- kernel-5.4.0-1105.111~18.04.1 (ubuntu-bionic-lts-focal-azure)
- 5.4.0-1134.141~18.04.1
- 2024-07-30 15:07:21
- 2024-08-08 09:41:13
- K20240730_12
- n/a, CVSSv2 Score: n/a
- Description:
USB: move snd_usb_pipe_sanity_check into the USB core
- CVE: n/a
- Patch: 5.4.0/introduce_usb_pipe_type_check.patch
- From: 5.10
- n/a, CVSSv2 Score: n/a
- Description:
USB: add usb_control_msg_send() and usb_control_msg_recv()
- CVE: n/a
- Patch: 5.10.0/usb-add-usb_control_msg_send-and-usb_control_msg_recv.patch
- From: 5.10
- CVE-2023-1281, CVSSv2 Score: 7.8
- Description:
net/sched: tcindex: update imperfect hash filters respecting rcu
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1281
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-1281-net-sched-tcindex-update-imperfect-hash-filters-respecting-rcu.patch
- From: 5.4.0-147.164
- CVE-2023-1073, CVSSv2 Score: 6.6
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1073
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-1073-hid-check-empty-report_list-in-hid_validate_values.patch
- From: 5.4.0-147.164
- CVE-2022-3108, CVSSv2 Score: 5.5
- Description:
drm/amdkfd: Check for null pointer after calling kmemdup
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3108
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2022-3108-drm-amdkfd-Check-for-null-pointer-after-calling-kmemdup.patch
- From: 5.4.0-147.164
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-4129
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2022-4129-l2tp-serialize-access-to-sk_user_data-with-sk_callback_lock.patch
- From: 5.4.0-147.164
- CVE-2023-1074, CVSSv2 Score: 5.5
- Description:
sctp: fail if no bound addresses can be used for a given scope
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1074
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-given-scope.patch
- From: 5.4.0-147.164
- CVE-2023-26545, CVSSv2 Score: 4.7
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-26545
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: 5.4.0-147.164
- CVE-2022-3903, CVSSv2 Score: 4.6
- Description:
media: mceusb: Use new usb_control_msg_*() routines
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3903
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2022-3903-media-mceusb-use-new-usb_control_msg-routines.patch
- From: 5.4.0-147.164
- CVE-2023-0458, CVSSv2 Score: 4.7
- Description:
prlimit: do_prlimit needs to have a speculation check
- CVE: https://ubuntu.com/security/CVE-2023-0458
- Patch: ubuntu-focal/5.4.0-147.164/CVE-2023-0458-prlimit-do_prlimit-needs-to-have-a-speculation-check.patch
- From: 5.4.0-147.164
- CVE-2023-1829, CVSSv2 Score:
- Description:
Complex adaptation is required, mainline retired tcindex.
- CVE:
- Patch: skipped/CVE-2023-1829.patch
- From:
- CVE-2023-0459, CVSSv2 Score:
- Description:
Safety check failed for copy_from_user; zendesk:191568
- CVE:
- Patch: skipped/CVE-2023-0459.patch
- From:
- CVE-2023-1075, CVSSv2 Score: 3.3
- Description:
net/tls: tls_is_tx_ready() checked list_entry
- CVE: https://ubuntu.com/security/CVE-2023-1075
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-1075-patch-net-tls-tls-is-tx-ready-checked-list-entry.patch
- From: 5.4.0-149.166
- CVE-2023-1513, CVSSv2 Score: 3.3
- Description:
kvm: initialize all of the kvm_debugregs structure before sending it
- CVE: https://ubuntu.com/security/CVE-2023-1513
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-1513-patch-kvm-initialize-all-of-the-kvm-debugregs-structure-before.patch
- From: 5.4.0-149.166
- CVE-2023-1078, CVSSv2 Score: 7.8
- Description:
rds: rds_rm_zerocopy_callback() use list_first_entry()
- CVE: https://ubuntu.com/security/CVE-2023-1078
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-1078-patch-rds-rds-rm-zerocopy-callback-use-list-first-entry.patch
- From: 5.4.0-149.166
- CVE-2023-2162, CVSSv2 Score: 5.5
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost
- CVE: https://ubuntu.com/security/CVE-2023-2162
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-2162-patch-scsi-iscsi-tcp-fix-uaf-during-login-when-accessing-the.patch
- From: 5.4.0-149.166
- CVE-2023-32269, CVSSv2 Score: 6.7
- Description:
netrom: Fix use-after-free caused by accept on already connected
- CVE: https://ubuntu.com/security/CVE-2023-32269
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-32269-patch-netrom-fix-use-after-free-caused-by-accept-on-already.patch
- From: 5.4.0-149.166
- CVE-2023-1118, CVSSv2 Score: 7.8
- Description:
[PATCH] media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
- CVE: https://ubuntu.com/security/CVE-2023-1118
- Patch: ubuntu-focal/5.4.0-149.166/CVE-2023-1118-patch-media-rc-fix-use-after-free-bugs-caused-by-ene-tx-irqsim.patch
- From: 5.4.0-149.166
- CVE-2023-1380, CVSSv2 Score: 7.8
- Description:
wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
- CVE: https://ubuntu.com/security/CVE-2023-1380
- Patch: ubuntu-focal/5.4.0-150.167/CVE-2023-1380-wifi-brcmfmac-slab-out-of-bounds-read-in-brcmf_get_a.patch
- From: 5.4.0-150.167
- CVE-2023-30456, CVSSv2 Score: 7.8
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://ubuntu.com/security/CVE-2023-1380
- Patch: ubuntu-focal/5.4.0-150.167/CVE-2023-30456-KVM-nVMX-add-missing-consistency-checks-for-CR0-and-.patch
- From: 5.4.0-150.167
- CVE-2023-31436, CVSSv2 Score: 7.1
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://ubuntu.com/security/CVE-2023-31436
- Patch: ubuntu-focal/5.4.0-150.167/CVE-2023-31436-net-sched-sch_qfq-prevent-slab-out-of-bounds-in-qfq_.patch
- From: 5.4.0-150.167
- CVE-2023-32233, CVSSv2 Score: 6.5
- Description:
netfilter: nf_tables: deactivate anonymous set from
- CVE: https://ubuntu.com/security/CVE-2023-32233
- Patch: ubuntu-focal/5.4.0-150.167/CVE-2023-32233-netfilter-nf_tables-deactivate-anonymous-set-from-pr.patch
- From: 5.4.0-150.167
- CVE-2023-35788, CVSSv2 Score: 7.8
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://ubuntu.com/security/CVE-2023-35788
- Patch: ubuntu-jammy/5.15.0-76.83/CVE-2023-35788-patch-net-sched-flower-fix-possible-oob-write-in.patch
- From: 5.15.0-76.83
- CVE-2023-3090, CVSSv2 Score: 7.8
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://ubuntu.com/security/CVE-2023-3090
- Patch: ubuntu-focal/5.4.0-155.172/CVE-2023-3090-ipvlan-fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 5.4.0-155.172
- CVE-2023-3390, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- CVE: https://ubuntu.com/security/CVE-2023-3390
- Patch: ubuntu-focal/5.4.0-155.172/CVE-2023-3390-netfilter-nf_tables-incorrect-error-path-handling-with-NFT_MSG_NEWRULE.patch
- From: 5.4.0-155.172
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://ubuntu.com/security/CVE-2023-35001
- Patch: ubuntu-focal/5.4.0-155.172/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
- From: 5.4.0-155.172
- CVE-2023-32629, CVSSv2 Score: 7.8
- Description:
overlayfs: Skip permission checking for trusted.overlayfs.* xattrs
- CVE: https://ubuntu.com/security/CVE-2023-32629
- Patch: ubuntu-focal/5.4.0-155.172/CVE-2023-32629-overlayfs-skip-permission-checking-for-trusted-overlayfs-xattrs.patch
- From: 5.4.0-155.172
- CVE-2023-3141, CVSSv2 Score: 7.1
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2023-3141
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-3141-patch-memstick-r592-fix-uaf-bug-in-r592-remove-due-to-race.patch
- From: 5.4.0-156.173
- CVE-2023-3111, CVSSv2 Score: 7.8
- Description:
btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()
- CVE: https://ubuntu.com/security/CVE-2023-3111
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-3111-btrfs-unset-reloc-control-if-transaction-commit-fails-in-prepare_to_relocate.patch
- From: 5.4.0-156.173
- CVE-2023-1611, CVSSv2 Score: 6.3
- Description:
[PATCH] btrfs: fix race between quota disable and quota assign ioctls
- CVE: https://ubuntu.com/security/CVE-2023-1611
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-1611-patch-btrfs-fix-race-between-quota-disable-and-quota-assign-ioctls.patch
- From: 5.4.0-156.173
- CVE-2022-0168, CVSSv2 Score: 4.4
- Description:
cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
- CVE: https://ubuntu.com/security/CVE-2022-0168
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-0168-patch-cifs-fix-null-ptr-dereference-in-smb2-ioctl-query-info.patch
- From: 5.4.0-156.173
- CVE-2023-0590, CVSSv2 Score: 4.7
- Description:
net: sched: fix race condition in qdisc_graft()
- CVE: https://ubuntu.com/security/CVE-2023-0590
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-0590-patch-net-sched-fix-race-condition-in-qdisc-graft.patch
- From: 5.4.0-156.173
- CVE-2023-2194, CVSSv2 Score: 6.7
- Description:
[PATCH] i2c: xgene-slimpro: Fix out-of-bounds bug in
- CVE: https://ubuntu.com/security/CVE-2023-2194
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-2194-patch-i2c-xgene-slimpro-fix-out-of-bounds-bug-in.patch
