- kernel-5.15.0-1073.79 (ubuntu-jammy-aws)
- 5.15.0-1086.93
- 2025-07-05 16:21:29
- 2025-07-08 09:12:46
- K20250705_04
- CVE-2020-12351 CVE-2020-12352 CVE-2020-24490, CVSSv2 Score: 8.8
- Description:
UBUNTU: [Config] Disable BlueZ highspeed support
- CVE: https://ubuntu.com/security/CVE-2020-24490
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2020-12351-CVE-2020-12352-CVE-2020-24490-kpatch.patch
- From: 5.15.0-130.140
- CVE-2024-40910, CVSSv2 Score: 5.5
- Description:
ax25: Fix refcount imbalance on inbound connections
- CVE: https://ubuntu.com/security/CVE-2024-40910
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-40910-ax25-fix-refcount-imbalance-on-inbound-connections.patch
- From: 5.15.0-130.140
- CVE-2024-53057, CVSSv2 Score: 7.8
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://ubuntu.com/security/CVE-2024-53057
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 5.15.0-130.140
- CVE-2024-40973, CVSSv2 Score: 5.5
- Description:
media: mtk-vcodec: potential null pointer deference in SCP
- CVE: https://ubuntu.com/security/CVE-2024-40973
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-40973-media-mtk-vcodec-potential-null-pointer-deference-in-scp.patch
- From: 5.15.0-130.140
- CVE-2024-35967, CVSSv2 Score: 5.5
- Description:
Bluetooth: SCO: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35967
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35967-bluetooth-sco-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-35966, CVSSv2 Score: 5.5
- Description:
Bluetooth: RFCOMM: Fix not validating setsockopt user
- CVE: https://ubuntu.com/security/CVE-2024-35966
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35966-bluetooth-rfcomm-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-35965, CVSSv2 Score: 5.5
- Description:
Bluetooth: L2CAP: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35965
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35965-bluetooth-l2cap-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-35963, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_sock: Fix not validating setsockopt user input
- CVE: https://ubuntu.com/security/CVE-2024-35963
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-35963-bluetooth-hci-sock-fix-not-validating-setsockopt-user-input.patch
- From: 5.15.0-130.140
- CVE-2024-38553, CVSSv2 Score: 5.5
- Description:
net: fec: remove .ndo_poll_controller to avoid deadlocks
- CVE: https://ubuntu.com/security/CVE-2024-38553
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-38553-net-fec-remove-ndo-poll-controller-to-avoid-deadlocks.patch
- From: 5.15.0-130.140
- CVE-2024-38553, CVSSv2 Score: 5.5
- Description:
net: fec: remove .ndo_poll_controller to avoid deadlocks
- CVE: https://ubuntu.com/security/CVE-2024-38553
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-38553-net-fec-remove-ndo-poll-controller-to-avoid-deadlocks-kpatch.patch
- From: 5.15.0-130.140
- CVE-2024-50264, CVSSv2 Score: 7.8
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://ubuntu.com/security/CVE-2024-50264
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 5.15.0-130.140
- CVE-2024-43904, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing
- CVE: https://ubuntu.com/security/CVE-2024-43904
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-43904-drm-amd-display-add-null-checks-for-stream-and-plane-before-dereferencing.patch
- From: 5.15.0-130.140
- CVE-2024-26822, CVSSv2 Score: 5.5
- Description:
smb: client: set correct id, uid and cruid for multiuser automounts
- CVE: https://ubuntu.com/security/CVE-2024-26822
- Patch: ubuntu-jammy/5.15.0-130.140/CVE-2024-26822-smb-client-set-correct-id-uid-and-cruid-for-multiuser-automounts.patch
- From: 5.15.0-130.140
- CVE-2024-53164, CVSSv2 Score: 5.5
- Description:
net: sched: fix ordering of qlen adjustment
- CVE: https://ubuntu.com/security/CVE-2024-53164
- Patch: ubuntu-jammy/5.15.0-131.141/CVE-2024-53164-net-sched-fix-ordering-of-qlen-adjustment.patch
- From: 5.15.0-131.141
- CVE-2024-53141, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://ubuntu.com/security/CVE-2024-53141
- Patch: ubuntu-jammy/5.15.0-131.141/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 5.15.0-131.141
- CVE-2024-53103, CVSSv2 Score: 7.8
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://ubuntu.com/security/CVE-2024-53103
- Patch: ubuntu-jammy/5.15.0-131.141/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 5.15.0-131.141
- CVE-2024-56672, CVSSv2 Score: 7.8
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://ubuntu.com/security/CVE-2024-56672
- Patch: ubuntu-jammy/5.15.0-134.145/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 5.15.0-134.145
- CVE-2024-56672, CVSSv2 Score: 7.8
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://ubuntu.com/security/CVE-2024-56672
- Patch: ubuntu-jammy/5.15.0-134.145/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online-kpatch.patch
- From: 5.15.0-134.145
- CVE-2024-50074, CVSSv2 Score: 7.8
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://ubuntu.com/security/CVE-2024-50074
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access.patch
- From: 5.15.0-133.144
- CVE-2024-50085, CVSSv2 Score: 7.8
- Description:
mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow
- CVE: https://ubuntu.com/security/CVE-2024-50085
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50085-mptcp-pm-fix-uaf-read-in-mptcp-pm-nl-rm-addr-or-subflow.patch
- From: 5.15.0-133.144
- CVE-2024-35887, CVSSv2 Score: 7.8
- Description:
ax25: fix use-after-free bugs caused by ax25_ds_del_timer
- CVE: https://ubuntu.com/security/CVE-2024-35887
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-35887-ax25-fix-use-after-free-bugs-caused-by-ax25-ds-del-timer.patch
- From: 5.15.0-133.144
- CVE-2024-50209, CVSSv2 Score: 7.8
- Description:
RDMA/bnxt_re: Add a check for memory allocation
- CVE: https://ubuntu.com/security/CVE-2024-50209
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50209-rdma-bnxt-re-add-a-check-for-memory-allocation.patch
- From: 5.15.0-133.144
- CVE-2024-50154, CVSSv2 Score: 7.8
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
- CVE: https://ubuntu.com/security/CVE-2024-50154
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50154-tcp-dccp-don-t-use-timer-pending-in-reqsk-queue-unlink.patch
- From: 5.15.0-133.144
- CVE-2024-50131, CVSSv2 Score: 7.8
- Description:
tracing: Consider the NULL character when validating the event length
- CVE: https://ubuntu.com/security/CVE-2024-50131
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50131-tracing-consider-the-null-character-when-validating-the-event-length.patch
- From: 5.15.0-133.144
- CVE-2024-50127, CVSSv2 Score: 7.8
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://ubuntu.com/security/CVE-2024-50127
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 5.15.0-133.144
- CVE-2024-50143, CVSSv2 Score: 7.8
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://ubuntu.com/security/CVE-2024-50143
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50143-udf-fix-uninit-value-use-in-udf-get-fileshortad.patch
- From: 5.15.0-133.144
- CVE-2024-50151, CVSSv2 Score: 7.8
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://ubuntu.com/security/CVE-2024-50151
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 5.15.0-133.144
- CVE-2024-50115, CVSSv2 Score: 7.1
- Description:
KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
- CVE: https://ubuntu.com/security/CVE-2024-50115
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50115-kvm-nsvm-ignore-ncr3-4-0-when-loading-pdptes-from-memory.patch
- From: 5.15.0-133.144
- CVE-2024-50247, CVSSv2 Score: 7.1
- Description:
fs/ntfs3: Check if more than chunk-size bytes are written
- CVE: https://ubuntu.com/security/CVE-2024-50247
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50247-fs-ntfs3-check-if-more-than-chunk-size-bytes-are-written.patch
- From: 5.15.0-133.144
- CVE-2024-50234, CVSSv2 Score: 7.0
- Description:
wifi: iwlegacy: Clear stale interrupts before resuming device
- CVE: https://ubuntu.com/security/CVE-2024-50234
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50234-wifi-iwlegacy-clear-stale-interrupts-before-resuming-device.patch
- From: 5.15.0-133.144
- CVE-2024-50279, CVSSv2 Score: 7.1
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50279
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 5.15.0-133.144
- CVE-2024-50278, CVSSv2 Score: 7.1
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_bit-when-resizing.patch
- From: 5.15.0-133.144
- CVE-2024-50278, CVSSv2 Score: 7.1
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://ubuntu.com/security/CVE-2024-50278
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 5.15.0-133.144
- CVE-2024-50036, CVSSv2 Score: 7.0
- Description:
net: do not delay dst_entries_add() in dst_release()
- CVE: https://ubuntu.com/security/CVE-2024-50036
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50036-net-do-not-delay-dst-entries-add-in-dst-release.patch
- From: 5.15.0-133.144
- CVE-2024-50268, CVSSv2 Score: 7.1
- Description:
usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-50268
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50268-usb-typec-fix-potential-out-of-bounds-in-ucsi-ccg-update-set-new-cam-cmd.patch
- From: 5.15.0-133.144
- CVE-2024-50301, CVSSv2 Score: 7.1
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://ubuntu.com/security/CVE-2024-50301
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 5.15.0-133.144
- CVE-2024-53059, CVSSv2 Score: 7.8
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://ubuntu.com/security/CVE-2024-53059
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53059-wifi-iwlwifi-mvm-fix-response-handling-in-iwl-mvm-send-recovery-cmd.patch
- From: 5.15.0-133.144
- CVE-2024-50262, CVSSv2 Score: 7.8
- Description:
bpf: Fix out-of-bounds write in trie_get_next_key()
- CVE: https://ubuntu.com/security/CVE-2024-50262
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch
- From: 5.15.0-133.144
- CVE-2024-50230, CVSSv2 Score: 7.8
- Description:
nilfs2: fix kernel bug due to missing clearing of checked flag
- CVE: https://ubuntu.com/security/CVE-2024-50230
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50230-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-checked-flag.patch
- From: 5.15.0-133.144
- CVE-2024-53104, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://ubuntu.com/security/CVE-2024-53104
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 5.15.0-133.144
- CVE-2024-50269, CVSSv2 Score: 7.8
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://ubuntu.com/security/CVE-2024-50269
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 5.15.0-133.144
- CVE-2024-50267, CVSSv2 Score: 7.8
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://ubuntu.com/security/CVE-2024-50267
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 5.15.0-133.144
- CVE-2024-50083, CVSSv2 Score: 7.5
- Description:
tcp: fix mptcp DSS corruption due to large pmtu xmit
- CVE: https://ubuntu.com/security/CVE-2024-50083
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50083-tcp-fix-mptcp-dss-corruption-due-to-large-pmtu-xmit.patch
- From: 5.15.0-133.144
- CVE-2024-53061, CVSSv2 Score: 7.8
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://ubuntu.com/security/CVE-2024-53061
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 5.15.0-133.144
- ubuntu-jammy/5.15.0-133.144/CVE-2024-50282-drm-amdgpu-add-missing-size-check-in-amdgpu-debugfs-gprwave-read.patch, CVSSv2 Score:
- Description:
The fix for this CVE was reverted in upstream Ubuntu kernel by the following commit (b0feddb6759a) Revert "drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()"
- CVE:
- Patch: skipped/ubuntu-jammy/5.15.0-133.144/CVE-2024-50282-drm-amdgpu-add-missing-size-check-in-amdgpu-debugfs-gprwave-read.patch
- From:
- CVE-2024-50257, CVSSv2 Score: 7.8
