- kernel-5.15.0-1090.99 (ubuntu-jammy-azure)
- 5.15.0-1103.112
- 2026-03-19 21:07:09
- 2026-03-20 09:21:50
- K20260319_18
- CVE-2025-21991
- Description:
x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
- CVE: https://ubuntu.com/security/CVE-2025-21991
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21991-x86-microcode-amd-fix-out-of-bounds-on-systems-with-cpu-less-numa-nodes.patch
- From: 5.15.0-142.152
- CVE-2025-21968
- Description:
drm/amd/display: Fix slab-use-after-free on hdcp_work
- CVE: https://ubuntu.com/security/CVE-2025-21968
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21968-drm-amd-display-fix-slab-use-after-free-on-hdcp-work.patch
- From: 5.15.0-142.152
- CVE-2025-22004
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://ubuntu.com/security/CVE-2025-22004
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 5.15.0-142.152
- CVE-2025-21999
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://ubuntu.com/security/CVE-2025-21999
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode.patch
- From: 5.15.0-142.152
- CVE-2025-21999
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://ubuntu.com/security/CVE-2025-21999
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-53144 CVE-2024-8805
- Description:
Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE
- CVE: https://ubuntu.com/security/CVE-2024-8805
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-53144-CVE-2024-8805-bluetooth-hci-event-align-br-edr-just-works-paring-with-le.patch
- From: 5.15.0-142.152
- CVE-2025-22020
- Description:
memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
- CVE: https://ubuntu.com/security/CVE-2025-22020
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22020-memstick-rtsx-usb-ms-fix-slab-use-after-free-in-rtsx-usb-ms-drv-remove.patch
- From: 5.15.0-142.152
- CVE-2025-22055
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://ubuntu.com/security/CVE-2025-22055
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow.patch
- From: 5.15.0-142.152
- CVE-2025-22055
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://ubuntu.com/security/CVE-2025-22055
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-46821
- Description:
drm/amd/pm: Fix negative array index read
- CVE: https://ubuntu.com/security/CVE-2024-46821
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-46821-drm-amd-pm-fix-negative-array-index-read.patch
- From: 5.15.0-142.152
- CVE-2024-46812
- Description:
drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration
- CVE: https://ubuntu.com/security/CVE-2024-46812
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-46812-drm-amd-display-skip-inactive-planes-within-modesupportandsystemconfiguration.patch
- From: 5.15.0-142.152
- CVE-2025-22035
- Description:
tracing: Fix use-after-free in print_graph_function_flags during tracer switching
- CVE: https://ubuntu.com/security/CVE-2025-22035
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22035-tracing-fix-use-after-free-in-print-graph-function-flags-during-tracer-switching.patch
- From: 5.15.0-142.152
- CVE-2025-37785
- Description:
ext4: fix OOB read when checking dotdot dir
- CVE: https://ubuntu.com/security/CVE-2025-37785
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-37785-ext4-fix-oob-read-when-checking-dotdot-dir.patch
- From: 5.15.0-142.152
- CVE-2025-39735
- Description:
jfs: fix slab-out-of-bounds read in ea_get()
- CVE: https://ubuntu.com/security/CVE-2025-39735
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-39735-jfs-fix-slab-out-of-bounds-read-in-ea-get.patch
- From: 5.15.0-142.152
- CVE-2024-56664
- Description:
bpf, sockmap: Fix race between element replace and close()
- CVE: https://ubuntu.com/security/CVE-2024-56664
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-56664-bpf-sockmap-fix-race-between-element-replace-and-close.patch
- From: 5.15.0-142.152
- CVE-2025-37937
- Description:
objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds()
- CVE: https://ubuntu.com/security/CVE-2025-37937
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-37937-objtool-media-dib8000-prevent-divide-by-zero-in-dib8000-set-dds.patch
- From: 5.15.0-142.152
- CVE-2025-21964
- Description:
cifs: Fix integer overflow while processing acregmax mount option
- CVE: https://ubuntu.com/security/CVE-2025-21964
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21964-cifs-fix-integer-overflow-while-processing-acregmax-mount-option.patch
- From: 5.15.0-142.152
- CVE-2025-21963
- Description:
cifs: Fix integer overflow while processing acdirmax mount option
- CVE: https://ubuntu.com/security/CVE-2025-21963
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21963-cifs-fix-integer-overflow-while-processing-acdirmax-mount-option.patch
- From: 5.15.0-142.152
- CVE-2025-21962
- Description:
cifs: Fix integer overflow while processing closetimeo mount option
- CVE: https://ubuntu.com/security/CVE-2025-21962
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21962-cifs-fix-integer-overflow-while-processing-closetimeo-mount-option.patch
- From: 5.15.0-142.152
- CVE-2022-49636
- Description:
vlan: fix memory leak in vlan_newlink()
- CVE: https://ubuntu.com/security/CVE-2022-49636
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2022-49636-vlan-fix-memory-leak-in-vlan-newlink.patch
- From: 5.15.0-142.152
- CVE-2025-22097
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://ubuntu.com/security/CVE-2025-22097
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error.patch
- From: 5.15.0-142.152
- CVE-2025-22097
- Description:
drm/vkms: Fix use after free and double free on init error
- CVE: https://ubuntu.com/security/CVE-2025-22097
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22097-drm-vkms-fix-use-after-free-and-double-free-on-init-error-kpatch.patch
- From: 5.15.0-142.152
- CVE-2022-49728
- Description:
[PATCH] ipv6: Fix signed integer overflow in __ip6_append_data
- CVE: https://ubuntu.com/security/CVE-2022-49728
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2022-49728-ipv6-Fix-signed-integer-overflow-in-__ip6_append_data.patch
- From: 5.15.0-142.152
- CVE-2022-49728
- Description:
[PATCH] ipv6: Fix signed integer overflow in __ip6_append_data
- CVE: https://ubuntu.com/security/CVE-2022-49728
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2022-49728-ipv6-Fix-signed-integer-overflow-in-__ip6_append_data-kpatch.patch
- From: 5.15.0-142.152
- CVE-2025-21981
- Description:
ice: fix memory leak in aRFS after reset
- CVE: https://ubuntu.com/security/CVE-2025-21981
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21981-ice-fix-memory-leak-in-arfs-after-reset.patch
- From: 5.15.0-142.152
- CVE-2025-21975
- Description:
net/mlx5: handle errors in mlx5_chains_create_table()
- CVE: https://ubuntu.com/security/CVE-2025-21975
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21975-net-mlx5-handle-errors-in-mlx5-chains-create-table.patch
- From: 5.15.0-142.152
- CVE-2025-21959
- Description:
netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()
- CVE: https://ubuntu.com/security/CVE-2025-21959
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21959-netfilter-nf-conncount-fully-initialize-struct-nf-conncount-tuple-in-insert-tree.patch
- From: 5.15.0-142.152
- CVE-2025-21970
- Description:
net/mlx5: Bridge, fix the crash caused by LAG state check
- CVE: https://ubuntu.com/security/CVE-2025-21970
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21970-net-mlx5-bridge-fix-the-crash-caused-by-lag-state-check.patch
- From: 5.15.0-142.152
- CVE-2025-21957
- Description:
scsi: qla1280: Fix kernel oops when debug level > 2
- CVE: https://ubuntu.com/security/CVE-2025-21957
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21957-scsi-qla1280-fix-kernel-oops-when-debug-level-2.patch
- From: 5.15.0-142.152
- CVE-2025-21956
- Description:
drm/amd/display: Assign normalized_pix_clk when color depth = 14
- CVE: https://ubuntu.com/security/CVE-2025-21956
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21956-drm-amd-display-assign-normalized-pix-clk-when-color-depth-14.patch
- From: 5.15.0-142.152
- CVE-2025-21941
- Description:
[PATCH] drm/amd/display: Check for invalid input params when building scaling params
- CVE: https://ubuntu.com/security/CVE-2025-21941
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21941-drm-amd-display-Check-for-invalid-input-params-when-building-scaling-params.patch
- From: 5.15.0-142.152
- CVE-2025-21941
- Description:
drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params
- CVE: https://ubuntu.com/security/CVE-2025-21941
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21941-drm-amd-display-fix-null-check-for-pipe-ctx-plane-state-in-resource-build-scaling-params.patch
- From: 5.15.0-142.152
- CVE-2025-22010
- Description:
CONFIG_INFINIBAND_HNS is not enabled on jammy.
- CVE:
- Patch: skipped/CVE-2025-22010.patch
- From:
- CVE-2025-37889
- Description:
[PATCH] ASoC: ops: Consistently treat platform_max as control value
- CVE: https://ubuntu.com/security/CVE-2025-37889
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-37889-ASoC-ops-Consistently-treat-platform_max-as-control-value.patch
- From: 5.15.0-142.152
- CVE-2025-37889
- Description:
[PATCH] ASoC: ops: Consistently treat platform_max as control value
- CVE: https://ubuntu.com/security/CVE-2025-37889
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-37889-ASoC-ops-Consistently-treat-platform_max-as-control-value-kpatch.patch
- From: 5.15.0-142.152
- CVE-2025-22056
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2025-22056.patch
- From:
- CVE-2025-21992
- Description:
[PATCH] HID: ignore non-functional sensor in HP 5MP Camera
- CVE: https://ubuntu.com/security/CVE-2025-21992
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21992-HID-ignore-non-functional-sensor-in-HP-5MP-Camera.patch
- From: 5.15.0-142.152
- CVE-2025-21992
- Description:
[PATCH] HID: ignore non-functional sensor in HP 5MP Camera
- CVE: https://ubuntu.com/security/CVE-2025-21992
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21992-HID-ignore-non-functional-sensor-in-HP-5MP-Camera-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-50047
- Description:
smb: client: fix UAF in async decryption
- CVE: https://ubuntu.com/security/CVE-2024-50047
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2024-50047-smb-client-fix-uaf-in-async-decryption-azure.patch
- From: 5.15.0-143.153
- CVE-2024-53185
- Description:
smb: client: fix NULL ptr deref in crypto_aead_setkey()
- CVE: https://ubuntu.com/security/CVE-2024-53185
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2024-53185-smb-client-fix-null-ptr-deref-in-crypto-aead-setkey.patch
- From: 5.15.0-143.153
- CVE-2025-37932
- Description:
sch_htb: make htb_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37932
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37932-sch-htb-make-htb-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-codel-remove-sch-q-qlen-check-before-qdisc-tree-reduce-backlog.patch
- From: 5.15.0-143.153
- CVE-2025-37798 CVE-2025-37953
- Description:
sch_htb: make htb_deactivate() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37953
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-htb-make-htb-deactivate-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
sch_drr: make drr_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-drr-make-drr-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
sch_hfsc: make hfsc_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-hfsc-make-hfsc-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
sch_qfq: make qfq_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-qfq-make-qfq-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37798
- Description:
sch_ets: make est_qlen_notify() idempotent
- CVE: https://ubuntu.com/security/CVE-2025-37798
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37798-sch-ets-make-est-qlen-notify-idempotent.patch
- From: 5.15.0-143.153
- CVE-2025-37997
- Description:
netfilter: ipset: fix region locking in hash types
- CVE: https://ubuntu.com/security/CVE-2025-37997
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37997-netfilter-ipset-fix-region-locking-in-hash-types.patch
- From: 5.15.0-143.153
- CVE-2024-46787
- Description:
userfaultfd: fix checks for huge PMDs
- CVE: https://ubuntu.com/security/CVE-2024-46787
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2024-46787-userfaultfd-fix-checks-for-huge-PMDs.patch
- From: 5.15.0-143.153
- CVE-2024-53051
- Description:
drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability
- CVE: https://ubuntu.com/security/CVE-2024-53051
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2024-53051-drm-i915-hdcp-Add-encoder-check-in-intel_hdcp_get_capability.patch
- From: 5.15.0-143.153
- CVE-2025-37890
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37890
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-37890-net-sched-hfsc-fix-a-uaf-vulnerability-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-143.153
- CVE-2025-38000
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://ubuntu.com/security/CVE-2025-38000
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-38000-sch-hfsc-fix-qlen-accounting-bug-when-using-peek-in-hfsc-enqueue.patch
- From: 5.15.0-143.153
- CVE-2025-38001
- Description:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
- CVE: https://ubuntu.com/security/CVE-2025-38001
- Patch: ubuntu-jammy/5.15.0-143.153/CVE-2025-38001-net-sched-hfsc-address-reentrant-enqueue-adding-class-to-eltree-twice.patch
- From: 5.15.0-143.153
- CVE-2025-37749
- Description:
net: ppp: Add bound checking for skb data on ppp_sync_txmung
- CVE: https://ubuntu.com/security/CVE-2025-37749
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37749-net-ppp-add-bound-checking-for-skb-data-on-ppp-sync-txmung.patch
- From: 5.15.0-144.157
- CVE-2025-37841
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-37841.patch
- From:
- CVE-2025-23161
- Description:
Kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2025-23161.patch
- From:
- CVE-2025-37892
- Description:
mtd: inftlcore: Add error check for inftl_read_oob()
- CVE: https://ubuntu.com/security/CVE-2025-37892
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37892-mtd-inftlcore-add-error-check-for-inftl-read-oob.patch
- From: 5.15.0-144.157
- CVE-2025-23142
- Description:
sctp: detect and prevent references to a freed transport in sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-23142
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-23142-sctp-detect-and-prevent-references-to-a-freed-transport-in-sendmsg.patch
- From: 5.15.0-144.157
- CVE-2025-23142
- Description:
sctp: detect and prevent references to a freed transport in sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-23142
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-23142-sctp-detect-and-prevent-references-to-a-freed-transport-in-sendmsg-kpatch.patch
- From: 5.15.0-144.157
- CVE-2025-37838
- Description:
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2025-37838
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37838-hsi-ssi-protocol-fix-use-after-free-vulnerability-in-ssi-protocol-driver-due-to-race-condition.patch
- From: 5.15.0-144.157
- CVE-2025-37982
- Description:
wifi: wl1251: fix memory leak in wl1251_tx_work
- CVE: https://ubuntu.com/security/CVE-2025-37982
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37982-wifi-wl1251-fix-memory-leak-in-wl1251-tx-work.patch
- From: 5.15.0-144.157
- CVE-2025-37792
- Description:
Bluetooth: btrtl: Prevent potential NULL dereference
- CVE: https://ubuntu.com/security/CVE-2025-37792
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37792-bluetooth-btrtl-prevent-potential-null-dereference.patch
- From: 5.15.0-144.157
- CVE-2025-37875
- Description:
igc: fix PTM cycle trigger logic
- CVE: https://ubuntu.com/security/CVE-2025-37875
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37875-igc-fix-ptm-cycle-trigger-logic.patch
- From: 5.15.0-144.157
- CVE-2025-37790
- Description:
net: mctp: Set SOCK_RCU_FREE
- CVE: https://ubuntu.com/security/CVE-2025-37790
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37790-net-mctp-set-sock-rcu-free.patch
- From: 5.15.0-144.157
- CVE-2025-37789
- Description:
net: openvswitch: fix nested key length validation in the set() action
- CVE: https://ubuntu.com/security/CVE-2025-37789
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37789-net-openvswitch-fix-nested-key-length-validation-in-the-set-action.patch
- From: 5.15.0-144.157
- CVE-2025-37788
- Description:
cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path
- CVE: https://ubuntu.com/security/CVE-2025-37788
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37788-cxgb4-fix-memory-leak-in-cxgb4-init-ethtool-filters-error-path.patch
- From: 5.15.0-144.157
- CVE-2025-37787
- Description:
net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered
- CVE: https://ubuntu.com/security/CVE-2025-37787
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37787-net-dsa-mv88e6xxx-avoid-unregistering-devlink-regions-which-were-never-registered.patch
- From: 5.15.0-144.157
- CVE-2025-37781
- Description:
i2c: cros-ec-tunnel: defer probe if parent EC is not present
- CVE: https://ubuntu.com/security/CVE-2025-37781
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37781-i2c-cros-ec-tunnel-defer-probe-if-parent-ec-is-not-present.patch
- From: 5.15.0-144.157
- CVE-2025-37780
- Description:
isofs: Prevent the use of too small fid
- CVE: https://ubuntu.com/security/CVE-2025-37780
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37780-isofs-prevent-the-use-of-too-small-fid.patch
- From: 5.15.0-144.157
- CVE-2025-37773
- Description:
virtiofs: add filesystem context source name check
- CVE: https://ubuntu.com/security/CVE-2025-37773
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37773-virtiofs-add-filesystem-context-source-name-check.patch
- From: 5.15.0-144.157
- CVE-2024-50258
- Description:
net: fix crash when config small gso_max_size/gso_ipv4_max_size
- CVE: https://ubuntu.com/security/CVE-2024-50258
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50258-net-fix-crash-when-config-small-gso_max_size-gso_ipv4_max_size.patch
- From: 5.15.0-144.157
- CVE-2024-50258
- Description:
net: fix crash when config small gso_max_size/gso_ipv4_max_size
- CVE: https://ubuntu.com/security/CVE-2024-50258
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50258-net-fix-crash-when-config-small-gso_max_size-gso_ipv4_max_size-kpatch.patch
- From: 5.15.0-144.157
- CVE-2024-46774
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-46774.patch
- From:
- CVE-2024-35866
- Description:
smb: client: fix potential UAF in cifs_dump_full_key()
- CVE: https://ubuntu.com/security/CVE-2024-35866
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-35866-smb-client-fix-potential-uaf-in-cifs-dump-full-key-azure-1051.patch
- From: 5.15.0-144.157
- CVE-2024-35867
- Description:
smb: client: fix potential UAF in cifs_stats_proc_show()
- CVE: https://ubuntu.com/security/CVE-2024-35867
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-35867-smb-client-fix-potential-uaf-in-cifs-stats-proc-show-azure-1051.patch
- From: 5.15.0-144.157
- CVE-2024-49960
- Description:
ext4: fix timer use-after-free on failed mount
- CVE: https://ubuntu.com/security/CVE-2024-49960
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-49960-ext4-fix-timer-use-after-free-on-failed-mount.patch
- From: 5.15.0-144.157
- CVE-2024-54458
- Description:
scsi: ufs: bsg: Set bsg_queue to NULL after removal
- CVE: https://ubuntu.com/security/CVE-2024-54458
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-54458-scsi-ufs-bsg-set-bsg-queue-to-null-after-removal.patch
- From: 5.15.0-144.157
- CVE-2024-50280
- Description:
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
- CVE: https://ubuntu.com/security/CVE-2024-50280
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50280-dm-cache-fix-flushing-uninitialized-delayed-work-on-cache-ctr-error.patch
- From: 5.15.0-144.157
- CVE-2022-49535
- Description:
scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI
- CVE: https://ubuntu.com/security/CVE-2022-49535
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-49535-scsi-lpfc-fix-null-pointer-dereference-after-failing-to-issue-flogi-and-plogi.patch
- From: 5.15.0-144.157
- CVE-2024-50125
- Description:
Bluetooth: SCO: Fix UAF on sco_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-50125
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50125-bluetooth-sco-fix-uaf-on-sco-sock-timeout.patch
- From: 5.15.0-144.157
- CVE-2025-22027
- Description:
media: streamzap: fix race between device disconnection and urb callback
- CVE: https://ubuntu.com/security/CVE-2025-22027
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-22027-media-streamzap-fix-race-between-device-disconnection-and-urb-callback.patch
- From: 5.15.0-144.157
- CVE-2025-23148
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-23148.patch
- From:
- CVE-2025-37844
- Description:
cifs: avoid NULL pointer dereference in dbg call
- CVE: https://ubuntu.com/security/CVE-2025-37844
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37844-cifs-avoid-null-pointer-dereference-in-dbg-call-azure.patch
- From: 5.15.0-144.157
- CVE-2025-37985
- Description:
USB: wdm: close race between wdm_open and wdm_wwan_port_stop
- CVE: https://ubuntu.com/security/CVE-2025-37985
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37985-usb-wdm-close-race-between-wdm-open-and-wdm-wwan-port-stop.patch
- From: 5.15.0-144.157
- CVE-2025-37881
- Description:
CONFIG_USB_ASPEED_VHUB is not enabled.