- From: 5.4.0-156.173
- CVE-2023-33203, CVSSv2 Score: 6.4
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race
- CVE: https://ubuntu.com/security/CVE-2023-33203
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-33203-patch-net-qcom-emac-fix-use-after-free-bug-in-emac-remove-due-to.patch
- From: 5.4.0-156.173
- CVE-2023-30772, CVSSv2 Score: 6.4
- Description:
power: supply: da9150: Fix use after free bug in
- CVE: https://ubuntu.com/security/CVE-2023-30772
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-30772-patch-power-supply-da9150-fix-use-after-free-bug-in.patch
- From: 5.4.0-156.173
- CVE-2023-28466, CVSSv2 Score: 7.0
- Description:
net: tls: fix possible race condition between
- CVE: https://ubuntu.com/security/CVE-2023-28466
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-28466-patch-net-tls-fix-possible-race-condition-between.patch
- From: 5.4.0-156.173
- CVE-2023-2124, CVSSv2 Score: 7.8
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://ubuntu.com/security/CVE-2023-2124
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-2124-patch-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: 5.4.0-156.173
- CVE-2020-36691, CVSSv2 Score: 5.5
- Description:
netlink: limit recursion depth in policy validation
- CVE: https://ubuntu.com/security/CVE-2020-36691
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2020-36691-patch-netlink-limit-recursion-depth-in-policy-validation-1.patch
- From: 5.4.0-156.173
- CVE-2022-4269, CVSSv2 Score: 5.5
- Description:
[PATCH] act_mirred: use the backlog for nested calls to mirred
- CVE: https://ubuntu.com/security/CVE-2022-4269
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-4269-patch-act-mirred-use-the-backlog-for-nested-calls-to-mirred.patch
- From: 5.4.0-156.173
- CVE-2023-1855, CVSSv2 Score: 6.3
- Description:
hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to
- CVE: https://ubuntu.com/security/CVE-2023-1855
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-1855-patch-hwmon-xgene-fix-use-after-free-bug-in-xgene-hwmon-remove.patch
- From: 5.4.0-156.173
- CVE-2023-1990, CVSSv2 Score: 4.7
- Description:
nfc: st-nci: Fix use after free bug in ndlc_remove due to race
- CVE: https://ubuntu.com/security/CVE-2023-1990
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2023-1990-patch-nfc-st-nci-fix-use-after-free-bug-in-ndlc-remove-due-to.patch
- From: 5.4.0-156.173
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: check if directory block is within i_size
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-04-ext4-check-if-directory-block-is-within-i_size.patch
- From: 5.4.0-156.173
- CVE-2022-1184, CVSSv2 Score: 5.5
- Description:
ext4: fix check for block being out of directory size
- CVE: https://ubuntu.com/security/CVE-2022-1184
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-1184-06-ext4-fix-check-for-block-being-out-of-directory-size.patch
- From: 5.4.0-156.173
- CVE-2022-27672, CVSSv2 Score: 5.6
- Description:
x86/speculation: Identify processors vulnerable to SMT RSB predictions
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: smt_rsb-enable.patch
- From: N/A
- CVE-2022-27672, CVSSv2 Score: 4.7
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug
- CVE: https://ubuntu.com/security/CVE-2022-27672
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug.patch
- From: 5.4.0-156.173
- CVE-2022-27672, CVSSv2 Score: 4.7
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-27672
- Patch: ubuntu-focal/5.4.0-156.173/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug-kpatch.patch
- From: 5.4.0-156.173
- CVE-2022-40982, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-40982.patch
- From:
- CVE-2023-3776, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: Fix improper refcount update leads to
- CVE: https://ubuntu.com/security/CVE-2023-3776
- Patch: ubuntu-focal/5.4.0-159.176/CVE-2023-3776-patch-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 5.4.0-159.176
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://ubuntu.com/security/CVE-2023-3611
- Patch: ubuntu-focal/5.4.0-159.176/CVE-2023-3611-patch-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
- From: 5.4.0-159.176
- CVE-2023-3609, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://ubuntu.com/security/CVE-2023-3609
- Patch: ubuntu-focal/5.4.0-159.176/CVE-2023-3609-patch-net-sched-cls-u32-fix-reference-counter-leak-leading-to.patch
- From: 5.4.0-159.176
- CVE-2023-20593, CVSSv2 Score: 6.5
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: zenbleed-enable.patch
- From: N/A
- CVE-2023-21255, CVSSv2 Score: 7.8
- Description:
binder: fix UAF caused by faulty buffer cleanup
- CVE: https://ubuntu.com/security/CVE-2023-21255
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-21255-patch-binder-fix-uaf-caused-by-faulty-buffer-cleanup.patch
- From: 5.4.0-162.179
- CVE-2023-35828, CVSSv2 Score: 7.0
- Description:
usb: gadget: udc: renesas_usb3: Fix use after free bug in
- CVE: https://ubuntu.com/security/CVE-2023-35828
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-35828-patch-usb-gadget-udc-renesas-usb3-fix-use-after-free-bug-in.patch
- From: 5.4.0-162.179
- CVE-2023-35823, CVSSv2 Score: 7.0
- Description:
media: saa7134: fix use after free bug in saa7134_finidev due to race
- CVE: https://ubuntu.com/security/CVE-2023-35823
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-35823-patch-media-saa7134-fix-use-after-free-bug-in-saa7134-finidev-due.patch
- From: 5.4.0-162.179
- CVE-2023-2163, CVSSv2 Score: 8.8
- Description:
bpf: Fix incorrect verifier pruning due to missing register precision
- CVE: https://ubuntu.com/security/CVE-2023-2163
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-2163-patch-bpf-fix-incorrect-verifier-pruning-due-to-missing-register.patch
- From: 5.4.0-162.179
- CVE-2023-3268, CVSSv2 Score: 7.1
- Description:
relayfs: fix out-of-bounds access in relay_file_read
- CVE: https://ubuntu.com/security/CVE-2023-3268
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-3268-patch-relayfs-fix-out-of-bounds-access-in-relay-file-read.patch
- From: 5.4.0-162.179
- CVE-2023-35824, CVSSv2 Score: 7.0
- Description:
media: dm1105: Fix use after free bug in dm1105_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2023-35824
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-35824-media-dm1105-fix-use-after-free-bug-in-dm1105_remove-due-to-race-condition.patch
- From: 5.4.0-162.179
- CVE-2023-2002, CVSSv2 Score: 6.8
- Description:
bluetooth: Perform careful capability checks in hci_sock_ioctl()
- CVE: https://ubuntu.com/security/CVE-2023-2002
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-2002-bluetooth-perform-careful-capability-checks-in-hci_sock_ioctl.patch
- From: 5.4.0-162.179
- CVE-2023-31084, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
- CVE: https://ubuntu.com/security/CVE-2023-31084
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-31084-media-dvb-core-fix-kernel-WARNING-for-blocking-operation-in-wait_event.patch
- From: 5.4.0-162.179
- CVE-2023-2269, CVSSv2 Score: 4.4
- Description:
dm ioctl: fix nested locking in table_clear() to remove deadlock concern
- CVE: https://ubuntu.com/security/CVE-2023-2269
- Patch: ubuntu-focal/5.4.0-162.179/CVE-2023-2269-dm-ioctl-fix-nested-locking-in-table_clear-to-remove-deadlock-concern.patch
- From: 5.4.0-162.179
- CVE-2023-40283, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
- CVE: https://ubuntu.com/security/CVE-2023-40283
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-40283-patch-bluetooth-l2cap-fix-use-after-free-in-l2cap-sock-ready-cb.patch
- From: 5.4.0-163.180
- CVE-2023-4128, CVSSv2 Score: 7.8
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4128
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-4128-patch-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.4.0-163.180
- CVE-2023-4128, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4128
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-4128-patch-net-sched-cls-fw-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.4.0-163.180
- CVE-2023-4128, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4128
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-4128-patch-net-sched-cls-u32-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.4.0-163.180
- CVE-2023-20588, CVSSv2 Score: 5.5
- Description:
x86/CPU/AMD: Do not leak quotient data after a division by 0
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-20588.html
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-20588-x86-CPU-AMD-Do-not-leak-quotient-data-after-a-division-by-0.patch
- From: kernel-4.14.322-244.539.amzn2
- CVE-2023-1206, CVSSv2 Score:
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-3338, CVSSv2 Score:
- Description:
The patch remove functionality.