- Description:
netfilter: Fix use-after-free in get_info()
- CVE: https://ubuntu.com/security/CVE-2024-50257
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50257-netfilter-fix-use-after-free-in-get-info.patch
- From: 5.15.0-133.144
- CVE-2024-40953, CVSSv2 Score: 5.5
- Description:
KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()
- CVE: https://ubuntu.com/security/CVE-2024-40953
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-40953-kvm-fix-a-data-race-on-last-boosted-vcpu-in-kvm-vcpu-on-spin.patch
- From: 5.15.0-133.144
- CVE-2024-39497, CVSSv2 Score: 5.5
- Description:
drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)
- CVE: https://ubuntu.com/security/CVE-2024-39497
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-39497-drm-shmem-helper-fix-bug-on-on-mmap-prot-write-map-private.patch
- From: 5.15.0-133.144
- CVE-2024-42252, CVSSv2 Score: 5.5
- Description:
closures: Change BUG_ON() to WARN_ON()
- CVE: https://ubuntu.com/security/CVE-2024-42252
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-42252-closures-change-bug-on-to-warn-on.patch
- From: 5.15.0-133.144
- CVE-2024-41066, CVSSv2 Score: 5.5
- Description:
ibmvnic: Add tx check to prevent skb leak
- CVE: https://ubuntu.com/security/CVE-2024-41066
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-41066-ibmvnic-add-tx-check-to-prevent-skb-leak.patch
- From: 5.15.0-133.144
- CVE-2024-50251, CVSSv2 Score: 6.2
- Description:
netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
- CVE: https://ubuntu.com/security/CVE-2024-50251
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50251-netfilter-nft-payload-sanitize-offset-and-length-before-calling-skb-checksum.patch
- From: 5.15.0-133.144
- CVE-2023-52913, CVSSv2 Score: 5.5
- Description:
drm/i915: Fix potential context UAFs
- CVE: https://ubuntu.com/security/CVE-2023-52913
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2023-52913-drm-i915-fix-potential-context-uafs.patch
- From: 5.15.0-133.144
- CVE-2024-41080, CVSSv2 Score: 5.5
- Description:
io_uring: fix possible deadlock in io_register_iowq_max_workers()
- CVE: https://ubuntu.com/security/CVE-2024-41080
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-41080-io-uring-fix-possible-deadlock-in-io-register-iowq-max-workers.patch
- From: 5.15.0-133.144
- CVE-2024-50302, CVSSv2 Score: 6.1
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://ubuntu.com/security/CVE-2024-50302
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 5.15.0-133.144
- CVE-2024-26718, CVSSv2 Score: 5.5
- Description:
dm-crypt, dm-verity: disable tasklets
- CVE: https://ubuntu.com/security/CVE-2024-26718
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-26718-dm-crypt-dm-verity-disable-tasklets.patch
- From: 5.15.0-133.144
- CVE-2024-26718, CVSSv2 Score: 5.5
- Description:
dm-crypt, dm-verity: disable tasklets (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26718
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-26718-dm-crypt-dm-verity-disable-tasklets-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-50099, CVSSv2 Score: 5.5
- Description:
arm64: probes: Remove broken LDR (literal) uprobe support
- CVE: https://ubuntu.com/security/CVE-2024-50099
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50099-arm64-probes-remove-broken-ldr-literal-uprobe-support.patch
- From: 5.15.0-133.144
- CVE-2024-50101, CVSSv2 Score: 5.5
- Description:
iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices
- CVE: https://ubuntu.com/security/CVE-2024-50101
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50101-iommu-vt-d-fix-incorrect-pci-for-each-dma-alias-for-non-pci-devices.patch
- From: 5.15.0-133.144
- CVE-2024-50082, CVSSv2 Score: 5.5
- Description:
blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
- CVE: https://ubuntu.com/security/CVE-2024-50082
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50082-blk-rq-qos-fix-crash-on-rq-qos-wait-vs-rq-qos-wake-function-race.patch
- From: 5.15.0-133.144
- CVE-2024-50010, CVSSv2 Score: 5.5
- Description:
exec: don't WARN for racy path_noexec check
- CVE: https://ubuntu.com/security/CVE-2024-50010
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50010-exec-don-t-warn-for-racy-path-noexec-check.patch
- From: 5.15.0-133.144
- CVE-2024-50110, CVSSv2 Score: 5.5
- Description:
xfrm: fix one more kernel-infoleak in algo dumping
- CVE: https://ubuntu.com/security/CVE-2024-50110
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50110-xfrm-fix-one-more-kernel-infoleak-in-algo-dumping.patch
- From: 5.15.0-133.144
- CVE-2024-50058, CVSSv2 Score: 5.5
- Description:
serial: protect uart_port_dtr_rts() in uart_shutdown() too
- CVE: https://ubuntu.com/security/CVE-2024-50058
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50058-serial-protect-uart-port-dtr-rts-in-uart-shutdown-too.patch
- From: 5.15.0-133.144
- CVE-2024-50103, CVSSv2 Score: 5.5
- Description:
ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
- CVE: https://ubuntu.com/security/CVE-2024-50103
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50103-asoc-qcom-fix-null-dereference-in-asoc-qcom-lpass-cpu-platform-probe.patch
- From: 5.15.0-133.144
- CVE-2024-50072, CVSSv2 Score:
- Description:
Out of scope: x86 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-50072.patch
- From:
- CVE-2024-50116, CVSSv2 Score: 5.5
- Description:
nilfs2: fix kernel bug due to missing clearing of buffer delay flag
- CVE: https://ubuntu.com/security/CVE-2024-50116
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50116-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-buffer-delay-flag.patch
- From: 5.15.0-133.144
- CVE-2024-42291, CVSSv2 Score: 5.5
- Description:
ice: Add a per-VF limit on number of FDIR filters
- CVE: https://ubuntu.com/security/CVE-2024-42291
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-42291-ice-add-a-per-vf-limit-on-number-of-fdir-filters.patch
- From: 5.15.0-133.144
- CVE-2024-42291, CVSSv2 Score: 5.5
- Description:
ice: Add a per-VF limit on number of FDIR filters (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-42291
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-42291-ice-add-a-per-vf-limit-on-number-of-fdir-filters-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-50160, CVSSv2 Score: 5.5
- Description:
ALSA: hda/cs8409: Fix possible NULL dereference
- CVE: https://ubuntu.com/security/CVE-2024-50160
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50160-alsa-hda-cs8409-fix-possible-null-dereference.patch
- From: 5.15.0-133.144
- CVE-2024-50153, CVSSv2 Score: 5.5
- Description:
scsi: target: core: Fix null-ptr-deref in target_alloc_device()
- CVE: https://ubuntu.com/security/CVE-2024-50153
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50153-scsi-target-core-fix-null-ptr-deref-in-target-alloc-device.patch
- From: 5.15.0-133.144
- CVE-2024-50148, CVSSv2 Score: 5.5
- Description:
Bluetooth: bnep: fix wild-memory-access in proto_unregister
- CVE: https://ubuntu.com/security/CVE-2024-50148
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50148-bluetooth-bnep-fix-wild-memory-access-in-proto-unregister.patch
- From: 5.15.0-133.144
- CVE-2024-50148, CVSSv2 Score: 5.5
- Description:
Bluetooth: bnep: fix wild-memory-access in proto_unregister kpatch
- CVE: https://ubuntu.com/security/CVE-2024-50148
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50148-bluetooth-bnep-fix-wild-memory-access-in-proto-unregister-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-50134, CVSSv2 Score: 5.5
- Description:
drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA
- CVE: https://ubuntu.com/security/CVE-2024-50134
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50134-drm-vboxvideo-replace-fake-vla-at-end-of-vbva-mouse-pointer-shape-with-real-vla.patch
- From: 5.15.0-133.144
- CVE-2024-50117, CVSSv2 Score: 5.5
- Description:
drm/amd: Guard against bad data for ATIF ACPI method
- CVE: https://ubuntu.com/security/CVE-2024-50117
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50117-drm-amd-guard-against-bad-data-for-atif-acpi-method.patch
- From: 5.15.0-133.144
- CVE-2024-50142, CVSSv2 Score: 5.5
- Description:
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
- CVE: https://ubuntu.com/security/CVE-2024-50142
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch
- From: 5.15.0-133.144
- CVE-2024-50141, CVSSv2 Score: 5.5
- Description:
ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context
- CVE: https://ubuntu.com/security/CVE-2024-50141
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50141-acpi-prm-find-efi-memory-runtime-block-for-prm-handler-and-context.patch
- From: 5.15.0-133.144
- CVE-2024-50141, CVSSv2 Score: 5.5
- Description:
[PATCH] ACPI: PRM: Remove unnecessary strict handler address checks
- CVE: https://ubuntu.com/security/CVE-2024-50141
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50141-ACPI-PRM-Remove-unnecessary-strict-handler-address-checks.patch
- From: 5.15.0-133.144
- CVE-2024-53060, CVSSv2 Score: 5.5
- Description:
[PATCH] drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
- CVE: https://ubuntu.com/security/CVE-2024-53060
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53060-drm-amdgpu-prevent-NULL-pointer-dereference-if-ATIF-is-not-supported.patch
- From: 5.15.0-133.144
- CVE-2024-50167, CVSSv2 Score: 5.5
- Description:
be2net: fix potential memory leak in be_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-50167
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50167-be2net-fix-potential-memory-leak-in-be-xmit.patch
- From: 5.15.0-133.144
- CVE-2024-50168, CVSSv2 Score: 5.5
- Description:
net/sun3_82586: fix potential memory leak in sun3_82586_send_packet()
- CVE: https://ubuntu.com/security/CVE-2024-50168
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50168-net-sun3-82586-fix-potential-memory-leak-in-sun3-82586-send-packet.patch
- From: 5.15.0-133.144
- CVE-2024-50171, CVSSv2 Score: 5.5
- Description:
net: systemport: fix potential memory leak in bcm_sysport_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-50171
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50171-net-systemport-fix-potential-memory-leak-in-bcm-sysport-xmit.patch
- From: 5.15.0-133.144
- CVE-2024-50182, CVSSv2 Score: 5.5
- Description:
secretmem: disable memfd_secret() if arch cannot set direct map
- CVE: https://ubuntu.com/security/CVE-2024-50182
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50182-secretmem-disable-memfd-secret-if-arch-cannot-set-direct-map.patch
- From: 5.15.0-133.144
- CVE-2024-50192, CVSSv2 Score:
- Description:
arm64: Low-score CVE requiring adaptation that is hard to implement; targets very rare hardware
- CVE:
- Patch: skipped/CVE-2024-50192.patch
- From:
- CVE-2024-50195, CVSSv2 Score: 5.5
- Description:
posix-clock: Fix missing timespec64 check in pc_clock_settime()
- CVE: https://ubuntu.com/security/CVE-2024-50195
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50195-posix-clock-fix-missing-timespec64-check-in-pc-clock-settime.patch
- From: 5.15.0-133.144
- CVE-2024-50195, CVSSv2 Score: 5.5
- Description:
posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()
- CVE: https://ubuntu.com/security/CVE-2024-50195
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50195-posix-clock-posix-clock-fix-unbalanced-locking-in-pc-clock-settime.patch
- From: 5.15.0-133.144
- CVE-2024-50196, CVSSv2 Score: 5.5
- Description:
pinctrl: ocelot: fix system hang on level based interrupts
- CVE: https://ubuntu.com/security/CVE-2024-50196
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50196-pinctrl-ocelot-fix-system-hang-on-level-based-interrupts.patch
- From: 5.15.0-133.144
- CVE-2024-50198, CVSSv2 Score: 5.5
- Description:
iio: light: veml6030: fix IIO device retrieval from embedded device
- CVE: https://ubuntu.com/security/CVE-2024-50198