- CVE:
- Patch: skipped/CVE-2025-37881.patch
- From:
- CVE-2025-37803
- Description:
udmabuf: fix a buf size overflow issue during udmabuf creation
- CVE: https://ubuntu.com/security/CVE-2025-37803
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37803-udmabuf-fix-a-buf-size-overflow-issue-during-udmabuf-creation.patch
- From: 5.15.0-144.157
- CVE-2024-49989
- Description:
drm/amd/display: fix double free issue during amdgpu module unload
- CVE: https://ubuntu.com/security/CVE-2024-49989
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-49989-drm-amd-display-fix-double-free-issue-during-amdgpu-module-unload.patch
- From: 5.15.0-144.157
- CVE-2025-37930
- Description:
drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()
- CVE: https://ubuntu.com/security/CVE-2025-37930
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37930-drm-nouveau-fix-warn-on-in-nouveau-fence-context-kill.patch
- From: 5.15.0-144.157
- CVE-2025-37991
- Description:
Out of scope: PA-RISC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-37991.patch
- From:
- CVE-2025-37990
- Description:
wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()
- CVE: https://ubuntu.com/security/CVE-2025-37990
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37990-wifi-brcm80211-fmac-add-error-handling-for-brcmf-usb-dl-writeimage.patch
- From: 5.15.0-144.157
- CVE-2025-37923
- Description:
tracing: Fix oob write in trace_seq_to_buffer()
- CVE: https://ubuntu.com/security/CVE-2025-37923
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37923-tracing-fix-oob-write-in-trace-seq-to-buffer.patch
- From: 5.15.0-144.157
- CVE-2024-26739
- Description:
net/sched: act_mirred: don't override retval if we already lost the skb
- CVE: https://ubuntu.com/security/CVE-2024-26739
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-26739-net-sched-act-mirred-don-t-override-retval-if-we-already-lost-the-skb.patch
- From: 5.15.0-144.157
- CVE-2025-37915
- Description:
net_sched: drr: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37915
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37915-net-sched-drr-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-144.157
- CVE-2025-37914
- Description:
net_sched: ets: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37914
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37914-net-sched-ets-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-144.157
- CVE-2025-37913
- Description:
net_sched: qfq: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37913
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37913-net-sched-qfq-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-144.157
- CVE-2025-37912
- Description:
ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr()
- CVE: https://ubuntu.com/security/CVE-2025-37912
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37912-ice-check-vf-vsi-pointer-value-in-ice-vc-add-fdir-fltr.patch
- From: 5.15.0-144.157
- CVE-2025-37911
- Description:
bnxt_en: Fix out-of-bound memcpy() during ethtool -w
- CVE: https://ubuntu.com/security/CVE-2025-37911
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37911-bnxt-en-fix-out-of-bound-memcpy-during-ethtool-w.patch
- From: 5.15.0-144.157
- CVE-2025-37909
- Description:
net: lan743x: Fix memleak issue when GSO enabled
- CVE: https://ubuntu.com/security/CVE-2025-37909
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37909-net-lan743x-fix-memleak-issue-when-gso-enabled.patch
- From: 5.15.0-144.157
- CVE-2025-37909
- Description:
net: lan743x: Fix memleak issue when GSO enabled
- CVE: https://ubuntu.com/security/CVE-2025-37909
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37909-net-lan743x-fix-memleak-issue-when-gso-enabled-kpatch.patch
- From: 5.15.0-144.157
- CVE-2024-38541
- Description:
of: module: add buffer overflow check in of_modalias()
- CVE: https://ubuntu.com/security/CVE-2024-38541
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-38541-of-module-add-buffer-overflow-check-in-of-modalias.patch
- From: 5.15.0-144.157
- CVE-2025-37905
- Description:
firmware: arm_scmi: Balance device refcount when destroying devices
- CVE: https://ubuntu.com/security/CVE-2025-37905
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37905-firmware-arm-scmi-balance-device-refcount-when-destroying-devices.patch
- From: 5.15.0-144.157
- CVE-2022-21546
- Description:
scsi: target: Fix WRITE_SAME No Data Buffer crash
- CVE: https://ubuntu.com/security/CVE-2022-21546
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-21546-scsi-target-fix-write-same-no-data-buffer-crash.patch
- From: 5.15.0-144.157
- CVE-2025-37998
- Description:
openvswitch: Fix unsafe attribute parsing in output_userspace()
- CVE: https://ubuntu.com/security/CVE-2025-37998
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37998-openvswitch-fix-unsafe-attribute-parsing-in-output-userspace.patch
- From: 5.15.0-144.157
- CVE-2025-37964
- Description:
x86/mm: Eliminate window where TLB flushes may be inadvertently skipped
- CVE: https://ubuntu.com/security/CVE-2025-37964
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37964-x86-mm-eliminate-window-where-tlb-flushes-may-be-inadvertently-skipped.patch
- From: 5.15.0-144.157
- CVE-2025-37970
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo
- CVE: https://ubuntu.com/security/CVE-2025-37970
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37970-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-fifo.patch
- From: 5.15.0-144.157
- CVE-2025-37969
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo
- CVE: https://ubuntu.com/security/CVE-2025-37969
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37969-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-tagged-fifo.patch
- From: 5.15.0-144.157
- CVE-2025-37949
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2025-37949.patch
- From:
- CVE-2025-37995
- Description:
module: ensure that kobject_put() is safe for module type kobjects
- CVE: https://ubuntu.com/security/CVE-2025-37995
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37995-module-ensure-that-kobject-put-is-safe-for-module-type-kobjects.patch
- From: 5.15.0-144.157
- CVE-2025-37994
- Description:
usb: typec: ucsi: displayport: Fix NULL pointer access
- CVE: https://ubuntu.com/security/CVE-2025-37994
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37994-usb-typec-ucsi-displayport-fix-null-pointer-access.patch
- From: 5.15.0-144.157
- CVE-2025-38024
- Description:
RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug
- CVE: https://ubuntu.com/security/CVE-2025-38024
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38024-rdma-rxe-fix-slab-use-after-free-read-in-rxe-queue-cleanup-bug.patch
- From: 5.15.0-144.157
- CVE-2025-38023
- Description:
nfs: handle failure of nfs_get_lock_context in unlock path
- CVE: https://ubuntu.com/security/CVE-2025-38023
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38023-nfs-handle-failure-of-nfs-get-lock-context-in-unlock-path.patch
- From: 5.15.0-144.157
- CVE-2025-37992
- Description:
net_sched: Flush gso_skb list too during ->change()
- CVE: https://ubuntu.com/security/CVE-2025-37992
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37992-net-sched-flush-gso-skb-list-too-during-change.patch
- From: 5.15.0-144.157
- CVE-2025-38094
- Description:
net: cadence: macb: Fix a possible deadlock in macb_halt_tx.
- CVE: https://ubuntu.com/security/CVE-2025-38094
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38094-net-cadence-macb-fix-a-possible-deadlock-in-macb-halt-tx.patch
- From: 5.15.0-144.157
- CVE-2025-38009
- Description:
wifi: mt76: disable napi on driver removal
- CVE: https://ubuntu.com/security/CVE-2025-38009
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38009-wifi-mt76-disable-napi-on-driver-removal.patch
- From: 5.15.0-144.157
- CVE-2025-38005
- Description:
dmaengine: ti: k3-udma: Add missing locking
- CVE: https://ubuntu.com/security/CVE-2025-38005
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38005-dmaengine-ti-k3-udma-add-missing-locking.patch
- From: 5.15.0-144.157
- CVE-2025-37967
- Description:
usb: typec: ucsi: displayport: Fix deadlock
- CVE: https://ubuntu.com/security/CVE-2025-37967
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37967-usb-typec-ucsi-displayport-fix-deadlock.patch
- From: 5.15.0-144.157
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://ubuntu.com/security/CVE-2024-53203
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-53203-usb-typec-fix-potential-array-underflow-in-ucsi-ccg-sync-control.patch
- From: 5.15.0-144.157
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://ubuntu.com/security/CVE-2024-53203
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-53203-usb-typec-fix-pm-usage-counter-imbalance-in-ucsi_ccg_sync_control.patch
- From: 5.15.0-144.157
- CVE-2024-46751
- Description:
btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info()
- CVE: https://ubuntu.com/security/CVE-2024-46751
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-46751-btrfs-don-t-bug-on-when-0-reference-count-at-btrfs-lookup-extent-info.patch
- From: 5.15.0-144.157
- CVE-2022-49168
- Description:
btrfs: do not clean up repair bio if submit fails
- CVE: https://ubuntu.com/security/CVE-2022-49168
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-49168-btrfs-do-not-clean-up-repair-bio-if-submit-fails.patch
- From: 5.15.0-144.157
- CVE-2022-49063
- Description:
ice: arfs: fix use-after-free when freeing @rx_cpu_rmap
- CVE: https://ubuntu.com/security/CVE-2022-49063
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-49063-ice-arfs-fix-use-after-free-when-freeing-rx-cpu-rmap.patch
- From: 5.15.0-144.157
- CVE-2024-50073
- Description:
tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
- CVE: https://ubuntu.com/security/CVE-2024-50073
- Patch: ubuntu-jammy/5.15.0-151.161/CVE-2024-50073-tty-n-gsm-fix-use-after-free-in-gsm-cleanup-mux.patch
- From: 5.15.0-151.161
- CVE-2025-38083
- Description:
net_sched: prio: fix a race in prio_tune()
- CVE: https://ubuntu.com/security/CVE-2025-38083
- Patch: ubuntu-jammy/5.15.0-151.161/CVE-2025-38083-net-sched-prio-fix-a-race-in-prio-tune.patch
- From: 5.15.0-151.161
- CVE-2025-38075
- Description:
scsi: target: iscsi: Fix timeout on deleted connection
- CVE: https://ubuntu.com/security/CVE-2025-38075
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38075-scsi-target-iscsi-fix-timeout-on-deleted-connection.patch
- From: 5.15.0-152.162
- CVE-2025-38048
- Description:
virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN
- CVE: https://ubuntu.com/security/CVE-2025-38048
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38048-virtio-ring-fix-data-race-by-tagging-event-triggered-as-racy-for-kcsan.patch
- From: 5.15.0-152.162
- CVE-2025-38072
- Description:
libnvdimm/labels: Fix divide error in nd_label_data_init()
- CVE: https://ubuntu.com/security/CVE-2025-38072
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38072-libnvdimm-labels-fix-divide-error-in-nd-label-data-init.patch
- From: 5.15.0-152.162
- CVE-2025-38066
- Description:
dm cache: prevent BUG_ON by blocking retries on failed device resumes
- CVE: https://ubuntu.com/security/CVE-2025-38066
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38066-dm-cache-prevent-bug-on-by-blocking-retries-on-failed-device-resumes.patch
- From: 5.15.0-152.162
- CVE-2025-38065
- Description:
orangefs: Do not truncate file size
- CVE: https://ubuntu.com/security/CVE-2025-38065
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38065-orangefs-do-not-truncate-file-size.patch
- From: 5.15.0-152.162
- CVE-2025-38044
- Description:
media: cx231xx: set device_caps for 417
- CVE: https://ubuntu.com/security/CVE-2025-38044
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38044-media-cx231xx-set-device-caps-for-417.patch
- From: 5.15.0-152.162
- CVE-2025-38043
- Description:
firmware: arm_ffa: Set dma_mask for ffa devices
- CVE: https://ubuntu.com/security/CVE-2025-38043
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38043-firmware-arm-ffa-set-dma-mask-for-ffa-devices.patch
- From: 5.15.0-152.162
- CVE-2025-38043
- Description:
firmware: arm_ffa: Set dma_mask for ffa devices
- CVE: https://ubuntu.com/security/CVE-2025-38043
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38043-firmware-arm-ffa-set-dma-mask-for-ffa-devices-kpatch.patch
- From: 5.15.0-152.162
- CVE-2025-38061
- Description:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
- CVE: https://ubuntu.com/security/CVE-2025-38061
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38061-net-pktgen-fix-access-outside-of-user-given-buffer-in-pktgen-thread-write.patch
- From: 5.15.0-152.162
- CVE-2025-38037
- Description:
vxlan: Annotate FDB data races
- CVE: https://ubuntu.com/security/CVE-2025-38037
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38037-vxlan-annotate-fdb-data-races.patch
- From: 5.15.0-152.162
- CVE-2025-38035
- Description:
nvmet-tcp: don't restore null sk_state_change
- CVE: https://ubuntu.com/security/CVE-2025-38035
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38035-nvmet-tcp-don-t-restore-null-sk-state-change.patch
- From: 5.15.0-152.162
- CVE-2025-38058
- Description:
__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock
- CVE: https://ubuntu.com/security/CVE-2025-38058
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38058-legitimize-mnt-check-for-mnt-sync-umount-should-be-under-mount-lock-143.patch
- From: 5.15.0-152.162
- CVE-2025-38052
- Description:
Complex adaptation required. Low impact CVE
- CVE:
- Patch: skipped/CVE-2025-38052.patch
- From:
- CVE-2025-38079
- Description:
crypto: algif_hash - fix double free in hash_accept
- CVE: https://ubuntu.com/security/CVE-2025-38079
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38079-crypto-algif-hash-fix-double-free-in-hash-accept.patch
- From: 5.15.0-152.162
- CVE-2025-38031
- Description:
padata: do not leak refcount in reorder_work
- CVE: https://ubuntu.com/security/CVE-2025-38031
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38031-padata-do-not-leak-refcount-in-reorder-work.patch
- From: 5.15.0-152.162
- CVE-2025-38004
- Description:
can: bcm: add locking for bcm_op runtime updates
- CVE: https://ubuntu.com/security/CVE-2025-38004
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38004-can-bcm-add-locking-for-bcm-op-runtime-updates.patch
- From: 5.15.0-152.162
- CVE-2025-38004
- Description:
can: bcm: add locking for bcm_op runtime updates
- CVE: https://ubuntu.com/security/CVE-2025-38004
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38004-can-bcm-add-locking-for-bcm-op-runtime-updates-kpatch.patch
- From: 5.15.0-152.162
- CVE-2025-38003
- Description:
can: bcm: add missing rcu read protection for procfs content
- CVE: https://ubuntu.com/security/CVE-2025-38003
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38003-can-bcm-add-missing-rcu-read-protection-for-procfs-content.patch
- From: 5.15.0-152.162
- CVE-2025-38078
- Description:
ALSA: pcm: Fix race of buffer access at PCM OSS layer
- CVE: https://ubuntu.com/security/CVE-2025-38078
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38078-alsa-pcm-fix-race-of-buffer-access-at-pcm-oss-layer.patch
- From: 5.15.0-152.162
- CVE-2025-38077
- Description:
platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()
- CVE: https://ubuntu.com/security/CVE-2025-38077