- CVE:
- Patch: skipped/CVE-2023-3338.patch
- From:
- CVE-2023-3863, CVSSv2 Score: 4.1
- Description:
[PATCH] nfc: llcp: simplify llcp_sock_connect() error paths
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-3863-nfc-llcp-simplify-llcp_sock_connect-error-paths.patch
- From: 5.4.0-164.181
- CVE-2023-3863, CVSSv2 Score: 4.1
- Description:
[PATCH] net: nfc: Fix use-after-free caused by nfc_llcp_find_local
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-3863-patch-net-nfc-fix-use-after-free-caused-by-nfc-llcp-find-local.patch
- From: 5.4.0-164.181
- CVE-2023-3212, CVSSv2 Score: 4.4
- Description:
gfs2: Don't deref jdesc in evict
- CVE: https://ubuntu.com/security/CVE-2023-3212
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-3212-patch-gfs2-don-t-deref-jdesc-in-evict.patch
- From: 5.4.0-164.181
- CVE-2021-4001, CVSSv2 Score: 4.1
- Description:
bpf: Fix toctou on read-only map's constant scalar tracking
- CVE: https://ubuntu.com/security/CVE-2021-4001
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2021-4001-bpf-Fix-toctou-on-read-only-maps-constant-scalar-tracking.patch
- From: 5.4.0-164.181
- CVE-2021-4001, CVSSv2 Score: 4.1
- Description:
bpf: Fix toctou on read-only map's constant scalar tracking
- CVE: https://ubuntu.com/security/CVE-2021-4001
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2021-4001-bpf-Fix-toctou-on-read-only-maps-constant-scalar-tracking-kpatch.patch
- From: 5.4.0-164.181
- CVE-2023-4622, CVSSv2 Score: 7.0
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://ubuntu.com/security/CVE-2023-4622
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4622-patch-af-unix-fix-null-ptr-deref-in-unix-stream-sendpage.patch
- From: 5.4.0-165.182
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://ubuntu.com/security/CVE-2023-4623
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4623-patch-net-sched-sch-hfsc-ensure-inner-classes-have-fsc-curve.patch
- From: 5.4.0-165.182
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue.patch
- From: 5.4.0-165.182
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue-kpatch.patch
- From: 5.4.0-165.182
- CVE-2023-42753, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for
- CVE: https://ubuntu.com/security/CVE-2023-42753
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
- From: 5.4.0-165.182
- CVE-2023-42752, CVSSv2 Score: 5.5
- Description:
igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU
- CVE: https://ubuntu.com/security/CVE-2023-42752
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42752-patch-igmp-limit-igmpv3-newpack-packet-size-to-ip-max-mtu.patch
- From: 5.4.0-165.182
- CVE-2023-4881, CVSSv2 Score:
- Description:
CVE was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.
- CVE:
- Patch: skipped/CVE-2023-4881.patch
- From:
- CVE-2023-42755, CVSSv2 Score:
- Description:
The patch removes functionality.
- CVE:
- Patch: skipped/CVE-2023-42755.patch
- From:
- CVE-2023-42756, CVSSv2 Score: 4.7
- Description:
netfilter: ipset: Add schedule point in call_ad().
- CVE: https://ubuntu.com/security/CVE-2023-42756
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42756-netfilter-ipset-Add-schedule-point-in-call_ad.patch
- From: 5.4.0-165.182
- CVE-2023-42756, CVSSv2 Score: 4.7
- Description:
netfilter: ipset: Fix race between IPSET_CMD_CREATE and
- CVE: https://ubuntu.com/security/CVE-2023-42756
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42756-patch-netfilter-ipset-fix-race-between-ipset-cmd-create-and.patch
- From: 5.4.0-165.182
- CVE-2023-34319, CVSSv2 Score: 7.8
- Description:
xen/netback: Fix buffer overrun triggered by unusual packet
- CVE: https://ubuntu.com/security/CVE-2023-34319
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-34319-patch-xen-netback-fix-buffer-overrun-triggered-by-unusual-packet-155.patch
- From: 5.4.0-165.182
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in
- CVE: https://ubuntu.com/security/CVE-2023-31083
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-31083-patch-bluetooth-hci-ldisc-check-hci-uart-proto-ready-flag-in.patch
- From: 5.4.0-166.183
- CVE-2023-4132, CVSSv2 Score: 5.5
- Description:
media: usb: siano: Fix use after free bugs caused by do_submit_urb (dependency)
- CVE: https://ubuntu.com/security/CVE-2023-4132
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-4132-media-usb-siano-Fix-use-after-free-bugs-caused-by-do_submit_urb.patch
- From: 5.4.0-166.183
- CVE-2023-4132, CVSSv2 Score: 5.5
- Description:
media: usb: siano: Fix warning due to null work_func_t function
- CVE: https://ubuntu.com/security/CVE-2023-4132
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-4132-patch-media-usb-siano-fix-warning-due-to-null-work-func-t.patch
- From: 5.4.0-166.183
- CVE-2023-0597, CVSSv2 Score:
- Description:
Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
- CVE:
- Patch: skipped/CVE-2023-0597.patch
- From:
- CVE-2023-3772, CVSSv2 Score: 4.4
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://ubuntu.com/security/CVE-2023-3772
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-3772-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: 5.4.0-166.183
- CVE-2023-31085, CVSSv2 Score: 5.5
- Description:
ubi: Refuse attaching if mtd's erasesize is 0
- CVE: https://ubuntu.com/security/CVE-2023-31085
- Patch: ubuntu-focal/5.4.0-167.184/CVE-2023-31085-ubi-Refuse-attaching-if-mtd-s-erasesize-is-0.patch
- From: 5.4.0-167.184
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://ubuntu.com/security/CVE-2023-45871
- Patch: ubuntu-focal/5.4.0-167.184/CVE-2023-45871-patch-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 5.4.0-167.184
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-45871
- Patch: ubuntu-focal/5.4.0-167.184/CVE-2023-45871-kpatch.patch
- From: 5.4.0-167.184
- CVE-2023-6176, CVSSv2 Score: 7.8
- Description:
net/tls: do not free tls_rec on async operation in
- CVE: https://ubuntu.com/security/CVE-2023-6176
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-6176-patch-net-tls-do-not-free-tls-rec-on-async-operation-in.patch
- From: 5.4.0-169.187
- CVE-2023-39189, CVSSv2 Score: 6.0
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39189
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39189-patch-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 5.4.0-169.187
- CVE-2023-39193, CVSSv2 Score: 6.1
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://ubuntu.com/security/CVE-2023-39193
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39193-patch-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 5.4.0-169.187
- CVE-2023-39192, CVSSv2 Score: 6.7
- Description:
netfilter: xt_u32: validate user space input
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39192-patch-netfilter-xt-u32-validate-user-space-input.patch
- From: 5.4.0-169.187
- CVE-2023-39192, CVSSv2 Score: 6.7
- Description:
netfilter: xt_u32: validate user space input (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39192-netfilter-xt-u32-validate-user-space-input-kpatch.patch
- From: 5.4.0-169.187
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://ubuntu.com/security/CVE-2023-5717
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5717-patch-perf-disallow-mis-matched-inherited-group-reads.patch
- From: 5.4.0-169.187
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://ubuntu.com/security/CVE-2023-5717
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch.patch
- From: 5.4.0-169.187
- CVE-2023-5178, CVSSv2 Score: 8.8
- Description:
nvmet-tcp: move send/recv error handling in the send/recv methods instead of call-sites
- CVE: https://ubuntu.com/security/CVE-2023-5178
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5178-0001-nvmet-tcp-move-send-recv-error-handling-in-the-send-.patch
- From: 5.4.0-169.187
- CVE-2023-5178, CVSSv2 Score: 8.8
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://ubuntu.com/security/CVE-2023-5178
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5178-patch-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 5.4.0-169.187
- CVE-2023-42754, CVSSv2 Score: 5.5
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://ubuntu.com/security/CVE-2023-42754