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50198-iio-light-veml6030-fix-iio-device-retrieval-from-embedded-device.patch
- From: 5.15.0-133.144
- CVE-2024-50199, CVSSv2 Score: 5.5
- Description:
mm/swapfile: skip HugeTLB pages for unuse_vma
- CVE: https://ubuntu.com/security/CVE-2024-50199
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50199-mm-swapfile-skip-hugetlb-pages-for-unuse-vma.patch
- From: 5.15.0-133.144
- CVE-2024-50201, CVSSv2 Score: 5.5
- Description:
drm/radeon: Fix encoder->possible_clones
- CVE: https://ubuntu.com/security/CVE-2024-50201
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50201-drm-radeon-fix-encoder-possible-clones.patch
- From: 5.15.0-133.144
- CVE-2024-50202, CVSSv2 Score: 5.5
- Description:
nilfs2: propagate directory read errors from nilfs_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-50202
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50202-nilfs2-propagate-directory-read-errors-from-nilfs-find-entry.patch
- From: 5.15.0-133.144
- CVE-2024-50208, CVSSv2 Score: 5.5
- Description:
RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
- CVE: https://ubuntu.com/security/CVE-2024-50208
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50208-rdma-bnxt-re-fix-a-bug-while-setting-up-level-2-pbl-pages.patch
- From: 5.15.0-133.144
- CVE-2024-50205, CVSSv2 Score: 5.5
- Description:
ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
- CVE: https://ubuntu.com/security/CVE-2024-50205
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50205-alsa-firewire-lib-avoid-division-by-zero-in-apply-constraint-to-size.patch
- From: 5.15.0-133.144
- CVE-2024-50236, CVSSv2 Score: 5.5
- Description:
wifi: ath10k: Fix memory leak in management tx
- CVE: https://ubuntu.com/security/CVE-2024-50236
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50236-wifi-ath10k-fix-memory-leak-in-management-tx.patch
- From: 5.15.0-133.144
- CVE-2024-50233, CVSSv2 Score: 5.5
- Description:
staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg()
- CVE: https://ubuntu.com/security/CVE-2024-50233
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50233-staging-iio-frequency-ad9832-fix-division-by-zero-in-ad9832-calc-freqreg.patch
- From: 5.15.0-133.144
- CVE-2024-50232, CVSSv2 Score: 5.5
- Description:
iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr()
- CVE: https://ubuntu.com/security/CVE-2024-50232
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50232-iio-adc-ad7124-fix-division-by-zero-in-ad7124-set-channel-odr.patch
- From: 5.15.0-133.144
- CVE-2024-50229, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential deadlock with newly created symlinks
- CVE: https://ubuntu.com/security/CVE-2024-50229
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50229-nilfs2-fix-potential-deadlock-with-newly-created-symlinks.patch
- From: 5.15.0-133.144
- CVE-2024-50218, CVSSv2 Score: 5.5
- Description:
ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow
- CVE: https://ubuntu.com/security/CVE-2024-50218
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50218-ocfs2-pass-u64-to-ocfs2-truncate-inline-maybe-overflow.patch
- From: 5.15.0-133.144
- CVE-2024-50259, CVSSv2 Score: 5.5
- Description:
netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write()
- CVE: https://ubuntu.com/security/CVE-2024-50259
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50259-netdevsim-add-trailing-zero-to-terminate-the-string-in-nsim-nexthop-bucket-activity-write.patch
- From: 5.15.0-133.144
- CVE-2024-50245, CVSSv2 Score: 5.5
- Description:
fs/ntfs3: Fix possible deadlock in mi_read
- CVE: https://ubuntu.com/security/CVE-2024-50245
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50245-fs-ntfs3-fix-possible-deadlock-in-mi-read.patch
- From: 5.15.0-133.144
- CVE-2024-50244, CVSSv2 Score: 5.5
- Description:
fs/ntfs3: Additional check in ni_clear()
- CVE: https://ubuntu.com/security/CVE-2024-50244
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50244-fs-ntfs3-additional-check-in-ni-clear.patch
- From: 5.15.0-133.144
- CVE-2024-50237, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
- CVE: https://ubuntu.com/security/CVE-2024-50237
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50237-wifi-mac80211-do-not-pass-a-stopped-vif-to-the-driver-in-get-txpower.patch
- From: 5.15.0-133.144
- CVE-2024-50292, CVSSv2 Score: 5.5
- Description:
ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove
- CVE: https://ubuntu.com/security/CVE-2024-50292
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50292-asoc-stm32-spdifrx-fix-dma-channel-release-in-stm32-spdifrx-remove.patch
- From: 5.15.0-133.144
- CVE-2024-50290, CVSSv2 Score: 5.5
- Description:
media: cx24116: prevent overflows on SNR calculus
- CVE: https://ubuntu.com/security/CVE-2024-50290
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50290-media-cx24116-prevent-overflows-on-snr-calculus.patch
- From: 5.15.0-133.144
- CVE-2024-50287, CVSSv2 Score: 5.5
- Description:
media: v4l2-tpg: prevent the risk of a division by zero
- CVE: https://ubuntu.com/security/CVE-2024-50287
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50287-media-v4l2-tpg-prevent-the-risk-of-a-division-by-zero.patch
- From: 5.15.0-133.144
- CVE-2024-50273, CVSSv2 Score: 5.5
- Description:
btrfs: reinitialize delayed ref list after deleting it from the list
- CVE: https://ubuntu.com/security/CVE-2024-50273
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50273-btrfs-reinitialize-delayed-ref-list-after-deleting-it-from-the-list.patch
- From: 5.15.0-133.144
- CVE-2024-50265, CVSSv2 Score: 5.5
- Description:
ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()
- CVE: https://ubuntu.com/security/CVE-2024-50265
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50265-ocfs2-remove-entry-once-instead-of-null-ptr-dereference-in-ocfs2-xa-remove.patch
- From: 5.15.0-133.144
- CVE-2024-50162, CVSSv2 Score: 5.5
- Description:
[PATCH 2/2] bpf: devmap: provide rxq after redirect
- CVE: https://ubuntu.com/security/CVE-2024-50162
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50162-bpf-devmap-provide-rxq-after-redirect.patch
- From: 5.15.0-133.144
- CVE-2024-50163, CVSSv2 Score: 5.5
- Description:
[PATCH 1/2] bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
- CVE: https://ubuntu.com/security/CVE-2024-50163
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50163-bpf-Make-sure-internal-and-UAPI-bpf_redirect-flags-don-t-overlap.patch
- From: 5.15.0-133.144
- CVE-2024-50163, CVSSv2 Score: 5.5
- Description:
[PATCH 1/2] bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
- CVE: https://ubuntu.com/security/CVE-2024-50163
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50163-bpf-Make-sure-internal-and-UAPI-bpf_redirect-flags-don-t-overlap-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-53058, CVSSv2 Score: 5.5
- Description:
net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data
- CVE: https://ubuntu.com/security/CVE-2024-53058
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53058-net-stmmac-tso-fix-unbalanced-dma-map-unmap-for-non-paged-skb-data.patch
- From: 5.15.0-133.144
- CVE-2024-53058, CVSSv2 Score: 5.5
- Description:
net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data
- CVE: https://ubuntu.com/security/CVE-2024-53058
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53058-net-stmmac-fix-TSO-DMA-API-usage-causing-oops.patch
- From: 5.15.0-133.144
- CVE-2024-53055, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: fix 6 GHz scan construction
- CVE: https://ubuntu.com/security/CVE-2024-53055
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53055-wifi-iwlwifi-mvm-fix-6-ghz-scan-construction.patch
- From: 5.15.0-133.144
- CVE-2024-50299, CVSSv2 Score: 5.5
- Description:
sctp: properly validate chunk size in sctp_sf_ootb()
- CVE: https://ubuntu.com/security/CVE-2024-50299
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50299-sctp-properly-validate-chunk-size-in-sctp-sf-ootb.patch
- From: 5.15.0-133.144
- CVE-2024-50296, CVSSv2 Score: 5.5
- Description:
net: hns3: fix kernel crash when uninstalling driver
- CVE: https://ubuntu.com/security/CVE-2024-50296
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50296-net-hns3-fix-kernel-crash-when-uninstalling-driver.patch
- From: 5.15.0-133.144
- CVE-2024-50295, CVSSv2 Score:
- Description:
The ndev->dev.parent mappings cannot be changed to ndev->dev.parent and driver is broken already
- CVE:
- Patch: skipped/CVE-2024-50295.patch
- From:
- CVE-2024-53063, CVSSv2 Score: 5.5
- Description:
media: dvbdev: prevent the risk of out of memory access
- CVE: https://ubuntu.com/security/CVE-2024-53063
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53063-media-dvbdev-prevent-the-risk-of-out-of-memory-access.patch
- From: 5.15.0-133.144
- CVE-2024-53052, CVSSv2 Score: 5.5
- Description:
io_uring/rw: fix missing NOWAIT check for O_DIRECT start write
- CVE: https://ubuntu.com/security/CVE-2024-53052
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53052-io-uring-rw-fix-missing-nowait-check-for-o-direct-start-write.patch
- From: 5.15.0-133.144
- CVE-2024-53052, CVSSv2 Score: 5.5
- Description:
io_uring/rw: fix missing NOWAIT check for O_DIRECT start write
- CVE: https://ubuntu.com/security/CVE-2024-53052
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53052-fs-create-kiocb_-start-end-_write-helpers.patch
- From: 5.15.0-133.144
- CVE-2024-53066, CVSSv2 Score: 5.5
- Description:
nfs: Fix KMSAN warning in decode_getfattr_attrs()
- CVE: https://ubuntu.com/security/CVE-2024-53066
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53066-nfs-fix-kmsan-warning-in-decode-getfattr-attrs.patch
- From: 5.15.0-133.144
- CVE-2024-53101, CVSSv2 Score: 5.5
- Description:
fs: Fix uninitialized value issue in from_kuid and from_kgid
- CVE: https://ubuntu.com/security/CVE-2024-53101
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53101-fs-fix-uninitialized-value-issue-in-from-kuid-and-from-kgid.patch
- From: 5.15.0-133.144
- CVE-2024-53042, CVSSv2 Score: 5.5
- Description:
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()
- CVE: https://ubuntu.com/security/CVE-2024-53042
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53042-ipv4-ip-tunnel-fix-suspicious-rcu-usage-warning-in-ip-tunnel-init-flow.patch
- From: 5.15.0-133.144
- CVE-2024-50185, CVSSv2 Score: 5.5
- Description:
mptcp: handle consistently DSS corruption
- CVE: https://ubuntu.com/security/CVE-2024-50185
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-50185-mptcp-handle-consistently-DSS-corruption.patch
- From: 5.15.0-133.144
- CVE-2024-53088, CVSSv2 Score: 5.5
- Description:
i40e: fix race condition by adding filter's intermediate sync state
- CVE: https://ubuntu.com/security/CVE-2024-53088
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53088-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state.patch
- From: 5.15.0-133.144
- CVE-2024-53088, CVSSv2 Score: 5.5
- Description:
i40e: fix race condition by adding filter's intermediate sync state
- CVE: https://ubuntu.com/security/CVE-2024-53088
- Patch: ubuntu-jammy/5.15.0-133.144/CVE-2024-53088-i40e-fix-race-condition-by-adding-filter-s-intermediate-sync-state-kpatch.patch
- From: 5.15.0-133.144
- CVE-2024-49996, CVSSv2 Score: 7.8
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://ubuntu.com/security/CVE-2024-49996
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points.patch
- From: 5.15.0-135.146
- CVE-2024-50055, CVSSv2 Score: 7.8
- Description:
driver core: bus: Fix double free in driver API bus_register()
- CVE: https://ubuntu.com/security/CVE-2024-50055
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50055-driver-core-bus-fix-double-free-in-driver-api-bus-register.patch
- From: 5.15.0-135.146
- CVE-2024-50051, CVSSv2 Score: 7.8
- Description:
spi: mpc52xx: Add cancel_work_sync before module remove
- CVE: https://ubuntu.com/security/CVE-2024-50051
