-42291-ice-add-a-per-vf-limit-on-number-of-fdir-filters.patch
- From: 5.15.0-133.144
- CVE-2024-42291
- Description:
ice: Add a per-VF limit on number of FDIR filters (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-42291
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-42291-ice-add-a-per-vf-limit-on-number-of-fdir-filters-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-50160
- Description:
ALSA: hda/cs8409: Fix possible NULL dereference
- CVE: https://ubuntu.com/security/CVE-2024-50160
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50160-alsa-hda-cs8409-fix-possible-null-dereference.patch
- From: 5.15.0-133.144
- CVE-2024-50153
- Description:
scsi: target: core: Fix null-ptr-deref in target_alloc_device()
- CVE: https://ubuntu.com/security/CVE-2024-50153
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50153-scsi-target-core-fix-null-ptr-deref-in-target-alloc-device.patch
- From: 5.15.0-133.144
- CVE-2024-50148
- Description:
Bluetooth: bnep: fix wild-memory-access in proto_unregister
- CVE: https://ubuntu.com/security/CVE-2024-50148
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50148-bluetooth-bnep-fix-wild-memory-access-in-proto-unregister.patch
- From: 5.15.0-133.144
- CVE-2024-50148
- Description:
Bluetooth: bnep: fix wild-memory-access in proto_unregister kpatch
- CVE: https://ubuntu.com/security/CVE-2024-50148
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50148-bluetooth-bnep-fix-wild-memory-access-in-proto-unregister-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-50134
- Description:
drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA
- CVE: https://ubuntu.com/security/CVE-2024-50134
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50134-drm-vboxvideo-replace-fake-vla-at-end-of-vbva-mouse-pointer-shape-with-real-vla.patch
- From: 5.15.0-133.144
- CVE-2024-50117
- Description:
drm/amd: Guard against bad data for ATIF ACPI method
- CVE: https://ubuntu.com/security/CVE-2024-50117
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50117-drm-amd-guard-against-bad-data-for-atif-acpi-method.patch
- From: 5.15.0-133.144
- CVE-2024-50142
- Description:
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
- CVE: https://ubuntu.com/security/CVE-2024-50142
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch
- From: 5.15.0-133.144
- CVE-2024-50141
- Description:
ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context
- CVE: https://ubuntu.com/security/CVE-2024-50141
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50141-acpi-prm-find-efi-memory-runtime-block-for-prm-handler-and-context.patch
- From: 5.15.0-133.144
- CVE-2024-50141
- Description:
[PATCH] ACPI: PRM: Remove unnecessary strict handler address checks
- CVE: https://ubuntu.com/security/CVE-2024-50141
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50141-ACPI-PRM-Remove-unnecessary-strict-handler-address-checks.patch
- From: 5.15.0-133.144
- CVE-2024-53060
- Description:
[PATCH] drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
- CVE: https://ubuntu.com/security/CVE-2024-53060
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53060-drm-amdgpu-prevent-NULL-pointer-dereference-if-ATIF-is-not-supported.patch
- From: 5.15.0-133.144
- CVE-2024-50167
- Description:
be2net: fix potential memory leak in be_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-50167
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50167-be2net-fix-potential-memory-leak-in-be-xmit.patch
- From: 5.15.0-133.144
- CVE-2024-50168
- Description:
net/sun3_82586: fix potential memory leak in sun3_82586_send_packet()
- CVE: https://ubuntu.com/security/CVE-2024-50168
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50168-net-sun3-82586-fix-potential-memory-leak-in-sun3-82586-send-packet.patch
- From: 5.15.0-133.144
- CVE-2024-50171
- Description:
net: systemport: fix potential memory leak in bcm_sysport_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-50171
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50171-net-systemport-fix-potential-memory-leak-in-bcm-sysport-xmit.patch
- From: 5.15.0-133.144
- CVE-2024-50182
- Description:
secretmem: disable memfd_secret() if arch cannot set direct map
- CVE: https://ubuntu.com/security/CVE-2024-50182
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50182-secretmem-disable-memfd-secret-if-arch-cannot-set-direct-map.patch
- From: 5.15.0-133.144
- CVE-2024-50192
- Description:
arm64: Low-score CVE requiring adaptation that is hard to implement; targets very rare hardware
- CVE:
- Patch: skipped/CVE-2024-50192.patch
- From:
- CVE-2024-50195
- Description:
posix-clock: Fix missing timespec64 check in pc_clock_settime()
- CVE: https://ubuntu.com/security/CVE-2024-50195
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50195-posix-clock-fix-missing-timespec64-check-in-pc-clock-settime.patch
- From: 5.15.0-133.144
- CVE-2024-50195
- Description:
posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()
- CVE: https://ubuntu.com/security/CVE-2024-50195
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50195-posix-clock-posix-clock-fix-unbalanced-locking-in-pc-clock-settime.patch
- From: 5.15.0-133.144
- CVE-2024-50196
- Description:
pinctrl: ocelot: fix system hang on level based interrupts
- CVE: https://ubuntu.com/security/CVE-2024-50196
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50196-pinctrl-ocelot-fix-system-hang-on-level-based-interrupts.patch
- From: 5.15.0-133.144
- CVE-2024-50198
- Description:
iio: light: veml6030: fix IIO device retrieval from embedded device
- CVE: https://ubuntu.com/security/CVE-2024-50198
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50198-iio-light-veml6030-fix-iio-device-retrieval-from-embedded-device.patch
- From: 5.15.0-133.144
- CVE-2024-50199
- Description:
mm/swapfile: skip HugeTLB pages for unuse_vma
- CVE: https://ubuntu.com/security/CVE-2024-50199
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50199-mm-swapfile-skip-hugetlb-pages-for-unuse-vma.patch
- From: 5.15.0-133.144
- CVE-2024-50201
- Description:
drm/radeon: Fix encoder->possible_clones
- CVE: https://ubuntu.com/security/CVE-2024-50201
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50201-drm-radeon-fix-encoder-possible-clones.patch
- From: 5.15.0-133.144
- CVE-2024-50202
- Description:
nilfs2: propagate directory read errors from nilfs_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-50202
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50202-nilfs2-propagate-directory-read-errors-from-nilfs-find-entry-119.129.patch
- From: 5.15.0-133.144
- CVE-2024-50208
- Description:
RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
- CVE: https://ubuntu.com/security/CVE-2024-50208
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50208-rdma-bnxt-re-fix-a-bug-while-setting-up-level-2-pbl-pages.patch
- From: 5.15.0-133.144
- CVE-2024-50205
- Description:
ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
- CVE: https://ubuntu.com/security/CVE-2024-50205
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50205-alsa-firewire-lib-avoid-division-by-zero-in-apply-constraint-to-size.patch
- From: 5.15.0-133.144
- CVE-2024-50236
- Description:
wifi: ath10k: Fix memory leak in management tx
- CVE: https://ubuntu.com/security/CVE-2024-50236
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50236-wifi-ath10k-fix-memory-leak-in-management-tx.patch
- From: 5.15.0-133.144
- CVE-2024-50233
- Description:
staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg()
- CVE: https://ubuntu.com/security/CVE-2024-50233
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50233-staging-iio-frequency-ad9832-fix-division-by-zero-in-ad9832-calc-freqreg.patch
- From: 5.15.0-133.144
- CVE-2024-50232
- Description:
iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr()
- CVE: https://ubuntu.com/security/CVE-2024-50232
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50232-iio-adc-ad7124-fix-division-by-zero-in-ad7124-set-channel-odr.patch
- From: 5.15.0-133.144
- CVE-2024-50229
- Description:
nilfs2: fix potential deadlock with newly created symlinks
- CVE: https://ubuntu.com/security/CVE-2024-50229
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50229-nilfs2-fix-potential-deadlock-with-newly-created-symlinks.patch
- From: 5.15.0-133.144
- CVE-2024-50218
- Description:
ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow
- CVE: https://ubuntu.com/security/CVE-2024-50218
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50218-ocfs2-pass-u64-to-ocfs2-truncate-inline-maybe-overflow.patch
- From: 5.15.0-133.144
- CVE-2024-50259
- Description:
netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write()
- CVE: https://ubuntu.com/security/CVE-2024-50259
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50259-netdevsim-add-trailing-zero-to-terminate-the-string-in-nsim-nexthop-bucket-activity-write.patch
- From: 5.15.0-133.144
- CVE-2024-50245
- Description:
fs/ntfs3: Fix possible deadlock in mi_read
- CVE: https://ubuntu.com/security/CVE-2024-50245
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50245-fs-ntfs3-fix-possible-deadlock-in-mi-read.patch
- From: 5.15.0-133.144
- CVE-2024-50244
- Description:
fs/ntfs3: Additional check in ni_clear()
- CVE: https://ubuntu.com/security/CVE-2024-50244
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50244-fs-ntfs3-additional-check-in-ni-clear.patch
- From: 5.15.0-133.144
- CVE-2024-50237
- Description:
wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
- CVE: https://ubuntu.com/security/CVE-2024-50237
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50237-wifi-mac80211-do-not-pass-a-stopped-vif-to-the-driver-in-get-txpower.patch
- From: 5.15.0-133.144
- CVE-2024-50292
- Description:
ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove
- CVE: https://ubuntu.com/security/CVE-2024-50292
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50292-asoc-stm32-spdifrx-fix-dma-channel-release-in-stm32-spdifrx-remove.patch
- From: 5.15.0-133.144
- CVE-2024-50290
- Description:
media: cx24116: prevent overflows on SNR calculus
- CVE: https://ubuntu.com/security/CVE-2024-50290
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50290-media-cx24116-prevent-overflows-on-snr-calculus.patch
- From: 5.15.0-133.144
- CVE-2024-50287
- Description:
media: v4l2-tpg: prevent the risk of a division by zero
- CVE: https://ubuntu.com/security/CVE-2024-50287
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50287-media-v4l2-tpg-prevent-the-risk-of-a-division-by-zero.patch
- From: 5.15.0-133.144
- CVE-2024-50273
- Description:
btrfs: reinitialize delayed ref list after deleting it from the list
- CVE: https://ubuntu.com/security/CVE-2024-50273
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50273-btrfs-reinitialize-delayed-ref-list-after-deleting-it-from-the-list.patch
- From: 5.15.0-133.144
- CVE-2024-50265
- Description:
ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()
- CVE: https://ubuntu.com/security/CVE-2024-50265
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50265-ocfs2-remove-entry-once-instead-of-null-ptr-dereference-in-ocfs2-xa-remove.patch
- From: 5.15.0-133.144
- CVE-2024-50162
- Description:
[PATCH 2/2] bpf: devmap: provide rxq after redirect
- CVE: https://ubuntu.com/security/CVE-2024-50162
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50162-bpf-devmap-provide-rxq-after-redirect--post-5.15.0-1043-azure.patch
- From: 5.15.0-133.144
- CVE-2024-50163
- Description:
[PATCH 1/2] bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
- CVE: https://ubuntu.com/security/CVE-2024-50163
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50163-bpf-Make-sure-internal-and-UAPI-bpf_redirect-flags-don-t-overlap.patch
- From: 5.15.0-133.144
- CVE-2024-50163
- Description:
[PATCH 1/2] bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
- CVE: https://ubuntu.com/security/CVE-2024-50163
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50163-bpf-Make-sure-internal-and-UAPI-bpf_redirect-flags-don-t-overlap-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-53058
- Description:
net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data
- CVE: https://ubuntu.com/security/CVE-2024-53058
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53058-net-stmmac-tso-fix-unbalanced-dma-map-unmap-for-non-paged-skb-data.patch
- From: 5.15.0-133.144
- CVE-2024-53058
- Description:
net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data
- CVE: https://ubuntu.com/security/CVE-2024-53058
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53058-net-stmmac-fix-TSO-DMA-API-usage-causing-oops.patch
- From: 5.15.0-133.144
- CVE-2024-53055
- Description:
wifi: iwlwifi: mvm: fix 6 GHz scan construction
- CVE: https://ubuntu.com/security/CVE-2024-53055
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53055-wifi-iwlwifi-mvm-fix-6-ghz-scan-construction.patch
- From: 5.15.0-133.144
- CVE-2024-50299
- Description:
sctp: properly validate chunk size in sctp_sf_ootb()
- CVE: https://ubuntu.com/security/CVE-2024-50299
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50299-sctp-properly-validate-chunk-size-in-sctp-sf-ootb.patch
- From: 5.15.0-133.144
- CVE-2024-50296
- Description:
net: hns3: fix kernel crash when uninstalling driver
- CVE: https://ubuntu.com/security/CVE-2024-50296
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50296-net-hns3-fix-kernel-crash-when-uninstalling-driver.patch
- From: 5.15.0-133.144
- CVE-2024-50295
- Description:
The ndev->dev.parent mappings cannot be changed to ndev->dev.parent and driver is broken already
- CVE:
- Patch: skipped/CVE-2024-50295.patch
- From:
- CVE-2024-53063
- Description:
media: dvbdev: prevent the risk of out of memory access
- CVE: https://ubuntu.com/security/CVE-2024-53063
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53063-media-dvbdev-prevent-the-risk-of-out-of-memory-access.patch
- From: 5.15.0-133.144
- CVE-2024-53052
- Description:
io_uring/rw: fix missing NOWAIT check for O_DIRECT start write
- CVE: https://ubuntu.com/security/CVE-2024-53052
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53052-io-uring-rw-fix-missing-nowait-check-for-o-direct-start-write.patch
- From: 5.15.0-133.144
- CVE-2024-53052
- Description:
io_uring/rw: fix missing NOWAIT check for O_DIRECT start write
- CVE: https://ubuntu.com/security/CVE-2024-53052
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53052-fs-create-kiocb_-start-end-_write-helpers.patch
- From: 5.15.0-133.144
- CVE-2024-53066
- Description:
nfs: Fix KMSAN warning in decode_getfattr_attrs()
- CVE: https://ubuntu.com/security/CVE-2024-53066
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53066-nfs-fix-kmsan-warning-in-decode-getfattr-attrs.patch
- From: 5.15.0-133.144
- CVE-2024-53101
- Description:
fs: Fix uninitialized value issue in from_kuid and from_kgid
- CVE: https://ubuntu.com/security/CVE-2024-53101
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53101-fs-fix-uninitialized-value-issue-in-from-kuid-and-from-kgid.patch
- From: 5.15.0-133.144
- CVE-2024-50185
- Description:
mptcp: handle consistently DSS corruption
- CVE: https://ubuntu.com/security/CVE-2024-50185
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50185-mptcp-handle-consistently-DSS-corruption.patch
- From: 5.15.0-133.144
- CVE-2024-40965
- Description:
clk: Add a devm variant of clk_rate_exclusive_get()
- CVE: https://ubuntu.com/security/CVE-2024-40965
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-40965-clk-add-a-devm-variant-of-clk-rate-exclusive-get.patch
- From: 5.15.0-133.144
- CVE-2024-40965
- Description:
clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get()
- CVE: https://ubuntu.com/security/CVE-2024-40965
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-40965-clk-provide-common-clk-dummy-for-devm-clk-rate-exclusive-get.patch
- From: 5.15.0-133.144
- CVE-2024-40965
- Description:
i2c: lpi2c: Avoid calling clk_get_rate during transfer
- CVE: https://ubuntu.com/security/CVE-2024-40965
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-40965-i2c-lpi2c-avoid-calling-clk-get-rate-during-transfer.patch
- From: 5.15.0-133.144
- CVE-2024-40965
- Description:
i2c: lpi2c: Avoid calling clk_get_rate during transfer (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-40965
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-40965-i2c-lpi2c-avoid-calling-clk-get-rate-during-transfer-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-53088
- Description:
i40e: fix race condition by adding filter's intermediate sync state
- CVE: https://ubuntu.com/security/CVE-2024-53088
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53088-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state-5.15.0-113.123.patch
- From: 5.15.0-133.144
- CVE-2024-53088
- Description:
i40e: fix race condition by adding filter's intermediate sync state
- CVE: https://ubuntu.com/security/CVE-2024-53088
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53088-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-49996
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://ubuntu.com/security/CVE-2024-49996
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points.patch
- From: 5.15.0-135.146
- CVE-2024-50055
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://ubuntu.com/security/CVE-2024-50055
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 5.15.0-135.146
- CVE-2024-50051
- Description:
spi: mpc52xx: Add cancel_work_sync before module remove
- CVE: https://ubuntu.com/security/CVE-2024-50051
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50051-spi-mpc52xx-add-cancel-work-sync-before-module-remove.patch
- From: 5.15.0-135.146
- CVE-2024-47730
- Description:
crypto: hisilicon/qm - inject error before stopping queue
- CVE: https://ubuntu.com/security/CVE-2024-47730
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47730-crypto-hisilicon-qm-inject-error-before-stopping-queue.patch
- From: 5.15.0-135.146
- CVE-2024-43900
- Description:
media: xc2028: avoid use-after-free in load_firmware_cb()
- CVE: https://ubuntu.com/security/CVE-2024-43900
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-43900-media-xc2028-avoid-use-after-free-in-load-firmware-cb.patch
- From: 5.15.0-135.146
- CVE-2024-50242
- Description:
fs/ntfs3: Additional check in ntfs_file_release
- CVE: https://ubuntu.com/security/CVE-2024-50242
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50242-fs-ntfs3-additional-check-in-ntfs-file-release.patch
- From: 5.15.0-135.146
- CVE-2024-56619
- Description:
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-56619
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56619-nilfs2-fix-potential-out-of-bounds-memory-access-in-nilfs-find-entry.patch
- From: 5.15.0-135.146
- CVE-2024-56615
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56615
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 5.15.0-135.146
- CVE-2024-56614
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56614
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 5.15.0-135.146
- CVE-2024-56606
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56606
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create-119.patch
- From: 5.15.0-135.146
- CVE-2024-56605
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://ubuntu.com/security/CVE-2024-56605
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.15.0-135.146
- CVE-2024-56603
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://ubuntu.com/security/CVE-2024-56603
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.15.0-135.146
- CVE-2024-56602
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://ubuntu.com/security/CVE-2024-56602
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.15.0-135.146
- CVE-2024-56601
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56601
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.15.0-135.146
- CVE-2024-56626
- Description:
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
- CVE: https://ubuntu.com/security/CVE-2024-56626
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56626-ksmbd-fix-out-of-bounds-write-in-ksmbd-vfs-stream-write-101.patch
- From: 5.15.0-135.146
- CVE-2024-57896
- Description:
btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount
- CVE: https://ubuntu.com/security/CVE-2024-57896
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57896-btrfs-flush-delalloc-workers-queue-before-stopping-cleaner-kthread-during-unmount.patch
- From: 5.15.0-135.146
- CVE-2024-57900
- Description:
ila: serialize calls to nf_register_net_hooks()
- CVE: https://ubuntu.com/security/CVE-2024-57900
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57900-ila-serialize-calls-to-nf-register-net-hooks.patch
- From: 5.15.0-135.146
- CVE-2025-21680
- Description:
pktgen: Avoid out-of-bounds access in get_imix_entries
- CVE: https://ubuntu.com/security/CVE-2025-21680
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21680-pktgen-avoid-out-of-bounds-access-in-get-imix-entries.patch
- From: 5.15.0-135.146
- CVE-2025-21687
- Description:
vfio/platform: check the bounds of read/write syscalls
- CVE: https://ubuntu.com/security/CVE-2025-21687
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21687-vfio-platform-check-the-bounds-of-read-write-syscalls.patch
- From: 5.15.0-135.146
- CVE-2025-21692
- Description:
net: sched: fix ets qdisc OOB Indexing
- CVE: https://ubuntu.com/security/CVE-2025-21692
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21692-net-sched-fix-ets-qdisc-oob-indexing.patch
- From: 5.15.0-135.146
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://ubuntu.com/security/CVE-2024-53150
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.15.0-135.146
- CVE-2024-53155
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://ubuntu.com/security/CVE-2024-53155
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 5.15.0-135.146
- CVE-2024-56650
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://ubuntu.com/security/CVE-2024-56650
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 5.15.0-135.146
- CVE-2024-50275
- Description:
arm64/sve: Discard stale CPU state when handling SVE traps
- CVE: https://ubuntu.com/security/CVE-2024-50275
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50275-arm64-sve-discard-stale-cpu-state-when-handling-sve-traps.patch
- From: 5.15.0-135.146
- CVE-2024-56662
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://ubuntu.com/security/CVE-2024-56662
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi-nfit-ctl.patch
- From: 5.15.0-135.146
- CVE-2024-56627
- Description:
ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
- CVE: https://ubuntu.com/security/CVE-2024-56627
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56627-ksmbd-fix-out-of-bounds-read-in-ksmbd-vfs-stream-read.patch
- From: 5.15.0-135.146
- CVE-2024-57912
- Description:
iio: pressure: zpa2326: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57912
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57912-iio-pressure-zpa2326-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57911
- Description:
iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57911
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57911-iio-dummy-iio-simply-dummy-buffer-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57910
- Description:
iio: light: vcnl4035: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57910
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57910-iio-light-vcnl4035-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57908
- Description:
iio: imu: kmx61: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57908
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57908-iio-imu-kmx61-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57906
- Description:
iio: adc: ti-ads8688: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57906
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57906-iio-adc-ti-ads8688-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-36899
- Description:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
- CVE: https://ubuntu.com/security/CVE-2024-36899
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-36899-gpiolib-cdev-fix-use-after-free-in-lineinfo-changed-notify.patch
- From: 5.15.0-135.146
- CVE-2024-57907
- Description:
iio: adc: rockchip_saradc: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57907
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57907-iio-adc-rockchip-saradc-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch-uek7.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2022-49034
- Description:
Out of scope: SuperH arch not supported.
- CVE:
- Patch: skipped/CVE-2022-49034.patch
- From:
- CVE-2024-57874
- Description:
arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL
- CVE: https://ubuntu.com/security/CVE-2024-57874
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57874-arm64-ptrace-fix-partial-setregset-for-nt-arm-tagged-addr-ctrl.patch
- From: 5.15.0-135.146
- CVE-2024-45828
- Description:
i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request
- CVE: https://ubuntu.com/security/CVE-2024-45828
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-45828-i3c-mipi-i3c-hci-mask-ring-interrupts-before-ring-stop-request.patch
- From: 5.15.0-135.146
- CVE-2024-43098
- Description:
i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock
- CVE: https://ubuntu.com/security/CVE-2024-43098
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-43098-i3c-use-i3cdev-desc-info-instead-of-calling-i3c-device-get-info-to-avoid-deadlock.patch
- From: 5.15.0-135.146
- CVE-2024-46809
- Description:
drm/amd/display: Check BIOS images before it is used
- CVE: https://ubuntu.com/security/CVE-2024-46809
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46809-drm-amd-display-check-bios-images-before-it-is-used.patch
- From: 5.15.0-135.146
- CVE-2024-36476
- Description:
RDMA/rtrs: Ensure 'ib_sge list' is accessible
- CVE: https://ubuntu.com/security/CVE-2024-36476
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-36476-rdma-rtrs-ensure-ib-sge-list-is-accessible.patch
- From: 5.15.0-135.146
- CVE-2024-44938
- Description:
jfs: Fix shift-out-of-bounds in dbDiscardAG
- CVE: https://ubuntu.com/security/CVE-2024-44938
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-44938-jfs-fix-shift-out-of-bounds-in-dbdiscardag.patch
- From: 5.15.0-135.146
- CVE-2024-53158
- Description:
soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()
- CVE: https://ubuntu.com/security/CVE-2024-53158
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53158-soc-qcom-geni-se-fix-array-underflow-in-geni-se-clk-tbl-get.patch
- From: 5.15.0-135.146
- CVE-2025-21683
- Description:
bpf: Fix bpf_sk_select_reuseport() memory leak
- CVE: https://ubuntu.com/security/CVE-2025-21683
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21683-bpf-fix-bpf-sk-select-reuseport-memory-leak.patch
- From: 5.15.0-135.146
- CVE-2025-21678
- Description:
gtp: Destroy device along with udp socket's netns dismantle.