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38077-platform-x86-dell-wmi-sysman-avoid-buffer-overflow-in-current-password-store.patch
- From: 5.15.0-152.162
- CVE-2025-38051
- Description:
smb: client: Fix use-after-free in cifs_fill_dirent
- CVE: https://ubuntu.com/security/CVE-2025-38051
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38051-smb-client-fix-use-after-free-in-cifs-fill-dirent.patch
- From: 5.15.0-152.162
- CVE-2024-27407
- Description:
fs/ntfs3: Fixed overflow check in mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-27407
- Patch: ubuntu-jammy/5.15.0-153.163/CVE-2024-27407-fs-ntfs3-fixed-overflow-check-in-mi-enum-attr.patch
- From: 5.15.0-153.163
- CVE-2025-38350
- Description:
net/sched: Always pass notifications when child class becomes empty
- CVE: https://ubuntu.com/security/CVE-2025-38350
- Patch: ubuntu-jammy/5.15.0-153.163/CVE-2025-38350-net-sched-always-pass-notifications-when-child-class-becomes-empty.patch
- From: 5.15.0-153.163
- CVE-2025-38174
- Description:
thunderbolt: Do not double dequeue a configuration request
- CVE: https://ubuntu.com/security/CVE-2025-38174
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38174-thunderbolt-do-not-double-dequeue-a-configuration-request.patch
- From: 5.15.0-156.166
- CVE-2025-38173
- Description:
crypto: marvell/cesa - Handle zero-length skcipher requests
- CVE: https://ubuntu.com/security/CVE-2025-38173
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38173-crypto-marvell-cesa-handle-zero-length-skcipher-requests.patch
- From: 5.15.0-156.166
- CVE-2025-38298
- Description:
EDAC/skx_common: Fix general protection fault
- CVE: https://ubuntu.com/security/CVE-2025-38298
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38298-edac-skx-common-fix-general-protection-fault.patch
- From: 5.15.0-156.166
- CVE-2025-38319
- Description:
drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table
- CVE: https://ubuntu.com/security/CVE-2025-38319
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38319-drm-amd-pp-fix-potential-null-pointer-dereference-in-atomctrl-initialize-mc-reg-table.patch
- From: 5.15.0-156.166
- CVE-2025-38167
- Description:
fs/ntfs3: handle hdr_first_de() return value
- CVE: https://ubuntu.com/security/CVE-2025-38167
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38167-fs-ntfs3-handle-hdr-first-de-return-value.patch
- From: 5.15.0-156.166
- CVE-2025-38293
- Description:
wifi: ath11k: fix node corruption in ar->arvifs list
- CVE: https://ubuntu.com/security/CVE-2025-38293
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38293-wifi-ath11k-fix-node-corruption-in-ar-arvifs-list.patch
- From: 5.15.0-156.166
- CVE-2025-38163
- Description:
f2fs: fix to do sanity check on sbi->total_valid_block_count
- CVE: https://ubuntu.com/security/CVE-2025-38163
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38163-f2fs-fix-to-do-sanity-check-on-sbi-total-valid-block-count.patch
- From: 5.15.0-156.166
- CVE-2025-38160
- Description:
clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()
- CVE: https://ubuntu.com/security/CVE-2025-38160
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38160-clk-bcm-rpi-add-null-check-in-raspberrypi-clk-register.patch
- From: 5.15.0-156.166
- CVE-2025-38285
- Description:
bpf: Fix WARN() in get_bpf_raw_tp_regs
- CVE: https://ubuntu.com/security/CVE-2025-38285
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38285-bpf-fix-warn-in-get-bpf-raw-tp-regs.patch
- From: 5.15.0-156.166
- CVE-2025-38159
- Description:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38159
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38159-wifi-rtw88-fix-the-para-buffer-size-to-avoid-reading-out-of-bounds.patch
- From: 5.15.0-156.166
- CVE-2025-38157
- Description:
wifi: ath9k_htc: Abort software beacon handling if disabled
- CVE: https://ubuntu.com/security/CVE-2025-38157
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38157-wifi-ath9k-htc-abort-software-beacon-handling-if-disabled.patch
- From: 5.15.0-156.166
- CVE-2025-38154
- Description:
bpf, sockmap: Avoid using sk_socket after free when sending
- CVE: https://ubuntu.com/security/CVE-2025-38154
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38154-bpf-sockmap-avoid-using-sk-socket-after-free-when-sending.patch
- From: 5.15.0-156.166
- CVE-2025-38153
- Description:
net: usb: aqc111: fix error handling of usbnet read calls
- CVE: https://ubuntu.com/security/CVE-2025-38153
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38153-net-usb-aqc111-fix-error-handling-of-usbnet-read-calls.patch
- From: 5.15.0-156.166
- CVE-2025-38280
- Description:
bpf: Avoid __bpf_prog_ret0_warn when jit fails
- CVE: https://ubuntu.com/security/CVE-2025-38280
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38280-bpf-avoid-bpf-prog-ret0-warn-when-jit-fails.patch
- From: 5.15.0-156.166
- CVE-2025-38147
- Description:
calipso: Don't call calipso functions for AF_INET sk.
- CVE: https://ubuntu.com/security/CVE-2025-38147
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38147-calipso-don-t-call-calipso-functions-for-af-inet-sk.patch
- From: 5.15.0-156.166
- CVE-2025-38147
- Description:
calipso: unlock rcu before returning -EAFNOSUPPORT
- CVE: https://ubuntu.com/security/CVE-2025-38147
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38147-calipso-unlock-rcu-before-returning-EAFNOSUPPORT.patch
- From: 5.15.0-156.166
- CVE-2025-38146
- Description:
net: openvswitch: Fix the dead loop of MPLS parse
- CVE: https://ubuntu.com/security/CVE-2025-38146
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38146-net-openvswitch-fix-the-dead-loop-of-mpls-parse.patch
- From: 5.15.0-156.166
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://ubuntu.com/security/CVE-2025-38415
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38415-squashfs-check-return-result-of-sb-min-blocksize.patch
- From: 5.15.0-156.166
- CVE-2025-38415
- Description:
Squashfs: check return result of sb_min_blocksize
- CVE: https://ubuntu.com/security/CVE-2025-38415
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38415-squashfs-check-return-result-of-sb-min-blocksize-kpatch.patch
- From: 5.15.0-156.166
- CVE-2025-38415
- Description:
squashfs: fix memory leak in squashfs_fill_super
- CVE: https://ubuntu.com/security/CVE-2025-38415
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38415-squashfs-fix-memory-leak-in-squashfs_fill_super.patch
- From: 5.15.0-156.166
- CVE-2025-38313
- Description:
bus: fsl-mc: fix double-free on mc_dev
- CVE: https://ubuntu.com/security/CVE-2025-38313
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38313-bus-fsl-mc-fix-double-free-on-mc-dev.patch
- From: 5.15.0-156.166
- CVE-2025-38145
- Description:
soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop()
- CVE: https://ubuntu.com/security/CVE-2025-38145
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38145-soc-aspeed-add-null-check-in-aspeed-lpc-enable-snoop.patch
- From: 5.15.0-156.166
- CVE-2025-38312
- Description:
fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()
- CVE: https://ubuntu.com/security/CVE-2025-38312
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38312-fbdev-core-fbcvt-avoid-division-by-0-in-fb-cvt-hperiod.patch
- From: 5.15.0-156.166
- CVE-2025-38143
- Description:
backlight: pm8941: Add NULL check in wled_configure()
- CVE: https://ubuntu.com/security/CVE-2025-38143
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38143-backlight-pm8941-add-null-check-in-wled-configure.patch
- From: 5.15.0-156.166
- CVE-2025-38138
- Description:
dmaengine: ti: Add NULL check in udma_probe()
- CVE: https://ubuntu.com/security/CVE-2025-38138
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38138-dmaengine-ti-add-null-check-in-udma-probe.patch
- From: 5.15.0-156.166
- CVE-2025-38122
- Description:
gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO
- CVE: https://ubuntu.com/security/CVE-2025-38122
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38122-gve-add-missing-null-check-for-gve-alloc-pending-packet-in-tx-dqo.patch
- From: 5.15.0-156.166
- CVE-2025-38120
- Description:
netfilter: nf_set_pipapo_avx2: fix initial map fill
- CVE: https://ubuntu.com/security/CVE-2025-38120
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38120-netfilter-nf-set-pipapo-avx2-fix-initial-map-fill.patch
- From: 5.15.0-156.166
- CVE-2025-38310
- Description:
[PATCH] seg6: Fix validation of nexthop addresses
- CVE: https://ubuntu.com/security/CVE-2025-38310
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38310-seg6-Fix-validation-of-nexthop-addresses.patch
- From: 5.15.0-156.166
- CVE-2025-38310
- Description:
[PATCH] seg6: Fix validation of nexthop addresses
- CVE: https://ubuntu.com/security/CVE-2025-38310
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38310-seg6-Fix-validation-of-nexthop-addresses-kpatch.patch
- From: 5.15.0-156.166
- CVE-2025-38498
- Description:
do_change_type(): refuse to operate on unmounted/not ours mounts
- CVE: https://ubuntu.com/security/CVE-2025-38498
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38498-do-change-type-refuse-to-operate-on-unmounted-not-ours-mounts.patch
- From: 5.15.0-156.166
- CVE-2025-38498
- Description:
use uniform permission checks for all mount propagation changes
- CVE: https://ubuntu.com/security/CVE-2025-38498
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38498-use-uniform-permission-checks-for-all-mount-propagation-changes.patch
- From: 5.15.0-156.166
- CVE-2025-38119
- Description:
scsi: core: ufs: Fix a hang in the error handler
- CVE: https://ubuntu.com/security/CVE-2025-38119
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38119-scsi-core-ufs-fix-a-hang-in-the-error-handler.patch
- From: 5.15.0-156.166
- CVE-2025-38305
- Description:
ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use()
- CVE: https://ubuntu.com/security/CVE-2025-38305
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38305-ptp-remove-ptp-n-vclocks-check-logic-in-ptp-vclock-in-use.patch
- From: 5.15.0-156.166
- CVE-2025-38305
- Description:
ptp: fix breakage after ptp_vclock_in_use() rework
- CVE: https://ubuntu.com/security/CVE-2025-38305
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38305-ptp-fix-breakage-after-ptp_vclock_in_use-rework.patch
- From: 5.15.0-156.166
- CVE-2025-38115
- Description:
net_sched: sch_sfq: fix a potential crash on gso_skb handling
- CVE: https://ubuntu.com/security/CVE-2025-38115
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38115-net-sched-sch-sfq-fix-a-potential-crash-on-gso-skb-handling.patch
- From: 5.15.0-156.166
- CVE-2025-38088
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-38088.patch
- From:
- CVE-2025-38112
- Description:
net: Fix TOCTOU issue in sk_is_readable()
- CVE: https://ubuntu.com/security/CVE-2025-38112
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38112-net-fix-toctou-issue-in-sk-is-readable.patch
- From: 5.15.0-156.166
- CVE-2025-38111
- Description:
net/mdiobus: Fix potential out-of-bounds read/write access
- CVE: https://ubuntu.com/security/CVE-2025-38111
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38111-net-mdiobus-fix-potential-out-of-bounds-read-write-access.patch
- From: 5.15.0-156.166
- CVE-2025-38108
- Description:
net_sched: red: fix a race in __red_change()
- CVE: https://ubuntu.com/security/CVE-2025-38108
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38108-net-sched-red-fix-a-race-in-red-change.patch
- From: 5.15.0-156.166
- CVE-2025-38107
- Description:
net_sched: ets: fix a race in ets_qdisc_change()
- CVE: https://ubuntu.com/security/CVE-2025-38107
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38107-net-sched-ets-fix-a-race-in-ets-qdisc-change.patch
- From: 5.15.0-156.166
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://ubuntu.com/security/CVE-2025-38352
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle-posix-cpu-timers-and-posix-cpu-timer-del.patch
- From: 5.15.0-156.166
- CVE-2025-38102
- Description:
VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify
- CVE: https://ubuntu.com/security/CVE-2025-38102
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38102-vmci-fix-race-between-vmci-host-setup-notify-and-vmci-ctx-unset-notify.patch
- From: 5.15.0-156.166
- CVE-2025-38100
- Description:
x86/iopl: Cure TIF_IO_BITMAP inconsistencies
- CVE: https://ubuntu.com/security/CVE-2025-38100
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38100-x86-iopl-cure-tif-io-bitmap-inconsistencies.patch
- From: 5.15.0-156.166
- CVE-2025-38430
- Description:
nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request
- CVE: https://ubuntu.com/security/CVE-2025-38430
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38430-nfsd-nfsd4-spo-must-allow-must-check-this-is-a-v4-compound-request.patch
- From: 5.15.0-156.166
- CVE-2025-38231
- Description:
nfsd: Initialize ssc before laundromat_work to prevent NULL dereference
- CVE: https://ubuntu.com/security/CVE-2025-38231
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38231-nfsd-initialize-ssc-before-laundromat-work-to-prevent-null-dereference.patch
- From: 5.15.0-156.166
- CVE-2025-38337
- Description:
jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata()
- CVE: https://ubuntu.com/security/CVE-2025-38337
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38337-jbd2-fix-data-race-and-null-ptr-deref-in-jbd2-journal-dirty-metadata.patch
- From: 5.15.0-156.166
- CVE-2025-38229
- Description:
media: cxusb: no longer judge rbuf when the write fails
- CVE: https://ubuntu.com/security/CVE-2025-38229
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38229-media-cxusb-no-longer-judge-rbuf-when-the-write-fails.patch
- From: 5.15.0-156.166
- CVE-2025-38227
- Description:
media: vidtv: Terminating the subsequent process of initialization failure
- CVE: https://ubuntu.com/security/CVE-2025-38227
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38227-media-vidtv-terminating-the-subsequent-process-of-initialization-failure.patch
- From: 5.15.0-156.166
- CVE-2025-38226
- Description:
media: vivid: Change the siize of the composing
- CVE: https://ubuntu.com/security/CVE-2025-38226
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38226-media-vivid-change-the-siize-of-the-composing.patch
- From: 5.15.0-156.166
- CVE-2025-38336
- Description:
ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330
- CVE: https://ubuntu.com/security/CVE-2025-38336
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38336-ata-pata-via-force-pio-for-atapi-devices-on-vt6415-vt6330.patch
- From: 5.15.0-156.166
- CVE-2025-38222
- Description:
ext4: inline: fix len overflow in ext4_prepare_inline_data
- CVE: https://ubuntu.com/security/CVE-2025-38222
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38222-ext4-inline-fix-len-overflow-in-ext4-prepare-inline-data.patch
- From: 5.15.0-156.166
- CVE-2025-38428
- Description:
Input: ims-pcu - check record size in ims_pcu_flash_firmware()
- CVE: https://ubuntu.com/security/CVE-2025-38428
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38428-input-ims-pcu-check-record-size-in-ims-pcu-flash-firmware.patch
- From: 5.15.0-156.166
- CVE-2025-38219
- Description:
f2fs: prevent kernel warning due to negative i_nlink from corrupted image
- CVE: https://ubuntu.com/security/CVE-2025-38219
