- kernel-5.15.0-1017.20 (ubuntu-jammy-azure)
- 5.15.0-1071.80
- 2024-08-21 12:36:32
- 2024-08-26 06:40:24
- K20240821_07
- CVE-2022-2959
- Description:
pipe: Fix missing lock in pipe_resize_ring()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2959
- Patch: 5.15.0/CVE-2022-2959-pipe-Fix-missing-lock-in-pipe_resize_ring.patch
- From: 5.15.0-47.50
- CVE-2022-2503
- Description:
dm verity: set DM_TARGET_IMMUTABLE feature flag
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2503
- Patch: 5.15.0/CVE-2022-2503-dm-verity-set-DM_TARGET_IMMUTABLE-feature-flag.patch
- From: 5.15.0-47.50
- CVE-2022-2503
- Description:
dm verity: set DM_TARGET_IMMUTABLE feature flag (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2503
- Patch: 5.15.0/CVE-2022-2503-kpatch.patch
- From: 5.15.0-47.50
- CVE-2022-2873
- Description:
i2c: ismt: prevent memory corruption in ismt_access()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2873
- Patch: 5.15.0/CVE-2022-2873-i2c-ismt-prevent-memory-corruption-in-ismt_access.patch
- From: 5.15.0-47.50
- CVE-2022-1973
- Description:
fs/ntfs3: Fix invalid free in log_replay
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1973
- Patch: 5.15.0/CVE-2022-1973-fs-ntfs3-Fix-invalid-free-in-log_replay.patch
- From: 5.15.0-47.50
- CVE-2022-1852
- Description:
KVM: x86: avoid calling x86 emulator without a decoded
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1852
- Patch: 5.15.0/CVE-2022-1852-KVM-x86-avoid-calling-x86-emulator-without-a-decoded-instruction.patch
- From: 5.15.0-47.50
- CVE-2022-1943
- Description:
udf: Avoid using stale lengthOfImpUse
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1943
- Patch: 5.15.0/CVE-2022-1943-udf-Avoid-using-stale-lengthOfImpUse.patch
- From: 5.15.0-47.50
- CVE-2022-1729
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://access.redhat.com/security/cve/CVE-2022-1729
- Patch: 5.15.0/CVE-2022-1729-perf-Fix-sys_perf_event_open-race-against-self.patch
- From: 5.15.0-47.50
- CVE-2022-1012
- Description:
secure_seq: use the 64 bits of the siphash for port offset
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1012
- Patch: 5.15.0/CVE-2022-1012-secure_seq-use-the-64-bits-of-the-siphash-for-port-offset-calculation.patch
- From: 5.15.0-47.50
- CVE-2021-33061
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2021-33061.patch
- From:
- CVE-2022-1184
- Description:
ext4: avoid cycles in directory h-tree
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1184
- Patch: ubuntu-jammy/5.15.0-47.51/CVE-2022-1184-ext4-avoid-cycles-in-directory-h-tree.patch
- From: 5.15.0-47.51
- CVE-2022-1184
- Description:
ext4: verify dir block before splitting it
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1184
- Patch: ubuntu-jammy/5.15.0-47.51/CVE-2022-1184-ext4-verify-dir-block-before-splitting-it.patch
- From: 5.15.0-47.51
- CVE-2022-33655
- Description:
fbcon: Disallow setting font bigger than screen size
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33655
- Patch: 5.4.0/CVE-2021-33655-fbcon-disallow-setting-font-bigger-than-screen-size.patch
- From: 5.4.209-116.363
- CVE-2022-33655
- Description:
fbcon: Prevent that screen size is smaller than font size
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33655
- Patch: 5.15.0/CVE-2021-33655-fbcon-prevent-that-screen-size-is-smaller-than-font-size.patch
- From: 5.4.209-116.363
- CVE-2022-33655
- Description:
fbmem: Check virtual screen sizes in fb_set_var()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2021-33655
- Patch: 5.4.0/CVE-2021-33655-fbmem-check-virtual-screen-sizes-in-fb_set_var.patch
- From: 5.4.209-116.363
- CVE-2022-26365
- Description:
xen/blkfront: fix leaking data in shared pages
- CVE: https://ubuntu.com/security/CVE-2022-26365
- Patch: 5.15.0/CVE-2022-26365-xen-blkfront-fix-leaking-data-in-shared-pages.patch
- From: 5.15.0-48.54
- CVE-2022-33740
- Description:
xen/netfront: fix leaking data in shared pages
- CVE: https://ubuntu.com/security/CVE-2022-33740
- Patch: 5.15.0/CVE-2022-33740-xen-netfront-fix-leaking-data-in-shared-pages.patch
- From: 5.15.0-48.54
- CVE-2022-33741
- Description:
xen/netfront: force data bouncing when backend is untrusted
- CVE: https://ubuntu.com/security/CVE-2022-33741
- Patch: 5.15.0/CVE-2022-33741-xen-netfront-force-data-bouncing-when-backend-is-untrusted.patch
- From: 5.15.0-48.54
- CVE-2022-33741
- Description:
xen/netfront: force data bouncing when backend is untrusted (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-33741
- Patch: 5.15.0/CVE-2022-33741-xen-netfront-force-data-bouncing-when-backend-is-untrusted-kpatch.patch
- From: 5.15.0-48.54
- CVE-2022-33742
- Description:
xen/blkfront: force data bouncing when backend is untrusted
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33742
- Patch: 5.10.0/CVE-2022-33742.patch
- From: v5.19
- CVE-2022-33742
- Description:
xen/blkfront: force data bouncing when backend is untrusted (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-33742
- Patch: 5.15.0/CVE-2022-33742-kpatch.patch
- From: v5.19
- CVE-2022-33743
- Description:
xen-netfront: restore __skb_queue_tail() positioning in xennet_get_responses()
- CVE: https://ubuntu.com/security/CVE-2022-33743
- Patch: 5.15.0/CVE-2022-33743-xen-netfront-restore-skb_queue_tail-positioning-in-xennet_get_responses.patch
- From: 5.15.0-48.54
- CVE-2022-33744
- Description:
Out of scope - ARM architecture.
- CVE:
- Patch: skipped/CVE-2022-33744.patch
- From:
- CVE-2022-34494
- Description:
rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev()
- CVE: https://ubuntu.com/security/CVE-2022-34494
- Patch: 5.15.0/CVE-2022-34494-rpmsg-virtio-fix-possible-double-free-in-rpmsg_virtio_add_ctrl_dev.patch
- From: 5.15.0-48.54
- CVE-2022-34495
- Description:
rpmsg: virtio: Fix possible double free in rpmsg_probe()
- CVE: https://ubuntu.com/security/CVE-2022-34495
- Patch: 5.15.0/CVE-2022-34495-rpmsg-virtio-fix-possible-double-free-in-rpmsg_probe.patch
- From: 5.15.0-48.54
- CVE-2022-36946
- Description:
netfilter: nf_queue: do not allow packet truncation below transport header offset
- CVE: https://ubuntu.com/security/CVE-2022-36946
- Patch: 5.15.0/CVE-2022-36946-netfilter-nf_queue-do-not-allow-packet-truncation-below-transport-header-offset.patch
- From: 5.15.0-48.54
- CVE-2022-2318
- Description:
net: rose: fix UAF bugs caused by timer handler
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2318
- Patch: 5.15.0/CVE-2022-2318-net-rose-fix-UAF-bugs-caused-by-timer-handler.patch
- From: 5.15.0-48.54
- CVE-2022-2318
- Description:
net: rose: fix UAF bugs caused by timer handler (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2318
- Patch: 5.15.0/CVE-2022-2318-net-rose-fix-UAF-bugs-caused-by-timer-handler-kpatch.patch
- From: 5.15.0-48.54
- CVE-2022-3104
- Description:
lkdtm/bugs: Check for the NULL pointer after calling kmalloc
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3104
- Patch: ubuntu-jammy/5.15.0-48.54/CVE-2022-3104-lkdtm-bugs-check-for-NULL-pointer-after-calling-kmalloc.patch
- From: 5.15.0-48.54
- CVE-2022-3110
- Description:
staging: r8188eu: add check for kzalloc
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3110
- Patch: ubuntu-jammy/5.15.0-48.54/CVE-2022-3110-staging-r8188eu-add-check-for-kzalloc.patch
- From: 5.15.0-48.54
- CVE-2022-36879
- Description:
xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in
- CVE: https://ubuntu.com/security/CVE-2022-36879
- Patch: ubuntu-jammy/5.15.0-50.56/0007-CVE-2022-36879-xfrm-xfrm_policy-fix-a-possible-double-xfrm_pols_put.patch
- From: 5.15.0-50.56
- CVE-2022-1882
- Description:
watchqueue: make sure to serialize 'wqueue->defunct' properly
- CVE: https://ubuntu.com/security/CVE-2022-1882
- Patch: ubuntu-jammy/5.15.0-50.56/CVE-2022-1882-watchqueue-make-sure-to-serialize-wqueue-defunct-properly.patch
- From: 5.15.0-50.56
- CVE-2022-39189
- Description:
KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- CVE: https://ubuntu.com/security/CVE-2022-39189
- Patch: ubuntu-jammy/5.15.0-50.56/CVE-2022-39189-kpatch.patch
- From: 5.15.0-50.56
- CVE-2022-39189
- Description:
KVM: x86: do not set st->preempted when going back to user space
- CVE: https://ubuntu.com/security/CVE-2022-39189
- Patch: ubuntu-jammy/5.15.0-50.56/CVE-2022-39189-KVM-x86-do-not-set-st-preempted-when-going-back-to-user-space.patch
- From: 5.15.0-50.56
- CVE-2022-26373
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-26373.patch
- From:
- CVE-2022-3176
- Description:
io_uring: disable polling pollfree files
- CVE: https://ubuntu.com/security/CVE-2022-3176
- Patch: ubuntu-jammy/5.15.0-50.56/CVE-2022-3176-kpatch.patch
- From: 5.15.0-50.56
- CVE-2023-22998
- Description:
drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init
- CVE: https://ubuntu.com/security/CVE-2023-22998
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2023-22998-drm-virtio-fix-NULL-vs-IS_ERR-checking-in-virtio_gpu_object_shmem_init.patch
- From: 5.15.0-60.66
- CVE-2023-22998
- Description:
drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling
- CVE: https://ubuntu.com/security/CVE-2023-22998
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2023-22998-drm-virtio-correct-drm_gem_shmem_get_sg_table-error-handling.patch
- From: 5.15.0-60.66
- CVE-2022-2602
- Description:
io_uring/af_unix: defer registered files gc to io_uring release
- CVE: https://www.zerodayinitiative.com/advisories/ZDI-22-1462/
- Patch: 5.15.0/CVE-2022-2602-io_uring-af_unix-defer-registered-files-gc.patch
- From: 5.15.0-52.58
- CVE-2022-2602
- Description:
io_uring/af_unix: defer registered files gc to io_uring release
- CVE: https://www.zerodayinitiative.com/advisories/ZDI-22-1462/
- Patch: 5.15.0/CVE-2022-2602-io_uring-af_unix-defer-registered-files-gc-kpatch.patch
- From: 5.15.0-52.58
- CVE-2022-2602
- Description:
UBUNTU: SAUCE: io_uring/af_unix: fix memleak during unix GC
- CVE: https://www.zerodayinitiative.com/advisories/ZDI-22-1462/
- Patch: 5.4.0/CVE-2022-2602-io_uring-af_unix-fix-memleak-during-unix-GC.patch
- From: 5.4.0-131.147
- CVE-2022-41674
- Description:
wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-41674
- Patch: 5.15.0/CVE-2022-41674-wifi-cfg80211-fix-u8-overflow-in-cfg80211_update_notlisted_nontrans.patch
- From: 5.15.0-52.58
- CVE-2022-42719
- Description:
mac80211: move CRC into struct ieee802_11_elems
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-42719
- Patch: 5.15.0/CVE-2022-42719-mac80211-move-CRC-into-struct-ieee802_11_elems.patch
- From: 5.15.0-52.58
- CVE-2022-42719
- Description:
mac80211: always allocate struct ieee802_11_elems
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-42719
- Patch: 5.15.0/CVE-2022-42719-mac80211-always-allocate-struct-ieee802_11_elems.patch
- From: 5.15.0-52.58
- CVE-2022-42719
- Description:
wifi: mac80211: fix MBSSID parsing use-after-free
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-42719
- Patch: 5.15.0/CVE-2022-42719-wifi-mac80211-fix-MBSSID-parsing-use-after-free.patch
- From: 5.15.0-52.58
- CVE-2022-42720
- Description:
wifi: cfg80211: fix BSS refcounting bugs
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-42720
- Patch: 5.15.0/CVE-2022-42720-wifi-cfg80211-fix-BSS-refcounting-bugs.patch
- From: 5.15.0-52.58
- CVE-2022-42722
- Description:
wifi: mac80211: fix crash in beacon protection for P2P-device
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-42722
- Patch: 5.15.0/CVE-2022-42722-wifi-mac80211-fix-crash-in-beacon-protection-for-P2P-device.patch
- From: 5.15.0-52.58
- CVE-2022-42721
- Description:
wifi: cfg80211: avoid nontransmitted BSS list corruption
- CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-42721
- Patch: 5.15.0/CVE-2022-42721-wifi-cfg80211-avoid-nontransmitted-BSS-list-corruption.patch
- From: 5.15.0-52.58
- CVE-2022-47941
- Description:
ksmbd: fix memory leak in smb2_handle_negotiate
- CVE: https://ubuntu.com/security/CVE-2022-47941
- Patch: 5.15.0/CVE-2022-47941-ksmbd-fix-memory-leak-in-smb2_handle_negotiate.patch
- From: 5.15.0-53.59
- CVE-2022-47938
- Description:
ksmbd: prevent out of bound read for SMB2_TREE_CONNNECT
- CVE: https://ubuntu.com/security/CVE-2022-47938
- Patch: 5.15.0/CVE-2022-47938-ksmbd-prevent-out-of-bound-read-for-SMB2_TREE_CONNNECT.patch
- From: 5.15.0-53.59
- CVE-2022-47939
- Description:
ksmbd: fix use-after-free bug in smb2_tree_disconect
- CVE: https://ubuntu.com/security/CVE-2022-47939
- Patch: 5.15.0/CVE-2022-47939-ksmbd-fix-use-after-free-bug-in-smb2_tree_disconect.patch
- From: 5.15.0-53.59
- CVE-2022-47943
- Description:
ksmbd: prevent out of bound read for SMB2_WRITE
- CVE: https://ubuntu.com/security/CVE-2022-47943
- Patch: 5.15.0/CVE-2022-47943-ksmbd-prevent-out-of-bound-read-for-SMB2_WRITE.patch
- From: 5.15.0-53.59
- CVE-2022-47942
- Description:
ksmbd: fix heap-based overflow in set_ntacl_dacl()
- CVE: https://ubuntu.com/security/CVE-2022-47942
- Patch: 5.15.0/CVE-2022-47942-ksmbd-fix-heap-based-overflow-in-set_ntacl_dacl.patch
- From: 5.15.0-53.59
- CVE-2022-20422
- Description:
arm64: fix oops in concurrently setting insn_emulation sysctls
- CVE: https://ubuntu.com/security/CVE-2022-20422
- Patch: 5.15.0/CVE-2022-20422-arm64-fix-oops-in-concurrently-setting-insn_emulation-sysctls.patch
- From: 5.15.0-53.59
- CVE-2022-20422
- Description:
arm64: fix oops in concurrently setting insn_emulation sysctls
- CVE: https://ubuntu.com/security/CVE-2022-20422
- Patch: 5.15.0/CVE-2022-20422-arm64-fix-oops-in-concurrently-setting-insn_emulation-sysctls-kpatch.patch
- From: 5.15.0-53.59
- CVE-2022-2905
- Description:
bpf: Don't use tnum_range on array range checking for poke
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-2905
- Patch: 5.10.0/CVE-2022-2905-bpf-Don-t-use-tnum_range-on-array-range-checking-for-poke.patch
- From: 5.10.140-1
- CVE-2022-2978
- Description:
fs: fix UAF/GPF bug in nilfs_mdt_destroy
- CVE: https://ubuntu.com/security/CVE-2022-2978
- Patch: 5.15.0/CVE-2022-2978-fs-fix-UAF-GPF-bug-in-nilfs_mdt_destroy.patch
- From: 5.15.0-53.59
- CVE-2022-3028
- Description:
af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3028
- Patch: 5.10.0/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel.patch
- From: 5.10.140-1
- CVE-2022-3625
- Description:
devlink: Fix use-after-free after a failed reload
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3625
- Patch: 5.15.0/CVE-2022-3025-devlink-fix-use-after-free-after-failed-reload.patch
- From: 5.15.0-53.59
- CVE-2022-3635
- Description:
atm: idt77252: fix use-after-free bugs caused by tst_timer
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3635
- Patch: 5.15.0/CVE-2022-3035-atm-idt77252-fix-use-after-free-bugs-caused-by-tst_timer.patch
- From: 5.15.0-53.59
- CVE-2022-39190
- Description:
netfilter: nf_tables: disallow binding to already bound chain
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-21385
- Patch: 5.10.0/CVE-2022-39190-netfilter-nf_tables-disallow-binding-to-already-bound-chain.patch
- From: 5.10.140-1
- CVE-2022-40768
- Description:
scsi: stex: Properly zero out the passthrough command structure
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-40768
- Patch: 5.15.0/CVE-2022-40768-scsi-stex-properly-zero-out-the-passthrough-command-structure.patch
- From: 5.15.0-53.59
- CVE-2023-20928
- Description:
binder: fix UAF of alloc->vma in race with munmap()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-20928
- Patch: ubuntu-jammy/5.15.0-53.59/CVE-2023-20928-binder-fix-UAF-of-alloc-vma-in-race-with-munmap.patch
- From: 5.15.0-53.59
- CVE-2022-43945
- Description:
SUNRPC: Fix svcxdr_init_decode's end-of-buffer calculation
- CVE: https://ubuntu.com/security/CVE-2022-43945
- Patch: ubuntu-jammy/5.15.0-53.59/0001-SUNRPC-Fix-svcxdr_init_decode-s-end-of-buffer-calcul.patch
- From: 5.15.0-53.59
- CVE-2022-43945
- Description:
SUNRPC: Fix svcxdr_init_encode's buflen calculation
- CVE: https://ubuntu.com/security/CVE-2022-43945
- Patch: ubuntu-jammy/5.15.0-53.59/0002-SUNRPC-Fix-svcxdr_init_encode-s-buflen-calculation.patch
- From: 5.15.0-53.59
- CVE-2022-43945
- Description:
NFSD: Protect against send buffer overflow in NFSv2 READDIR
- CVE: https://ubuntu.com/security/CVE-2022-43945
- Patch: ubuntu-jammy/5.15.0-53.59/0003-NFSD-Protect-against-send-buffer-overflow-in-NFSv2-R.patch
- From: 5.15.0-53.59
- CVE-2022-43945
- Description:
NFSD: Protect against send buffer overflow in NFSv3 READDIR
- CVE: https://ubuntu.com/security/CVE-2022-43945
- Patch: ubuntu-jammy/5.15.0-53.59/0004-NFSD-Protect-against-send-buffer-overflow-in-NFSv3-R.patch
- From: 5.15.0-53.59
- CVE-2022-43945
- Description:
NFSD: Protect against send buffer overflow in NFSv2 READ
- CVE: https://ubuntu.com/security/CVE-2022-43945
- Patch: ubuntu-jammy/5.15.0-53.59/0005-NFSD-Protect-against-send-buffer-overflow-in-NFSv2-R.patch
- From: 5.15.0-53.59
- CVE-2022-43945
- Description:
NFSD: Protect against send buffer overflow in NFSv3 READ
- CVE: https://ubuntu.com/security/CVE-2022-43945
- Patch: ubuntu-jammy/5.15.0-53.59/0006-NFSD-Protect-against-send-buffer-overflow-in-NFSv3-R.patch
- From: 5.15.0-53.59
- CVE-2022-43945
- Description:
NFSD: Remove "inline" directives on op_rsize_bop helpers
- CVE: https://ubuntu.com/security/CVE-2022-43945
- Patch: ubuntu-jammy/5.15.0-53.59/0007-NFSD-Remove-inline-directives-on-op_rsize_bop-helper.patch
- From: 5.15.0-53.59
- CVE-2022-43945
- Description:
NFSD: Cap rsize_bop result based on send buffer size
- CVE: https://ubuntu.com/security/CVE-2022-43945
- Patch: ubuntu-jammy/5.15.0-53.59/0008-NFSD-Cap-rsize_bop-result-based-on-send-buffer-size.patch
- From: 5.15.0-53.59
- CVE-2022-3594
- Description:
r8152: Rate limit overflow messages
- CVE: https://ubuntu.com/security/CVE-2022-3594
- Patch: ubuntu-jammy/5.15.0-53.59/0009-r8152-Rate-limit-overflow-messages.patch
- From: 5.15.0-53.59
- CVE-2022-3565
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-jammy/5.15.0-53.59/0010-mISDN-fix-use-after-free-bugs-in-l1oip-timer-handler.patch
- From: 5.15.0-53.59
- CVE-2022-3565
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-jammy/5.15.0-53.59/CVE-2022-3565-kpatch.patch
- From: 4.15.0-200.211
- CVE-2022-3524
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options().