- CVE: https://ubuntu.com/security/CVE-2025-21678
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21678-gtp-destroy-device-along-with-udp-socket-s-netns-dismantle.patch
- From: 5.15.0-135.146
- CVE-2025-21697
- Description:
drm/v3d: Ensure job pointer is set to NULL after job completion
- CVE: https://ubuntu.com/security/CVE-2025-21697
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21697-drm-v3d-ensure-job-pointer-is-set-to-null-after-job-completion.patch
- From: 5.15.0-135.146
- CVE-2025-21697
- Description:
drm/v3d: Assign job pointer to NULL before signaling the fence
- CVE: https://ubuntu.com/security/CVE-2025-21697
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21697-drm-v3d-Assign-job-pointer-to-NULL-before-signaling-the-fence.patch
- From: 5.15.0-135.146
- CVE-2025-21669
- Description:
vsock/virtio: discard packets if the transport changes
- CVE: https://ubuntu.com/security/CVE-2025-21669
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21669-vsock-virtio-discard-packets-if-the-transport-changes.patch
- From: 5.15.0-135.146
- CVE-2025-21699
- Description:
gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
- CVE: https://ubuntu.com/security/CVE-2025-21699
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21699-gfs2-truncate-address-space-when-flipping-gfs2-dif-jdata-flag.patch
- From: 5.15.0-135.146
- CVE-2025-21690
- Description:
scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
- CVE: https://ubuntu.com/security/CVE-2025-21690
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21690-scsi-storvsc-ratelimit-warning-logs-to-prevent-vm-denial-of-service.patch
- From: 5.15.0-135.146
- CVE-2025-21689
- Description:
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
- CVE: https://ubuntu.com/security/CVE-2025-21689
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21689-usb-serial-quatech2-fix-null-ptr-deref-in-qt2-process-read-urb.patch
- From: 5.15.0-135.146
- CVE-2024-49950
- Description:
Bluetooth: L2CAP: Fix uaf in l2cap_connect
- CVE: https://ubuntu.com/security/CVE-2024-49950
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49950-Bluetooth-L2CAP-Fix-uaf-in-l2cap_connect.patch
- From: 5.15.0-135.146
- CVE-2024-49950
- Description:
Bluetooth: hci_core: Fix calling mgmt_device_connected
- CVE: https://ubuntu.com/security/CVE-2024-49950
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49950-Bluetooth-hci_core-Fix-calling-mgmt_device_connected.patch
- From: 5.15.0-135.146
- CVE-2024-53161
- Description:
EDAC/bluefield: Fix potential integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-53161
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53161-edac-bluefield-fix-potential-integer-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-53157
- Description:
firmware: arm_scpi: Check the DVFS OPP count returned by the firmware
- CVE: https://ubuntu.com/security/CVE-2024-53157
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53157-firmware-arm-scpi-check-the-dvfs-opp-count-returned-by-the-firmware.patch
- From: 5.15.0-135.146
- CVE-2024-53214
- Description:
vfio/pci: Properly hide first-in-list PCIe extended capability
- CVE: https://ubuntu.com/security/CVE-2024-53214
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53214-vfio-pci-properly-hide-first-in-list-pcie-extended-capability.patch
- From: 5.15.0-135.146
- CVE-2024-53198
- Description:
xen: Fix the issue of resource not being properly released in xenbus_dev_probe()
- CVE: https://ubuntu.com/security/CVE-2024-53198
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53198-xen-fix-the-issue-of-resource-not-being-properly-released-in-xenbus-dev-probe.patch
- From: 5.15.0-135.146
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 5.15.0-135.146
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix a DMA to stack memory bug
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53197-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch
- From: 5.15.0-135.146
- CVE-2024-53184
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53184.patch
- From:
- CVE-2024-53183
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53183.patch
- From:
- CVE-2024-53181
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53181.patch
- From:
- CVE-2024-53180
- Description:
ALSA: pcm: Add sanity NULL check for the default mmap fault handler
- CVE: https://ubuntu.com/security/CVE-2024-53180
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53180-alsa-pcm-add-sanity-null-check-for-the-default-mmap-fault-handler.patch
- From: 5.15.0-135.146
- CVE-2024-53172
- Description:
ubi: fastmap: Fix duplicate slab cache names while attaching
- CVE: https://ubuntu.com/security/CVE-2024-53172
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53172-ubi-fastmap-fix-duplicate-slab-cache-names-while-attaching.patch
- From: 5.15.0-135.146
- CVE-2024-56708
- Description:
EDAC/igen6: Avoid segmentation fault on module unload
- CVE: https://ubuntu.com/security/CVE-2024-56708
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56708-edac-igen6-avoid-segmentation-fault-on-module-unload.patch
- From: 5.15.0-135.146
- CVE-2024-56678
- Description:
powerpc: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-56678.patch
- From:
- CVE-2024-56704
- Description:
9p/xen: fix release of IRQ
- CVE: https://ubuntu.com/security/CVE-2024-56704
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 5.15.0-135.146
- CVE-2024-56642
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://ubuntu.com/security/CVE-2024-56642
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.15.0-135.146
- CVE-2024-56640
- Description:
net/smc: fix LGR and link use-after-free issue
- CVE: https://ubuntu.com/security/CVE-2024-56640
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56640-net-smc-fix-lgr-and-link-use-after-free-issue.patch
- From: 5.15.0-135.146
- CVE-2024-57850
- Description:
jffs2: Prevent rtime decompress memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-57850
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57850-jffs2-prevent-rtime-decompress-memory-corruption.patch
- From: 5.15.0-135.146
- CVE-2024-56759
- Description:
btrfs: fix use-after-free when COWing tree bock and tracing is enabled
- CVE: https://ubuntu.com/security/CVE-2024-56759
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56759-btrfs-fix-use-after-free-when-cowing-tree-bock-and-tracing-is-enabled-5.15.0-97.107.patch
- From: 5.15.0-135.146
- CVE-2024-57892
- Description:
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
- CVE: https://ubuntu.com/security/CVE-2024-57892
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57892-ocfs2-fix-slab-use-after-free-due-to-dangling-pointer-dqi-priv.patch
- From: 5.15.0-135.146
- CVE-2024-56631
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://ubuntu.com/security/CVE-2024-56631
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 5.15.0-135.146
- CVE-2024-58087
- Description:
ksmbd: fix user-after-free from session log off
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-58087-ksmbd-fix-user-after-free-from-session-log-off-upto-100.110.patch
- From: 5.15.0-135.146
- CVE-2024-58087
- Description:
ksmbd: fix user-after-free from session log off
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-58087-ksmbd-fix-user-after-free-from-session-log-off-kpatch-upto-100.110.patch
- From: 5.15.0-135.146
- CVE-2024-58087
- Description:
ksmbd: fix racy issue from session lookup and expire
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-58087-ksmbd-fix-racy-issue-from-session-lookup-and-expire-upto-92.102.patch
- From: 5.15.0-135.146
- CVE-2024-46841
- Description:
btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()
- CVE: https://ubuntu.com/security/CVE-2024-46841
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46841-btrfs-don-t-bug-on-on-enomem-from-btrfs-lookup-extent-info-in-walk-down-proc.patch
- From: 5.15.0-135.146
- CVE-2024-47143
- Description:
dma-debug: fix a possible deadlock on radix_lock
- CVE: https://ubuntu.com/security/CVE-2024-47143
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47143-dma-debug-fix-a-possible-deadlock-on-radix-lock.patch
- From: 5.15.0-135.146
- CVE-2024-47408
- Description:
net/smc: check smcd_v2_ext_offset when receiving proposal msg
- CVE: https://ubuntu.com/security/CVE-2024-47408
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47408-net-smc-check-smcd-v2-ext-offset-when-receiving-proposal-msg.patch
- From: 5.15.0-135.146
- CVE-2024-47707
- Description:
ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
- CVE: https://ubuntu.com/security/CVE-2024-47707
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47707-ipv6-avoid-possible-null-deref-in-rt6-uncached-list-flush-dev.patch
- From: 5.15.0-135.146
- CVE-2024-48881
- Description:
bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again
- CVE: https://ubuntu.com/security/CVE-2024-48881
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-48881-bcache-revert-replacing-is-err-or-null-with-is-err-again.patch
- From: 5.15.0-135.146
- CVE-2024-49571
- Description:
net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg
- CVE: https://ubuntu.com/security/CVE-2024-49571
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49571-net-smc-check-iparea-offset-and-ipv6-prefixes-cnt-when-receiving-proposal-msg.patch
- From: 5.15.0-135.146
- CVE-2024-50304
- Description:
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
- CVE: https://ubuntu.com/security/CVE-2024-50304
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50304-ipv4-ip-tunnel-fix-suspicious-rcu-usage-warning-in-ip-tunnel-find.patch
- From: 5.15.0-135.146
- CVE-2025-21648
- Description:
netfilter: conntrack: clamp maximum hashtable size to INT_MAX
- CVE: https://ubuntu.com/security/CVE-2025-21648
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21648-netfilter-conntrack-clamp-maximum-hashtable-size-to-int-max.patch
- From: 5.15.0-135.146
- CVE-2025-21646
- Description:
afs: Fix the maximum cell name length
- CVE: https://ubuntu.com/security/CVE-2025-21646
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21646-afs-fix-the-maximum-cell-name-length.patch
- From: 5.15.0-135.146
- CVE-2025-21664
- Description:
dm thin: make get_first_thin use rcu-safe list first function
- CVE: https://ubuntu.com/security/CVE-2025-21664
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21664-dm-thin-make-get-first-thin-use-rcu-safe-list-first-function.patch
- From: 5.15.0-135.146
- CVE-2025-21640
- Description:
sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21640
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21640-sctp-sysctl-cookie-hmac-alg-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21639
- Description:
sctp: sysctl: rto_min/max: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21639
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21639-sctp-sysctl-rto-min-max-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21638
- Description:
sctp: sysctl: auth_enable: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21638
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21638-sctp-sysctl-auth-enable-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21637
- Description:
sctp: sysctl: udp_port: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21637
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21637-sctp-sysctl-udp-port-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21666
- Description:
vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
- CVE: https://ubuntu.com/security/CVE-2025-21666
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21666-vsock-prevent-null-ptr-deref-in-vsock-has-data-has-space.patch
- From: 5.15.0-135.146
- CVE-2025-21665
- Description:
filemap: avoid truncating 64-bit offset to 32 bits
- CVE: https://ubuntu.com/security/CVE-2025-21665
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21665-filemap-avoid-truncating-64-bit-offset-to-32-bits.patch
- From: 5.15.0-135.146
- CVE-2025-21653
- Description:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
- CVE: https://ubuntu.com/security/CVE-2025-21653
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21653-net-sched-cls-flow-validate-tca-flow-rshift-attribute.patch
- From: 5.15.0-135.146
- CVE-2025-21653
- Description:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (adaptation)
- CVE: https://ubuntu.com/security/CVE-2025-21653
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21653-net-sched-cls-flow-validate-tca-flow-rshift-attribute-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-57897
- Description:
drm/amdkfd: Correct the migration DMA map direction
- CVE: https://ubuntu.com/security/CVE-2024-57897
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57897-drm-amdkfd-correct-the-migration-dma-map-direction.patch
- From: 5.15.0-135.146
- CVE-2024-57884
- Description:
mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()
- CVE: https://ubuntu.com/security/CVE-2024-57884
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57884-mm-vmscan-account-for-free-pages-to-prevent-infinite-loop-in-throttle-direct-reclaim.patch
- From: 5.15.0-135.146
- CVE-2024-57913
- Description:
usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
- CVE: https://ubuntu.com/security/CVE-2024-57913
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57913-usb-gadget-f-fs-remove-warn-on-in-functionfs-bind.patch
- From: 5.15.0-135.146
- CVE-2024-57904
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57904.patch
- From:
- CVE-2024-57882
- Description:
mptcp: fix TCP options overflow.
- CVE: https://ubuntu.com/security/CVE-2024-57882
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57882-mptcp-fix-tcp-options-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-56693
- Description:
brd: remove brd_devices_mutex mutex
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56693-brd-remove-brd_devices_mutex-mutex-dep.patch
- From: 5.15.0-135.146
- CVE-2024-56693
- Description:
brd: defer automatic disk creation until module initialization succeeds
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56693-brd-defer-automatic-disk-creation-until-module-initialization-succeeds.patch
- From: 5.15.0-135.146
- CVE-2024-46871
- Description:
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
- CVE: https://ubuntu.com/security/CVE-2024-46871
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46871-drm-amd-display-Correct-the-defined-value-for-AMDGPU_DMUB_NOTIFICATION_MAX.patch
- From: 5.15.0-135.146
- CVE-2024-46871
- Description:
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
- CVE: https://ubuntu.com/security/CVE-2024-46871
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46871-drm-amd-display-Correct-the-defined-value-for-AMDGPU_DMUB_NOTIFICATION_MAX-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-56548
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times.patch
- From: 5.15.0-135.146
- CVE-2024-56548
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-52332
- Description:
igb: Fix potential invalid memory access in igb_init_module()
- CVE: https://ubuntu.com/security/CVE-2024-52332
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-52332-igb-fix-potential-invalid-memory-access-in-igb-init-module.patch
- From: 5.15.0-135.146
- CVE-2024-53112
- Description:
ocfs2: uncache inode which has failed entering the group
- CVE: https://ubuntu.com/security/CVE-2024-53112
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53112-ocfs2-uncache-inode-which-has-failed-entering-the-group.patch
- From: 5.15.0-135.146
- CVE-2024-53113
- Description:
mm: fix NULL pointer dereference in alloc_pages_bulk_noprof
- CVE: https://ubuntu.com/security/CVE-2024-53113
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53113-mm-fix-null-pointer-dereference-in-alloc-pages-bulk-noprof.patch
- From: 5.15.0-135.146
- CVE-2024-53119
- Description:
virtio/vsock: Fix accept_queue memory leak
- CVE: https://ubuntu.com/security/CVE-2024-53119
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53119-virtio-vsock-fix-accept-queue-memory-leak.patch
- From: 5.15.0-135.146
- CVE-2024-53120
- Description:
net/mlx5e: CT: Fix null-ptr-deref in add rule err flow
- CVE: https://ubuntu.com/security/CVE-2024-53120
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53120-net-mlx5e-ct-fix-null-ptr-deref-in-add-rule-err-flow.patch
- From: 5.15.0-135.146
- CVE-2024-53121
- Description:
net/mlx5: fs, lock FTE when checking if active
- CVE: https://ubuntu.com/security/CVE-2024-53121
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53121-net-mlx5-fs-lock-fte-when-checking-if-active.patch
- From: 5.15.0-135.146
- CVE-2024-53122
- Description:
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
- CVE: https://ubuntu.com/security/CVE-2024-53122
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch
- From: 5.15.0-135.146
- CVE-2024-53124
- Description:
net: fix data-races around sk->sk_forward_alloc
- CVE: https://ubuntu.com/security/CVE-2024-53124
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53124-net-fix-data-races-around-sk-sk-forward-alloc.patch
- From: 5.15.0-135.146
- CVE-2024-57889
- Description:
pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking
- CVE: https://ubuntu.com/security/CVE-2024-57889
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57889-pinctrl-mcp23s08-fix-sleeping-in-atomic-context-due-to-regmap-locking.patch
- From: 5.15.0-135.146
- CVE-2024-57889
- Description:
pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-57889
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57889-pinctrl-mcp23s08-fix-sleeping-in-atomic-context-due-to-regmap-locking-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-57890
- Description:
RDMA/uverbs: Prevent integer overflow issue
- CVE: https://ubuntu.com/security/CVE-2024-57890
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57890-rdma-uverbs-prevent-integer-overflow-issue.patch
- From: 5.15.0-135.146
- CVE-2024-57903
- Description:
net: restrict SO_REUSEPORT to inet sockets
- CVE: https://ubuntu.com/security/CVE-2024-57903
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57903-net-restrict-so-reuseport-to-inet-sockets.patch
- From: 5.15.0-135.146
- CVE-2024-53239
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53239-alsa-6fire-release-resources-at-card-release.patch
- From: 5.15.0-135.146
- CVE-2024-53227
- Description:
scsi: bfa: Fix use-after-free in bfad_im_module_exit()
- CVE: https://ubuntu.com/security/CVE-2024-53227
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53227-scsi-bfa-fix-use-after-free-in-bfad-im-module-exit.patch
- From: 5.15.0-135.146
- CVE-2024-56581
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://ubuntu.com/security/CVE-2024-56581
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 5.15.0-135.146
- CVE-2024-56558
- Description:
nfsd: make sure exp active before svc_export_show
- CVE: https://ubuntu.com/security/CVE-2024-56558
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56558-nfsd-make-sure-exp-active-before-svc-export-show.patch
- From: 5.15.0-135.146
- CVE-2024-56600
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://ubuntu.com/security/CVE-2024-56600
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.15.0-135.146
- CVE-2024-56598
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://ubuntu.com/security/CVE-2024-56598
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 5.15.0-135.146
- CVE-2024-56596
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://ubuntu.com/security/CVE-2024-56596
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.15.0-135.146
- CVE-2024-56595
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2024-56595
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-135.146
- CVE-2024-56644
- Description:
net/ipv6: release expired exception dst cached in socket
- CVE: https://ubuntu.com/security/CVE-2024-56644
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56644-net-ipv6-release-expired-exception-dst-cached-in-socket.patch
- From: 5.15.0-135.146
- CVE-2024-53125
- Description:
bpf: sync_linked_regs() must preserve subreg_def
- CVE: https://ubuntu.com/security/CVE-2024-53125
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53125-bpf-sync_linked_regs-must-preserve-subreg_def.patch
- From: 5.15.0-135.146
- CVE-2024-57917
- Description:
topology: Keep the cpumask unchanged when printing cpumap
- CVE: https://ubuntu.com/security/CVE-2024-57917
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57917-topology-keep-the-cpumask-unchanged-when-printing-cpumap.patch
- From: 5.15.0-135.146
- CVE-2024-57922
- Description:
drm/amd/display: Add check for granularity in dml ceil/floor helpers
- CVE: https://ubuntu.com/security/CVE-2024-57922
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57922-drm-amd-display-add-check-for-granularity-in-dml-ceil-floor-helpers.patch
- From: 5.15.0-135.146
- CVE-2024-57929
- Description:
dm array: fix releasing a faulty array block twice in dm_array_cursor_end
- CVE: https://ubuntu.com/security/CVE-2024-57929
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57929-dm-array-fix-releasing-a-faulty-array-block-twice-in-dm-array-cursor-end.patch
- From: 5.15.0-135.146
- CVE-2024-57931
- Description:
selinux: ignore unknown extended permissions
- CVE: https://ubuntu.com/security/CVE-2024-57931
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57931-selinux-ignore-unknown-extended-permissions.patch
- From: 5.15.0-135.146
- CVE-2024-57938
- Description:
net/sctp: Prevent autoclose integer overflow in sctp_association_init()
- CVE: https://ubuntu.com/security/CVE-2024-57938
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57938-net-sctp-prevent-autoclose-integer-overflow-in-sctp-association-init.patch
- From: 5.15.0-135.146
- CVE-2024-57939
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57939.patch
- From:
- CVE-2024-57940
- Description:
exfat: fix the infinite loop in exfat_readdir()
- CVE: https://ubuntu.com/security/CVE-2024-57940
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57940-exfat-fix-the-infinite-loop-in-exfat-readdir.patch
- From: 5.15.0-135.146
- CVE-2024-57946
- Description:
virtio-blk: Ensure no requests in virtqueues before deleting vqs.
- CVE: https://ubuntu.com/security/CVE-2024-57946
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57946-virtio-blk-ensure-no-requests-in-virtqueues-before-deleting-vqs.patch
- From: 5.15.0-135.146
- CVE-2024-57946
- Description:
virtio-blk: don't keep queue frozen during system suspend
- CVE: https://ubuntu.com/security/CVE-2024-57946
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57946-virtio-blk-don-t-keep-queue-frozen-during-system-suspend.patch
- From: 5.15.0-135.146
- CVE-2024-57948
- Description:
mac802154: check local interfaces before deleting sdata list
- CVE: https://ubuntu.com/security/CVE-2024-57948
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57948-mac802154-check-local-interfaces-before-deleting-sdata-list.patch
- From: 5.15.0-135.146
- CVE-2025-21636
- Description:
sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21636
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21636-sctp-sysctl-plpmtud-probe-interval-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2024-53129
- Description:
drm/rockchip: vop: Fix a dereferenced before check warning
- CVE: https://ubuntu.com/security/CVE-2024-53129
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53129-drm-rockchip-vop-fix-a-dereferenced-before-check-warning.patch
- From: 5.15.0-135.146
- CVE-2024-53131
- Description:
nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
- CVE: https://ubuntu.com/security/CVE-2024-53131
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53131-nilfs2-fix-null-ptr-deref-in-block-touch-buffer-tracepoint.patch
- From: 5.15.0-135.146
- CVE-2024-53130
- Description:
nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint
- CVE: https://ubuntu.com/security/CVE-2024-53130
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53130-nilfs2-fix-null-ptr-deref-in-block-dirty-buffer-tracepoint.patch
- From: 5.15.0-135.146
- CVE-2024-53151
- Description:
svcrdma: Address an integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-53151
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53151-svcrdma-address-an-integer-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-53148
- Description:
comedi: Flush partial mappings in error case
- CVE: https://ubuntu.com/security/CVE-2024-53148
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53148-comedi-flush-partial-mappings-in-error-case.patch
- From: 5.15.0-135.146
- CVE-2024-53146
- Description:
NFSD: Prevent a potential integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-53146
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53146-nfsd-prevent-a-potential-integer-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-53145
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53145.patch
- From:
- CVE-2024-53138
- Description:
net/mlx5e: kTLS, Fix incorrect page refcounting
- CVE: https://ubuntu.com/security/CVE-2024-53138
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53138-net-mlx5e-ktls-fix-incorrect-page-refcounting.patch
- From: 5.15.0-135.146
- CVE-2024-53140
- Description:
[PATCH] netlink: terminate outstanding dump on socket close
- CVE: https://ubuntu.com/security/CVE-2024-53140
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53140-netlink-terminate-outstanding-dump-on-socket-close-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle.patch
- From: 5.15.0-136.147
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch-113.patch
- From: 5.15.0-136.147
- CVE-2024-35864
- Description:
smb: client: fix potential UAF in smb2_is_valid_lease_break()
- CVE: https://ubuntu.com/security/CVE-2024-35864
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-35864-smb-client-fix-potential-uaf-in-smb2-is-valid-lease-break-azure.patch
- From: 5.15.0-136.147
- CVE-2024-35864 CVE-2024-26928
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://ubuntu.com/security/CVE-2024-26928
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-26928-CVE-2024-35864-smb-client-fix-potential-uaf-in-cifs-debug-files-proc-show-azure-1074.patch
- From: 5.15.0-136.147
- CVE-2024-57798
- Description:
drm/dp_mst: Skip CSN if topology probing is not done yet
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-57798-drm-dp-mst-skip-csn-if-topology-probing-is-not-done-yet.patch
- From: 5.15.0-136.147
- CVE-2024-57798
- Description:
drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-57798-drm-dp-mst-ensure-mst-primary-pointer-is-valid-in-drm-dp-mst-handle-up-req.patch
- From: 5.15.0-136.147
- CVE-2025-21701
- Description:
net: avoid race between device unregistration and ethnl ops
- CVE: https://ubuntu.com/security/CVE-2025-21701
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21701-net-avoid-race-between-device-unregistration-and-ethnl-ops.patch
- From: 5.15.0-138.148
- CVE-2022-0995
- Description:
watch_queue: Use the bitmap API when applicable
- CVE: https://ubuntu.com/security/CVE-2022-0995
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2022-0995-watch-queue-use-the-bitmap-api-when-applicable.patch
- From: 5.15.0-138.148
- CVE-2024-50248
- Description:
ntfs3: Add bounds checking to mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-50248
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50248-ntfs3-add-bounds-checking-to-mi-enum-attr.patch
- From: 5.15.0-138.148
- CVE-2024-50248
- Description:
fs/ntfs3: Sequential field availability check in mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-50248
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50248-fs-ntfs3-sequential-field-availability-check-in-mi-enum-attr.patch
- From: 5.15.0-138.148
- CVE-2025-21993
- Description:
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
- CVE: https://ubuntu.com/security/CVE-2025-21993
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21993-iscsi-ibft-fix-ubsan-shift-out-of-bounds-warning-in-ibft-attr-show-nic.patch
- From: 5.15.0-138.148
- CVE-2024-56651
- Description:
can: hi311x: hi3110_can_ist(): fix potential use-after-free
- CVE: https://ubuntu.com/security/CVE-2024-56651
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-56651-can-hi311x-hi3110-can-ist-fix-potential-use-after-free.patch
- From: 5.15.0-138.148
- CVE-2024-46826
- Description:
ELF: fix kernel.randomize_va_space double read
- CVE: https://ubuntu.com/security/CVE-2024-46826
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-46826-elf-fix-kernel-randomize-va-space-double-read.patch
- From: 5.15.0-138.148
- CVE-2025-21700
- Description:
net: sched: Disallow replacing of child qdisc from one parent to another
- CVE: https://ubuntu.com/security/CVE-2025-21700
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21700-net-sched-disallow-replacing-of-child-qdisc-from-one-parent-to-another.patch
- From: 5.15.0-138.148
- CVE-2025-21702
- Description:
pfifo_tail_enqueue: Drop new packet when sch->limit == 0
- CVE: https://ubuntu.com/security/CVE-2025-21702
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21702-pfifo-tail-enqueue-drop-new-packet-when-sch-limit-0.patch
- From: 5.15.0-138.148
- CVE-2024-50256
- Description:
netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
- CVE: https://ubuntu.com/security/CVE-2024-50256
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50256-netfilter-nf-reject-ipv6-fix-potential-crash-in-nf-send-reset6.patch
- From: 5.15.0-138.148
- CVE-2025-21756
- Description:
vsock: Keep the binding until socket destruction
- CVE: https://ubuntu.com/security/CVE-2025-21756
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21756-vsock-keep-the-binding-until-socket-destruction.patch
- From: 5.15.0-138.148
- CVE-2025-21756
- Description:
vsock: Orphan socket after transport release
- CVE: https://ubuntu.com/security/CVE-2025-21756
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21756-vsock-orphan-socket-after-transport-release.patch
- From: 5.15.0-138.148
- CVE-2024-26837
- Description:
net: bridge: switchdev: Skip MDB replays of deferred events on offload
- CVE: https://ubuntu.com/security/CVE-2024-26837
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-26837-net-bridge-switchdev-skip-mdb-replays-of-deferred-events-on-offload.patch
- From: 5.15.0-138.148
- CVE-2024-26837
- Description:
net: bridge: switchdev: Skip MDB replays of deferred events on offload (adapatation)
- CVE: https://ubuntu.com/security/CVE-2024-26837
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-26837-net-bridge-switchdev-skip-mdb-replays-of-deferred-events-on-offload-kpatch.patch
- From: 5.15.0-138.148
- CVE-2023-52927
- Description:
netfilter: allow exp not to be removed in nf_ct_find_expectation
- CVE: https://ubuntu.com/security/CVE-2023-52927
- Patch: ubuntu-jammy/5.15.0-139.149/CVE-2023-52927-netfilter-allow-exp-not-to-be-removed-in-nf-ct-find-expectation.patch
- From: 5.15.0-139.149
- CVE-2023-52664
- Description:
net: atlantic: eliminate double free in error handling logic
- CVE: https://ubuntu.com/security/CVE-2023-52664
- Patch: ubuntu-jammy/5.15.0-139.149/CVE-2023-52664-net-atlantic-eliminate-double-free-in-error-handling-logic.patch
- From: 5.15.0-139.149
- CVE-2025-21718
- Description:
net: rose: fix timer races against user threads
- CVE: https://ubuntu.com/security/CVE-2025-21718
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21718-net-rose-fix-timer-races-against-user-threads.patch
- From: 5.15.0-140.150
- CVE-2024-58007
- Description:
soc: qcom: socinfo: Avoid out of bounds read of serial number
- CVE: https://ubuntu.com/security/CVE-2024-58007
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58007-soc-qcom-socinfo-avoid-out-of-bounds-read-of-serial-number-5.15.0-134.145.patch
- From: 5.15.0-140.150
- CVE-2025-21782
- Description:
orangefs: fix a oob in orangefs_debug_write
- CVE: https://ubuntu.com/security/CVE-2025-21782
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21782-orangefs-fix-a-oob-in-orangefs-debug-write.patch
- From: 5.15.0-140.150
- CVE-2025-21905
- Description:
wifi: iwlwifi: limit printed string from FW file
- CVE: https://ubuntu.com/security/CVE-2025-21905
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21905-wifi-iwlwifi-limit-printed-string-from-fw-file.patch
- From: 5.15.0-140.150
- CVE-2025-21727
- Description:
padata: fix UAF in padata_reorder
- CVE: https://ubuntu.com/security/CVE-2025-21727
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21727-padata-fix-UAF-in-padata_reorder.patch
- From: 5.15.0-140.150
- CVE-2025-21726
- Description:
padata: avoid UAF for reorder_work
- CVE: https://ubuntu.com/security/CVE-2025-21726
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21726-padata-avoid-UAF-for-reorder_work.patch
- From: 5.15.0-140.150
- CVE-2025-21726
- Description:
padata: avoid UAF for reorder_work
- CVE: https://ubuntu.com/security/CVE-2025-21726
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21726-padata-avoid-UAF-for-reorder_work-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-58034
- Description:
Out of scope; patch fixes the memory controller module for Nvidia Tegra SoCs.
