- kernel-5.15.0-54.60 (ubuntu-jammy)
- 5.15.0-91.101
- 2024-01-24 11:30:40
- 2024-01-26 09:47:30
- K20240124_06
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: 5.15.0/CVE-2022-4378-0001-proc-proc_skip_spaces-shouldn-t-think-it-is-working-.patch
- From: 5.15.0-58.64
- CVE-2022-4378, CVSSv2 Score: 7.8
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: 5.15.0/CVE-2022-4378-0002-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: 5.15.0-58.64
- CVE-2022-45934, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: 5.15.0/CVE-2022-45934-0001-Bluetooth-L2CAP-Fix-u8-overflow.patch
- From: 5.15.0-58.64
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: 5.15.0/CVE-2022-42896-0001-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
- From: 5.15.0-58.64
- CVE-2022-42896, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: 5.15.0/CVE-2022-42896-0002-Bluetooth-L2CAP-Fix-l2cap_global_chan_by_psm.patch
- From: 5.15.0-58.64
- CVE-2022-3643, CVSSv2 Score: 10.0
- Description:
xen/netback: Ensure protocol headers don't fall in the non-linear area
- CVE: https://ubuntu.com/security/CVE-2022-3643
- Patch: 5.15.0/CVE-2022-3643-0001-xen-netback-Ensure-protocol-headers-don-t-fall-in-th.patch
- From: 5.15.0-58.64
- CVE-2022-1975, CVSSv2 Score: 4.5
- Description:
fix sleep in atomic bug when firmware download timeout
- CVE: https://access.redhat.com/security/cve/CVE-2022-1975
- Patch: 5.15.0/CVE-2022-1975.patch
- From: v5.19
- CVE-2022-47940, CVSSv2 Score: 8.1
- Description:
ksmbd: validate length in smb2_write()
- CVE: https://ubuntu.com/security/CVE-2022-47940
- Patch: 5.15.0/CVE-2022-47940-ksmbd-validate-length-in-smb2_write.patch
- From: n/a
- CVE-2022-3640, CVSSv2 Score: 8.8
- Description:
Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3640
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-3640-bluetooth-l2cap-fix-use-after-free-in-l2cap-conn-del.patch
- From: 5.15.0-60.66
- CVE-2022-3623, CVSSv2 Score: 7.5
- Description:
mm/hugetlb: fix races when looking up a CONT-PTE/PMD size
- CVE: https://ubuntu.com/security/CVE-2022-3623
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-3623-hugetlb-fix-races-when-looking-up-CONT-PTE-PMD-size-hugetlb-page.patch
- From: 5.15.0-60.66
- CVE-2022-3628, CVSSv2 Score: 6.8
- Description:
wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3628
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf.patch
- From: 5.15.0-60.66
- CVE-2022-42895, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
- CVE: https://linux.oracle.com/cve//CVE-2022-4378.html
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-42895-Bluetooth-L2CAP-Fix-attempting-to-access-uninitialized-memory.patch
- From: 5.15.0-60.66
- CVE-2022-3543, CVSSv2 Score: 4.3
- Description:
af_unix: Fix memory leaks of the whole sk due to OOB skb
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3543
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-3543-af_unix-fix-memory-leaks-of-the-whole-sk-due-to-OOB-skb.patch
- From: 5.15.0-60.66
- CVE-2022-41850, CVSSv2 Score: 4.7
- Description:
HID: roccat: Fix use-after-free in roccat_read()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-41850
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-41850-HID-roccat-Fix-use-after-free-in-roccat_read.patch
- From: 5.15.0-60.66
- CVE-2022-3619, CVSSv2 Score: 4.3
- Description:
Bluetooth: L2CAP: Fix memory leak in vhci_write
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3619
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-3619-bluetooth-L2CAP-fix-memory-leak-in-vhci_write.patch
- From: 5.15.0-60.66
- CVE-2022-41849, CVSSv2 Score: 4.2
- Description:
fbdev: smscufx: Fix use-after-free in ufx_ops_open()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-41849
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-41849-fbdev-smscufx-Fix-use-after-free-in-ufx_ops_open.patch
- From: 5.15.0-60.66
- CVE-2023-0590, CVSSv2 Score: 7.0
- Description:
net: sched: fix race condition in qdisc_graft()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-0590
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2023-0590-net-sched-fix-race-condition-in-qdisc_graft.patch
- From: 5.15.0-60.66
- CVE-2022-3169, CVSSv2 Score: 5.5
- Description:
nvme: ensure subsystem reset is single threaded
- CVE: https://ubuntu.com/security/CVE-2022-3169
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3169-nvme-ensure-subsystem-reset-is-single-threaded.patch
- From: 5.15.0-67.74
- CVE-2022-3344, CVSSv2 Score: 5.5
- Description:
[PATCH] KVM: x86: nSVM: leave nested mode on vCPU free
- CVE: https://ubuntu.com/security/CVE-2022-3344
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3344-0001-KVM-x86-nSVM-leave-nested-mode-on-vCPU-free.patch
- From: 5.15.0-67.74
- CVE-2022-3344, CVSSv2 Score: 5.5
- Description:
[PATCH] KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02
- CVE: https://ubuntu.com/security/CVE-2022-3344
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3344-0002-KVM-x86-nSVM-harden-svm_free_nested-against-freeing-.patch
- From: 5.15.0-67.74
- CVE-2022-3344, CVSSv2 Score: 5.5
- Description:
[PATCH] KVM: x86: forcibly leave nested mode on vCPU reset
- CVE: https://ubuntu.com/security/CVE-2022-3344
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3344-0003-KVM-x86-add-kvm_leave_nested.patch
- From: 5.15.0-67.74
- CVE-2022-3344, CVSSv2 Score: 5.5
- Description:
[PATCH] KVM: x86: forcibly leave nested mode on vCPU reset
- CVE: https://ubuntu.com/security/CVE-2022-3344
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3344-0004-KVM-x86-forcibly-leave-nested-mode-on-vCPU-reset.patch
- From: 5.15.0-67.74
- CVE-2022-3435, CVSSv2 Score: 4.3
- Description:
ipv4: Handle attempt to delete multipath route when fib_info
- CVE: https://ubuntu.com/security/CVE-2022-3435
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3435-0002-ipv4-Handle-attempt-to-delete-multipath-route-when-f.patch
- From: 5.15.0-67.74
- CVE-2022-3521, CVSSv2 Score: 2.5
- Description:
kcm: avoid potential race in kcm_tx_work
- CVE: https://ubuntu.com/security/CVE-2022-3521
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3521-kcm-avoid-potential-race-in-kcm_tx_work.patch
- From: 5.15.0-67.74
- CVE-2022-4139, CVSSv2 Score: 7.8
- Description:
drm/i915: fix TLB invalidation for Gen12 video and compute engines
- CVE: https://ubuntu.com/security/CVE-2022-4139
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-4139-0003-drm-i915-fix-TLB-invalidation-for-Gen12-video-and-co.patch
- From: 5.15.0-67.74
- ubuntu-jammy/5.15.0-67.74/CVE-2022-42328-CVE-2022-42329-0001-xen-netback-do-some-code-cleanup.patch, CVSSv2 Score:
- Description:
code from this cve inlined in sleepy thread 'xenvif_kthread_guest_rx' that we can't patch
- CVE:
- Patch: skipped/ubuntu-jammy/5.15.0-67.74/CVE-2022-42328-CVE-2022-42329-0001-xen-netback-do-some-code-cleanup.patch.patch
- From:
- ubuntu-jammy/5.15.0-67.74/CVE-2022-42328-CVE-2022-42329-0002-xen-netback-don-t-call-kfree_skb-with-interrupts-dis.patch, CVSSv2 Score:
- Description:
code from this cve inlined in sleepy thread 'xenvif_kthread_guest_rx' that we can't patch
- CVE:
- Patch: skipped/ubuntu-jammy/5.15.0-67.74/CVE-2022-42328-CVE-2022-42329-0002-xen-netback-don-t-call-kfree_skb-with-interrupts-dis.patch.patch
- From:
- CVE-2022-45869, CVSSv2 Score: 5.5
- Description:
KVM: x86/mmu: Fix race condition in direct_page_fault
- CVE: https://ubuntu.com/security/CVE-2022-45869
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-45869-KVM-x86-mmu-Fix-race-condition-in-direct_page_fault.patch
- From: 5.15.0-67.74
- CVE-2022-47518, CVSSv2 Score: 7.8
- Description:
wifi: wilc1000: validate number of channels
- CVE: https://ubuntu.com/security/CVE-2022-47518
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-47518-wifi-wilc1000-validate-number-of-channels.patch
- From: 5.15.0-67.74
- CVE-2022-47519, CVSSv2 Score: 7.8
- Description:
wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL
- CVE: https://ubuntu.com/security/CVE-2022-47519
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-47519-wifi-wilc1000-validate-length-of-IEEE80211_P2P_ATTR_.patch
- From: 5.15.0-67.74
- CVE-2022-47520, CVSSv2 Score: 7.1
- Description:
wifi: wilc1000: validate pairwise and authentication suite offsets
- CVE: https://ubuntu.com/security/CVE-2022-47520
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-47520-wifi-wilc1000-validate-pairwise-and-authentication-s.patch
- From: 5.15.0-67.74
- CVE-2022-47521, CVSSv2 Score: 7.8
- Description:
wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST
- CVE: https://ubuntu.com/security/CVE-2022-47521
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-47521-wifi-wilc1000-validate-length-of-IEEE80211_P2P_ATTR_.patch
- From: 5.15.0-67.74
- CVE-2022-3545, CVSSv2 Score: 7.8
- Description:
nfp: fix use-after-free in area_cache_get()
- CVE: https://ubuntu.com/security/CVE-2022-3545
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3545-nfp-fix-use-after-free-in-area_cache_get.patch
- From: 5.15.0-67.74
- CVE-2022-4379, CVSSv2 Score: 7.5
- Description:
NFSD: fix use-after-free in __nfs42_ssc_open()
- CVE: https://ubuntu.com/security/CVE-2022-4379
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-4379-NFSD-fix-use-after-free-in-__nfs42_ssc_open.patch
- From: 5.15.0-67.74
- CVE-2023-0179, CVSSv2 Score: 7.8
- Description:
netfilter: nft_payload: incorrect arithmetics when fetching
- CVE: https://ubuntu.com/security/CVE-2023-0179
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-0179-netfilter-nft_payload-incorrect-arithmetics-when-fet.patch
- From: 5.15.0-67.74
- CVE-2023-0461, CVSSv2 Score: 7.8
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://ubuntu.com/security/CVE-2023-0461
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-0461-0001-net-ulp-prevent-ULP-without-clone-op-from-entering-t.patch
- From: 5.15.0-67.74
- CVE-2023-0461, CVSSv2 Score: 7.8
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://ubuntu.com/security/CVE-2023-0461
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-0461-0002-net-ulp-use-consistent-error-code-when-blocking-ULP.patch
- From: 5.15.0-67.74
- CVE-2023-0461, CVSSv2 Score: 7.8
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://ubuntu.com/security/CVE-2023-0461
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-0461-0003-UBUNTU-SAUCE-Fix-inet_csk_listen_start-after-CVE-202.patch
- From: 5.15.0-67.74
- CVE-2023-0468, CVSSv2 Score: 4.7
- Description:
io_uring: make poll refs more robust
- CVE: https://ubuntu.com/security/CVE-2023-0468
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-0468-0001-io_uring-fix-tw-losing-poll-events.patch
- From: 5.15.0-67.74
- CVE-2023-0468, CVSSv2 Score: 4.7
- Description:
io_uring: make poll refs more robust
- CVE: https://ubuntu.com/security/CVE-2023-0468
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-0468-0002-io_uring-make-poll-refs-more-robust.patch
- From: 5.15.0-67.74
- CVE-2023-0468, CVSSv2 Score: 4.7
- Description:
io_uring/poll: fix poll_refs race with cancelation
- CVE: https://ubuntu.com/security/CVE-2023-0468
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-0468-0003-io_uring-poll-fix-poll_refs-race-with-cancelation.patch
- From: 5.15.0-67.74
- CVE-2023-26607, CVSSv2 Score: 7.1
- Description:
ntfs: fix use-after-free in ntfs_ucsncmp()
- CVE: https://ubuntu.com/security/CVE-2023-26607
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-26607-0002-ntfs-fix-out-of-bounds-read-in-ntfs_attr_find.patch
- From: 5.15.0-67.74
- CVE-2023-1195, CVSSv2 Score: 6.5
- Description:
cifs: fix use-after-free caused by invalid pointer `hostname`
- CVE: https://ubuntu.com/security/CVE-2023-1195
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-1195-cifs-fix-use-after-free-caused-by-invalid-pointer-ho.patch
- From: 5.15.0-67.74
- CVE-2023-1382, CVSSv2 Score: 4.7
- Description:
tipc: fix an information leak in tipc_topsrv_kern_subscr
- CVE: https://ubuntu.com/security/CVE-2023-1382
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-1382-0001-tipc-fix-an-information-leak-in-tipc_topsrv_kern_sub.patch
- From: 5.15.0-67.74
- CVE-2023-1382, CVSSv2 Score: 4.7
- Description:
tipc: fix an information leak in tipc_topsrv_kern_subscr
- CVE: https://ubuntu.com/security/CVE-2023-1382
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-1382-0002-tipc-set-con-sock-in-tipc_conn_alloc.patch
- From: 5.15.0-67.74
- CVE-2023-1382, CVSSv2 Score: 4.7
- Description:
tipc: fix an information leak in tipc_topsrv_kern_subscr
- CVE: https://ubuntu.com/security/CVE-2023-1382
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-1382-0003-tipc-add-an-extra-conn_get-in-tipc_conn_alloc.patch
- From: 5.15.0-67.74
- CVE-2022-2196, CVSSv2 Score: 8.8
- Description:
KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- CVE: https://ubuntu.com/security/CVE-2022-2196
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-2196-KVM-VMX-Execute-IBPB-on-emulated-VM-exit-when-guest-.patch
- From: 5.15.0-69.76
- CVE-2022-3424, CVSSv2 Score: 7.8
- Description:
gru: allow users to specify gru chiplet 2
- CVE: https://ubuntu.com/security/CVE-2022-3424
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-3424-misc-sgi-gru-fix-use-after-free-error-in-gru_set_con.patch
- From: 5.15.0-69.76
- CVE-2022-48423, CVSSv2 Score: 7.8
- Description:
fs/ntfs3: Validate resident attribute name
- CVE: https://ubuntu.com/security/CVE-2022-48423
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-48423-fs-ntfs3-Validate-resident-attribute-name.patch
- From: 5.15.0-69.76
- CVE-2022-48424, CVSSv2 Score: 7.8
- Description:
fs/ntfs3: Validate attribute name offset
- CVE: https://ubuntu.com/security/CVE-2022-48424
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-48424-fs-ntfs3-Validate-attribute-name-offset.patch
- From: 5.15.0-69.76