- CVE: https://ubuntu.com/security/CVE-2022-3524
- Patch: ubuntu-jammy/5.15.0-53.59/0011-tcp-udp-Fix-memory-leak-in-ipv6_renew_options.patch
- From: 5.15.0-53.59
- CVE-2022-3564
- Description:
Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
- CVE: https://ubuntu.com/security/CVE-2022-3564
- Patch: ubuntu-jammy/5.15.0-53.59/0012-Bluetooth-L2CAP-Fix-use-after-free-caused-by-l2cap_r.patch
- From: 5.15.0-53.59
- CVE-2022-3621
- Description:
nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
- CVE: https://ubuntu.com/security/CVE-2022-3621
- Patch: ubuntu-jammy/5.15.0-53.59/0013-nilfs2-fix-NULL-pointer-dereference-at-nilfs_bmap_lo.patch
- From: 5.15.0-53.59
- CVE-2022-3061
- Description:
video: fbdev: i740fb: Error out if 'pixclock' equals zero
- CVE: https://ubuntu.com/security/CVE-2022-3061
- Patch: ubuntu-jammy/5.15.0-57.63/0001-CVE-2022-3061-video-fbdev-i740fb-Error-out-if-pixclock-equals-zero.patch
- From: 5.15.0-57.63
- CVE-2022-4095
- Description:
staging: rtl8712: fix use after free bugs
- CVE: https://ubuntu.com/security/CVE-2022-4095
- Patch: ubuntu-jammy/5.15.0-57.63/0002-CVE-2022-4095-staging-rtl8712-fix-use-after-free-bugs.patch
- From: 5.15.0-57.63
- CVE-2022-20421
- Description:
binder: fix UAF of ref->proc caused by race condition
- CVE: https://ubuntu.com/security/CVE-2022-20421
- Patch: ubuntu-jammy/5.15.0-57.63/0004-CVE-2022-20421-binder-fix-UAF-of-ref-proc-caused-by-race-condition.patch
- From: 5.15.0-57.63
- CVE-2022-40307
- Description:
[PATCH] efi: capsule-loader: Fix use-after-free in efi_capsule_write
- CVE: https://ubuntu.com/security/CVE-2022-40307
- Patch: ubuntu-jammy/5.15.0-57.63/0007-CVE-2022-40307-efi-capsule-loader-Fix-use-after-free-in-efi_capsule.patch
- From: 5.15.0-57.63
- CVE-2022-40307
- Description:
efi: capsule-loader: Fix use-after-free in efi_capsule_write (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-40307
- Patch: 4.14.0/CVE-2022-40307-efi-capsule-loader-Fix-use-after-free-in-efi_capsule_write-kpatch.patch
- From: 4.14.293
- CVE-2022-3303
- Description:
ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC
- CVE: https://ubuntu.com/security/CVE-2022-3303
- Patch: ubuntu-jammy/5.15.0-57.63/0008-CVE-2022-3303-ALSA-pcm-oss-Fix-race-at-SNDCTL_DSP_SYNC.patch
- From: 5.15.0-57.63
- CVE-2022-3586
- Description:
sch_sfb: Don't assume the skb is still around after enqueueing to
- CVE: https://ubuntu.com/security/CVE-2022-3586
- Patch: ubuntu-jammy/5.15.0-57.63/0009-CVE-2022-3586-sch_sfb-Don-t-assume-the-skb-is-still-around-after-e.patch
- From: 5.15.0-57.63
- CVE-2022-3586
- Description:
sch_sfb: Also store skb len before calling child enqueue
- CVE: https://ubuntu.com/security/CVE-2022-3586
- Patch: ubuntu-jammy/5.15.0-57.63/0010-CVE-2022-3586-sch_sfb-Also-store-skb-len-before-calling-child-enqu.patch
- From: 5.15.0-57.63
- CVE-2022-39842
- Description:
video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write
- CVE: https://ubuntu.com/security/CVE-2022-39842
- Patch: ubuntu-jammy/5.15.0-57.63/0012-CVE-2022-39842-video-fbdev-pxa3xx-gcu-Fix-integer-overflow-in-pxa3x.patch
- From: 5.15.0-57.63
- CVE-2022-43750
- Description:
usb: mon: make mmapped memory read only
- CVE: https://ubuntu.com/security/CVE-2022-43750
- Patch: ubuntu-jammy/5.15.0-57.63/0017-CVE-2022-43750-usb-mon-make-mmapped-memory-read-only.patch
- From: 5.15.0-57.63
- CVE-2022-3649
- Description:
nilfs2: fix use-after-free bug of struct nilfs_root
- CVE: https://ubuntu.com/security/CVE-2022-3649
- Patch: ubuntu-jammy/5.15.0-57.63/0018-CVE-2022-3649-nilfs2-fix-use-after-free-bug-of-struct-nilfs_root.patch
- From: 5.15.0-57.63
- CVE-2022-3646
- Description:
nilfs2: fix leak of nilfs_root in case of writer thread creation
- CVE: https://ubuntu.com/security/CVE-2022-3646
- Patch: ubuntu-jammy/5.15.0-57.63/0019-CVE-2022-3646-nilfs2-fix-leak-of-nilfs_root-in-case-of-writer-thre.patch
- From: 5.15.0-57.63
- CVE-2022-3646
- Description:
nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure
- CVE: https://ubuntu.com/security/CVE-2022-3646
- Patch: ubuntu-jammy/5.15.0-57.63/0020-CVE-2022-3646-nilfs2-replace-WARN_ONs-by-nilfs_error-for-checkpoin.patch
- From: 5.15.0-57.63
- CVE-2022-0171
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2022-0171.patch
- From:
- CVE-2022-39188
- Description:
mm: Force TLB flush for PFNMAP mappings before unlink_file_vma()
- CVE: https://ubuntu.com/security/CVE-2022-39188
- Patch: ubuntu-jammy/5.15.0-57.63/CVE-2022-39188-mm-Force-TLB-flush-for-PFNMAP-mappings-before-unlink_file_vma.patch
- From: 5.15.0-57.63
- CVE-2022-39188
- Description:
mm: Fix TLB flush for not-first PFNMAP mappings in unmap_region()
- CVE: https://ubuntu.com/security/CVE-2022-39188
- Patch: ubuntu-jammy/5.15.0-57.63/CVE-2022-39188-mm-Fix-TLB-flush-for-not-first-PFNMAP-mappings-in-unmap_region.patch
- From: 5.15.0-57.63
- CVE-2022-2663
- Description:
netfilter: nf_conntrack_irc: Fix forged IP logic
- CVE: https://ubuntu.com/security/CVE-2022-2663
- Patch: ubuntu-jammy/5.15.0-57.63/CVE-2022-2663-netfilter-nf_conntrack_irc-Fix-forged-IP-logic.patch
- From: 5.15.0-57.63
- CVE-2022-0171
- Description:
add cache flush to solve SEV cache incoherency issues
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-0171
- Patch: ubuntu-jammy/5.15.0-57.63/CVE-2022-0171.patch
- From: 5.10.149-1
- CVE-2022-0171
- Description:
add cache flush to solve SEV cache incoherency issues (adaptation)
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-0171
- Patch: ubuntu-jammy/5.15.0-57.63/CVE-2022-0171-kpatch-1.patch
- From: 5.10.149-1
- CVE-2022-4378
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: 5.15.0/CVE-2022-4378-0001-proc-proc_skip_spaces-shouldn-t-think-it-is-working-.patch
- From: 5.15.0-58.64
- CVE-2022-4378
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://access.redhat.com/security/cve/CVE-2022-4378
- Patch: 5.15.0/CVE-2022-4378-0002-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: 5.15.0-58.64
- CVE-2022-45934
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: 5.15.0/CVE-2022-45934-0001-Bluetooth-L2CAP-Fix-u8-overflow.patch
- From: 5.15.0-58.64
- CVE-2022-42896
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: 5.15.0/CVE-2022-42896-0001-Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
- From: 5.15.0-58.64
- CVE-2022-42896
- Description:
Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: 5.15.0/CVE-2022-42896-0002-Bluetooth-L2CAP-Fix-l2cap_global_chan_by_psm.patch
- From: 5.15.0-58.64
- CVE-2022-3643
- Description:
xen/netback: Ensure protocol headers don't fall in the non-linear area
- CVE: https://ubuntu.com/security/CVE-2022-3643
- Patch: 5.15.0/CVE-2022-3643-0001-xen-netback-Ensure-protocol-headers-don-t-fall-in-th.patch
- From: 5.15.0-58.64
- CVE-2022-1975
- Description:
fix sleep in atomic bug when firmware download timeout
- CVE: https://access.redhat.com/security/cve/CVE-2022-1975
- Patch: 5.15.0/CVE-2022-1975.patch
- From: v5.19
- CVE-2022-47940
- Description:
ksmbd: validate length in smb2_write()
- CVE: https://ubuntu.com/security/CVE-2022-47940
- Patch: 5.15.0/CVE-2022-47940-ksmbd-validate-length-in-smb2_write.patch
- From: n/a
- CVE-2022-3640
- Description:
Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3640
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-3640-bluetooth-l2cap-fix-use-after-free-in-l2cap-conn-del.patch
- From: 5.15.0-60.66
- CVE-2022-3623
- Description:
mm/hugetlb: fix races when looking up a CONT-PTE/PMD size
- CVE: https://ubuntu.com/security/CVE-2022-3623
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-3623-hugetlb-fix-races-when-looking-up-CONT-PTE-PMD-size-hugetlb-page.patch
- From: 5.15.0-60.66
- CVE-2022-3628
- Description:
wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3628
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-3628-wifi-brcmfmac-Fix-potential-buffer-overflow-in-brcmf.patch
- From: 5.15.0-60.66
- CVE-2022-42895
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
- CVE: https://linux.oracle.com/cve//CVE-2022-4378.html
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-42895-Bluetooth-L2CAP-Fix-attempting-to-access-uninitialized-memory.patch
- From: 5.15.0-60.66
- CVE-2022-3543
- Description:
af_unix: Fix memory leaks of the whole sk due to OOB skb
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3543
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-3543-af_unix-fix-memory-leaks-of-the-whole-sk-due-to-OOB-skb.patch
- From: 5.15.0-60.66
- CVE-2022-41850
- Description:
HID: roccat: Fix use-after-free in roccat_read()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-41850
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-41850-HID-roccat-Fix-use-after-free-in-roccat_read.patch
- From: 5.15.0-60.66
- CVE-2022-3619
- Description:
Bluetooth: L2CAP: Fix memory leak in vhci_write
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3619
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-3619-bluetooth-L2CAP-fix-memory-leak-in-vhci_write.patch
- From: 5.15.0-60.66
- CVE-2022-41849
- Description:
fbdev: smscufx: Fix use-after-free in ufx_ops_open()
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-41849
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2022-41849-fbdev-smscufx-Fix-use-after-free-in-ufx_ops_open.patch
- From: 5.15.0-60.66
- CVE-2023-0590
- Description:
net: sched: fix race condition in qdisc_graft()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-0590
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2023-0590-net-sched-fix-race-condition-in-qdisc_graft.patch
- From: 5.15.0-60.66
- CVE-2022-3169
- Description:
nvme: ensure subsystem reset is single threaded
- CVE: https://ubuntu.com/security/CVE-2022-3169
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3169-nvme-ensure-subsystem-reset-is-single-threaded.patch
- From: 5.15.0-67.74
- CVE-2022-3344
- Description:
[PATCH] KVM: x86: nSVM: leave nested mode on vCPU free
- CVE: https://ubuntu.com/security/CVE-2022-3344
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3344-0001-KVM-x86-nSVM-leave-nested-mode-on-vCPU-free.patch
- From: 5.15.0-67.74
- CVE-2022-3344
- Description:
[PATCH] KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02
- CVE: https://ubuntu.com/security/CVE-2022-3344
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3344-0002-KVM-x86-nSVM-harden-svm_free_nested-against-freeing-.patch
- From: 5.15.0-67.74
- CVE-2022-3344
- Description:
[PATCH] KVM: x86: forcibly leave nested mode on vCPU reset
- CVE: https://ubuntu.com/security/CVE-2022-3344
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3344-0003-KVM-x86-add-kvm_leave_nested.patch
- From: 5.15.0-67.74
- CVE-2022-3344
- Description:
[PATCH] KVM: x86: forcibly leave nested mode on vCPU reset
- CVE: https://ubuntu.com/security/CVE-2022-3344
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3344-0004-KVM-x86-forcibly-leave-nested-mode-on-vCPU-reset.patch
- From: 5.15.0-67.74
- CVE-2022-3435
- Description:
ipv4: Handle attempt to delete multipath route when fib_info
- CVE: https://ubuntu.com/security/CVE-2022-3435
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3435-0002-ipv4-Handle-attempt-to-delete-multipath-route-when-f.patch
- From: 5.15.0-67.74
- CVE-2022-3521
- Description:
kcm: avoid potential race in kcm_tx_work
- CVE: https://ubuntu.com/security/CVE-2022-3521
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3521-kcm-avoid-potential-race-in-kcm_tx_work.patch
- From: 5.15.0-67.74
- CVE-2022-4139
- Description:
drm/i915: fix TLB invalidation for Gen12 video and compute engines
- CVE: https://ubuntu.com/security/CVE-2022-4139
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-4139-0002-drm-i915-gt-Serialize-TLB-invalidates-with-GT-resets.patch
- From: 5.15.0-67.74
- CVE-2022-4139
- Description:
drm/i915: fix TLB invalidation for Gen12 video and compute engines
- CVE: https://ubuntu.com/security/CVE-2022-4139
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-4139-0003-drm-i915-fix-TLB-invalidation-for-Gen12-video-and-co.patch
- From: 5.15.0-67.74
- ubuntu-jammy/5.15.0-67.74/CVE-2022-42328-CVE-2022-42329-0001-xen-netback-do-some-code-cleanup.patch
- Description:
code from this cve inlined in sleepy thread 'xenvif_kthread_guest_rx' that we can't patch
- CVE:
- Patch: skipped/ubuntu-jammy/5.15.0-67.74/CVE-2022-42328-CVE-2022-42329-0001-xen-netback-do-some-code-cleanup.patch.patch
- From:
- ubuntu-jammy/5.15.0-67.74/CVE-2022-42328-CVE-2022-42329-0002-xen-netback-don-t-call-kfree_skb-with-interrupts-dis.patch
- Description:
code from this cve inlined in sleepy thread 'xenvif_kthread_guest_rx' that we can't patch
- CVE:
- Patch: skipped/ubuntu-jammy/5.15.0-67.74/CVE-2022-42328-CVE-2022-42329-0002-xen-netback-don-t-call-kfree_skb-with-interrupts-dis.patch.patch
- From:
- CVE-2022-45869
- Description:
KVM: x86/mmu: Fix race condition in direct_page_fault
- CVE: https://ubuntu.com/security/CVE-2022-45869
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-45869-KVM-x86-mmu-Fix-race-condition-in-direct_page_fault.patch