- CVE:
- Patch: skipped/CVE-2024-58034.patch
- From:
- CVE-2024-58069
- Description:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
- CVE: https://ubuntu.com/security/CVE-2024-58069
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58069-rtc-pcf85063-fix-potential-oob-write-in-pcf85063-nvmem-read.patch
- From: 5.15.0-140.150
- CVE-2025-21715
- Description:
The DM9000 chip is available on ARM32 and MIPS architectures, which KernelCare does not support.
- CVE:
- Patch: skipped/CVE-2025-21715.patch
- From:
- CVE-2024-57980
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://ubuntu.com/security/CVE-2024-57980
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 5.15.0-140.150
- CVE-2024-58055
- Description:
usb: gadget: f_tcm: Don't free command immediately
- CVE: https://ubuntu.com/security/CVE-2024-58055
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58055-usb-gadget-f-tcm-don-t-free-command-immediately.patch
- From: 5.15.0-140.150
- CVE-2024-58083
- Description:
KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- CVE: https://ubuntu.com/security/CVE-2024-58083
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58083-kvm-explicitly-verify-target-vcpu-is-online-in-kvm-get-vcpu.patch
- From: 5.15.0-140.150
- CVE-2025-21722
- Description:
nilfs2: do not force clear folio if buffer is referenced
- CVE: https://ubuntu.com/security/CVE-2025-21722
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21722-nilfs2-do-not-force-clear-folio-if-buffer-is-referenced.patch
- From: 5.15.0-140.150
- CVE-2024-57979
- Description:
PPS for embedded GPS devices. Irrelevant for servers.
- CVE:
- Patch: skipped/CVE-2024-57979.patch
- From:
- CVE-2025-21731
- Description:
nbd: don't allow reconnect after disconnect
- CVE: https://ubuntu.com/security/CVE-2025-21731
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21731-nbd-don-t-allow-reconnect-after-disconnect.patch
- From: 5.15.0-140.150
- CVE-2025-21753
- Description:
btrfs: fix use-after-free when attempting to join an aborted transaction
- CVE: https://ubuntu.com/security/CVE-2025-21753
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21753-btrfs-fix-use-after-free-when-attempting-to-join-an-aborted-transaction.patch
- From: 5.15.0-140.150
- CVE-2025-21735
- Description:
NFC: nci: Add bounds checking in nci_hci_create_pipe()
- CVE: https://ubuntu.com/security/CVE-2025-21735
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21735-nfc-nci-add-bounds-checking-in-nci-hci-create-pipe.patch
- From: 5.15.0-140.150
- CVE-2025-21785
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2025-21764
- Description:
ndisc: use RCU protection in ndisc_alloc_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21764
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21764-ndisc-use-rcu-protection-in-ndisc-alloc-skb.patch
- From: 5.15.0-140.150
- CVE-2025-21763
- Description:
neighbour: use RCU protection in __neigh_notify()
- CVE: https://ubuntu.com/security/CVE-2025-21763
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21763-neighbour-use-rcu-protection-in-neigh-notify.patch
- From: 5.15.0-140.150
- CVE-2025-21762
- Description:
arp: use RCU protection in arp_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-21762
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21762-arp-use-rcu-protection-in-arp-xmit.patch
- From: 5.15.0-140.150
- CVE-2025-21761
- Description:
openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
- CVE: https://ubuntu.com/security/CVE-2025-21761
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21761-openvswitch-use-rcu-protection-in-ovs-vport-cmd-fill-info.patch
- From: 5.15.0-140.150
- CVE-2025-21760
- Description:
ndisc: extend RCU protection in ndisc_send_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21760
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21760-ndisc-extend-rcu-protection-in-ndisc-send-skb.patch
- From: 5.15.0-140.150
- CVE-2025-21796
- Description:
nfsd: clear acl_access/acl_default after releasing them
- CVE: https://ubuntu.com/security/CVE-2025-21796
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21796-nfsd-clear-acl-access-acl-default-after-releasing-them.patch
- From: 5.15.0-140.150
- CVE-2025-21791
- Description:
vrf: use RCU protection in l3mdev_l3_out()
- CVE: https://ubuntu.com/security/CVE-2025-21791
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21791-vrf-use-rcu-protection-in-l3mdev-l3-out.patch
- From: 5.15.0-140.150
- CVE-2025-21791
- Description:
vrf: use RCU protection in l3mdev_l3_out()
- CVE: https://ubuntu.com/security/CVE-2025-21791
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21791-vrf-use-rcu-protection-in-l3mdev-l3-out-kpatch.patch
- From: 5.15.0-140.150
- CVE-2025-21811
- Description:
nilfs2: protect access to buffers with no active references
- CVE: https://ubuntu.com/security/CVE-2025-21811
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21811-nilfs2-protect-access-to-buffers-with-no-active-references.patch
- From: 5.15.0-140.150
- CVE-2025-21858
- Description:
geneve: Fix use-after-free in geneve_find_dev().
- CVE: https://ubuntu.com/security/CVE-2025-21858
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21858-geneve-fix-use-after-free-in-geneve-find-dev.patch
- From: 5.15.0-140.150
- CVE-2025-21887
- Description:
ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up
- CVE: https://ubuntu.com/security/CVE-2025-21887
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21887-ovl-fix-uaf-in-ovl-dentry-update-reval-by-moving-dput-in-ovl-link-up.patch
- From: 5.15.0-140.150
- CVE-2025-21934
- Description:
rapidio: fix an API misues when rio_add_net() fails
- CVE: https://ubuntu.com/security/CVE-2025-21934
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21934-rapidio-fix-an-api-misues-when-rio-add-net-fails.patch
- From: 5.15.0-140.150
- CVE-2025-21928
- Description:
HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
- CVE: https://ubuntu.com/security/CVE-2025-21928
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21928-hid-intel-ish-hid-fix-use-after-free-issue-in-ishtp-hid-remove.patch
- From: 5.15.0-140.150
- CVE-2024-26982
- Description:
Squashfs: check the inode number is not the invalid value of zero
- CVE: https://ubuntu.com/security/CVE-2024-26982
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid-value-of-zero.patch
- From: 5.15.0-140.150
- CVE-2024-57986
- Description:
HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections
- CVE: https://ubuntu.com/security/CVE-2024-57986
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57986-hid-core-fix-assumption-that-resolution-multipliers-must-be-in-logical-collections.patch
- From: 5.15.0-140.150
- CVE-2024-57973
- Description:
rdma/cxgb4: Prevent potential integer overflow on 32bit
- CVE: https://ubuntu.com/security/CVE-2024-57973
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57973-rdma-cxgb4-prevent-potential-integer-overflow-on-32bit.patch
- From: 5.15.0-140.150
- CVE-2024-57981
- Description:
usb: xhci: Fix NULL pointer dereference on certain command aborts
- CVE: https://ubuntu.com/security/CVE-2024-57981
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57981-usb-xhci-fix-null-pointer-dereference-on-certain-command-aborts.patch
- From: 5.15.0-140.150
- CVE-2024-58001
- Description:
ocfs2: handle a symlink read error correctly
- CVE: https://ubuntu.com/security/CVE-2024-58001
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58001-ocfs2-handle-a-symlink-read-error-correctly.patch
- From: 5.15.0-140.150
- CVE-2024-57834
- Description:
media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread
- CVE: https://ubuntu.com/security/CVE-2024-57834
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57834-media-vidtv-fix-a-null-ptr-deref-in-vidtv-mux-stop-thread.patch
- From: 5.15.0-140.150
- CVE-2024-47726
- Description:
f2fs: fix to wait dio completion
- CVE: https://ubuntu.com/security/CVE-2024-47726
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-47726-f2fs-fix-to-wait-dio-completion.patch
- From: 5.15.0-140.150
- CVE-2024-58005
- Description:
tpm: Change to kvalloc() in eventlog/acpi.c
- CVE: https://ubuntu.com/security/CVE-2024-58005
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58005-tpm-change-to-kvalloc-in-eventlog-acpi-c.patch
- From: 5.15.0-140.150
- CVE-2024-56599
- Description:
wifi: ath10k: avoid NULL pointer error during sdio remove
- CVE: https://ubuntu.com/security/CVE-2024-56599
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-56599-wifi-ath10k-avoid-null-pointer-error-during-sdio-remove-5.15.0-111.patch
- From: 5.15.0-140.150
- CVE-2025-21920
- Description:
vlan: enforce underlying device type
- CVE: https://ubuntu.com/security/CVE-2025-21920
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21920-vlan-enforce-underlying-device-type.patch
- From: 5.15.0-140.150
- CVE-2025-21920
- Description:
vlan: enforce underlying device type
- CVE: https://ubuntu.com/security/CVE-2025-21920
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21920-vlan-enforce-underlying-device-type-kpatch.patch
- From: 5.15.0-140.150
- CVE-2025-21898
- Description:
ftrace: Avoid potential division by zero in function_stat_show()
- CVE: https://ubuntu.com/security/CVE-2025-21898
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21898-ftrace-avoid-potential-division-by-zero-in-function-stat-show.patch
- From: 5.15.0-140.150
- CVE-2025-21912
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-21912.patch
- From:
- CVE-2025-21910
- Description:
wifi: cfg80211: regulatory: improve invalid hints checking
- CVE: https://ubuntu.com/security/CVE-2025-21910
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21910-wifi-cfg80211-regulatory-improve-invalid-hints-checking.patch
- From: 5.15.0-140.150
- CVE-2025-21909
- Description:
wifi: nl80211: reject cooked mode if it is set along with other flags
- CVE: https://ubuntu.com/security/CVE-2025-21909
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21909-wifi-nl80211-reject-cooked-mode-if-it-is-set-along-with-other-flags.patch
- From: 5.15.0-140.150
- CVE-2025-21904
- Description:
caif_virtio: fix wrong pointer check in cfv_probe()
- CVE: https://ubuntu.com/security/CVE-2025-21904
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21904-caif-virtio-fix-wrong-pointer-check-in-cfv-probe.patch
- From: 5.15.0-140.150
- CVE-2025-21925
- Description:
llc: do not use skb_get() before dev_queue_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-21925
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21925-llc-do-not-use-skb-get-before-dev-queue-xmit.patch
- From: 5.15.0-140.150
- CVE-2025-21922
- Description:
ppp: Fix KMSAN uninit-value warning with bpf
- CVE: https://ubuntu.com/security/CVE-2025-21922
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21922-ppp-fix-kmsan-uninit-value-warning-with-bpf.patch
- From: 5.15.0-140.150
- CVE-2025-21917
- Description:
usb: renesas_usbhs: Flush the notify_hotplug_work
- CVE: https://ubuntu.com/security/CVE-2025-21917
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21917-usb-renesas-usbhs-flush-the-notify-hotplug-work.patch
- From: 5.15.0-140.150
- CVE-2025-21914
- Description:
slimbus: messaging: Free transaction ID in delayed interrupt scenario
- CVE: https://ubuntu.com/security/CVE-2025-21914
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21914-slimbus-messaging-free-transaction-id-in-delayed-interrupt-scenario.patch
- From: 5.15.0-140.150
- CVE-2024-58002
- Description:
[PATCH] media: uvcvideo: Only save async fh if success
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58002-media-uvcvideo-Only-save-async-fh-if-success.patch
- From: 5.15.0-140.150
- CVE-2024-58002
- Description:
[PATCH] media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers.patch
- From: 5.15.0-140.150
- CVE-2024-58002
- Description:
[PATCH] media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-57977
- Description:
memcg: fix soft lockup in the OOM process
- CVE: https://ubuntu.com/security/CVE-2024-57977
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57977-memcg-fix-soft-lockup-in-the-oom-process.patch
- From: 5.15.0-140.150
- CVE-2024-57977
- Description:
memcg: always call cond_resched() after fn()
- CVE: https://ubuntu.com/security/CVE-2024-57977
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57977-memcg-always-call-cond_resched-after-fn.patch
- From: 5.15.0-140.150
- CVE-2024-57977
- Description:
memcg: fix soft lockup in the OOM process (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-57977
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57977-memcg-fix-soft-lockup-in-the-oom-process-kpatch.patch
- From: 5.15.0-140.150
- CVE-2025-21859
- Description:
USB: gadget: f_midi: f_midi_complete to call queue_work
- CVE: https://ubuntu.com/security/CVE-2025-21859
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21859-usb-gadget-f-midi-f-midi-complete-to-call-queue-work.patch
- From: 5.15.0-140.150
- CVE-2025-21866
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21866.patch
- From:
- CVE-2025-21678
- Description:
gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl().
- CVE: https://ubuntu.com/security/CVE-2025-21678
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21865-gtp-suppress-list-corruption-splat-in-gtp-net-exit-batch-rtnl-135.patch
- From: 5.15.0-140.150
- CVE-2025-21871
- Description:
tee: optee: Fix supplicant wait loop
- CVE: https://ubuntu.com/security/CVE-2025-21871
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21871-tee-optee-fix-supplicant-wait-loop.patch
- From: 5.15.0-140.150
- CVE-2025-21862
- Description:
drop_monitor: fix incorrect initialization order
- CVE: https://ubuntu.com/security/CVE-2025-21862
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21862-drop-monitor-fix-incorrect-initialization-order.patch
- From: 5.15.0-140.150
- CVE-2025-21848
- Description:
nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
- CVE: https://ubuntu.com/security/CVE-2025-21848
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21848-nfp-bpf-add-check-for-nfp-app-ctrl-msg-alloc.patch
- From: 5.15.0-140.150
- CVE-2025-21878
- Description:
i2c: npcm: disable interrupt enable bit before devm_request_irq
- CVE: https://ubuntu.com/security/CVE-2025-21878
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21878-i2c-npcm-disable-interrupt-enable-bit-before-devm-request-irq.patch
- From: 5.15.0-140.150
- CVE-2025-21877
- Description:
usbnet: gl620a: fix endpoint checking in genelink_bind()
- CVE: https://ubuntu.com/security/CVE-2025-21877
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21877-usbnet-gl620a-fix-endpoint-checking-in-genelink-bind.patch
- From: 5.15.0-140.150
- CVE-2025-21875
- Description:
mptcp: always handle address removal under msk socket lock
- CVE: https://ubuntu.com/security/CVE-2025-21875
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21875-mptcp-always-handle-address-removal-under-msk-socket-lock.patch
- From: 5.15.0-140.150
- CVE-2025-21846
- Description:
acct: perform last write from workqueue
- CVE: https://ubuntu.com/security/CVE-2025-21846
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21846-acct-perform-last-write-from-workqueue.patch
- From: 5.15.0-140.150
- CVE-2025-21846
- Description:
acct: perform last write from workqueue
- CVE: https://ubuntu.com/security/CVE-2025-21846
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21846-acct-perform-last-write-from-workqueue-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-58052
- Description:
drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table
- CVE: https://ubuntu.com/security/CVE-2024-58052
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58052-drm-amdgpu-fix-potential-null-pointer-dereference-in-atomctrl-get-smc-sclk-range-table.patch
- From: 5.15.0-140.150
- CVE-2024-58051
- Description:
ipmi: ipmb: Add check devm_kasprintf() returned value
- CVE: https://ubuntu.com/security/CVE-2024-58051
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58051-ipmi-ipmb-add-check-devm-kasprintf-returned-value.patch
- From: 5.15.0-140.150
- CVE-2024-58063
- Description:
wifi: rtlwifi: fix memory leaks and invalid access at probe error path
- CVE: https://ubuntu.com/security/CVE-2024-58063
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58063-wifi-rtlwifi-fix-memory-leaks-and-invalid-access-at-probe-error-path.patch
- From: 5.15.0-140.150
- CVE-2024-58071
- Description:
team: prevent adding a device which is already a team device lower
- CVE: https://ubuntu.com/security/CVE-2024-58071
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58071-team-prevent-adding-a-device-which-is-already-a-team-device-lower.patch
- From: 5.15.0-140.150
- CVE-2024-58058
- Description:
ubifs: skip dumping tnc tree when zroot is null
- CVE: https://ubuntu.com/security/CVE-2024-58058
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58058-ubifs-skip-dumping-tnc-tree-when-zroot-is-null.patch
- From: 5.15.0-140.150
- CVE-2024-58017
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2024-58017.patch
- From:
- CVE-2024-58016
- Description:
safesetid: check size of policy writes
- CVE: https://ubuntu.com/security/CVE-2024-58016
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58016-safesetid-check-size-of-policy-writes.patch
- From: 5.15.0-140.150
- CVE-2024-58014
- Description:
wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()
- CVE: https://ubuntu.com/security/CVE-2024-58014
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58014-wifi-brcmsmac-add-gain-range-check-to-wlc-phy-iqcal-gainparams-nphy.patch
- From: 5.15.0-140.150
- CVE-2024-58010
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2024-58010.patch
- From:
- CVE-2024-58020
- Description:
HID: multitouch: Add NULL check in mt_input_configured
- CVE: https://ubuntu.com/security/CVE-2024-58020
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58020-hid-multitouch-add-null-check-in-mt-input-configured.patch
- From: 5.15.0-140.150
- CVE-2025-21711
- Description:
net/rose: prevent integer overflows in rose_setsockopt()
- CVE: https://ubuntu.com/security/CVE-2025-21711
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21711-net-rose-prevent-integer-overflows-in-rose-setsockopt.patch
- From: 5.15.0-140.150
- CVE-2025-21728
- Description:
bpf: Send signals asynchronously if !preemptible
- CVE: https://ubuntu.com/security/CVE-2025-21728
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21728-bpf-send-signals-asynchronously-if-preemptible.patch
- From: 5.15.0-140.150
- CVE-2025-21728
- Description:
bpf: Use preempt_count() directly in bpf_send_signal_common()
- CVE: https://ubuntu.com/security/CVE-2025-21728
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21728-bpf-Use-preempt_count-directly-in-bpf_send_signal_common.patch
- From: 5.15.0-140.150
- CVE-2025-21719
- Description:
ipmr: do not call mr_mfc_uses_dev() for unres entries
- CVE: https://ubuntu.com/security/CVE-2025-21719
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21719-ipmr-do-not-call-mr-mfc-uses-dev-for-unres-entries.patch
- From: 5.15.0-140.150
- CVE-2025-21749
- Description:
net: rose: lock the socket in rose_bind()
- CVE: https://ubuntu.com/security/CVE-2025-21749
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21749-net-rose-lock-the-socket-in-rose-bind.patch
- From: 5.15.0-140.150
- CVE-2025-21745
- Description:
blk-cgroup: Fix class @block_class's subsystem refcount leakage
- CVE: https://ubuntu.com/security/CVE-2025-21745
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21745-blk-cgroup-fix-class-block-class-s-subsystem-refcount-leakage.patch
- From: 5.15.0-140.150
- CVE-2025-21744
- Description:
wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()
- CVE: https://ubuntu.com/security/CVE-2025-21744
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21744-wifi-brcmfmac-fix-null-pointer-dereference-in-brcmf-txfinalize.patch
- From: 5.15.0-140.150
- CVE-2025-21736
- Description:
nilfs2: fix possible int overflows in nilfs_fiemap()
- CVE: https://ubuntu.com/security/CVE-2025-21736
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21736-nilfs2-fix-possible-int-overflows-in-nilfs-fiemap.patch
- From: 5.15.0-140.150
- CVE-2025-21758
- Description:
ipv6: mcast: add RCU protection to mld_newpack()
- CVE: https://ubuntu.com/security/CVE-2025-21758
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21758-ipv6-mcast-add-rcu-protection-to-mld-newpack.patch
- From: 5.15.0-140.150
- CVE-2025-21748
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-21748.patch
- From:
- CVE-2025-21721
- Description:
nilfs2: handle errors that nilfs_prepare_chunk() may return
- CVE: https://ubuntu.com/security/CVE-2025-21721
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21721-nilfs2-handle-errors-that-nilfs-prepare-chunk-may-return.patch
- From: 5.15.0-140.150
- CVE-2024-58085
- Description:
tomoyo: don't emit warning in tomoyo_write_control()
- CVE: https://ubuntu.com/security/CVE-2024-58085
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58085-tomoyo-don-t-emit-warning-in-tomoyo-write-control.patch
- From: 5.15.0-140.150
- CVE-2024-58086
- Description:
drm/v3d: Stop active perfmon if it is being destroyed
- CVE: https://ubuntu.com/security/CVE-2024-58086
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58086-drm-v3d-stop-active-perfmon-if-it-is-being-destroyed.patch
- From: 5.15.0-140.150
- CVE-2025-21708
- Description:
net: usb: rtl8150: enable basic endpoint checking
- CVE: https://ubuntu.com/security/CVE-2025-21708
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21708-net-usb-rtl8150-enable-basic-endpoint-checking.patch
- From: 5.15.0-140.150
- CVE-2025-21799
- Description:
net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns()
- CVE: https://ubuntu.com/security/CVE-2025-21799
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21799-net-ethernet-ti-am65-cpsw-fix-freeing-irq-in-am65-cpsw-nuss-remove-tx-chns.patch
- From: 5.15.0-140.150
- CVE-2025-21787
- Description:
team: better TEAM_OPTION_TYPE_STRING validation
- CVE: https://ubuntu.com/security/CVE-2025-21787
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21787-team-better-team-option-type-string-validation.patch
- From: 5.15.0-140.150
- CVE-2025-21781
- Description:
batman-adv: fix panic during interface removal
- CVE: https://ubuntu.com/security/CVE-2025-21781
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21781-batman-adv-fix-panic-during-interface-removal.patch
- From: 5.15.0-140.150
- CVE-2025-21779
- Description:
KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel
- CVE: https://ubuntu.com/security/CVE-2025-21779
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21779-kvm-x86-reject-hyper-v-s-send-ipi-hypercalls-if-local-apic-isn-t-in-kernel.patch
- From: 5.15.0-140.150
- CVE-2025-21776
- Description:
USB: hub: Ignore non-compliant devices with too many configs or interfaces
- CVE: https://ubuntu.com/security/CVE-2025-21776
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21776-usb-hub-ignore-non-compliant-devices-with-too-many-configs-or-interfaces.patch
- From: 5.15.0-140.150
- CVE-2025-21772
- Description:
partitions: mac: fix handling of bogus partition table
- CVE: https://ubuntu.com/security/CVE-2025-21772
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21772-partitions-mac-fix-handling-of-bogus-partition-table.patch
- From: 5.15.0-140.150
- CVE-2025-21767
- Description:
clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context
- CVE: https://ubuntu.com/security/CVE-2025-21767
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21767-clocksource-use-migrate-disable-to-avoid-calling-get-random-u32-in-atomic-context.patch
- From: 5.15.0-140.150
- CVE-2025-21814
- Description:
ptp: Ensure info->enable callback is always set
- CVE: https://ubuntu.com/security/CVE-2025-21814
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21814-ptp-ensure-info-enable-callback-is-always-set.patch
- From: 5.15.0-140.150
- CVE-2025-21814
- Description:
ptp: Ensure info->enable callback is always set
- CVE: https://ubuntu.com/security/CVE-2025-21814
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21814-ptp-ensure-info-enable-callback-is-always-set-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-58072
- Description:
wifi: rtlwifi: remove unused check_buddy_priv
- CVE: https://ubuntu.com/security/CVE-2024-58072
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58072-wifi-rtlwifi-remove-unused-check-buddy-priv.patch
- From: 5.15.0-140.150
- CVE-2025-21806
- Description:
net: let net.core.dev_weight always be non-zero
- CVE: https://ubuntu.com/security/CVE-2025-21806
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21806-net-let-net.core.dev_weight-always-be-non-zero.patch
- From: 5.15.0-140.150
- CVE-2025-21806
- Description:
net: let net.core.dev_weight always be non-zero
- CVE: https://ubuntu.com/security/CVE-2025-21806
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21806-net-let-net.core.dev_weight-always-be-non-zero-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-58076
- Description:
Out of scope - affects smartphones SoC component.