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50051-spi-mpc52xx-add-cancel-work-sync-before-module-remove.patch
- From: 5.15.0-135.146
- CVE-2024-47730, CVSSv2 Score: 7.8
- Description:
crypto: hisilicon/qm - inject error before stopping queue
- CVE: https://ubuntu.com/security/CVE-2024-47730
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47730-crypto-hisilicon-qm-inject-error-before-stopping-queue.patch
- From: 5.15.0-135.146
- CVE-2024-50121, CVSSv2 Score: 7.8
- Description:
nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
- CVE: https://ubuntu.com/security/CVE-2024-50121
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50121-nfsd-cancel-nfsd-shrinker-work-using-sync-mode-in-nfs4-state-shutdown-net.patch
- From: 5.15.0-135.146
- CVE-2024-43900, CVSSv2 Score: 7.8
- Description:
media: xc2028: avoid use-after-free in load_firmware_cb()
- CVE: https://ubuntu.com/security/CVE-2024-43900
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-43900-media-xc2028-avoid-use-after-free-in-load-firmware-cb.patch
- From: 5.15.0-135.146
- CVE-2024-50242, CVSSv2 Score: 7.8
- Description:
fs/ntfs3: Additional check in ntfs_file_release
- CVE: https://ubuntu.com/security/CVE-2024-50242
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50242-fs-ntfs3-additional-check-in-ntfs-file-release.patch
- From: 5.15.0-135.146
- CVE-2024-56619, CVSSv2 Score: 7.8
- Description:
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
- CVE: https://ubuntu.com/security/CVE-2024-56619
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56619-nilfs2-fix-potential-out-of-bounds-memory-access-in-nilfs-find-entry.patch
- From: 5.15.0-135.146
- CVE-2024-56615, CVSSv2 Score: 7.8
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56615
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 5.15.0-135.146
- CVE-2024-56614, CVSSv2 Score: 7.8
- Description:
xsk: fix OOB map writes when deleting elements
- CVE: https://ubuntu.com/security/CVE-2024-56614
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56614-xsk-fix-oob-map-writes-when-deleting-elements.patch
- From: 5.15.0-135.146
- CVE-2024-56606, CVSSv2 Score: 7.8
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56606
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 5.15.0-135.146
- CVE-2024-56605, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://ubuntu.com/security/CVE-2024-56605
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.15.0-135.146
- CVE-2024-56603, CVSSv2 Score: 7.8
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://ubuntu.com/security/CVE-2024-56603
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.15.0-135.146
- CVE-2024-56602, CVSSv2 Score: 7.8
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://ubuntu.com/security/CVE-2024-56602
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.15.0-135.146
- CVE-2024-56601, CVSSv2 Score: 7.8
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://ubuntu.com/security/CVE-2024-56601
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.15.0-135.146
- CVE-2024-56626, CVSSv2 Score: 7.8
- Description:
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
- CVE: https://ubuntu.com/security/CVE-2024-56626
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56626-ksmbd-fix-out-of-bounds-write-in-ksmbd-vfs-stream-write.patch
- From: 5.15.0-135.146
- CVE-2024-57896, CVSSv2 Score: 7.8
- Description:
btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount
- CVE: https://ubuntu.com/security/CVE-2024-57896
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57896-btrfs-flush-delalloc-workers-queue-before-stopping-cleaner-kthread-during-unmount.patch
- From: 5.15.0-135.146
- CVE-2024-57900, CVSSv2 Score: 7.8
- Description:
ila: serialize calls to nf_register_net_hooks()
- CVE: https://ubuntu.com/security/CVE-2024-57900
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57900-ila-serialize-calls-to-nf-register-net-hooks.patch
- From: 5.15.0-135.146
- CVE-2025-21631, CVSSv2 Score: 7.8
- Description:
block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()
- CVE: https://ubuntu.com/security/CVE-2025-21631
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21631-block-bfq-fix-waker-bfqq-uaf-after-bfq-split-bfqq.patch
- From: 5.15.0-135.146
- CVE-2025-21680, CVSSv2 Score: 7.8
- Description:
pktgen: Avoid out-of-bounds access in get_imix_entries
- CVE: https://ubuntu.com/security/CVE-2025-21680
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21680-pktgen-avoid-out-of-bounds-access-in-get-imix-entries.patch
- From: 5.15.0-135.146
- CVE-2025-21687, CVSSv2 Score: 7.8
- Description:
vfio/platform: check the bounds of read/write syscalls
- CVE: https://ubuntu.com/security/CVE-2025-21687
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21687-vfio-platform-check-the-bounds-of-read-write-syscalls.patch
- From: 5.15.0-135.146
- CVE-2025-21692, CVSSv2 Score: 7.8
- Description:
net: sched: fix ets qdisc OOB Indexing
- CVE: https://ubuntu.com/security/CVE-2025-21692
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21692-net-sched-fix-ets-qdisc-oob-indexing.patch
- From: 5.15.0-135.146
- CVE-2024-53150, CVSSv2 Score: 7.1
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://ubuntu.com/security/CVE-2024-53150
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.15.0-135.146
- CVE-2024-53155, CVSSv2 Score: 7.1
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://ubuntu.com/security/CVE-2024-53155
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 5.15.0-135.146
- CVE-2024-56650, CVSSv2 Score: 7.1
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://ubuntu.com/security/CVE-2024-56650
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 5.15.0-135.146
- CVE-2024-50275, CVSSv2 Score: 7.0
- Description:
arm64/sve: Discard stale CPU state when handling SVE traps
- CVE: https://ubuntu.com/security/CVE-2024-50275
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50275-arm64-sve-discard-stale-cpu-state-when-handling-sve-traps.patch
- From: 5.15.0-135.146
- CVE-2024-56662, CVSSv2 Score: 7.1
- Description:
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
- CVE: https://ubuntu.com/security/CVE-2024-56662
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56662-acpi-nfit-vmalloc-out-of-bounds-read-in-acpi-nfit-ctl.patch
- From: 5.15.0-135.146
- CVE-2024-56627, CVSSv2 Score: 7.1
- Description:
ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
- CVE: https://ubuntu.com/security/CVE-2024-56627
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56627-ksmbd-fix-out-of-bounds-read-in-ksmbd-vfs-stream-read.patch
- From: 5.15.0-135.146
- CVE-2024-57925, CVSSv2 Score: 7.1
- Description:
ksmbd: fix a missing return value check bug
- CVE: https://ubuntu.com/security/CVE-2024-57925
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57925-ksmbd-fix-a-missing-return-value-check-bug.patch
- From: 5.15.0-135.146
- CVE-2024-57912, CVSSv2 Score: 7.1
- Description:
iio: pressure: zpa2326: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57912
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57912-iio-pressure-zpa2326-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57911, CVSSv2 Score: 7.1
- Description:
iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57911
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57911-iio-dummy-iio-simply-dummy-buffer-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57910, CVSSv2 Score: 7.1
- Description:
iio: light: vcnl4035: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57910
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57910-iio-light-vcnl4035-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57908, CVSSv2 Score: 7.1
- Description:
iio: imu: kmx61: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57908
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57908-iio-imu-kmx61-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-57906, CVSSv2 Score: 7.1
- Description:
iio: adc: ti-ads8688: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57906
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57906-iio-adc-ti-ads8688-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-36899, CVSSv2 Score: 7.0
- Description:
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
- CVE: https://ubuntu.com/security/CVE-2024-36899
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-36899-gpiolib-cdev-fix-use-after-free-in-lineinfo-changed-notify.patch
- From: 5.15.0-135.146
- CVE-2024-57907, CVSSv2 Score: 7.1
- Description:
iio: adc: rockchip_saradc: fix information leak in triggered buffer
- CVE: https://ubuntu.com/security/CVE-2024-57907
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57907-iio-adc-rockchip-saradc-fix-information-leak-in-triggered-buffer.patch
- From: 5.15.0-135.146
- CVE-2024-53135, CVSSv2 Score: 6.5
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135, CVSSv2 Score: 6.5
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch-uek7.patch
- From: 5.15.0-305.176.4.el9uek
- CVE-2022-49034, CVSSv2 Score:
- Description:
Out of scope: SuperH arch not supported.
- CVE:
- Patch: skipped/CVE-2022-49034.patch
- From:
- CVE-2024-57874, CVSSv2 Score: 6.1
- Description:
arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL
- CVE: https://ubuntu.com/security/CVE-2024-57874
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57874-arm64-ptrace-fix-partial-setregset-for-nt-arm-tagged-addr-ctrl.patch
- From: 5.15.0-135.146
- CVE-2024-45828, CVSSv2 Score: 5.5
- Description:
i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request
- CVE: https://ubuntu.com/security/CVE-2024-45828
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-45828-i3c-mipi-i3c-hci-mask-ring-interrupts-before-ring-stop-request.patch
- From: 5.15.0-135.146
- CVE-2024-43098, CVSSv2 Score: 5.5
- Description:
i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock
- CVE: https://ubuntu.com/security/CVE-2024-43098
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-43098-i3c-use-i3cdev-desc-info-instead-of-calling-i3c-device-get-info-to-avoid-deadlock.patch
- From: 5.15.0-135.146
- CVE-2024-46809, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Check BIOS images before it is used
- CVE: https://ubuntu.com/security/CVE-2024-46809
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46809-drm-amd-display-check-bios-images-before-it-is-used.patch
- From: 5.15.0-135.146
- CVE-2024-42315, CVSSv2 Score: 5.5
- Description:
exfat: fix potential deadlock on __exfat_get_dentry_set
- CVE: https://ubuntu.com/security/CVE-2024-42315
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-42315-exfat-fix-potential-deadlock-on-exfat-get-dentry-set.patch
- From: 5.15.0-135.146
- CVE-2024-36476, CVSSv2 Score: 5.5
- Description:
RDMA/rtrs: Ensure 'ib_sge list' is accessible
- CVE: https://ubuntu.com/security/CVE-2024-36476
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-36476-rdma-rtrs-ensure-ib-sge-list-is-accessible.patch
- From: 5.15.0-135.146
- CVE-2024-44938, CVSSv2 Score: 5.5
- Description:
jfs: Fix shift-out-of-bounds in dbDiscardAG
- CVE: https://ubuntu.com/security/CVE-2024-44938
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-44938-jfs-fix-shift-out-of-bounds-in-dbdiscardag.patch
- From: 5.15.0-135.146
- CVE-2024-53158, CVSSv2 Score: 4.4
- Description:
soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()
- CVE: https://ubuntu.com/security/CVE-2024-53158
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53158-soc-qcom-geni-se-fix-array-underflow-in-geni-se-clk-tbl-get.patch
- From: 5.15.0-135.146
- CVE-2025-21683, CVSSv2 Score: 5.5
- Description:
bpf: Fix bpf_sk_select_reuseport() memory leak
- CVE: https://ubuntu.com/security/CVE-2025-21683
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21683-bpf-fix-bpf-sk-select-reuseport-memory-leak.patch
- From: 5.15.0-135.146
- CVE-2025-21678, CVSSv2 Score: 5.5
- Description:
gtp: Destroy device along with udp socket's netns dismantle.