- From: 5.15.0-67.74
- CVE-2022-47518
- Description:
wifi: wilc1000: validate number of channels
- CVE: https://ubuntu.com/security/CVE-2022-47518
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-47518-wifi-wilc1000-validate-number-of-channels.patch
- From: 5.15.0-67.74
- CVE-2022-47519
- Description:
wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL
- CVE: https://ubuntu.com/security/CVE-2022-47519
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-47519-wifi-wilc1000-validate-length-of-IEEE80211_P2P_ATTR_.patch
- From: 5.15.0-67.74
- CVE-2022-47520
- Description:
wifi: wilc1000: validate pairwise and authentication suite offsets
- CVE: https://ubuntu.com/security/CVE-2022-47520
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-47520-wifi-wilc1000-validate-pairwise-and-authentication-s.patch
- From: 5.15.0-67.74
- CVE-2022-47521
- Description:
wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST
- CVE: https://ubuntu.com/security/CVE-2022-47521
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-47521-wifi-wilc1000-validate-length-of-IEEE80211_P2P_ATTR_.patch
- From: 5.15.0-67.74
- CVE-2022-3545
- Description:
nfp: fix use-after-free in area_cache_get()
- CVE: https://ubuntu.com/security/CVE-2022-3545
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-3545-nfp-fix-use-after-free-in-area_cache_get.patch
- From: 5.15.0-67.74
- CVE-2022-4379
- Description:
NFSD: fix use-after-free in __nfs42_ssc_open()
- CVE: https://ubuntu.com/security/CVE-2022-4379
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2022-4379-NFSD-fix-use-after-free-in-__nfs42_ssc_open.patch
- From: 5.15.0-67.74
- CVE-2023-0179
- Description:
netfilter: nft_payload: incorrect arithmetics when fetching
- CVE: https://ubuntu.com/security/CVE-2023-0179
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-0179-netfilter-nft_payload-incorrect-arithmetics-when-fet.patch
- From: 5.15.0-67.74
- CVE-2023-0461
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://ubuntu.com/security/CVE-2023-0461
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-0461-0001-net-ulp-prevent-ULP-without-clone-op-from-entering-t.patch
- From: 5.15.0-67.74
- CVE-2023-0461
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://ubuntu.com/security/CVE-2023-0461
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-0461-0002-net-ulp-use-consistent-error-code-when-blocking-ULP.patch
- From: 5.15.0-67.74
- CVE-2023-0461
- Description:
net/ulp: prevent ULP without clone op from entering the LISTEN status
- CVE: https://ubuntu.com/security/CVE-2023-0461
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-0461-0003-UBUNTU-SAUCE-Fix-inet_csk_listen_start-after-CVE-202.patch
- From: 5.15.0-67.74
- CVE-2023-26607
- Description:
ntfs: fix use-after-free in ntfs_ucsncmp()
- CVE: https://ubuntu.com/security/CVE-2023-26607
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-26607-0001-ntfs-fix-use-after-free-in-ntfs_ucsncmp.patch
- From: 5.15.0-67.74
- CVE-2023-26607
- Description:
ntfs: fix use-after-free in ntfs_ucsncmp()
- CVE: https://ubuntu.com/security/CVE-2023-26607
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-26607-0002-ntfs-fix-out-of-bounds-read-in-ntfs_attr_find.patch
- From: 5.15.0-67.74
- CVE-2023-1195
- Description:
cifs: fix use-after-free caused by invalid pointer `hostname`
- CVE: https://ubuntu.com/security/CVE-2023-1195
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-1195-cifs-fix-use-after-free-caused-by-invalid-pointer-ho.patch
- From: 5.15.0-67.74
- CVE-2023-1382
- Description:
tipc: fix an information leak in tipc_topsrv_kern_subscr
- CVE: https://ubuntu.com/security/CVE-2023-1382
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-1382-0001-tipc-fix-an-information-leak-in-tipc_topsrv_kern_sub.patch
- From: 5.15.0-67.74
- CVE-2023-1382
- Description:
tipc: fix an information leak in tipc_topsrv_kern_subscr
- CVE: https://ubuntu.com/security/CVE-2023-1382
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-1382-0002-tipc-set-con-sock-in-tipc_conn_alloc.patch
- From: 5.15.0-67.74
- CVE-2023-1382
- Description:
tipc: fix an information leak in tipc_topsrv_kern_subscr
- CVE: https://ubuntu.com/security/CVE-2023-1382
- Patch: ubuntu-jammy/5.15.0-67.74/CVE-2023-1382-0003-tipc-add-an-extra-conn_get-in-tipc_conn_alloc.patch
- From: 5.15.0-67.74
- CVE-2022-2196
- Description:
KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- CVE: https://ubuntu.com/security/CVE-2022-2196
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-2196-KVM-VMX-Execute-IBPB-on-emulated-VM-exit-when-guest-.patch
- From: 5.15.0-69.76
- CVE-2022-3424
- Description:
gru: allow users to specify gru chiplet 2
- CVE: https://ubuntu.com/security/CVE-2022-3424
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-3424-misc-sgi-gru-fix-use-after-free-error-in-gru_set_con.patch
- From: 5.15.0-69.76
- CVE-2022-48423
- Description:
fs/ntfs3: Validate resident attribute name
- CVE: https://ubuntu.com/security/CVE-2022-48423
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-48423-fs-ntfs3-Validate-resident-attribute-name.patch
- From: 5.15.0-69.76
- CVE-2022-48424
- Description:
fs/ntfs3: Validate attribute name offset
- CVE: https://ubuntu.com/security/CVE-2022-48424
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-48424-fs-ntfs3-Validate-attribute-name-offset.patch
- From: 5.15.0-69.76
- CVE-2023-0045
- Description:
x86/bugs: Flush IBP in ib_prctl_set()
- CVE: https://ubuntu.com/security/CVE-2023-0045
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-0045-x86-bugs-Flush-IBP-in-ib_prctl_set.patch
- From: 5.15.0-69.76
- CVE-2023-0210
- Description:
ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in
- CVE: https://ubuntu.com/security/CVE-2023-0210
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-0210-ksmbd-check-nt_len-to-be-at-least-CIFS_ENCPWD_SIZE-i.patch
- From: 5.15.0-69.76
- CVE-2023-0266
- Description:
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
- CVE: https://ubuntu.com/security/CVE-2023-0266
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-0266-ALSA-pcm-Move-rwsem-lock-inside-snd_ctl_elem_read-to.patch
- From: 5.15.0-69.76
- CVE-2023-23454
- Description:
net: sched: cbq: dont intepret cls results when asked to drop
- CVE: https://ubuntu.com/security/CVE-2023-23454
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-23454--net-sched-cbq-dont-intepret-cls-results-when-asked-t.patch
- From: 5.15.0-69.76
- CVE-2023-23455
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://ubuntu.com/security/CVE-2023-23455
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-t.patch
- From: 5.15.0-69.76
- CVE-2023-26544
- Description:
[PATCH] fs/ntfs3: Validate data run offset
- CVE: https://ubuntu.com/security/CVE-2023-26544
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-26544-fs-ntfs3-Validate-data-run-offset.patch
- From: 5.15.0-69.76
- CVE-2023-26544
- Description:
[PATCH] fs/ntfs3: Fix slab-out-of-bounds read in run_unpack
- CVE: https://ubuntu.com/security/CVE-2023-26544
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-26544-fs-ntfs3-Fix-slab-out-of-bounds-read-in-run_unpack.patch
- From: 5.15.0-69.76
- CVE-2023-26544
- Description:
[PATCH] fs/ntfs3: Delete duplicate condition in ntfs_read_mft()
- CVE: https://ubuntu.com/security/CVE-2023-26544
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-26544-fs-ntfs3-Delete-duplicate-condition-in-ntfs_read_mft.patch
- From: 5.15.0-69.76
- CVE-2023-26606
- Description:
[PATCH] fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs
- CVE: https://ubuntu.com/security/CVE-2023-26606
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-26606-fs-ntfs3-Fix-slab-out-of-bounds-read-in-ntfs_trim_fs.patch
- From: 5.15.0-69.76
- CVE-2023-28328
- Description:
general protection fault in az6027_i2c_xfer
- CVE: https://ubuntu.com/security/CVE-2023-28328
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-28328-media-dvb-usb-az6027-fix-null-ptr-deref-in-az6027_i2.patch
- From: 5.15.0-69.76
- CVE-2022-36280
- Description:
drm/vmwgfx: Validate the box size for the snooped cursor
- CVE: https://ubuntu.com/security/CVE-2022-36280
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-36280-drm-vmwgfx-Validate-the-box-size-for-the-snooped-cur.patch
- From: 5.15.0-69.76
- CVE-2022-41218
- Description:
media: dvb-core: Fix UAF due to refcount races at releasing
- CVE: https://ubuntu.com/security/CVE-2022-41218
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-41218-media-dvb-core-Fix-UAF-due-to-refcount-races-at-rele.patch
- From: 5.15.0-69.76
- CVE-2022-4382
- Description:
USB: gadgetfs: Fix race between mounting and unmounting
- CVE: https://ubuntu.com/security/CVE-2022-4382
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2022-4382-USB-gadgetfs-Fix-race-between-mounting-and-unmountin.patch
- From: 5.15.0-69.76
- CVE-2023-23559
- Description:
wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
- CVE: https://ubuntu.com/security/CVE-2023-23559
- Patch: ubuntu-jammy/5.15.0-69.76/CVE-2023-23559-wifi-rndis_wlan-Prevent-buffer-overflow-in-rndis_que.patch
- From: 5.15.0-69.76
- CVE-2023-0386
- Description:
ovl: fail on invalid uid/gid mapping at copy up
- CVE: https://ubuntu.com/security/CVE-2023-0386
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-0386-ovl-fail-on-invalid-uid-gid-mapping-at-copy-up.patch
- From: 5.15.0-70.77
- CVE-2023-1281
- Description:
net/sched: tcindex: update imperfect hash filters respecting rcu
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1281
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-1281-net-sched-tcindex-update-imperfect-hash-filters-respecting-rcu.patch
- From: 5.15.0-70.77
- CVE-2023-1652
- Description:
NFSD: fix use-after-free in nfsd4_ssc_setup_dul()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1652
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-1652-nfsd-fix-use-after-free-in-nfsd4_ssc_setup_dul.patch
- From: 5.15.0-70.77
- CVE-2023-1073
- Description:
HID: check empty report_list in hid_validate_values()
- CVE: https://ubuntu.com/security/CVE-2023-1073
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-1073-hid-check-empty-report_list-in-hid_validate_values.patch
- From: 5.15.0-70.77
- CVE-2022-4129
- Description:
l2tp: Serialize access to sk_user_data with sk_callback_lock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2022-4129-l2tp-Serialize-access-to-sk_user_data-with-sk_callback_lock.patch
- From: 5.15.0-70.77
- CVE-2022-4129
- Description:
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-4129.html
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2022-4129-l2tp-Don-t-sleep-and-disable-BH-under-writer-side-sk_callback_lock.patch
- From: 5.15.0-70.77
- CVE-2022-47929
- Description:
net: sched: disallow noqueue for qdisc classes
- CVE: https://ubuntu.com/security/CVE-2022-47929
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2022-47929-net-sched-disallow-noqueue-for-qdisc-classes.patch
- From: 5.15.0-70.77
- CVE-2022-4842
- Description:
fs/ntfs3: Fix attr_punch_hole() null pointer derenference
- CVE: https://ubuntu.com/security/CVE-2022-4842
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2022-4842-fs-ntfs3-fix-attr_punch_hole-null-pointer-derenference.patch
- From: 5.15.0-70.77
- CVE-2023-0394
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://ubuntu.com/security/CVE-2023-0394
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-0394-ipv6-raw-deduct-extension-header-length-in-rawv6_push_pending_frames.patch
- From: 5.15.0-70.77
- CVE-2023-1074
- Description:
sctp: fail if no bound addresses can be used for a given scope
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-1074
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-1074-sctp-fail-if-no-bound-addresses-can-be-used-for-given-scope.patch
- From: 5.15.0-70.77
- CVE-2023-26545
- Description:
net: mpls: fix stale pointer if allocation fails during device rename
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-26545.html
- Patch: ubuntu-jammy/5.15.0-70.77/CVE-2023-26545-net-mpls-fix-stale-pointer-if-allocation-fails-during-device-rename.patch
- From: 5.15.0-70.77
- CVE-2023-1829
- Description:
Complex adaptation is required, mainline retired tcindex.
- CVE:
- Patch: skipped/CVE-2023-1829.patch
- From:
- CVE-2023-1078
- Description:
rds: rds_rm_zerocopy_callback() use list_first_entry()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-1078.html
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-1078-rds-rds_rm_zerocopy_callback-use-list_first_entry.patch
- From: 5.15.0-72.79
- CVE-2023-1118
- Description:
[PATCH] media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
- CVE: https://ubuntu.com/security/CVE-2023-1118
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-1118-patch-media-rc-fix-use-after-free-bugs-caused-by-ene-tx-irqsim.patch
- From: 5.15.0-72.79
- CVE-2023-20938
- Description:
Out of scope. Android related patch.