- CVE:
- Patch: skipped/CVE-2024-58076.patch
- From:
- CVE-2025-21830
- Description:
landlock: Handle weird files
- CVE: https://ubuntu.com/security/CVE-2025-21830
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21830-landlock-handle-weird-files.patch
- From: 5.15.0-140.150
- CVE-2025-21804
- Description:
PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region()
- CVE: https://ubuntu.com/security/CVE-2025-21804
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21804-pci-rcar-ep-fix-incorrect-variable-used-when-calling-devm-request-mem-region.patch
- From: 5.15.0-140.150
- CVE-2025-21802
- Description:
net: hns3: fix oops when unload drivers paralleling
- CVE: https://ubuntu.com/security/CVE-2025-21802
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21802-net-hns3-fix-oops-when-unload-drivers-paralleling.patch
- From: 5.15.0-140.150
- CVE-2025-21826
- Description:
netfilter: nf_tables: reject mismatching sum of field_len with set key length
- CVE: https://ubuntu.com/security/CVE-2025-21826
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21826-netfilter-nf_tables-do-not-allow-mismatch-field-size-and-set-key-length.patch
- From: 5.15.0-140.150
- CVE-2025-21826
- Description:
netfilter: nf_tables: reject mismatching sum of field_len with set key length
- CVE: https://ubuntu.com/security/CVE-2025-21826
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21826-netfilter-nf-tables-reject-mismatching-sum-of-field-len-with-set-key-length.patch
- From: 5.15.0-140.150
- CVE-2025-21820
- Description:
tty: xilinx_uartps: split sysrq handling
- CVE: https://ubuntu.com/security/CVE-2025-21820
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21820-tty-xilinx-uartps-split-sysrq-handling.patch
- From: 5.15.0-140.150
- CVE-2025-21835
- Description:
usb: gadget: f_midi: fix MIDI Streaming descriptor lengths
- CVE: https://ubuntu.com/security/CVE-2025-21835
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21835-usb-gadget-f-midi-fix-midi-streaming-descriptor-lengths.patch
- From: 5.15.0-140.150
- CVE-2025-21823
- Description:
[PATCH] batman-adv: Ignore neighbor throughput metrics in error case
- CVE: https://ubuntu.com/security/CVE-2025-21823
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21823-batman-adv-Ignore-neighbor-throughput-metrics-in-error-case.patch
- From: 5.15.0-140.150
- CVE-2025-21823
- Description:
[PATCH] batman-adv: Drop initialization of flexible
- CVE: https://ubuntu.com/security/CVE-2025-21823
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21823-batman-adv-Drop-initialization-of-flexible-ethtool_link_ksettings.patch
- From: 5.15.0-140.150
- CVE-2025-21823
- Description:
[PATCH] batman-adv: Drop unmanaged ELP metric worker
- CVE: https://ubuntu.com/security/CVE-2025-21823
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21823-batman-adv-Drop-unmanaged-ELP-metric-worker.patch
- From: 5.15.0-140.150
- CVE-2025-21823
- Description:
[PATCH] batman-adv: Drop unmanaged ELP metric worker
- CVE: https://ubuntu.com/security/CVE-2025-21823
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21823-batman-adv-Drop-unmanaged-ELP-metric-worker-kpatch.patch
- From: 5.15.0-140.150
- CVE-2025-21844
- Description:
smb: client: Add check for next_buffer in receive_encrypted_standard()
- CVE: https://ubuntu.com/security/CVE-2025-21844
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21844-smb-client-add-check-for-next-buffer-in-receive-encrypted-standard.patch
- From: 5.15.0-140.150
- CVE-2025-21684
- Description:
Out of scope - affects Xilinx FPGA and SoC devices.
- CVE:
- Patch: skipped/CVE-2025-21684.patch
- From:
- CVE-2024-56551
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://ubuntu.com/security/CVE-2024-56551
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 5.15.0-141.151
- CVE-2024-53168
- Description:
sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket
- CVE: https://ubuntu.com/security/CVE-2024-53168
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-53168-sunrpc-fix-one-uaf-issue-caused-by-sunrpc-kernel-tcp-socket.patch
- From: 5.15.0-141.151
- CVE-2024-56608
- Description:
drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'
- CVE: https://ubuntu.com/security/CVE-2024-56608
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-56608-drm-amd-display-fix-out-of-bounds-access-in-dcn21-link-encoder-create.patch
- From: 5.15.0-141.151
- CVE-2025-21991
- Description:
x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
- CVE: https://ubuntu.com/security/CVE-2025-21991
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21991-x86-microcode-amd-fix-out-of-bounds-on-systems-with-cpu-less-numa-nodes.patch
- From: 5.15.0-142.152
- CVE-2025-21968
- Description:
drm/amd/display: Fix slab-use-after-free on hdcp_work
- CVE: https://ubuntu.com/security/CVE-2025-21968
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21968-drm-amd-display-fix-slab-use-after-free-on-hdcp-work.patch
- From: 5.15.0-142.152
- CVE-2025-22004
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://ubuntu.com/security/CVE-2025-22004
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 5.15.0-142.152
- CVE-2025-21999
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://ubuntu.com/security/CVE-2025-21999
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode.patch
- From: 5.15.0-142.152
- CVE-2025-21999
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://ubuntu.com/security/CVE-2025-21999
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-53144 CVE-2024-8805
- Description:
Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE
- CVE: https://ubuntu.com/security/CVE-2024-8805
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-53144-CVE-2024-8805-bluetooth-hci-event-align-br-edr-just-works-paring-with-le.patch
- From: 5.15.0-142.152
- CVE-2025-22020
- Description:
memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
- CVE: https://ubuntu.com/security/CVE-2025-22020
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22020-memstick-rtsx-usb-ms-fix-slab-use-after-free-in-rtsx-usb-ms-drv-remove.patch
- From: 5.15.0-142.152
- CVE-2025-22055
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://ubuntu.com/security/CVE-2025-22055
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow.patch
- From: 5.15.0-142.152
- CVE-2025-22055
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://ubuntu.com/security/CVE-2025-22055
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-46821
- Description:
drm/amd/pm: Fix negative array index read
- CVE: https://ubuntu.com/security/CVE-2024-46821
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-46821-drm-amd-pm-fix-negative-array-index-read.patch
- From: 5.15.0-142.152
- CVE-2024-46812
- Description:
drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration
- CVE: https://ubuntu.com/security/CVE-2024-46812
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-46812-drm-amd-display-skip-inactive-planes-within-modesupportandsystemconfiguration.patch
- From: 5.15.0-142.152
- CVE-2025-22035
- Description:
tracing: Fix use-after-free in print_graph_function_flags during tracer switching
- CVE: https://ubuntu.com/security/CVE-2025-22035
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22035-tracing-fix-use-after-free-in-print-graph-function-flags-during-tracer-switching.patch
- From: 5.15.0-142.152
- CVE-2025-37785
- Description:
ext4: fix OOB read when checking dotdot dir
- CVE: https://ubuntu.com/security/CVE-2025-37785
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-37785-ext4-fix-oob-read-when-checking-dotdot-dir.patch
- From: 5.15.0-142.152
- CVE-2025-39735
- Description:
jfs: xattr: check invalid xattr size more strictly
- CVE: https://ubuntu.com/security/CVE-2025-39735
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-39735-jfs-xattr-check-invalid-xattr-size-more-strictly.patch
- From: 5.15.0-142.152
- CVE-2025-39735
- Description:
jfs: fix slab-out-of-bounds read in ea_get()
- CVE: https://ubuntu.com/security/CVE-2025-39735
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-39735-jfs-fix-slab-out-of-bounds-read-in-ea-get.patch
- From: 5.15.0-142.152
- CVE-2024-56664
- Description:
bpf, sockmap: Fix race between element replace and close()
- CVE: https://ubuntu.com/security/CVE-2024-56664
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-56664-bpf-sockmap-fix-race-between-element-replace-and-close.patch
- From: 5.15.0-142.152
- CVE-2025-37937
- Description:
objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds()
- CVE: https://ubuntu.com/security/CVE-2025-37937
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-37937-objtool-media-dib8000-prevent-divide-by-zero-in-dib8000-set-dds.patch
- From: 5.15.0-142.152
- CVE-2025-21964
- Description:
cifs: Fix integer overflow while processing acregmax mount option
- CVE: https://ubuntu.com/security/CVE-2025-21964
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21964-cifs-fix-integer-overflow-while-processing-acregmax-mount-option.patch
- From: 5.15.0-142.152
- CVE-2025-21963
- Description:
cifs: Fix integer overflow while processing acdirmax mount option
- CVE: https://ubuntu.com/security/CVE-2025-21963
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21963-cifs-fix-integer-overflow-while-processing-acdirmax-mount-option.patch
- From: 5.15.0-142.152
- CVE-2025-21962
- Description:
cifs: Fix integer overflow while processing closetimeo mount option
- CVE: https://ubuntu.com/security/CVE-2025-21962
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21962-cifs-fix-integer-overflow-while-processing-closetimeo-mount-option.patch
- From: 5.15.0-142.152
- CVE-2025-22097
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://ubuntu.com/security/CVE-2025-22097
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error.patch
- From: 5.15.0-142.152
- CVE-2025-22097
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://ubuntu.com/security/CVE-2025-22097
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error-kpatch.patch
- From: 5.15.0-142.152
- CVE-2022-49728
- Description:
[PATCH] ipv6: Fix signed integer overflow in __ip6_append_data
- CVE: https://ubuntu.com/security/CVE-2022-49728
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2022-49728-ipv6-Fix-signed-integer-overflow-in-__ip6_append_data.patch
- From: 5.15.0-142.152
- CVE-2022-49728
- Description:
[PATCH] ipv6: Fix signed integer overflow in __ip6_append_data
- CVE: https://ubuntu.com/security/CVE-2022-49728
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2022-49728-ipv6-Fix-signed-integer-overflow-in-__ip6_append_data-kpatch.patch
- From: 5.15.0-142.152
- CVE-2025-21981
- Description:
ice: fix memory leak in aRFS after reset
- CVE: https://ubuntu.com/security/CVE-2025-21981
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21981-ice-fix-memory-leak-in-arfs-after-reset.patch
- From: 5.15.0-142.152
- CVE-2025-21975
- Description:
net/mlx5: handle errors in mlx5_chains_create_table()
- CVE: https://ubuntu.com/security/CVE-2025-21975
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21975-net-mlx5-handle-errors-in-mlx5-chains-create-table.patch
- From: 5.15.0-142.152
- CVE-2025-21959
- Description:
netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()
- CVE: https://ubuntu.com/security/CVE-2025-21959
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21959-netfilter-nf-conncount-fully-initialize-struct-nf-conncount-tuple-in-insert-tree-124.patch
- From: 5.15.0-142.152
- CVE-2025-21970
- Description:
net/mlx5: Bridge, fix the crash caused by LAG state check
- CVE: https://ubuntu.com/security/CVE-2025-21970
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21970-net-mlx5-bridge-fix-the-crash-caused-by-lag-state-check.patch
- From: 5.15.0-142.152
- CVE-2025-21957
- Description:
scsi: qla1280: Fix kernel oops when debug level > 2
- CVE: https://ubuntu.com/security/CVE-2025-21957
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21957-scsi-qla1280-fix-kernel-oops-when-debug-level-2.patch
- From: 5.15.0-142.152
- CVE-2025-21956
- Description:
drm/amd/display: Assign normalized_pix_clk when color depth = 14
- CVE: https://ubuntu.com/security/CVE-2025-21956
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21956-drm-amd-display-assign-normalized-pix-clk-when-color-depth-14.patch
- From: 5.15.0-142.152
- CVE-2025-21941
- Description:
[PATCH] drm/amd/display: Check for invalid input params when building scaling params
- CVE: https://ubuntu.com/security/CVE-2025-21941
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21941-drm-amd-display-Check-for-invalid-input-params-when-building-scaling-params.patch
- From: 5.15.0-142.152
- CVE-2025-21941
- Description:
drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params
- CVE: https://ubuntu.com/security/CVE-2025-21941
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21941-drm-amd-display-fix-null-check-for-pipe-ctx-plane-state-in-resource-build-scaling-params.patch
- From: 5.15.0-142.152
- CVE-2025-22010
- Description:
CONFIG_INFINIBAND_HNS is not enabled on jammy.
- CVE:
- Patch: skipped/CVE-2025-22010.patch
- From:
- CVE-2025-37889
- Description:
[PATCH] ASoC: ops: Consistently treat platform_max as control value
- CVE: https://ubuntu.com/security/CVE-2025-37889
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-37889-ASoC-ops-Consistently-treat-platform_max-as-control-value.patch
- From: 5.15.0-142.152
- CVE-2025-37889
- Description:
[PATCH] ASoC: ops: Consistently treat platform_max as control value
- CVE: https://ubuntu.com/security/CVE-2025-37889
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-37889-ASoC-ops-Consistently-treat-platform_max-as-control-value-kpatch.patch
- From: 5.15.0-142.152
- CVE-2025-22056
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2025-22056.patch
- From:
- CVE-2025-21992
- Description:
[PATCH] HID: ignore non-functional sensor in HP 5MP Camera
- CVE: https://ubuntu.com/security/CVE-2025-21992
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21992-HID-ignore-non-functional-sensor-in-HP-5MP-Camera.patch
- From: 5.15.0-142.152
- CVE-2025-21992
- Description:
[PATCH] HID: ignore non-functional sensor in HP 5MP Camera
- CVE: https://ubuntu.com/security/CVE-2025-21992
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21992-HID-ignore-non-functional-sensor-in-HP-5MP-Camera-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-50047
- Description:
smb: client: fix UAF in async decryption
- CVE: https://ubuntu.com/security/CVE-2024-50047
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2024-50047-smb-client-fix-uaf-in-async-decryption-azure.patch
- From: 5.15.0-143.153
- CVE-2024-53185
- Description:
smb: client: fix NULL ptr deref in crypto_aead_setkey()
- CVE: https://ubuntu.com/security/CVE-2024-53185
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2024-53185-smb-client-fix-null-ptr-deref-in-crypto-aead-setkey.patch
- From: 5.15.0-143.153
- CVE-2025-37932
- Description:
sch_htb: make htb_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37932
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37932-sch-htb-make-htb-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-codel-remove-sch-q-qlen-check-before-qdisc-tree-reduce-backlog.patch
- From: 5.15.0-143.153
- CVE-2025-37798 CVE-2025-37953
- Description:
sch_htb: make htb_deactivate() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37953
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-htb-make-htb-deactivate-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
sch_drr: make drr_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-drr-make-drr-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
sch_hfsc: make hfsc_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-hfsc-make-hfsc-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
sch_qfq: make qfq_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-qfq-make-qfq-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
sch_ets: make est_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-ets-make-est-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37997
- Description:
netfilter: ipset: fix region locking in hash types
- CVE: https://ubuntu.com/security/CVE-2025-37997
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37997-netfilter-ipset-fix-region-locking-in-hash-types.patch
- From: 5.15.0-143.153
- CVE-2024-46787
- Description:
userfaultfd: fix checks for huge PMDs
- CVE: https://ubuntu.com/security/CVE-2024-46787
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2024-46787-userfaultfd-fix-checks-for-huge-PMDs.patch
- From: 5.15.0-143.153
- CVE-2024-53051
- Description:
drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability
- CVE: https://ubuntu.com/security/CVE-2024-53051
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2024-53051-drm-i915-hdcp-Add-encoder-check-in-intel_hdcp_get_capability.patch
- From: 5.15.0-143.153
- CVE-2025-37890
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37890
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37890-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-143.153
- CVE-2025-38000
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://ubuntu.com/security/CVE-2025-38000
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-38000-sch-hfsc-fix-qlen-accounting-bug-when-using-peek-in-hfsc-enqueue.patch
- From: 5.15.0-143.153
- CVE-2025-38001
- Description:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
- CVE: https://ubuntu.com/security/CVE-2025-38001
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-38001-net-sched-hfsc-address-reentrant-enqueue-adding-class-to-eltree-twice.patch
- From: 5.15.0-143.153
- CVE-2025-37749
- Description:
net: ppp: Add bound checking for skb data on ppp_sync_txmung
- CVE: https://ubuntu.com/security/CVE-2025-37749
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37749-net-ppp-add-bound-checking-for-skb-data-on-ppp-sync-txmung.patch
- From: 5.15.0-144.157
- CVE-2025-37841
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-37841.patch
- From:
- CVE-2025-23161
- Description:
Kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2025-23161.patch
- From:
- CVE-2025-37892
- Description:
mtd: inftlcore: Add error check for inftl_read_oob()
- CVE: https://ubuntu.com/security/CVE-2025-37892
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37892-mtd-inftlcore-add-error-check-for-inftl-read-oob.patch
- From: 5.15.0-144.157
- CVE-2025-23142
- Description:
sctp: detect and prevent references to a freed transport in sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-23142
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-23142-sctp-detect-and-prevent-references-to-a-freed-transport-in-sendmsg.patch
- From: 5.15.0-144.157
- CVE-2025-23142
- Description:
sctp: detect and prevent references to a freed transport in sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-23142
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-23142-sctp-detect-and-prevent-references-to-a-freed-transport-in-sendmsg-kpatch.patch
- From: 5.15.0-144.157
- CVE-2025-37838
- Description:
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2025-37838
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37838-hsi-ssi-protocol-fix-use-after-free-vulnerability-in-ssi-protocol-driver-due-to-race-condition.patch
- From: 5.15.0-144.157
- CVE-2025-37982
- Description:
wifi: wl1251: fix memory leak in wl1251_tx_work
- CVE: https://ubuntu.com/security/CVE-2025-37982
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37982-wifi-wl1251-fix-memory-leak-in-wl1251-tx-work.patch
- From: 5.15.0-144.157
- CVE-2025-37792
- Description:
Bluetooth: btrtl: Prevent potential NULL dereference
- CVE: https://ubuntu.com/security/CVE-2025-37792
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37792-bluetooth-btrtl-prevent-potential-null-dereference.patch
- From: 5.15.0-144.157
- CVE-2025-37875
- Description:
igc: fix PTM cycle trigger logic
- CVE: https://ubuntu.com/security/CVE-2025-37875
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37875-igc-fix-ptm-cycle-trigger-logic.patch
- From: 5.15.0-144.157
- CVE-2025-37790
- Description:
net: mctp: Set SOCK_RCU_FREE
- CVE: https://ubuntu.com/security/CVE-2025-37790
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37790-net-mctp-set-sock-rcu-free.patch
- From: 5.15.0-144.157
- CVE-2025-37789
- Description:
net: openvswitch: fix nested key length validation in the set() action
- CVE: https://ubuntu.com/security/CVE-2025-37789
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37789-net-openvswitch-fix-nested-key-length-validation-in-the-set-action.patch
- From: 5.15.0-144.157
- CVE-2025-37788
- Description:
cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path
- CVE: https://ubuntu.com/security/CVE-2025-37788
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37788-cxgb4-fix-memory-leak-in-cxgb4-init-ethtool-filters-error-path.patch
- From: 5.15.0-144.157
- CVE-2025-37787
- Description:
net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered
- CVE: https://ubuntu.com/security/CVE-2025-37787
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37787-net-dsa-mv88e6xxx-avoid-unregistering-devlink-regions-which-were-never-registered.patch
- From: 5.15.0-144.157
- CVE-2025-37781
- Description:
i2c: cros-ec-tunnel: defer probe if parent EC is not present
- CVE: https://ubuntu.com/security/CVE-2025-37781
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37781-i2c-cros-ec-tunnel-defer-probe-if-parent-ec-is-not-present.patch
- From: 5.15.0-144.157
- CVE-2025-37780
- Description:
isofs: Prevent the use of too small fid
- CVE: https://ubuntu.com/security/CVE-2025-37780
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37780-isofs-prevent-the-use-of-too-small-fid.patch
- From: 5.15.0-144.157
- CVE-2025-37773
- Description:
virtiofs: add filesystem context source name check
- CVE: https://ubuntu.com/security/CVE-2025-37773
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37773-virtiofs-add-filesystem-context-source-name-check.patch
- From: 5.15.0-144.157
- CVE-2024-50258
- Description:
net: fix crash when config small gso_max_size/gso_ipv4_max_size
- CVE: https://ubuntu.com/security/CVE-2024-50258
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50258-net-fix-crash-when-config-small-gso_max_size-gso_ipv4_max_size.patch
- From: 5.15.0-144.157
- CVE-2024-50258
- Description:
net: fix crash when config small gso_max_size/gso_ipv4_max_size
- CVE: https://ubuntu.com/security/CVE-2024-50258
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50258-net-fix-crash-when-config-small-gso_max_size-gso_ipv4_max_size-kpatch.patch
- From: 5.15.0-144.157
- CVE-2024-46774
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-46774.patch
- From:
- CVE-2024-35866
- Description:
smb: client: fix potential UAF in cifs_dump_full_key()
- CVE: https://ubuntu.com/security/CVE-2024-35866
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-35866-smb-client-fix-potential-uaf-in-cifs-dump-full-key-azure-1051.patch
- From: 5.15.0-144.157
- CVE-2023-52572
- Description:
cifs: Fix UAF in cifs_demultiplex_thread()
- CVE: https://ubuntu.com/security/CVE-2023-52572
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2023-52572-cifs-fix-uaf-in-cifs-demultiplex-thread-azure.patch
- From: 5.15.0-144.157
- CVE-2023-52572
- Description:
cifs: Fix UAF in cifs_demultiplex_thread()
- CVE: https://ubuntu.com/security/CVE-2023-52572
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2023-52572-cifs-fix-uaf-in-cifs-demultiplex-thread-kpatch-azure.patch
- From: 5.15.0-144.157
- CVE-2023-52757
- Description:
smb: client: fix potential deadlock when releasing mids
- CVE: https://ubuntu.com/security/CVE-2023-52757
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2023-52757-smb-client-fix-potential-deadlock-when-releasing-mids-azure.patch
- From: 5.15.0-144.157
- CVE-2023-52757
- Description:
smb: client: fix potential deadlock when releasing mids
- CVE: https://ubuntu.com/security/CVE-2023-52757
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2023-52757-smb-client-fix-potential-deadlock-when-releasing-mids-kpatch-azure.patch
- From: 5.15.0-144.157
- CVE-2024-35867
- Description:
smb: client: fix potential UAF in cifs_stats_proc_show()
- CVE: https://ubuntu.com/security/CVE-2024-35867
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-35867-smb-client-fix-potential-uaf-in-cifs-stats-proc-show-azure-1051.patch
- From: 5.15.0-144.157
- CVE-2024-49960
- Description:
ext4: fix timer use-after-free on failed mount
- CVE: https://ubuntu.com/security/CVE-2024-49960
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-49960-ext4-fix-timer-use-after-free-on-failed-mount.patch
- From: 5.15.0-144.157
- CVE-2024-54458
- Description:
scsi: ufs: bsg: Set bsg_queue to NULL after removal
- CVE: https://ubuntu.com/security/CVE-2024-54458
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-54458-scsi-ufs-bsg-set-bsg-queue-to-null-after-removal.patch
- From: 5.15.0-144.157
- CVE-2024-50280
- Description:
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
- CVE: https://ubuntu.com/security/CVE-2024-50280
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50280-dm-cache-fix-flushing-uninitialized-delayed-work-on-cache-ctr-error.patch
- From: 5.15.0-144.157
- CVE-2022-49535
- Description:
scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI
- CVE: https://ubuntu.com/security/CVE-2022-49535
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-49535-scsi-lpfc-fix-null-pointer-dereference-after-failing-to-issue-flogi-and-plogi.patch
- From: 5.15.0-144.157
- CVE-2024-50125
- Description:
Bluetooth: SCO: Fix UAF on sco_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-50125
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50125-bluetooth-sco-fix-uaf-on-sco-sock-timeout.patch
- From: 5.15.0-144.157
- CVE-2025-22027
- Description:
media: streamzap: fix race between device disconnection and urb callback
- CVE: https://ubuntu.com/security/CVE-2025-22027
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-22027-media-streamzap-fix-race-between-device-disconnection-and-urb-callback.patch
- From: 5.15.0-144.157
- CVE-2025-23148
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-23148.patch
- From:
- CVE-2025-37844
- Description:
cifs: avoid NULL pointer dereference in dbg call
- CVE: https://ubuntu.com/security/CVE-2025-37844
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37844-cifs-avoid-null-pointer-dereference-in-dbg-call-azure.patch
- From: 5.15.0-144.157
- CVE-2025-37985
- Description:
USB: wdm: close race between wdm_open and wdm_wwan_port_stop
- CVE: https://ubuntu.com/security/CVE-2025-37985
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37985-usb-wdm-close-race-between-wdm-open-and-wdm-wwan-port-stop.patch
- From: 5.15.0-144.157
- CVE-2025-37881
- Description:
CONFIG_USB_ASPEED_VHUB is not enabled.