- CVE: https://ubuntu.com/security/CVE-2025-21678
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21678-gtp-destroy-device-along-with-udp-socket-s-netns-dismantle.patch
- From: 5.15.0-135.146
- CVE-2025-21697, CVSSv2 Score: 5.5
- Description:
drm/v3d: Ensure job pointer is set to NULL after job completion
- CVE: https://ubuntu.com/security/CVE-2025-21697
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21697-drm-v3d-ensure-job-pointer-is-set-to-null-after-job-completion.patch
- From: 5.15.0-135.146
- CVE-2025-21697, CVSSv2 Score: 5.5
- Description:
drm/v3d: Assign job pointer to NULL before signaling the fence
- CVE: https://ubuntu.com/security/CVE-2025-21697
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21697-drm-v3d-Assign-job-pointer-to-NULL-before-signaling-the-fence.patch
- From: 5.15.0-135.146
- CVE-2025-21694, CVSSv2 Score: 5.5
- Description:
fs/proc: fix softlockup in __read_vmcore (part 2)
- CVE: https://ubuntu.com/security/CVE-2025-21694
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21694-fs-proc-fix-softlockup-in-read-vmcore-part-2.patch
- From: 5.15.0-135.146
- CVE-2025-21669, CVSSv2 Score: 5.5
- Description:
vsock/virtio: discard packets if the transport changes
- CVE: https://ubuntu.com/security/CVE-2025-21669
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21669-vsock-virtio-discard-packets-if-the-transport-changes.patch
- From: 5.15.0-135.146
- CVE-2025-21699, CVSSv2 Score: 5.5
- Description:
gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
- CVE: https://ubuntu.com/security/CVE-2025-21699
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21699-gfs2-truncate-address-space-when-flipping-gfs2-dif-jdata-flag.patch
- From: 5.15.0-135.146
- CVE-2025-21690, CVSSv2 Score: 5.5
- Description:
scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
- CVE: https://ubuntu.com/security/CVE-2025-21690
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21690-scsi-storvsc-ratelimit-warning-logs-to-prevent-vm-denial-of-service.patch
- From: 5.15.0-135.146
- CVE-2025-21689, CVSSv2 Score: 5.5
- Description:
USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
- CVE: https://ubuntu.com/security/CVE-2025-21689
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21689-usb-serial-quatech2-fix-null-ptr-deref-in-qt2-process-read-urb.patch
- From: 5.15.0-135.146
- CVE-2024-49950, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix uaf in l2cap_connect
- CVE: https://ubuntu.com/security/CVE-2024-49950
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49950-Bluetooth-L2CAP-Fix-uaf-in-l2cap_connect.patch
- From: 5.15.0-135.146
- CVE-2024-49950, CVSSv2 Score: 7.8
- Description:
Bluetooth: hci_core: Fix calling mgmt_device_connected
- CVE: https://ubuntu.com/security/CVE-2024-49950
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49950-Bluetooth-hci_core-Fix-calling-mgmt_device_connected.patch
- From: 5.15.0-135.146
- CVE-2024-57951, CVSSv2 Score: 7.8
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://ubuntu.com/security/CVE-2024-57951
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57951-hrtimers-Handle-CPU-state-correctly-on-hotplug.patch
- From: 5.15.0-135.146
- CVE-2024-57951, CVSSv2 Score: 7.8
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://ubuntu.com/security/CVE-2024-57951
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57951-hrtimers-Handle-CPU-state-correctly-on-hotplug-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-53161, CVSSv2 Score: 5.5
- Description:
EDAC/bluefield: Fix potential integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-53161
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53161-edac-bluefield-fix-potential-integer-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-53157, CVSSv2 Score: 5.5
- Description:
firmware: arm_scpi: Check the DVFS OPP count returned by the firmware
- CVE: https://ubuntu.com/security/CVE-2024-53157
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53157-firmware-arm-scpi-check-the-dvfs-opp-count-returned-by-the-firmware.patch
- From: 5.15.0-135.146
- CVE-2024-53214, CVSSv2 Score: 5.5
- Description:
vfio/pci: Properly hide first-in-list PCIe extended capability
- CVE: https://ubuntu.com/security/CVE-2024-53214
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53214-vfio-pci-properly-hide-first-in-list-pcie-extended-capability.patch
- From: 5.15.0-135.146
- CVE-2024-53198, CVSSv2 Score: 5.5
- Description:
xen: Fix the issue of resource not being properly released in xenbus_dev_probe()
- CVE: https://ubuntu.com/security/CVE-2024-53198
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53198-xen-fix-the-issue-of-resource-not-being-properly-released-in-xenbus-dev-probe.patch
- From: 5.15.0-135.146
- CVE-2024-53197, CVSSv2 Score: 5.5
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53197-alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
- From: 5.15.0-135.146
- CVE-2024-53197, CVSSv2 Score: 5.5
- Description:
ALSA: usb-audio: Fix a DMA to stack memory bug
- CVE: https://ubuntu.com/security/CVE-2024-53197
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53197-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch
- From: 5.15.0-135.146
- CVE-2024-53184, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53184.patch
- From:
- CVE-2024-53183, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53183.patch
- From:
- CVE-2024-53181, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53181.patch
- From:
- CVE-2024-53180, CVSSv2 Score: 5.5
- Description:
ALSA: pcm: Add sanity NULL check for the default mmap fault handler
- CVE: https://ubuntu.com/security/CVE-2024-53180
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53180-alsa-pcm-add-sanity-null-check-for-the-default-mmap-fault-handler.patch
- From: 5.15.0-135.146
- CVE-2024-53172, CVSSv2 Score: 5.5
- Description:
ubi: fastmap: Fix duplicate slab cache names while attaching
- CVE: https://ubuntu.com/security/CVE-2024-53172
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53172-ubi-fastmap-fix-duplicate-slab-cache-names-while-attaching.patch
- From: 5.15.0-135.146
- CVE-2024-56708, CVSSv2 Score: 7.8
- Description:
EDAC/igen6: Avoid segmentation fault on module unload
- CVE: https://ubuntu.com/security/CVE-2024-56708
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56708-edac-igen6-avoid-segmentation-fault-on-module-unload.patch
- From: 5.15.0-135.146
- CVE-2024-56678, CVSSv2 Score:
- Description:
powerpc: arch is not supported
- CVE:
- Patch: skipped/CVE-2024-56678.patch
- From:
- CVE-2024-56704, CVSSv2 Score: 7.8
- Description:
9p/xen: fix release of IRQ
- CVE: https://ubuntu.com/security/CVE-2024-56704
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 5.15.0-135.146
- CVE-2024-56642, CVSSv2 Score: 7.8
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://ubuntu.com/security/CVE-2024-56642
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.15.0-135.146
- CVE-2024-56640, CVSSv2 Score: 7.8
- Description:
net/smc: fix LGR and link use-after-free issue
- CVE: https://ubuntu.com/security/CVE-2024-56640
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56640-net-smc-fix-lgr-and-link-use-after-free-issue.patch
- From: 5.15.0-135.146
- CVE-2024-57850, CVSSv2 Score: 7.8
- Description:
jffs2: Prevent rtime decompress memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-57850
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57850-jffs2-prevent-rtime-decompress-memory-corruption.patch
- From: 5.15.0-135.146
- CVE-2024-56759, CVSSv2 Score: 7.8
- Description:
btrfs: fix use-after-free when COWing tree bock and tracing is enabled
- CVE: https://ubuntu.com/security/CVE-2024-56759
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56759-btrfs-fix-use-after-free-when-cowing-tree-bock-and-tracing-is-enabled.patch
- From: 5.15.0-135.146
- CVE-2024-57892, CVSSv2 Score: 7.8
- Description:
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
- CVE: https://ubuntu.com/security/CVE-2024-57892
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57892-ocfs2-fix-slab-use-after-free-due-to-dangling-pointer-dqi-priv.patch
- From: 5.15.0-135.146
- CVE-2024-56631, CVSSv2 Score: 7.8
- Description:
scsi: sg: Fix slab-use-after-free read in sg_release()
- CVE: https://ubuntu.com/security/CVE-2024-56631
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56631-scsi-sg-fix-slab-use-after-free-read-in-sg-release.patch
- From: 5.15.0-135.146
- CVE-2024-58087, CVSSv2 Score: 8.1
- Description:
ksmbd: fix user-after-free from session log off
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-58087-ksmbd-fix-user-after-free-from-session-log-off-upto-131.141.patch
- From: 5.15.0-135.146
- CVE-2024-58087, CVSSv2 Score: 8.1
- Description:
ksmbd: fix user-after-free from session log off
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-58087-ksmbd-fix-user-after-free-from-session-log-off-kpatch-upto-131.141.patch
- From: 5.15.0-135.146
- CVE-2024-58087, CVSSv2 Score: 8.1
- Description:
ksmbd: fix racy issue from session lookup and expire
- CVE: https://ubuntu.com/security/CVE-2024-58087
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-58087-ksmbd-fix-racy-issue-from-session-lookup-and-expire-upto-131.141.patch
- From: 5.15.0-135.146
- CVE-2024-46841, CVSSv2 Score: 5.5
- Description:
btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()
- CVE: https://ubuntu.com/security/CVE-2024-46841
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46841-btrfs-don-t-bug-on-on-enomem-from-btrfs-lookup-extent-info-in-walk-down-proc.patch
- From: 5.15.0-135.146
- CVE-2024-47143, CVSSv2 Score: 5.5
- Description:
dma-debug: fix a possible deadlock on radix_lock
- CVE: https://ubuntu.com/security/CVE-2024-47143
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47143-dma-debug-fix-a-possible-deadlock-on-radix-lock.patch
- From: 5.15.0-135.146
- CVE-2024-47408, CVSSv2 Score: 5.5
- Description:
net/smc: check smcd_v2_ext_offset when receiving proposal msg
- CVE: https://ubuntu.com/security/CVE-2024-47408
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47408-net-smc-check-smcd-v2-ext-offset-when-receiving-proposal-msg.patch
- From: 5.15.0-135.146
- CVE-2024-47707, CVSSv2 Score: 5.5
- Description:
ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
- CVE: https://ubuntu.com/security/CVE-2024-47707
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-47707-ipv6-avoid-possible-null-deref-in-rt6-uncached-list-flush-dev.patch
- From: 5.15.0-135.146
- CVE-2024-48881, CVSSv2 Score: 5.5
- Description:
bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again
- CVE: https://ubuntu.com/security/CVE-2024-48881
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-48881-bcache-revert-replacing-is-err-or-null-with-is-err-again.patch
- From: 5.15.0-135.146
- CVE-2024-49571, CVSSv2 Score: 5.5
- Description:
net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg
- CVE: https://ubuntu.com/security/CVE-2024-49571
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49571-net-smc-check-iparea-offset-and-ipv6-prefixes-cnt-when-receiving-proposal-msg.patch
- From: 5.15.0-135.146
- CVE-2024-49998, CVSSv2 Score: 5.5
- Description:
net: dsa: improve shutdown sequence
- CVE: https://ubuntu.com/security/CVE-2024-49998
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-49998-net-dsa-improve-shutdown-sequence.patch
- From: 5.15.0-135.146
- CVE-2024-50304, CVSSv2 Score: 5.5
- Description:
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
- CVE: https://ubuntu.com/security/CVE-2024-50304
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-50304-ipv4-ip-tunnel-fix-suspicious-rcu-usage-warning-in-ip-tunnel-find.patch
- From: 5.15.0-135.146
- CVE-2025-21648, CVSSv2 Score: 5.5
- Description:
netfilter: conntrack: clamp maximum hashtable size to INT_MAX
- CVE: https://ubuntu.com/security/CVE-2025-21648
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21648-netfilter-conntrack-clamp-maximum-hashtable-size-to-int-max.patch
- From: 5.15.0-135.146
- CVE-2025-21646, CVSSv2 Score: 5.5
- Description:
afs: Fix the maximum cell name length
- CVE: https://ubuntu.com/security/CVE-2025-21646
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21646-afs-fix-the-maximum-cell-name-length.patch
- From: 5.15.0-135.146
- CVE-2025-21664, CVSSv2 Score: 5.5
- Description:
dm thin: make get_first_thin use rcu-safe list first function
- CVE: https://ubuntu.com/security/CVE-2025-21664
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21664-dm-thin-make-get-first-thin-use-rcu-safe-list-first-function.patch
- From: 5.15.0-135.146
- CVE-2025-21640, CVSSv2 Score: 5.5
- Description:
sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21640
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21640-sctp-sysctl-cookie-hmac-alg-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21639, CVSSv2 Score: 5.5
- Description:
sctp: sysctl: rto_min/max: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21639
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21639-sctp-sysctl-rto-min-max-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21638, CVSSv2 Score: 5.5
- Description:
sctp: sysctl: auth_enable: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21638
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21638-sctp-sysctl-auth-enable-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21637, CVSSv2 Score: 5.5
- Description:
sctp: sysctl: udp_port: avoid using current->nsproxy
- CVE: https://ubuntu.com/security/CVE-2025-21637
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21637-sctp-sysctl-udp-port-avoid-using-current-nsproxy.patch
- From: 5.15.0-135.146
- CVE-2025-21666, CVSSv2 Score: 5.5
- Description:
vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
- CVE: https://ubuntu.com/security/CVE-2025-21666
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21666-vsock-prevent-null-ptr-deref-in-vsock-has-data-has-space.patch
- From: 5.15.0-135.146
- CVE-2025-21665, CVSSv2 Score: 5.5
- Description:
filemap: avoid truncating 64-bit offset to 32 bits
- CVE: https://ubuntu.com/security/CVE-2025-21665
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21665-filemap-avoid-truncating-64-bit-offset-to-32-bits.patch
- From: 5.15.0-135.146
- CVE-2025-21653, CVSSv2 Score: 5.5
- Description:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
- CVE: https://ubuntu.com/security/CVE-2025-21653
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21653-net-sched-cls-flow-validate-tca-flow-rshift-attribute.patch
- From: 5.15.0-135.146
- CVE-2025-21653, CVSSv2 Score: 5.5
- Description:
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (adaptation)
- CVE: https://ubuntu.com/security/CVE-2025-21653
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2025-21653-net-sched-cls-flow-validate-tca-flow-rshift-attribute-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-57902, CVSSv2 Score: 5.5
- Description:
af_packet: fix vlan_get_tci() vs MSG_PEEK
- CVE: https://ubuntu.com/security/CVE-2024-57902
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57902-af-packet-fix-vlan-get-tci-vs-msg-peek.patch
- From: 5.15.0-135.146
- CVE-2024-57897, CVSSv2 Score: 5.5
- Description:
drm/amdkfd: Correct the migration DMA map direction
- CVE: https://ubuntu.com/security/CVE-2024-57897
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57897-drm-amdkfd-correct-the-migration-dma-map-direction.patch
- From: 5.15.0-135.146
- CVE-2024-57884, CVSSv2 Score: 5.5
- Description:
mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()
- CVE: https://ubuntu.com/security/CVE-2024-57884
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57884-mm-vmscan-account-for-free-pages-to-prevent-infinite-loop-in-throttle-direct-reclaim.patch
- From: 5.15.0-135.146
- CVE-2024-57913, CVSSv2 Score: 5.5
- Description:
usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
- CVE: https://ubuntu.com/security/CVE-2024-57913
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57913-usb-gadget-f-fs-remove-warn-on-in-functionfs-bind.patch
- From: 5.15.0-135.146
- CVE-2024-57904, CVSSv2 Score:
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-57904.patch
- From:
- CVE-2024-57882, CVSSv2 Score: 5.5
- Description:
mptcp: fix TCP options overflow.