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38219-f2fs-prevent-kernel-warning-due-to-negative-i-nlink-from-corrupted-image.patch
- From: 5.15.0-156.166
- CVE-2025-38218
- Description:
f2fs: fix to do sanity check on sit_bitmap_size
- CVE: https://ubuntu.com/security/CVE-2025-38218
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38218-f2fs-fix-to-do-sanity-check-on-sit-bitmap-size.patch
- From: 5.15.0-156.166
- CVE-2025-38416
- Description:
NFC: nci: uart: Set tty->disc_data only in success path
- CVE: https://ubuntu.com/security/CVE-2025-38416
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38416-nfc-nci-uart-set-tty-disc-data-only-in-success-path.patch
- From: 5.15.0-156.166
- CVE-2025-38212
- Description:
ipc: fix to protect IPCS lookups using RCU
- CVE: https://ubuntu.com/security/CVE-2025-38212
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38212-ipc-fix-to-protect-ipcs-lookups-using-rcu.patch
- From: 5.15.0-156.166
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
- CVE: https://ubuntu.com/security/CVE-2025-38211
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38211-rdma-iwcm-fix-use-after-free-of-work-objects-after-cm-id-destruction.patch
- From: 5.15.0-156.166
- CVE-2025-38346
- Description:
ftrace: Fix UAF when lookup kallsym after ftrace disabled
- CVE: https://ubuntu.com/security/CVE-2025-38346
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38346-ftrace-fix-uaf-when-lookup-kallsym-after-ftrace-disabled.patch
- From: 5.15.0-156.166
- CVE-2025-38086
- Description:
net: ch9200: fix uninitialised access during mii_nway_restart
- CVE: https://ubuntu.com/security/CVE-2025-38086
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38086-net-ch9200-fix-uninitialised-access-during-mii-nway-restart.patch
- From: 5.15.0-156.166
- CVE-2025-38419
- Description:
remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()
- CVE: https://ubuntu.com/security/CVE-2025-38419
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38419-remoteproc-core-cleanup-acquired-resources-when-rproc-handle-resources-fails-in-rproc-attach.patch
- From: 5.15.0-156.166
- CVE-2025-38418
- Description:
remoteproc: core: Release rproc->clean_table after rproc_attach() fails
- CVE: https://ubuntu.com/security/CVE-2025-38418
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38418-remoteproc-core-release-rproc-clean-table-after-rproc-attach-fails.patch
- From: 5.15.0-156.166
- CVE-2025-38345
- Description:
Kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2025-38345.patch
- From:
- CVE-2025-38344
- Description:
ACPICA: fix acpi parse and parseext cache leaks
- CVE: https://ubuntu.com/security/CVE-2025-38344
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38344-acpica-fix-acpi-parse-and-parseext-cache-leaks.patch
- From: 5.15.0-156.166
- CVE-2025-38206
- Description:
exfat: fix double free in delayed_free
- CVE: https://ubuntu.com/security/CVE-2025-38206
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38206-exfat-fix-double-free-in-delayed-free.patch
- From: 5.15.0-156.166
- CVE-2025-38204
- Description:
jfs: fix array-index-out-of-bounds read in add_missing_indices
- CVE: https://ubuntu.com/security/CVE-2025-38204
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38204-jfs-fix-array-index-out-of-bounds-read-in-add-missing-indices.patch
- From: 5.15.0-156.166
- CVE-2025-38203
- Description:
jfs: Fix null-ptr-deref in jfs_ioc_trim
- CVE: https://ubuntu.com/security/CVE-2025-38203
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38203-jfs-Fix-null-ptr-deref-in-jfs_ioc_trim.patch
- From: 5.15.0-156.166
- CVE-2025-38237
- Description:
media: platform: exynos4-is: Add hardware sync wait to fimc_is_hw_change_mode()
- CVE: https://ubuntu.com/security/CVE-2025-38237
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38237-media-platform-exynos4-is-Add-hardware-sync-wait-to-fimc_is_hw_change_mode.patch
- From: 5.15.0-156.166
- CVE-2025-38342
- Description:
software node: Correct a OOB check in software_node_get_reference_args()
- CVE: https://ubuntu.com/security/CVE-2025-38342
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38342-software-node-correct-a-oob-check-in-software-node-get-reference-args.patch
- From: 5.15.0-156.166
- CVE-2025-38332
- Description:
scsi: lpfc: Use memcpy() for BIOS version
- CVE: https://ubuntu.com/security/CVE-2025-38332
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38332-scsi-lpfc-use-memcpy-for-bios-version.patch
- From: 5.15.0-156.166
- CVE-2025-38200
- Description:
i40e: fix MMIO write access to an invalid page in i40e_clear_hw
- CVE: https://ubuntu.com/security/CVE-2025-38200
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38200-i40e-fix-mmio-write-access-to-an-invalid-page-in-i40e-clear-hw.patch
- From: 5.15.0-156.166
- CVE-2025-38197
- Description:
platform/x86: dell_rbu: Fix list usage
- CVE: https://ubuntu.com/security/CVE-2025-38197
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38197-platform-x86-dell-rbu-fix-list-usage.patch
- From: 5.15.0-156.166
- CVE-2025-38090
- Description:
drivers/rapidio/rio_cm.c: prevent possible heap overwrite
- CVE: https://ubuntu.com/security/CVE-2025-38090
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38090-drivers-rapidio-rio-cm-c-prevent-possible-heap-overwrite.patch
- From: 5.15.0-156.166
- CVE-2025-38194
- Description:
jffs2: check that raw node were preallocated before writing summary
- CVE: https://ubuntu.com/security/CVE-2025-38194
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38194-jffs2-check-that-raw-node-were-preallocated-before-writing-summary.patch
- From: 5.15.0-156.166
- CVE-2025-38328
- Description:
jffs2: check jffs2_prealloc_raw_node_refs() result in few other places
- CVE: https://ubuntu.com/security/CVE-2025-38328
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38328-jffs2-check-jffs2-prealloc-raw-node-refs-result-in-few-other-places.patch
- From: 5.15.0-156.166
- CVE-2025-38084
- Description:
mm/hugetlb: unshare page tables during VMA split, not before
- CVE: https://ubuntu.com/security/CVE-2025-38084
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38084-mm-hugetlb-unshare-page-tables-during-vma-split-not-before.patch
- From: 5.15.0-156.166
- CVE-2024-57883
- Description:
Complex adaptation required
- CVE:
- Patch: skipped/CVE-2024-57883.patch
- From:
- CVE-2025-38085
- Description:
Complex adaptation required. High risk of regression.
- CVE:
- Patch: skipped/CVE-2025-38085.patch
- From:
- CVE-2025-38326
- Description:
aoe: clean device rq_list in aoedev_downdev()
- CVE: https://ubuntu.com/security/CVE-2025-38326
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38326-aoe-clean-device-rq_list-in-aoedev_downdev.patch
- From: 5.15.0-156.166
- CVE-2025-38420
- Description:
wifi: carl9170: do not ping device which has failed to load firmware
- CVE: https://ubuntu.com/security/CVE-2025-38420
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38420-wifi-carl9170-do-not-ping-device-which-has-failed-to-load-firmware.patch
- From: 5.15.0-156.166
- CVE-2025-38324
- Description:
mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu().
- CVE: https://ubuntu.com/security/CVE-2025-38324
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38324-mpls-use-rcu-dereference-rtnl-in-mpls-route-input-rcu.patch
- From: 5.15.0-156.166
- CVE-2025-38184
- Description:
tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer
- CVE: https://ubuntu.com/security/CVE-2025-38184
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38184-tipc-fix-null-ptr-deref-when-acquiring-remote-ip-of-ethernet-bearer.patch
- From: 5.15.0-156.166
- CVE-2025-38181
- Description:
calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().
- CVE: https://ubuntu.com/security/CVE-2025-38181
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38181-calipso-fix-null-ptr-deref-in-calipso-req-set-del-attr.patch
- From: 5.15.0-156.166
- CVE-2025-37958
- Description:
mm/huge_memory: fix dereferencing invalid pmd migration entry
- CVE: https://ubuntu.com/security/CVE-2025-37958
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-37958-mm-huge-memory-fix-dereferencing-invalid-pmd-migration-entry.patch
- From: 5.15.0-156.166
- CVE-2025-38424
- Description:
perf: Fix sample vs do_exit()
- CVE: https://ubuntu.com/security/CVE-2025-38424
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38424-perf-fix-sample-vs-do-exit.patch
- From: 5.15.0-156.166
- CVE-2025-38320
- Description:
arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth()
- CVE: https://ubuntu.com/security/CVE-2025-38320
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38320-arm64-ptrace-fix-stack-out-of-bounds-read-in-regs-get-kernel-stack-nth.patch
- From: 5.15.0-156.166
- CVE-2025-38263
- Description:
bcache: fix NULL pointer in cache_set_flush()
- CVE: https://ubuntu.com/security/CVE-2025-38263
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38263-bcache-fix-NULL-pointer-in-cache_set_flush.patch
- From: 5.15.0-156.166
- CVE-2025-38257
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-38257.patch
- From:
- CVE-2025-38251
- Description:
atm: clip: prevent NULL deref in clip_push()
- CVE: https://ubuntu.com/security/CVE-2025-38251
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38251-atm-clip-prevent-null-deref-in-clip-push.patch
- From: 5.15.0-156.166
- CVE-2025-38249
- Description:
ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()
- CVE: https://ubuntu.com/security/CVE-2025-38249
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38249-ALSA-usb-audio-Fix-out-of-bounds-read-in-snd_usb_get_audioformat_uac3.patch
- From: 5.15.0-156.166
- CVE-2025-38245
- Description:
atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().
- CVE: https://ubuntu.com/security/CVE-2025-38245
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38245-atm-Release-atm_dev_mutex-after-removing-procfs-in-atm_dev_deregister.patch
- From: 5.15.0-156.166
- CVE-2025-38363
- Description:
drm/tegra: Fix a possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-38363
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38363-drm-tegra-fix-a-possible-null-pointer-dereference.patch
- From: 5.15.0-156.166
- CVE-2025-38362
- Description:
drm/amd/display: Add null pointer check for get_first_active_display()
- CVE: https://ubuntu.com/security/CVE-2025-38362
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38362-drm-amd-display-add-null-pointer-check-for-get-first-active-display.patch
- From: 5.15.0-156.166
- CVE-2025-38245
- Description:
btrfs: don't drop extent_map for free space inode on write error
- CVE: https://ubuntu.com/security/CVE-2025-38245
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2024-26726-btrfs-don-t-drop-extent_map-for-free-space-inode-on-write-error.patch
- From: 5.15.0-156.166
- CVE-2025-38403
- Description:
vsock/vmci: Clear the vmci transport packet properly when initializing it
- CVE: https://ubuntu.com/security/CVE-2025-38403
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38403-vsock-vmci-clear-the-vmci-transport-packet-properly-when-initializing-it.patch
- From: 5.15.0-156.166
- CVE-2025-38391
- Description:
usb: typec: altmodes/displayport: do not index invalid pin_assignments
- CVE: https://ubuntu.com/security/CVE-2025-38391
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38391-usb-typec-altmodes-displayport-do-not-index-invalid-pin-assignments.patch
- From: 5.15.0-156.166
- CVE-2025-38401
- Description:
mtk-sd: Prevent memory corruption from DMA map failure
- CVE: https://ubuntu.com/security/CVE-2025-38401
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38401-mtk-sd-Prevent-memory-corruption-from-DMA-map-failure.patch
- From: 5.15.0-156.166
- CVE-2025-38401
- Description:
mtk-sd: reset host->mrq on prepare_data() error
- CVE: https://ubuntu.com/security/CVE-2025-38401
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38401-mtk-sd-reset-host-mrq-on-prepare_data-error.patch
- From: 5.15.0-156.166
- CVE-2025-38387
- Description:
RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert
- CVE: https://ubuntu.com/security/CVE-2025-38387
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38387-rdma-mlx5-initialize-obj-event-obj-sub-list-before-xa-insert.patch
- From: 5.15.0-156.166
- CVE-2025-38393
- Description:
NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN
- CVE: https://ubuntu.com/security/CVE-2025-38393
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38393-nfsv4-pnfs-fix-a-race-to-wake-on-nfs-layout-drain.patch
- From: 5.15.0-156.166
- CVE-2025-38412
- Description:
platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks
- CVE: https://ubuntu.com/security/CVE-2025-38412
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38412-platform-x86-dell-wmi-sysman-fix-wmi-data-block-retrieval-in-sysfs-callbacks.patch
- From: 5.15.0-156.166
- CVE-2025-38389
- Description:
drm/i915/gt: Fix timeline left held on VMA alloc error
- CVE: https://ubuntu.com/security/CVE-2025-38389
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38389-drm-i915-gt-fix-timeline-left-held-on-vma-alloc-error.patch
- From: 5.15.0-156.166
- CVE-2025-38377
- Description:
rose: fix dangling neighbour pointers in rose_rt_device_down()
- CVE: https://ubuntu.com/security/CVE-2025-38377
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38377-rose-fix-dangling-neighbour-pointers-in-rose-rt-device-down.patch
- From: 5.15.0-156.166
- CVE-2025-38410
- Description:
drm/msm: Fix a fence leak in submit error path
- CVE: https://ubuntu.com/security/CVE-2025-38410
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38410-drm-msm-fix-a-fence-leak-in-submit-error-path.patch
- From: 5.15.0-156.166
- CVE-2025-38399
- Description:
scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()
- CVE: https://ubuntu.com/security/CVE-2025-38399
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38399-scsi-target-fix-null-pointer-dereference-in-core-scsi3-decode-spec-i-port.patch
- From: 5.15.0-156.166
- CVE-2025-38406
- Description:
wifi: ath6kl: remove WARN on bad firmware input
- CVE: https://ubuntu.com/security/CVE-2025-38406
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38406-wifi-ath6kl-remove-warn-on-bad-firmware-input.patch
- From: 5.15.0-156.166
- CVE-2025-38386
- Description:
ACPICA: Refuse to evaluate a method if arguments are missing
- CVE: https://ubuntu.com/security/CVE-2025-38386
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38386-acpica-refuse-to-evaluate-a-method-if-arguments-are-missing.patch
- From: 5.15.0-156.166
- CVE-2025-38384
- Description:
mtd: spinand: fix memory leak of ECC engine conf
- CVE: https://ubuntu.com/security/CVE-2025-38384
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38384-mtd-spinand-fix-memory-leak-of-ecc-engine-conf.patch
- From: 5.15.0-156.166
- CVE-2025-38467
- Description:
drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling
- CVE: https://ubuntu.com/security/CVE-2025-38467
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38467-drm-exynos-exynos7-drm-decon-add-vblank-check-in-irq-handling.patch
- From: 5.15.0-156.166
- CVE-2025-38466
- Description:
perf: Revert to requiring CAP_SYS_ADMIN for uprobes
- CVE: https://ubuntu.com/security/CVE-2025-38466
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38466-perf-revert-to-requiring-cap-sys-admin-for-uprobes.patch
- From: 5.15.0-156.166
- CVE-2025-38465
- Description:
netlink: Fix wraparounds of sk->sk_rmem_alloc.