- CVE:
- Patch: skipped/CVE-2023-20938.patch
- From:
- CVE-2022-3707
- Description:
drm/i915/gvt: fix double free bug in split_2MB_gtt_entry
- CVE: https://access.redhat.com/security/cve/CVE-2022-3707
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2022-3707-drm-i915-gvt-fix-double-free-bug-in-split_2MB_gtt_entry.patch
- From: 5.15.0-72.79
- CVE-2023-2162
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost
- CVE: https://ubuntu.com/security/CVE-2023-2162
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-2162-patch-scsi-iscsi-tcp-fix-uaf-during-login-when-accessing-the.patch
- From: 5.15.0-72.79
- CVE-2022-27672
- Description:
x86/speculation: Identify processors vulnerable to SMT RSB predictions
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: smt_rsb-enable.patch
- From: N/A
- CVE-2022-27672
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug.patch
- From: 5.15.0-72.79
- CVE-2022-27672
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug-kpatch.patch
- From: 5.15.0-72.79
- CVE-2023-1075
- Description:
net/tls: tls_is_tx_ready() checked list_entry
- CVE: https://ubuntu.com/security/CVE-2023-1075
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-1075-net-tls-tls_is_tx_ready-checked-list_entry.patch
- From: 5.15.0-72.79
- CVE-2023-1513
- Description:
kvm: initialize all of the kvm_debugregs structure before sending it
- CVE: https://ubuntu.com/security/CVE-2023-1513
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-1513-patch-kvm-initialize-all-of-the-kvm-debugregs-structure-before.patch
- From: 5.15.0-72.79
- CVE-2023-0459
- Description:
Safety check failed for copy_from_user; zendesk:191568
- CVE:
- Patch: skipped/CVE-2023-0459.patch
- From:
- CVE-2023-32269
- Description:
netrom: Fix use-after-free caused by accept on already connected
- CVE: https://ubuntu.com/security/CVE-2023-32269
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-32269-patch-netrom-fix-use-after-free-caused-by-accept-on-already.patch
- From: 5.15.0-72.79
- CVE-2023-3161
- Description:
fbcon: Check font dimension limits
- CVE: https://ubuntu.com/security/CVE-2023-3161
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-3161-fbcon-check-font-dimension-limits.patch
- From: 5.15.0-72.79
- CVE-2023-32233
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase
- CVE: https://ubuntu.com/security/CVE-2023-32233
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-32233-patch-netfilter-nf-tables-deactivate-anonymous-set-from.patch
- From: 5.15.0-73.80
- CVE-2023-31436
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://ubuntu.com/security/CVE-2023-31436
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-31436-patch-net-sched-sch-qfq-prevent-slab-out-of-bounds-in.patch
- From: 5.15.0-73.80
- CVE-2023-1380
- Description:
wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
- CVE: https://ubuntu.com/security/CVE-2023-1380
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-1380-patch-wifi-brcmfmac-slab-out-of-bounds-read-in.patch
- From: 5.15.0-73.80
- CVE-2023-30456
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://ubuntu.com/security/CVE-2023-30456
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-30456-patch-kvm-nvmx-add-missing-consistency-checks-for-cr0-and-cr4.patch
- From: 5.15.0-73.80
- CVE-2023-1670
- Description:
xirc2ps_cs: Fix use after free bug in xirc2ps_detach
- CVE: https://ubuntu.com/security/CVE-2023-1670
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1670-xirc2ps_cs-fix-use-after-free-bug-in-xirc2ps_detach.patch
- From: 5.15.0-75.82
- CVE-2023-1077
- Description:
sched/rt: pick_next_rt_entity(): check list_entry
- CVE: https://ubuntu.com/security/CVE-2023-1077
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1077-sched-rt-pick_next_rt_entity-check-list_entry.patch
- From: 5.15.0-75.82
- CVE-2023-1079
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://ubuntu.com/security/CVE-2023-1079
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers.patch
- From: 5.15.0-75.82
- CVE-2023-1079
- Description:
HID: asus: use spinlock to safely schedule workers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-1079
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers-kpatch.patch
- From: 5.15.0-75.82
- CVE-2023-1076
- Description:
net: add sock_init_data_uid()
- CVE: https://ubuntu.com/security/CVE-2023-1076
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1076-net-add-sock_init_data_uid.patch
- From: 5.15.0-75.82
- CVE-2023-1076
- Description:
tap: tap_open(): correctly initialize socket uid
- CVE: https://ubuntu.com/security/CVE-2023-1076
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1076-tap-tap_open-correctly-initialize-socket-uid.patch
- From: 5.15.0-75.82
- CVE-2023-1076
- Description:
tun: tun_chr_open(): correctly initialize socket uid
- CVE: https://ubuntu.com/security/CVE-2023-1076
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1076-tun-tun_chr_open-correctly-initialize-socket-uid.patch
- From: 5.15.0-75.82
- CVE-2023-2985
- Description:
fs: hfsplus: fix UAF issue in hfsplus_put_super
- CVE: https://ubuntu.com/security/CVE-2023-2985
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-2985-fs-hfsplus-fix-uaf-issue-in-hfsplus_put_super.patch
- From: 5.15.0-75.82
- CVE-2023-1859
- Description:
9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2023-1859
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1859-9p-xen-fix-use-after-free-bug-in-xen_9pfs_front_remove-due-to-race-condition.patch
- From: 5.15.0-75.82
- CVE-2023-25012
- Description:
HID: bigben: use spinlock to safely schedule workers
- CVE: https://ubuntu.com/security/CVE-2023-25012
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-25012-HID-bigben-use-spinlock-to-safely-schedule-workers.patch
- From: 5.15.0-75.82
- CVE-2023-25012
- Description:
HID: bigben: use spinlock to safely schedule workers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-25012
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-25012-HID-bigben-use-spinlock-to-safely-schedule-workers-kpatch.patch
- From: 5.15.0-75.82
- CVE-2023-35788
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://ubuntu.com/security/CVE-2023-35788
- Patch: ubuntu-jammy/5.15.0-76.83/CVE-2023-35788-patch-net-sched-flower-fix-possible-oob-write-in.patch
- From: 5.15.0-76.83
- CVE-2023-3389
- Description:
io_uring: mutex locked poll hashing
- CVE: https://ubuntu.com/security/CVE-2023-3389
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-3389-patch-io-uring-hold-uring-mutex-around-poll-removal-2.patch
- From: 5.15.0-78.85
- CVE-2023-3439
- Description:
mctp: defer the kfree of object mdev->addrs
- CVE: https://ubuntu.com/security/CVE-2023-3439
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-3439-patch-mctp-defer-the-kfree-of-object-mdev-addrs.patch
- From: 5.15.0-78.85
- CVE-2023-3390 CVE-2023-3117
- Description:
netfilter: nf_tables: incorrect error path handling with
- CVE: https://ubuntu.com/security/CVE-2023-3117
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-3117-CVE-2023-3390-patch-netfilter-nf-tables-incorrect-error-path-handling-with.patch
- From: 5.15.0-78.85
- CVE-2023-3090
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://ubuntu.com/security/CVE-2023-3090
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-3090-patch-ipvlan-fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 5.15.0-78.85
- CVE-2023-35001
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://ubuntu.com/security/CVE-2023-35001
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
- From: 5.15.0-78.85
- CVE-2023-31248
- Description:
netfilter: nf_tables: do not ignore genmask when looking up chain by id
- CVE: https://ubuntu.com/security/CVE-2023-31248
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-31248-netfilter-nf_tables-do-not-ignore-genmask-when-looking-up-chain-by-id.patch
- From: 5.15.0-78.85
- CVE-2023-1611
- Description:
btrfs: fix race between quota disable and quota assign ioctls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-1611
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-1611-btrfs-fix-race-between-quota-disable-and-quota-assig.patch
- From: 5.15.0-79.86
- CVE-2023-1855
- Description:
hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-1855
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-1855-hwmon-xgene-Fix-use-after-free-bug-in-xgene_hwmon_re.patch
- From: 5.15.0-79.86
- CVE-2023-1990
- Description:
nfc: st-nci: Fix use after free bug in ndlc_remove due to race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-1990
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-1990-nfc-st-nci-Fix-use-after-free-bug-in-ndlc_remove-due.patch
- From: 5.15.0-79.86
- CVE-2023-2002
- Description:
bluetooth: Perform careful capability checks in hci_sock_ioctl()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2002
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2002-bluetooth-Perform-careful-capability-checks-in-hci_s.patch
- From: 5.15.0-79.86
- CVE-2023-2124
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2124
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2124-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: 5.15.0-79.86
- CVE-2023-2163
- Description:
bpf: Fix incorrect verifier pruning due to missing register precision
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2163
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2163-bpf-Fix-incorrect-verifier-pruning-due-to-missing-re.patch
- From: 5.15.0-79.86
- CVE-2023-2194
- Description:
i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2194
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_sli.patch
- From: 5.15.0-79.86
- CVE-2023-2235
- Description:
perf: Fix check before add_event_to_groups() in perf_group_detach()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2235
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2235-perf-Fix-check-before-add_event_to_groups-in-perf_gr.patch
- From: 5.15.0-79.86
- CVE-2023-2269
- Description:
dm ioctl: fix nested locking in table_clear() to remove deadlock concern
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2269
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2269-dm-ioctl-fix-nested-locking-in-table_clear-to-remove.patch
- From: 5.15.0-79.86
- CVE-2023-23004
- Description:
malidp: Fix NULL vs IS_ERR() checking
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-23004
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-23004-malidp-Fix-NULL-vs-IS_ERR-checking.patch
- From: 5.15.0-79.86
- CVE-2023-28466
- Description:
net: tls: fix possible race condition between
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-28466
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_g_kpatch.patch
- From: 5.15.0-79.86
- CVE-2023-30772
- Description:
power: supply: da9150: Fix use after free bug in
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-30772
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-30772-power-supply-da9150-Fix-use-after-free-bug-in-da9150.patch
- From: 5.15.0-79.86
- CVE-2023-3141
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-3141
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-3141-memstick-r592-Fix-UAF-bug-in-r592_remove-due-to-race.patch
- From: 5.15.0-79.86
- CVE-2023-32248
- Description:
ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-32248
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-32248-ksmbd-fix-NULL-pointer-dereference-in-smb2_get_info_.patch
- From: 5.15.0-79.86
- CVE-2023-3268
- Description:
relayfs: fix out-of-bounds access in relay_file_read
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-3268
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-3268-relayfs-fix-out-of-bounds-access-in-relay_file_read.patch
- From: 5.15.0-79.86
- CVE-2023-33203
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-33203
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-33203-net-qcom-emac-Fix-use-after-free-bug-in-emac_remove-.patch
- From: 5.15.0-79.86
- CVE-2023-33288
- Description:
power: supply: bq24190: Fix use after free bug in bq24190_remove due
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-33288
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-33288-power-supply-bq24190-Fix-use-after-free-bug-in-bq241_kpatch.patch
- From: 5.15.0-79.86
- CVE-2023-35823
- Description:
media: saa7134: fix use after free bug in saa7134_finidev due to race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-35823
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-35823-media-saa7134-fix-use-after-free-bug-in-saa7134_fini.patch
- From: 5.15.0-79.86
- CVE-2023-35824
- Description:
media: dm1105: Fix use after free bug in dm1105_remove due to race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-35824
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-35824-media-dm1105-Fix-use-after-free-bug-in-dm1105_remove.patch
- From: 5.15.0-79.86
- CVE-2023-35828
- Description:
usb: gadget: udc: renesas_usb3: Fix use after free bug in
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-35828
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-35828-usb-gadget-udc-renesas_usb3-Fix-use-after-free-bug-i.patch
- From: 5.15.0-79.86
- CVE-2023-35829
- Description:
media: rkvdec: fix use after free bug in rkvdec_remove
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-35829
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-35829-media-rkvdec-fix-use-after-free-bug-in-rkvdec_remove.patch
- From: 5.15.0-79.86
- CVE-2022-4269
- Description:
act_mirred: use the backlog for nested calls to mirred ingress
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-4269
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2022-4269-act_mirred-use-the-backlog-for-nested-calls-to-mirre_kpatch.patch
- From: 5.15.0-79.86
- CVE-2022-48502
- Description:
fs/ntfs3: Check fields while reading
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-48502
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2022-48502-fs-ntfs3-Check-fields-while-reading-2.patch
- From: 5.15.0-79.86
- CVE-2023-0597
- Description:
Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
- CVE:
- Patch: skipped/CVE-2023-0597.patch
- From:
- CVE-2023-21400
- Description:
io_uring: ensure IOPOLL locks around deferred work
- CVE: https://ubuntu.com/security/CVE-2023-21400
- Patch: ubuntu-jammy/5.15.0-60.66/CVE-2023-21400-patch-io-uring-ensure-iopoll-locks-around-deferred-work.patch
- From: 5.15.0-82.91
- CVE-2023-3777
- Description:
netfilter: nf_tables: skip bound chain on rule flush
- CVE: https://ubuntu.com/security/CVE-2023-3777
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3777-patch-netfilter-nf-tables-skip-bound-chain-on-rule-flush.patch
- From: 5.15.0-82.91
- CVE-2023-3995 CVE-2023-4147
- Description:
netfilter: nf_tables: disallow rule addition to bound chain via
- CVE: https://ubuntu.com/security/CVE-2023-4147
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3995-CVE-2023-4147-patch-netfilter-nf-tables-disallow-rule-addition-to-bound-chain.patch
- From: 5.15.0-82.91
- CVE-2023-20593
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: zenbleed-enable.patch
- From: N/A
- CVE-2023-3776
- Description:
net/sched: cls_fw: Fix improper refcount update leads to
- CVE: https://ubuntu.com/security/CVE-2023-3776
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3776-patch-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 5.15.0-82.91
- CVE-2023-4004
- Description:
netfilter: nft_set_pipapo: fix improper element removal
- CVE: https://ubuntu.com/security/CVE-2023-4004
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-4004-patch-netfilter-nft-set-pipapo-fix-improper-element-removal.patch
- From: 5.15.0-82.91
- CVE-2023-3611
- Description:
net/sched: sch_qfq: refactor parsing of netlink parameters
- CVE: https://ubuntu.com/security/CVE-2023-3611
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3611-net-sched-sch_qfq-refactor-parsing-of-netlink-parameters.patch
- From: 5.15.0-82.91
- CVE-2023-3611
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://ubuntu.com/security/CVE-2023-3611
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3611-patch-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
- From: 5.15.0-82.91
- CVE-2023-3611
- Description:
net/sched: sch_qfq: refactor parsing of netlink parameters (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-3611
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3611-net-sched-sch_qfq-refactor-parsing-of-netlink-parameters-kpatch.patch
- From: 5.15.0-82.91
- CVE-2023-3610
- Description:
netfilter: nf_tables: fix chain binding transaction logic
- CVE: https://ubuntu.com/security/CVE-2023-3610
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3610-patch-netfilter-nf-tables-fix-chain-binding-transaction-logic-67.74.patch
- From: 5.15.0-82.91
- CVE-2023-3610
- Description:
netfilter: nf_tables: fix chain binding transaction logic
- CVE: https://ubuntu.com/security/CVE-2023-3610
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3610-netfilter-nf_tables-fix-chain-binding-transaction-lo-kpatch-67.74.patch
- From: 5.15.0-82.91
- CVE-2023-3609
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://ubuntu.com/security/CVE-2023-3609
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3609-patch-net-sched-cls-u32-fix-reference-counter-leak-leading-to.patch
- From: 5.15.0-82.91
- CVE-2023-4015
- Description:
netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain
- CVE: https://ubuntu.com/security/CVE-2023-4015
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-4015-0001-netfilter-nf_tables-add-NFT_TRANS_PREPARE_ERROR-to-d-78.85.patch
- From: 5.15.0-82.91
- CVE-2023-4015
- Description:
netfilter: nf_tables: unbind non-anonymous set if rule construction fails
- CVE: https://ubuntu.com/security/CVE-2023-4015
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-4015-0002-netfilter-nf_tables-unbind-non-anonymous-set-if-rule.patch
- From: 5.15.0-82.91
- CVE-2023-4015
- Description:
netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
- CVE: https://ubuntu.com/security/CVE-2023-4015
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-4015-0003-netfilter-nf_tables-skip-immediate-deactivate-in-_PR.patch
- From: 5.15.0-82.91
- CVE-2022-40982
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2022-40982.patch
- From:
- CVE-2023-3212
- Description:
gfs2: Don't deref jdesc in evict
- CVE: https://ubuntu.com/security/CVE-2023-3212
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-3212-patch-gfs2-don-t-deref-jdesc-in-evict.patch
- From: 5.15.0-83.92
- CVE-2023-21255
- Description:
binder: fix UAF caused by faulty buffer cleanup
- CVE: https://ubuntu.com/security/CVE-2023-21255
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-21255-patch-binder-fix-uaf-caused-by-faulty-buffer-cleanup.patch
- From: 5.15.0-83.92
- CVE-2023-38426
- Description:
ksmbd: fix global-out-of-bounds in smb2_find_context_vals
- CVE: https://ubuntu.com/security/CVE-2023-38426
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-38426-patch-ksmbd-fix-global-out-of-bounds-in-smb2-find-context-vals.patch
- From: 5.15.0-83.92
- CVE-2023-38428
- Description:
ksmbd: fix wrong UserName check in session_user
- CVE: https://ubuntu.com/security/CVE-2023-38428
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-38428-patch-ksmbd-fix-wrong-username-check-in-session-user.patch
- From: 5.15.0-83.92
- CVE-2023-38429
- Description:
ksmbd: allocate one more byte for implied bcc[0]
- CVE: https://ubuntu.com/security/CVE-2023-38429
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-38429-patch-ksmbd-allocate-one-more-byte-for-implied-bcc-0-1.patch
- From: 5.15.0-83.92
- CVE-2023-1192 CVE-2022-48425
- Description:
fs/ntfs3: Validate MFT flags before replaying logs
- CVE: https://ubuntu.com/security/CVE-2022-48425
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2022-48425-CVE-2023-1192-patch-fs-ntfs3-validate-mft-flags-before-replaying-logs.patch
- From: 5.15.0-83.92
- CVE-2023-34256
- Description:
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
- CVE: https://ubuntu.com/security/CVE-2023-34256
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-34256-patch-ext4-avoid-a-potential-slab-out-of-bounds-in.patch
- From: 5.15.0-83.92
- CVE-2023-31084
- Description:
media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
- CVE: https://ubuntu.com/security/CVE-2023-31084
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-31084-media-dvb-core-fix-kernel-WARNING-for-blocking-operation-in-wait_event.patch
- From: 5.15.0-83.92
- CVE-2023-2898
- Description:
f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()
- CVE: https://ubuntu.com/security/CVE-2023-2898
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-2898-f2fs-fix-to-avoid-NULL-pointer-dereference-f2fs_write_end_io-1.patch
- From: 5.15.0-83.92
- CVE-2023-4569
- Description:
netfilter: nf_tables: deactivate catchall elements in next generation
- CVE: https://ubuntu.com/security/CVE-2023-4569
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-4569-0001-netfilter-nf_tables-deactivate-catchall-elements-in-.patch
- From: 5.15.0-84.93
- CVE-2023-40283
- Description:
Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
- CVE: https://ubuntu.com/security/CVE-2023-40283
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-40283-patch-bluetooth-l2cap-fix-use-after-free-in-l2cap-sock-ready-cb.patch
- From: 5.15.0-84.93
- CVE-2023-4207
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4207
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-patch-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.15.0-84.93
- CVE-2023-4128 CVE-2023-4207 CVE-2023-4206 CVE-2023-4208
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4206
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-patch-net-sched-cls-fw-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.15.0-84.93
- CVE-2023-4208
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4208
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-patch-net-sched-cls-u32-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.15.0-84.93
- CVE-2023-4194
- Description:
net: tap_open(): set sk_uid from current_fsuid()
- CVE: https://ubuntu.com/security/CVE-2023-4194
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-4194-patch-net-tap-open-set-sk-uid-from-current-fsuid.patch
- From: 5.15.0-86.96
- CVE-2023-4194
- Description:
net: tun_chr_open(): set sk_uid from current_fsuid()
- CVE: https://ubuntu.com/security/CVE-2023-4194
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-4194-patch-net-tun-chr-open-set-sk-uid-from-current-fsuid.patch
- From: 5.15.0-86.96
- CVE-2023-4155
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2023-4155.patch
- From:
- CVE-2023-1206
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- CVE:
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-44466
- Description:
libceph: harden msgr2.1 frame segment length checks
- CVE: https://ubuntu.com/security/CVE-2023-44466
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-44466-patch-libceph-harden-msgr2-1-frame-segment-length-checks.patch
- From: 5.15.0-86.96
- CVE-2023-3866
- Description:
ksmbd: validate session id and tree id in the compound request
- CVE: https://ubuntu.com/security/CVE-2023-3866
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-3866-patch-ksmbd-validate-session-id-and-tree-id-in-the-compound.patch
- From: 5.15.0-86.96
- CVE-2023-3338
- Description:
The patch remove functionality.
- CVE:
- Patch: skipped/CVE-2023-3338.patch
- From:
- CVE-2023-4273
- Description:
[PATCH] exfat: check if filename entries exceeds max filename length
- CVE: https://ubuntu.com/security/CVE-2023-4273
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-4273-patch-exfat-check-if-filename-entries-exceeds-max-filename-length.patch
- From: 5.15.0-86.96
- CVE-2023-3863
- Description:
[PATCH] nfc: llcp: simplify llcp_sock_connect() error paths
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-3863-nfc-llcp-simplify-llcp_sock_connect-error-paths.patch
- From: 5.15.0-86.96
- CVE-2023-3863
- Description:
[PATCH] net: nfc: Fix use-after-free caused by nfc_llcp_find_local
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-3863-patch-net-nfc-fix-use-after-free-caused-by-nfc-llcp-find-local.patch
- From: 5.15.0-86.96
- CVE-2023-38432
- Description:
ksmbd: use ksmbd_req_buf_next() in ksmbd_smb2_check_message()
- CVE: https://ubuntu.com/security/CVE-2023-38432
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-38432-ksmbd-use-ksmbd_req_buf_next-in-ksmbd_smb2_check_mes.patch
- From: 5.15.0-86.96
- CVE-2023-38432
- Description:
ksmbd: validate command payload size
- CVE: https://ubuntu.com/security/CVE-2023-38432
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-38432-ksmbd-validate-command-payload-size.patch
- From: 5.15.0-86.96
- CVE-2023-3865
- Description:
ksmbd: fix out-of-bound read in smb2_write
- CVE: https://ubuntu.com/security/CVE-2023-3865
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-3865-ksmbd-fix-out-of-bound-read-in-smb2_write.patch
- From: 5.15.0-86.96
- CVE-2023-4132
- Description:
Smart Patch for drivers/media/usb/siano/smsusb.c
- CVE: https://ubuntu.com/security/CVE-2023-4132
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-4132-smart-backport-for-drivers-media-usb-siano-smsusb-c.patch
- From: 5.15.0-86.96
- CVE-2023-20569
- Description:
A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.