- CVE:
- Patch: skipped/CVE-2025-37881.patch
- From:
- CVE-2025-37803
- Description:
udmabuf: fix a buf size overflow issue during udmabuf creation
- CVE: https://ubuntu.com/security/CVE-2025-37803
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37803-udmabuf-fix-a-buf-size-overflow-issue-during-udmabuf-creation.patch
- From: 5.15.0-144.157
- CVE-2024-49989
- Description:
drm/amd/display: fix double free issue during amdgpu module unload
- CVE: https://ubuntu.com/security/CVE-2024-49989
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-49989-drm-amd-display-fix-double-free-issue-during-amdgpu-module-unload.patch
- From: 5.15.0-144.157
- CVE-2025-37930
- Description:
drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()
- CVE: https://ubuntu.com/security/CVE-2025-37930
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37930-drm-nouveau-fix-warn-on-in-nouveau-fence-context-kill.patch
- From: 5.15.0-144.157
- CVE-2025-37991
- Description:
Out of scope: PA-RISC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-37991.patch
- From:
- CVE-2025-37990
- Description:
wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()
- CVE: https://ubuntu.com/security/CVE-2025-37990
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37990-wifi-brcm80211-fmac-add-error-handling-for-brcmf-usb-dl-writeimage.patch
- From: 5.15.0-144.157
- CVE-2025-37923
- Description:
tracing: Fix oob write in trace_seq_to_buffer()
- CVE: https://ubuntu.com/security/CVE-2025-37923
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37923-tracing-fix-oob-write-in-trace-seq-to-buffer.patch
- From: 5.15.0-144.157
- CVE-2024-26739
- Description:
net/sched: act_mirred: don't override retval if we already lost the skb
- CVE: https://ubuntu.com/security/CVE-2024-26739
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-26739-net-sched-act-mirred-don-t-override-retval-if-we-already-lost-the-skb.patch
- From: 5.15.0-144.157
- CVE-2025-37915
- Description:
net_sched: drr: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37915
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37915-net-sched-drr-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-144.157
- CVE-2025-37914
- Description:
net_sched: ets: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37914
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37914-net-sched-ets-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-144.157
- CVE-2025-37913
- Description:
net_sched: qfq: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37913
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37913-net-sched-qfq-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-144.157
- CVE-2025-37912
- Description:
ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr()
- CVE: https://ubuntu.com/security/CVE-2025-37912
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37912-ice-check-vf-vsi-pointer-value-in-ice-vc-add-fdir-fltr.patch
- From: 5.15.0-144.157
- CVE-2025-37911
- Description:
bnxt_en: Fix out-of-bound memcpy() during ethtool -w
- CVE: https://ubuntu.com/security/CVE-2025-37911
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37911-bnxt-en-fix-out-of-bound-memcpy-during-ethtool-w.patch
- From: 5.15.0-144.157
- CVE-2025-37909
- Description:
net: lan743x: Fix memleak issue when GSO enabled
- CVE: https://ubuntu.com/security/CVE-2025-37909
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37909-net-lan743x-fix-memleak-issue-when-gso-enabled.patch
- From: 5.15.0-144.157
- CVE-2025-37909
- Description:
net: lan743x: Fix memleak issue when GSO enabled
- CVE: https://ubuntu.com/security/CVE-2025-37909
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37909-net-lan743x-fix-memleak-issue-when-gso-enabled-kpatch.patch
- From: 5.15.0-144.157
- CVE-2024-38541
- Description:
of: module: add buffer overflow check in of_modalias()
- CVE: https://ubuntu.com/security/CVE-2024-38541
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-38541-of-module-add-buffer-overflow-check-in-of-modalias.patch
- From: 5.15.0-144.157
- CVE-2025-37905
- Description:
firmware: arm_scmi: Balance device refcount when destroying devices
- CVE: https://ubuntu.com/security/CVE-2025-37905
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37905-firmware-arm-scmi-balance-device-refcount-when-destroying-devices.patch
- From: 5.15.0-144.157
- CVE-2022-21546
- Description:
scsi: target: Fix WRITE_SAME No Data Buffer crash
- CVE: https://ubuntu.com/security/CVE-2022-21546
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-21546-scsi-target-fix-write-same-no-data-buffer-crash.patch
- From: 5.15.0-144.157
- CVE-2025-37998
- Description:
openvswitch: Fix unsafe attribute parsing in output_userspace()
- CVE: https://ubuntu.com/security/CVE-2025-37998
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37998-openvswitch-fix-unsafe-attribute-parsing-in-output-userspace.patch
- From: 5.15.0-144.157
- CVE-2025-37970
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo
- CVE: https://ubuntu.com/security/CVE-2025-37970
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37970-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-fifo.patch
- From: 5.15.0-144.157
- CVE-2025-37969
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo
- CVE: https://ubuntu.com/security/CVE-2025-37969
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37969-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-tagged-fifo.patch
- From: 5.15.0-144.157
- CVE-2025-37949
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2025-37949.patch
- From:
- CVE-2025-37995
- Description:
module: ensure that kobject_put() is safe for module type kobjects
- CVE: https://ubuntu.com/security/CVE-2025-37995
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37995-module-ensure-that-kobject-put-is-safe-for-module-type-kobjects.patch
- From: 5.15.0-144.157
- CVE-2025-37994
- Description:
usb: typec: ucsi: displayport: Fix NULL pointer access
- CVE: https://ubuntu.com/security/CVE-2025-37994
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37994-usb-typec-ucsi-displayport-fix-null-pointer-access.patch
- From: 5.15.0-144.157
- CVE-2025-38024
- Description:
RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug
- CVE: https://ubuntu.com/security/CVE-2025-38024
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38024-rdma-rxe-fix-slab-use-after-free-read-in-rxe-queue-cleanup-bug.patch
- From: 5.15.0-144.157
- CVE-2025-38023
- Description:
nfs: handle failure of nfs_get_lock_context in unlock path
- CVE: https://ubuntu.com/security/CVE-2025-38023
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38023-nfs-handle-failure-of-nfs-get-lock-context-in-unlock-path.patch
- From: 5.15.0-144.157
- CVE-2025-37992
- Description:
net_sched: Flush gso_skb list too during ->change()
- CVE: https://ubuntu.com/security/CVE-2025-37992
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37992-net-sched-flush-gso-skb-list-too-during-change.patch
- From: 5.15.0-144.157
- CVE-2025-38094
- Description:
net: cadence: macb: Fix a possible deadlock in macb_halt_tx.
- CVE: https://ubuntu.com/security/CVE-2025-38094
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38094-net-cadence-macb-fix-a-possible-deadlock-in-macb-halt-tx.patch
- From: 5.15.0-144.157
- CVE-2025-38009
- Description:
wifi: mt76: disable napi on driver removal
- CVE: https://ubuntu.com/security/CVE-2025-38009
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38009-wifi-mt76-disable-napi-on-driver-removal.patch
- From: 5.15.0-144.157
- CVE-2025-38005
- Description:
dmaengine: ti: k3-udma: Add missing locking
- CVE: https://ubuntu.com/security/CVE-2025-38005
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38005-dmaengine-ti-k3-udma-add-missing-locking.patch
- From: 5.15.0-144.157
- CVE-2025-37967
- Description:
usb: typec: ucsi: displayport: Fix deadlock
- CVE: https://ubuntu.com/security/CVE-2025-37967
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37967-usb-typec-ucsi-displayport-fix-deadlock.patch
- From: 5.15.0-144.157
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://ubuntu.com/security/CVE-2024-53203
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-53203-usb-typec-fix-potential-array-underflow-in-ucsi-ccg-sync-control.patch
- From: 5.15.0-144.157
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://ubuntu.com/security/CVE-2024-53203
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-53203-usb-typec-fix-pm-usage-counter-imbalance-in-ucsi_ccg_sync_control.patch
- From: 5.15.0-144.157
- CVE-2024-46751
- Description:
btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info()
- CVE: https://ubuntu.com/security/CVE-2024-46751
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-46751-btrfs-don-t-bug-on-when-0-reference-count-at-btrfs-lookup-extent-info.patch
- From: 5.15.0-144.157
- CVE-2022-49168
- Description:
btrfs: do not clean up repair bio if submit fails
- CVE: https://ubuntu.com/security/CVE-2022-49168
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-49168-btrfs-do-not-clean-up-repair-bio-if-submit-fails.patch
- From: 5.15.0-144.157
- CVE-2022-49063
- Description:
ice: arfs: fix use-after-free when freeing @rx_cpu_rmap
- CVE: https://ubuntu.com/security/CVE-2022-49063
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-49063-ice-arfs-fix-use-after-free-when-freeing-rx-cpu-rmap.patch
- From: 5.15.0-144.157
- CVE-2024-50073
- Description:
tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
- CVE: https://ubuntu.com/security/CVE-2024-50073
- Patch: ubuntu-jammy/5.15.0-151.161/CVE-2024-50073-tty-n-gsm-fix-use-after-free-in-gsm-cleanup-mux.patch
- From: 5.15.0-151.161
- CVE-2025-38083
- Description:
net_sched: prio: fix a race in prio_tune()
- CVE: https://ubuntu.com/security/CVE-2025-38083
- Patch: ubuntu-jammy/5.15.0-151.161/CVE-2025-38083-net-sched-prio-fix-a-race-in-prio-tune.patch
- From: 5.15.0-151.161
- CVE-2025-38075
- Description:
scsi: target: iscsi: Fix timeout on deleted connection
- CVE: https://ubuntu.com/security/CVE-2025-38075
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38075-scsi-target-iscsi-fix-timeout-on-deleted-connection.patch
- From: 5.15.0-152.162
- CVE-2025-38048
- Description:
virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN
- CVE: https://ubuntu.com/security/CVE-2025-38048
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38048-virtio-ring-fix-data-race-by-tagging-event-triggered-as-racy-for-kcsan.patch
- From: 5.15.0-152.162
- CVE-2025-38072
- Description:
libnvdimm/labels: Fix divide error in nd_label_data_init()
- CVE: https://ubuntu.com/security/CVE-2025-38072
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38072-libnvdimm-labels-fix-divide-error-in-nd-label-data-init.patch
- From: 5.15.0-152.162
- CVE-2025-38066
- Description:
dm cache: prevent BUG_ON by blocking retries on failed device resumes
- CVE: https://ubuntu.com/security/CVE-2025-38066
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38066-dm-cache-prevent-bug-on-by-blocking-retries-on-failed-device-resumes.patch
- From: 5.15.0-152.162
- CVE-2025-38065
- Description:
orangefs: Do not truncate file size
- CVE: https://ubuntu.com/security/CVE-2025-38065
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38065-orangefs-do-not-truncate-file-size.patch
- From: 5.15.0-152.162
- CVE-2025-38044
- Description:
media: cx231xx: set device_caps for 417
- CVE: https://ubuntu.com/security/CVE-2025-38044
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38044-media-cx231xx-set-device-caps-for-417.patch
- From: 5.15.0-152.162
- CVE-2025-38043
- Description:
firmware: arm_ffa: Set dma_mask for ffa devices
- CVE: https://ubuntu.com/security/CVE-2025-38043
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38043-firmware-arm-ffa-set-dma-mask-for-ffa-devices-97.patch
- From: 5.15.0-152.162
- CVE-2025-38043
- Description:
firmware: arm_ffa: Set dma_mask for ffa devices
- CVE: https://ubuntu.com/security/CVE-2025-38043
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38043-firmware-arm-ffa-set-dma-mask-for-ffa-devices-kpatch.patch
- From: 5.15.0-152.162
- CVE-2025-38061
- Description:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
- CVE: https://ubuntu.com/security/CVE-2025-38061
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38061-net-pktgen-fix-access-outside-of-user-given-buffer-in-pktgen-thread-write.patch
- From: 5.15.0-152.162
- CVE-2025-38037
- Description:
vxlan: Annotate FDB data races
- CVE: https://ubuntu.com/security/CVE-2025-38037
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38037-vxlan-annotate-fdb-data-races.patch
- From: 5.15.0-152.162
- CVE-2025-38035
- Description:
nvmet-tcp: don't restore null sk_state_change
- CVE: https://ubuntu.com/security/CVE-2025-38035
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38035-nvmet-tcp-don-t-restore-null-sk-state-change.patch
- From: 5.15.0-152.162
- CVE-2025-38058
- Description:
__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock
- CVE: https://ubuntu.com/security/CVE-2025-38058
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38058-legitimize-mnt-check-for-mnt-sync-umount-should-be-under-mount-lock-143.patch
- From: 5.15.0-152.162
- CVE-2025-38052
- Description:
Complex adaptation required. Low impact CVE
- CVE:
- Patch: skipped/CVE-2025-38052.patch
- From:
- CVE-2025-38079
- Description:
crypto: algif_hash - fix double free in hash_accept
- CVE: https://ubuntu.com/security/CVE-2025-38079
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38079-crypto-algif-hash-fix-double-free-in-hash-accept.patch
- From: 5.15.0-152.162
- CVE-2025-38031
- Description:
padata: do not leak refcount in reorder_work
- CVE: https://ubuntu.com/security/CVE-2025-38031
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38031-padata-do-not-leak-refcount-in-reorder-work-139.patch
- From: 5.15.0-152.162
- CVE-2025-38004
- Description:
can: bcm: add locking for bcm_op runtime updates
- CVE: https://ubuntu.com/security/CVE-2025-38004
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38004-can-bcm-add-locking-for-bcm-op-runtime-updates.patch
- From: 5.15.0-152.162
- CVE-2025-38004
- Description:
can: bcm: add locking for bcm_op runtime updates
- CVE: https://ubuntu.com/security/CVE-2025-38004
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38004-can-bcm-add-locking-for-bcm-op-runtime-updates-kpatch.patch
- From: 5.15.0-152.162
- CVE-2025-38003
- Description:
can: bcm: add missing rcu read protection for procfs content
- CVE: https://ubuntu.com/security/CVE-2025-38003
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38003-can-bcm-add-missing-rcu-read-protection-for-procfs-content.patch
- From: 5.15.0-152.162
- CVE-2025-38078
- Description:
ALSA: pcm: Fix race of buffer access at PCM OSS layer
- CVE: https://ubuntu.com/security/CVE-2025-38078
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38078-alsa-pcm-fix-race-of-buffer-access-at-pcm-oss-layer.patch
- From: 5.15.0-152.162
- CVE-2025-38077
- Description:
platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()
- CVE: https://ubuntu.com/security/CVE-2025-38077
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38077-platform-x86-dell-wmi-sysman-avoid-buffer-overflow-in-current-password-store.patch
- From: 5.15.0-152.162
- CVE-2025-38051
- Description:
smb: client: Fix use-after-free in cifs_fill_dirent
- CVE: https://ubuntu.com/security/CVE-2025-38051
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38051-smb-client-fix-use-after-free-in-cifs-fill-dirent.patch
- From: 5.15.0-152.162
- CVE-2024-27407
- Description:
fs/ntfs3: Fixed overflow check in mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-27407
- Patch: ubuntu-jammy/5.15.0-153.163/CVE-2024-27407-fs-ntfs3-fixed-overflow-check-in-mi-enum-attr.patch
- From: 5.15.0-153.163
- CVE-2025-38350
- Description:
net/sched: Always pass notifications when child class becomes empty
- CVE: https://ubuntu.com/security/CVE-2025-38350
- Patch: ubuntu-jammy/5.15.0-153.163/CVE-2025-38350-net-sched-always-pass-notifications-when-child-class-becomes-empty.patch
- From: 5.15.0-153.163
- CVE-2025-38174
- Description:
thunderbolt: Do not double dequeue a configuration request
- CVE: https://ubuntu.com/security/CVE-2025-38174
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38174-thunderbolt-do-not-double-dequeue-a-configuration-request.patch
- From: 5.15.0-156.166
- CVE-2025-38173
- Description:
crypto: marvell/cesa - Handle zero-length skcipher requests
- CVE: https://ubuntu.com/security/CVE-2025-38173
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38173-crypto-marvell-cesa-handle-zero-length-skcipher-requests.patch
- From: 5.15.0-156.166
- CVE-2025-38319
- Description:
drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table
- CVE: https://ubuntu.com/security/CVE-2025-38319
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38319-drm-amd-pp-fix-potential-null-pointer-dereference-in-atomctrl-initialize-mc-reg-table.patch
- From: 5.15.0-156.166
- CVE-2025-38167
- Description:
fs/ntfs3: handle hdr_first_de() return value
- CVE: https://ubuntu.com/security/CVE-2025-38167
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38167-fs-ntfs3-handle-hdr-first-de-return-value.patch
- From: 5.15.0-156.166
- CVE-2025-38293
- Description:
wifi: ath11k: fix node corruption in ar->arvifs list
- CVE: https://ubuntu.com/security/CVE-2025-38293
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38293-wifi-ath11k-fix-node-corruption-in-ar-arvifs-list.patch
- From: 5.15.0-156.166
- CVE-2025-38163
- Description:
f2fs: fix to do sanity check on sbi->total_valid_block_count
- CVE: https://ubuntu.com/security/CVE-2025-38163
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38163-f2fs-fix-to-do-sanity-check-on-sbi-total-valid-block-count.patch
- From: 5.15.0-156.166
- CVE-2025-38160
- Description:
clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()
- CVE: https://ubuntu.com/security/CVE-2025-38160
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38160-clk-bcm-rpi-add-null-check-in-raspberrypi-clk-register.patch
- From: 5.15.0-156.166
- CVE-2025-38285
- Description:
bpf: Fix WARN() in get_bpf_raw_tp_regs
- CVE: https://ubuntu.com/security/CVE-2025-38285
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38285-bpf-fix-warn-in-get-bpf-raw-tp-regs.patch
- From: 5.15.0-156.166
- CVE-2025-38159
- Description:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38159
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38159-wifi-rtw88-fix-the-para-buffer-size-to-avoid-reading-out-of-bounds.patch
- From: 5.15.0-156.166
- CVE-2025-38157
- Description:
wifi: ath9k_htc: Abort software beacon handling if disabled
- CVE: https://ubuntu.com/security/CVE-2025-38157
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38157-wifi-ath9k-htc-abort-software-beacon-handling-if-disabled.patch
- From: 5.15.0-156.166
- CVE-2025-38154
- Description:
bpf, sockmap: Avoid using sk_socket after free when sending
- CVE: https://ubuntu.com/security/CVE-2025-38154
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38154-bpf-sockmap-avoid-using-sk-socket-after-free-when-sending-5.15.0-117.127.patch
- From: 5.15.0-156.166
- CVE-2025-38153
- Description:
net: usb: aqc111: fix error handling of usbnet read calls
- CVE: https://ubuntu.com/security/CVE-2025-38153
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38153-net-usb-aqc111-fix-error-handling-of-usbnet-read-calls.patch
- From: 5.15.0-156.166
- CVE-2025-38280
- Description:
bpf: Avoid __bpf_prog_ret0_warn when jit fails
- CVE: https://ubuntu.com/security/CVE-2025-38280
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38280-bpf-avoid-bpf-prog-ret0-warn-when-jit-fails.patch
- From: 5.15.0-156.166
- CVE-2025-38147
- Description:
calipso: Don't call calipso functions for AF_INET sk.
- CVE: https://ubuntu.com/security/CVE-2025-38147
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38147-calipso-don-t-call-calipso-functions-for-af-inet-sk.patch
- From: 5.15.0-156.166
- CVE-2025-38147
- Description:
calipso: unlock rcu before returning -EAFNOSUPPORT
- CVE: https://ubuntu.com/security/CVE-2025-38147
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38147-calipso-unlock-rcu-before-returning-EAFNOSUPPORT.patch
- From: 5.15.0-156.166
- CVE-2025-38146
- Description:
net: openvswitch: Fix the dead loop of MPLS parse
- CVE: https://ubuntu.com/security/CVE-2025-38146
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38146-net-openvswitch-fix-the-dead-loop-of-mpls-parse.patch
- From: 5.15.0-156.166
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://ubuntu.com/security/CVE-2025-38415
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38415-squashfs-check-return-result-of-sb-min-blocksize.patch
- From: 5.15.0-156.166
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://ubuntu.com/security/CVE-2025-38415
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38415-squashfs-check-return-result-of-sb-min-blocksize-kpatch.patch
- From: 5.15.0-156.166
- CVE-2025-38415
- Description:
squashfs: fix memory leak in squashfs_fill_super
- CVE: https://ubuntu.com/security/CVE-2025-38415
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38415-squashfs-fix-memory-leak-in-squashfs_fill_super.patch
- From: 5.15.0-156.166
- CVE-2025-38313
- Description:
bus: fsl-mc: fix double-free on mc_dev
- CVE: https://ubuntu.com/security/CVE-2025-38313
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38313-bus-fsl-mc-fix-double-free-on-mc-dev.patch
- From: 5.15.0-156.166
- CVE-2025-38145
- Description:
soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop()
- CVE: https://ubuntu.com/security/CVE-2025-38145
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38145-soc-aspeed-add-null-check-in-aspeed-lpc-enable-snoop.patch
- From: 5.15.0-156.166
- CVE-2025-38312
- Description:
fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()
- CVE: https://ubuntu.com/security/CVE-2025-38312
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38312-fbdev-core-fbcvt-avoid-division-by-0-in-fb-cvt-hperiod.patch
- From: 5.15.0-156.166
- CVE-2025-38143
- Description:
backlight: pm8941: Add NULL check in wled_configure()
- CVE: https://ubuntu.com/security/CVE-2025-38143
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38143-backlight-pm8941-add-null-check-in-wled-configure.patch
- From: 5.15.0-156.166
- CVE-2025-38138
- Description:
dmaengine: ti: Add NULL check in udma_probe()
- CVE: https://ubuntu.com/security/CVE-2025-38138
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38138-dmaengine-ti-add-null-check-in-udma-probe.patch
- From: 5.15.0-156.166
- CVE-2025-38122
- Description:
gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO
- CVE: https://ubuntu.com/security/CVE-2025-38122
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38122-gve-add-missing-null-check-for-gve-alloc-pending-packet-in-tx-dqo.patch
- From: 5.15.0-156.166
- CVE-2025-38120
- Description:
netfilter: nf_set_pipapo_avx2: fix initial map fill
- CVE: https://ubuntu.com/security/CVE-2025-38120
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38120-netfilter-nf-set-pipapo-avx2-fix-initial-map-fill-105.patch
- From: 5.15.0-156.166
- CVE-2025-38310
- Description:
[PATCH] seg6: Fix validation of nexthop addresses
- CVE: https://ubuntu.com/security/CVE-2025-38310
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38310-seg6-Fix-validation-of-nexthop-addresses.patch
- From: 5.15.0-156.166
- CVE-2025-38310
- Description:
[PATCH] seg6: Fix validation of nexthop addresses
- CVE: https://ubuntu.com/security/CVE-2025-38310
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38310-seg6-Fix-validation-of-nexthop-addresses-kpatch.patch
- From: 5.15.0-156.166
- CVE-2025-38498
- Description:
do_change_type(): refuse to operate on unmounted/not ours mounts
- CVE: https://ubuntu.com/security/CVE-2025-38498
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38498-do-change-type-refuse-to-operate-on-unmounted-not-ours-mounts.patch
- From: 5.15.0-156.166
- CVE-2025-38498
- Description:
use uniform permission checks for all mount propagation changes
- CVE: https://ubuntu.com/security/CVE-2025-38498
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38498-use-uniform-permission-checks-for-all-mount-propagation-changes.patch
- From: 5.15.0-156.166
- CVE-2025-38119
- Description:
scsi: core: ufs: Fix a hang in the error handler
- CVE: https://ubuntu.com/security/CVE-2025-38119
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38119-scsi-core-ufs-fix-a-hang-in-the-error-handler.patch
- From: 5.15.0-156.166
- CVE-2025-38305
- Description:
ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use()
- CVE: https://ubuntu.com/security/CVE-2025-38305
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38305-ptp-remove-ptp-n-vclocks-check-logic-in-ptp-vclock-in-use.patch
- From: 5.15.0-156.166
- CVE-2025-38305
- Description:
ptp: fix breakage after ptp_vclock_in_use() rework
- CVE: https://ubuntu.com/security/CVE-2025-38305
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38305-ptp-fix-breakage-after-ptp_vclock_in_use-rework.patch
- From: 5.15.0-156.166
- CVE-2025-38115
- Description:
net_sched: sch_sfq: fix a potential crash on gso_skb handling
- CVE: https://ubuntu.com/security/CVE-2025-38115
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38115-net-sched-sch-sfq-fix-a-potential-crash-on-gso-skb-handling.patch
- From: 5.15.0-156.166
- CVE-2025-38088
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-38088.patch
- From:
- CVE-2025-38112
- Description:
net: Fix TOCTOU issue in sk_is_readable()
- CVE: https://ubuntu.com/security/CVE-2025-38112
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38112-net-fix-toctou-issue-in-sk-is-readable.patch
- From: 5.15.0-156.166
- CVE-2025-38111
- Description:
net/mdiobus: Fix potential out-of-bounds read/write access
- CVE: https://ubuntu.com/security/CVE-2025-38111
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38111-net-mdiobus-fix-potential-out-of-bounds-read-write-access.patch
- From: 5.15.0-156.166
- CVE-2025-38108
- Description:
net_sched: red: fix a race in __red_change()
- CVE: https://ubuntu.com/security/CVE-2025-38108
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38108-net-sched-red-fix-a-race-in-red-change.patch
- From: 5.15.0-156.166
- CVE-2025-38107
- Description:
net_sched: ets: fix a race in ets_qdisc_change()
- CVE: https://ubuntu.com/security/CVE-2025-38107
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38107-net-sched-ets-fix-a-race-in-ets-qdisc-change.patch
- From: 5.15.0-156.166
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://ubuntu.com/security/CVE-2025-38352
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle-posix-cpu-timers-and-posix-cpu-timer-del.patch
- From: 5.15.0-156.166
- CVE-2025-38102
- Description:
VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify
- CVE: https://ubuntu.com/security/CVE-2025-38102
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38102-vmci-fix-race-between-vmci-host-setup-notify-and-vmci-ctx-unset-notify.patch
- From: 5.15.0-156.166
- CVE-2025-38100
- Description:
x86/iopl: Cure TIF_IO_BITMAP inconsistencies
- CVE: https://ubuntu.com/security/CVE-2025-38100
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38100-x86-iopl-cure-tif-io-bitmap-inconsistencies.patch
- From: 5.15.0-156.166
- CVE-2025-38430
- Description:
nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request
- CVE: https://ubuntu.com/security/CVE-2025-38430
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38430-nfsd-nfsd4-spo-must-allow-must-check-this-is-a-v4-compound-request.patch
- From: 5.15.0-156.166
- CVE-2025-38231
- Description:
nfsd: Initialize ssc before laundromat_work to prevent NULL dereference
- CVE: https://ubuntu.com/security/CVE-2025-38231
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38231-nfsd-initialize-ssc-before-laundromat-work-to-prevent-null-dereference-5.15.0-124.134.patch
- From: 5.15.0-156.166
- CVE-2025-38337
- Description:
jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata()
- CVE: https://ubuntu.com/security/CVE-2025-38337
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38337-jbd2-fix-data-race-and-null-ptr-deref-in-jbd2-journal-dirty-metadata.patch
- From: 5.15.0-156.166
- CVE-2025-38229
- Description:
media: cxusb: no longer judge rbuf when the write fails
- CVE: https://ubuntu.com/security/CVE-2025-38229
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38229-media-cxusb-no-longer-judge-rbuf-when-the-write-fails.patch
- From: 5.15.0-156.166
- CVE-2025-38227
- Description:
media: vidtv: Terminating the subsequent process of initialization failure
- CVE: https://ubuntu.com/security/CVE-2025-38227
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38227-media-vidtv-terminating-the-subsequent-process-of-initialization-failure.patch
- From: 5.15.0-156.166
- CVE-2025-38226
- Description:
media: vivid: Change the siize of the composing
- CVE: https://ubuntu.com/security/CVE-2025-38226
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38226-media-vivid-change-the-siize-of-the-composing.patch
- From: 5.15.0-156.166
- CVE-2025-38336
- Description:
ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330
- CVE: https://ubuntu.com/security/CVE-2025-38336
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38336-ata-pata-via-force-pio-for-atapi-devices-on-vt6415-vt6330.patch
- From: 5.15.0-156.166
- CVE-2025-38222
- Description:
ext4: inline: fix len overflow in ext4_prepare_inline_data
- CVE: https://ubuntu.com/security/CVE-2025-38222
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38222-ext4-inline-fix-len-overflow-in-ext4-prepare-inline-data.patch
- From: 5.15.0-156.166
- CVE-2025-38428
- Description:
Input: ims-pcu - check record size in ims_pcu_flash_firmware()
- CVE: https://ubuntu.com/security/CVE-2025-38428
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38428-input-ims-pcu-check-record-size-in-ims-pcu-flash-firmware.patch
- From: 5.15.0-156.166
- CVE-2025-38219
- Description:
f2fs: prevent kernel warning due to negative i_nlink from corrupted image
- CVE: https://ubuntu.com/security/CVE-2025-38219
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38219-f2fs-prevent-kernel-warning-due-to-negative-i-nlink-from-corrupted-image.patch
- From: 5.15.0-156.166
- CVE-2025-38218
- Description:
f2fs: fix to do sanity check on sit_bitmap_size
- CVE: https://ubuntu.com/security/CVE-2025-38218
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38218-f2fs-fix-to-do-sanity-check-on-sit-bitmap-size.patch
- From: 5.15.0-156.166
- CVE-2025-38416
- Description:
NFC: nci: uart: Set tty->disc_data only in success path
- CVE: https://ubuntu.com/security/CVE-2025-38416
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38416-nfc-nci-uart-set-tty-disc-data-only-in-success-path.patch
- From: 5.15.0-156.166
- CVE-2025-38212
- Description:
ipc: fix to protect IPCS lookups using RCU
- CVE: https://ubuntu.com/security/CVE-2025-38212
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38212-ipc-fix-to-protect-ipcs-lookups-using-rcu.patch
- From: 5.15.0-156.166
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
- CVE: https://ubuntu.com/security/CVE-2025-38211
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38211-rdma-iwcm-fix-use-after-free-of-work-objects-after-cm-id-destruction.patch
- From: 5.15.0-156.166
- CVE-2025-38346
- Description:
ftrace: Fix UAF when lookup kallsym after ftrace disabled
- CVE: https://ubuntu.com/security/CVE-2025-38346
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38346-ftrace-fix-uaf-when-lookup-kallsym-after-ftrace-disabled.patch
- From: 5.15.0-156.166
- CVE-2025-38086
- Description:
net: ch9200: fix uninitialised access during mii_nway_restart
- CVE: https://ubuntu.com/security/CVE-2025-38086
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38086-net-ch9200-fix-uninitialised-access-during-mii-nway-restart.patch
- From: 5.15.0-156.166
- CVE-2025-38419
- Description:
remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()
- CVE: https://ubuntu.com/security/CVE-2025-38419
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38419-remoteproc-core-cleanup-acquired-resources-when-rproc-handle-resources-fails-in-rproc-attach.patch
- From: 5.15.0-156.166
- CVE-2025-38418
- Description:
remoteproc: core: Release rproc->clean_table after rproc_attach() fails
- CVE: https://ubuntu.com/security/CVE-2025-38418
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38418-remoteproc-core-release-rproc-clean-table-after-rproc-attach-fails.patch
- From: 5.15.0-156.166
- CVE-2025-38345
- Description:
Kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2025-38345.patch
- From:
- CVE-2025-38344
- Description:
ACPICA: fix acpi parse and parseext cache leaks
- CVE: https://ubuntu.com/security/CVE-2025-38344
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38344-acpica-fix-acpi-parse-and-parseext-cache-leaks.patch
- From: 5.15.0-156.166
- CVE-2025-38206
- Description:
exfat: fix double free in delayed_free
- CVE: https://ubuntu.com/security/CVE-2025-38206
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38206-exfat-fix-double-free-in-delayed-free.patch
- From: 5.15.0-156.166
- CVE-2025-38204
- Description:
jfs: fix array-index-out-of-bounds read in add_missing_indices
- CVE: https://ubuntu.com/security/CVE-2025-38204
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38204-jfs-fix-array-index-out-of-bounds-read-in-add-missing-indices.patch
- From: 5.15.0-156.166
- CVE-2025-38203
- Description:
jfs: Fix null-ptr-deref in jfs_ioc_trim
- CVE: https://ubuntu.com/security/CVE-2025-38203
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38203-jfs-Fix-null-ptr-deref-in-jfs_ioc_trim.patch
- From: 5.15.0-156.166
- CVE-2025-38237
- Description:
media: platform: exynos4-is: Add hardware sync wait to fimc_is_hw_change_mode()
- CVE: https://ubuntu.com/security/CVE-2025-38237
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38237-media-platform-exynos4-is-Add-hardware-sync-wait-to-fimc_is_hw_change_mode.patch
- From: 5.15.0-156.166
- CVE-2025-38342
- Description:
software node: Correct a OOB check in software_node_get_reference_args()
- CVE: https://ubuntu.com/security/CVE-2025-38342
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38342-software-node-correct-a-oob-check-in-software-node-get-reference-args.patch
- From: 5.15.0-156.166
- CVE-2025-38332
- Description:
scsi: lpfc: Use memcpy() for BIOS version
- CVE: https://ubuntu.com/security/CVE-2025-38332
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38332-scsi-lpfc-use-memcpy-for-bios-version.patch
- From: 5.15.0-156.166
- CVE-2025-38200
- Description:
i40e: fix MMIO write access to an invalid page in i40e_clear_hw
- CVE: https://ubuntu.com/security/CVE-2025-38200
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38200-i40e-fix-mmio-write-access-to-an-invalid-page-in-i40e-clear-hw.patch
- From: 5.15.0-156.166
- CVE-2025-38197
- Description:
platform/x86: dell_rbu: Fix list usage
- CVE: https://ubuntu.com/security/CVE-2025-38197
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38197-platform-x86-dell-rbu-fix-list-usage.patch
- From: 5.15.0-156.166
- CVE-2025-38090
- Description:
drivers/rapidio/rio_cm.c: prevent possible heap overwrite
- CVE: https://ubuntu.com/security/CVE-2025-38090
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38090-drivers-rapidio-rio-cm-c-prevent-possible-heap-overwrite.patch
- From: 5.15.0-156.166
- CVE-2025-38194
- Description:
jffs2: check that raw node were preallocated before writing summary
- CVE: https://ubuntu.com/security/CVE-2025-38194
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38194-jffs2-check-that-raw-node-were-preallocated-before-writing-summary.patch
- From: 5.15.0-156.166
- CVE-2025-38328
- Description:
jffs2: check jffs2_prealloc_raw_node_refs() result in few other places
- CVE: https://ubuntu.com/security/CVE-2025-38328
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38328-jffs2-check-jffs2-prealloc-raw-node-refs-result-in-few-other-places.patch
- From: 5.15.0-156.166
- CVE-2025-38084
- Description:
mm/hugetlb: unshare page tables during VMA split, not before
- CVE: https://ubuntu.com/security/CVE-2025-38084
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38084-mm-hugetlb-unshare-page-tables-during-vma-split-not-before.patch
- From: 5.15.0-156.166
- CVE-2024-57883
- Description:
Complex adaptation required
- CVE:
- Patch: skipped/CVE-2024-57883.patch
- From:
- CVE-2025-38085
- Description:
Complex adaptation required. High risk of regression.