- CVE-2023-0045, CVSSv2 Score: 7.5
- Description:
x86/bugs: Flush IBP in ib_prctl_set()
- CVE: https://ubuntu.com/security/CVE-2023-0045
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-0045-x86-bugs-Flush-IBP-in-ib_prctl_set.patch
- From: 5.15.0-69.76
- CVE-2023-0210, CVSSv2 Score: 7.5
- Description:
ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in
- CVE: https://ubuntu.com/security/CVE-2023-0210
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-0210-ksmbd-check-nt_len-to-be-at-least-CIFS_ENCPWD_SIZE-i.patch
- From: 5.15.0-69.76
- CVE-2023-0266, CVSSv2 Score: 7.8
- Description:
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
- CVE: https://ubuntu.com/security/CVE-2023-0266
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-0266-ALSA-pcm-Move-rwsem-lock-inside-snd_ctl_elem_read-to.patch
- From: 5.15.0-69.76
- CVE-2023-23454, CVSSv2 Score: 5.5
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://ubuntu.com/security/CVE-2023-23454
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-23454--net-sched-cbq-dont-intepret-cls-results-when-asked-t.patch
- From: 5.15.0-69.76
- CVE-2023-23455, CVSSv2 Score: 5.5
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://ubuntu.com/security/CVE-2023-23455
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-t.patch
- From: 5.15.0-69.76
- CVE-2023-26544, CVSSv2 Score: 7.8
- Description:
[PATCH] fs/ntfs3: Validate data run offset
- CVE: https://ubuntu.com/security/CVE-2023-26544
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-26544-fs-ntfs3-Validate-data-run-offset.patch
- From: 5.15.0-69.76
- CVE-2023-26544, CVSSv2 Score: 7.8
- Description:
[PATCH] fs/ntfs3: Fix slab-out-of-bounds read in run_unpack
- CVE: https://ubuntu.com/security/CVE-2023-26544
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-26544-fs-ntfs3-Fix-slab-out-of-bounds-read-in-run_unpack.patch
- From: 5.15.0-69.76
- CVE-2023-26544, CVSSv2 Score: 7.8
- Description:
[PATCH] fs/ntfs3: Delete duplicate condition in ntfs_read_mft()
- CVE: https://ubuntu.com/security/CVE-2023-26544
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-26544-fs-ntfs3-Delete-duplicate-condition-in-ntfs_read_mft.patch
- From: 5.15.0-69.76
- CVE-2023-26606, CVSSv2 Score: 7.8
- Description:
[PATCH] fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs
- CVE: https://ubuntu.com/security/CVE-2023-26606
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-26606-fs-ntfs3-Fix-slab-out-of-bounds-read-in-ntfs_trim_fs.patch
- From: 5.15.0-69.76
- CVE-2023-28328, CVSSv2 Score: 5.5
- Description:
general protection fault in az6027_i2c_xfer
- CVE: https://ubuntu.com/security/CVE-2023-28328
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-28328-media-dvb-usb-az6027-fix-null-ptr-deref-in-az6027_i2.patch
- From: 5.15.0-69.76
- CVE-2022-36280, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Validate the box size for the snooped cursor
- CVE: https://ubuntu.com/security/CVE-2022-36280
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-36280-drm-vmwgfx-Validate-the-box-size-for-the-snooped-cur.patch
- From: 5.15.0-69.76
- CVE-2022-41218, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix UAF due to refcount races at releasing
- CVE: https://ubuntu.com/security/CVE-2022-41218
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-41218-media-dvb-core-Fix-UAF-due-to-refcount-races-at-rele.patch
- From: 5.15.0-69.76
- CVE-2022-4382, CVSSv2 Score: 6.4
- Description:
USB: gadgetfs: Fix race between mounting and unmounting
- CVE: https://ubuntu.com/security/CVE-2022-4382
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-4382-USB-gadgetfs-Fix-race-between-mounting-and-unmountin.patch
- From: 5.15.0-69.76
- CVE-2023-23559, CVSSv2 Score: 7.8
- Description:
wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
- CVE: https://ubuntu.com/security/CVE-2023-23559
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-23559-wifi-rndis_wlan-Prevent-buffer-overflow-in-rndis_que.patch
- From: 5.15.0-69.76
- CVE-2023-0386, CVSSv2 Score: 7.8
- Description:
ovl: fail on invalid uid/gid mapping at copy up
- CVE: https://ubuntu.com/security/CVE-2023-0386
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-0386-ovl-fail-on-invalid-uid-gid-mapping-at-copy-up.patch
- From: 5.15.0-70.77
- CVE-2023-1281, CVSSv2 Score: 7.8
- Description:
net/sched: tcindex: update imperfect hash filters respecting rcu
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1281
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-1281-net-sched-tcindex-update-imperfect-hash-filters-respecting-rcu.patch
- From: 5.15.0-70.77
- CVE-2023-1652, CVSSv2 Score: 7.1
- Description:
NFSD: fix use-after-free in nfsd4_ssc_setup_dul()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1652
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-1652-nfsd-fix-use-after-free-in-nfsd4_ssc_setup_dul.patch
- From: 5.15.0-70.77
- CVE-2023-1073, CVSSv2 Score: 6.6
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://ubuntu.com/security/CVE-2023-1073
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-1073-hid-check-empty-report_list-in-hid_validate_values.patch
- From: 5.15.0-70.77
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2022-4129-l2tp-Serialize-access-to-sk_user_data-with-sk_callback_lock.patch
- From: 5.15.0-70.77
- CVE-2022-4129, CVSSv2 Score: 5.5
- Description:
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2022-4129-l2tp-Don-t-sleep-and-disable-BH-under-writer-side-sk_callback_lock.patch
- From: 5.15.0-70.77
- CVE-2022-47929, CVSSv2 Score: 5.5
- Description:
net: sched: disallow noqueue for qdisc classes
- CVE: https://ubuntu.com/security/CVE-2022-47929
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2022-47929-net-sched-disallow-noqueue-for-qdisc-classes.patch
- From: 5.15.0-70.77
- CVE-2022-4842, CVSSv2 Score: 5.5
- Description:
fs/ntfs3: Fix attr_punch_hole() null pointer derenference
- CVE: https://ubuntu.com/security/CVE-2022-4842
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2022-4842-fs-ntfs3-fix-attr_punch_hole-null-pointer-derenference.patch
- From: 5.15.0-70.77
- CVE-2023-0394, CVSSv2 Score: 5.5
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://ubuntu.com/security/CVE-2023-0394
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-0394-ipv6-raw-deduct-extension-header-length-in-rawv6_push_pending_frames.patch
- From: 5.15.0-70.77
- CVE-2023-1074, CVSSv2 Score: 5.5
- Description:
sctp: fail if no bound addresses can be used for a given scope
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1074
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-given-scope.patch
- From: 5.15.0-70.77
- CVE-2023-26545, CVSSv2 Score: 7.8
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-26545.html
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: 5.15.0-70.77
- CVE-2023-1829, CVSSv2 Score:
- Description:
Complex adaptation is required, mainline retired tcindex.