- CVE:
- Patch: skipped/CVE-2023-20569.patch
- From:
- CVE-2023-2156
- Description:
ipv6: rpl: Fix Route of Death.
- CVE: https://ubuntu.com/security/CVE-2023-2156
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-2156-ipv6-rpl-Fix-Route-of-Death.patch
- From: 5.15.0-86.96
- CVE-2023-2156
- Description:
net: rpl: fix rpl header size calculation
- CVE: https://ubuntu.com/security/CVE-2023-2156
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-2156-net-rpl-fix-rpl-header-size-calculation.patch
- From: 5.15.0-86.96
- CVE-2023-42755
- Description:
The patch removes functionality.
- CVE:
- Patch: skipped/CVE-2023-42755.patch
- From:
- CVE-2023-4622
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://ubuntu.com/security/CVE-2023-4622
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4622-0001-af_unix-Fix-null-ptr-deref-in-unix_stream_sendpage.patch
- From: 5.15.0-87.97
- CVE-2023-4881
- Description:
netfilter: nftables: exthdr: fix 4-byte stack OOB write
- CVE: https://ubuntu.com/security/CVE-2023-4881
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4881-0001-netfilter-nftables-exthdr-fix-4-byte-stack-OOB-write.patch
- From: 5.15.0-87.97
- CVE-2023-42752
- Description:
igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU
- CVE: https://ubuntu.com/security/CVE-2023-42752
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-42752-0001-igmp-limit-igmpv3_newpack-packet-size-to-IP_MAX_MTU.patch
- From: 5.15.0-87.97
- CVE-2023-4921
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4921-0001-net-sched-sch_qfq-Fix-UAF-in-qfq_dequeue.patch
- From: 5.15.0-87.97
- CVE-2023-4921
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue-kpatch.patch
- From: 5.15.0-87.97
- CVE-2023-42753
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for
- CVE: https://ubuntu.com/security/CVE-2023-42753
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-42753-0001-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET.patch
- From: 5.15.0-87.97
- CVE-2023-4623
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://ubuntu.com/security/CVE-2023-4623
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4623-0001-net-sched-sch_hfsc-Ensure-inner-classes-have-fsc-cur.patch
- From: 5.15.0-87.97
- CVE-2023-5197
- Description:
netfilter: nf_tables: skip bound chain in netns release path
- CVE: https://ubuntu.com/security/CVE-2023-5197
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-5197-0001-netfilter-nf_tables-skip-bound-chain-in-netns-releas.patch
- From: 5.15.0-87.97
- CVE-2023-5197
- Description:
netfilter: nf_tables: disallow rule removal from chain binding
- CVE: https://ubuntu.com/security/CVE-2023-5197
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-5197-0002-netfilter-nf_tables-disallow-rule-removal-from-chain-84.93.patch
- From: 5.15.0-87.97
- CVE-2023-4244
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- CVE:
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-31083
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in
- CVE: https://ubuntu.com/security/CVE-2023-31083
- Patch: ubuntu-jammy/5.15.0-88.98/CVE-2023-31083-patch-bluetooth-hci-ldisc-check-hci-uart-proto-ready-flag-in.patch
- From: 5.15.0-88.98
- CVE-2023-3772
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://ubuntu.com/security/CVE-2023-3772
- Patch: ubuntu-jammy/5.15.0-88.98/CVE-2023-3772-0001-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: 5.15.0-88.98
- CVE-2023-31085
- Description:
ubi: Refuse attaching if mtd's erasesize is 0
- CVE: https://ubuntu.com/security/CVE-2023-31085
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-31085-patch-ubi-refuse-attaching-if-mtd-s-erasesize-is-0.patch
- From: 5.15.0-89.99
- CVE-2023-45871
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://ubuntu.com/security/CVE-2023-45871
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-45871-patch-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 5.15.0-89.99
- CVE-2023-45871
- Description:
igb: set max size RX buffer when store bad packet is enabled (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-45871
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch.patch
- From: 5.14.0-362.13.1.el9_3
- CVE-2023-25775
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://ubuntu.com/security/CVE-2023-25775
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-25775-0001-RDMA-irdma-Prevent-zero-length-STAG-registration.patch
- From: 5.15.0-89.99
- CVE-2023-25775
- Description:
RDMA/irdma: Prevent zero-length STAG registration (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-25775
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-25775-0001-RDMA-irdma-Prevent-zero-length-STAG-registration-kpatch.patch
- From: 5.15.0-89.99
- CVE-2023-39189
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39189
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39189-patch-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 5.15.0-91.101
- CVE-2023-39192
- Description:
netfilter: xt_u32: validate user space input
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39192-patch-netfilter-xt-u32-validate-user-space-input.patch
- From: 5.15.0-91.101
- CVE-2023-39192
- Description:
netfilter: xt_u32: validate user space input (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39192-netfilter-xt-u32-validate-user-space-input-kpatch.patch
- From: 5.15.0-91.101
- CVE-2023-39193
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://ubuntu.com/security/CVE-2023-39193
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39193-patch-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 5.15.0-91.101
- CVE-2023-5178
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://ubuntu.com/security/CVE-2023-5178
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-5178-patch-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 5.15.0-91.101
- CVE-2023-5158
- Description:
vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()
- CVE: https://ubuntu.com/security/CVE-2023-5158
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-5158-patch-vringh-don-t-use-vringh-kiov-advance-in-vringh-iov-xfer.patch
- From: 5.15.0-91.101
- CVE-2023-42754
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://ubuntu.com/security/CVE-2023-42754
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-42754-patch-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 5.15.0-91.101
- CVE-2023-39198
- Description:
drm/qxl: fix UAF on handle creation
- CVE: https://ubuntu.com/security/CVE-2023-39198
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39198-patch-drm-qxl-fix-uaf-on-handle-creation.patch
- From: 5.15.0-91.101
- CVE-2023-3773
- Description:
xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH
- CVE: https://ubuntu.com/security/CVE-2023-3773
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-3773-patch-xfrm-add-forgotten-nla-policy-for-xfrma-mtimer-thresh.patch
- From: 5.15.0-91.101
- CVE-2023-3773
- Description:
xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH
- CVE: https://ubuntu.com/security/CVE-2023-3773
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-3773-patch-xfrm-add-forgotten-nla-policy-for-xfrma-mtimer-thresh-kpatch.patch
- From: 5.15.0-91.101
- CVE-2023-39194
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39194
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39194-patch-net-xfrm-fix-xfrm-address-filter-oob-read.patch
- From: 5.15.0-91.101
- CVE-2023-37453
- Description:
USB: core: Unite old scheme and new scheme descriptor reads (dependency)
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-37453-02-patch-usb-core-unite-old-scheme-and-new-scheme-descriptor-reads.patch
- From: 5.15.0-91.101
- CVE-2023-37453
- Description:
USB: core: Change usb_get_device_descriptor() API (dependency)
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-37453-01-patch-usb-core-change-usb-get-device-descriptor-api.patch
- From: 5.15.0-91.101
- CVE-2023-37453
- Description:
USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-37453-patch-usb-core-fix-race-by-not-overwriting-udev-descriptor-in.patch
- From: 5.15.0-91.101
- CVE-2023-6040
- Description:
netfilter: nf_tables: Reject tables of unsupported family
- CVE: https://ubuntu.com/security/CVE-2023-6040
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-6040-netfilter-nf_tables-Reject-tables-of-unsupported-fam.patch
- From: 5.15.0-92.102
- CVE-2023-6606
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://ubuntu.com/security/CVE-2023-6606
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-6606-smb-client-fix-OOB-in-smbCalcSize.patch
- From: 5.15.0-92.102
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://ubuntu.com/security/CVE-2023-6931
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-6931-perf-Fix-perf_event_validate_size.patch
- From: 5.15.0-92.102
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size() lockdep splat
- CVE: https://ubuntu.com/security/CVE-2023-6931
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-6931-perf-Fix-perf_event_validate_size-lockdep-splat.patch
- From: 5.15.0-92.102
- CVE-2023-6932
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://ubuntu.com/security/CVE-2023-6932
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-q.patch
- From: 5.15.0-92.102
- CVE-2023-6039
- Description:
Complex adaptation required, low impact CVE.
- CVE:
- Patch: skipped/CVE-2023-6039.patch
- From:
- CVE-2024-0641
- Description:
tipc: fix a potential deadlock on &tx->lock
- CVE: https://ubuntu.com/security/CVE-2024-0641
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2024-0641-tipc-fix-a-potential-deadlock-on-tx-lock.patch
- From: 5.15.0-94.104
- CVE-2023-34324
- Description:
xen/events: replace evtchn_rwlock with RCU
- CVE: https://ubuntu.com/security/CVE-2023-34324
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-34324-xen-events-replace-evtchn_rwlock-with-RCU-kpatch.patch
- From: 5.15.0-94.104
- CVE-2023-6176
- Description:
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
- CVE: https://ubuntu.com/security/CVE-2023-6176
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-6176-net-tls-do-not-free-tls-rec-on-async-operation-in-bpf_exec_tx_verdict.patch
- From: 5.15.0-94.104
- CVE-2023-6622
- Description:
netfilter: nf_tables: bail out on mismatching dynset and set expressions
- CVE: https://ubuntu.com/security/CVE-2023-6622
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-6622-netfilter-nf-tables-bail-out-on-mismatching-dynset-and-set-expressions.patch
- From: 5.15.0-94.104
- CVE-2023-32257 CVE-2023-32250 CVE-2023-32252
- Description:
ksmbd: limit pdu length size according to connection status
- CVE: https://ubuntu.com/security/CVE-2023-32252
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-32250-ksmbd-limit-pdu-length-size-according-to-connection-status.patch
- From: 5.15.0-94.104
- CVE-2023-32257 CVE-2023-32250 CVE-2023-32252
- Description:
ksmbd: fix racy issue from session setup and logoff
- CVE: https://ubuntu.com/security/CVE-2023-32252
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-32250-ksmbd-fix-racy-issue-from-session-setup-and-logoff-pre68-pre83.patch
- From: 5.15.0-94.104
- CVE-2023-32250
- Description:
ksmbd: fix racy issue from session setup and logoff (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-32250
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-32250-ksmbd-fix-racy-issue-from-session-setup-and-logoff-kpatch-pre83.patch
- From: 5.15.0-94.104
- CVE-2023-35827
- Description:
ravb: Fix use-after-free issue in ravb_tx_timeout_work()
- CVE: https://ubuntu.com/security/CVE-2023-35827
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-35827-ravb-fix-use-after-free-issue-in-ravb-tx-timeout-work.patch
- From: 5.15.0-94.104
- CVE-2023-46813
- Description:
x86/sev: Check for user-space IOIO pointing to kernel space
- CVE: https://ubuntu.com/security/CVE-2023-46813
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-46813-x86-sev-check-for-user-space-ioio-pointing-to-kernel-space.patch
- From: 5.15.0-94.104
- CVE-2023-46813
- Description:
x86/sev: Check IOBM for IOIO exceptions from user-space
- CVE: https://ubuntu.com/security/CVE-2023-46813
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-46813-x86-sev-check-iobm-for-ioio-exceptions-from-user-space.patch
- From: 5.15.0-94.104
- CVE-2023-46813
- Description:
x86/sev: Disable MMIO emulation from user mode
- CVE: https://ubuntu.com/security/CVE-2023-46813
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-46813-x86-sev-disable-mmio-emulation-from-user-mode.patch
- From: 5.15.0-94.104
- CVE-2024-0565
- Description:
smb: client: fix OOB in receive_encrypted_standard()
- CVE: https://ubuntu.com/security/CVE-2024-0565
- Patch: ubuntu-jammy/5.15.0-97.107/CVE-2024-0565-patch-smb-client-fix-oob-in-receive-encrypted-standard-1056.patch
- From: 5.15.0-97.107
- CVE-2024-0646
- Description:
net: tls, update curr on splice as well
- CVE: https://ubuntu.com/security/CVE-2024-0646
- Patch: ubuntu-jammy/5.15.0-97.107/CVE-2024-0646-patch-net-tls-update-curr-on-splice-as-well.patch
- From: 5.15.0-97.107
- CVE-2023-6915
- Description:
ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://ubuntu.com/security/CVE-2023-6915
- Patch: ubuntu-jammy/5.15.0-97.107/CVE-2023-6915-patch-ida-fix-crash-in-ida-free-when-the-bitmap-is-empty.patch
- From: 5.15.0-97.107
- CVE-2023-51780
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51780
- Patch: ubuntu-jammy/5.15.0-97.107/CVE-2023-51780-patch-atm-fix-use-after-free-in-do-vcc-ioctl.patch
- From: 5.15.0-97.107
- CVE-2023-51781
- Description:
appletalk: Fix Use-After-Free in atalk_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51781
- Patch: ubuntu-jammy/5.15.0-97.107/CVE-2023-51781-patch-appletalk-fix-use-after-free-in-atalk-ioctl.patch
- From: 5.15.0-97.107
- CVE-2023-4134
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2023-4134.patch
- From:
- CVE-2023-22995
- Description:
usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core
- CVE: https://ubuntu.com/security/CVE-2023-22995
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-22995-patch-usb-dwc3-dwc3-qcom-add-missing-platform-device-put-in.patch
- From: 5.15.0-100.110
- CVE-2023-51779
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg
- CVE: https://ubuntu.com/security/CVE-2023-51779
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-51779-patch-bluetooth-af-bluetooth-fix-use-after-free-in.patch
- From: 5.15.0-100.110
- CVE-2023-51782
- Description:
net/rose: Fix Use-After-Free in rose_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51782
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-51782-patch-net-rose-fix-use-after-free-in-rose-ioctl.patch
- From: 5.15.0-100.110
- CVE-2023-46343
- Description:
nfc: nci: fix possible NULL pointer dereference in send_acknowledge()
- CVE: https://ubuntu.com/security/CVE-2023-46343
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-46343-patch-nfc-nci-fix-possible-null-pointer-dereference-in.patch
- From: 5.15.0-100.110
- CVE-2023-46862
- Description:
io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid
- CVE: https://ubuntu.com/security/CVE-2023-46862
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-46862-patch-io-uring-fdinfo-lock-sq-thread-while-retrieving-thread-5.15.0-60.66.patch
- From: 5.15.0-100.110
- CVE-2024-0607
- Description:
netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()
- CVE: https://ubuntu.com/security/CVE-2024-0607
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2024-0607-patch-netfilter-nf-tables-fix-pointer-math-issue-in.patch
- From: 5.15.0-100.110
- CVE-2023-6121
- Description:
nvmet: nul-terminate the NQNs passed in the connect command
- CVE: https://ubuntu.com/security/CVE-2023-6121
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-6121-patch-nvmet-nul-terminate-the-nqns-passed-in-the-connect-command.patch
- From: 5.15.0-100.110
- CVE-2024-0340
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://ubuntu.com/security/CVE-2024-0340
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2024-0340-patch-vhost-use-kzalloc-instead-of-kmalloc-followed-by.patch
- From: 5.15.0-100.110
- CVE-2024-1085
- Description:
netfilter: nf_tables: check if catch-all set element is active in next generation
- CVE: https://ubuntu.com/security/CVE-2024-1085
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2024-1085-patch-netfilter-nf-tables-check-if-catch-all-set-element-is_86.96_and_older.patch
- From: 5.15.0-101.111
- CVE-2024-1086
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://ubuntu.com/security/CVE-2024-1086
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2024-1086-patch-netfilter-nf-tables-reject-queue-drop-verdict-parameters_89.99_and_older.patch
- From: 5.15.0-101.111
- CVE-2023-23000
- Description:
phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function
- CVE: https://ubuntu.com/security/CVE-2023-23000
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2023-23000-patch-phy-tegra-xusb-fix-return-value-of.patch
- From: 5.15.0-101.111
- CVE-2024-24855
- Description:
scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()
- CVE: https://ubuntu.com/security/CVE-2024-24855
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2024-24855-patch-scsi-lpfc-fix-a-possible-data-race-in.patch
- From: 5.15.0-101.111
- CVE-2023-32247
- Description:
ksmbd: destroy expired sessions
- CVE: https://ubuntu.com/security/CVE-2023-32247
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2023-32247-patch-ksmbd-destroy-expired-sessions.patch
- From: 5.15.0-101.111
- CVE-2023-32247
- Description:
ksmbd: destroy expired sessions
- CVE: https://ubuntu.com/security/CVE-2023-32247
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2023-32247-patch-ksmbd-destroy-expired-sessions-kpatch.patch
- From: 5.15.0-101.111
- CVE-2023-52439
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://ubuntu.com/security/CVE-2023-52439
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52439-uio-Fix-use-after-free-in-uio_open.patch
- From: 5.15.0-102.112
- CVE-2023-52438
- Description:
binder: fix use-after-free in shinker's callback
- CVE: https://ubuntu.com/security/CVE-2023-52438
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52438-binder-fix-use-after-free-in-shinker-s-callback.patch
- From: 5.15.0-102.112
- CVE-2023-52444
- Description:
f2fs: fix to avoid dirent corruption
- CVE: https://ubuntu.com/security/CVE-2023-52444
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52444-patch-f2fs-fix-to-avoid-dirent-corruption.patch
- From: 5.15.0-102.112
- CVE-2023-52436
- Description:
f2fs: explicitly null-terminate the xattr list
- CVE: https://ubuntu.com/security/CVE-2023-52436
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52436-f2fs-explicitly-null-terminate-the-xattr-list.patch
- From: 5.15.0-102.112
- CVE-2023-52449
- Description:
mtd: Fix gluebi NULL pointer dereference caused by ftl notifier
- CVE: https://ubuntu.com/security/CVE-2023-52449
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52449-mtd-Fix-gluebi-NULL-pointer-dereference-caused-by-ftl-notifier.patch
- From: 5.15.0-102.112
- CVE-2023-52458
- Description:
block: add check that partition length needs to be aligned with block size
- CVE: https://ubuntu.com/security/CVE-2023-52458
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52458-block-add-check-that-partition-length-needs-to-be-aligned-with-block-size.patch
- From: 5.15.0-102.112
- CVE-2023-52464
- Description:
EDAC/thunderx: Fix possible out-of-bounds string access
- CVE: https://ubuntu.com/security/CVE-2023-52464
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52464-EDAC-thunderx-Fix-possible-out-of-bounds-string-access.patch
- From: 5.15.0-102.112
- CVE-2023-52469
- Description:
drivers/amd/pm: fix a use-after-free in kv_parse_power_table
- CVE: https://ubuntu.com/security/CVE-2023-52469
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52469-drivers-amd-pm-fix-a-use-after-free-in-kv_parse_power_table.patch
- From: 5.15.0-102.112
- CVE-2024-23850
- Description:
btrfs: do not ASSERT() if the newly created subvolume already got read
- CVE: https://ubuntu.com/security/CVE-2024-23850
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-23850-btrfs-do-not-assert-if-the-newly-created-subvolume-already-got-read.patch
- From: 5.15.0-102.112
- CVE-2024-24860
- Description:
Bluetooth: Fix atomicity violation in {min,max}_key_size_set
- CVE: https://ubuntu.com/security/CVE-2024-24860
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-24860-bluetooth-fix-atomicity-violation-in-min-max-key-size-set.patch
- From: 5.15.0-102.112
- CVE-2024-26591
- Description:
bpf: Fix re-attachment branch in bpf_tracing_prog_attach
- CVE: https://ubuntu.com/security/CVE-2024-26591
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26591-bpf-fix-re-attachment-branch-in-bpf-tracing-prog-attach.patch