- CVE:
- Patch: skipped/CVE-2025-38085.patch
- From:
- CVE-2025-38326
- Description:
aoe: clean device rq_list in aoedev_downdev()
- CVE: https://ubuntu.com/security/CVE-2025-38326
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38326-aoe-clean-device-rq_list-in-aoedev_downdev.patch
- From: 5.15.0-156.166
- CVE-2025-38420
- Description:
wifi: carl9170: do not ping device which has failed to load firmware
- CVE: https://ubuntu.com/security/CVE-2025-38420
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38420-wifi-carl9170-do-not-ping-device-which-has-failed-to-load-firmware.patch
- From: 5.15.0-156.166
- CVE-2025-38324
- Description:
mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu().
- CVE: https://ubuntu.com/security/CVE-2025-38324
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38324-mpls-use-rcu-dereference-rtnl-in-mpls-route-input-rcu.patch
- From: 5.15.0-156.166
- CVE-2025-38184
- Description:
tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer
- CVE: https://ubuntu.com/security/CVE-2025-38184
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38184-tipc-fix-null-ptr-deref-when-acquiring-remote-ip-of-ethernet-bearer.patch
- From: 5.15.0-156.166
- CVE-2025-38181
- Description:
calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().
- CVE: https://ubuntu.com/security/CVE-2025-38181
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38181-calipso-fix-null-ptr-deref-in-calipso-req-set-del-attr.patch
- From: 5.15.0-156.166
- CVE-2025-37958
- Description:
mm/huge_memory: fix dereferencing invalid pmd migration entry
- CVE: https://ubuntu.com/security/CVE-2025-37958
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-37958-mm-huge-memory-fix-dereferencing-invalid-pmd-migration-entry.patch
- From: 5.15.0-156.166
- CVE-2025-38424
- Description:
perf: Fix sample vs do_exit()
- CVE: https://ubuntu.com/security/CVE-2025-38424
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38424-perf-fix-sample-vs-do-exit.patch
- From: 5.15.0-156.166
- CVE-2025-38320
- Description:
arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth()
- CVE: https://ubuntu.com/security/CVE-2025-38320
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38320-arm64-ptrace-fix-stack-out-of-bounds-read-in-regs-get-kernel-stack-nth.patch
- From: 5.15.0-156.166
- CVE-2025-38263
- Description:
bcache: fix NULL pointer in cache_set_flush()
- CVE: https://ubuntu.com/security/CVE-2025-38263
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38263-bcache-fix-NULL-pointer-in-cache_set_flush.patch
- From: 5.15.0-156.166
- CVE-2025-38257
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-38257.patch
- From:
- CVE-2025-38251
- Description:
atm: clip: prevent NULL deref in clip_push()
- CVE: https://ubuntu.com/security/CVE-2025-38251
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38251-atm-clip-prevent-null-deref-in-clip-push.patch
- From: 5.15.0-156.166
- CVE-2025-38249
- Description:
ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()
- CVE: https://ubuntu.com/security/CVE-2025-38249
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38249-ALSA-usb-audio-Fix-out-of-bounds-read-in-snd_usb_get_audioformat_uac3.patch
- From: 5.15.0-156.166
- CVE-2025-38245
- Description:
atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().
- CVE: https://ubuntu.com/security/CVE-2025-38245
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38245-atm-Release-atm_dev_mutex-after-removing-procfs-in-atm_dev_deregister.patch
- From: 5.15.0-156.166
- CVE-2025-38363
- Description:
drm/tegra: Fix a possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-38363
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38363-drm-tegra-fix-a-possible-null-pointer-dereference.patch
- From: 5.15.0-156.166
- CVE-2025-38362
- Description:
drm/amd/display: Add null pointer check for get_first_active_display()
- CVE: https://ubuntu.com/security/CVE-2025-38362
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38362-drm-amd-display-add-null-pointer-check-for-get-first-active-display.patch
- From: 5.15.0-156.166
- CVE-2025-38245
- Description:
btrfs: don't drop extent_map for free space inode on write error
- CVE: https://ubuntu.com/security/CVE-2025-38245
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2024-26726-btrfs-don-t-drop-extent_map-for-free-space-inode-on-write-error.patch
- From: 5.15.0-156.166
- CVE-2025-38403
- Description:
vsock/vmci: Clear the vmci transport packet properly when initializing it
- CVE: https://ubuntu.com/security/CVE-2025-38403
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38403-vsock-vmci-clear-the-vmci-transport-packet-properly-when-initializing-it.patch
- From: 5.15.0-156.166
- CVE-2025-38391
- Description:
usb: typec: altmodes/displayport: do not index invalid pin_assignments
- CVE: https://ubuntu.com/security/CVE-2025-38391
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38391-usb-typec-altmodes-displayport-do-not-index-invalid-pin-assignments.patch
- From: 5.15.0-156.166
- CVE-2025-38401
- Description:
mtk-sd: Prevent memory corruption from DMA map failure
- CVE: https://ubuntu.com/security/CVE-2025-38401
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38401-mtk-sd-Prevent-memory-corruption-from-DMA-map-failure.patch
- From: 5.15.0-156.166
- CVE-2025-38401
- Description:
mtk-sd: reset host->mrq on prepare_data() error
- CVE: https://ubuntu.com/security/CVE-2025-38401
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38401-mtk-sd-reset-host-mrq-on-prepare_data-error.patch
- From: 5.15.0-156.166
- CVE-2025-38387
- Description:
RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert
- CVE: https://ubuntu.com/security/CVE-2025-38387
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38387-rdma-mlx5-initialize-obj-event-obj-sub-list-before-xa-insert.patch
- From: 5.15.0-156.166
- CVE-2025-38393
- Description:
NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN
- CVE: https://ubuntu.com/security/CVE-2025-38393
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38393-nfsv4-pnfs-fix-a-race-to-wake-on-nfs-layout-drain.patch
- From: 5.15.0-156.166
- CVE-2025-38412
- Description:
platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks
- CVE: https://ubuntu.com/security/CVE-2025-38412
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38412-platform-x86-dell-wmi-sysman-fix-wmi-data-block-retrieval-in-sysfs-callbacks.patch
- From: 5.15.0-156.166
- CVE-2025-38389
- Description:
drm/i915/gt: Fix timeline left held on VMA alloc error
- CVE: https://ubuntu.com/security/CVE-2025-38389
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38389-drm-i915-gt-fix-timeline-left-held-on-vma-alloc-error.patch
- From: 5.15.0-156.166
- CVE-2025-38377
- Description:
rose: fix dangling neighbour pointers in rose_rt_device_down()
- CVE: https://ubuntu.com/security/CVE-2025-38377
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38377-rose-fix-dangling-neighbour-pointers-in-rose-rt-device-down.patch
- From: 5.15.0-156.166
- CVE-2025-38410
- Description:
drm/msm: Fix a fence leak in submit error path
- CVE: https://ubuntu.com/security/CVE-2025-38410
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38410-drm-msm-fix-a-fence-leak-in-submit-error-path.patch
- From: 5.15.0-156.166
- CVE-2025-38399
- Description:
scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()
- CVE: https://ubuntu.com/security/CVE-2025-38399
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38399-scsi-target-fix-null-pointer-dereference-in-core-scsi3-decode-spec-i-port.patch
- From: 5.15.0-156.166
- CVE-2025-38406
- Description:
wifi: ath6kl: remove WARN on bad firmware input
- CVE: https://ubuntu.com/security/CVE-2025-38406
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38406-wifi-ath6kl-remove-warn-on-bad-firmware-input.patch
- From: 5.15.0-156.166
- CVE-2025-38386
- Description:
ACPICA: Refuse to evaluate a method if arguments are missing
- CVE: https://ubuntu.com/security/CVE-2025-38386
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38386-acpica-refuse-to-evaluate-a-method-if-arguments-are-missing.patch
- From: 5.15.0-156.166
- CVE-2025-38384
- Description:
mtd: spinand: fix memory leak of ECC engine conf
- CVE: https://ubuntu.com/security/CVE-2025-38384
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38384-mtd-spinand-fix-memory-leak-of-ecc-engine-conf.patch
- From: 5.15.0-156.166
- CVE-2025-38467
- Description:
drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling
- CVE: https://ubuntu.com/security/CVE-2025-38467
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38467-drm-exynos-exynos7-drm-decon-add-vblank-check-in-irq-handling.patch
- From: 5.15.0-156.166
- CVE-2025-38466
- Description:
perf: Revert to requiring CAP_SYS_ADMIN for uprobes
- CVE: https://ubuntu.com/security/CVE-2025-38466
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38466-perf-revert-to-requiring-cap-sys-admin-for-uprobes.patch
- From: 5.15.0-156.166
- CVE-2025-38465
- Description:
netlink: Fix wraparounds of sk->sk_rmem_alloc.
- CVE: https://ubuntu.com/security/CVE-2025-38465
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38465-netlink-fix-wraparounds-of-sk-sk-rmem-alloc-5.15.0-124.134.patch
- From: 5.15.0-156.166
- CVE-2025-38464
- Description:
tipc: Fix use-after-free in tipc_conn_close().
- CVE: https://ubuntu.com/security/CVE-2025-38464
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38464-tipc-fix-use-after-free-in-tipc-conn-close.patch
- From: 5.15.0-156.166
- CVE-2025-38462
- Description:
vsock: Fix transport_{g2h,h2g} TOCTOU
- CVE: https://ubuntu.com/security/CVE-2025-38462
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38462-vsock-fix-transport-g2h-h2g-toctou.patch
- From: 5.15.0-156.166
- CVE-2025-38461
- Description:
vsock: Fix transport_* TOCTOU
- CVE: https://ubuntu.com/security/CVE-2025-38461
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38461-vsock-fix-transport-toctou.patch
- From: 5.15.0-156.166
- CVE-2025-38460
- Description:
atm: clip: Fix potential null-ptr-deref in to_atmarpd().
- CVE: https://ubuntu.com/security/CVE-2025-38460
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38460-atm-clip-fix-potential-null-ptr-deref-in-to-atmarpd.patch
- From: 5.15.0-156.166
- CVE-2025-38459
- Description:
atm: clip: Fix infinite recursive call of clip_push().
- CVE: https://ubuntu.com/security/CVE-2025-38459
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38459-atm-clip-fix-infinite-recursive-call-of-clip-push.patch
- From: 5.15.0-156.166
- CVE-2025-38458
- Description:
atm: Revert atm_account_tx() if copy_from_iter_full() fails.
- CVE: https://ubuntu.com/security/CVE-2025-38458
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38458-atm-revert-atm_account_tx-if-copy_from_iter_full-fails.patch
- From: 5.15.0-156.166
- CVE-2025-38458
- Description:
atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
- CVE: https://ubuntu.com/security/CVE-2025-38458
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38458-atm-clip-fix-null-pointer-dereference-in-vcc-sendmsg.patch
- From: 5.15.0-156.166
- CVE-2025-38458
- Description:
atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
- CVE: https://ubuntu.com/security/CVE-2025-38458
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38458-atm-clip-fix-null-pointer-dereference-in-vcc-sendmsg-kpatch.patch
- From: 5.15.0-156.166
- CVE-2025-38457
- Description:
net/sched: Abort __tc_modify_qdisc if parent class does not exist
- CVE: https://ubuntu.com/security/CVE-2025-38457
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38457-net-sched-abort-tc-modify-qdisc-if-parent-class-does-not-exist.patch
- From: 5.15.0-156.166
- CVE-2025-38514
- Description:
rxrpc: Fix oops due to non-existence of prealloc backlog struct
- CVE: https://ubuntu.com/security/CVE-2025-38514
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38514-rxrpc-fix-oops-due-to-non-existence-of-prealloc-backlog-struct.patch
- From: 5.15.0-156.166
- CVE-2022-48703
- Description:
thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR
- CVE: https://ubuntu.com/security/CVE-2022-48703
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2022-48703-thermal-int340x-thermal-handle-data-vault-when-the-value-is-zero-size-ptr.patch
- From: 5.15.0-156.166
- CVE-2024-26775
- Description:
aoe: avoid potential deadlock at set_capacity
- CVE: https://ubuntu.com/security/CVE-2024-26775
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2024-26775-aoe-avoid-potential-deadlock-at-set-capacity.patch
- From: 5.15.0-156.166
- CVE-2024-44939
- Description:
jfs: fix null ptr deref in dtInsertEntry
- CVE: https://ubuntu.com/security/CVE-2024-44939
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2024-44939-jfs-fix-null-ptr-deref-in-dtinsertentry.patch
- From: 5.15.0-156.166
- CVE-2025-38515
- Description:
drm/sched: Increment job count before swapping tail spsc queue
- CVE: https://ubuntu.com/security/CVE-2025-38515
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38515-drm-sched-increment-job-count-before-swapping-tail-spsc-queue.patch
- From: 5.15.0-156.166
- CVE-2025-38448
- Description:
usb: gadget: u_serial: Fix race condition in TTY wakeup
- CVE: https://ubuntu.com/security/CVE-2025-38448
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38448-usb-gadget-u-serial-fix-race-condition-in-tty-wakeup-134.patch
- From: 5.15.0-156.166
- CVE-2025-38375
- Description:
virtio-net: ensure the received length does not exceed allocated size
- CVE: https://ubuntu.com/security/CVE-2025-38375
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38375-virtio-net-ensure-the-received-length-does-not-exceed-allocated-size.patch
- From: 5.15.0-156.166
- CVE-2025-38513
- Description:
wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()
- CVE: https://ubuntu.com/security/CVE-2025-38513
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38513-wifi-zd1211rw-fix-potential-null-pointer-dereference-in-zd-mac-tx-to-dev.patch
- From: 5.15.0-156.166
- CVE-2025-38445
- Description:
md/raid1: Fix stack memory use after return in raid1_reshape
- CVE: https://ubuntu.com/security/CVE-2025-38445
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38445-md-raid1-fix-stack-memory-use-after-return-in-raid1-reshape.patch
- From: 5.15.0-156.166
- CVE-2025-38444
- Description:
raid10: cleanup memleak at raid10_make_request
- CVE: https://ubuntu.com/security/CVE-2025-38444
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38444-raid10-cleanup-memleak-at-raid10-make-request.patch
- From: 5.15.0-156.166
- CVE-2025-38443
- Description:
nbd: fix uaf in nbd_genl_connect() error path
- CVE: https://ubuntu.com/security/CVE-2025-38443
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38443-nbd-fix-uaf-in-nbd-genl-connect-error-path.patch
- From: 5.15.0-156.166
- CVE-2025-38439
- Description:
bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT
- CVE: https://ubuntu.com/security/CVE-2025-38439
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38439-bnxt-en-set-dma-unmap-len-correctly-for-xdp-redirect.patch
- From: 5.15.0-156.166
- CVE-2025-38074
- Description:
vhost-scsi: protect vq->log_used with vq->mutex
- CVE: https://ubuntu.com/security/CVE-2025-38074
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38074-vhost-scsi-protect-vq-log-used-with-vq-mutex.patch
- From: 5.15.0-156.166
- CVE-2025-38067
- Description:
postponed
- CVE:
- Patch: skipped/CVE-2025-38067.patch
- From:
- CVE-2025-21888
- Description:
RDMA/mlx5: Fix a WARN during dereg_mr for DM type
- CVE: https://ubuntu.com/security/CVE-2025-21888
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-21888-rdma-mlx5-fix-a-warn-during-dereg-mr-for-dm-type.patch
- From: 5.15.0-156.166
- CVE-2025-38618
- Description:
vsock: Do not allow binding to VMADDR_PORT_ANY
- CVE: https://ubuntu.com/security/CVE-2025-38618
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38618-vsock-do-not-allow-binding-to-vmaddr-port-any.patch
- From: 5.15.0-157.167
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://ubuntu.com/security/CVE-2025-38477
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38477-net-sched-sch-qfq-fix-race-condition-on-qfq-aggregate.patch
- From: 5.15.0-157.167
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class
- CVE: https://ubuntu.com/security/CVE-2025-38477
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38477-net-sched-sch-qfq-avoid-triggering-might-sleep-in-atomic-context-in-qfq-delete-class.patch
- From: 5.15.0-157.167
- CVE-2025-38617
- Description:
net/packet: fix a race in packet_set_ring() and acket_notifier()
- CVE: https://ubuntu.com/security/CVE-2025-38617
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38617-net-packet-fix-a-race-in-packet_set_ring-and-packet_notifier.patch
- From: 5.15.0-157.167
- CVE-2024-26700
- Description:
drm/amd/display: Fix MST Null Ptr for RV
- CVE: https://ubuntu.com/security/CVE-2024-26700
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2024-26700-drm-amd-display-Fix-MST-Null-Ptr-for-RV.patch
- From: 5.15.0-160.170
- CVE-2023-52593
- Description:
wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()
- CVE: https://ubuntu.com/security/CVE-2023-52593
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2023-52593-wifi-wfx-fix-possible-NULL-pointer-dereference-in-wfx_set_mfp_ap.patch
- From: 5.15.0-160.170
- CVE-2023-52593 CVE-2024-26896
- Description:
wifi: wfx: repair open network AP mode
- CVE: https://ubuntu.com/security/CVE-2024-26896
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2023-52593-CVE-2024-26896-wifi-wfx-fix-memory-leak-when-starting-AP.patch
- From: 5.15.0-160.170
- CVE-2023-52593
- Description:
wifi: wfx: repair open network AP mode
- CVE: https://ubuntu.com/security/CVE-2023-52593
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2023-52593-wifi-wfx-repair-open-network-AP-mode.patch
- From: 5.15.0-160.170
- CVE-2024-53068
- Description:
firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier()
- CVE: https://ubuntu.com/security/CVE-2024-53068
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2024-53068-firmware-arm-scmi-fix-slab-use-after-free-in-scmi-bus-notifier.patch
- From: 5.15.0-163.173
- CVE-2025-38678
- Description:
netfilter: nf_tables: reject duplicate device on updates
- CVE: https://ubuntu.com/security/CVE-2025-38678
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38678-netfilter-nf-tables-reject-duplicate-device-on-updates.patch
- From: 5.15.0-163.173
- CVE-2025-38535
- Description:
phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode
- CVE: https://ubuntu.com/security/CVE-2025-38535
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38535-phy-tegra-xusb-fix-unbalanced-regulator-disable-in-utmi-phy-mode.patch
- From: 5.15.0-163.173
- CVE-2025-38497
- Description:
usb: gadget: configfs: Fix OOB read on empty string write
- CVE: https://ubuntu.com/security/CVE-2025-38497
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38497-usb-gadget-configfs-fix-oob-read-on-empty-string-write.patch
- From: 5.15.0-163.173
- CVE-2025-38495
- Description:
HID: core: ensure the allocated report buffer can contain the reserved report ID
- CVE: https://ubuntu.com/security/CVE-2025-38495
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38495-hid-core-ensure-the-allocated-report-buffer-can-contain-the-reserved-report-id.patch
- From: 5.15.0-163.173
- CVE-2025-38494
- Description:
HID: core: do not bypass hid_hw_raw_request
- CVE: https://ubuntu.com/security/CVE-2025-38494
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38494-hid-core-do-not-bypass-hid-hw-raw-request.patch
- From: 5.15.0-163.173
- CVE-2025-38539
- Description:
tracing: Add down_write(trace_event_sem) when adding trace event
- CVE: https://ubuntu.com/security/CVE-2025-38539
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38539-tracing-add-down-write-trace-event-sem-when-adding-trace-event.patch
- From: 5.15.0-163.173
- CVE-2025-38538
- Description:
dmaengine: nbpfaxi: Fix memory corruption in probe()
- CVE: https://ubuntu.com/security/CVE-2025-38538
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38538-dmaengine-nbpfaxi-fix-memory-corruption-in-probe.patch
- From: 5.15.0-163.173
- CVE-2025-38529
- Description:
comedi: aio_iiro_16: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38529
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38529-comedi-aio-iiro-16-fix-bit-shift-out-of-bounds.patch
- From: 5.15.0-163.173
- CVE-2025-38483
- Description:
comedi: das16m1: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38483
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38483-comedi-das16m1-fix-bit-shift-out-of-bounds.patch
- From: 5.15.0-163.173
- CVE-2025-38482
- Description:
comedi: das6402: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38482
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38482-comedi-das6402-fix-bit-shift-out-of-bounds.patch
- From: 5.15.0-163.173
- CVE-2025-38528
- Description:
bpf: Reject %p% format string in bprintf-like helpers
- CVE: https://ubuntu.com/security/CVE-2025-38528
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38528-bpf-reject-p-format-string-in-bprintf-like-helpers.patch
- From: 5.15.0-163.173
- CVE-2025-38527
- Description:
smb: client: fix use-after-free in cifs_oplock_break
- CVE: https://ubuntu.com/security/CVE-2025-38527
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38527-smb-client-fix-use-after-free-in-cifs-oplock-break.patch
- From: 5.15.0-163.173
- CVE-2025-38474
- Description:
usb: net: sierra: check for no status endpoint
- CVE: https://ubuntu.com/security/CVE-2025-38474
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38474-usb-net-sierra-check-for-no-status-endpoint.patch
- From: 5.15.0-163.173
- CVE-2025-38473
- Description:
Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()
- CVE: https://ubuntu.com/security/CVE-2025-38473
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38473-bluetooth-fix-null-ptr-deref-in-l2cap-sock-resume-cb.patch
- From: 5.15.0-163.173
- CVE-2025-38550
- Description:
ipv6: mcast: Delay put pmc->idev in mld_del_delrec()
- CVE: https://ubuntu.com/security/CVE-2025-38550
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38550-ipv6-mcast-delay-put-pmc-idev-in-mld-del-delrec.patch
- From: 5.15.0-163.173
- CVE-2025-38468
- Description:
net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree
- CVE: https://ubuntu.com/security/CVE-2025-38468
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38468-net-sched-return-null-when-htb-lookup-leaf-encounters-an-empty-rbtree.patch
- From: 5.15.0-163.173
- CVE-2025-38499
- Description:
clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns
- CVE: https://ubuntu.com/security/CVE-2025-38499