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-42754-patch-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 5.4.0-169.187
- CVE-2023-39194, CVSSv2 Score: 4.4
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39194
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39194-patch-net-xfrm-fix-xfrm-address-filter-oob-read.patch
- From: 5.4.0-169.187
- CVE-2023-3006, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2023-3006.patch
- From:
- CVE-2023-6040, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: Reject tables of unsupported family
- CVE: https://ubuntu.com/security/CVE-2023-6040
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6040-netfilter-nf_tables-Reject-tables-of-unsupported-family-165.patch
- From: 5.4.0-170.188
- CVE-2023-6606, CVSSv2 Score: 7.1
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://ubuntu.com/security/CVE-2023-6606
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6606-smb-client-fix-OOB-in-smbCalcSize.patch
- From: 5.4.0-170.188
- CVE-2023-6931, CVSSv2 Score: 7.0
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://ubuntu.com/security/CVE-2023-6931
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6931-perf-Fix-perf_event_validate_size.patch
- From: 5.4.0-170.188
- CVE-2023-6931, CVSSv2 Score: 7.0
- Description:
perf: Fix perf_event_validate_size() lockdep splat
- CVE: https://ubuntu.com/security/CVE-2023-6931
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6931-perf-Fix-perf_event_validate_size-lockdep-splat.patch
- From: 5.4.0-170.188
- CVE-2023-6932, CVSSv2 Score: 7.0
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://ubuntu.com/security/CVE-2023-6932
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
- From: 5.4.0-170.188
- CVE-2023-35827, CVSSv2 Score: 7.0
- Description:
ravb: Fix use-after-free issue in ravb_tx_timeout_work()
- CVE: https://ubuntu.com/security/CVE-2023-35827
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-35827-patch-ravb-fix-use-after-free-issue-in-ravb-tx-timeout-work.patch
- From: 5.4.0-171.189
- CVE-2023-46343, CVSSv2 Score: 5.5
- Description:
nfc: nci: fix possible NULL pointer dereference in send_acknowledge()
- CVE: https://ubuntu.com/security/CVE-2023-46343
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-46343-patch-nfc-nci-fix-possible-null-pointer-dereference-in.patch
- From: 5.4.0-171.189
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://ubuntu.com/security/CVE-2023-45863
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-45863-patch-kobject-fix-slab-out-of-bounds-in-fill-kobj-path.patch
- From: 5.4.0-171.189
- CVE-2023-34324, CVSSv2 Score: 4.9
- Description:
xen/events: replace evtchn_rwlock with RCU
- CVE: https://ubuntu.com/security/CVE-2023-34324
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-34324-xen-events-replace-evtchn_rwlock-with-RCU-kpatch.patch
- From: 5.4.0-171.189
- CVE-2024-0646, CVSSv2 Score: 7.8
- Description:
net: tls, update curr on splice as well
- CVE: https://ubuntu.com/security/CVE-2024-0646
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2024-0646-patch-net-tls-update-curr-on-splice-as-well.patch
- From: 5.4.0-172.190
- CVE-2024-0565, CVSSv2 Score: 7.4
- Description:
smb: client: fix OOB in receive_encrypted_standard()
- CVE: https://ubuntu.com/security/CVE-2024-0565
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2024-0565-patch-smb-client-fix-oob-in-receive-encrypted-standard.patch
- From: 5.4.0-172.190
- CVE-2023-6915, CVSSv2 Score: 5.5
- Description:
ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://ubuntu.com/security/CVE-2023-6915
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2023-6915-patch-ida-fix-crash-in-ida-free-when-the-bitmap-is-empty.patch
- From: 5.4.0-172.190
- CVE-2023-51781, CVSSv2 Score: 7.0
- Description:
appletalk: Fix Use-After-Free in atalk_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51781
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2023-51781-patch-appletalk-fix-use-after-free-in-atalk-ioctl.patch
- From: 5.4.0-172.190
- CVE-2023-22995, CVSSv2 Score: 7.8
- Description:
usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core
- CVE: https://ubuntu.com/security/CVE-2023-22995
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-22995-patch-usb-dwc3-dwc3-qcom-add-missing-platform-device-put-in.patch
- From: 5.4.0-173.191
- CVE-2023-51779, CVSSv2 Score: 7.0
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg
- CVE: https://ubuntu.com/security/CVE-2023-51779
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-51779-patch-bluetooth-af-bluetooth-fix-use-after-free-in.patch
- From: 5.4.0-173.191
- CVE-2021-44879, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check on inode type during garbage collection
- CVE: https://ubuntu.com/security/CVE-2021-44879
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2021-44879-patch-f2fs-fix-to-do-sanity-check-on-inode-type-during-garbage.patch
- From: 5.4.0-173.191
- CVE-2023-4244, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-6121, CVSSv2 Score: 4.3
- Description:
nvmet: nul-terminate the NQNs passed in the connect command
- CVE: https://ubuntu.com/security/CVE-2023-6121
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-6121-patch-nvmet-nul-terminate-the-nqns-passed-in-the-connect-command.patch
- From: 5.4.0-173.191
- CVE-2023-51782, CVSSv2 Score: 7.0
- Description:
net/rose: Fix Use-After-Free in rose_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51782
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-51782-patch-net-rose-fix-use-after-free-in-rose-ioctl.patch
- From: 5.4.0-173.191
- CVE-2023-51780, CVSSv2 Score: 8.1
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51780
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-51780-patch-atm-fix-use-after-free-in-do-vcc-ioctl.patch
- From: 5.4.0-173.191
- CVE-2024-0340, CVSSv2 Score: 5.5
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://ubuntu.com/security/CVE-2024-0340
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-0340-CVE-2024-0340-patch-vhost-use-kzalloc-instead-of-kmalloc-followed-by.patch
- From: 5.4.0-173.191
- CVE-2024-1086, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://ubuntu.com/security/CVE-2024-1086
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2024-1086-patch-netfilter-nf-tables-reject-queue-drop-verdict-parameters-5.4.0-167.184.patch
- From: 5.4.0-174.193
- CVE-2023-23000, CVSSv2 Score: 5.5
- Description:
phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function
- CVE: https://ubuntu.com/security/CVE-2023-23000
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2023-23000-patch-phy-tegra-xusb-fix-return-value-of.patch
- From: 5.4.0-174.193
- CVE-2023-23004, CVSSv2 Score: 5.5
- Description:
malidp: Fix NULL vs IS_ERR() checking
- CVE: https://ubuntu.com/security/CVE-2023-23004
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2023-23004-patch-malidp-fix-null-vs-is-err-checking.patch
- From: 5.4.0-174.193
- CVE-2024-24855, CVSSv2 Score: 4.7
- Description:
scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()
- CVE: https://ubuntu.com/security/CVE-2024-24855
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2024-24855-patch-scsi-lpfc-fix-a-possible-data-race-in.patch
- From: 5.4.0-174.193
- CVE-2023-52454, CVSSv2 Score: N/A
- Description:
nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length
- CVE: https://ubuntu.com/security/CVE-2023-52454
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52454-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-invalid-H2C-PDU-length.patch
- From: 5.4.0-176.196
- CVE-2023-52470, CVSSv2 Score: 4.4
- Description:
drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()
- CVE: https://ubuntu.com/security/CVE-2023-52470
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52470-drm-radeon-check-the-alloc_workqueue-return-value-in-radeon_crtc_init.patch
- From: 5.4.0-176.196
- CVE-2023-52609, CVSSv2 Score: 4.1
- Description:
binder: fix race between mmput() and do_exit()
- CVE: https://ubuntu.com/security/CVE-2023-52609