- From: 5.15.0-102.112
- CVE-2023-32254
- Description:
ksmbd: fix racy issue under cocurrent smb2 tree disconnect
- CVE: https://ubuntu.com/security/CVE-2023-32254
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-32254-patch-ksmbd-fix-racy-issue-under-cocurrent-smb2-tree-disconnect-82.91.patch
- From: 5.15.0-102.112
- CVE-2023-32254
- Description:
ksmbd: fix racy issue under cocurrent smb2 tree disconnect (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-32254
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-32254-patch-ksmbd-fix-racy-issue-under-cocurrent-smb2-tree-disconnect-kpatch-82.91.patch
- From: 5.15.0-102.112
- CVE-2023-38427
- Description:
ksmbd: fix out-of-bound read in deassemble_neg_contexts()
- CVE: https://ubuntu.com/security/CVE-2023-38427
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-38427-patch-ksmbd-fix-out-of-bound-read-in-deassemble-neg-contexts.patch
- From: 5.15.0-102.112
- CVE-2023-1194
- Description:
ksmbd: fix out-of-bound read in parse_lease_state()
- CVE: https://ubuntu.com/security/CVE-2023-1194
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-1194-patch-ksmbd-fix-out-of-bound-read-in-parse-lease-state.patch
- From: 5.15.0-102.112
- CVE-2023-52441
- Description:
ksmbd: fix out of bounds in init_smb2_rsp_hdr()
- CVE: https://ubuntu.com/security/CVE-2023-52441
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52441-ksmbd-fix-out-of-bounds-in-init_smb2_rsp_hdr.patch
- From: 5.15.0-102.112
- CVE-2023-52445
- Description:
media: pvrusb2: fix use after free on context disconnection
- CVE: https://ubuntu.com/security/CVE-2023-52445
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context-disconnection.patch
- From: 5.15.0-102.112
- CVE-2024-22705
- Description:
ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()
- CVE: https://ubuntu.com/security/CVE-2024-22705
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-22705-patch-ksmbd-fix-slab-out-of-bounds-in-smb-strndup-from-utf16.patch
- From: 5.15.0-102.112
- CVE-2023-52451
- Description:
powerpc/pseries/memhp: Fix access beyond end of drmem array
- CVE: https://ubuntu.com/security/CVE-2023-52451
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52451-patch-powerpc-pseries-memhp-fix-access-beyond-end-of-drmem-array.patch
- From: 5.15.0-102.112
- CVE-2024-26586
- Description:
mlxsw: spectrum_acl_tcam: Fix stack corruption
- CVE: https://ubuntu.com/security/CVE-2024-26586
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26586-mlxsw-spectrum_acl_tcam-fix-stack-corruption.patch
- From: 5.15.0-102.112
- CVE-2024-26589
- Description:
bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS
- CVE: https://ubuntu.com/security/CVE-2024-26589
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26589-patch-bpf-reject-variable-offset-alu-on-ptr-to-flow-keys.patch
- From: 5.15.0-102.112
- CVE-2023-46838
- Description:
xen-netback: don't produce zero-size SKB frags
- CVE: https://ubuntu.com/security/CVE-2023-46838
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-46838-patch-xen-netback-don-t-produce-zero-size-skb-frags-5.15.0-57.63.patch
- From: 5.15.0-102.112
- CVE-2023-52340
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://ubuntu.com/security/CVE-2023-52340
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52340-patch-ipv6-remove-max-size-check-inline-with-ipv4.patch
- From: 5.15.0-102.112
- CVE-2023-52340
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://ubuntu.com/security/CVE-2023-52340
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52340-fix-decnet-function-declaration.patch
- From: 5.4.0-176.196
- CVE-2024-23851
- Description:
dm ioctl: log an error if the ioctl structure is corrupted
- CVE: https://ubuntu.com/security/CVE-2024-23851
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-23851-patch-dm-ioctl-log-an-error-if-the-ioctl-structure-is-corrupted.patch
- From: 5.15.0-102.112
- CVE-2023-52429 CVE-2024-23851
- Description:
dm: limit the number of targets and parameter size area
- CVE: https://ubuntu.com/security/CVE-2024-23851
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52429-CVE-2024-23851-patch-dm-limit-the-number-of-targets-and-parameter-size-area.patch
- From: 5.15.0-102.112
- CVE-2023-52443
- Description:
apparmor: avoid crash when parsed profile name is empty
- CVE: https://ubuntu.com/security/CVE-2023-52443
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52443-apparmor-avoid-crash-when-parsed-profile-name-is-empty.patch
- From: 5.15.0-102.112
- CVE-2023-52448
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://ubuntu.com/security/CVE-2023-52448
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52448-gfs2-fix-kernel-NULL-pointer-dereference-in-gfs2_rgrp_dump.patch
- From: 5.15.0-102.112
- CVE-2023-3867
- Description:
binder: ksmbd: add missing compound request handing in some commands
- CVE: https://ubuntu.com/security/CVE-2023-3867
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-3867-ksmbd-add-missing-compound-request-handing.patch
- From: 5.15.0-102.112
- CVE-2024-26597
- Description:
net: qualcomm: rmnet: fix global oob in rmnet_policy
- CVE: https://ubuntu.com/security/CVE-2024-26597
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26597-net-qualcomm-rmnet-fix-global-oob-in-rmnet_policy.patch
- From: 5.15.0-102.112
- CVE-2024-26597
- Description:
net: qualcomm: rmnet: fix global oob in rmnet_policy
- CVE: https://ubuntu.com/security/CVE-2024-26597
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26597-net-qualcomm-rmnet-fix-global-oob-in-rmnet_policy-kpatch.patch
- From: 5.15.0-102.112
- CVE-2024-26598
- Description:
KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache
- CVE: https://ubuntu.com/security/CVE-2024-26598
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26598-kvm-arm64-vgic-its-avoid-potential-uaf.patch
- From: 5.15.0-102.112
- CVE-2024-26631
- Description:
ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
- CVE: https://ubuntu.com/security/CVE-2024-26631
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26631-ipv6-mcast-fix-data-race-in-ipv6_mc_down.patch
- From: 5.15.0-102.112
- CVE-2024-26633
- Description:
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
- CVE: https://ubuntu.com/security/CVE-2024-26633
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26633-ip6_tunnel-fix-NEXTHDR_FRAGMENT-handling-in-ip6_tnl_parse_tlv_enc_lim.patch
- From: 5.15.0-102.112
- CVE-2023-52442
- Description:
ksmdb: use cmd helper variable in smb2_get_ksmbd_tcon()
- CVE: https://ubuntu.com/security/CVE-2023-52442
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52442-1-ksmdb-use-cmd-helper-variable-in-smb2_get_ksmbd_tcon.patch
- From: 5.15.0-102.112
- CVE-2023-52442
- Description:
ksmbd: validate session id and tree id in compound request
- CVE: https://ubuntu.com/security/CVE-2023-52442
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52442-2-ksmbd-validate-session-id-and-tree-id-in-compound-re.patch
- From: 5.15.0-102.112
- CVE-2023-52456
- Description:
serial: imx: fix tx statemachine deadlock
- CVE: https://ubuntu.com/security/CVE-2023-52456
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52456-serial-imx-fix-tx-statemachine-deadlock.patch
- From: 5.15.0-102.112
- CVE-2023-52457
- Description:
Version not affected
- CVE:
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52457-serial-8250-omap-Don-t-skip-resource-freeing-if-pm_r-skipped.patch
- From:
- CVE-2023-52454
- Description:
nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length
- CVE: https://ubuntu.com/security/CVE-2023-52454
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52454-1-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-inva-64.patch
- From: 5.15.0-102.112
- CVE-2023-52454
- Description:
nvmet-tcp: Fix the H2C expected PDU len calculation
- CVE: https://ubuntu.com/security/CVE-2023-52454
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52454-2-nvmet-tcp-Fix-the-H2C-expected-PDU-len-calculation-64.patch
- From: 5.15.0-102.112
- CVE-2023-52463
- Description:
Complex adaptation required. Issue can be reproduced with special UEFI implementation only.
- CVE:
- Patch: skipped/CVE-2023-52463.patch
- From:
- CVE-2023-52467
- Description:
mfd: syscon: Fix null pointer dereference in of_syscon_register()
- CVE: https://ubuntu.com/security/CVE-2023-52467
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52467-mfd-syscon-Fix-null-pointer-dereference-in-of_syscon.patch
- From: 5.15.0-102.112
- CVE-2023-52467
- Description:
drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()
- CVE: https://ubuntu.com/security/CVE-2023-52467
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52470-drm-radeon-check-the-alloc_workqueue-return-value-in.patch
- From: 5.15.0-102.112
- CVE-2023-52480
- Description:
Complex adaptation required.
- CVE:
- Patch: skipped/CVE-2023-52480.patch
- From:
- CVE-2023-52609
- Description:
binder: fix race between mmput() and do_exit()
- CVE: https://ubuntu.com/security/CVE-2023-52609
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52609-binder-fix-race-between-mmput-and-do_exit.patch
- From: 5.15.0-102.112
- CVE-2023-52610
- Description:
net/sched: act_ct: fix skb leak and crash on ooo frags
- CVE: https://ubuntu.com/security/CVE-2023-52610
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52610-net-sched-act_ct-fix-skb-leak-and-crash-on-ooo-frags.patch
- From: 5.15.0-102.112
- CVE-2023-52612
- Description:
crypto: scomp - fix req->dst buffer overflow
- CVE: https://ubuntu.com/security/CVE-2023-52612
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52612-crypto-scomp-fix-req-dst-buffer-overflow.patch
- From: 5.15.0-102.112
- CVE-2023-52603
- Description:
UBSAN: array-index-out-of-bounds in dtSplitRoot
- CVE: https://ubuntu.com/security/CVE-2023-52603
- Patch: ubuntu-jammy/5.15.0-105.115/CVE-2023-52603-ubsan-array-index-out-of-bounds-in-dtsplitroot.patch
- From: 5.15.0-105.115
- CVE-2023-52600
- Description:
jfs: fix uaf in jfs_evict_inode
- CVE: https://ubuntu.com/security/CVE-2023-52600
- Patch: ubuntu-jammy/5.15.0-105.115/CVE-2023-52600-jfs-fix-uaf-in-jfs-evict-inode.patch
- From: 5.15.0-105.115
- CVE-2023-24023
- Description:
Bluetooth: Add more enc key size check
- CVE: https://ubuntu.com/security/CVE-2023-24023
- Patch: ubuntu-jammy/5.15.0-105.115/CVE-2023-24023-bluetooth-add-more-enc-key-size-check.patch
- From: 5.4.0-177.197
- CVE-2024-26592
- Description:
ksmbd: fix UAF issue in ksmbd_tcp_new_connection()
- CVE: https://ubuntu.com/security/CVE-2024-26592
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26592-ksmbd-fix-uaf-issue-in-ksmbd-tcp-new-connection-5.15.0-69.76.patch
- From: 5.15.0-106.116
- CVE-2024-26592
- Description:
ksmbd: fix UAF issue in ksmbd_tcp_new_connection() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26592
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26592-ksmbd-fix-uaf-issue-in-ksmbd-tcp-new-connection-kpatch.patch
- From: 5.15.0-106.116
- CVE-2023-52604
- Description:
FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2023-52604
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52604-fs-jfs-ubsan-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-106.116
- CVE-2023-52599
- Description:
jfs: fix array-index-out-of-bounds in diNewExt
- CVE: https://ubuntu.com/security/CVE-2023-52599
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52599-jfs-fix-array-index-out-of-bounds-in-dinewext.patch
- From: 5.15.0-106.116
- CVE-2023-52597
- Description:
KVM: s390: fix setting of fpc register
- CVE: https://ubuntu.com/security/CVE-2023-52597
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52597-kvm-s390-fix-setting-of-fpc-register.patch
- From: 5.15.0-106.116
- CVE-2023-52588
- Description:
f2fs: fix to tag gcing flag on page during block migration
- CVE: https://ubuntu.com/security/CVE-2023-52588
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52588-f2fs-fix-to-tag-gcing-flag-on-page-during-block-migration.patch
- From: 5.15.0-106.116
- CVE-2024-26625
- Description:
llc: call sock_orphan() at release time
- CVE: https://ubuntu.com/security/CVE-2024-26625
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26625-llc-call-sock-orphan-at-release-time.patch
- From: 5.15.0-106.116
- CVE-2023-52606
- Description:
powerpc/lib: Validate size for vector operations
- CVE: https://ubuntu.com/security/CVE-2023-52606
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52606-powerpc-lib-validate-size-for-vector-operations.patch
- From: 5.15.0-106.116
- CVE-2023-52601
- Description:
jfs: fix array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2023-52601
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52601-jfs-fix-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-106.116
- CVE-2024-26593
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://ubuntu.com/security/CVE-2024-26593
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions.patch
- From: 5.15.0-106.116
- CVE-2024-26608
- Description:
ksmbd: fix global oob in ksmbd_nl_policy
- CVE: https://ubuntu.com/security/CVE-2024-26608
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26608-ksmbd-fix-global-oob-in-ksmbd-nl-policy.patch
- From: 5.15.0-106.116
- CVE-2024-26608
- Description:
ksmbd: fix global oob in ksmbd_nl_policy (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26608
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26608-ksmbd-fix-global-oob-in-ksmbd-nl-policy-kpatch.patch
- From: 5.15.0-106.116
- CVE-2024-26641
- Description:
ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
- CVE: https://ubuntu.com/security/CVE-2024-26641
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26641-ip6-tunnel-make-sure-to-pull-inner-header-in-ip6-tnl-rcv-5.15.0-67.74.patch
- From: 5.15.0-106.116
- CVE-2024-26660
- Description:
drm/amd/display: Implement bounds check for stream encoder
- CVE: https://ubuntu.com/security/CVE-2024-26660
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26660-drm-amd-display-implement-bounds-check-for-stream-encoder.patch
- From: 5.15.0-106.116
- CVE-2024-26615
- Description:
net/smc: fix illegal rmb_desc access in SMC-D connection dump
- CVE: https://ubuntu.com/security/CVE-2024-26615
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch
- From: 5.15.0-106.116
- CVE-2024-26636
- Description:
llc: make llc_ui_sendmsg() more robust against bonding
- CVE: https://ubuntu.com/security/CVE-2024-26636
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26636-llc-make-llc-ui-sendmsg-more-robust-against-bonding.patch
- From: 5.15.0-106.116
- CVE-2024-26644
- Description:
btrfs: don't abort filesystem when attempting to snapshot
- CVE: https://ubuntu.com/security/CVE-2024-26644
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26644-btrfs-don-t-abort-filesystem-when-attempting-to-snapshot.patch
- From: 5.15.0-106.116
- CVE-2024-26627
- Description:
scsi: core: Move scsi_host_busy() out of host lock for waking
- CVE: https://ubuntu.com/security/CVE-2024-26627
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26627-scsi-core-move-scsi-host-busy-out-of-host-lock-for-waking.patch
- From: 5.15.0-106.116
- CVE-2024-26640
- Description:
tcp: add sanity checks to rx zerocopy
- CVE: https://ubuntu.com/security/CVE-2024-26640
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26640-tcp-add-sanity-checks-to-rx-zerocopy.patch
- From: 5.15.0-106.116
- CVE-2024-26663
- Description:
tipc: Check the bearer type before calling
- CVE: https://ubuntu.com/security/CVE-2024-26663
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26663-tipc-check-the-bearer-type-before-calling.patch
- From: 5.15.0-106.116
- CVE-2024-26606
- Description:
binder: signal epoll threads of self-work
- CVE: https://ubuntu.com/security/CVE-2024-26606
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26606-binder-signal-epoll-threads-of-self-work.patch
- From: 5.15.0-106.116
- CVE-2023-52587
- Description:
IB/ipoib: Fix mcast list locking
- CVE: https://ubuntu.com/security/CVE-2023-52587
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52587-ib-ipoib-fix-mcast-list-locking.patch
- From: 5.15.0-106.116
- CVE-2024-26610
- Description:
wifi: iwlwifi: fix a memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-26610
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26610-wifi-iwlwifi-fix-a-memory-corruption.patch
- From: 5.15.0-106.116
- CVE-2023-52607
- Description:
powerpc/mm: Fix null-pointer dereference in pgtable_cache_add
- CVE: https://ubuntu.com/security/CVE-2023-52607
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52607-powerpc-mm-fix-null-pointer-dereference-in-pgtable-cache-add.patch
- From: 5.15.0-106.116
- CVE-2023-52619
- Description:
pstore/ram: Fix crash when setting number of cpus to an odd
- CVE: https://ubuntu.com/security/CVE-2023-52619
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52619-pstore-ram-fix-crash-when-setting-number-of-cpus-to-an-odd.patch
- From: 5.15.0-106.116
- CVE-2023-52598
- Description:
s390/ptrace: handle setting of fpc register correctly
- CVE: https://ubuntu.com/security/CVE-2023-52598
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52598-s390-ptrace-handle-setting-of-fpc-register-correctly.patch
- From: 5.15.0-106.116
- CVE-2023-52623
- Description:
SUNRPC: Fix a suspicious RCU usage warning
- CVE: https://ubuntu.com/security/CVE-2023-52623
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52623-sunrpc-fix-a-suspicious-rcu-usage-warning.patch
- From: 5.15.0-106.116
- CVE-2023-52583
- Description:
ceph: fix deadlock or deadcode of misusing dget()
- CVE: https://ubuntu.com/security/CVE-2023-52583
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52583-ceph-fix-deadlock-or-deadcode-of-misusing-dget.patch
- From: 5.15.0-106.116
- CVE-2023-52616
- Description:
crypto: lib/mpi - Fix unexpected pointer access in
- CVE: https://ubuntu.com/security/CVE-2023-52616
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52616-crypto-lib-mpi-fix-unexpected-pointer-access-in.patch
- From: 5.15.0-106.116
- CVE-2023-52435
- Description:
net: prevent mss overflow in skb_segment()
- CVE: https://ubuntu.com/security/CVE-2023-52435
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52435-net-prevent-mss-overflow-in-skb-segment.patch
- From: 5.15.0-106.116
- CVE-2023-52633
- Description:
um: time-travel: fix time corruption
- CVE: https://ubuntu.com/security/CVE-2023-52633
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52633-um-time-travel-fix-time-corruption.patch
- From: 5.15.0-106.116
- CVE-2023-52635
- Description:
PM / devfreq: Synchronize devfreq_monitor_[start/stop]
- CVE: https://ubuntu.com/security/CVE-2023-52635
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52635-pm-devfreq-synchronize-devfreq-monitor-start-stop.patch
- From: 5.15.0-106.116
- CVE-2024-1151
- Description:
net: openvswitch: limit the number of recursions from action sets
- CVE: https://ubuntu.com/security/CVE-2024-1151
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-1151-net-openvswitch-limit-the-number-of-recursions-from-action-sets.patch
- From: 5.15.0-106.116
- CVE-2024-23849
- Description:
net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv
- CVE: https://ubuntu.com/security/CVE-2024-23849
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-23849-net-rds-fix-ubsan-array-index-out-of-bounds-in.patch
- From: 5.15.0-106.116
- CVE-2024-26600
- Description:
phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
- CVE: https://ubuntu.com/security/CVE-2024-26600
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26600-phy-ti-phy-omap-usb2-fix-null-pointer-dereference-for-srp.patch
- From: 5.15.0-106.116
- CVE-2024-26602
- Description:
sched/membarrier: reduce the ability to hammer on sys_membarrier
- CVE: https://ubuntu.com/security/CVE-2024-26602
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
- From: 5.15.0-106.116
- CVE-2023-52638
- Description:
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
- CVE: https://ubuntu.com/security/CVE-2023-52638
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52638-can-j1939-prevent-deadlock-by-changing-j1939-socks-lock-to-5.15.0-84.93.patch
- From: 5.15.0-106.116
- CVE-2023-52638
- Description:
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-52638
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52638-can-j1939-prevent-deadlock-by-changing-j1939-socks-lock-to-kpatch.patch
- From: 5.15.0-106.116
- CVE-2023-52622
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://ubuntu.com/security/CVE-2023-52622
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg.patch
- From: 5.15.0-106.116
- CVE-2023-52622
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://ubuntu.com/security/CVE-2023-52622
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg-kpatch.patch
- From: 5.15.0-106.116
- CVE-2024-26635
- Description:
llc: Drop support for ETH_P_TR_802_2.