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38499-clone-private-mnt-make-sure-that-caller-has-cap-sys-admin-in-the-right-userns.patch
- From: 5.15.0-163.173
- CVE-2025-38335
- Description:
PEEMPT_RT config isn't enabled
- CVE:
- Patch: skipped/CVE-2025-38335.patch
- From:
- CVE-2025-38668
- Description:
regulator: core: fix NULL dereference on unbind due to stale coupling data
- CVE: https://ubuntu.com/security/CVE-2025-38668
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38668-regulator-core-fix-null-dereference-on-unbind-due-to-stale-coupling-data.patch
- From: 5.15.0-163.173
- CVE-2025-38671
- Description:
i2c: qup: jump out of the loop in case of timeout
- CVE: https://ubuntu.com/security/CVE-2025-38671
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38671-i2c-qup-jump-out-of-the-loop-in-case-of-timeout.patch
- From: 5.15.0-163.173
- CVE-2025-38663
- Description:
nilfs2: reject invalid file types when reading inodes
- CVE: https://ubuntu.com/security/CVE-2025-38663
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38663-nilfs2-reject-invalid-file-types-when-reading-inodes.patch
- From: 5.15.0-163.173
- CVE-2025-37925
- Description:
jfs: reject on-disk inodes of an unsupported type
- CVE: https://ubuntu.com/security/CVE-2025-37925
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-37925-jfs-reject-on-disk-inodes-of-an-unsupported-type.patch
- From: 5.15.0-163.173
- CVE-2025-38650
- Description:
hfsplus: remove mutex_lock check in hfsplus_free_extents
- CVE: https://ubuntu.com/security/CVE-2025-38650
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38650-hfsplus-remove-mutex-lock-check-in-hfsplus-free-extents.patch
- From: 5.15.0-163.173
- CVE-2025-38612
- Description:
staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc()
- CVE: https://ubuntu.com/security/CVE-2025-38612
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38612-staging-fbtft-fix-potential-memory-leak-in-fbtft-framebuffer-alloc.patch
- From: 5.15.0-163.173
- CVE-2025-38609
- Description:
PM / devfreq: Check governor before using governor->name
- CVE: https://ubuntu.com/security/CVE-2025-38609
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38609-pm-devfreq-check-governor-before-using-governor-name.patch
- From: 5.15.0-163.173
- CVE-2025-38608
- Description:
bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls
- CVE: https://ubuntu.com/security/CVE-2025-38608
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38608-bpf-ktls-fix-data-corruption-when-using-bpf-msg-pop-data-in-ktls.patch
- From: 5.15.0-163.173
- CVE-2025-38604
- Description:
wifi: rtl818x: Kill URBs before clearing tx status queue
- CVE: https://ubuntu.com/security/CVE-2025-38604
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38604-wifi-rtl818x-kill-urbs-before-clearing-tx-status-queue.patch
- From: 5.15.0-163.173
- CVE-2025-38602
- Description:
iwlwifi: Add missing check for alloc_ordered_workqueue
- CVE: https://ubuntu.com/security/CVE-2025-38602
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38602-iwlwifi-add-missing-check-for-alloc-ordered-workqueue.patch
- From: 5.15.0-163.173
- CVE-2025-38601
- Description:
wifi: ath11k: clear initialized flag for deinit-ed srng lists
- CVE: https://ubuntu.com/security/CVE-2025-38601
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38601-wifi-ath11k-clear-initialized-flag-for-deinit-ed-srng-lists.patch
- From: 5.15.0-163.173
- CVE-2025-38645
- Description:
net/mlx5: Check device memory pointer before usage
- CVE: https://ubuntu.com/security/CVE-2025-38645
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38645-net-mlx5-check-device-memory-pointer-before-usage.patch
- From: 5.15.0-163.173
- CVE-2025-38553
- Description:
net/sched: Restrict conditions for adding duplicating netems to qdisc tree
- CVE: https://ubuntu.com/security/CVE-2025-38553
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38553-net-sched-restrict-conditions-for-adding-duplicating-netems-to-qdisc-tree.patch
- From: 5.15.0-163.173
- CVE-2025-38639
- Description:
netfilter: xt_nfacct: don't assume acct name is null-terminated
- CVE: https://ubuntu.com/security/CVE-2025-38639
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38639-netfilter-xt-nfacct-don-t-assume-acct-name-is-null-terminated.patch
- From: 5.15.0-163.173
- CVE-2025-38583
- Description:
clk: xilinx: vcu: unregister pll_post only if registered correctly
- CVE: https://ubuntu.com/security/CVE-2025-38583
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38583-clk-xilinx-vcu-unregister-pll-post-only-if-registered-correctly.patch
- From: 5.15.0-163.173
- CVE-2025-38634
- Description:
power: supply: cpcap-charger: Fix null check for power_supply_get_by_name
- CVE: https://ubuntu.com/security/CVE-2025-38634
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38634-power-supply-cpcap-charger-fix-null-check-for-power-supply-get-by-name.patch
- From: 5.15.0-163.173
- CVE-2025-38581
- Description:
crypto: ccp - Fix crash when rebind ccp device for ccp.ko
- CVE: https://ubuntu.com/security/CVE-2025-38581
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38581-crypto-ccp-fix-crash-when-rebind-ccp-device-for-ccp-ko.patch
- From: 5.15.0-163.173
- CVE-2025-38581
- Description:
crypto: ccp - Fix crash when rebind ccp device for ccp.ko
- CVE: https://ubuntu.com/security/CVE-2025-38581
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38581-crypto-ccp-fix-crash-when-rebind-ccp-device-for-ccp-ko-kpatch.patch
- From: 5.15.0-163.173
- CVE-2025-38630
- Description:
fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref
- CVE: https://ubuntu.com/security/CVE-2025-38630
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38630-fbdev-imxfb-check-fb-add-videomode-to-prevent-null-ptr-deref.patch
- From: 5.15.0-163.173
- CVE-2025-38624
- Description:
Out of scope: powerpc: PowerNV PCI Hotplug: not supported
- CVE:
- Patch: skipped/CVE-2025-38624.patch
- From:
- CVE-2025-38623
- Description:
Out of scope: powerpc: PowerNV PCI Hotplug: not supported
- CVE:
- Patch: skipped/CVE-2025-38623.patch
- From:
- CVE-2025-39730
- Description:
NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
- CVE: https://ubuntu.com/security/CVE-2025-39730
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39730-nfs-fix-filehandle-bounds-checking-in-nfs-fh-to-dentry.patch
- From: 5.15.0-163.173
- CVE-2025-38574
- Description:
pptp: ensure minimal skb length in pptp_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-38574
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38574-pptp-ensure-minimal-skb-length-in-pptp-xmit.patch
- From: 5.15.0-163.173
- CVE-2025-38572
- Description:
ipv6: reject malicious packets in ipv6_gso_segment()
- CVE: https://ubuntu.com/security/CVE-2025-38572
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38572-ipv6-reject-malicious-packets-in-ipv6-gso-segment.patch
- From: 5.15.0-163.173
- CVE-2025-38555
- Description:
usb: gadget : fix use-after-free in composite_dev_cleanup()
- CVE: https://ubuntu.com/security/CVE-2025-38555
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38555-usb-gadget-fix-use-after-free-in-composite-dev-cleanup.patch
- From: 5.15.0-163.173
- CVE-2025-39757
- Description:
ALSA: usb-audio: Validate UAC3 cluster segment descriptors
- CVE: https://ubuntu.com/security/CVE-2025-39757
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39757-alsa-usb-audio-validate-uac3-cluster-segment-descriptors.patch
- From: 5.15.0-163.173
- CVE-2025-39757
- Description:
ALSA: usb-audio: Fix size validation in convert_chmap_v3()
- CVE: https://ubuntu.com/security/CVE-2025-39757
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39757-ALSA-usb-audio-Fix-size-validation-in-convert_chmap_v3.patch
- From: 5.15.0-163.173
- CVE-2025-38725
- Description:
net: usb: asix_devices: add phy_mask for ax88772 mdio bus
- CVE: https://ubuntu.com/security/CVE-2025-38725
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38725-net-usb-asix-devices-add-phy-mask-for-ax88772-mdio-bus-dep.patch
- From: 5.15.0-116.126
- CVE-2025-38725
- Description:
net: usb: asix_devices: add phy_mask for ax88772 mdio bus
- CVE: https://ubuntu.com/security/CVE-2025-38725
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38725-net-usb-asix-devices-add-phy-mask-for-ax88772-mdio-bus.patch
- From: 5.15.0-163.173
- CVE-2025-38724
- Description:
nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
- CVE: https://ubuntu.com/security/CVE-2025-38724
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38724-nfsd-handle-get-client-locked-failure-in-nfsd4-setclientid-confirm.patch
- From: 5.15.0-163.173
- CVE-2025-39756
- Description:
fs: Prevent file descriptor table allocations exceeding INT_MAX
- CVE: https://ubuntu.com/security/CVE-2025-39756
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39756-fs-prevent-file-descriptor-table-allocations-exceeding-int-max.patch
- From: 5.15.0-163.173
- CVE-2025-38718
- Description:
sctp: linearize cloned gso packets in sctp_rcv
- CVE: https://ubuntu.com/security/CVE-2025-38718
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38718-sctp-linearize-cloned-gso-packets-in-sctp-rcv.patch
- From: 5.15.0-163.173
- CVE-2025-38715
- Description:
hfs: fix slab-out-of-bounds in hfs_bnode_read()
- CVE: https://ubuntu.com/security/CVE-2025-38715
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38715-hfs-fix-slab-out-of-bounds-in-hfs-bnode-read.patch
- From: 5.15.0-163.173
- CVE-2025-38714
- Description:
hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()
- CVE: https://ubuntu.com/security/CVE-2025-38714
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38714-hfsplus-fix-slab-out-of-bounds-in-hfsplus-bnode-read.patch
- From: 5.15.0-163.173
- CVE-2025-38713
- Description:
hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
- CVE: https://ubuntu.com/security/CVE-2025-38713
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38713-hfsplus-fix-slab-out-of-bounds-read-in-hfsplus-uni2asc.patch
- From: 5.15.0-163.173
- CVE-2025-38712
- Description:
hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()
- CVE: https://ubuntu.com/security/CVE-2025-38712
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38712-hfsplus-don-t-use-bug-on-in-hfsplus-create-attributes-file.patch
- From: 5.15.0-163.173
- CVE-2025-38706
- Description:
ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()
- CVE: https://ubuntu.com/security/CVE-2025-38706
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38706-asoc-core-check-for-rtd-null-in-snd-soc-remove-pcm-runtime.patch
- From: 5.15.0-163.173
- CVE-2025-38701
- Description:
ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr
- CVE: https://ubuntu.com/security/CVE-2025-38701
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38701-ext4-do-not-bug-when-inline-data-fl-lacks-system-data-xattr.patch
- From: 5.15.0-163.173
- CVE-2025-38700
- Description:
scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated
- CVE: https://ubuntu.com/security/CVE-2025-38700
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38700-scsi-libiscsi-initialize-iscsi-conn-dd-data-only-if-memory-is-allocated.patch
- From: 5.15.0-163.173
- CVE-2025-38699
- Description:
scsi: bfa: Double-free fix
- CVE: https://ubuntu.com/security/CVE-2025-38699
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38699-scsi-bfa-double-free-fix.patch
- From: 5.15.0-163.173
- CVE-2025-38699
- Description:
scsi: bfa: Double-free fix
- CVE: https://ubuntu.com/security/CVE-2025-38699
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38699-scsi-bfa-double-free-fix-kpatch.patch
- From: 5.15.0-163.173
- CVE-2025-39743
- Description:
jfs: truncate good inode pages when hard link is 0
- CVE: https://ubuntu.com/security/CVE-2025-39743
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39743-jfs-truncate-good-inode-pages-when-hard-link-is-0.patch
- From: 5.15.0-163.173
- CVE-2025-38698
- Description:
jfs: Regular file corruption check
- CVE: https://ubuntu.com/security/CVE-2025-38698
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38698-jfs-regular-file-corruption-check.patch
- From: 5.15.0-163.173
- CVE-2025-38697
- Description:
jfs: upper bound check of tree index in dbAllocAG
- CVE: https://ubuntu.com/security/CVE-2025-38697
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38697-jfs-upper-bound-check-of-tree-index-in-dballocag.patch
- From: 5.15.0-163.173
- CVE-2025-39742
- Description:
RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()
- CVE: https://ubuntu.com/security/CVE-2025-39742
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39742-rdma-hfi1-fix-possible-divide-by-zero-in-find-hw-thread-mask.patch
- From: 5.15.0-163.173
- CVE-2025-38695
- Description:
scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure
- CVE: https://ubuntu.com/security/CVE-2025-38695
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38695-scsi-lpfc-check-for-hdwq-null-ptr-when-cleaning-up-lpfc-vport-structure.patch
- From: 5.15.0-163.173
- CVE-2025-38694
- Description:
media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()
- CVE: https://ubuntu.com/security/CVE-2025-38694
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38694-media-dvb-frontends-dib7090p-fix-null-ptr-deref-in-dib7090p-rw-on-apb.patch
- From: 5.15.0-163.173
- CVE-2025-38693
- Description:
media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar
- CVE: https://ubuntu.com/security/CVE-2025-38693
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38693-media-dvb-frontends-w7090p-fix-null-ptr-deref-in-w7090p-tuner-write-serpar-and-w7090p-tuner-read-serpar.patch
- From: 5.15.0-163.173
- CVE-2025-39795
- Description:
block: avoid possible overflow for chunk_sectors check in blk_stack_limits()
- CVE: https://ubuntu.com/security/CVE-2025-39795
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39795-block-avoid-possible-overflow-for-chunk-sectors-check-in-blk-stack-limits.patch
- From: 5.15.0-163.173
- CVE-2025-38685
- Description:
fbdev: Fix vmalloc out-of-bounds write in fast_imageblit
- CVE: https://ubuntu.com/security/CVE-2025-38685
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38685-fbdev-fix-vmalloc-out-of-bounds-write-in-fast-imageblit.patch
- From: 5.15.0-163.173
- CVE-2025-38680
- Description:
media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()
- CVE: https://ubuntu.com/security/CVE-2025-38680
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38680-media-uvcvideo-fix-1-byte-out-of-bounds-read-in-uvc-parse-format.patch
- From: 5.15.0-163.173
- CVE-2025-39783
- Description:
PCI: endpoint: Fix configfs group list head handling
- CVE: https://ubuntu.com/security/CVE-2025-39783
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39783-pci-endpoint-fix-configfs-group-list-head-handling.patch
- From: 5.15.0-163.173
- CVE-2025-39782
- Description:
jbd2: prevent softlockup in jbd2_log_do_checkpoint()
- CVE: https://ubuntu.com/security/CVE-2025-39782
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39782-jbd2-prevent-softlockup-in-jbd2-log-do-checkpoint.patch
- From: 5.15.0-163.173
- CVE-2025-39714
- Description:
media: usbtv: Lock resolution while streaming
- CVE: https://ubuntu.com/security/CVE-2025-39714
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39714-media-usbtv-lock-resolution-while-streaming.patch
- From: 5.15.0-163.173
- CVE-2025-39713
- Description:
media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()
- CVE: https://ubuntu.com/security/CVE-2025-39713
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39713-media-rainshadow-cec-fix-toctou-race-condition-in-rain-interrupt.patch
- From: 5.15.0-163.173
- CVE-2025-39703
- Description:
net, hsr: reject HSR frame if skb can't hold tag
- CVE: https://ubuntu.com/security/CVE-2025-39703
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39703-net-hsr-reject-hsr-frame-if-skb-can-t-hold-tag.patch
- From: 5.15.0-163.173
- CVE-2025-39702
- Description:
ipv6: sr: Fix MAC comparison to be constant-time
- CVE: https://ubuntu.com/security/CVE-2025-39702
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39702-ipv6-sr-fix-mac-comparison-to-be-constant-time.patch
- From: 5.15.0-163.173
- CVE-2025-38664
- Description:
ice: Fix a null pointer dereference in ice_copy_and_init_pkg()
- CVE: https://ubuntu.com/security/CVE-2025-38664
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38664-ice-fix-a-null-pointer-dereference-in-ice-copy-and-init-pkg.patch
- From: 5.15.0-163.173
- CVE-2025-38488
- Description:
smb: client: fix use-after-free in crypt_message when using async crypto
- CVE: https://ubuntu.com/security/CVE-2025-38488
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38488-smb-client-fix-use-after-free-in-crypt-message-when-using-async-crypto.patch
- From: 5.15.0-163.173
- CVE-2025-39790
- Description:
bus: mhi: host: Detect events pointing to unexpected TREs
- CVE: https://ubuntu.com/security/CVE-2025-39790
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39790-bus-mhi-host-detect-events-pointing-to-unexpected-tres-5.15.0-105.115.patch
- From: kernel-5.15.0-106.116
- CVE-2025-38684
- Description:
net/sched: ets: use old 'nbands' while purging unused classes
- CVE: https://ubuntu.com/security/CVE-2025-38684
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38684-net-sched-ets-use-old-nbands-while-purging-unused-classes.patch
- From: 5.15.0-163.173
- CVE-2022-50327
- Description:
ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value
- CVE: https://ubuntu.com/security/CVE-2022-50327
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2022-50327-acpi-processor-idle-check-acpi-fetch-acpi-dev-return-value.patch
- From: 5.15.0-163.173
- CVE-2022-50070
- Description:
mptcp: do not queue data on closed subflows
- CVE: https://ubuntu.com/security/CVE-2022-50070
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2022-50070-mptcp-do-not-queue-data-on-closed-subflows.patch
- From: 5.15.0-163.173
- CVE-2025-39693
- Description:
drm/amd/display: Avoid a NULL pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-39693
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39693-drm-amd-display-avoid-a-null-pointer-dereference.patch
- From: 5.15.0-163.173
- CVE-2025-39691
- Description:
fs/buffer: fix use-after-free when call bh_read() helper
- CVE: https://ubuntu.com/security/CVE-2025-39691
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39691-fs-buffer-fix-use-after-free-when-call-bh-read-helper.patch
- From: 5.15.0-163.173
- CVE-2025-39689
- Description:
ftrace: Also allocate and copy hash for reading of filter files
- CVE: https://ubuntu.com/security/CVE-2025-39689
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39689-ftrace-also-allocate-and-copy-hash-for-reading-of-filter-files.patch
- From: 5.15.0-163.173
- CVE-2025-38677
- Description:
f2fs: fix to avoid out-of-boundary access in dnode page
- CVE: https://ubuntu.com/security/CVE-2025-38677
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38677-f2fs-fix-to-avoid-out-of-boundary-access-in-dnode-page.patch
- From: 5.15.0-163.173
- CVE-2025-39787
- Description:
soc: qcom: mdt_loader: Ensure we don't read past the ELF header
- CVE: https://ubuntu.com/security/CVE-2025-39787
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39787-soc-qcom-mdt-loader-ensure-we-don-t-read-past-the-elf-header.patch
- From: 5.15.0-163.173
- CVE-2025-39788
- Description:
scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE
- CVE: https://ubuntu.com/security/CVE-2025-39788
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39788-scsi-ufs-exynos-fix-programming-of-hci-utrl-nexus-type.patch
- From: 5.15.0-163.173
- CVE-2025-39773
- Description:
net: bridge: fix soft lockup in br_multicast_query_expired()
- CVE: https://ubuntu.com/security/CVE-2025-39773
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39773-net-bridge-fix-soft-lockup-in-br_multicast_query_expired.patch
- From: 5.15.0-163.173
- CVE-2025-39773
- Description:
net: bridge: fix soft lockup in br_multicast_query_expired()
- CVE: https://ubuntu.com/security/CVE-2025-39773
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39773-net-bridge-fix-soft-lockup-in-br_multicast_query_expired-kpatch.patch
- From: 5.15.0-163.173
- CVE-2025-39676
- Description:
scsi: qla4xxx: Prevent a potential error pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-39676
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39676-scsi-qla4xxx-prevent-a-potential-error-pointer-dereference.patch
- From: 5.15.0-163.173
- CVE-2025-39675
- Description:
drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()
- CVE: https://ubuntu.com/security/CVE-2025-39675
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39675-drm-amd-display-add-null-pointer-check-in-mod-hdcp-hdcp1-create-session.patch
- From: 5.15.0-163.173
- CVE-2025-39673
- Description:
ppp: fix race conditions in ppp_fill_forward_path
- CVE: https://ubuntu.com/security/CVE-2025-39673
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39673-ppp-fix-race-conditions-in-ppp-fill-forward-path.patch
- From: 5.15.0-163.173
- CVE-2025-39766
- Description:
net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit
- CVE: https://ubuntu.com/security/CVE-2025-39766
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39766-net-sched-make-cake-enqueue-return-net-xmit-cn-when-past-buffer-limit.patch
- From: 5.15.0-163.173
- CVE-2025-38732
- Description:
netfilter: nf_reject: don't leak dst refcount for loopback packets
- CVE: https://ubuntu.com/security/CVE-2025-38732
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38732-netfilter-nf-reject-don-t-leak-dst-refcount-for-loopback-packets.patch
- From: 5.15.0-163.173
- CVE-2025-39817
- Description:
efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
- CVE: https://ubuntu.com/security/CVE-2025-39817
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39817-efivarfs-fix-slab-out-of-bounds-in-efivarfs-d-compare.patch
- From: 5.15.0-163.173
- CVE-2025-39823
- Description:
KVM: x86: use array_index_nospec with indices that come from guest
- CVE: https://ubuntu.com/security/CVE-2025-39823
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39823-kvm-x86-use-array-index-nospec-with-indices-that-come-from-guest.patch
- From: 5.15.0-163.173
- CVE-2025-39824
- Description:
HID: asus: fix UAF via HID_CLAIMED_INPUT validation
- CVE: https://ubuntu.com/security/CVE-2025-39824
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39824-hid-asus-fix-uaf-via-hid-claimed-input-validation.patch
- From: 5.15.0-163.173
- CVE-2025-39808
- Description:
Patch adds cross-module dependency: hid_ntrig -> usbhid (usb_hid_driver symbol). Cannot be resolved without userland modprobe modifications to ensure proper module loading order.