- CVE: https://ubuntu.com/security/CVE-2024-57882
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57882-mptcp-fix-tcp-options-overflow.patch
- From: 5.15.0-135.146
- CVE-2024-56693, CVSSv2 Score: 7.8
- Description:
brd: remove brd_devices_mutex mutex
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56693-brd-remove-brd_devices_mutex-mutex-dep.patch
- From: 5.15.0-135.146
- CVE-2024-56693, CVSSv2 Score: 7.8
- Description:
brd: defer automatic disk creation until module initialization succeeds
- CVE: https://ubuntu.com/security/CVE-2024-56693
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56693-brd-defer-automatic-disk-creation-until-module-initialization-succeeds.patch
- From: 5.15.0-135.146
- CVE-2024-46871, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
- CVE: https://ubuntu.com/security/CVE-2024-46871
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46871-drm-amd-display-Correct-the-defined-value-for-AMDGPU_DMUB_NOTIFICATION_MAX.patch
- From: 5.15.0-135.146
- CVE-2024-46871, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
- CVE: https://ubuntu.com/security/CVE-2024-46871
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-46871-drm-amd-display-Correct-the-defined-value-for-AMDGPU_DMUB_NOTIFICATION_MAX-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-56548, CVSSv2 Score: 7.8
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times.patch
- From: 5.15.0-135.146
- CVE-2024-56548, CVSSv2 Score: 7.8
- Description:
hfsplus: don't query the device logical block size multiple times
- CVE: https://ubuntu.com/security/CVE-2024-56548
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56548-hfsplus-don-t-query-the-device-logical-block-size-multiple-times-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-52332, CVSSv2 Score: 5.5
- Description:
igb: Fix potential invalid memory access in igb_init_module()
- CVE: https://ubuntu.com/security/CVE-2024-52332
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-52332-igb-fix-potential-invalid-memory-access-in-igb-init-module.patch
- From: 5.15.0-135.146
- CVE-2024-53112, CVSSv2 Score: 5.5
- Description:
ocfs2: uncache inode which has failed entering the group
- CVE: https://ubuntu.com/security/CVE-2024-53112
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53112-ocfs2-uncache-inode-which-has-failed-entering-the-group.patch
- From: 5.15.0-135.146
- CVE-2024-53113, CVSSv2 Score: 5.5
- Description:
mm: fix NULL pointer dereference in alloc_pages_bulk_noprof
- CVE: https://ubuntu.com/security/CVE-2024-53113
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53113-mm-fix-null-pointer-dereference-in-alloc-pages-bulk-noprof.patch
- From: 5.15.0-135.146
- CVE-2024-53119, CVSSv2 Score: 5.5
- Description:
virtio/vsock: Fix accept_queue memory leak
- CVE: https://ubuntu.com/security/CVE-2024-53119
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53119-virtio-vsock-fix-accept-queue-memory-leak.patch
- From: 5.15.0-135.146
- CVE-2024-53120, CVSSv2 Score: 5.5
- Description:
net/mlx5e: CT: Fix null-ptr-deref in add rule err flow
- CVE: https://ubuntu.com/security/CVE-2024-53120
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53120-net-mlx5e-ct-fix-null-ptr-deref-in-add-rule-err-flow.patch
- From: 5.15.0-135.146
- CVE-2024-53121, CVSSv2 Score: 5.5
- Description:
net/mlx5: fs, lock FTE when checking if active
- CVE: https://ubuntu.com/security/CVE-2024-53121
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53121-net-mlx5-fs-lock-fte-when-checking-if-active.patch
- From: 5.15.0-135.146
- CVE-2024-53122, CVSSv2 Score: 5.5
- Description:
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
- CVE: https://ubuntu.com/security/CVE-2024-53122
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53122-mptcp-cope-racing-subflow-creation-in-mptcp-rcv-space-adjust.patch
- From: 5.15.0-135.146
- CVE-2024-53124, CVSSv2 Score: 5.5
- Description:
net: fix data-races around sk->sk_forward_alloc
- CVE: https://ubuntu.com/security/CVE-2024-53124
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53124-net-fix-data-races-around-sk-sk-forward-alloc.patch
- From: 5.15.0-135.146
- CVE-2024-53127, CVSSv2 Score: 5.5
- Description:
Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"
- CVE: https://ubuntu.com/security/CVE-2024-53127
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53127-revert-mmc-dw-mmc-fix-idmac-operation-with-pages-bigger-than-4k.patch
- From: 5.15.0-135.146
- CVE-2024-57889, CVSSv2 Score: 5.5
- Description:
pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking
- CVE: https://ubuntu.com/security/CVE-2024-57889
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57889-pinctrl-mcp23s08-fix-sleeping-in-atomic-context-due-to-regmap-locking.patch
- From: 5.15.0-135.146
- CVE-2024-57889, CVSSv2 Score: 5.5
- Description:
pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-57889
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57889-pinctrl-mcp23s08-fix-sleeping-in-atomic-context-due-to-regmap-locking-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-57890, CVSSv2 Score: 5.5
- Description:
RDMA/uverbs: Prevent integer overflow issue
- CVE: https://ubuntu.com/security/CVE-2024-57890
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57890-rdma-uverbs-prevent-integer-overflow-issue.patch
- From: 5.15.0-135.146
- CVE-2024-57903, CVSSv2 Score: 5.5
- Description:
net: restrict SO_REUSEPORT to inet sockets
- CVE: https://ubuntu.com/security/CVE-2024-57903
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57903-net-restrict-so-reuseport-to-inet-sockets.patch
- From: 5.15.0-135.146
- CVE-2024-53239, CVSSv2 Score: 7.8
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://ubuntu.com/security/CVE-2024-53239
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53239-alsa-6fire-release-resources-at-card-release.patch
- From: 5.15.0-135.146
- CVE-2024-53237, CVSSv2 Score: 7.8
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://ubuntu.com/security/CVE-2024-53237
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child.patch
- From: 5.15.0-135.146
- CVE-2024-53237, CVSSv2 Score: 7.8
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://ubuntu.com/security/CVE-2024-53237
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-53227, CVSSv2 Score: 7.8
- Description:
scsi: bfa: Fix use-after-free in bfad_im_module_exit()
- CVE: https://ubuntu.com/security/CVE-2024-53227
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-53227-scsi-bfa-fix-use-after-free-in-bfad-im-module-exit.patch
- From: 5.15.0-135.146
- CVE-2024-56581, CVSSv2 Score: 7.8
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://ubuntu.com/security/CVE-2024-56581
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 5.15.0-135.146
- CVE-2024-56558, CVSSv2 Score: 7.8
- Description:
nfsd: make sure exp active before svc_export_show
- CVE: https://ubuntu.com/security/CVE-2024-56558
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56558-nfsd-make-sure-exp-active-before-svc-export-show.patch
- From: 5.15.0-135.146
- CVE-2024-56600, CVSSv2 Score: 7.8
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://ubuntu.com/security/CVE-2024-56600
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.15.0-135.146
- CVE-2024-56598, CVSSv2 Score: 7.8
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://ubuntu.com/security/CVE-2024-56598
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 5.15.0-135.146
- CVE-2024-56596, CVSSv2 Score: 7.8
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://ubuntu.com/security/CVE-2024-56596
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.15.0-135.146
- CVE-2024-56595, CVSSv2 Score: 7.8
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2024-56595
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-135.146
- CVE-2024-57901, CVSSv2 Score: 5.5
- Description:
af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK
- CVE: https://ubuntu.com/security/CVE-2024-57901
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57901-af-packet-fix-vlan-get-protocol-dgram-vs-msg-peek.patch
- From: 5.15.0-135.146
- CVE-2024-57901, CVSSv2 Score: 5.5
- Description:
af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-57901
- Patch: ubuntu-jammy/5.15.0-135.146/CVE-2024-57901-af-packet-fix-vlan-get-protocol-dgram-vs-msg-peek-kpatch.patch
- From: 5.15.0-135.146
- CVE-2024-56658, CVSSv2 Score: 7.8
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle.patch
- From: 5.15.0-136.147
- CVE-2024-56658, CVSSv2 Score: 7.8
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://ubuntu.com/security/CVE-2024-56658
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch.patch
- From: 5.15.0-136.147
- CVE-2024-35864, CVSSv2 Score: 7.8
- Description:
smb: client: fix potential UAF in smb2_is_valid_lease_break()
- CVE: https://ubuntu.com/security/CVE-2024-35864
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-35864-smb-client-fix-potential-uaf-in-smb2-is-valid-lease-break.patch
- From: 5.15.0-136.147
- CVE-2024-35864 CVE-2024-26928, CVSSv2 Score: 7.8
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://ubuntu.com/security/CVE-2024-26928
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-26928-CVE-2024-35864-smb-client-fix-potential-uaf-in-cifs-debug-files-proc-show.patch
- From: 5.15.0-136.147
- CVE-2024-57798, CVSSv2 Score: 7.8
- Description:
drm/dp_mst: Skip CSN if topology probing is not done yet
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-57798-drm-dp-mst-skip-csn-if-topology-probing-is-not-done-yet.patch
- From: 5.15.0-136.147
- CVE-2024-57798, CVSSv2 Score: 7.8
- Description:
drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()
- CVE: https://ubuntu.com/security/CVE-2024-57798
- Patch: ubuntu-jammy/5.15.0-136.147/CVE-2024-57798-drm-dp-mst-ensure-mst-primary-pointer-is-valid-in-drm-dp-mst-handle-up-req.patch
- From: 5.15.0-136.147
- CVE-2025-21701, CVSSv2 Score: 5.5
- Description:
net: avoid race between device unregistration and ethnl ops
- CVE: https://ubuntu.com/security/CVE-2025-21701
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21701-net-avoid-race-between-device-unregistration-and-ethnl-ops.patch
- From: 5.15.0-138.148
- CVE-2022-0995, CVSSv2 Score: 7.8
- Description:
watch_queue: Use the bitmap API when applicable
- CVE: https://ubuntu.com/security/CVE-2022-0995
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2022-0995-watch-queue-use-the-bitmap-api-when-applicable.patch
- From: 5.15.0-138.148
- CVE-2024-50248, CVSSv2 Score: 5.5
- Description:
ntfs3: Add bounds checking to mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-50248
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50248-ntfs3-add-bounds-checking-to-mi-enum-attr.patch
- From: 5.15.0-138.148
- CVE-2024-50248, CVSSv2 Score: 5.5
- Description:
fs/ntfs3: Sequential field availability check in mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-50248
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50248-fs-ntfs3-sequential-field-availability-check-in-mi-enum-attr.patch
- From: 5.15.0-138.148
- CVE-2025-21993, CVSSv2 Score: 7.1
- Description:
iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
- CVE: https://ubuntu.com/security/CVE-2025-21993
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21993-iscsi-ibft-fix-ubsan-shift-out-of-bounds-warning-in-ibft-attr-show-nic.patch
- From: 5.15.0-138.148
- CVE-2024-56651, CVSSv2 Score: 7.8
- Description:
can: hi311x: hi3110_can_ist(): fix potential use-after-free
- CVE: https://ubuntu.com/security/CVE-2024-56651
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-56651-can-hi311x-hi3110-can-ist-fix-potential-use-after-free.patch
- From: 5.15.0-138.148
- CVE-2024-46826, CVSSv2 Score: 5.5
- Description:
ELF: fix kernel.randomize_va_space double read
- CVE: https://ubuntu.com/security/CVE-2024-46826
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-46826-elf-fix-kernel-randomize-va-space-double-read.patch
- From: 5.15.0-138.148
- CVE-2025-21700, CVSSv2 Score: 7.8
- Description:
net: sched: Disallow replacing of child qdisc from one parent to another
- CVE: https://ubuntu.com/security/CVE-2025-21700
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21700-net-sched-disallow-replacing-of-child-qdisc-from-one-parent-to-another.patch
- From: 5.15.0-138.148
- CVE-2025-21702, CVSSv2 Score: 5.5
- Description:
pfifo_tail_enqueue: Drop new packet when sch->limit == 0
- CVE: https://ubuntu.com/security/CVE-2025-21702
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21702-pfifo-tail-enqueue-drop-new-packet-when-sch-limit-0.patch
- From: 5.15.0-138.148
- CVE-2024-50256, CVSSv2 Score: 5.5
- Description:
netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
- CVE: https://ubuntu.com/security/CVE-2024-50256
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-50256-netfilter-nf-reject-ipv6-fix-potential-crash-in-nf-send-reset6.patch
- From: 5.15.0-138.148
- CVE-2025-21756, CVSSv2 Score: 7.8
- Description:
vsock: Keep the binding until socket destruction
- CVE: https://ubuntu.com/security/CVE-2025-21756
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21756-vsock-keep-the-binding-until-socket-destruction.patch
- From: 5.15.0-138.148
- CVE-2025-21756, CVSSv2 Score: 7.8
- Description:
vsock: Orphan socket after transport release
- CVE: https://ubuntu.com/security/CVE-2025-21756
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2025-21756-vsock-orphan-socket-after-transport-release.patch
- From: 5.15.0-138.148
- CVE-2024-26837, CVSSv2 Score: 5.5
- Description:
net: bridge: switchdev: Skip MDB replays of deferred events on offload
- CVE: https://ubuntu.com/security/CVE-2024-26837
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-26837-net-bridge-switchdev-skip-mdb-replays-of-deferred-events-on-offload.patch
- From: 5.15.0-138.148
- CVE-2024-26837, CVSSv2 Score: 5.5
- Description:
net: bridge: switchdev: Skip MDB replays of deferred events on offload (adapatation)
- CVE: https://ubuntu.com/security/CVE-2024-26837
- Patch: ubuntu-jammy/5.15.0-138.148/CVE-2024-26837-net-bridge-switchdev-skip-mdb-replays-of-deferred-events-on-offload-kpatch.patch
- From: 5.15.0-138.148
- CVE-2023-52927, CVSSv2 Score: 5.5
- Description:
netfilter: allow exp not to be removed in nf_ct_find_expectation
- CVE: https://ubuntu.com/security/CVE-2023-52927
- Patch: ubuntu-jammy/5.15.0-139.149/CVE-2023-52927-netfilter-allow-exp-not-to-be-removed-in-nf-ct-find-expectation.patch
- From: 5.15.0-139.149
- CVE-2023-52664, CVSSv2 Score: 7.8
- Description:
net: atlantic: eliminate double free in error handling logic
- CVE: https://ubuntu.com/security/CVE-2023-52664
- Patch: ubuntu-jammy/5.15.0-139.149/CVE-2023-52664-net-atlantic-eliminate-double-free-in-error-handling-logic.patch
- From: 5.15.0-139.149
- CVE-2025-21718, CVSSv2 Score: 7.0
- Description:
net: rose: fix timer races against user threads
- CVE: https://ubuntu.com/security/CVE-2025-21718
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21718-net-rose-fix-timer-races-against-user-threads.patch
- From: 5.15.0-140.150
- CVE-2024-58007, CVSSv2 Score: 7.1
- Description:
soc: qcom: socinfo: Avoid out of bounds read of serial number
- CVE: https://ubuntu.com/security/CVE-2024-58007
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58007-soc-qcom-socinfo-avoid-out-of-bounds-read-of-serial-number-5.15.0-134.145.patch
- From: 5.15.0-140.150
- CVE-2025-21782, CVSSv2 Score: 7.1
- Description:
orangefs: fix a oob in orangefs_debug_write
- CVE: https://ubuntu.com/security/CVE-2025-21782
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21782-orangefs-fix-a-oob-in-orangefs-debug-write.patch
- From: 5.15.0-140.150
- CVE-2025-21905, CVSSv2 Score: 7.1
- Description:
wifi: iwlwifi: limit printed string from FW file
- CVE: https://ubuntu.com/security/CVE-2025-21905
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21905-wifi-iwlwifi-limit-printed-string-from-fw-file.patch
- From: 5.15.0-140.150
- CVE-2025-21727, CVSSv2 Score: 7.8
- Description:
padata: fix UAF in padata_reorder
- CVE: https://ubuntu.com/security/CVE-2025-21727
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21727-padata-fix-UAF-in-padata_reorder.patch
- From: 5.15.0-140.150
- CVE-2024-58034, CVSSv2 Score:
- Description:
Out of scope; patch fixes the memory controller module for Nvidia Tegra SoCs.