- CVE:
- Patch: skipped/CVE-2023-1829.patch
- From:
- CVE-2023-1078, CVSSv2 Score: 7.8
- Description:
rds: rds_rm_zerocopy_callback() use list_first_entry()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-1078.html
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-1078-rds-rds_rm_zerocopy_callback-use-list_first_entry.patch
- From: 5.15.0-72.79
- CVE-2023-1118, CVSSv2 Score: 7.8
- Description:
[PATCH] media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
- CVE: https://ubuntu.com/security/CVE-2023-1118
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-1118-patch-media-rc-fix-use-after-free-bugs-caused-by-ene-tx-irqsim.patch
- From: 5.15.0-72.79
- CVE-2023-20938, CVSSv2 Score:
- Description:
Out of scope. Android related patch.
- CVE:
- Patch: skipped/CVE-2023-20938.patch
- From:
- CVE-2022-3707, CVSSv2 Score: 5.5
- Description:
drm/i915/gvt: fix double free bug in split_2MB_gtt_entry
- CVE: https://access.redhat.com/security/cve/CVE-2022-3707
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2022-3707-drm-i915-gvt-fix-double-free-bug-in-split_2MB_gtt_entry.patch
- From: 5.15.0-72.79
- CVE-2023-2162, CVSSv2 Score: 5.5
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost
- CVE: https://ubuntu.com/security/CVE-2023-2162
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-2162-patch-scsi-iscsi-tcp-fix-uaf-during-login-when-accessing-the.patch
- From: 5.15.0-72.79
- CVE-2022-27672, CVSSv2 Score: 5.6
- Description:
x86/speculation: Identify processors vulnerable to SMT RSB predictions
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: smt_rsb-enable.patch
- From: N/A
- CVE-2022-27672, CVSSv2 Score: 5.6
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug.patch
- From: 5.15.0-72.79
- CVE-2022-27672, CVSSv2 Score: 5.6
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug-kpatch.patch
- From: 5.15.0-72.79
- CVE-2023-1075, CVSSv2 Score: 3.3
- Description:
net/tls: tls_is_tx_ready() checked list_entry
- CVE: https://ubuntu.com/security/CVE-2023-1075
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-1075-net-tls-tls_is_tx_ready-checked-list_entry.patch
- From: 5.15.0-72.79
- CVE-2023-1513, CVSSv2 Score: 3.3
- Description:
kvm: initialize all of the kvm_debugregs structure before sending it
- CVE: https://ubuntu.com/security/CVE-2023-1513
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-1513-patch-kvm-initialize-all-of-the-kvm-debugregs-structure-before.patch
- From: 5.15.0-72.79
- CVE-2023-0459, CVSSv2 Score:
- Description:
Safety check failed for copy_from_user; zendesk:191568
- CVE:
- Patch: skipped/CVE-2023-0459.patch
- From:
- CVE-2023-32269, CVSSv2 Score: 6.7
- Description:
netrom: Fix use-after-free caused by accept on already connected
- CVE: https://ubuntu.com/security/CVE-2023-32269
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-32269-patch-netrom-fix-use-after-free-caused-by-accept-on-already.patch
- From: 5.15.0-72.79
- CVE-2023-3161, CVSSv2 Score: 5.5
- Description:
fbcon: Check font dimension limits
- CVE: https://ubuntu.com/security/CVE-2023-3161
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-3161-fbcon-check-font-dimension-limits.patch
- From: 5.15.0-72.79
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase
- CVE: https://ubuntu.com/security/CVE-2023-32233
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-32233-patch-netfilter-nf-tables-deactivate-anonymous-set-from.patch
- From: 5.15.0-73.80
- CVE-2023-31436, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://ubuntu.com/security/CVE-2023-31436
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-31436-patch-net-sched-sch-qfq-prevent-slab-out-of-bounds-in.patch
- From: 5.15.0-73.80
- CVE-2023-1380, CVSSv2 Score: 7.1
- Description:
wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
- CVE: https://ubuntu.com/security/CVE-2023-1380
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-1380-patch-wifi-brcmfmac-slab-out-of-bounds-read-in.patch
- From: 5.15.0-73.80
- CVE-2023-30456, CVSSv2 Score: 6.5
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://ubuntu.com/security/CVE-2023-30456
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-30456-patch-kvm-nvmx-add-missing-consistency-checks-for-cr0-and-cr4.patch
- From: 5.15.0-73.80
- CVE-2023-1670, CVSSv2 Score: 7.8
- Description:
xirc2ps_cs: Fix use after free bug in xirc2ps_detach
- CVE: https://ubuntu.com/security/CVE-2023-1670
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1670-xirc2ps_cs-fix-use-after-free-bug-in-xirc2ps_detach.patch
- From: 5.15.0-75.82
- CVE-2023-1077, CVSSv2 Score: 7.0
- Description:
sched/rt: pick_next_rt_entity(): check list_entry
- CVE: https://ubuntu.com/security/CVE-2023-1077
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1077-sched-rt-pick_next_rt_entity-check-list_entry.patch
- From: 5.15.0-75.82
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://ubuntu.com/security/CVE-2023-1079
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers.patch
- From: 5.15.0-75.82
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-1079
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers-kpatch.patch
- From: 5.15.0-75.82
- CVE-2023-1076, CVSSv2 Score: 5.5
- Description:
net: add sock_init_data_uid()
- CVE: https://ubuntu.com/security/CVE-2023-1076
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1076-net-add-sock_init_data_uid.patch
- From: 5.15.0-75.82
- CVE-2023-1076, CVSSv2 Score: 5.5
- Description:
tap: tap_open(): correctly initialize socket uid
- CVE: https://ubuntu.com/security/CVE-2023-1076
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1076-tap-tap_open-correctly-initialize-socket-uid.patch
- From: 5.15.0-75.82
- CVE-2023-1076, CVSSv2 Score: 5.5
- Description:
tun: tun_chr_open(): correctly initialize socket uid
- CVE: https://ubuntu.com/security/CVE-2023-1076
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1076-tun-tun_chr_open-correctly-initialize-socket-uid.patch
- From: 5.15.0-75.82
- CVE-2023-2985, CVSSv2 Score: 5.5
- Description:
fs: hfsplus: fix UAF issue in hfsplus_put_super
- CVE: https://ubuntu.com/security/CVE-2023-2985
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-2985-fs-hfsplus-fix-uaf-issue-in-hfsplus_put_super.patch
- From: 5.15.0-75.82
- CVE-2023-1859, CVSSv2 Score: 4.7
- Description:
9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2023-1859
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1859-9p-xen-fix-use-after-free-bug-in-xen_9pfs_front_remove-due-to-race-condition.patch
- From: 5.15.0-75.82
- CVE-2023-25012, CVSSv2 Score: 4.6
- Description:
HID: bigben: use spinlock to safely schedule workers
- CVE: https://ubuntu.com/security/CVE-2023-25012
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-25012-HID-bigben-use-spinlock-to-safely-schedule-workers.patch
- From: 5.15.0-75.82
- CVE-2023-25012, CVSSv2 Score: 4.6
- Description:
HID: bigben: use spinlock to safely schedule workers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-25012
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-25012-HID-bigben-use-spinlock-to-safely-schedule-workers-kpatch.patch
- From: 5.15.0-75.82
- CVE-2023-35788, CVSSv2 Score: 7.8
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://ubuntu.com/security/CVE-2023-35788
- Patch: ubuntu-jammy/5.15.0-76.83/CVE-2023-35788-patch-net-sched-flower-fix-possible-oob-write-in.patch
- From: 5.15.0-76.83
- CVE-2023-3389, CVSSv2 Score: 7.8
- Description:
io_uring: mutex locked poll hashing
- CVE: https://ubuntu.com/security/CVE-2023-3389
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-3389-patch-io-uring-hold-uring-mutex-around-poll-removal-1.patch
- From: 5.15.0-78.85
- CVE-2023-3439, CVSSv2 Score: 4.7
- Description:
mctp: defer the kfree of object mdev->addrs
- CVE: https://ubuntu.com/security/CVE-2023-3439
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-3439-patch-mctp-defer-the-kfree-of-object-mdev-addrs.patch
- From: 5.15.0-78.85
- CVE-2023-3390 CVE-2023-3117, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: incorrect error path handling with
- CVE: https://ubuntu.com/security/CVE-2023-3117
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-3117-CVE-2023-3390-patch-netfilter-nf-tables-incorrect-error-path-handling-with.patch
- From: 5.15.0-78.85
- CVE-2023-3090, CVSSv2 Score: 7.8
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://ubuntu.com/security/CVE-2023-3090
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-3090-patch-ipvlan-fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 5.15.0-78.85
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://ubuntu.com/security/CVE-2023-35001
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
- From: 5.15.0-78.85
- CVE-2023-31248, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: do not ignore genmask when looking up chain by id
- CVE: https://ubuntu.com/security/CVE-2023-31248
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-31248-netfilter-nf_tables-do-not-ignore-genmask-when-looking-up-chain-by-id.patch
- From: 5.15.0-78.85
- CVE-2023-1611, CVSSv2 Score: 6.3
- Description:
btrfs: fix race between quota disable and quota assign ioctls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-1611
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-1611-btrfs-fix-race-between-quota-disable-and-quota-assig.patch
- From: 5.15.0-79.86
- CVE-2023-1855, CVSSv2 Score: 6.3
- Description:
hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-1855
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-1855-hwmon-xgene-Fix-use-after-free-bug-in-xgene_hwmon_re.patch
- From: 5.15.0-79.86
- CVE-2023-1990, CVSSv2 Score: 4.7
- Description:
nfc: st-nci: Fix use after free bug in ndlc_remove due to race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-1990
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-1990-nfc-st-nci-Fix-use-after-free-bug-in-ndlc_remove-due.patch
- From: 5.15.0-79.86
- CVE-2023-2002, CVSSv2 Score: 6.8
- Description:
bluetooth: Perform careful capability checks in hci_sock_ioctl()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2002
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2002-bluetooth-Perform-careful-capability-checks-in-hci_s.patch
- From: 5.15.0-79.86
- CVE-2023-2124, CVSSv2 Score: 7.8
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2124
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2124-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: 5.15.0-79.86
- CVE-2023-2163, CVSSv2 Score: 10
- Description:
bpf: Fix incorrect verifier pruning due to missing register precision
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2163
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2163-bpf-Fix-incorrect-verifier-pruning-due-to-missing-re.patch
- From: 5.15.0-79.86
- CVE-2023-2194, CVSSv2 Score: 6.7
- Description:
i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2194
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_sli.patch
- From: 5.15.0-79.86
- CVE-2023-2235, CVSSv2 Score: 7.8
- Description:
perf: Fix check before add_event_to_groups() in perf_group_detach()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2235
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2235-perf-Fix-check-before-add_event_to_groups-in-perf_gr.patch
- From: 5.15.0-79.86
- CVE-2023-2269, CVSSv2 Score: 4.4
- Description:
dm ioctl: fix nested locking in table_clear() to remove deadlock concern
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2269
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2269-dm-ioctl-fix-nested-locking-in-table_clear-to-remove.patch
- From: 5.15.0-79.86
- CVE-2023-23004, CVSSv2 Score: 5.5
- Description:
malidp: Fix NULL vs IS_ERR() checking
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-23004
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-23004-malidp-Fix-NULL-vs-IS_ERR-checking.patch
- From: 5.15.0-79.86
- CVE-2023-28466, CVSSv2 Score: 7
- Description:
net: tls: fix possible race condition between
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-28466
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_g_kpatch.patch
- From: 5.15.0-79.86
- CVE-2023-30772, CVSSv2 Score: 6.4
- Description:
power: supply: da9150: Fix use after free bug in
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-30772
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-30772-power-supply-da9150-Fix-use-after-free-bug-in-da9150.patch
- From: 5.15.0-79.86
- CVE-2023-3141, CVSSv2 Score: 7.1
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-3141
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-3141-memstick-r592-Fix-UAF-bug-in-r592_remove-due-to-race.patch
- From: 5.15.0-79.86
- CVE-2023-32248, CVSSv2 Score: 7.5
- Description:
ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-32248
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-32248-ksmbd-fix-NULL-pointer-dereference-in-smb2_get_info_.patch
- From: 5.15.0-79.86
- CVE-2023-3268, CVSSv2 Score: 7.1
- Description:
relayfs: fix out-of-bounds access in relay_file_read
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-3268
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-3268-relayfs-fix-out-of-bounds-access-in-relay_file_read.patch
- From: 5.15.0-79.86
- CVE-2023-33203, CVSSv2 Score: 6.4
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-33203
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-33203-net-qcom-emac-Fix-use-after-free-bug-in-emac_remove-.patch
- From: 5.15.0-79.86
- CVE-2023-33288, CVSSv2 Score: 4.7
- Description:
power: supply: bq24190: Fix use after free bug in bq24190_remove due
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-33288
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-33288-power-supply-bq24190-Fix-use-after-free-bug-in-bq241_kpatch.patch
- From: 5.15.0-79.86