- CVE:
- Patch: skipped/CVE-2025-39808.patch
- From:
- CVE-2025-39866
- Description:
fs: writeback: fix use-after-free in __mark_inode_dirty()
- CVE: https://ubuntu.com/security/CVE-2025-39866
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39866-fs-writeback-fix-use-after-free-in-mark-inode-dirty.patch
- From: 5.15.0-163.173
- CVE-2025-39865
- Description:
tee: fix NULL pointer dereference in tee_shm_put
- CVE: https://ubuntu.com/security/CVE-2025-39865
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39865-tee-fix-null-pointer-dereference-in-tee-shm-put.patch
- From: 5.15.0-163.173
- CVE-2025-39864
- Description:
wifi: cfg80211: fix use-after-free in cmp_bss()
- CVE: https://ubuntu.com/security/CVE-2025-39864
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39864-wifi-cfg80211-fix-use-after-free-in-cmp-bss.patch
- From: 5.15.0-163.173
- CVE-2025-39860
- Description:
Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()
- CVE: https://ubuntu.com/security/CVE-2025-39860
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39860-bluetooth-fix-use-after-free-in-l2cap-sock-cleanup-listen.patch
- From: 5.15.0-163.173
- CVE-2025-39853
- Description:
i40e: Fix potential invalid access when MAC list is empty
- CVE: https://ubuntu.com/security/CVE-2025-39853
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39853-i40e-fix-potential-invalid-access-when-mac-list-is-empty.patch
- From: 5.15.0-163.173
- CVE-2025-39847
- Description:
ppp: fix memory leak in pad_compress_skb
- CVE: https://ubuntu.com/security/CVE-2025-39847
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39847-ppp-fix-memory-leak-in-pad-compress-skb.patch
- From: 5.15.0-163.173
- CVE-2025-39844
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2025-39844.patch
- From:
- CVE-2023-52935
- Description:
mm/khugepaged: fix ->anon_vma race
- CVE: https://ubuntu.com/security/CVE-2023-52935
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2023-52935-mm-khugepaged-fix-anon-vma-race.patch
- From: 5.15.0-163.173
- CVE-2025-37968
- Description:
iio: light: opt3001: fix deadlock due to concurrent flag access
- CVE: https://ubuntu.com/security/CVE-2025-37968
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-37968-iio-light-opt3001-fix-deadlock-due-to-concurrent-flag-access.patch
- From: 5.15.0-163.173
- CVE-2025-38095
- Description:
dma-buf: insert memory barrier before updating num_fences
- CVE: https://ubuntu.com/security/CVE-2025-38095
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38095-dma-buf-insert-memory-barrier-before-updating-num-fences.patch
- From: 5.15.0-163.173
- CVE-2025-39902
- Description:
mm/slub: avoid accessing metadata when pointer is invalid in object_err()
- CVE: https://ubuntu.com/security/CVE-2025-39902
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39902-mm-slub-avoid-accessing-metadata-when-pointer-is-invalid-in-object-err.patch
- From: 5.15.0-163.173
- CVE-2022-49390
- Description:
macsec: fix UAF bug for real_dev
- CVE: https://ubuntu.com/security/CVE-2022-49390
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2022-49390-macsec-fix-uaf-bug-for-real-dev.patch
- From: 5.15.0-164.174
- CVE-2022-49390
- Description:
macsec: fix UAF bug for real_dev
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49390.html
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2022-49390-macsec-fix-uaf-bug-for-real-dev-kpatch.patch
- From: 5.15.0-164.174
- CVE-2025-39964
- Description:
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-39964
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-39964-crypto-af-alg-disallow-concurrent-writes-in-af-alg-sendmsg-101.111.patch
- From: 5.15.0-164.174
- CVE-2025-39964
- Description:
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-39964
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-39964-crypto-af-alg-disallow-concurrent-writes-in-af-alg-sendmsg-kpatch-101.111.patch
- From: 5.15.0-164.174
- CVE-2024-50067
- Description:
uprobe: avoid out-of-bounds memory access of fetching args
- CVE: https://ubuntu.com/security/CVE-2024-50067
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-50067-uprobe-avoid-out-of-bounds-memory-access-of-fetching-args.patch
- From: 5.15.0-164.174
- CVE-2025-21855
- Description:
ibmvnic: Don't reference skb after sending to VIOS
- CVE: https://ubuntu.com/security/CVE-2025-21855
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-21855-ibmvnic-don-t-reference-skb-after-sending-to-vios.patch
- From: 5.15.0-164.174
- CVE-2025-40018
- Description:
ipvs: Defer ip_vs_ftp unregister during netns cleanup
- CVE: https://ubuntu.com/security/CVE-2025-40018
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-40018-ipvs-defer-ip-vs-ftp-unregister-during-netns-cleanup.patch
- From: 5.15.0-164.174
- CVE-2025-39993
- Description:
media: rc: fix races with imon_disconnect()
- CVE: https://ubuntu.com/security/CVE-2025-39993
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-39993-media-rc-fix-races-with-imon-disconnect.patch
- From: 5.15.0-164.174
- CVE-2024-47691
- Description:
f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()
- CVE: https://ubuntu.com/security/CVE-2024-47691
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-47691-f2fs-fix-to-avoid-use-after-free-in-f2fs-stop-gc-thread.patch
- From: 5.15.0-164.174
- CVE-2024-53218
- Description:
f2fs: fix race in concurrent f2fs_stop_gc_thread
- CVE: https://ubuntu.com/security/CVE-2024-53218
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-53218-f2fs-fix-race-in-concurrent-f2fs-stop-gc-thread.patch
- From: 5.15.0-164.174
- CVE-2025-38561
- Description:
ksmbd: fix Preauh_HashValue race condition
- CVE: https://ubuntu.com/security/CVE-2025-38561
- Patch: ubuntu-jammy/5.15.0-168.178/CVE-2025-38561-ksmbd-fix-preauh-hashvalue-race-condition-101.patch
- From: 5.15.0-168.178
- CVE-2025-40019
- Description:
crypto: essiv - Check ssize for decryption and in-place encryption
- CVE: https://ubuntu.com/security/CVE-2025-40019
- Patch: ubuntu-jammy/5.15.0-168.178/CVE-2025-40019-crypto-essiv-check-ssize-for-decryption-and-in-place-encryption.patch
- From: 5.15.0-168.178
- CVE-2025-38584
- Description:
padata: Fix pd UAF once and for all
- CVE: https://ubuntu.com/security/CVE-2025-38584
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-38584-padata-fix-pd-uaf-once-and-for-all-139.149.patch
- From: 5.15.0-170.180
- CVE-2025-38584
- Description:
padata: Fix pd UAF once and for all
- CVE: https://ubuntu.com/security/CVE-2025-38584
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-38584-padata-fix-pd-uaf-once-and-for-all-kpatch.patch
- From: 5.15.0-170.180
- CVE-2024-56538
- Description:
Vulnerability affects only ZynqMP SoCs.
- CVE:
- Patch: skipped/CVE-2024-56538.patch
- From:
- CVE-2025-39913
- Description:
tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.
- CVE: https://ubuntu.com/security/CVE-2025-39913
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39913-tcp-bpf-call-sk-msg-free-when-tcp-bpf-send-verdict-fails-to-allocate-psock-cork.patch
- From: 5.15.0-170.180
- CVE-2025-39880
- Description:
libceph: fix invalid accesses to ceph_connection_v1_info
- CVE: https://ubuntu.com/security/CVE-2025-39880
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39880-libceph-fix-invalid-accesses-to-ceph-connection-v1-info.patch
- From: 5.15.0-170.180
- CVE-2025-39876
- Description:
net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable()
- CVE: https://ubuntu.com/security/CVE-2025-39876
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39876-net-fec-fix-possible-npd-in-fec-enet-phy-reset-after-clk-enable.patch
- From: 5.15.0-170.180
- CVE-2025-39911
- Description:
i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
- CVE: https://ubuntu.com/security/CVE-2025-39911
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39911-i40e-fix-irq-freeing-in-i40e-vsi-request-irq-msix-error-path-5.15.0-168.178.patch
- From: 5.15.0-170.180
- CVE-2025-39873
- Description:
can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB
- CVE: https://ubuntu.com/security/CVE-2025-39873
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39873-can-xilinx-can-xcan-write-frame-fix-use-after-free-of-transmitted-skb.patch
- From: 5.15.0-170.180
- CVE-2025-39869
- Description:
dmaengine: ti: edma: Fix memory allocation size for queue_priority_map
- CVE: https://ubuntu.com/security/CVE-2025-39869
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39869-dmaengine-ti-edma-fix-memory-allocation-size-for-queue-priority-map.patch
- From: 5.15.0-170.180
- CVE-2025-39923
- Description:
dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees
- CVE: https://ubuntu.com/security/CVE-2025-39923
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39923-dmaengine-qcom-bam-dma-fix-dt-error-handling-for-num-channels-ees.patch
- From: 5.15.0-170.180
- CVE-2025-39883
- Description:
mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory
- CVE: https://ubuntu.com/security/CVE-2025-39883
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39883-mm-memory-failure-fix-vm-bug-on-page-pagepoisoned-page-when-unpoison-memory.patch
- From: 5.15.0-170.180
- CVE-2025-39949
- Description:
qed: Don't collect too many protection override GRC elements
- CVE: https://ubuntu.com/security/CVE-2025-39949
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39949-qed-don-t-collect-too-many-protection-override-grc-elements.patch
- From: 5.15.0-170.180
- CVE-2025-39955
- Description:
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
- CVE: https://ubuntu.com/security/CVE-2025-39955
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39955-tcp-clear-tcp-sk-sk-fastopen-rsk-in-tcp-disconnect.patch
- From: 5.15.0-170.180
- CVE-2025-39945
- Description:
cnic: Fix use-after-free bugs in cnic_delete_task
- CVE: https://ubuntu.com/security/CVE-2025-39945
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39945-cnic-fix-use-after-free-bugs-in-cnic-delete-task.patch
- From: 5.15.0-170.180
- CVE-2025-39934
- Description:
drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ
- CVE: https://ubuntu.com/security/CVE-2025-39934
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39934-drm-bridge-anx7625-fix-null-pointer-dereference-with-early-irq.patch
- From: 5.15.0-170.180
- CVE-2025-39943
- Description:
ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer
- CVE: https://ubuntu.com/security/CVE-2025-39943
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39943-ksmbd-smbdirect-validate-data-offset-and-data-length-field-of-smb-direct-data-transfer-5.15.0-161.171.patch
- From: 5.15.0-170.180
- CVE-2025-40020
- Description:
can: peak_usb: fix shift-out-of-bounds issue
- CVE: https://ubuntu.com/security/CVE-2025-40020
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40020-can-peak-usb-fix-shift-out-of-bounds-issue.patch
- From: 5.15.0-170.180
- CVE-2025-39980
- Description:
nexthop: Forbid FDB status change while nexthop is in a group
- CVE: https://ubuntu.com/security/CVE-2025-39980
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39980-nexthop-forbid-fdb-status-change-while-nexthop-is-in-a-group.patch
- From: 5.15.0-170.180
- CVE-2025-40011
- Description:
drm/gma500: Fix null dereference in hdmi teardown
- CVE: https://ubuntu.com/security/CVE-2025-40011
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40011-drm-gma500-fix-null-dereference-in-hdmi-teardown.patch
- From: 5.15.0-170.180
- CVE-2025-40021
- Description:
tracing: dynevent: Add a missing lockdown check on dynevent
- CVE: https://ubuntu.com/security/CVE-2025-40021
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40021-tracing-dynevent-add-a-missing-lockdown-check-on-dynevent.patch
- From: 5.15.0-170.180
- CVE-2025-39967
- Description:
fbcon: fix integer overflow in fbcon_do_set_font
- CVE: https://ubuntu.com/security/CVE-2025-39967
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39967-fbcon-fix-integer-overflow-in-fbcon-do-set-font.patch
- From: 5.15.0-170.180
- CVE-2025-39967
- Description:
fbcon: Fix OOB access in font allocation
- CVE: https://ubuntu.com/security/CVE-2025-39967
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39967-fbcon-fix-OOB-access-in-font-allocation.patch
- From: 5.15.0-170.180
- CVE-2025-38236
- Description:
Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem..
- CVE:
- Patch: skipped/CVE-2025-38236.patch
- From:
- CVE-2025-21861
- Description:
mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize()
- CVE: https://ubuntu.com/security/CVE-2025-21861
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-21861-mm-migrate-device-don-t-add-folio-to-be-freed-to-lru-in-migrate-device-finalize.patch
- From: 5.15.0-170.180
- CVE-2025-39998
- Description:
scsi: target: target_core_configfs: Add length check to avoid buffer overflow
- CVE: https://ubuntu.com/security/CVE-2025-39998
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39998-scsi-target-target-core-configfs-add-length-check-to-avoid-buffer-overflow.patch
- From: 5.15.0-170.180
- CVE-2025-39996
- Description:
media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove
- CVE: https://ubuntu.com/security/CVE-2025-39996
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39996-media-b2c2-fix-use-after-free-causing-by-irq-check-work-in-flexcop-pci-remove.patch
- From: 5.15.0-170.180
- CVE-2025-22058
- Description:
udp: Fix memory accounting leak.
- CVE: https://ubuntu.com/security/CVE-2025-22058
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-22058-udp-fix-memory-accounting-leak.patch
- From: 5.15.0-170.180
- CVE-2025-39994
- Description:
media: tuner: xc5000: Fix use-after-free in xc5000_release
- CVE: https://ubuntu.com/security/CVE-2025-39994
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39994-media-tuner-xc5000-fix-use-after-free-in-xc5000-release-5.15.0-168.178.patch
- From: 5.15.0-170.180
- CVE-2025-39995
- Description:
media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe
- CVE: https://ubuntu.com/security/CVE-2025-39995
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39995-media-i2c-tc358743-fix-use-after-free-bugs-caused-by-orphan-timer-in-probe-5.15.0-134.145.patch
- From: 5.15.0-170.180
- CVE-2025-40081
- Description:
perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
- CVE: https://ubuntu.com/security/CVE-2025-40081
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40081-perf-arm-spe-prevent-overflow-in-perf-idx2off.patch
- From: 5.15.0-170.180
- CVE-2025-40125
- Description:
blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx
- CVE: https://ubuntu.com/security/CVE-2025-40125
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40125-blk-mq-check-kobject-state-in-sysfs-before-deleting-in-blk-mq-unregister-hctx.patch
- From: 5.15.0-170.180
- CVE-2025-40078
- Description:
bpf: Explicitly check accesses to bpf_sock_addr
- CVE: https://ubuntu.com/security/CVE-2025-40078
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40078-bpf-explicitly-check-accesses-to-bpf-sock-addr.patch
- From: 5.15.0-170.180
- CVE-2025-40116
- Description:
usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup
- CVE: https://ubuntu.com/security/CVE-2025-40116
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40116-usb-host-max3421-hcd-fix-error-pointer-dereference-in-probe-cleanup.patch
- From: 5.15.0-170.180
- CVE-2025-40070
- Description:
pps: fix warning in pps_register_cdev when register device fail
- CVE: https://ubuntu.com/security/CVE-2025-40070
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40070-pps-fix-warning-in-pps-register-cdev-when-register-device-fail-5.15.0-139.149.patch
- From: 5.15.0-170.180
- CVE-2025-40154
- Description:
ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
- CVE: https://ubuntu.com/security/CVE-2025-40154
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40154-asoc-intel-bytcr-rt5640-fix-invalid-quirk-input-mapping.patch
- From: 5.15.0-170.180
- CVE-2025-40121
- Description:
ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping
- CVE: https://ubuntu.com/security/CVE-2025-40121
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40121-asoc-intel-bytcr-rt5651-fix-invalid-quirk-input-mapping.patch
- From: 5.15.0-170.180
- CVE-2025-40140
- Description:
net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast
- CVE: https://ubuntu.com/security/CVE-2025-40140
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40140-net-usb-remove-disruptive-netif-wake-queue-in-rtl8150-set-multicast.patch
- From: 5.15.0-170.180
- CVE-2025-40053
- Description:
net: dlink: handle copy_thresh allocation failure
- CVE: https://ubuntu.com/security/CVE-2025-40053
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40053-net-dlink-handle-copy-thresh-allocation-failure.patch
- From: 5.15.0-170.180
- CVE-2025-40048
- Description:
uio_hv_generic: Let userspace take care of interrupt mask
- CVE: https://ubuntu.com/security/CVE-2025-40048
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40048-uio-hv-generic-let-userspace-take-care-of-interrupt-mask.patch
- From: 5.15.0-170.180
- CVE-2025-40044
- Description:
fs: udf: fix OOB read in lengthAllocDescs handling
- CVE: https://ubuntu.com/security/CVE-2025-40044
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40044-fs-udf-fix-oob-read-in-lengthallocdescs-handling.patch
- From: 5.15.0-170.180
- CVE-2025-40153
- Description:
mm: hugetlb: avoid soft lockup when mprotect to large memory area
- CVE: https://ubuntu.com/security/CVE-2025-40153
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40153-mm-hugetlb-avoid-soft-lockup-when-mprotect-to-large-memory-area.patch
- From: 5.15.0-170.180
- CVE-2025-40030
- Description:
pinctrl: check the return value of pinmux_ops::get_function_name()
- CVE: https://ubuntu.com/security/CVE-2025-40030
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40030-pinctrl-check-the-return-value-of-pinmux-ops-get-function-name.patch
- From: 5.15.0-170.180
- CVE-2025-40029
- Description:
bus: fsl-mc: Check return value of platform_get_resource()
- CVE: https://ubuntu.com/security/CVE-2025-40029
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40029-bus-fsl-mc-check-return-value-of-platform-get-resource.patch
- From: 5.15.0-170.180
- CVE-2025-40111
- Description:
drm/vmwgfx: Fix Use-after-free in validation
- CVE: https://ubuntu.com/security/CVE-2025-40111
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40111-drm-vmwgfx-fix-use-after-free-in-validation.patch
- From: 5.15.0-170.180
- CVE-2025-40187
- Description:
net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()
- CVE: https://ubuntu.com/security/CVE-2025-40187
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40187-net-sctp-fix-a-null-dereference-in-sctp-disposition-sctp-sf-do-5-1d-ce.patch
- From: 5.15.0-170.180
- CVE-2025-40183
- Description:
bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}
- CVE: https://ubuntu.com/security/CVE-2025-40183
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40183-bpf-fix-metadata-dst-leak-bpf-redirect-neigh-v-46.patch
- From: 5.15.0-170.180
- CVE-2025-40194
- Description:
cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
- CVE: https://ubuntu.com/security/CVE-2025-40194
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40194-cpufreq-intel-pstate-fix-object-lifecycle-issue-in-update-qos-request.patch
- From: 5.15.0-170.180
- CVE-2025-40204
- Description:
sctp: Fix MAC comparison to be constant-time
- CVE: https://ubuntu.com/security/CVE-2025-40204
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40204-sctp-fix-mac-comparison-to-be-constant-time.patch
- From: 5.15.0-170.180
- CVE-2025-40179
- Description:
ext4: verify orphan file size is not too big
- CVE: https://ubuntu.com/security/CVE-2025-40179
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40179-ext4-verify-orphan-file-size-is-not-too-big-161.patch
- From: 5.15.0-170.180
- CVE-2025-40179
- Description:
ext4: verify orphan file size is not too big
- CVE: https://ubuntu.com/security/CVE-2025-40179
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40179-ext4-verify-orphan-file-size-is-not-too-big-kpatch.patch
- From: 5.15.0-170.180
- CVE-2025-40179
- Description:
ext4: align max orphan file size with e2fsprogs limit
- CVE: https://ubuntu.com/security/CVE-2025-40179
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40179-ext4-align-max-orphan-file-size-with-e2fsprogs-limit.patch
- From: 5.15.0-170.180
- CVE-2025-40026
- Description:
KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O
- CVE: https://ubuntu.com/security/CVE-2025-40026
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40026-kvm-x86-don-t-re-check-l1-intercepts-when-completing-userspace-i-o.patch
- From: 5.15.0-170.180
- CVE-2025-40134
- Description:
dm: fix NULL pointer dereference in __dm_suspend()
- CVE: https://ubuntu.com/security/CVE-2025-40134
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40134-dm-fix-null-pointer-dereference-in-dm-suspend.patch
- From: 5.15.0-170.180
- CVE-2025-40178
- Description:
pid: Add a judgment for ns null in pid_nr_ns
- CVE: https://ubuntu.com/security/CVE-2025-40178
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40178-pid-add-a-judgment-for-ns-null-in-pid-nr-ns.patch
- From: 5.15.0-170.180
- CVE-2025-40167
- Description:
ext4: detect invalid INLINE_DATA + EXTENTS flag combination
- CVE: https://ubuntu.com/security/CVE-2025-40167
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40167-ext4-detect-invalid-inline-data-extents-flag-combination.patch
- From: 5.15.0-170.180
- CVE-2025-40173
- Description:
net/ip6_tunnel: Prevent perpetual tunnel growth
- CVE: https://ubuntu.com/security/CVE-2025-40173
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40173-net-ip6-tunnel-prevent-perpetual-tunnel-growth.patch
- From: 5.15.0-170.180
- CVE-2025-40085
- Description:
ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
- CVE: https://ubuntu.com/security/CVE-2025-40085
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40085-alsa-usb-audio-fix-null-pointer-deference-in-try-to-register-card.patch
- From: 5.15.0-170.180
- CVE-2025-40088
- Description:
hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()
- CVE: https://ubuntu.com/security/CVE-2025-40088
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40088-hfsplus-fix-slab-out-of-bounds-read-in-hfsplus-strcasecmp.patch
- From: 5.15.0-170.180
- CVE-2025-40244
- Description:
hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()
- CVE: https://ubuntu.com/security/CVE-2025-40244
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40244-hfsplus-fix-kmsan-uninit-value-issue-in-hfsplus-ext-cache-extent.patch
- From: 5.15.0-170.180
- CVE-2025-40349
- Description:
hfs: validate record offset in hfsplus_bmap_alloc
- CVE: https://ubuntu.com/security/CVE-2025-40349
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40349-hfs-validate-record-offset-in-hfsplus-bmap-alloc-124.patch
- From: 5.15.0-170.180
- CVE-2025-40351
- Description:
hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()
- CVE: https://ubuntu.com/security/CVE-2025-40351
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40351-hfsplus-fix-kmsan-uninit-value-issue-in-hfsplus-delete-cat.patch
- From: 5.15.0-170.180
- CVE-2025-40243
- Description:
hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()
- CVE: https://ubuntu.com/security/CVE-2025-40243
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40243-hfs-fix-kmsan-uninit-value-issue-in-hfs-find-set-zero-bits.patch
- From: 5.15.0-170.180
- CVE-2025-40240
- Description:
sctp: avoid NULL dereference when chunk data buffer is missing
- CVE: https://ubuntu.com/security/CVE-2025-40240
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40240-sctp-avoid-null-dereference-when-chunk-data-buffer-is-missing.patch
- From: 5.15.0-170.180
- CVE-2025-40233
- Description:
ocfs2: clear extent cache after moving/defragmenting extents
- CVE: https://ubuntu.com/security/CVE-2025-40233
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40233-ocfs2-clear-extent-cache-after-moving-defragmenting-extents.patch
- From: 5.15.0-170.180
- CVE-2025-40231
- Description:
vsock: fix lock inversion in vsock_assign_transport()
- CVE: https://ubuntu.com/security/CVE-2025-40231
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40231-vsock-fix-lock-inversion-in-vsock-assign-transport-134.patch
- From: 5.15.0-170.180
- CVE-2025-40106
- Description:
comedi: fix divide-by-zero in comedi_buf_munge()
- CVE: https://ubuntu.com/security/CVE-2025-40106
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40106-comedi-fix-divide-by-zero-in-comedi-buf-munge.patch
- From: 5.15.0-170.180
- CVE-2025-40223
- Description:
most: usb: Fix use-after-free in hdm_disconnect
- CVE: https://ubuntu.com/security/CVE-2025-40223
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40223-most-usb-fix-use-after-free-in-hdm-disconnect.patch
- From: 5.15.0-170.180
- CVE-2025-68249
- Description:
most: usb: hdm_probe: Fix calling put_device() before device initialization
- CVE: https://ubuntu.com/security/CVE-2025-68249
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-68249-most-usb-hdm-probe-fix-calling-put-device-before-device-initialization.patch
- From: 5.15.0-170.180
- CVE-2025-68249
- Description:
most: usb: fix double free on late probe failure
- CVE: https://ubuntu.com/security/CVE-2025-68249
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-68249-most-usb-fix-double-free-on-late-probe-failure.patch
- From: 5.15.0-170.180
- CVE-2025-40220
- Description:
fuse: fix livelock in synchronous file put from fuseblk workers
- CVE: https://ubuntu.com/security/CVE-2025-40220
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40220-fuse-fix-livelock-in-synchronous-file-put-from-fuseblk-workers-5.15.0-168.178.patch
- From: 5.15.0-170.180
- CVE-2025-40105
- Description:
vfs: Don't leak disconnected dentries on umount
- CVE: https://ubuntu.com/security/CVE-2025-40105
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40105-vfs-don-t-leak-disconnected-dentries-on-umount.patch
- From: 5.15.0-170.180
- CVE-2025-40092
- Description:
usb: gadget: f_ncm: Refactor bind path to use __free()
- CVE: https://ubuntu.com/security/CVE-2025-40092
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40092-usb-gadget-f-ncm-refactor-bind-path-to-use-free-97.patch
- From: 5.15.0-170.180
- CVE-2025-40094
- Description:
usb: gadget: f_acm: Refactor bind path to use __free()
- CVE: https://ubuntu.com/security/CVE-2025-40094
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40094-usb-gadget-f-acm-refactor-bind-path-to-use-free.patch
- From: 5.15.0-170.180
- CVE-2025-40092 CVE-2025-40094
- Description:
usb: gadget: f_acm: Refactor bind path to use __free()
- CVE: https://ubuntu.com/security/CVE-2025-40094
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40094-CVE-2025-40092-kpatch.patch
- From: 5.15.0-170.180
- CVE-2025-21780
- Description:
drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
- CVE: https://ubuntu.com/security/CVE-2025-21780
- Patch: ubuntu-jammy/5.15.0-171.181/CVE-2025-21780-drm-amdgpu-avoid-buffer-overflow-attach-in-smu-sys-set-pp-table.patch
- From: 5.15.0-171.181
- CVE-2022-49267
- Description:
mmc: core: use sysfs_emit() instead of sprintf()
- CVE: https://ubuntu.com/security/CVE-2022-49267
- Patch: ubuntu-jammy/5.15.0-171.181/CVE-2022-49267-mmc-core-use-sysfs-emit-instead-of-sprintf.patch
- From: 5.15.0-171.181