- CVE: https://ubuntu.com/security/CVE-2025-38465
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38465-netlink-fix-wraparounds-of-sk-sk-rmem-alloc.patch
- From: 5.15.0-156.166
- CVE-2025-38464
- Description:
tipc: Fix use-after-free in tipc_conn_close().
- CVE: https://ubuntu.com/security/CVE-2025-38464
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38464-tipc-fix-use-after-free-in-tipc-conn-close.patch
- From: 5.15.0-156.166
- CVE-2025-38462
- Description:
vsock: Fix transport_{g2h,h2g} TOCTOU
- CVE: https://ubuntu.com/security/CVE-2025-38462
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38462-vsock-fix-transport-g2h-h2g-toctou.patch
- From: 5.15.0-156.166
- CVE-2025-38461
- Description:
vsock: Fix transport_* TOCTOU
- CVE: https://ubuntu.com/security/CVE-2025-38461
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38461-vsock-fix-transport-toctou.patch
- From: 5.15.0-156.166
- CVE-2025-38460
- Description:
atm: clip: Fix potential null-ptr-deref in to_atmarpd().
- CVE: https://ubuntu.com/security/CVE-2025-38460
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38460-atm-clip-fix-potential-null-ptr-deref-in-to-atmarpd.patch
- From: 5.15.0-156.166
- CVE-2025-38459
- Description:
atm: clip: Fix infinite recursive call of clip_push().
- CVE: https://ubuntu.com/security/CVE-2025-38459
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38459-atm-clip-fix-infinite-recursive-call-of-clip-push.patch
- From: 5.15.0-156.166
- CVE-2025-38458
- Description:
atm: Revert atm_account_tx() if copy_from_iter_full() fails.
- CVE: https://ubuntu.com/security/CVE-2025-38458
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38458-atm-revert-atm_account_tx-if-copy_from_iter_full-fails.patch
- From: 5.15.0-156.166
- CVE-2025-38458
- Description:
atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
- CVE: https://ubuntu.com/security/CVE-2025-38458
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38458-atm-clip-fix-null-pointer-dereference-in-vcc-sendmsg.patch
- From: 5.15.0-156.166
- CVE-2025-38458
- Description:
atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
- CVE: https://ubuntu.com/security/CVE-2025-38458
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38458-atm-clip-fix-null-pointer-dereference-in-vcc-sendmsg-kpatch.patch
- From: 5.15.0-156.166
- CVE-2025-38457
- Description:
net/sched: Abort __tc_modify_qdisc if parent class does not exist
- CVE: https://ubuntu.com/security/CVE-2025-38457
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38457-net-sched-abort-tc-modify-qdisc-if-parent-class-does-not-exist.patch
- From: 5.15.0-156.166
- CVE-2025-38514
- Description:
rxrpc: Fix oops due to non-existence of prealloc backlog struct
- CVE: https://ubuntu.com/security/CVE-2025-38514
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38514-rxrpc-fix-oops-due-to-non-existence-of-prealloc-backlog-struct.patch
- From: 5.15.0-156.166
- CVE-2022-48703
- Description:
thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR
- CVE: https://ubuntu.com/security/CVE-2022-48703
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2022-48703-thermal-int340x-thermal-handle-data-vault-when-the-value-is-zero-size-ptr.patch
- From: 5.15.0-156.166
- CVE-2024-26775
- Description:
aoe: avoid potential deadlock at set_capacity
- CVE: https://ubuntu.com/security/CVE-2024-26775
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2024-26775-aoe-avoid-potential-deadlock-at-set-capacity.patch
- From: 5.15.0-156.166
- CVE-2024-44939
- Description:
jfs: fix null ptr deref in dtInsertEntry
- CVE: https://ubuntu.com/security/CVE-2024-44939
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2024-44939-jfs-fix-null-ptr-deref-in-dtinsertentry.patch
- From: 5.15.0-156.166
- CVE-2025-38515
- Description:
drm/sched: Increment job count before swapping tail spsc queue
- CVE: https://ubuntu.com/security/CVE-2025-38515
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38515-drm-sched-increment-job-count-before-swapping-tail-spsc-queue.patch
- From: 5.15.0-156.166
- CVE-2025-38448
- Description:
usb: gadget: u_serial: Fix race condition in TTY wakeup
- CVE: https://ubuntu.com/security/CVE-2025-38448
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38448-usb-gadget-u-serial-fix-race-condition-in-tty-wakeup.patch
- From: 5.15.0-156.166
- CVE-2025-38375
- Description:
virtio-net: ensure the received length does not exceed allocated size
- CVE: https://ubuntu.com/security/CVE-2025-38375
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38375-virtio-net-ensure-the-received-length-does-not-exceed-allocated-size.patch
- From: 5.15.0-156.166
- CVE-2025-38513
- Description:
wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()
- CVE: https://ubuntu.com/security/CVE-2025-38513
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38513-wifi-zd1211rw-fix-potential-null-pointer-dereference-in-zd-mac-tx-to-dev.patch
- From: 5.15.0-156.166
- CVE-2025-38445
- Description:
md/raid1: Fix stack memory use after return in raid1_reshape
- CVE: https://ubuntu.com/security/CVE-2025-38445
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38445-md-raid1-fix-stack-memory-use-after-return-in-raid1-reshape.patch
- From: 5.15.0-156.166
- CVE-2025-38444
- Description:
raid10: cleanup memleak at raid10_make_request
- CVE: https://ubuntu.com/security/CVE-2025-38444
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38444-raid10-cleanup-memleak-at-raid10-make-request.patch
- From: 5.15.0-156.166
- CVE-2025-38443
- Description:
nbd: fix uaf in nbd_genl_connect() error path
- CVE: https://ubuntu.com/security/CVE-2025-38443
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38443-nbd-fix-uaf-in-nbd-genl-connect-error-path.patch
- From: 5.15.0-156.166
- CVE-2025-38441
- Description:
netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto()
- CVE: https://ubuntu.com/security/CVE-2025-38441
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38441-netfilter-flowtable-account-for-ethernet-header-in-nf-flow-pppoe-proto.patch
- From: 5.15.0-156.166
- CVE-2025-38439
- Description:
bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT
- CVE: https://ubuntu.com/security/CVE-2025-38439
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38439-bnxt-en-set-dma-unmap-len-correctly-for-xdp-redirect.patch
- From: 5.15.0-156.166
- CVE-2025-38074
- Description:
vhost-scsi: protect vq->log_used with vq->mutex
- CVE: https://ubuntu.com/security/CVE-2025-38074
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-38074-vhost-scsi-protect-vq-log-used-with-vq-mutex.patch
- From: 5.15.0-156.166
- CVE-2025-38067
- Description:
postponed
- CVE:
- Patch: skipped/CVE-2025-38067.patch
- From:
- CVE-2025-21888
- Description:
RDMA/mlx5: Fix a WARN during dereg_mr for DM type
- CVE: https://ubuntu.com/security/CVE-2025-21888
- Patch: ubuntu-jammy/5.15.0-156.166/CVE-2025-21888-rdma-mlx5-fix-a-warn-during-dereg-mr-for-dm-type.patch
- From: 5.15.0-156.166
- CVE-2025-38618
- Description:
vsock: Do not allow binding to VMADDR_PORT_ANY
- CVE: https://ubuntu.com/security/CVE-2025-38618
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38618-vsock-do-not-allow-binding-to-vmaddr-port-any.patch
- From: 5.15.0-157.167
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://ubuntu.com/security/CVE-2025-38477
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38477-net-sched-sch-qfq-fix-race-condition-on-qfq-aggregate.patch
- From: 5.15.0-157.167
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class
- CVE: https://ubuntu.com/security/CVE-2025-38477
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38477-net-sched-sch-qfq-avoid-triggering-might-sleep-in-atomic-context-in-qfq-delete-class.patch
- From: 5.15.0-157.167
- CVE-2025-38617
- Description:
net/packet: fix a race in packet_set_ring() and acket_notifier()
- CVE: https://ubuntu.com/security/CVE-2025-38617
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38617-net-packet-fix-a-race-in-packet_set_ring-and-packet_notifier.patch
- From: 5.15.0-157.167
- CVE-2024-26700
- Description:
drm/amd/display: Fix MST Null Ptr for RV
- CVE: https://ubuntu.com/security/CVE-2024-26700
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2024-26700-drm-amd-display-Fix-MST-Null-Ptr-for-RV.patch
- From: 5.15.0-160.170
- CVE-2023-52593
- Description:
wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()
- CVE: https://ubuntu.com/security/CVE-2023-52593
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2023-52593-wifi-wfx-fix-possible-NULL-pointer-dereference-in-wfx_set_mfp_ap.patch
- From: 5.15.0-160.170
- CVE-2023-52593 CVE-2024-26896
- Description:
wifi: wfx: repair open network AP mode
- CVE: https://ubuntu.com/security/CVE-2024-26896
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2023-52593-CVE-2024-26896-wifi-wfx-fix-memory-leak-when-starting-AP.patch
- From: 5.15.0-160.170
- CVE-2023-52593
- Description:
wifi: wfx: repair open network AP mode
- CVE: https://ubuntu.com/security/CVE-2023-52593
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2023-52593-wifi-wfx-repair-open-network-AP-mode.patch
- From: 5.15.0-160.170
- CVE-2024-53068
- Description:
firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier()
- CVE: https://ubuntu.com/security/CVE-2024-53068
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2024-53068-firmware-arm-scmi-fix-slab-use-after-free-in-scmi-bus-notifier.patch
- From: 5.15.0-163.173
- CVE-2025-38678
- Description:
netfilter: nf_tables: reject duplicate device on updates
- CVE: https://ubuntu.com/security/CVE-2025-38678
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38678-netfilter-nf-tables-reject-duplicate-device-on-updates.patch
- From: 5.15.0-163.173
- CVE-2025-38535
- Description:
phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode
- CVE: https://ubuntu.com/security/CVE-2025-38535
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38535-phy-tegra-xusb-fix-unbalanced-regulator-disable-in-utmi-phy-mode.patch
- From: 5.15.0-163.173
- CVE-2025-38497
- Description:
usb: gadget: configfs: Fix OOB read on empty string write
- CVE: https://ubuntu.com/security/CVE-2025-38497
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38497-usb-gadget-configfs-fix-oob-read-on-empty-string-write.patch
- From: 5.15.0-163.173
- CVE-2025-38495
- Description:
HID: core: ensure the allocated report buffer can contain the reserved report ID
- CVE: https://ubuntu.com/security/CVE-2025-38495
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38495-hid-core-ensure-the-allocated-report-buffer-can-contain-the-reserved-report-id.patch
- From: 5.15.0-163.173
- CVE-2025-38494
- Description:
HID: core: do not bypass hid_hw_raw_request
- CVE: https://ubuntu.com/security/CVE-2025-38494
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38494-hid-core-do-not-bypass-hid-hw-raw-request.patch
- From: 5.15.0-163.173
- CVE-2025-38539
- Description:
tracing: Add down_write(trace_event_sem) when adding trace event
- CVE: https://ubuntu.com/security/CVE-2025-38539
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38539-tracing-add-down-write-trace-event-sem-when-adding-trace-event.patch
- From: 5.15.0-163.173
- CVE-2025-38538
- Description:
dmaengine: nbpfaxi: Fix memory corruption in probe()
- CVE: https://ubuntu.com/security/CVE-2025-38538
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38538-dmaengine-nbpfaxi-fix-memory-corruption-in-probe.patch
- From: 5.15.0-163.173
- CVE-2025-38529
- Description:
comedi: aio_iiro_16: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38529
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38529-comedi-aio-iiro-16-fix-bit-shift-out-of-bounds.patch
- From: 5.15.0-163.173
- CVE-2025-38483
- Description:
comedi: das16m1: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38483
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38483-comedi-das16m1-fix-bit-shift-out-of-bounds.patch
- From: 5.15.0-163.173
- CVE-2025-38482
- Description:
comedi: das6402: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38482
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38482-comedi-das6402-fix-bit-shift-out-of-bounds.patch
- From: 5.15.0-163.173
- CVE-2025-38528
- Description:
bpf: Reject %p% format string in bprintf-like helpers
- CVE: https://ubuntu.com/security/CVE-2025-38528
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38528-bpf-reject-p-format-string-in-bprintf-like-helpers.patch
- From: 5.15.0-163.173
- CVE-2025-38527
- Description:
smb: client: fix use-after-free in cifs_oplock_break
- CVE: https://ubuntu.com/security/CVE-2025-38527
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38527-smb-client-fix-use-after-free-in-cifs-oplock-break.patch
- From: 5.15.0-163.173
- CVE-2025-38474
- Description:
usb: net: sierra: check for no status endpoint
- CVE: https://ubuntu.com/security/CVE-2025-38474
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38474-usb-net-sierra-check-for-no-status-endpoint.patch
- From: 5.15.0-163.173
- CVE-2025-38473
- Description:
Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()
- CVE: https://ubuntu.com/security/CVE-2025-38473
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38473-bluetooth-fix-null-ptr-deref-in-l2cap-sock-resume-cb.patch
- From: 5.15.0-163.173
- CVE-2025-38550
- Description:
ipv6: mcast: Delay put pmc->idev in mld_del_delrec()
- CVE: https://ubuntu.com/security/CVE-2025-38550
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38550-ipv6-mcast-delay-put-pmc-idev-in-mld-del-delrec.patch
- From: 5.15.0-163.173
- CVE-2025-38468
- Description:
net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree
- CVE: https://ubuntu.com/security/CVE-2025-38468
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38468-net-sched-return-null-when-htb-lookup-leaf-encounters-an-empty-rbtree.patch
- From: 5.15.0-163.173
- CVE-2025-38499
- Description:
clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns
- CVE: https://ubuntu.com/security/CVE-2025-38499
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38499-clone-private-mnt-make-sure-that-caller-has-cap-sys-admin-in-the-right-userns.patch
- From: 5.15.0-163.173
- CVE-2025-38335
- Description:
PEEMPT_RT config isn't enabled
- CVE:
- Patch: skipped/CVE-2025-38335.patch
- From:
- CVE-2025-38668
- Description:
regulator: core: fix NULL dereference on unbind due to stale coupling data
- CVE: https://ubuntu.com/security/CVE-2025-38668
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38668-regulator-core-fix-null-dereference-on-unbind-due-to-stale-coupling-data.patch
- From: 5.15.0-163.173
- CVE-2025-38671
- Description:
i2c: qup: jump out of the loop in case of timeout
- CVE: https://ubuntu.com/security/CVE-2025-38671
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38671-i2c-qup-jump-out-of-the-loop-in-case-of-timeout.patch
- From: 5.15.0-163.173
- CVE-2025-38663
- Description:
nilfs2: reject invalid file types when reading inodes
- CVE: https://ubuntu.com/security/CVE-2025-38663
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38663-nilfs2-reject-invalid-file-types-when-reading-inodes.patch
- From: 5.15.0-163.173
- CVE-2025-37925
- Description:
jfs: reject on-disk inodes of an unsupported type
- CVE: https://ubuntu.com/security/CVE-2025-37925
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-37925-jfs-reject-on-disk-inodes-of-an-unsupported-type.patch
- From: 5.15.0-163.173
- CVE-2025-38650
- Description:
hfsplus: remove mutex_lock check in hfsplus_free_extents
- CVE: https://ubuntu.com/security/CVE-2025-38650
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38650-hfsplus-remove-mutex-lock-check-in-hfsplus-free-extents.patch
- From: 5.15.0-163.173
- CVE-2025-38612
- Description:
staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc()
- CVE: https://ubuntu.com/security/CVE-2025-38612
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38612-staging-fbtft-fix-potential-memory-leak-in-fbtft-framebuffer-alloc.patch
- From: 5.15.0-163.173
- CVE-2025-38609
- Description:
PM / devfreq: Check governor before using governor->name
- CVE: https://ubuntu.com/security/CVE-2025-38609
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38609-pm-devfreq-check-governor-before-using-governor-name.patch
- From: 5.15.0-163.173
- CVE-2025-38608
- Description:
bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls
- CVE: https://ubuntu.com/security/CVE-2025-38608
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38608-bpf-ktls-fix-data-corruption-when-using-bpf-msg-pop-data-in-ktls.patch
- From: 5.15.0-163.173
- CVE-2025-38604
- Description:
wifi: rtl818x: Kill URBs before clearing tx status queue
- CVE: https://ubuntu.com/security/CVE-2025-38604
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38604-wifi-rtl818x-kill-urbs-before-clearing-tx-status-queue.patch
- From: 5.15.0-163.173
- CVE-2025-38602
- Description:
iwlwifi: Add missing check for alloc_ordered_workqueue
- CVE: https://ubuntu.com/security/CVE-2025-38602
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38602-iwlwifi-add-missing-check-for-alloc-ordered-workqueue.patch
- From: 5.15.0-163.173
- CVE-2025-38601
- Description:
wifi: ath11k: clear initialized flag for deinit-ed srng lists
- CVE: https://ubuntu.com/security/CVE-2025-38601
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38601-wifi-ath11k-clear-initialized-flag-for-deinit-ed-srng-lists.patch
- From: 5.15.0-163.173
- CVE-2025-38645
- Description:
net/mlx5: Check device memory pointer before usage
- CVE: https://ubuntu.com/security/CVE-2025-38645
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38645-net-mlx5-check-device-memory-pointer-before-usage.patch
- From: 5.15.0-163.173
- CVE-2025-38553
- Description:
net/sched: Restrict conditions for adding duplicating netems to qdisc tree
- CVE: https://ubuntu.com/security/CVE-2025-38553
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38553-net-sched-restrict-conditions-for-adding-duplicating-netems-to-qdisc-tree.patch
- From: 5.15.0-163.173
- CVE-2025-38639
- Description:
netfilter: xt_nfacct: don't assume acct name is null-terminated
- CVE: https://ubuntu.com/security/CVE-2025-38639
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38639-netfilter-xt-nfacct-don-t-assume-acct-name-is-null-terminated.patch
- From: 5.15.0-163.173
- CVE-2025-38583
- Description:
clk: xilinx: vcu: unregister pll_post only if registered correctly
- CVE: https://ubuntu.com/security/CVE-2025-38583
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38583-clk-xilinx-vcu-unregister-pll-post-only-if-registered-correctly.patch
- From: 5.15.0-163.173
- CVE-2025-38634
- Description:
power: supply: cpcap-charger: Fix null check for power_supply_get_by_name
- CVE: https://ubuntu.com/security/CVE-2025-38634
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38634-power-supply-cpcap-charger-fix-null-check-for-power-supply-get-by-name.patch
- From: 5.15.0-163.173
- CVE-2025-38581
- Description:
crypto: ccp - Fix crash when rebind ccp device for ccp.ko
- CVE: https://ubuntu.com/security/CVE-2025-38581
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38581-crypto-ccp-fix-crash-when-rebind-ccp-device-for-ccp-ko.patch
- From: 5.15.0-163.173
- CVE-2025-38581
- Description:
crypto: ccp - Fix crash when rebind ccp device for ccp.ko
- CVE: https://ubuntu.com/security/CVE-2025-38581
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38581-crypto-ccp-fix-crash-when-rebind-ccp-device-for-ccp-ko-kpatch.patch
- From: 5.15.0-163.173
- CVE-2025-38630
- Description:
fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref
- CVE: https://ubuntu.com/security/CVE-2025-38630
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38630-fbdev-imxfb-check-fb-add-videomode-to-prevent-null-ptr-deref.patch
- From: 5.15.0-163.173
- CVE-2025-38624
- Description:
Out of scope: powerpc: PowerNV PCI Hotplug: not supported
- CVE:
- Patch: skipped/CVE-2025-38624.patch
- From:
- CVE-2025-38623
- Description:
Out of scope: powerpc: PowerNV PCI Hotplug: not supported
- CVE:
- Patch: skipped/CVE-2025-38623.patch
- From:
- CVE-2025-39730
- Description:
NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
- CVE: https://ubuntu.com/security/CVE-2025-39730
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39730-nfs-fix-filehandle-bounds-checking-in-nfs-fh-to-dentry.patch
- From: 5.15.0-163.173
- CVE-2025-38574
- Description:
pptp: ensure minimal skb length in pptp_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-38574
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38574-pptp-ensure-minimal-skb-length-in-pptp-xmit.patch
- From: 5.15.0-163.173
- CVE-2025-38572
- Description:
ipv6: reject malicious packets in ipv6_gso_segment()
- CVE: https://ubuntu.com/security/CVE-2025-38572
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38572-ipv6-reject-malicious-packets-in-ipv6-gso-segment.patch
- From: 5.15.0-163.173
- CVE-2025-38569
- Description:
benet: fix BUG when creating VFs
- CVE: https://ubuntu.com/security/CVE-2025-38569
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38569-benet-fix-bug-when-creating-vfs.patch
- From: 5.15.0-163.173
- CVE-2025-38555
- Description:
usb: gadget : fix use-after-free in composite_dev_cleanup()
- CVE: https://ubuntu.com/security/CVE-2025-38555
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38555-usb-gadget-fix-use-after-free-in-composite-dev-cleanup.patch
- From: 5.15.0-163.173
- CVE-2025-39757
- Description:
ALSA: usb-audio: Validate UAC3 cluster segment descriptors
- CVE: https://ubuntu.com/security/CVE-2025-39757
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39757-alsa-usb-audio-validate-uac3-cluster-segment-descriptors.patch
- From: 5.15.0-163.173
- CVE-2025-39757
- Description:
ALSA: usb-audio: Fix size validation in convert_chmap_v3()
- CVE: https://ubuntu.com/security/CVE-2025-39757
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39757-ALSA-usb-audio-Fix-size-validation-in-convert_chmap_v3.patch
- From: 5.15.0-163.173
- CVE-2025-38725
- Description:
net: usb: asix_devices: add phy_mask for ax88772 mdio bus
- CVE: https://ubuntu.com/security/CVE-2025-38725
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38725-net-usb-asix-devices-add-phy-mask-for-ax88772-mdio-bus.patch
- From: 5.15.0-163.173
- CVE-2025-38724
- Description:
nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
- CVE: https://ubuntu.com/security/CVE-2025-38724
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38724-nfsd-handle-get-client-locked-failure-in-nfsd4-setclientid-confirm.patch
- From: 5.15.0-163.173
- CVE-2025-39756
- Description:
fs: Prevent file descriptor table allocations exceeding INT_MAX
- CVE: https://ubuntu.com/security/CVE-2025-39756
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39756-fs-prevent-file-descriptor-table-allocations-exceeding-int-max.patch
- From: 5.15.0-163.173
- CVE-2025-38718
- Description:
sctp: linearize cloned gso packets in sctp_rcv
- CVE: https://ubuntu.com/security/CVE-2025-38718
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38718-sctp-linearize-cloned-gso-packets-in-sctp-rcv.patch
- From: 5.15.0-163.173
- CVE-2025-38715
- Description:
hfs: fix slab-out-of-bounds in hfs_bnode_read()
- CVE: https://ubuntu.com/security/CVE-2025-38715
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38715-hfs-fix-slab-out-of-bounds-in-hfs-bnode-read.patch
- From: 5.15.0-163.173
- CVE-2025-38714
- Description:
hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()
- CVE: https://ubuntu.com/security/CVE-2025-38714
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38714-hfsplus-fix-slab-out-of-bounds-in-hfsplus-bnode-read.patch
- From: 5.15.0-163.173
- CVE-2025-38713
- Description:
hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
- CVE: https://ubuntu.com/security/CVE-2025-38713
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38713-hfsplus-fix-slab-out-of-bounds-read-in-hfsplus-uni2asc.patch
- From: 5.15.0-163.173
- CVE-2025-38712
- Description:
hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()
- CVE: https://ubuntu.com/security/CVE-2025-38712
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38712-hfsplus-don-t-use-bug-on-in-hfsplus-create-attributes-file.patch
- From: 5.15.0-163.173
- CVE-2025-38706
- Description:
ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()
- CVE: https://ubuntu.com/security/CVE-2025-38706
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38706-asoc-core-check-for-rtd-null-in-snd-soc-remove-pcm-runtime.patch
- From: 5.15.0-163.173
- CVE-2025-38701
- Description:
ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr
- CVE: https://ubuntu.com/security/CVE-2025-38701
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38701-ext4-do-not-bug-when-inline-data-fl-lacks-system-data-xattr.patch
- From: 5.15.0-163.173
- CVE-2025-38700
- Description:
scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated
- CVE: https://ubuntu.com/security/CVE-2025-38700
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38700-scsi-libiscsi-initialize-iscsi-conn-dd-data-only-if-memory-is-allocated.patch
- From: 5.15.0-163.173
- CVE-2025-38699
- Description:
scsi: bfa: Double-free fix
- CVE: https://ubuntu.com/security/CVE-2025-38699
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38699-scsi-bfa-double-free-fix.patch
- From: 5.15.0-163.173
- CVE-2025-38699
- Description:
scsi: bfa: Double-free fix
- CVE: https://ubuntu.com/security/CVE-2025-38699
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38699-scsi-bfa-double-free-fix-kpatch.patch
- From: 5.15.0-163.173
- CVE-2025-39743
- Description:
jfs: truncate good inode pages when hard link is 0
- CVE: https://ubuntu.com/security/CVE-2025-39743
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39743-jfs-truncate-good-inode-pages-when-hard-link-is-0.patch
- From: 5.15.0-163.173
- CVE-2025-38698
- Description:
jfs: Regular file corruption check
- CVE: https://ubuntu.com/security/CVE-2025-38698
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38698-jfs-regular-file-corruption-check.patch
- From: 5.15.0-163.173
- CVE-2025-38697
- Description:
jfs: upper bound check of tree index in dbAllocAG
- CVE: https://ubuntu.com/security/CVE-2025-38697
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38697-jfs-upper-bound-check-of-tree-index-in-dballocag.patch
- From: 5.15.0-163.173
- CVE-2025-39742
- Description:
RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()
- CVE: https://ubuntu.com/security/CVE-2025-39742
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39742-rdma-hfi1-fix-possible-divide-by-zero-in-find-hw-thread-mask.patch
- From: 5.15.0-163.173
- CVE-2025-38695
- Description:
scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure
- CVE: https://ubuntu.com/security/CVE-2025-38695
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38695-scsi-lpfc-check-for-hdwq-null-ptr-when-cleaning-up-lpfc-vport-structure.patch
- From: 5.15.0-163.173
- CVE-2025-38694
- Description:
media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()
- CVE: https://ubuntu.com/security/CVE-2025-38694
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38694-media-dvb-frontends-dib7090p-fix-null-ptr-deref-in-dib7090p-rw-on-apb.patch
- From: 5.15.0-163.173
- CVE-2025-38693
- Description:
media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar
- CVE: https://ubuntu.com/security/CVE-2025-38693
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38693-media-dvb-frontends-w7090p-fix-null-ptr-deref-in-w7090p-tuner-write-serpar-and-w7090p-tuner-read-serpar.patch
- From: 5.15.0-163.173
- CVE-2025-39795
- Description:
block: avoid possible overflow for chunk_sectors check in blk_stack_limits()
- CVE: https://ubuntu.com/security/CVE-2025-39795
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39795-block-avoid-possible-overflow-for-chunk-sectors-check-in-blk-stack-limits.patch
- From: 5.15.0-163.173
- CVE-2025-38685
- Description:
fbdev: Fix vmalloc out-of-bounds write in fast_imageblit
- CVE: https://ubuntu.com/security/CVE-2025-38685
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38685-fbdev-fix-vmalloc-out-of-bounds-write-in-fast-imageblit.patch
- From: 5.15.0-163.173
- CVE-2025-38680
- Description:
media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()
- CVE: https://ubuntu.com/security/CVE-2025-38680
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38680-media-uvcvideo-fix-1-byte-out-of-bounds-read-in-uvc-parse-format.patch
- From: 5.15.0-163.173
- CVE-2025-39783
- Description:
PCI: endpoint: Fix configfs group list head handling
- CVE: https://ubuntu.com/security/CVE-2025-39783
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39783-pci-endpoint-fix-configfs-group-list-head-handling.patch
- From: 5.15.0-163.173
- CVE-2025-39782
- Description:
jbd2: prevent softlockup in jbd2_log_do_checkpoint()
- CVE: https://ubuntu.com/security/CVE-2025-39782
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39782-jbd2-prevent-softlockup-in-jbd2-log-do-checkpoint.patch
- From: 5.15.0-163.173
- CVE-2025-39714
- Description:
media: usbtv: Lock resolution while streaming
- CVE: https://ubuntu.com/security/CVE-2025-39714
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39714-media-usbtv-lock-resolution-while-streaming.patch
- From: 5.15.0-163.173
- CVE-2025-39713
- Description:
media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()
- CVE: https://ubuntu.com/security/CVE-2025-39713
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39713-media-rainshadow-cec-fix-toctou-race-condition-in-rain-interrupt.patch
- From: 5.15.0-163.173
- CVE-2025-39703
- Description:
net, hsr: reject HSR frame if skb can't hold tag
- CVE: https://ubuntu.com/security/CVE-2025-39703
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39703-net-hsr-reject-hsr-frame-if-skb-can-t-hold-tag.patch
- From: 5.15.0-163.173
- CVE-2025-39702
- Description:
ipv6: sr: Fix MAC comparison to be constant-time
- CVE: https://ubuntu.com/security/CVE-2025-39702
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39702-ipv6-sr-fix-mac-comparison-to-be-constant-time.patch
- From: 5.15.0-163.173
- CVE-2025-38664
- Description:
ice: Fix a null pointer dereference in ice_copy_and_init_pkg()
- CVE: https://ubuntu.com/security/CVE-2025-38664
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38664-ice-fix-a-null-pointer-dereference-in-ice-copy-and-init-pkg.patch
- From: 5.15.0-163.173
- CVE-2025-38488
- Description:
smb: client: fix use-after-free in crypt_message when using async crypto
- CVE: https://ubuntu.com/security/CVE-2025-38488
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38488-smb-client-fix-use-after-free-in-crypt-message-when-using-async-crypto.patch
- From: 5.15.0-163.173
- CVE-2025-39790
- Description:
bus: mhi: host: Detect events pointing to unexpected TREs
- CVE: https://ubuntu.com/security/CVE-2025-39790
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39790-bus-mhi-host-detect-events-pointing-to-unexpected-tres.patch
- From: 5.15.0-163.173
- CVE-2025-38684
- Description:
net/sched: ets: use old 'nbands' while purging unused classes
- CVE: https://ubuntu.com/security/CVE-2025-38684
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38684-net-sched-ets-use-old-nbands-while-purging-unused-classes.patch
- From: 5.15.0-163.173
- CVE-2022-50327
- Description:
ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value
- CVE: https://ubuntu.com/security/CVE-2022-50327
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2022-50327-acpi-processor-idle-check-acpi-fetch-acpi-dev-return-value.patch
- From: 5.15.0-163.173
- CVE-2022-50070
- Description:
mptcp: do not queue data on closed subflows
- CVE: https://ubuntu.com/security/CVE-2022-50070
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2022-50070-mptcp-do-not-queue-data-on-closed-subflows.patch
- From: 5.15.0-163.173
- CVE-2025-39693
- Description:
drm/amd/display: Avoid a NULL pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-39693
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39693-drm-amd-display-avoid-a-null-pointer-dereference.patch
- From: 5.15.0-163.173
- CVE-2025-39691
- Description:
fs/buffer: fix use-after-free when call bh_read() helper
- CVE: https://ubuntu.com/security/CVE-2025-39691
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39691-fs-buffer-fix-use-after-free-when-call-bh-read-helper.patch
- From: 5.15.0-163.173
- CVE-2025-39689
- Description:
ftrace: Also allocate and copy hash for reading of filter files
- CVE: https://ubuntu.com/security/CVE-2025-39689
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39689-ftrace-also-allocate-and-copy-hash-for-reading-of-filter-files.patch
- From: 5.15.0-163.173
- CVE-2025-38677
- Description:
f2fs: fix to avoid out-of-boundary access in dnode page
- CVE: https://ubuntu.com/security/CVE-2025-38677
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38677-f2fs-fix-to-avoid-out-of-boundary-access-in-dnode-page.patch
- From: 5.15.0-163.173
- CVE-2025-39787
- Description:
soc: qcom: mdt_loader: Ensure we don't read past the ELF header
- CVE: https://ubuntu.com/security/CVE-2025-39787
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39787-soc-qcom-mdt-loader-ensure-we-don-t-read-past-the-elf-header.patch