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52609-binder-fix-race-between-mmput-and-do_exit.patch
- From: 5.4.0-176.196
- CVE-2023-52612, CVSSv2 Score: 6.0
- Description:
crypto: scomp - fix req->dst buffer overflow
- CVE: https://ubuntu.com/security/CVE-2023-52612
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52612-crypto-scomp-fix-req-dst-buffer-overflow.patch
- From: 5.4.0-176.196
- CVE-2024-26597, CVSSv2 Score: 7.1
- Description:
net: qualcomm: rmnet: fix global oob in rmnet_policy
- CVE: https://ubuntu.com/security/CVE-2024-26597
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-26597-net-qualcomm-rmnet-fix-global-oob-in-rmnet_policy.patch
- From: 5.4.0-176.196
- CVE-2024-26597, CVSSv2 Score: N/A
- Description:
net: qualcomm: rmnet: fix global oob in rmnet_policy
- CVE: https://ubuntu.com/security/CVE-2024-26597
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-26597-net-qualcomm-rmnet-fix-global-oob-in-rmnet_policy-kpatch.patch
- From: 5.4.0-176.196
- CVE-2024-26633, CVSSv2 Score: 5.5
- Description:
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
- CVE: https://ubuntu.com/security/CVE-2024-26633
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-26633-ip6_tunnel-fix-NEXTHDR_FRAGMENT-handling-in-ip6_tnl_parse_tlv_enc_lim.patch
- From: 5.4.0-176.196
- CVE-2023-52457, CVSSv2 Score: N/A
- Description:
serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed
- CVE: https://ubuntu.com/security/CVE-2023-52457
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52457-serial-8250-omap-Don-t-skip-resource-freeing-if-pm_runtime_resume_and_get-failed.patch
- From: 5.4.0-176.196
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://ubuntu.com/security/CVE-2023-52340
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52340-patch-ipv6-remove-max-size-check-inline-with-ipv4.patch
- From: 5.4.0-176.196
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://ubuntu.com/security/CVE-2023-52340
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52340-fix-decnet-function-declaration.patch
- From: 5.4.0-176.196
- CVE-2024-23851, CVSSv2 Score: 5.5
- Description:
dm ioctl: log an error if the ioctl structure is corrupted
- CVE: https://ubuntu.com/security/CVE-2024-23851
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-23851-patch-dm-ioctl-log-an-error-if-the-ioctl-structure-is-corrupted.patch
- From: 5.4.0-176.196
- CVE-2023-52429 CVE-2024-23851, CVSSv2 Score: 5.5
- Description:
dm: limit the number of targets and parameter size area
- CVE: https://ubuntu.com/security/CVE-2024-23851
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52429-CVE-2024-23851-patch-dm-limit-the-number-of-targets-and-parameter-size-area.patch
- From: 5.4.0-176.196
- CVE-2023-52443, CVSSv2 Score: 5.5
- Description:
apparmor: avoid crash when parsed profile name is empty
- CVE: https://ubuntu.com/security/CVE-2023-52443
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52443-apparmor-avoid-crash-when-parsed-profile-name-is-empty.patch
- From: 5.4.0-176.196
- CVE-2023-52448, CVSSv2 Score: 5.5
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://ubuntu.com/security/CVE-2023-52448
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52448-gfs2-fix-kernel-NULL-pointer-dereference-in-gfs2_rgrp_dump.patch
- From: 5.4.0-176.196
- CVE-2023-52449, CVSSv2 Score: 5.5
- Description:
mtd: Fix gluebi NULL pointer dereference caused by ftl
- CVE: https://ubuntu.com/security/CVE-2023-52449
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52449-mtd-fix-gluebi-NULL-pointer-dereference-caused-by-ftl-notifier.patch
- From: 5.4.0-176.196
- CVE-2023-52436, CVSSv2 Score: 4.5
- Description:
f2fs: explicitly null-terminate the xattr list
- CVE: https://ubuntu.com/security/CVE-2023-52436
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52436-f2fs-explicitly-null-terminate-the-xattr-list.patch
- From: 5.4.0-176.196
- CVE-2023-52469, CVSSv2 Score: 7.8
- Description:
drivers/amd/pm: fix a use-after-free in kv_parse_power_table
- CVE: https://ubuntu.com/security/CVE-2023-52469
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52469-drivers-amd-pm-fix-a-use-after-free-in-kv_parse_power_table.patch
- From: 5.4.0-176.196
- CVE-2023-52464, CVSSv2 Score: 7.8
- Description:
EDAC/thunderx: Fix possible out-of-bounds string access
- CVE: https://ubuntu.com/security/CVE-2023-52464
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52464-edac-thunderx-fix-possible-out-of-bounds-string-access.patch
- From: 5.4.0-176.196
- CVE-2024-0607, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()
- CVE: https://ubuntu.com/security/CVE-2024-0607
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2024-0607-patch-netfilter-nf-tables-fix-pointer-math-issue-in.patch
- From: 5.4.0-176.196
- CVE-2023-52438, CVSSv2 Score:
- Description:
Out of scope. Android related patch.
- CVE:
- Patch: skipped/CVE-2023-52438.patch
- From:
- CVE-2023-52439, CVSSv2 Score: 7.8
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://ubuntu.com/security/CVE-2023-52439
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52439-uio-Fix-use-after-free-in-uio_open.patch
- From: 5.4.0-176.196
- CVE-2023-52444, CVSSv2 Score: 7.8
- Description:
f2fs: fix to avoid dirent corruption
- CVE: https://ubuntu.com/security/CVE-2023-52444
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52444-patch-f2fs-fix-to-avoid-dirent-corruption.patch
- From: 5.4.0-176.196
- CVE-2023-52445, CVSSv2 Score: 7.8
- Description:
media: pvrusb2: fix use after free on context disconnection
- CVE: https://ubuntu.com/security/CVE-2023-52445
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context-disconne.patch
- From: 5.4.0-176.196
- CVE-2023-52451, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2023-52451.patch
- From:
- CVE-2023-46838, CVSSv2 Score: 7.5
- Description:
xen-netback: don't produce zero-size SKB frags
- CVE: https://ubuntu.com/security/CVE-2023-46838
- Patch: ubuntu-focal/5.4.0-176.196/CVE-2023-46838-patch-xen-netback-don-t-produce-zero-size-skb-frags.patch
- From: 5.4.0-176.196
- CVE-2024-26589, CVSSv2 Score: 7.8
- Description:
bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS
- CVE: https://ubuntu.com/security/CVE-2024-26589
- Patch: ubuntu-focal/5.4.0-177.197/CVE-2024-26589-patch-bpf-reject-variable-offset-alu-on-ptr-to-flow-keys.patch
- From: 5.4.0-177.197
- CVE-2023-52603, CVSSv2 Score: 7.1
- Description:
UBSAN: array-index-out-of-bounds in dtSplitRoot
- CVE: https://ubuntu.com/security/CVE-2023-52603
- Patch: ubuntu-focal/5.4.0-177.197/CVE-2023-52603-patch-ubsan-array-index-out-of-bounds-in-dtsplitroot.patch
- From: 5.4.0-177.197
- CVE-2023-52600, CVSSv2 Score: 7.8
- Description:
jfs: fix uaf in jfs_evict_inode
- CVE: https://ubuntu.com/security/CVE-2023-52600
- Patch: ubuntu-focal/5.4.0-177.197/CVE-2023-52600-patch-jfs-fix-uaf-in-jfs-evict-inode.patch
- From: 5.4.0-177.197
- CVE-2023-24023, CVSSv2 Score: 6.8
- Description:
Bluetooth: Add more enc key size check
- CVE: https://ubuntu.com/security/CVE-2023-24023
- Patch: ubuntu-focal/5.4.0-177.197/CVE-2023-24023-bluetooth-add-more-enc-key-size-check.patch
- From: 5.4.0-177.197
- CVE-2023-52604, CVSSv2 Score: 7.8
- Description:
FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2023-52604
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52604-fs-jfs-ubsan-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.4.0-181.201
- CVE-2023-52601, CVSSv2 Score: 7.1
- Description:
jfs: fix array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2023-52601
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52601-jfs-fix-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.4.0-181.201
- CVE-2023-52587, CVSSv2 Score: 6.0
- Description:
IB/ipoib: Fix mcast list locking
- CVE: https://ubuntu.com/security/CVE-2023-52587
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52587-ib-ipoib-fix-mcast-list-locking.patch
- From: 5.4.0-181.201
- CVE-2024-26593, CVSSv2 Score: 7.1
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://ubuntu.com/security/CVE-2024-26593
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions.patch
- From: 5.4.0-181.201