- CVE-2023-35823, CVSSv2 Score: 7
- Description:
media: saa7134: fix use after free bug in saa7134_finidev due to race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-35823
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-35823-media-saa7134-fix-use-after-free-bug-in-saa7134_fini.patch
- From: 5.15.0-79.86
- CVE-2023-35824, CVSSv2 Score: 7
- Description:
media: dm1105: Fix use after free bug in dm1105_remove due to race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-35824
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-35824-media-dm1105-Fix-use-after-free-bug-in-dm1105_remove.patch
- From: 5.15.0-79.86
- CVE-2023-35828, CVSSv2 Score: 7
- Description:
usb: gadget: udc: renesas_usb3: Fix use after free bug in
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-35828
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-35828-usb-gadget-udc-renesas_usb3-Fix-use-after-free-bug-i.patch
- From: 5.15.0-79.86
- CVE-2023-35829, CVSSv2 Score: 7
- Description:
media: rkvdec: fix use after free bug in rkvdec_remove
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-35829
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-35829-media-rkvdec-fix-use-after-free-bug-in-rkvdec_remove.patch
- From: 5.15.0-79.86
- CVE-2022-4269, CVSSv2 Score: 5.5
- Description:
act_mirred: use the backlog for nested calls to mirred ingress
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-4269
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2022-4269-act_mirred-use-the-backlog-for-nested-calls-to-mirre_kpatch.patch
- From: 5.15.0-79.86
- CVE-2022-48502, CVSSv2 Score: 7.1
- Description:
fs/ntfs3: Check fields while reading
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-48502
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2022-48502-fs-ntfs3-Check-fields-while-reading-1.patch
- From: 5.15.0-79.86
- CVE-2023-0597, CVSSv2 Score:
- Description:
Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
- CVE:
- Patch: skipped/CVE-2023-0597.patch
- From:
- CVE-2023-21400, CVSSv2 Score: 6.7
- Description:
io_uring: ensure IOPOLL locks around deferred work
- CVE: https://ubuntu.com/security/CVE-2023-21400
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2023-21400-patch-io-uring-ensure-iopoll-locks-around-deferred-work.patch
- From: 5.15.0-82.91
- CVE-2023-3777, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: skip bound chain on rule flush
- CVE: https://ubuntu.com/security/CVE-2023-3777
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3777-patch-netfilter-nf-tables-skip-bound-chain-on-rule-flush.patch
- From: 5.15.0-82.91
- CVE-2023-3995 CVE-2023-4147, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow rule addition to bound chain via
- CVE: https://ubuntu.com/security/CVE-2023-4147
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3995-CVE-2023-4147-patch-netfilter-nf-tables-disallow-rule-addition-to-bound-chain.patch
- From: 5.15.0-82.91
- CVE-2023-20593, CVSSv2 Score: 6.5
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: zenbleed-enable.patch
- From: N/A
- CVE-2023-3776, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: Fix improper refcount update leads to
- CVE: https://ubuntu.com/security/CVE-2023-3776
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3776-patch-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 5.15.0-82.91
- CVE-2023-4004, CVSSv2 Score: 7.8
- Description:
netfilter: nft_set_pipapo: fix improper element removal
- CVE: https://ubuntu.com/security/CVE-2023-4004
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-4004-patch-netfilter-nft-set-pipapo-fix-improper-element-removal.patch
- From: 5.15.0-82.91
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: refactor parsing of netlink parameters
- CVE: https://ubuntu.com/security/CVE-2023-3611
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3611-net-sched-sch_qfq-refactor-parsing-of-netlink-parameters.patch
- From: 5.15.0-82.91
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://ubuntu.com/security/CVE-2023-3611
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3611-patch-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
- From: 5.15.0-82.91
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: refactor parsing of netlink parameters (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-3611
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3611-net-sched-sch_qfq-refactor-parsing-of-netlink-parameters-kpatch.patch
- From: 5.15.0-82.91
- CVE-2023-3610, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: fix chain binding transaction logic
- CVE: https://ubuntu.com/security/CVE-2023-3610
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3610-patch-netfilter-nf-tables-fix-chain-binding-transaction-logic-67.74.patch
- From: 5.15.0-82.91
- CVE-2023-3610, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: fix chain binding transaction logic
- CVE: https://ubuntu.com/security/CVE-2023-3610
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3610-netfilter-nf_tables-fix-chain-binding-transaction-lo-kpatch-67.74.patch
- From: 5.15.0-82.91
- CVE-2023-3609, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://ubuntu.com/security/CVE-2023-3609
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3609-patch-net-sched-cls-u32-fix-reference-counter-leak-leading-to.patch
- From: 5.15.0-82.91
- CVE-2023-4015, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain
- CVE: https://ubuntu.com/security/CVE-2023-4015
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-4015-0001-netfilter-nf_tables-add-NFT_TRANS_PREPARE_ERROR-to-d-78.85.patch
- From: 5.15.0-82.91
- CVE-2023-4015, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: unbind non-anonymous set if rule construction fails
- CVE: https://ubuntu.com/security/CVE-2023-4015
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-4015-0002-netfilter-nf_tables-unbind-non-anonymous-set-if-rule.patch
- From: 5.15.0-82.91
- CVE-2023-4015, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
- CVE: https://ubuntu.com/security/CVE-2023-4015
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-4015-0003-netfilter-nf_tables-skip-immediate-deactivate-in-_PR.patch
- From: 5.15.0-82.91
- CVE-2022-40982, CVSSv2 Score:
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-40982.patch
- From:
- CVE-2023-3212, CVSSv2 Score: 4.4
- Description:
gfs2: Don't deref jdesc in evict
- CVE: https://ubuntu.com/security/CVE-2023-3212
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-3212-patch-gfs2-don-t-deref-jdesc-in-evict.patch
- From: 5.15.0-83.92
- CVE-2023-21255, CVSSv2 Score: 7.8
- Description:
binder: fix UAF caused by faulty buffer cleanup
- CVE: https://ubuntu.com/security/CVE-2023-21255
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-21255-patch-binder-fix-uaf-caused-by-faulty-buffer-cleanup.patch
- From: 5.15.0-83.92
- CVE-2023-38426, CVSSv2 Score: 9.1
- Description:
ksmbd: fix global-out-of-bounds in smb2_find_context_vals
- CVE: https://ubuntu.com/security/CVE-2023-38426
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-38426-patch-ksmbd-fix-global-out-of-bounds-in-smb2-find-context-vals.patch
- From: 5.15.0-83.92
- CVE-2023-38428, CVSSv2 Score: 9.1
- Description:
ksmbd: fix wrong UserName check in session_user
- CVE: https://ubuntu.com/security/CVE-2023-38428
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-38428-patch-ksmbd-fix-wrong-username-check-in-session-user.patch
- From: 5.15.0-83.92
- CVE-2023-38429, CVSSv2 Score: 9.8
- Description:
ksmbd: allocate one more byte for implied bcc[0]
- CVE: https://ubuntu.com/security/CVE-2023-38429
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-38429-patch-ksmbd-allocate-one-more-byte-for-implied-bcc-0-1.patch
- From: 5.15.0-83.92
- CVE-2023-1192 CVE-2022-48425, CVSSv2 Score: 7.8
- Description:
fs/ntfs3: Validate MFT flags before replaying logs
- CVE: https://ubuntu.com/security/CVE-2022-48425
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2022-48425-CVE-2023-1192-patch-fs-ntfs3-validate-mft-flags-before-replaying-logs.patch
- From: 5.15.0-83.92
- CVE-2023-34256, CVSSv2 Score: 5.5
- Description:
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
- CVE: https://ubuntu.com/security/CVE-2023-34256
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-34256-patch-ext4-avoid-a-potential-slab-out-of-bounds-in.patch
- From: 5.15.0-83.92
- CVE-2023-31084, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
- CVE: https://ubuntu.com/security/CVE-2023-31084
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-31084-media-dvb-core-fix-kernel-WARNING-for-blocking-operation-in-wait_event.patch
- From: 5.15.0-83.92
- CVE-2023-2898, CVSSv2 Score: 4.7
- Description:
f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()
- CVE: https://ubuntu.com/security/CVE-2023-2898
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-2898-f2fs-fix-to-avoid-NULL-pointer-dereference-f2fs_write_end_io-1.patch
- From: 5.15.0-83.92
- CVE-2023-4569, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: deactivate catchall elements in next generation
- CVE: https://ubuntu.com/security/CVE-2023-4569
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-4569-0001-netfilter-nf_tables-deactivate-catchall-elements-in-.patch
- From: 5.15.0-84.93
- CVE-2023-40283, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
- CVE: https://ubuntu.com/security/CVE-2023-40283
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-40283-patch-bluetooth-l2cap-fix-use-after-free-in-l2cap-sock-ready-cb.patch
- From: 5.15.0-84.93
- CVE-2023-4207, CVSSv2 Score: 7.8
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4207
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-patch-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.15.0-84.93
- CVE-2023-4128 CVE-2023-4207 CVE-2023-4206 CVE-2023-4208, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4206
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-patch-net-sched-cls-fw-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.15.0-84.93
- CVE-2023-4208, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4208
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-patch-net-sched-cls-u32-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.15.0-84.93
- CVE-2023-4194, CVSSv2 Score: 5.5
- Description:
net: tap_open(): set sk_uid from current_fsuid()
- CVE: https://ubuntu.com/security/CVE-2023-4194
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-4194-patch-net-tap-open-set-sk-uid-from-current-fsuid.patch
- From: 5.15.0-86.96
- CVE-2023-4194, CVSSv2 Score: 5.5
- Description:
net: tun_chr_open(): set sk_uid from current_fsuid()
- CVE: https://ubuntu.com/security/CVE-2023-4194
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-4194-patch-net-tun-chr-open-set-sk-uid-from-current-fsuid.patch
- From: 5.15.0-86.96
- CVE-2023-4155, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2023-4155.patch
- From:
- CVE-2023-1206, CVSSv2 Score:
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-44466, CVSSv2 Score: 8.8
- Description:
libceph: harden msgr2.1 frame segment length checks
- CVE: https://ubuntu.com/security/CVE-2023-44466
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-44466-patch-libceph-harden-msgr2-1-frame-segment-length-checks.patch
- From: 5.15.0-86.96
- CVE-2023-3866, CVSSv2 Score:
- Description:
ksmbd: validate session id and tree id in the compound request
- CVE: https://ubuntu.com/security/CVE-2023-3866
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-3866-patch-ksmbd-validate-session-id-and-tree-id-in-the-compound.patch
- From: 5.15.0-86.96
- CVE-2023-3338, CVSSv2 Score:
- Description:
The patch remove functionality.
- CVE:
- Patch: skipped/CVE-2023-3338.patch
- From:
- CVE-2023-4273, CVSSv2 Score: 6.7
- Description:
[PATCH] exfat: check if filename entries exceeds max filename length
- CVE: https://ubuntu.com/security/CVE-2023-4273
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-4273-patch-exfat-check-if-filename-entries-exceeds-max-filename-length.patch
- From: 5.15.0-86.96
- CVE-2023-3863, CVSSv2 Score: 4.1
- Description:
[PATCH] nfc: llcp: simplify llcp_sock_connect() error paths
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-3863-nfc-llcp-simplify-llcp_sock_connect-error-paths.patch
- From: 5.15.0-86.96
- CVE-2023-3863, CVSSv2 Score: 4.1
- Description:
[PATCH] net: nfc: Fix use-after-free caused by nfc_llcp_find_local
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-3863-patch-net-nfc-fix-use-after-free-caused-by-nfc-llcp-find-local.patch
- From: 5.15.0-86.96
- CVE-2023-38432, CVSSv2 Score: 9.1
- Description:
ksmbd: use ksmbd_req_buf_next() in ksmbd_smb2_check_message()
- CVE: https://ubuntu.com/security/CVE-2023-38432
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-38432-ksmbd-use-ksmbd_req_buf_next-in-ksmbd_smb2_check_mes.patch
- From: 5.15.0-86.96
- CVE-2023-38432, CVSSv2 Score: 9.1
- Description:
ksmbd: validate command payload size
- CVE: https://ubuntu.com/security/CVE-2023-38432
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-38432-ksmbd-validate-command-payload-size.patch
- From: 5.15.0-86.96
- CVE-2023-3865, CVSSv2 Score: 4.3
- Description:
ksmbd: fix out-of-bound read in smb2_write
- CVE: https://ubuntu.com/security/CVE-2023-3865
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-3865-ksmbd-fix-out-of-bound-read-in-smb2_write.patch
- From: 5.15.0-86.96
- CVE-2023-4132, CVSSv2 Score: 5.5
- Description:
Smart Patch for drivers/media/usb/siano/smsusb.c
- CVE: https://ubuntu.com/security/CVE-2023-4132
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-4132-smart-backport-for-drivers-media-usb-siano-smsusb-c.patch
- From: 5.15.0-86.96
- CVE-2023-20569, CVSSv2 Score:
- Description:
A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.