- From: 5.15.0-163.173
- CVE-2025-39788
- Description:
scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE
- CVE: https://ubuntu.com/security/CVE-2025-39788
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39788-scsi-ufs-exynos-fix-programming-of-hci-utrl-nexus-type.patch
- From: 5.15.0-163.173
- CVE-2025-39773
- Description:
net: bridge: fix soft lockup in br_multicast_query_expired()
- CVE: https://ubuntu.com/security/CVE-2025-39773
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39773-net-bridge-fix-soft-lockup-in-br_multicast_query_expired.patch
- From: 5.15.0-163.173
- CVE-2025-39773
- Description:
net: bridge: fix soft lockup in br_multicast_query_expired()
- CVE: https://ubuntu.com/security/CVE-2025-39773
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39773-net-bridge-fix-soft-lockup-in-br_multicast_query_expired-kpatch.patch
- From: 5.15.0-163.173
- CVE-2025-39676
- Description:
scsi: qla4xxx: Prevent a potential error pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-39676
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39676-scsi-qla4xxx-prevent-a-potential-error-pointer-dereference.patch
- From: 5.15.0-163.173
- CVE-2025-39675
- Description:
drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()
- CVE: https://ubuntu.com/security/CVE-2025-39675
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39675-drm-amd-display-add-null-pointer-check-in-mod-hdcp-hdcp1-create-session.patch
- From: 5.15.0-163.173
- CVE-2025-39673
- Description:
ppp: fix race conditions in ppp_fill_forward_path
- CVE: https://ubuntu.com/security/CVE-2025-39673
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39673-ppp-fix-race-conditions-in-ppp-fill-forward-path.patch
- From: 5.15.0-163.173
- CVE-2025-39766
- Description:
net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit
- CVE: https://ubuntu.com/security/CVE-2025-39766
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39766-net-sched-make-cake-enqueue-return-net-xmit-cn-when-past-buffer-limit.patch
- From: 5.15.0-163.173
- CVE-2025-38732
- Description:
netfilter: nf_reject: don't leak dst refcount for loopback packets
- CVE: https://ubuntu.com/security/CVE-2025-38732
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38732-netfilter-nf-reject-don-t-leak-dst-refcount-for-loopback-packets.patch
- From: 5.15.0-163.173
- CVE-2025-39817
- Description:
efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
- CVE: https://ubuntu.com/security/CVE-2025-39817
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39817-efivarfs-fix-slab-out-of-bounds-in-efivarfs-d-compare.patch
- From: 5.15.0-163.173
- CVE-2025-39823
- Description:
KVM: x86: use array_index_nospec with indices that come from guest
- CVE: https://ubuntu.com/security/CVE-2025-39823
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39823-kvm-x86-use-array-index-nospec-with-indices-that-come-from-guest.patch
- From: 5.15.0-163.173
- CVE-2025-39824
- Description:
HID: asus: fix UAF via HID_CLAIMED_INPUT validation
- CVE: https://ubuntu.com/security/CVE-2025-39824
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39824-hid-asus-fix-uaf-via-hid-claimed-input-validation.patch
- From: 5.15.0-163.173
- CVE-2025-39806
- Description:
HID: multitouch: fix slab out-of-bounds access in mt_report_fixup()
- CVE: https://ubuntu.com/security/CVE-2025-39806
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39806-hid-multitouch-fix-slab-out-of-bounds-access-in-mt-report-fixup.patch
- From: 5.15.0-163.173
- CVE-2025-39808
- Description:
Patch adds cross-module dependency: hid_ntrig -> usbhid (usb_hid_driver symbol). Cannot be resolved without userland modprobe modifications to ensure proper module loading order.
- CVE:
- Patch: skipped/CVE-2025-39808.patch
- From:
- CVE-2025-39866
- Description:
fs: writeback: fix use-after-free in __mark_inode_dirty()
- CVE: https://ubuntu.com/security/CVE-2025-39866
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39866-fs-writeback-fix-use-after-free-in-mark-inode-dirty.patch
- From: 5.15.0-163.173
- CVE-2025-39865
- Description:
tee: fix NULL pointer dereference in tee_shm_put
- CVE: https://ubuntu.com/security/CVE-2025-39865
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39865-tee-fix-null-pointer-dereference-in-tee-shm-put.patch
- From: 5.15.0-163.173
- CVE-2025-39864
- Description:
wifi: cfg80211: fix use-after-free in cmp_bss()
- CVE: https://ubuntu.com/security/CVE-2025-39864
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39864-wifi-cfg80211-fix-use-after-free-in-cmp-bss.patch
- From: 5.15.0-163.173
- CVE-2025-39894
- Description:
netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm
- CVE: https://ubuntu.com/security/CVE-2025-39894
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39894-netfilter-br-netfilter-do-not-check-confirmed-bit-in-br-nf-local-in-after-confirm.patch
- From: 5.15.0-163.173
- CVE-2025-39860
- Description:
Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()
- CVE: https://ubuntu.com/security/CVE-2025-39860
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39860-bluetooth-fix-use-after-free-in-l2cap-sock-cleanup-listen.patch
- From: 5.15.0-163.173
- CVE-2025-39853
- Description:
i40e: Fix potential invalid access when MAC list is empty
- CVE: https://ubuntu.com/security/CVE-2025-39853
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39853-i40e-fix-potential-invalid-access-when-mac-list-is-empty.patch
- From: 5.15.0-163.173
- CVE-2025-39847
- Description:
ppp: fix memory leak in pad_compress_skb
- CVE: https://ubuntu.com/security/CVE-2025-39847
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39847-ppp-fix-memory-leak-in-pad-compress-skb.patch
- From: 5.15.0-163.173
- CVE-2025-39844
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2025-39844.patch
- From:
- CVE-2023-52935
- Description:
mm/khugepaged: fix ->anon_vma race
- CVE: https://ubuntu.com/security/CVE-2023-52935
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2023-52935-mm-khugepaged-fix-anon-vma-race.patch
- From: 5.15.0-163.173
- CVE-2025-37968
- Description:
iio: light: opt3001: fix deadlock due to concurrent flag access
- CVE: https://ubuntu.com/security/CVE-2025-37968
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-37968-iio-light-opt3001-fix-deadlock-due-to-concurrent-flag-access.patch
- From: 5.15.0-163.173
- CVE-2025-38095
- Description:
dma-buf: insert memory barrier before updating num_fences
- CVE: https://ubuntu.com/security/CVE-2025-38095
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38095-dma-buf-insert-memory-barrier-before-updating-num-fences.patch
- From: 5.15.0-163.173
- CVE-2025-39902
- Description:
mm/slub: avoid accessing metadata when pointer is invalid in object_err()
- CVE: https://ubuntu.com/security/CVE-2025-39902
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39902-mm-slub-avoid-accessing-metadata-when-pointer-is-invalid-in-object-err.patch
- From: 5.15.0-163.173
- CVE-2022-49390
- Description:
macsec: fix UAF bug for real_dev
- CVE: https://ubuntu.com/security/CVE-2022-49390
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2022-49390-macsec-fix-uaf-bug-for-real-dev.patch
- From: 5.15.0-164.174
- CVE-2022-49390
- Description:
macsec: fix UAF bug for real_dev
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49390.html
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2022-49390-macsec-fix-uaf-bug-for-real-dev-kpatch.patch
- From: 5.15.0-164.174
- CVE-2025-39964
- Description:
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-39964
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-39964-crypto-af-alg-disallow-concurrent-writes-in-af-alg-sendmsg.patch
- From: 5.15.0-164.174
- CVE-2025-39964
- Description:
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-39964
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-39964-crypto-af-alg-disallow-concurrent-writes-in-af-alg-sendmsg-kpatch.patch
- From: 5.15.0-164.174
- CVE-2024-53090
- Description:
afs: Fix lock recursion
- CVE: https://ubuntu.com/security/CVE-2024-53090
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-53090-afs-fix-lock-recursion-kpatch.patch
- From: 5.15.0-164.174
- CVE-2024-50067
- Description:
uprobe: avoid out-of-bounds memory access of fetching args
- CVE: https://ubuntu.com/security/CVE-2024-50067
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-50067-uprobe-avoid-out-of-bounds-memory-access-of-fetching-args.patch
- From: 5.15.0-164.174
- CVE-2025-21855
- Description:
ibmvnic: Don't reference skb after sending to VIOS
- CVE: https://ubuntu.com/security/CVE-2025-21855
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-21855-ibmvnic-don-t-reference-skb-after-sending-to-vios.patch
- From: 5.15.0-164.174
- CVE-2025-40018
- Description:
ipvs: Defer ip_vs_ftp unregister during netns cleanup
- CVE: https://ubuntu.com/security/CVE-2025-40018
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-40018-ipvs-defer-ip-vs-ftp-unregister-during-netns-cleanup.patch
- From: 5.15.0-164.174
- CVE-2025-39993
- Description:
media: rc: fix races with imon_disconnect()
- CVE: https://ubuntu.com/security/CVE-2025-39993
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-39993-media-rc-fix-races-with-imon-disconnect.patch
- From: 5.15.0-164.174
- CVE-2024-47691
- Description:
f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()
- CVE: https://ubuntu.com/security/CVE-2024-47691
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-47691-f2fs-fix-to-avoid-use-after-free-in-f2fs-stop-gc-thread.patch
- From: 5.15.0-164.174
- CVE-2024-53218
- Description:
f2fs: fix race in concurrent f2fs_stop_gc_thread
- CVE: https://ubuntu.com/security/CVE-2024-53218
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-53218-f2fs-fix-race-in-concurrent-f2fs-stop-gc-thread.patch
- From: 5.15.0-164.174
- CVE-2025-38561
- Description:
ksmbd: fix Preauh_HashValue race condition
- CVE: https://ubuntu.com/security/CVE-2025-38561
- Patch: ubuntu-jammy/5.15.0-168.178/CVE-2025-38561-ksmbd-fix-preauh-hashvalue-race-condition.patch
- From: 5.15.0-168.178
- CVE-2025-40019
- Description:
crypto: essiv - Check ssize for decryption and in-place encryption
- CVE: https://ubuntu.com/security/CVE-2025-40019
- Patch: ubuntu-jammy/5.15.0-168.178/CVE-2025-40019-crypto-essiv-check-ssize-for-decryption-and-in-place-encryption.patch
- From: 5.15.0-168.178
- CVE-2025-38584
- Description:
padata: Fix pd UAF once and for all
- CVE: https://ubuntu.com/security/CVE-2025-38584
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-38584-padata-fix-pd-uaf-once-and-for-all.patch
- From: 5.15.0-170.180
- CVE-2025-38584
- Description:
padata: Fix pd UAF once and for all
- CVE: https://ubuntu.com/security/CVE-2025-38584
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-38584-padata-fix-pd-uaf-once-and-for-all-kpatch.patch
- From: 5.15.0-170.180
- CVE-2024-56538
- Description:
Vulnerability affects only ZynqMP SoCs.
- CVE:
- Patch: skipped/CVE-2024-56538.patch
- From:
- CVE-2025-39913
- Description:
tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.
- CVE: https://ubuntu.com/security/CVE-2025-39913
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39913-tcp-bpf-call-sk-msg-free-when-tcp-bpf-send-verdict-fails-to-allocate-psock-cork.patch
- From: 5.15.0-170.180
- CVE-2025-39880
- Description:
libceph: fix invalid accesses to ceph_connection_v1_info
- CVE: https://ubuntu.com/security/CVE-2025-39880
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39880-libceph-fix-invalid-accesses-to-ceph-connection-v1-info.patch
- From: 5.15.0-170.180
- CVE-2025-39876
- Description:
net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable()
- CVE: https://ubuntu.com/security/CVE-2025-39876
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39876-net-fec-fix-possible-npd-in-fec-enet-phy-reset-after-clk-enable.patch
- From: 5.15.0-170.180
- CVE-2025-39911
- Description:
i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
- CVE: https://ubuntu.com/security/CVE-2025-39911
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39911-i40e-fix-irq-freeing-in-i40e-vsi-request-irq-msix-error-path-5.15.0-168.178.patch
- From: 5.15.0-170.180
- CVE-2025-39873
- Description:
can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB
- CVE: https://ubuntu.com/security/CVE-2025-39873
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39873-can-xilinx-can-xcan-write-frame-fix-use-after-free-of-transmitted-skb.patch
- From: 5.15.0-170.180
- CVE-2025-39869
- Description:
dmaengine: ti: edma: Fix memory allocation size for queue_priority_map
- CVE: https://ubuntu.com/security/CVE-2025-39869
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39869-dmaengine-ti-edma-fix-memory-allocation-size-for-queue-priority-map.patch
- From: 5.15.0-170.180
- CVE-2025-39923
- Description:
dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees
- CVE: https://ubuntu.com/security/CVE-2025-39923
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39923-dmaengine-qcom-bam-dma-fix-dt-error-handling-for-num-channels-ees.patch
- From: 5.15.0-170.180
- CVE-2025-39883
- Description:
mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory
- CVE: https://ubuntu.com/security/CVE-2025-39883
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39883-mm-memory-failure-fix-vm-bug-on-page-pagepoisoned-page-when-unpoison-memory.patch
- From: 5.15.0-170.180
- CVE-2025-39949
- Description:
qed: Don't collect too many protection override GRC elements
- CVE: https://ubuntu.com/security/CVE-2025-39949
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39949-qed-don-t-collect-too-many-protection-override-grc-elements.patch
- From: 5.15.0-170.180
- CVE-2025-39955
- Description:
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
- CVE: https://ubuntu.com/security/CVE-2025-39955
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39955-tcp-clear-tcp-sk-sk-fastopen-rsk-in-tcp-disconnect.patch
- From: 5.15.0-170.180
- CVE-2025-39945
- Description:
cnic: Fix use-after-free bugs in cnic_delete_task
- CVE: https://ubuntu.com/security/CVE-2025-39945
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39945-cnic-fix-use-after-free-bugs-in-cnic-delete-task.patch
- From: 5.15.0-170.180
- CVE-2025-39934
- Description:
drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ
- CVE: https://ubuntu.com/security/CVE-2025-39934
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39934-drm-bridge-anx7625-fix-null-pointer-dereference-with-early-irq.patch
- From: 5.15.0-170.180
- CVE-2025-39943
- Description:
ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer
- CVE: https://ubuntu.com/security/CVE-2025-39943
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39943-ksmbd-smbdirect-validate-data-offset-and-data-length-field-of-smb-direct-data-transfer-5.15.0-161.171.patch
- From: 5.15.0-170.180
- CVE-2025-40020
- Description:
can: peak_usb: fix shift-out-of-bounds issue
- CVE: https://ubuntu.com/security/CVE-2025-40020
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40020-can-peak-usb-fix-shift-out-of-bounds-issue.patch
- From: 5.15.0-170.180
- CVE-2025-39980
- Description:
nexthop: Forbid FDB status change while nexthop is in a group
- CVE: https://ubuntu.com/security/CVE-2025-39980
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39980-nexthop-forbid-fdb-status-change-while-nexthop-is-in-a-group.patch
- From: 5.15.0-170.180
- CVE-2025-40011
- Description:
drm/gma500: Fix null dereference in hdmi teardown
- CVE: https://ubuntu.com/security/CVE-2025-40011
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40011-drm-gma500-fix-null-dereference-in-hdmi-teardown.patch
- From: 5.15.0-170.180
- CVE-2025-40021
- Description:
tracing: dynevent: Add a missing lockdown check on dynevent
- CVE: https://ubuntu.com/security/CVE-2025-40021
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40021-tracing-dynevent-add-a-missing-lockdown-check-on-dynevent.patch
- From: 5.15.0-170.180
- CVE-2025-39967
- Description:
fbcon: fix integer overflow in fbcon_do_set_font
- CVE: https://ubuntu.com/security/CVE-2025-39967
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39967-fbcon-fix-integer-overflow-in-fbcon-do-set-font.patch
- From: 5.15.0-170.180
- CVE-2025-39967
- Description:
fbcon: Fix OOB access in font allocation
- CVE: https://ubuntu.com/security/CVE-2025-39967
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39967-fbcon-fix-OOB-access-in-font-allocation.patch
- From: 5.15.0-170.180
- CVE-2025-38236
- Description:
Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem..