- CVE-2023-52606, CVSSv2 Score: 7.1
- Description:
powerpc/lib: Validate size for vector operations
- CVE: https://ubuntu.com/security/CVE-2023-52606
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52606-powerpc-lib-validate-size-for-vector-operations.patch
- From: 5.4.0-181.201
- CVE-2023-52599, CVSSv2 Score: 7.1
- Description:
jfs: fix array-index-out-of-bounds in diNewExt
- CVE: https://ubuntu.com/security/CVE-2023-52599
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52599-jfs-fix-array-index-out-of-bounds-in-dinewext.patch
- From: 5.4.0-181.201
- CVE-2023-52598, CVSSv2 Score: 6.0
- Description:
s390/ptrace: handle setting of fpc register correctly
- CVE: https://ubuntu.com/security/CVE-2023-52598
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52598-s390-ptrace-handle-setting-of-fpc-register-correctly.patch
- From: 5.4.0-181.201
- CVE-2023-52597, CVSSv2 Score: 7.1
- Description:
KVM: s390: fix setting of fpc register
- CVE: https://ubuntu.com/security/CVE-2023-52597
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52597-kvm-s390-fix-setting-of-fpc-register.patch
- From: 5.4.0-181.201
- CVE-2024-26625, CVSSv2 Score: 7.8
- Description:
llc: call sock_orphan() at release time
- CVE: https://ubuntu.com/security/CVE-2024-26625
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26625-llc-call-sock-orphan-at-release-time.patch
- From: 5.4.0-181.201
- CVE-2024-26598, CVSSv2 Score: 7.8
- Description:
KVM: arm64: vgic-its: Avoid potential UAF in LPI translation
- CVE: https://ubuntu.com/security/CVE-2024-26598
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26598-kvm-arm64-vgic-its-avoid-potential-uaf-in-lpi-translation.patch
- From: 5.4.0-181.201
- CVE-2023-52435, CVSSv2 Score: 5.5
- Description:
net: prevent mss overflow in skb_segment()
- CVE: https://ubuntu.com/security/CVE-2023-52435
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52435-net-prevent-mss-overflow-in-skb-segment.patch
- From: 5.4.0-181.201
- CVE-2023-52583, CVSSv2 Score: 5.5
- Description:
ceph: fix deadlock or deadcode of misusing dget()
- CVE: https://ubuntu.com/security/CVE-2023-52583
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52583-ceph-fix-deadlock-or-deadcode-of-misusing-dget.patch
- From: 5.4.0-181.201
- CVE-2023-52607, CVSSv2 Score: 5.5
- Description:
powerpc/mm: Fix null-pointer dereference in pgtable_cache_add
- CVE: https://ubuntu.com/security/CVE-2023-52607
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52607-powerpc-mm-fix-null-pointer-dereference-in-pgtable-cache-add.patch
- From: 5.4.0-181.201
- CVE-2023-52623, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix a suspicious RCU usage warning
- CVE: https://ubuntu.com/security/CVE-2023-52623
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52623-sunrpc-fix-a-suspicious-rcu-usage-warning.patch
- From: 5.4.0-181.201
- CVE-2024-23849, CVSSv2 Score: 5.5
- Description:
net/rds: Fix UBSAN: array-index-out-of-bounds in
- CVE: https://ubuntu.com/security/CVE-2024-23849
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-23849-net-rds-fix-ubsan-array-index-out-of-bounds-in.patch
- From: 5.4.0-181.201
- CVE-2024-26600, CVSSv2 Score: 5.5
- Description:
phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
- CVE: https://ubuntu.com/security/CVE-2024-26600
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26600-phy-ti-phy-omap-usb2-fix-null-pointer-dereference-for-srp.patch
- From: 5.4.0-181.201
- CVE-2024-26602, CVSSv2 Score: 5.5
- Description:
sched/membarrier: reduce the ability to hammer on
- CVE: https://ubuntu.com/security/CVE-2024-26602
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
- From: 5.4.0-181.201
- CVE-2023-52637, CVSSv2 Score: 5.5
- Description:
can: j1939: Fix UAF in j1939_sk_match_filter during
- CVE: https://ubuntu.com/security/CVE-2023-52637
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52637-can-j1939-fix-uaf-in-j1939-sk-match-filter-during.patch
- From: 5.4.0-181.201
- CVE-2023-52637, CVSSv2 Score: 5.5
- Description:
can: j1939: Fix UAF in j1939_sk_match_filter during (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-52637
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52637-can-j1939-fix-uaf-in-j1939-sk-match-filter-during-kpatch.patch
- From: 5.4.0-181.201
- CVE-2023-52622, CVSSv2 Score: 5.5
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://ubuntu.com/security/CVE-2023-52622
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg.patch
- From: 5.4.0-181.201
- CVE-2023-52622, CVSSv2 Score: 5.5
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://ubuntu.com/security/CVE-2023-52622
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg-kpatch.patch
- From: 5.4.0-181.201
- CVE-2024-26606, CVSSv2 Score: 5.5
- Description:
binder: signal epoll threads of self-work
- CVE: https://ubuntu.com/security/CVE-2024-26606
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26606-binder-signal-epoll-threads-of-self-work.patch
- From: 5.4.0-181.201
- CVE-2024-26615, CVSSv2 Score: 5.5
- Description:
net/smc: fix illegal rmb_desc access in SMC-D connection dump
- CVE: https://ubuntu.com/security/CVE-2024-26615
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch
- From: 5.4.0-181.201
- CVE-2024-26635, CVSSv2 Score: 5.5
- Description:
llc: Drop support for ETH_P_TR_802_2.
- CVE: https://ubuntu.com/security/CVE-2024-26635
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26635-llc-drop-support-for-eth-p-tr-802-2.patch
- From: 5.4.0-181.201
- CVE-2024-26635, CVSSv2 Score: 5.5
- Description:
llc: Drop support for ETH_P_TR_802_2 (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26635
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26635-llc-drop-support-for-eth-p-tr-802-2-kpatch.patch
- From: 5.4.0-181.201
- CVE-2024-26636, CVSSv2 Score: 5.5
- Description:
llc: make llc_ui_sendmsg() more robust against bonding
- CVE: https://ubuntu.com/security/CVE-2024-26636
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26636-llc-make-llc-ui-sendmsg-more-robust-against-bonding.patch
- From: 5.4.0-181.201
- CVE-2024-26663, CVSSv2 Score: 5.5
- Description:
tipc: Check the bearer type before calling
- CVE: https://ubuntu.com/security/CVE-2024-26663
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26663-tipc-check-the-bearer-type-before-calling.patch
- From: 5.4.0-181.201
- CVE-2024-26664, CVSSv2 Score: 5.5
- Description:
hwmon: (coretemp) Fix out-of-bounds memory access
- CVE: https://ubuntu.com/security/CVE-2024-26664
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26664-hwmon-coretemp-fix-out-of-bounds-memory-access.patch
- From: 5.4.0-181.201
- CVE-2024-26671, CVSSv2 Score: 5.5
- Description:
blk-mq: fix IO hang from sbitmap wakeup race
- CVE: https://ubuntu.com/security/CVE-2024-26671
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26671-blk-mq-fix-io-hang-from-sbitmap-wakeup-race.patch
- From: 5.4.0-181.201
- CVE-2024-26673, CVSSv2 Score: 5.5
- Description:
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in
- CVE: https://ubuntu.com/security/CVE-2024-26673
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26673-netfilter-nft-ct-sanitize-layer-3-and-4-protocol-number-in.patch
- From: 5.4.0-181.201
- CVE-2024-26675, CVSSv2 Score: 5.5
- Description:
ppp_async: limit MRU to 64K
- CVE: https://ubuntu.com/security/CVE-2024-26675
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26675-ppp-async-limit-mru-to-64k.patch
- From: 5.4.0-181.201
- CVE-2024-26679, CVSSv2 Score: 5.5
- Description:
inet: read sk->sk_family once in inet_recv_error()
- CVE: https://ubuntu.com/security/CVE-2024-26679
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26679-inet-read-sk-sk-family-once-in-inet-recv-error.patch
- From: 5.4.0-181.201
- CVE-2024-26685, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential bug in end_buffer_async_write
- CVE: https://ubuntu.com/security/CVE-2024-26685
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26685-nilfs2-fix-potential-bug-in-end-buffer-async-write-1.patch
- From: 5.4.0-181.201
- CVE-2024-26696, CVSSv2 Score: 5.5
- Description:
nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()
