- kernel-5.15.0-1096.105 (ubuntu-jammy-azure)
- 5.15.0-1103.112
- 2026-03-19 21:07:10
- 2026-03-20 09:21:50
- K20260319_18
- CVE-2025-38618
- Description:
vsock: Do not allow binding to VMADDR_PORT_ANY
- CVE: https://ubuntu.com/security/CVE-2025-38618
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38618-vsock-do-not-allow-binding-to-vmaddr-port-any.patch
- From: 5.15.0-157.167
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://ubuntu.com/security/CVE-2025-38477
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38477-net-sched-sch-qfq-fix-race-condition-on-qfq-aggregate.patch
- From: 5.15.0-157.167
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class
- CVE: https://ubuntu.com/security/CVE-2025-38477
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38477-net-sched-sch-qfq-avoid-triggering-might-sleep-in-atomic-context-in-qfq-delete-class.patch
- From: 5.15.0-157.167
- CVE-2025-38617
- Description:
net/packet: fix a race in packet_set_ring() and acket_notifier()
- CVE: https://ubuntu.com/security/CVE-2025-38617
- Patch: ubuntu-jammy/5.15.0-157.167/CVE-2025-38617-net-packet-fix-a-race-in-packet_set_ring-and-packet_notifier.patch
- From: 5.15.0-157.167
- CVE-2024-26700
- Description:
drm/amd/display: Fix MST Null Ptr for RV
- CVE: https://ubuntu.com/security/CVE-2024-26700
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2024-26700-drm-amd-display-Fix-MST-Null-Ptr-for-RV.patch
- From: 5.15.0-160.170
- CVE-2023-52593
- Description:
wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()
- CVE: https://ubuntu.com/security/CVE-2023-52593
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2023-52593-wifi-wfx-fix-possible-NULL-pointer-dereference-in-wfx_set_mfp_ap.patch
- From: 5.15.0-160.170
- CVE-2023-52593 CVE-2024-26896
- Description:
wifi: wfx: repair open network AP mode
- CVE: https://ubuntu.com/security/CVE-2024-26896
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2023-52593-CVE-2024-26896-wifi-wfx-fix-memory-leak-when-starting-AP.patch
- From: 5.15.0-160.170
- CVE-2023-52593
- Description:
wifi: wfx: repair open network AP mode
- CVE: https://ubuntu.com/security/CVE-2023-52593
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2023-52593-wifi-wfx-repair-open-network-AP-mode.patch
- From: 5.15.0-160.170
- CVE-2025-38727
- Description:
netlink: avoid infinite retry looping in netlink_unicast()
- CVE: https://ubuntu.com/security/CVE-2025-38727
- Patch: ubuntu-jammy/5.15.0-160.170/CVE-2025-38727-netlink-avoid-infinite-retry-looping-in-netlink-unicast.patch
- From: 5.15.0-160.170
- CVE-2024-53068
- Description:
firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier()
- CVE: https://ubuntu.com/security/CVE-2024-53068
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2024-53068-firmware-arm-scmi-fix-slab-use-after-free-in-scmi-bus-notifier.patch
- From: 5.15.0-163.173
- CVE-2025-38678
- Description:
netfilter: nf_tables: reject duplicate device on updates
- CVE: https://ubuntu.com/security/CVE-2025-38678
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38678-netfilter-nf-tables-reject-duplicate-device-on-updates.patch
- From: 5.15.0-163.173
- CVE-2025-38535
- Description:
phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode
- CVE: https://ubuntu.com/security/CVE-2025-38535
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38535-phy-tegra-xusb-fix-unbalanced-regulator-disable-in-utmi-phy-mode.patch
- From: 5.15.0-163.173
- CVE-2025-38497
- Description:
usb: gadget: configfs: Fix OOB read on empty string write
- CVE: https://ubuntu.com/security/CVE-2025-38497
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38497-usb-gadget-configfs-fix-oob-read-on-empty-string-write.patch
- From: 5.15.0-163.173
- CVE-2025-38495
- Description:
HID: core: ensure the allocated report buffer can contain the reserved report ID
- CVE: https://ubuntu.com/security/CVE-2025-38495
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38495-hid-core-ensure-the-allocated-report-buffer-can-contain-the-reserved-report-id.patch
- From: 5.15.0-163.173
- CVE-2025-38494
- Description:
HID: core: do not bypass hid_hw_raw_request
- CVE: https://ubuntu.com/security/CVE-2025-38494
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38494-hid-core-do-not-bypass-hid-hw-raw-request.patch
- From: 5.15.0-163.173
- CVE-2025-38539
- Description:
tracing: Add down_write(trace_event_sem) when adding trace event
- CVE: https://ubuntu.com/security/CVE-2025-38539
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38539-tracing-add-down-write-trace-event-sem-when-adding-trace-event.patch