- CVE:
- Patch: skipped/CVE-2025-38236.patch
- From:
- CVE-2025-21861
- Description:
mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize()
- CVE: https://ubuntu.com/security/CVE-2025-21861
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-21861-mm-migrate-device-don-t-add-folio-to-be-freed-to-lru-in-migrate-device-finalize.patch
- From: 5.15.0-170.180
- CVE-2025-39998
- Description:
scsi: target: target_core_configfs: Add length check to avoid buffer overflow
- CVE: https://ubuntu.com/security/CVE-2025-39998
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39998-scsi-target-target-core-configfs-add-length-check-to-avoid-buffer-overflow.patch
- From: 5.15.0-170.180
- CVE-2025-39996
- Description:
media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove
- CVE: https://ubuntu.com/security/CVE-2025-39996
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39996-media-b2c2-fix-use-after-free-causing-by-irq-check-work-in-flexcop-pci-remove.patch
- From: 5.15.0-170.180
- CVE-2025-22058
- Description:
udp: Fix memory accounting leak.
- CVE: https://ubuntu.com/security/CVE-2025-22058
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-22058-udp-fix-memory-accounting-leak.patch
- From: 5.15.0-170.180
- CVE-2025-39994
- Description:
media: tuner: xc5000: Fix use-after-free in xc5000_release
- CVE: https://ubuntu.com/security/CVE-2025-39994
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39994-media-tuner-xc5000-fix-use-after-free-in-xc5000-release-5.15.0-168.178.patch
- From: 5.15.0-170.180
- CVE-2025-39995
- Description:
media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe
- CVE: https://ubuntu.com/security/CVE-2025-39995
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39995-media-i2c-tc358743-fix-use-after-free-bugs-caused-by-orphan-timer-in-probe.patch
- From: 5.15.0-170.180
- CVE-2025-40081
- Description:
perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
- CVE: https://ubuntu.com/security/CVE-2025-40081
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40081-perf-arm-spe-prevent-overflow-in-perf-idx2off.patch
- From: 5.15.0-170.180
- CVE-2025-40125
- Description:
blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx
- CVE: https://ubuntu.com/security/CVE-2025-40125
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40125-blk-mq-check-kobject-state-in-sysfs-before-deleting-in-blk-mq-unregister-hctx.patch
- From: 5.15.0-170.180
- CVE-2025-40078
- Description:
bpf: Explicitly check accesses to bpf_sock_addr
- CVE: https://ubuntu.com/security/CVE-2025-40078
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40078-bpf-explicitly-check-accesses-to-bpf-sock-addr.patch
- From: 5.15.0-170.180
- CVE-2025-40116
- Description:
usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup
- CVE: https://ubuntu.com/security/CVE-2025-40116
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40116-usb-host-max3421-hcd-fix-error-pointer-dereference-in-probe-cleanup.patch
- From: 5.15.0-170.180
- CVE-2025-40070
- Description:
pps: fix warning in pps_register_cdev when register device fail
- CVE: https://ubuntu.com/security/CVE-2025-40070
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40070-pps-fix-warning-in-pps-register-cdev-when-register-device-fail.patch
- From: 5.15.0-170.180
- CVE-2025-40154
- Description:
ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
- CVE: https://ubuntu.com/security/CVE-2025-40154
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40154-asoc-intel-bytcr-rt5640-fix-invalid-quirk-input-mapping.patch
- From: 5.15.0-170.180
- CVE-2025-40121
- Description:
ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping
- CVE: https://ubuntu.com/security/CVE-2025-40121
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40121-asoc-intel-bytcr-rt5651-fix-invalid-quirk-input-mapping.patch
- From: 5.15.0-170.180
- CVE-2025-40140
- Description:
net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast
- CVE: https://ubuntu.com/security/CVE-2025-40140
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40140-net-usb-remove-disruptive-netif-wake-queue-in-rtl8150-set-multicast.patch
- From: 5.15.0-170.180
- CVE-2025-40053
- Description:
net: dlink: handle copy_thresh allocation failure
- CVE: https://ubuntu.com/security/CVE-2025-40053
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40053-net-dlink-handle-copy-thresh-allocation-failure.patch
- From: 5.15.0-170.180
- CVE-2025-40048
- Description:
uio_hv_generic: Let userspace take care of interrupt mask
- CVE: https://ubuntu.com/security/CVE-2025-40048
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40048-uio-hv-generic-let-userspace-take-care-of-interrupt-mask.patch
- From: 5.15.0-170.180
- CVE-2025-40044
- Description:
fs: udf: fix OOB read in lengthAllocDescs handling
- CVE: https://ubuntu.com/security/CVE-2025-40044
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40044-fs-udf-fix-oob-read-in-lengthallocdescs-handling.patch
- From: 5.15.0-170.180
- CVE-2025-40153
- Description:
mm: hugetlb: avoid soft lockup when mprotect to large memory area
- CVE: https://ubuntu.com/security/CVE-2025-40153
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40153-mm-hugetlb-avoid-soft-lockup-when-mprotect-to-large-memory-area.patch
- From: 5.15.0-170.180
- CVE-2025-40030
- Description:
pinctrl: check the return value of pinmux_ops::get_function_name()
- CVE: https://ubuntu.com/security/CVE-2025-40030
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40030-pinctrl-check-the-return-value-of-pinmux-ops-get-function-name.patch
- From: 5.15.0-170.180
- CVE-2025-40029
- Description:
bus: fsl-mc: Check return value of platform_get_resource()
- CVE: https://ubuntu.com/security/CVE-2025-40029
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40029-bus-fsl-mc-check-return-value-of-platform-get-resource.patch
- From: 5.15.0-170.180
- CVE-2025-40111
- Description:
drm/vmwgfx: Fix Use-after-free in validation
- CVE: https://ubuntu.com/security/CVE-2025-40111
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40111-drm-vmwgfx-fix-use-after-free-in-validation.patch
- From: 5.15.0-170.180
- CVE-2025-40187
- Description:
net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()
- CVE: https://ubuntu.com/security/CVE-2025-40187
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40187-net-sctp-fix-a-null-dereference-in-sctp-disposition-sctp-sf-do-5-1d-ce.patch
- From: 5.15.0-170.180
- CVE-2025-40183
- Description:
bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}
- CVE: https://ubuntu.com/security/CVE-2025-40183
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40183-bpf-fix-metadata-dst-leak-bpf-redirect-neigh-v-46.patch
- From: 5.15.0-170.180
- CVE-2025-40194
- Description:
cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
- CVE: https://ubuntu.com/security/CVE-2025-40194
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40194-cpufreq-intel-pstate-fix-object-lifecycle-issue-in-update-qos-request.patch
- From: 5.15.0-170.180
- CVE-2025-40204
- Description:
sctp: Fix MAC comparison to be constant-time
- CVE: https://ubuntu.com/security/CVE-2025-40204
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40204-sctp-fix-mac-comparison-to-be-constant-time.patch
- From: 5.15.0-170.180
- CVE-2025-40179
- Description:
ext4: verify orphan file size is not too big
- CVE: https://ubuntu.com/security/CVE-2025-40179
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40179-ext4-verify-orphan-file-size-is-not-too-big-161.patch
- From: 5.15.0-170.180
- CVE-2025-40179
- Description:
ext4: verify orphan file size is not too big
- CVE: https://ubuntu.com/security/CVE-2025-40179
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40179-ext4-verify-orphan-file-size-is-not-too-big-kpatch.patch
- From: 5.15.0-170.180
- CVE-2025-40179
- Description:
ext4: align max orphan file size with e2fsprogs limit
- CVE: https://ubuntu.com/security/CVE-2025-40179
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40179-ext4-align-max-orphan-file-size-with-e2fsprogs-limit.patch
- From: 5.15.0-170.180
- CVE-2025-40026
- Description:
KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O
- CVE: https://ubuntu.com/security/CVE-2025-40026
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40026-kvm-x86-don-t-re-check-l1-intercepts-when-completing-userspace-i-o.patch
- From: 5.15.0-170.180
- CVE-2025-40134
- Description:
dm: fix NULL pointer dereference in __dm_suspend()
- CVE: https://ubuntu.com/security/CVE-2025-40134
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40134-dm-fix-null-pointer-dereference-in-dm-suspend.patch
- From: 5.15.0-170.180
- CVE-2025-40178
- Description:
pid: Add a judgment for ns null in pid_nr_ns
- CVE: https://ubuntu.com/security/CVE-2025-40178
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40178-pid-add-a-judgment-for-ns-null-in-pid-nr-ns.patch
- From: 5.15.0-170.180
- CVE-2025-40167
- Description:
ext4: detect invalid INLINE_DATA + EXTENTS flag combination
- CVE: https://ubuntu.com/security/CVE-2025-40167
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40167-ext4-detect-invalid-inline-data-extents-flag-combination.patch
- From: 5.15.0-170.180
- CVE-2025-40173
- Description:
net/ip6_tunnel: Prevent perpetual tunnel growth
- CVE: https://ubuntu.com/security/CVE-2025-40173
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40173-net-ip6-tunnel-prevent-perpetual-tunnel-growth.patch
- From: 5.15.0-170.180
- CVE-2025-40085
- Description:
ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
- CVE: https://ubuntu.com/security/CVE-2025-40085
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40085-alsa-usb-audio-fix-null-pointer-deference-in-try-to-register-card.patch
- From: 5.15.0-170.180
- CVE-2025-40088
- Description:
hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()
- CVE: https://ubuntu.com/security/CVE-2025-40088
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40088-hfsplus-fix-slab-out-of-bounds-read-in-hfsplus-strcasecmp.patch
- From: 5.15.0-170.180
- CVE-2025-40244
- Description:
hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()
- CVE: https://ubuntu.com/security/CVE-2025-40244
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40244-hfsplus-fix-kmsan-uninit-value-issue-in-hfsplus-ext-cache-extent.patch
- From: 5.15.0-170.180
- CVE-2025-40349
- Description:
hfs: validate record offset in hfsplus_bmap_alloc
- CVE: https://ubuntu.com/security/CVE-2025-40349
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40349-hfs-validate-record-offset-in-hfsplus-bmap-alloc.patch
- From: 5.15.0-170.180
- CVE-2025-40351
- Description:
hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()
- CVE: https://ubuntu.com/security/CVE-2025-40351
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40351-hfsplus-fix-kmsan-uninit-value-issue-in-hfsplus-delete-cat.patch
- From: 5.15.0-170.180
- CVE-2025-40243
- Description:
hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()
- CVE: https://ubuntu.com/security/CVE-2025-40243
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40243-hfs-fix-kmsan-uninit-value-issue-in-hfs-find-set-zero-bits.patch
- From: 5.15.0-170.180
- CVE-2025-40240
- Description:
sctp: avoid NULL dereference when chunk data buffer is missing
- CVE: https://ubuntu.com/security/CVE-2025-40240
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40240-sctp-avoid-null-dereference-when-chunk-data-buffer-is-missing.patch
- From: 5.15.0-170.180
- CVE-2025-40233
- Description:
ocfs2: clear extent cache after moving/defragmenting extents
- CVE: https://ubuntu.com/security/CVE-2025-40233
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40233-ocfs2-clear-extent-cache-after-moving-defragmenting-extents.patch
- From: 5.15.0-170.180
- CVE-2025-40231
- Description:
vsock: fix lock inversion in vsock_assign_transport()
- CVE: https://ubuntu.com/security/CVE-2025-40231
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40231-vsock-fix-lock-inversion-in-vsock-assign-transport.patch
- From: 5.15.0-170.180
- CVE-2025-40106
- Description:
comedi: fix divide-by-zero in comedi_buf_munge()
- CVE: https://ubuntu.com/security/CVE-2025-40106
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40106-comedi-fix-divide-by-zero-in-comedi-buf-munge.patch
- From: 5.15.0-170.180
- CVE-2025-40223
- Description:
most: usb: Fix use-after-free in hdm_disconnect
- CVE: https://ubuntu.com/security/CVE-2025-40223
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40223-most-usb-fix-use-after-free-in-hdm-disconnect.patch
- From: 5.15.0-170.180
- CVE-2025-68249
- Description:
most: usb: hdm_probe: Fix calling put_device() before device initialization
- CVE: https://ubuntu.com/security/CVE-2025-68249
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-68249-most-usb-hdm-probe-fix-calling-put-device-before-device-initialization.patch
- From: 5.15.0-170.180
- CVE-2025-68249
- Description:
most: usb: fix double free on late probe failure
- CVE: https://ubuntu.com/security/CVE-2025-68249
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-68249-most-usb-fix-double-free-on-late-probe-failure.patch
- From: 5.15.0-170.180
- CVE-2025-40220
- Description:
fuse: fix livelock in synchronous file put from fuseblk workers
- CVE: https://ubuntu.com/security/CVE-2025-40220
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40220-fuse-fix-livelock-in-synchronous-file-put-from-fuseblk-workers-5.15.0-168.178.patch
- From: 5.15.0-170.180
- CVE-2025-40105
- Description:
vfs: Don't leak disconnected dentries on umount
- CVE: https://ubuntu.com/security/CVE-2025-40105
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40105-vfs-don-t-leak-disconnected-dentries-on-umount.patch
- From: 5.15.0-170.180
- CVE-2025-40092
- Description:
usb: gadget: f_ncm: Refactor bind path to use __free()
- CVE: https://ubuntu.com/security/CVE-2025-40092
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40092-usb-gadget-f-ncm-refactor-bind-path-to-use-free.patch
- From: 5.15.0-170.180
- CVE-2025-40094
- Description:
usb: gadget: f_acm: Refactor bind path to use __free()
- CVE: https://ubuntu.com/security/CVE-2025-40094
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40094-usb-gadget-f-acm-refactor-bind-path-to-use-free.patch
- From: 5.15.0-170.180
- CVE-2025-40092 CVE-2025-40094
- Description:
usb: gadget: f_acm: Refactor bind path to use __free()
- CVE: https://ubuntu.com/security/CVE-2025-40094
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40094-CVE-2025-40092-kpatch.patch
- From: 5.15.0-170.180
- CVE-2025-21780
- Description:
drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
- CVE: https://ubuntu.com/security/CVE-2025-21780
- Patch: ubuntu-jammy/5.15.0-171.181/CVE-2025-21780-drm-amdgpu-avoid-buffer-overflow-attach-in-smu-sys-set-pp-table.patch
- From: 5.15.0-171.181
- CVE-2022-49267
- Description:
mmc: core: use sysfs_emit() instead of sprintf()
- CVE: https://ubuntu.com/security/CVE-2022-49267
- Patch: ubuntu-jammy/5.15.0-171.181/CVE-2022-49267-mmc-core-use-sysfs-emit-instead-of-sprintf.patch
- From: 5.15.0-171.181