- CVE: https://ubuntu.com/security/CVE-2024-26696
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26696-nilfs2-fix-hang-in-nilfs-lookup-dirty-data-buffers.patch
- From: 5.4.0-181.201
- CVE-2024-26697, CVSSv2 Score: 5.5
- Description:
nilfs2: fix data corruption in dsync block recovery for small
- CVE: https://ubuntu.com/security/CVE-2024-26697
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26697-nilfs2-fix-data-corruption-in-dsync-block-recovery-for-small.patch
- From: 5.4.0-181.201
- CVE-2024-26702, CVSSv2 Score: 5.5
- Description:
iio: magnetometer: rm3100: add boundary check for the value
- CVE: https://ubuntu.com/security/CVE-2024-26702
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26702-iio-magnetometer-rm3100-add-boundary-check-for-the-value.patch
- From: 5.4.0-181.201
- CVE-2024-26704, CVSSv2 Score: 5.5
- Description:
ext4: fix double-free of blocks due to wrong extents
- CVE: https://ubuntu.com/security/CVE-2024-26704
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26704-ext4-fix-double-free-of-blocks-due-to-wrong-extents.patch
- From: 5.4.0-181.201
- CVE-2024-26720, CVSSv2 Score: 5.5
- Description:
mm/writeback: fix possible divide-by-zero in
- CVE: https://ubuntu.com/security/CVE-2024-26720
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2024-26720-mm-writeback-fix-possible-divide-by-zero-in.patch
- From: 5.4.0-181.201
- CVE-2023-52602, CVSSv2 Score: 4.7
- Description:
jfs: fix slab-out-of-bounds Read in dtSearch
- CVE: https://ubuntu.com/security/CVE-2023-52602
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52602-jfs-fix-slab-out-of-bounds-read-in-dtsearch.patch
- From: 5.4.0-181.201
- CVE-2023-52486, CVSSv2 Score: 4.4
- Description:
drm: Don't unref the same fb many times by mistake due to
- CVE: https://ubuntu.com/security/CVE-2023-52486
- Patch: ubuntu-focal/5.4.0-181.201/CVE-2023-52486-drm-don-t-unref-the-same-fb-many-times-by-mistake-due-to.patch
- From: 5.4.0-181.201
- CVE-2023-47233, CVSSv2 Score: 4.3
- Description:
wifi: brcmfmac: Fix use-after-free bug in
- CVE: https://ubuntu.com/security/CVE-2023-47233
- Patch: ubuntu-focal/5.4.0-182.202/CVE-2023-47233-wifi-brcmfmac-fix-use-after-free-bug-in.patch
- From: 5.4.0-182.202
- CVE-2024-26622, CVSSv2 Score: 7.8
- Description:
tomoyo: fix UAF write bug in tomoyo_write_control()
- CVE: https://ubuntu.com/security/CVE-2024-26622
- Patch: ubuntu-focal/5.4.0-182.202/CVE-2024-26622-tomoyo-fix-uaf-write-bug-in-tomoyo-write-control.patch
- From: 5.4.0-182.202
- CVE-2023-52530, CVSSv2 Score: 7.1
- Description:
wifi: mac80211: fix potential key use-after-free
- CVE: https://ubuntu.com/security/CVE-2023-52530
- Patch: ubuntu-focal/5.4.0-182.202/CVE-2023-52530-wifi-mac80211-fix-potential-key-use-after-free.patch
- From: 5.4.0-182.202
- CVE-2024-26614, CVSSv2 Score:
- Description:
Complex adaptation required. Network services prevents update because sleeps in inet_csk_accept() function.
- CVE:
- Patch: skipped/CVE-2024-26614.patch
- From:
- CVE-2024-0841 CVE-2024-26688, CVSSv2 Score: 5.5
- Description:
fs,hugetlb: fix NULL pointer dereference in
- CVE: https://ubuntu.com/security/CVE-2024-26688
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-0841-CVE-2024-26688-fs-hugetlb-fix-null-pointer-dereference-in.patch
- From: 5.4.0-186.206
- CVE-2021-47063, CVSSv2 Score: 6.7
- Description:
drm: bridge/panel: Cleanup connector on bridge detach
- CVE: https://ubuntu.com/security/CVE-2021-47063
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2021-47063-drm-bridge-panel-cleanup-connector-on-bridge-detach.patch
- From: 5.4.0-186.206
- CVE-2024-26733, CVSSv2 Score: 5.5
- Description:
arp: Prevent overflow in arp_req_get().
- CVE: https://ubuntu.com/security/CVE-2024-26733
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26733-arp-prevent-overflow-in-arp-req-get.patch
- From: 5.4.0-186.206
- CVE-2024-26736, CVSSv2 Score: 5.5
- Description:
afs: Increase buffer size in afs_update_volume_status()
- CVE: https://ubuntu.com/security/CVE-2024-26736
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26736-afs-increase-buffer-size-in-afs-update-volume-status.patch
- From: 5.4.0-186.206
- CVE-2024-26735, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix possible use-after-free and null-ptr-deref
- CVE: https://ubuntu.com/security/CVE-2024-26735
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and-null-ptr-deref.patch
- From: 5.4.0-186.206
- CVE-2023-52504, CVSSv2 Score:
- Description:
Unable to fix early initialization before enabling SMP d35652a5fc9944784f6f50a5c979518ff8dacf61
- CVE:
- Patch: skipped/CVE-2023-52504.patch
- From:
- CVE-2024-26712, CVSSv2 Score:
- Description:
Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0
- CVE:
- Patch: skipped/CVE-2024-26712.patch
- From:
- CVE-2024-26748, CVSSv2 Score: 5.5
- Description:
usb: cdns3: fix memory double free when handle zero packet
- CVE: https://ubuntu.com/security/CVE-2024-26748
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26748-usb-cdns3-fix-memory-double-free-when-handle-zero-packet.patch
- From: 5.4.0-186.206
- CVE-2024-26749, CVSSv2 Score: 5.5
- Description:
usb: cdns3: fixed memory use after free at
- CVE: https://ubuntu.com/security/CVE-2024-26749
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26749-usb-cdns3-fixed-memory-use-after-free-at.patch
- From: 5.4.0-186.206
- CVE-2024-26751, CVSSv2 Score: 5.5
- Description:
ARM: ep93xx: Add terminator to gpiod_lookup_table
- CVE: https://ubuntu.com/security/CVE-2024-26751
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26751-arm-ep93xx-add-terminator-to-gpiod-lookup-table.patch
- From: 5.4.0-186.206
- CVE-2024-26754, CVSSv2 Score: 5.5
- Description:
gtp: fix use-after-free and null-ptr-deref in
- CVE: https://ubuntu.com/security/CVE-2024-26754
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26754-gtp-fix-use-after-free-and-null-ptr-deref-in.patch
- From: 5.4.0-186.206
- CVE-2024-26763, CVSSv2 Score: 5.5
- Description:
dm-crypt: don't modify the data when using authenticated
- CVE: https://ubuntu.com/security/CVE-2024-26763
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26763-dm-crypt-don-t-modify-the-data-when-using-authenticated.patch
- From: 5.4.0-186.206
- CVE-2024-26764, CVSSv2 Score: 5.5
- Description:
fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via
- CVE: https://ubuntu.com/security/CVE-2024-26764
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26764-fs-aio-restrict-kiocb-set-cancel-fn-to-i-o-submitted-via.patch
- From: 5.4.0-186.206
- CVE-2024-26766, CVSSv2 Score: N/A
- Description:
IB/hfi1: Fix sdma.h tx->num_descs off-by-one error
- CVE: https://ubuntu.com/security/CVE-2024-26766
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26766-ib-hfi1-fix-sdma-h-tx-num-descs-off-by-one-errors-pre166.patch
- From: 5.4.0-165.182
- CVE-2024-26766, CVSSv2 Score: 5.5
- Description:
IB/hfi1: Fix sdma.h tx->num_descs off-by-one error
- CVE: https://ubuntu.com/security/CVE-2024-26766
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26766-ib-hfi1-fix-sdma-h-tx-num-descs-off-by-one-error.patch
- From: 5.4.0-186.206
- CVE-2024-26752, CVSSv2 Score: 5.5
- Description:
l2tp: pass correct message length to ip6_append_data
- CVE: https://ubuntu.com/security/CVE-2024-26752
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26752-l2tp-pass-correct-message-length-to-ip6-append-data-171.patch
- From: 5.4.0-186.206
- CVE-2024-26793, CVSSv2 Score: 5.5
- Description:
gtp: fix use-after-free and null-ptr-deref in gtp_newlink()
- CVE: https://ubuntu.com/security/CVE-2024-26793
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26793-gtp-fix-use-after-free-and-null-ptr-deref-in-gtp-newlink.patch
- From: 5.4.0-186.206
- CVE-2024-26778, CVSSv2 Score: 5.5
- Description:
fbdev: savage: Error out if pixclock equals zero
- CVE: https://ubuntu.com/security/CVE-2024-26778
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26778-fbdev-savage-error-out-if-pixclock-equals-zero.patch
- From: 5.4.0-186.206
- CVE-2024-26779, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: fix race condition on enabling fast-xmit