- CVE:
- Patch: skipped/CVE-2024-58034.patch
- From:
- CVE-2024-58069, CVSSv2 Score: 7.8
- Description:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
- CVE: https://ubuntu.com/security/CVE-2024-58069
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58069-rtc-pcf85063-fix-potential-oob-write-in-pcf85063-nvmem-read.patch
- From: 5.15.0-140.150
- CVE-2025-21715, CVSSv2 Score:
- Description:
The DM9000 chip is available on ARM32 and MIPS architectures, which KernelCare does not support.
- CVE:
- Patch: skipped/CVE-2025-21715.patch
- From:
- CVE-2024-57980, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://ubuntu.com/security/CVE-2024-57980
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 5.15.0-140.150
- CVE-2024-58055, CVSSv2 Score: 7.8
- Description:
usb: gadget: f_tcm: Don't free command immediately
- CVE: https://ubuntu.com/security/CVE-2024-58055
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58055-usb-gadget-f-tcm-don-t-free-command-immediately.patch
- From: 5.15.0-140.150
- CVE-2024-58083, CVSSv2 Score: 7.8
- Description:
KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
- CVE: https://ubuntu.com/security/CVE-2024-58083
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58083-kvm-explicitly-verify-target-vcpu-is-online-in-kvm-get-vcpu.patch
- From: 5.15.0-140.150
- CVE-2025-21722, CVSSv2 Score: 7.8
- Description:
nilfs2: do not force clear folio if buffer is referenced
- CVE: https://ubuntu.com/security/CVE-2025-21722
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21722-nilfs2-do-not-force-clear-folio-if-buffer-is-referenced.patch
- From: 5.15.0-140.150
- CVE-2024-57979, CVSSv2 Score:
- Description:
PPS for embedded GPS devices. Irrelevant for servers.
- CVE:
- Patch: skipped/CVE-2024-57979.patch
- From:
- CVE-2025-21731, CVSSv2 Score: 7.8
- Description:
nbd: don't allow reconnect after disconnect
- CVE: https://ubuntu.com/security/CVE-2025-21731
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21731-nbd-don-t-allow-reconnect-after-disconnect.patch
- From: 5.15.0-140.150
- CVE-2025-21753, CVSSv2 Score: 7.8
- Description:
btrfs: fix use-after-free when attempting to join an aborted transaction
- CVE: https://ubuntu.com/security/CVE-2025-21753
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21753-btrfs-fix-use-after-free-when-attempting-to-join-an-aborted-transaction.patch
- From: 5.15.0-140.150
- CVE-2025-21735, CVSSv2 Score: 7.8
- Description:
NFC: nci: Add bounds checking in nci_hci_create_pipe()
- CVE: https://ubuntu.com/security/CVE-2025-21735
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21735-nfc-nci-add-bounds-checking-in-nci-hci-create-pipe.patch
- From: 5.15.0-140.150
- CVE-2025-21785, CVSSv2 Score:
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2025-21764, CVSSv2 Score: 7.8
- Description:
ndisc: use RCU protection in ndisc_alloc_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21764
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21764-ndisc-use-rcu-protection-in-ndisc-alloc-skb.patch
- From: 5.15.0-140.150
- CVE-2025-21763, CVSSv2 Score: 7.8
- Description:
neighbour: use RCU protection in __neigh_notify()
- CVE: https://ubuntu.com/security/CVE-2025-21763
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21763-neighbour-use-rcu-protection-in-neigh-notify.patch
- From: 5.15.0-140.150
- CVE-2025-21762, CVSSv2 Score: 7.8
- Description:
arp: use RCU protection in arp_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-21762
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21762-arp-use-rcu-protection-in-arp-xmit.patch
- From: 5.15.0-140.150
- CVE-2025-21761, CVSSv2 Score: 7.8
- Description:
openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
- CVE: https://ubuntu.com/security/CVE-2025-21761
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21761-openvswitch-use-rcu-protection-in-ovs-vport-cmd-fill-info.patch
- From: 5.15.0-140.150
- CVE-2025-21760, CVSSv2 Score: 7.8
- Description:
ndisc: extend RCU protection in ndisc_send_skb()
- CVE: https://ubuntu.com/security/CVE-2025-21760
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21760-ndisc-extend-rcu-protection-in-ndisc-send-skb.patch
- From: 5.15.0-140.150
- CVE-2025-21796, CVSSv2 Score: 7.8
- Description:
nfsd: clear acl_access/acl_default after releasing them
- CVE: https://ubuntu.com/security/CVE-2025-21796
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21796-nfsd-clear-acl-access-acl-default-after-releasing-them.patch
- From: 5.15.0-140.150
- CVE-2025-21791, CVSSv2 Score: 7.8
- Description:
vrf: use RCU protection in l3mdev_l3_out()
- CVE: https://ubuntu.com/security/CVE-2025-21791
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21791-vrf-use-rcu-protection-in-l3mdev-l3-out.patch
- From: 5.15.0-140.150
- CVE-2025-21811, CVSSv2 Score: 7.8
- Description:
nilfs2: protect access to buffers with no active references
- CVE: https://ubuntu.com/security/CVE-2025-21811
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21811-nilfs2-protect-access-to-buffers-with-no-active-references.patch
- From: 5.15.0-140.150
- CVE-2025-21858, CVSSv2 Score: 7.8
- Description:
geneve: Fix use-after-free in geneve_find_dev().