- CVE: https://ubuntu.com/security/CVE-2024-26635
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26635-llc-drop-support-for-eth-p-tr-802-2.patch
- From: 5.15.0-106.116
- CVE-2024-26635
- Description:
llc: Drop support for ETH_P_TR_802_2 (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26635
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26635-llc-drop-support-for-eth-p-tr-802-2-kpatch.patch
- From: 5.15.0-106.116
- CVE-2023-52489
- Description:
The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.
- CVE:
- Patch: skipped/CVE-2023-52489.patch
- From:
- CVE-2023-52498
- Description:
Power management subsystem - sleep mode. Irrelevant for servers.
- CVE:
- Patch: skipped/CVE-2023-52498.patch
- From:
- CVE-2023-52594
- Description:
wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52594
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52594-wifi-ath9k-Fix-potential-array-index-out-of-bounds-r.patch
- From: 5.15.0-106.116
- CVE-2023-52595
- Description:
wifi: rt2x00: restart beacon queue when hardware reset
- CVE: https://access.redhat.com/security/cve/CVE-2023-52595
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52595-wifi-rt2x00-restart-beacon-queue-when-hardware-reset.patch
- From: 5.15.0-106.116
- CVE-2023-52608
- Description:
firmware: arm_scmi: Check mailbox/SMT channel for consistency
- CVE: https://ubuntu.com/security/CVE-2023-52608
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52608-firmware-arm-scmi-check-mailbox-smt-channel-for-consistency.patch
- From: 5.15.0-106.116
- CVE-2023-52614
- Description:
PM / devfreq: Fix buffer overflow in trans_stat_show
- CVE: https://access.redhat.com/security/cve/CVE-2023-52614
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52614-pm-devfreq-fix-buffer-overflow-in-trans-stat-show.patch
- From: 5.15.0-106.116
- CVE-2023-52615
- Description:
hwrng: core - Fix page fault dead lock on mmap-ed hwrng
- CVE: https://access.redhat.com/security/cve/CVE-2023-52615
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52615-hwrng-core-fix-page-fault-dead-lock-on-mmap-ed-hwrng.patch
- From: 5.15.0-106.116
- CVE-2023-52618
- Description:
block/rnbd-srv: Check for unlikely string overflow
- CVE: https://access.redhat.com/security/cve/CVE-2023-52618
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52618-block-rnbd-srv-check-for-unlikely-string-overflow.patch
- From: 5.15.0-106.116
- CVE-2024-26645
- Description:
tracing: Ensure visibility when inserting an element into tracing_map
- CVE: https://access.redhat.com/security/cve/CVE-2024-26645
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26645-tracing-ensure-visibility-when-inserting-an-element-into-tracing-map.patch
- From: 5.15.0-106.116
- CVE-2024-26675
- Description:
ppp_async: limit MRU to 64K
- CVE: https://ubuntu.com/security/CVE-2024-26675
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26675-ppp-async-limit-mru-to-64k.patch
- From: 5.15.0-106.116
- CVE-2024-26671
- Description:
blk-mq: fix IO hang from sbitmap wakeup race
- CVE: https://ubuntu.com/security/CVE-2024-26671
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26671-blk-mq-fix-io-hang-from-sbitmap-wakeup-race.patch
- From: 5.15.0-106.116
- CVE-2024-26679
- Description:
inet: read sk->sk_family once in inet_recv_error()
- CVE: https://ubuntu.com/security/CVE-2024-26679
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26679-inet-read-sk-sk-family-once-in-inet-recv-error.patch
- From: 5.15.0-106.116
- CVE-2024-26665
- Description:
tunnels: fix out of bounds access when building IPv6 PMTU error
- CVE: https://ubuntu.com/security/CVE-2024-26665
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26665-tunnels-fix-out-of-bounds-access-when-building-ipv6-pmtu-error.patch
- From: 5.15.0-106.116
- CVE-2024-26684
- Description:
net: stmmac: xgmac: fix handling of DPP safety error for DMA channels
- CVE: https://ubuntu.com/security/CVE-2024-26684
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26684-net-stmmac-xgmac-fix-handling-of-dpp-safety-error-for-dma-channels.patch
- From: 5.15.0-106.116
- CVE-2024-26684
- Description:
net: stmmac: xgmac: fix handling of DPP safety error for DMA channels
- CVE: https://ubuntu.com/security/CVE-2024-26684
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26684-net-stmmac-xgmac-fix-handling-of-dpp-safety-error-for-dma-channels-kpatch.patch
- From: 5.15.0-106.116
- CVE-2024-26673
- Description:
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations
- CVE: https://ubuntu.com/security/CVE-2024-26673
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26673-netfilter-nft-ct-sanitize-layer-3-and-4-protocol-number-in-custom-expectations.patch
- From: 5.15.0-106.116
- CVE-2024-26685
- Description:
nilfs2: fix potential bug in end_buffer_async_write
- CVE: https://ubuntu.com/security/CVE-2024-26685
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26685-nilfs2-fix-potential-bug-in-end-buffer-async-write-84.patch
- From: 5.15.0-106.116
- CVE-2024-26676
- Description:
af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.
- CVE: https://ubuntu.com/security/CVE-2024-26676
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26676-af-unix-call-kfree-skb-for-dead-unix-sk-oob-skb-in-gc.patch
- From: 5.15.0-106.116
- CVE-2024-26668
- Description:
netfilter: nft_limit: reject configurations that cause integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-26668
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26668-netfilter-nft-limit-reject-configurations-that-cause-integer-overflow-101.patch
- From: 5.15.0-106.116
- CVE-2024-26715
- Description:
usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend
- CVE: https://ubuntu.com/security/CVE-2024-26715
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26715-usb-dwc3-gadget-fix-null-pointer-dereference-in-5.15.0-89.99.patch
- From: 5.15.0-106.116
- CVE-2024-26695
- Description:
crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- CVE: https://ubuntu.com/security/CVE-2024-26695
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26695-crypto-ccp-fix-null-pointer-dereference-in-5.15.0-52.58.patch
- From: 5.15.0-106.116
- CVE-2024-26698
- Description:
hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove
- CVE: https://ubuntu.com/security/CVE-2024-26698
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26698-hv-netvsc-fix-race-condition-between-netvsc-probe-and.patch
- From: 5.15.0-106.116
- CVE-2024-26704
- Description:
ext4: fix double-free of blocks due to wrong extents moved_len
- CVE: https://ubuntu.com/security/CVE-2024-26704
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26704-ext4-fix-double-free-of-blocks-due-to-wrong-extents.patch
- From: 5.15.0-106.116
- CVE-2024-26702
- Description:
iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC
- CVE: https://ubuntu.com/security/CVE-2024-26702
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26702-iio-magnetometer-rm3100-add-boundary-check-for-the-value.patch
- From: 5.15.0-106.116
- CVE-2024-26697
- Description:
nilfs2: fix data corruption in dsync block recovery for small block sizes
- CVE: https://ubuntu.com/security/CVE-2024-26697
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26697-nilfs2-fix-data-corruption-in-dsync-block-recovery-for-small.patch
- From: 5.15.0-106.116
- CVE-2024-26696
- Description:
nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()
- CVE: https://ubuntu.com/security/CVE-2024-26696
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26696-nilfs2-fix-hang-in-nilfs-lookup-dirty-data-buffers.patch
- From: 5.15.0-106.116
- CVE-2024-26689
- Description:
ceph: prevent use-after-free in encode_cap_msg()
- CVE: https://ubuntu.com/security/CVE-2024-26689
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26689-ceph-prevent-use-after-free-in-encode-cap-msg.patch
- From: 5.15.0-106.116
- CVE-2024-26712
- Description:
Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0
- CVE:
- Patch: skipped/CVE-2024-26712.patch
- From:
- CVE-2023-52491
- Description:
media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run
- CVE: https://ubuntu.com/security/CVE-2023-52491
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52491-media-mtk-jpeg-Fix-use-after-free-bug-due-to-error-path-handling-in-mtk_jpeg_dec_device_run.patch
- From: kernel-5.15.0-106-116
- CVE-2024-26614
- Description:
tcp: make sure init the accept_queue's spinlocks once
- CVE: https://ubuntu.com/security/CVE-2024-26614
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26614-tcp-make-sure-init-the-accept_queue-s-spinlocks-once.patch
- From: kernel-5.15.0-106-116
- CVE-2023-52642
- Description:
media: rc: bpf attach/detach requires write permission
- CVE: https://ubuntu.com/security/CVE-2023-52642
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52642-media-rc-bpf-attach-detach-requires-write-permission.patch
- From: kernel-5.15.0-106-116
- CVE-2023-52643
- Description:
iio: core: fix memleak in iio_device_register_sysfs
- CVE: https://ubuntu.com/security/CVE-2023-52643
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52643-iio-core-fix-memleak-in-iio_device_register_sysfs.patch
- From: 5.15.0-106.116
- CVE-2024-26825
- Description:
nfc: nci: free rx_data_reassembly skb on NCI device cleanup
- CVE: https://ubuntu.com/security/CVE-2024-26825
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26825-nfc-nci-free-rx_data_reassembly-skb-on-NCI-device-cleanup.patch
- From: 5.15.0-106.116
- CVE-2024-26826
- Description:
mptcp: fix data re-injection from stale subflow
- CVE: https://ubuntu.com/security/CVE-2024-26826
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26826-mptcp-fix-data-re-injection-from-stale-subflow.patch
- From: 5.15.0-106.116
- CVE-2024-26829
- Description:
media: ir_toy: fix a memleak in irtoy_tx
- CVE: https://ubuntu.com/security/CVE-2024-26829
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26829-media-ir_toy-fix-a-memleak-in-irtoy_tx.patch
- From: kernel-5.15.0-106.116
- CVE-26920
- Description:
tracing/trigger: Fix to return error if failed to alloc snapshot
- CVE: https://ubuntu.com/security/CVE-2024-26920
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26920-tracing-trigger-Fix-to-return-error-if-failed-to-alloc-snapshot.patch
- From: kernel-5.15.0-106.116
- CVE-2024-26916
- Description:
Revert "drm/amd: flush any delayed gfxoff on suspend entry"
- CVE: https://ubuntu.com/security/CVE-2024-26916
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26916-Revert-drm-amd-flush-any-delayed-gfxoff-on-suspend-entry-70.patch
- From: kernel-5.15.0-106.116
- CVE-2023-52492
- Description:
dmaengine: fix NULL pointer in channel unregistration
- CVE: https://ubuntu.com/security/CVE-2023-52492
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52492-dmaengine-fix-null-pointer-in-channel-unregistration.patch
- From: 5.15.0-106.116
- CVE-2023-52493
- Description:
bus: mhi: host: Drop chan lock before queuing buffers
- CVE: https://ubuntu.com/security/CVE-2023-52493
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52493-bus-mhi-host-drop-chan-lock-before-queuing-buffers-upto-82.91.patch
- From: 5.15.0-106.116
- CVE-2023-52494
- Description:
bus: mhi: host: Add alignment check for event ring read
- CVE: https://ubuntu.com/security/CVE-2023-52494
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52494-bus-mhi-host-add-alignment-check-for-event-ring-read-upto-82.91.patch
- From: 5.15.0-106.116
- CVE-2024-26808
- Description:
netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for
- CVE: https://ubuntu.com/security/CVE-2024-26808
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26808-netfilter-nft-chain-filter-handle-netdev-unregister-for.patch
- From: 5.15.0-106.116
- CVE-2023-52486
- Description:
drm: Don't unref the same fb many times by mistake due to
- CVE: https://ubuntu.com/security/CVE-2023-52486
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52486-drm-don-t-unref-the-same-fb-many-times-by-mistake-due-to.patch
- From: 5.15.0-106.116
- CVE-2023-52602
- Description:
jfs: fix slab-out-of-bounds Read in dtSearch
- CVE: https://ubuntu.com/security/CVE-2023-52602
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52602-jfs-fix-slab-out-of-bounds-read-in-dtsearch.patch
- From: 5.15.0-106.116
- CVE-2024-26717
- Description:
HID: i2c-hid-of: fix NULL-deref on failed power up
- CVE: https://ubuntu.com/security/CVE-2024-26717
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26717-hid-i2c-hid-of-fix-null-deref-on-failed-power-up.patch
- From: 5.15.0-106.116
- CVE-2024-26720
- Description:
mm/writeback: fix possible divide-by-zero in
- CVE: https://ubuntu.com/security/CVE-2024-26720
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26720-mm-writeback-fix-possible-divide-by-zero-in.patch
- From: 5.15.0-106.116
- N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: 5.15.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- CVE-2024-2201
- Description:
x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
- CVE: https://linux.oracle.com/cve/CVE-2024-2201.html
- Patch: 5.15.0/CVE-2024-2201-x86-bugs-Change-commas-to-semicolons-in-spectre_v2-sysfs-file-46.patch
- From: kernel-uek-5.15.0-205.149.5.1.el8uek
- CVE-2024-2201
- Description:
x86/bhi: Add support for clearing branch history at syscall entry
- CVE: https://ubuntu.com/security/CVE-2024-2201
- Patch: 5.15.0/CVE-2024-2201-x86-bhi-Add-support-for-clearing-branch-history-at-syscall-entry-jammy-46.patch
- From: kernel-5.15.0-105.115
- CVE-2023-47233
- Description:
wifi: brcmfmac: Fix use-after-free bug in
- CVE: https://ubuntu.com/security/CVE-2023-47233
- Patch: ubuntu-jammy/5.15.0-107.117/CVE-2023-47233-wifi-brcmfmac-fix-use-after-free-bug-in.patch
- From: 5.15.0-107.117
- CVE-2024-26622
- Description:
tomoyo: fix UAF write bug in tomoyo_write_control()
- CVE: https://ubuntu.com/security/CVE-2024-26622
- Patch: ubuntu-jammy/5.15.0-107.117/CVE-2024-26622-tomoyo-fix-uaf-write-bug-in-tomoyo-write-control.patch
- From: 5.15.0-107.117
- CVE-2023-52530
- Description:
wifi: mac80211: fix potential key use-after-free
- CVE: https://ubuntu.com/security/CVE-2023-52530
- Patch: ubuntu-jammy/5.15.0-107.117/CVE-2023-52530-wifi-mac80211-fix-potential-key-use-after-free.patch
- From: 5.15.0-107.117
- CVE-2023-52434
- Description:
smb: client: fix potential OOBs in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52434-smb-client-fix-potential-oobs-in.patch
- From: 5.15.0-112.122
- CVE-2024-0841
- Description:
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-0841
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-0841-fs-hugetlb-fix-null-pointer-dereference-in.patch
- From: 5.15.0-112.122
- CVE-2023-6270
- Description:
aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6270
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-6270-aoe-fix-the-potential-use-after-free-problem-in.patch
- From: 5.15.0-112.122
- CVE-2024-26852
- Description:
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
- CVE: https://ubuntu.com/security/CVE-2024-26852
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26852-net-ipv6-avoid-possible-uaf-in-ip6_route_mpath_notify.patch
- From: 5.15.0-112.122
- CVE-2023-52641
- Description:
fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()
- CVE: https://ubuntu.com/security/CVE-2023-52641
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52641-fs-ntfs3-add-null-ptr-dereference-checking-at-the-end-of-5.15.0-97.107.patch
- From: 5.15.0-112.122
- CVE-2023-52640
- Description:
fs/ntfs3: Fix oob in ntfs_listxattr
- CVE: https://ubuntu.com/security/CVE-2023-52640
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52640-fs-ntfs3-fix-oob-in-ntfs-listxattr-5.15.0-84.93.patch
- From: 5.15.0-112.122
- CVE-2023-52620
- Description:
netfilter: nf_tables: disallow timeout for anonymous sets
- CVE: https://ubuntu.com/security/CVE-2023-52620
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52620-netfilter-nf-tables-disallow-timeout-for-anonymous-sets-5.15.0-67.74.patch
- From: 5.15.0-112.122
- CVE-2023-52650
- Description:
drm/tegra: dsi: Add missing check for of_find_device_by_node
- CVE: https://ubuntu.com/security/CVE-2023-52650
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52650-drm-tegra-dsi-add-missing-check-for-of-find-device-by-node.patch
- From: 5.15.0-112.122
- CVE-2023-52497
- Description:
erofs: fix lz4 inplace decompression
- CVE: https://ubuntu.com/security/CVE-2023-52497
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52497-erofs-fix-lz4-inplace-decompression.patch
- From: 5.15.0-112.122
- CVE-2023-52644
- Description:
wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is
- CVE: https://ubuntu.com/security/CVE-2023-52644
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52644-wifi-b43-stop-wake-correct-queue-in-dma-tx-path-when-qos-is.patch
- From: 5.15.0-112.122
- CVE-2023-52645
- Description:
pmdomain: mediatek: fix race conditions with genpd
- CVE: https://ubuntu.com/security/CVE-2023-52645
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52645-pmdomain-mediatek-fix-race-conditions-with-genpd.patch
- From: 5.15.0-112.122
- CVE-2023-52652
- Description:
NTB: fix possible name leak in ntb_register_device()
- CVE: https://ubuntu.com/security/CVE-2023-52652
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52652-NTB-fix-possible-name-leak-in-ntb_register_device.patch
- From: 5.15.0-112.122
- CVE-2023-52662
- Description:
drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node
- CVE: https://ubuntu.com/security/CVE-2023-52662
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52662-drm-vmwgfx-fix-a-memleak-in-vmw_gmrid_man_get_node.patch
- From: 5.15.0-112.122
- CVE-2024-26883
- Description:
bpf: Fix stackmap overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26883
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26883-bpf-fix-stackmap-overflow-check-on-32-bit-arches-5.15.0-46.49.patch
- From: 5.15.0-112.122
- CVE-2024-26816
- Description:
x86, relocs: Ignore relocations in .notes section
- CVE: https://ubuntu.com/security/CVE-2024-26816
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26816-x86-relocs-ignore-relocations-in-notes-section.patch
- From: 5.15.0-112.122
- CVE-2024-26894
- Description:
ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
- CVE: https://ubuntu.com/security/CVE-2024-26894
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26894-acpi-processor-idle-fix-memory-leak-in.patch
- From: 5.15.0-112.122
- CVE-2024-26884
- Description:
bpf: Fix hashtab overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26884
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26884-bpf-fix-hashtab-overflow-check-on-32-bit-arches.patch
- From: 5.15.0-112.122
- CVE-2024-26885
- Description:
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26885
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26885-bpf-fix-devmap-hash-overflow-check-on-32-bit-arches.patch
- From: 5.15.0-112.122
- CVE-2024-26843
- Description:
EFI Firmware: CVE patch is for EFI firmware which runs at boot time.