- CVE:
- Patch: skipped/CVE-2023-20569.patch
- From:
- CVE-2023-2156, CVSSv2 Score: 7.5
- Description:
ipv6: rpl: Fix Route of Death.
- CVE: https://ubuntu.com/security/CVE-2023-2156
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-2156-ipv6-rpl-Fix-Route-of-Death.patch
- From: 5.15.0-86.96
- CVE-2023-2156, CVSSv2 Score: 7.5
- Description:
net: rpl: fix rpl header size calculation
- CVE: https://ubuntu.com/security/CVE-2023-2156
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-2156-net-rpl-fix-rpl-header-size-calculation.patch
- From: 5.15.0-86.96
- CVE-2023-42755, CVSSv2 Score:
- Description:
The patch removes functionality.
- CVE:
- Patch: skipped/CVE-2023-42755.patch
- From:
- CVE-2023-4622, CVSSv2 Score: 7.0
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://ubuntu.com/security/CVE-2023-4622
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4622-0001-af_unix-Fix-null-ptr-deref-in-unix_stream_sendpage.patch
- From: 5.15.0-87.97
- CVE-2023-4881, CVSSv2 Score: 7.1
- Description:
netfilter: nftables: exthdr: fix 4-byte stack OOB write
- CVE: https://ubuntu.com/security/CVE-2023-4881
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4881-0001-netfilter-nftables-exthdr-fix-4-byte-stack-OOB-write.patch
- From: 5.15.0-87.97
- CVE-2023-42752, CVSSv2 Score: 5.5
- Description:
igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU
- CVE: https://ubuntu.com/security/CVE-2023-42752
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-42752-0001-igmp-limit-igmpv3_newpack-packet-size-to-IP_MAX_MTU.patch
- From: 5.15.0-87.97
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4921-0001-net-sched-sch_qfq-Fix-UAF-in-qfq_dequeue.patch
- From: 5.15.0-87.97
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue-kpatch.patch
- From: 5.15.0-87.97
- CVE-2023-42753, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for
- CVE: https://ubuntu.com/security/CVE-2023-42753
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-42753-0001-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET.patch
- From: 5.15.0-87.97
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://ubuntu.com/security/CVE-2023-4623
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4623-0001-net-sched-sch_hfsc-Ensure-inner-classes-have-fsc-cur.patch
- From: 5.15.0-87.97
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in
- CVE: https://ubuntu.com/security/CVE-2023-31083
- Patch: ubuntu-jammy/5.15.0-88.98/CVE-2023-31083-patch-bluetooth-hci-ldisc-check-hci-uart-proto-ready-flag-in.patch
- From: 5.15.0-88.98
- CVE-2023-3772, CVSSv2 Score: 4.4
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://ubuntu.com/security/CVE-2023-3772
- Patch: ubuntu-jammy/5.15.0-88.98/CVE-2023-3772-0001-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: 5.15.0-88.98
- CVE-2023-31085, CVSSv2 Score: 5.5
- Description:
ubi: Refuse attaching if mtd's erasesize is 0
- CVE: https://ubuntu.com/security/CVE-2023-31085
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-31085-patch-ubi-refuse-attaching-if-mtd-s-erasesize-is-0.patch
- From: 5.15.0-89.99
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://ubuntu.com/security/CVE-2023-45871
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-45871-patch-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 5.15.0-89.99
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-45871
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch.patch
- From: 5.14.0-362.13.1.el9_3
- CVE-2023-25775, CVSSv2 Score: 9.8
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://ubuntu.com/security/CVE-2023-25775
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-25775-0001-RDMA-irdma-Prevent-zero-length-STAG-registration.patch
- From: 5.15.0-89.99
- CVE-2023-25775, CVSSv2 Score: 9.8
- Description:
RDMA/irdma: Prevent zero-length STAG registration (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-25775
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-25775-0001-RDMA-irdma-Prevent-zero-length-STAG-registration-kpatch.patch
- From: 5.15.0-89.99
- CVE-2023-39189, CVSSv2 Score: 6.0
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39189
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39189-patch-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 5.15.0-91.101
- CVE-2023-39192, CVSSv2 Score: 6.0
- Description:
netfilter: xt_u32: validate user space input
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39192-patch-netfilter-xt-u32-validate-user-space-input.patch
- From: 5.15.0-91.101
- CVE-2023-39192, CVSSv2 Score: 6.0
- Description:
netfilter: xt_u32: validate user space input (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39192-netfilter-xt-u32-validate-user-space-input-kpatch.patch
- From: 5.15.0-91.101
- CVE-2023-39193, CVSSv2 Score: 6.0
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://ubuntu.com/security/CVE-2023-39193
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39193-patch-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 5.15.0-91.101
- CVE-2023-5178, CVSSv2 Score: 8.8
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://ubuntu.com/security/CVE-2023-5178
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-5178-patch-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 5.15.0-91.101
- CVE-2023-5158, CVSSv2 Score: 5.5
- Description:
vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()
- CVE: https://ubuntu.com/security/CVE-2023-5158
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-5158-patch-vringh-don-t-use-vringh-kiov-advance-in-vringh-iov-xfer.patch
- From: 5.15.0-91.101
- CVE-2023-42754, CVSSv2 Score: 5.5
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://ubuntu.com/security/CVE-2023-42754
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-42754-patch-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 5.15.0-91.101
- CVE-2023-39198, CVSSv2 Score: 6.4
- Description:
drm/qxl: fix UAF on handle creation
- CVE: https://ubuntu.com/security/CVE-2023-39198
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39198-patch-drm-qxl-fix-uaf-on-handle-creation.patch
- From: 5.15.0-91.101
- CVE-2023-3773, CVSSv2 Score: 4.4
- Description:
xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH
- CVE: https://ubuntu.com/security/CVE-2023-3773
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-3773-patch-xfrm-add-forgotten-nla-policy-for-xfrma-mtimer-thresh.patch
- From: 5.15.0-91.101
- CVE-2023-3773, CVSSv2 Score: 4.4
- Description:
xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH
- CVE: https://ubuntu.com/security/CVE-2023-3773
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-3773-patch-xfrm-add-forgotten-nla-policy-for-xfrma-mtimer-thresh-kpatch.patch
- From: 5.15.0-91.101
- CVE-2023-39194, CVSSv2 Score: 4.4
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39194
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39194-patch-net-xfrm-fix-xfrm-address-filter-oob-read.patch
- From: 5.15.0-91.101
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Unite old scheme and new scheme descriptor reads (dependency)
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-37453-02-patch-usb-core-unite-old-scheme-and-new-scheme-descriptor-reads.patch
- From: 5.15.0-91.101
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Change usb_get_device_descriptor() API (dependency)
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-37453-01-patch-usb-core-change-usb-get-device-descriptor-api.patch
- From: 5.15.0-91.101
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-37453-patch-usb-core-fix-race-by-not-overwriting-udev-descriptor-in.patch
- From: 5.15.0-91.101