- CVE: https://ubuntu.com/security/CVE-2025-21858
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21858-geneve-fix-use-after-free-in-geneve-find-dev.patch
- From: 5.15.0-140.150
- CVE-2025-21887, CVSSv2 Score: 7.8
- Description:
ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up
- CVE: https://ubuntu.com/security/CVE-2025-21887
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21887-ovl-fix-uaf-in-ovl-dentry-update-reval-by-moving-dput-in-ovl-link-up.patch
- From: 5.15.0-140.150
- CVE-2025-21934, CVSSv2 Score: 7.8
- Description:
rapidio: fix an API misues when rio_add_net() fails
- CVE: https://ubuntu.com/security/CVE-2025-21934
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21934-rapidio-fix-an-api-misues-when-rio-add-net-fails.patch
- From: 5.15.0-140.150
- CVE-2025-21928, CVSSv2 Score: 7.8
- Description:
HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
- CVE: https://ubuntu.com/security/CVE-2025-21928
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21928-hid-intel-ish-hid-fix-use-after-free-issue-in-ishtp-hid-remove.patch
- From: 5.15.0-140.150
- CVE-2025-21919, CVSSv2 Score: 7.8
- Description:
sched/fair: Fix potential memory corruption in child_cfs_rq_on_list
- CVE: https://ubuntu.com/security/CVE-2025-21919
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21919-sched-fair-fix-potential-memory-corruption-in-child-cfs-rq-on-list.patch
- From: 5.15.0-140.150
- CVE-2024-26982, CVSSv2 Score: 7.1
- Description:
Squashfs: check the inode number is not the invalid value of zero
- CVE: https://ubuntu.com/security/CVE-2024-26982
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-26982-squashfs-check-the-inode-number-is-not-the-invalid-value-of-zero.patch
- From: 5.15.0-140.150
- CVE-2024-56721, CVSSv2 Score: 7.1
- Description:
x86/CPU/AMD: Terminate the erratum_1386_microcode array
- CVE: https://ubuntu.com/security/CVE-2024-56721
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-56721-x86-cpu-amd-terminate-the-erratum-1386-microcode-array.patch
- From: 5.15.0-140.150
- CVE-2024-57986, CVSSv2 Score: 5.5
- Description:
HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections
- CVE: https://ubuntu.com/security/CVE-2024-57986
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57986-hid-core-fix-assumption-that-resolution-multipliers-must-be-in-logical-collections.patch
- From: 5.15.0-140.150
- CVE-2024-57973, CVSSv2 Score: 5.5
- Description:
rdma/cxgb4: Prevent potential integer overflow on 32bit
- CVE: https://ubuntu.com/security/CVE-2024-57973
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57973-rdma-cxgb4-prevent-potential-integer-overflow-on-32bit.patch
- From: 5.15.0-140.150
- CVE-2024-57981, CVSSv2 Score: 5.5
- Description:
usb: xhci: Fix NULL pointer dereference on certain command aborts
- CVE: https://ubuntu.com/security/CVE-2024-57981
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57981-usb-xhci-fix-null-pointer-dereference-on-certain-command-aborts.patch
- From: 5.15.0-140.150
- CVE-2024-58001, CVSSv2 Score: 5.5
- Description:
ocfs2: handle a symlink read error correctly
- CVE: https://ubuntu.com/security/CVE-2024-58001
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58001-ocfs2-handle-a-symlink-read-error-correctly.patch
- From: 5.15.0-140.150
- CVE-2024-57834, CVSSv2 Score: 5.5
- Description:
media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread
- CVE: https://ubuntu.com/security/CVE-2024-57834
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57834-media-vidtv-fix-a-null-ptr-deref-in-vidtv-mux-stop-thread.patch
- From: 5.15.0-140.150
- CVE-2024-47726, CVSSv2 Score: 6.5
- Description:
f2fs: fix to wait dio completion
- CVE: https://ubuntu.com/security/CVE-2024-47726
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-47726-f2fs-fix-to-wait-dio-completion.patch
- From: 5.15.0-140.150
- CVE-2024-58005, CVSSv2 Score: 5.5
- Description:
tpm: Change to kvalloc() in eventlog/acpi.c
- CVE: https://ubuntu.com/security/CVE-2024-58005
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58005-tpm-change-to-kvalloc-in-eventlog-acpi-c.patch
- From: 5.15.0-140.150
- CVE-2024-56599, CVSSv2 Score: 5.5
- Description:
wifi: ath10k: avoid NULL pointer error during sdio remove
- CVE: https://ubuntu.com/security/CVE-2024-56599
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-56599-wifi-ath10k-avoid-null-pointer-error-during-sdio-remove.patch
- From: 5.15.0-140.150
- CVE-2025-21920, CVSSv2 Score: 7.1
- Description:
vlan: enforce underlying device type
- CVE: https://ubuntu.com/security/CVE-2025-21920
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21920-vlan-enforce-underlying-device-type.patch
- From: 5.15.0-140.150
- CVE-2025-21920, CVSSv2 Score: 7.1
- Description:
vlan: enforce underlying device type
- CVE: https://ubuntu.com/security/CVE-2025-21920
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21920-vlan-enforce-underlying-device-type-kpatch.patch
- From: 5.15.0-140.150
- CVE-2025-21898, CVSSv2 Score: 5.5
- Description:
ftrace: Avoid potential division by zero in function_stat_show()
- CVE: https://ubuntu.com/security/CVE-2025-21898
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21898-ftrace-avoid-potential-division-by-zero-in-function-stat-show.patch
- From: 5.15.0-140.150
- CVE-2025-21912, CVSSv2 Score:
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-21912.patch
- From:
- CVE-2025-21910, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: regulatory: improve invalid hints checking
- CVE: https://ubuntu.com/security/CVE-2025-21910
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21910-wifi-cfg80211-regulatory-improve-invalid-hints-checking.patch
- From: 5.15.0-140.150
- CVE-2025-21909, CVSSv2 Score: 5.5
- Description:
wifi: nl80211: reject cooked mode if it is set along with other flags
- CVE: https://ubuntu.com/security/CVE-2025-21909
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21909-wifi-nl80211-reject-cooked-mode-if-it-is-set-along-with-other-flags.patch
- From: 5.15.0-140.150
- CVE-2025-21904, CVSSv2 Score: 5.5
- Description:
caif_virtio: fix wrong pointer check in cfv_probe()
- CVE: https://ubuntu.com/security/CVE-2025-21904
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21904-caif-virtio-fix-wrong-pointer-check-in-cfv-probe.patch
- From: 5.15.0-140.150
- CVE-2025-21925, CVSSv2 Score: 5.5
- Description:
llc: do not use skb_get() before dev_queue_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-21925
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21925-llc-do-not-use-skb-get-before-dev-queue-xmit.patch
- From: 5.15.0-140.150
- CVE-2025-21922, CVSSv2 Score: 5.5
- Description:
ppp: Fix KMSAN uninit-value warning with bpf
- CVE: https://ubuntu.com/security/CVE-2025-21922
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21922-ppp-fix-kmsan-uninit-value-warning-with-bpf.patch
- From: 5.15.0-140.150
- CVE-2025-21917, CVSSv2 Score: 5.5
- Description:
usb: renesas_usbhs: Flush the notify_hotplug_work
- CVE: https://ubuntu.com/security/CVE-2025-21917
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21917-usb-renesas-usbhs-flush-the-notify-hotplug-work.patch
- From: 5.15.0-140.150
- CVE-2025-21916, CVSSv2 Score: 5.5
- Description:
usb: atm: cxacru: fix a flaw in existing endpoint checks
- CVE: https://ubuntu.com/security/CVE-2025-21916
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21916-usb-atm-cxacru-fix-a-flaw-in-existing-endpoint-checks.patch
- From: 5.15.0-140.150
- CVE-2025-21914, CVSSv2 Score: 5.5
- Description:
slimbus: messaging: Free transaction ID in delayed interrupt scenario
- CVE: https://ubuntu.com/security/CVE-2025-21914
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21914-slimbus-messaging-free-transaction-id-in-delayed-interrupt-scenario.patch
- From: 5.15.0-140.150
- CVE-2024-58002, CVSSv2 Score: 7.8
- Description:
[PATCH] media: uvcvideo: Only save async fh if success
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58002-media-uvcvideo-Only-save-async-fh-if-success.patch
- From: 5.15.0-140.150
- CVE-2024-58002, CVSSv2 Score: 7.8
- Description:
[PATCH] media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers.patch
- From: 5.15.0-140.150
- CVE-2024-58002, CVSSv2 Score: 7.8
- Description:
[PATCH] media: uvcvideo: Remove dangling pointers
- CVE: https://ubuntu.com/security/CVE-2024-58002
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-58002-media-uvcvideo-remove-dangling-pointers-kpatch.patch
- From: 5.15.0-140.150
- CVE-2024-57977, CVSSv2 Score: 5.5
- Description:
memcg: fix soft lockup in the OOM process
- CVE: https://ubuntu.com/security/CVE-2024-57977
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57977-memcg-fix-soft-lockup-in-the-oom-process.patch
- From: 5.15.0-140.150
- CVE-2024-57977, CVSSv2 Score: 5.5
- Description:
memcg: always call cond_resched() after fn()
- CVE: https://ubuntu.com/security/CVE-2024-57977
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57977-memcg-always-call-cond_resched-after-fn.patch
- From: 5.15.0-140.150
- CVE-2024-57977, CVSSv2 Score: 5.5
- Description:
memcg: fix soft lockup in the OOM process (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-57977
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2024-57977-memcg-fix-soft-lockup-in-the-oom-process-kpatch.patch
- From: 5.15.0-140.150
- CVE-2025-21859, CVSSv2 Score: 5.5
- Description:
USB: gadget: f_midi: f_midi_complete to call queue_work
- CVE: https://ubuntu.com/security/CVE-2025-21859
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21859-usb-gadget-f-midi-f-midi-complete-to-call-queue-work.patch
- From: 5.15.0-140.150
- CVE-2025-21866, CVSSv2 Score:
- Description:
Out of scope: PowerPC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21866.patch
- From:
- CVE-2025-21678, CVSSv2 Score: 5.5
- Description:
gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl().
- CVE: https://ubuntu.com/security/CVE-2025-21678
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21865-gtp-suppress-list-corruption-splat-in-gtp-net-exit-batch-rtnl-135.patch
- From: 5.15.0-140.150
- CVE-2025-21871, CVSSv2 Score: 5.5
- Description:
tee: optee: Fix supplicant wait loop
- CVE: https://ubuntu.com/security/CVE-2025-21871
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21871-tee-optee-fix-supplicant-wait-loop.patch
- From: 5.15.0-140.150
- CVE-2025-21862, CVSSv2 Score: 5.5
- Description:
drop_monitor: fix incorrect initialization order
- CVE: https://ubuntu.com/security/CVE-2025-21862
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21862-drop-monitor-fix-incorrect-initialization-order.patch
- From: 5.15.0-140.150
- CVE-2025-21848, CVSSv2 Score: 5.5
- Description:
nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
- CVE: https://ubuntu.com/security/CVE-2025-21848
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21848-nfp-bpf-add-check-for-nfp-app-ctrl-msg-alloc.patch
- From: 5.15.0-140.150
- CVE-2025-21878, CVSSv2 Score: 5.5
- Description:
i2c: npcm: disable interrupt enable bit before devm_request_irq
- CVE: https://ubuntu.com/security/CVE-2025-21878
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21878-i2c-npcm-disable-interrupt-enable-bit-before-devm-request-irq.patch
- From: 5.15.0-140.150
- CVE-2025-21877, CVSSv2 Score: 5.5
- Description:
usbnet: gl620a: fix endpoint checking in genelink_bind()
- CVE: https://ubuntu.com/security/CVE-2025-21877
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21877-usbnet-gl620a-fix-endpoint-checking-in-genelink-bind.patch
- From: 5.15.0-140.150
- CVE-2025-21875, CVSSv2 Score: 5.5
- Description:
mptcp: always handle address removal under msk socket lock
- CVE: https://ubuntu.com/security/CVE-2025-21875
- Patch: ubuntu-jammy/5.15.0-140.150/CVE-2025-21875-mptcp-always-handle-address-removal-under-msk-socket-lock.patch
- From: 5.15.0-140.150
- CVE-2024-56551, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://ubuntu.com/security/CVE-2024-56551
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 5.15.0-141.151
- CVE-2024-53168, CVSSv2 Score: 7.8
- Description:
sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket
- CVE: https://ubuntu.com/security/CVE-2024-53168
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-53168-sunrpc-fix-one-uaf-issue-caused-by-sunrpc-kernel-tcp-socket.patch
- From: 5.15.0-141.151
- CVE-2024-56608, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'
- CVE: https://ubuntu.com/security/CVE-2024-56608
- Patch: ubuntu-jammy/5.15.0-141.151/CVE-2024-56608-drm-amd-display-fix-out-of-bounds-access-in-dcn21-link-encoder-create.patch
- From: 5.15.0-141.151
- CVE-2025-21991, CVSSv2 Score: 7.8
- Description:
x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
- CVE: https://ubuntu.com/security/CVE-2025-21991
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21991-x86-microcode-amd-fix-out-of-bounds-on-systems-with-cpu-less-numa-nodes.patch
- From: 5.15.0-142.152
- CVE-2025-21968, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix slab-use-after-free on hdcp_work
- CVE: https://ubuntu.com/security/CVE-2025-21968
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21968-drm-amd-display-fix-slab-use-after-free-on-hdcp-work.patch
- From: 5.15.0-142.152
- CVE-2025-22004, CVSSv2 Score: 7.8
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://ubuntu.com/security/CVE-2025-22004
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22004-net-atm-fix-use-after-free-in-lec-send.patch
- From: 5.15.0-142.152
- CVE-2025-21999, CVSSv2 Score: 7.8
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://ubuntu.com/security/CVE-2025-21999
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode.patch
- From: 5.15.0-142.152
- CVE-2025-21999, CVSSv2 Score: 7.8
- Description:
proc: fix UAF in proc_get_inode()
- CVE: https://ubuntu.com/security/CVE-2025-21999
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-21999-proc-fix-uaf-in-proc-get-inode-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-53144 CVE-2024-8805, CVSSv2 Score: nan
- Description:
Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE
- CVE: https://ubuntu.com/security/CVE-2024-8805
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-53144-CVE-2024-8805-bluetooth-hci-event-align-br-edr-just-works-paring-with-le.patch
- From: 5.15.0-142.152
- CVE-2025-22020, CVSSv2 Score: 7.8
- Description:
memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
- CVE: https://ubuntu.com/security/CVE-2025-22020
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22020-memstick-rtsx-usb-ms-fix-slab-use-after-free-in-rtsx-usb-ms-drv-remove.patch
- From: 5.15.0-142.152
- CVE-2025-22055, CVSSv2 Score: 5.5
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://ubuntu.com/security/CVE-2025-22055
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow.patch
- From: 5.15.0-142.152
- CVE-2025-22055, CVSSv2 Score: 5.5
- Description:
net: fix geneve_opt length integer overflow
- CVE: https://ubuntu.com/security/CVE-2025-22055
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2025-22055-net-fix-geneve-opt-length-integer-overflow-kpatch.patch
- From: 5.15.0-142.152
- CVE-2024-46821, CVSSv2 Score: 7.8
- Description:
drm/amd/pm: Fix negative array index read
- CVE: https://ubuntu.com/security/CVE-2024-46821
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-46821-drm-amd-pm-fix-negative-array-index-read.patch
- From: 5.15.0-142.152
- CVE-2024-46812, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration
- CVE: https://ubuntu.com/security/CVE-2024-46812
- Patch: ubuntu-jammy/5.15.0-142.152/CVE-2024-46812-drm-amd-display-skip-inactive-planes-within-modesupportandsystemconfiguration.patch
- From: 5.15.0-142.152