- CVE:
- Patch: skipped/CVE-2024-26843.patch
- From:
- CVE-2024-27030
- Description:
octeontx2: CVE patch is outside the scope.
- CVE:
- Patch: skipped/CVE-2024-27030.patch
- From:
- CVE-2024-26736
- Description:
afs: Increase buffer size in afs_update_volume_status()
- CVE: https://ubuntu.com/security/CVE-2024-26736
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26736-afs-Increase-buffer-size-in-afs_update_volume_status.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26735
- Description:
ipv6: sr: fix possible use-after-free and null-ptr-deref
- CVE: https://ubuntu.com/security/CVE-2024-26735
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and-null-ptr-deref.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26659
- Description:
xhci: process isoc TD properly when there was a transaction error mid TD.
- CVE: https://ubuntu.com/security/CVE-2024-26659
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26659-xhci-process-isoc-TD-properly-when-there-was-a-transaction-error-mid-TD.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26659
- Description:
xhci: process isoc TD properly when there was a transaction error mid TD.
- CVE: https://ubuntu.com/security/CVE-2024-26659
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26659-xhci-process-isoc-TD-properly-when-there-was-a-transaction-error-mid-TD-kpatch.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26659
- Description:
xhci: handle isoc Babble and Buffer Overrun events properly
- CVE: https://ubuntu.com/security/CVE-2024-26659
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26659-xhci-handle-isoc-Babble-and-Buffer-Overrun-events-properly.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26651
- Description:
sr9800: Add check for usbnet_get_endpoints
- CVE: https://ubuntu.com/security/CVE-2024-26651
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26651-sr9800-Add-check-for-usbnet_get_endpoints.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26603
- Description:
x86/fpu: Stop relying on userspace for info to fault in xsave buffer
- CVE: https://ubuntu.com/security/CVE-2024-26603
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26603-x86-fpu-Stop-relying-on-userspace-for-info-to-fault-in-xsave-buffer.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26601
- Description:
ext4: regenerate buddy after block freeing failed if under fc replay
- CVE: https://ubuntu.com/security/CVE-2024-26601
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26601-ext4-regenerate-buddy-after-block-freeing-failed-if-under-fc-replay-83.92.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26584
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- CVE:
- Patch: skipped/CVE-2024-26584.patch
- From:
- CVE-2023-7042
- Description:
wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()
- CVE: https://ubuntu.com/security/CVE-2023-7042
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-7042-wifi-ath10k-fix-NULL-pointer-dereference-in-ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26790
- Description:
dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read
- CVE: https://ubuntu.com/security/CVE-2024-26790
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26790-dmaengine-fsl-qdma-fix-SoC-may-hang-on-16-byte-unaligned-read.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26791
- Description:
btrfs: dev-replace: properly validate device names
- CVE: https://ubuntu.com/security/CVE-2024-26791
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26791-btrfs-dev-replace-properly-validate-device-names.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26792
- Description:
btrfs: fix double free of anonymous device after snapshot creation failure
- CVE: https://ubuntu.com/security/CVE-2024-26792
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26792-btrfs-fix-double-free-of-anonymous-device-after-snapshot-creation-failure.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26793
- Description:
gtp: fix use-after-free and null-ptr-deref in gtp_newlink()
- CVE: https://ubuntu.com/security/CVE-2024-26793
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26793-gtp-fix-use-after-free-and-null-ptr-deref-in-gtp_newlink.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26795
- Description:
RISCV arch not supported.
- CVE:
- Patch: skipped/CVE-2024-26795.patch
- From:
- CVE-2024-26798
- Description:
fbcon: always restore the old font data in fbcon_do_set_font()
- CVE: https://ubuntu.com/security/CVE-2024-26798
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26798-fbdev-fbcon-Properly-revert-changes-when-vc_resize-failed.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26798
- Description:
fbcon: always restore the old font data in fbcon_do_set_font()
- CVE: https://ubuntu.com/security/CVE-2024-26798
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26798-fbcon-always-restore-the-old-font-data-in-fbcon_do_set_font.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26801
- Description:
Bluetooth: Avoid potential use-after-free in hci_error_reset
- CVE: https://ubuntu.com/security/CVE-2024-26801
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26801-Bluetooth-Avoid-potential-use-after-free-in-hci_error_reset.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26802
- Description:
stmmac: Clear variable when destroying workqueue
- CVE: https://ubuntu.com/security/CVE-2024-26802
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26802-stmmac-Clear-variable-when-destroying-workqueue.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26803
- Description:
net: veth: clear GRO when clearing XDP even when down
- CVE: https://ubuntu.com/security/CVE-2024-26803
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26803-net-veth-clear-GRO-when-clearing-XDP-even-when-down.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26804
- Description:
net: ip_tunnel: prevent perpetual headroom growth
- CVE: https://ubuntu.com/security/CVE-2024-26804
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26804-net-ip_tunnel-prevent-perpetual-headroom-growth-79.86.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26805
- Description:
netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
- CVE: https://ubuntu.com/security/CVE-2024-26805
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26805-netlink-Fix-kernel-infoleak-after-free-in-__skb_datagram_iter.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27390
- Description:
ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down()
- CVE: https://ubuntu.com/security/CVE-2024-27390
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27390-ipv6-mcast-remove-one-synchronize_net-barrier-in-ipv.patch
- From: 5.15.0-112.122
- CVE-2024-27403
- Description:
netfilter: nft_flow_offload: reset dst in route object after setting up flow
- CVE: https://ubuntu.com/security/CVE-2024-27403
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27403-netfilter-nft_flow_offload-reset-dst-in-route-object.patch
- From: 5.15.0-112.122
- CVE-2024-27413
- Description:
efi/capsule-loader: fix incorrect allocation size
- CVE: https://ubuntu.com/security/CVE-2024-27413
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27413-efi-capsule-loader-fix-incorrect-allocation-size.patch
- From: 5.15.0-112.122
- CVE-2024-27417
- Description:
ipv6: fix potential "struct net" leak in inet6_rtm_getaddr()
- CVE: https://ubuntu.com/security/CVE-2024-27417
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27417-ipv6-fix-potential-struct-net-leak-in-inet6_rtm_getaddr.patch
- From: 5.15.0-112.122
- CVE-2024-27419
- Description:
netrom: Fix data-races around sysctl_net_busy_read
- CVE: https://ubuntu.com/security/CVE-2024-27419
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27419-netrom-Fix-data-races-around-sysctl_net_busy_read.patch
- From: 5.15.0-112.122
- CVE-2024-27410
- Description:
wifi: nl80211: reject iftype change with mesh ID change
- CVE: https://ubuntu.com/security/CVE-2024-27410
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27410-wifi-nl80211-reject-iftype-change-with-mesh-ID-change.patch
- From: 5.15.0-112.122
- CVE-2024-26924
- Description:
netfilter: nft_set_pipapo: do not free live element
- CVE: https://ubuntu.com/security/CVE-2024-26924
- Patch: ubuntu-jammy/5.15.0-113.123/CVE-2024-26924-netfilter-nft-set-pipapo-do-not-free-live-element-old.patch
- From: 5.15.0-113.123
- CVE-2024-26828
- Description:
cifs: fix underflow in parse_server_interfaces()
- CVE: https://ubuntu.com/security/CVE-2024-26828
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26828-cifs-fix-underflow-in-parse_server_interfaces.patch
- From: 5.15.0-116.126
- CVE-2024-24857
- Description:
Bluetooth: Fix TOCTOU in HCI debugfs implementation
- CVE: https://ubuntu.com/security/CVE-2024-24857
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-24857-Bluetooth-Fix-TOCTOU-in-HCI-debugfs-implementation.patch
- From: 5.15.0-116.126
- CVE-2024-26934
- Description:
USB: core: Fix deadlock in usb_deauthorize_interface()
- CVE: https://ubuntu.com/security/CVE-2024-26934
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26934-USB-core-Fix-deadlock-in-usb_deauthorize_interface.patch
- From: 5.15.0-116.126
- CVE-2024-23307
- Description:
md/raid5: fix atomicity violation in raid5_cache_count
- CVE: https://ubuntu.com/security/CVE-2024-23307
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-23307-md-raid5-fix-atomicity-violation-in-raid5_cache_count.patch
- From: 5.15.0-116.126
- CVE-2024-26923
- Description:
af_unix: Do not use atomic ops for unix_sk(sk)->inflight
- CVE: https://ubuntu.com/security/CVE-2024-26923
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26923-01-af_unix-Do-not-use-atomic-ops-for-unix_sk-sk-infligh.patch
- From: 5.15.0-116.126
- CVE-2024-26923
- Description:
af_unix: Fix garbage collector racing against connect()
- CVE: https://ubuntu.com/security/CVE-2024-26923
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26923-02-af_unix-Fix-garbage-collector-racing-against-connect.patch
- From: 5.15.0-116.126
- CVE-2024-24861
- Description:
media: xc4000: Fix atomicity violation in xc4000_get_frequency
- CVE: https://ubuntu.com/security/CVE-2024-24861
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-24861-media-xc4000-Fix-atomicity-violation-in-xc4000_get_frequency.patch
- From: 5.15.0-116.126
- CVE-2024-26929
- Description:
scsi: qla2xxx: Fix double free of fcport
- CVE: https://ubuntu.com/security/CVE-2024-26929
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26929-scsi-qla2xxx-Fix-double-free-of-fcport.patch
- From: 5.15.0-116.126
- CVE-2022-38096
- Description:
drm/vmwgfx: Fix possible null pointer derefence with invalid contexts
- CVE: https://ubuntu.com/security/CVE-2022-38096
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2022-38096-drm-vmwgfx-Fix-possible-null-pointer-derefence-with-invalid-contexts.patch
- From: 5.15.0-116.126
- CVE-2024-27020
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()
- CVE: https://ubuntu.com/security/CVE-2024-27020
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27020-netfilter-nf_tables-Fix-potential-data-race-in-__nft_obj_type_get-105.patch
- From: 5.15.0-116.126
- CVE-2024-27020
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
- CVE: https://ubuntu.com/security/CVE-2024-27020
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27020-netfilter-nf_tables-Fix-potential-data-race-in-__nft_expr_type_get.patch
- From: 5.15.0-116.126
- CVE-2023-52699
- Description:
sysv: don't call sb_bread() with pointers_lock held
- CVE: https://ubuntu.com/security/CVE-2023-52699
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2023-52699-sysv-dont-call-sb_bread-with-pointers_lock-held.patch
- From: 5.15.0-116.126
- CVE-2024-25739
- Description:
ubi: Check for too small LEB size in VTBL code
- CVE: https://ubuntu.com/security/CVE-2024-25739
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-25739-ubi-Check-for-too-small-LEB-size-in-VTBL-code.patch
- From: 5.15.0-116.126
- CVE-2024-26642
- Description:
netfilter: nf_tables: disallow anonymous set with timeout flag
- CVE: https://ubuntu.com/security/CVE-2024-26642
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with-timeout-flag.patch
- From: 5.15.0-116.126
- CVE-2024-26687
- Description:
xen/events: close evtchn after mapping cleanup
- CVE: https://ubuntu.com/security/CVE-2024-26687
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26687-xen-events-close-evtchn-after-mapping-cleanup.patch
- From: 5.15.0-116.126
- CVE-2024-26817
- Description:
amdkfd: use calloc instead of kzalloc to avoid integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-26817
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26817-amdkfd-use-calloc-instead-of-kzalloc-to-avoid-integer-overflow.patch
- From: 5.15.0-116.126
- CVE-2024-35910
- Description:
tcp_close is sleepable and called from kthread, which may prevent patching and unpatchng.
- CVE:
- Patch: skipped/CVE-2024-35910.patch
- From:
- CVE-2023-52880
- Description:
tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc
- CVE: https://ubuntu.com/security/CVE-2023-52880
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2023-52880-tty-n_gsm-require-CAP_NET_ADMIN-to-attach-N_GSM0710-ldisc-v52.patch
- From: 5.15.0-116.126
- CVE-2024-36016
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://ubuntu.com/security/CVE-2024-36016
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-gsm0-receive-5.15.0-48.54.patch
- From: 5.15.0-117.127
- CVE-2024-26952
- Description:
ksmbd: fix potencial out-of-bounds when buffer offset is
- CVE: https://ubuntu.com/security/CVE-2024-26952
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-26952-ksmbd-fix-potencial-out-of-bounds-when-buffer-offset-is-5.15.0-47.51.patch
- From: 5.15.0-117.127
- CVE-2023-52752
- Description:
smb: client: fix use-after-free bug in
- CVE: https://ubuntu.com/security/CVE-2023-52752
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2023-52752-smb-client-fix-use-after-free-bug-in.patch
- From: 5.15.0-117.127
- CVE-2024-26886
- Description:
Bluetooth: af_bluetooth: Fix deadlock
- CVE: https://ubuntu.com/security/CVE-2024-26886
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-26886-bluetooth-af-bluetooth-fix-deadlock.patch
- From: 5.15.0-117.127
- CVE-2024-25742
- Description:
x86/sev: Harden #VC instruction emulation somewhat
- CVE: https://ubuntu.com/security/CVE-2024-25742
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-25742-x86-sev-harden-vc-instruction-emulation-somewhat.patch
- From: 5.15.0-117.127
- CVE-2024-25742
- Description:
x86/sev: Check for MWAITX and MONITORX opcodes in the #VC
- CVE: https://ubuntu.com/security/CVE-2024-25742
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-25742-x86-sev-check-for-mwaitx-and-monitorx-opcodes-in-the-vc.patch
- From: 5.15.0-117.127