- CVE: https://ubuntu.com/security/CVE-2024-26779
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26779-wifi-mac80211-fix-race-condition-on-enabling-fast-xmit.patch
- From: 5.4.0-186.206
- CVE-2024-26777, CVSSv2 Score: 5.5
- Description:
fbdev: sis: Error out if pixclock equals zero
- CVE: https://ubuntu.com/security/CVE-2024-26777
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26777-fbdev-sis-error-out-if-pixclock-equals-zero.patch
- From: 5.4.0-186.206
- CVE-2024-26773, CVSSv2 Score: 5.5
- Description:
ext4: avoid allocating blocks from corrupted group in
- CVE: https://ubuntu.com/security/CVE-2024-26773
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26773-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 5.4.0-186.206
- CVE-2024-26772, CVSSv2 Score: 5.5
- Description:
ext4: avoid allocating blocks from corrupted group in
- CVE: https://ubuntu.com/security/CVE-2024-26772
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26772-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 5.4.0-186.206
- CVE-2024-26791, CVSSv2 Score: 5.5
- Description:
btrfs: dev-replace: properly validate device names
- CVE: https://ubuntu.com/security/CVE-2024-26791
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26791-btrfs-dev-replace-properly-validate-device-names.patch
- From: 5.4.0-186.206
- CVE-2024-26788, CVSSv2 Score: 5.5
- Description:
dmaengine: fsl-qdma: init irq after reg initialization
- CVE: https://ubuntu.com/security/CVE-2024-26788
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26788-dmaengine-fsl-qdma-init-irq-after-reg-initialization.patch
- From: 5.4.0-186.206
- CVE-2024-26790, CVSSv2 Score: 5.5
- Description:
dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned
- CVE: https://ubuntu.com/security/CVE-2024-26790
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26790-dmaengine-fsl-qdma-fix-soc-may-hang-on-16-byte-unaligned.patch
- From: 5.4.0-186.206
- CVE-2024-26801, CVSSv2 Score: 5.5
- Description:
Bluetooth: Avoid potential use-after-free in hci_error_reset
- CVE: https://ubuntu.com/security/CVE-2024-26801
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26801-bluetooth-avoid-potential-use-after-free-in-hci-error-reset.patch
- From: 5.4.0-186.206
- CVE-2024-27410, CVSSv2 Score: 5.5
- Description:
wifi: nl80211: reject iftype change with mesh ID change
- CVE: https://ubuntu.com/security/CVE-2024-27410
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-27410-wifi-nl80211-reject-iftype-change-with-mesh-ID-change.patch
- From: 5.4.0-186.206
- CVE-2024-27413, CVSSv2 Score: 5.5
- Description:
efi/capsule-loader: fix incorrect allocation size
- CVE: https://ubuntu.com/security/CVE-2024-27413
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-27413-efi-capsule-loader-fix-incorrect-allocation-size.patch
- From: 5.4.0-186.206
- CVE-2024-27417, CVSSv2 Score: 5.5
- Description:
ipv6: fix potential "struct net" leak in inet6_rtm_getaddr()
- CVE: https://ubuntu.com/security/CVE-2024-27417
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-27417-ipv6-fix-potential-struct-net-leak-in-inet6_rtm_getaddr.patch
- From: 5.4.0-186.206
- CVE-2021-47070, CVSSv2 Score: 4.4
- Description:
uio_hv_generic: Fix another memory leak in error handling
- CVE: https://ubuntu.com/security/CVE-2021-47070
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2021-47070-uio-hv-generic-fix-another-memory-leak-in-error-handling.patch
- From: 5.4.0-186.206
- CVE-2024-26839, CVSSv2 Score: 4.4
- Description:
IB/hfi1: Fix a memleak in init_credit_return
- CVE: https://ubuntu.com/security/CVE-2024-26839
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26839-ib-hfi1-fix-a-memleak-in-init-credit-return.patch
- From: 5.4.0-186.206
- CVE-2024-26845, CVSSv2 Score: 4.4
- Description:
scsi: target: core: Add TMF to tmr_list handling
- CVE: https://ubuntu.com/security/CVE-2024-26845
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26845-scsi-target-core-add-tmf-to-tmr-list-handling.patch
- From: 5.4.0-186.206
- CVE-2024-26804, CVSSv2 Score: 5.5
- Description:
net: ip_tunnel: prevent perpetual headroom growth
- CVE: https://ubuntu.com/security/CVE-2024-26804
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26804-net-ip-tunnel-prevent-perpetual-headroom-growth-5.4.0-155.172.patch
- From: 5.4.0-186.206
- CVE-2024-26805, CVSSv2 Score: 5.5
- Description:
netlink: Fix kernel-infoleak-after-free in
- CVE: https://ubuntu.com/security/CVE-2024-26805
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26805-netlink-fix-kernel-infoleak-after-free-in.patch
- From: 5.4.0-186.206
- CVE-2024-26840, CVSSv2 Score: 5.5
- Description:
cachefiles: fix memory leak in cachefiles_add_cache()
- CVE: https://ubuntu.com/security/CVE-2024-26840
- Patch: ubuntu-focal/5.4.0-186.206/CVE-2024-26840-cachefiles-fix-memory-leak-in-cachefiles-add-cache.patch
- From: 5.4.0-186.206
- CVE-2024-23307, CVSSv2 Score: 7.8
- Description:
md/raid5: fix atomicity violation in raid5_cache_count
- CVE: https://ubuntu.com/security/CVE-2024-23307
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-23307-md-raid5-fix-atomicity-violation-in-raid5-cache-count.patch
- From: 5.4.0-189.209
- CVE-2024-26586, CVSSv2 Score: 7.8
- Description:
mlxsw: spectrum_acl_tcam: Fix stack corruption
- CVE: https://ubuntu.com/security/CVE-2024-26586
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26586-mlxsw-spectrum-acl-tcam-fix-stack-corruption.patch
- From: 5.4.0-189.209
- CVE-2024-26882, CVSSv2 Score: 7.8
- Description:
net: ip_tunnel: make sure to pull inner header in
- CVE: https://ubuntu.com/security/CVE-2024-26882
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26882-net-ip-tunnel-make-sure-to-pull-inner-header-in.patch
- From: 5.4.0-189.209
- CVE-2024-26883, CVSSv2 Score: 7.8
- Description:
bpf: Fix stackmap overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26883
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26883-bpf-fix-stackmap-overflow-check-on-32-bit-arches.patch
- From: 5.4.0-189.209
- CVE-2024-26884, CVSSv2 Score: 7.8
- Description:
bpf: Fix hashtab overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26884
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26884-bpf-fix-hashtab-overflow-check-on-32-bit-arches.patch
- From: 5.4.0-189.209
- CVE-2024-27020, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
- CVE: https://ubuntu.com/security/CVE-2024-27020
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-27020-netfilter-nf-tables-fix-potential-data-race-in.patch
- From: 5.4.0-189.209
- CVE-2024-26934, CVSSv2 Score: 7.8
- Description:
USB: core: Fix deadlock in usb_deauthorize_interface()
- CVE: https://ubuntu.com/security/CVE-2024-26934
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26934-usb-core-fix-deadlock-in-usb-deauthorize-interface.patch
- From: 5.4.0-189.209
- CVE-2024-26852, CVSSv2 Score: 7.0
- Description:
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
- CVE: https://ubuntu.com/security/CVE-2024-26852
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26852-net-ipv6-avoid-possible-uaf-in-ip6-route-mpath-notify.patch
- From: 5.4.0-189.209
- CVE-2023-6270 CVE-2024-26898, CVSSv2 Score: 7.8
- Description:
aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
- CVE: https://ubuntu.com/security/CVE-2024-26898
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2023-6270-CVE-2024-26898-aoe-fix-the-potential-use-after-free-problem-in.patch
- From: 5.4.0-189.209
- CVE-2024-26923, CVSSv2 Score: 7.0
- Description:
af_unix: Do not use atomic ops for unix_sk(sk)->inflight.
- CVE: https://ubuntu.com/security/CVE-2024-26923
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26923-af-unix-do-not-use-atomic-ops-for-unix-sk-sk-inflight.patch
- From: 5.4.0-189.209
- CVE-2024-26923, CVSSv2 Score: 7.0
- Description:
af_unix: Fix garbage collector racing against connect()
- CVE: https://ubuntu.com/security/CVE-2024-26923
- Patch: ubuntu-focal/5.4.0-189.209/CVE-2024-26923-af-unix-fix-garbage-collector-racing-against-connect.patch
- From: 5.4.0-189.209
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A