- From: 5.15.0-163.173
- CVE-2025-38538
- Description:
dmaengine: nbpfaxi: Fix memory corruption in probe()
- CVE: https://ubuntu.com/security/CVE-2025-38538
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38538-dmaengine-nbpfaxi-fix-memory-corruption-in-probe.patch
- From: 5.15.0-163.173
- CVE-2025-38529
- Description:
comedi: aio_iiro_16: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38529
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38529-comedi-aio-iiro-16-fix-bit-shift-out-of-bounds.patch
- From: 5.15.0-163.173
- CVE-2025-38483
- Description:
comedi: das16m1: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38483
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38483-comedi-das16m1-fix-bit-shift-out-of-bounds.patch
- From: 5.15.0-163.173
- CVE-2025-38482
- Description:
comedi: das6402: Fix bit shift out of bounds
- CVE: https://ubuntu.com/security/CVE-2025-38482
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38482-comedi-das6402-fix-bit-shift-out-of-bounds.patch
- From: 5.15.0-163.173
- CVE-2025-38528
- Description:
bpf: Reject %p% format string in bprintf-like helpers
- CVE: https://ubuntu.com/security/CVE-2025-38528
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38528-bpf-reject-p-format-string-in-bprintf-like-helpers.patch
- From: 5.15.0-163.173
- CVE-2025-38527
- Description:
smb: client: fix use-after-free in cifs_oplock_break
- CVE: https://ubuntu.com/security/CVE-2025-38527
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38527-smb-client-fix-use-after-free-in-cifs-oplock-break.patch
- From: 5.15.0-163.173
- CVE-2025-38474
- Description:
usb: net: sierra: check for no status endpoint
- CVE: https://ubuntu.com/security/CVE-2025-38474
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38474-usb-net-sierra-check-for-no-status-endpoint.patch
- From: 5.15.0-163.173
- CVE-2025-38473
- Description:
Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()
- CVE: https://ubuntu.com/security/CVE-2025-38473
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38473-bluetooth-fix-null-ptr-deref-in-l2cap-sock-resume-cb.patch
- From: 5.15.0-163.173
- CVE-2025-38550
- Description:
ipv6: mcast: Delay put pmc->idev in mld_del_delrec()
- CVE: https://ubuntu.com/security/CVE-2025-38550
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38550-ipv6-mcast-delay-put-pmc-idev-in-mld-del-delrec.patch
- From: 5.15.0-163.173
- CVE-2025-38468
- Description:
net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree
- CVE: https://ubuntu.com/security/CVE-2025-38468
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38468-net-sched-return-null-when-htb-lookup-leaf-encounters-an-empty-rbtree.patch
- From: 5.15.0-163.173
- CVE-2025-38499
- Description:
clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns
- CVE: https://ubuntu.com/security/CVE-2025-38499
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38499-clone-private-mnt-make-sure-that-caller-has-cap-sys-admin-in-the-right-userns.patch
- From: 5.15.0-163.173
- CVE-2025-38335
- Description:
PEEMPT_RT config isn't enabled
- CVE:
- Patch: skipped/CVE-2025-38335.patch
- From:
- CVE-2025-38668
- Description:
regulator: core: fix NULL dereference on unbind due to stale coupling data
- CVE: https://ubuntu.com/security/CVE-2025-38668
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38668-regulator-core-fix-null-dereference-on-unbind-due-to-stale-coupling-data.patch
- From: 5.15.0-163.173
- CVE-2025-38671
- Description:
i2c: qup: jump out of the loop in case of timeout
- CVE: https://ubuntu.com/security/CVE-2025-38671
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38671-i2c-qup-jump-out-of-the-loop-in-case-of-timeout.patch
- From: 5.15.0-163.173
- CVE-2025-38663
- Description:
nilfs2: reject invalid file types when reading inodes
- CVE: https://ubuntu.com/security/CVE-2025-38663
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38663-nilfs2-reject-invalid-file-types-when-reading-inodes.patch
- From: 5.15.0-163.173
- CVE-2025-37925
- Description:
jfs: reject on-disk inodes of an unsupported type
- CVE: https://ubuntu.com/security/CVE-2025-37925
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-37925-jfs-reject-on-disk-inodes-of-an-unsupported-type.patch
- From: 5.15.0-163.173
- CVE-2025-38650
- Description:
hfsplus: remove mutex_lock check in hfsplus_free_extents
- CVE: https://ubuntu.com/security/CVE-2025-38650
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38650-hfsplus-remove-mutex-lock-check-in-hfsplus-free-extents.patch
- From: 5.15.0-163.173
- CVE-2025-38612
- Description:
staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc()
- CVE: https://ubuntu.com/security/CVE-2025-38612
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38612-staging-fbtft-fix-potential-memory-leak-in-fbtft-framebuffer-alloc.patch
- From: 5.15.0-163.173
- CVE-2025-38609
- Description:
PM / devfreq: Check governor before using governor->name
- CVE: https://ubuntu.com/security/CVE-2025-38609
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38609-pm-devfreq-check-governor-before-using-governor-name.patch
- From: 5.15.0-163.173
- CVE-2025-38608
- Description:
bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls
- CVE: https://ubuntu.com/security/CVE-2025-38608
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38608-bpf-ktls-fix-data-corruption-when-using-bpf-msg-pop-data-in-ktls.patch
- From: 5.15.0-163.173
- CVE-2025-38604
- Description:
wifi: rtl818x: Kill URBs before clearing tx status queue
- CVE: https://ubuntu.com/security/CVE-2025-38604
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38604-wifi-rtl818x-kill-urbs-before-clearing-tx-status-queue.patch
- From: 5.15.0-163.173
- CVE-2025-38602
- Description:
iwlwifi: Add missing check for alloc_ordered_workqueue
- CVE: https://ubuntu.com/security/CVE-2025-38602
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38602-iwlwifi-add-missing-check-for-alloc-ordered-workqueue.patch
- From: 5.15.0-163.173
- CVE-2025-38601
- Description:
wifi: ath11k: clear initialized flag for deinit-ed srng lists
- CVE: https://ubuntu.com/security/CVE-2025-38601
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38601-wifi-ath11k-clear-initialized-flag-for-deinit-ed-srng-lists.patch
- From: 5.15.0-163.173
- CVE-2025-38645
- Description:
net/mlx5: Check device memory pointer before usage
- CVE: https://ubuntu.com/security/CVE-2025-38645
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38645-net-mlx5-check-device-memory-pointer-before-usage.patch
- From: 5.15.0-163.173
- CVE-2025-38553
- Description:
net/sched: Restrict conditions for adding duplicating netems to qdisc tree
- CVE: https://ubuntu.com/security/CVE-2025-38553
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38553-net-sched-restrict-conditions-for-adding-duplicating-netems-to-qdisc-tree.patch
- From: 5.15.0-163.173
- CVE-2025-38639
- Description:
netfilter: xt_nfacct: don't assume acct name is null-terminated
- CVE: https://ubuntu.com/security/CVE-2025-38639
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38639-netfilter-xt-nfacct-don-t-assume-acct-name-is-null-terminated.patch
- From: 5.15.0-163.173
- CVE-2025-38583
- Description:
clk: xilinx: vcu: unregister pll_post only if registered correctly
- CVE: https://ubuntu.com/security/CVE-2025-38583
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38583-clk-xilinx-vcu-unregister-pll-post-only-if-registered-correctly.patch
- From: 5.15.0-163.173
- CVE-2025-38634
- Description:
power: supply: cpcap-charger: Fix null check for power_supply_get_by_name
- CVE: https://ubuntu.com/security/CVE-2025-38634
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38634-power-supply-cpcap-charger-fix-null-check-for-power-supply-get-by-name.patch
- From: 5.15.0-163.173
- CVE-2025-38581
- Description:
crypto: ccp - Fix crash when rebind ccp device for ccp.ko
- CVE: https://ubuntu.com/security/CVE-2025-38581
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38581-crypto-ccp-fix-crash-when-rebind-ccp-device-for-ccp-ko.patch
- From: 5.15.0-163.173
- CVE-2025-38581
- Description:
crypto: ccp - Fix crash when rebind ccp device for ccp.ko
- CVE: https://ubuntu.com/security/CVE-2025-38581
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38581-crypto-ccp-fix-crash-when-rebind-ccp-device-for-ccp-ko-kpatch.patch
- From: 5.15.0-163.173
- CVE-2025-38630
- Description:
fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref
- CVE: https://ubuntu.com/security/CVE-2025-38630
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38630-fbdev-imxfb-check-fb-add-videomode-to-prevent-null-ptr-deref.patch
- From: 5.15.0-163.173
- CVE-2025-38624
- Description:
Out of scope: powerpc: PowerNV PCI Hotplug: not supported
- CVE:
- Patch: skipped/CVE-2025-38624.patch
- From:
- CVE-2025-38623
- Description:
Out of scope: powerpc: PowerNV PCI Hotplug: not supported
- CVE:
- Patch: skipped/CVE-2025-38623.patch
- From:
- CVE-2025-39730
- Description:
NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
- CVE: https://ubuntu.com/security/CVE-2025-39730
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39730-nfs-fix-filehandle-bounds-checking-in-nfs-fh-to-dentry.patch
- From: 5.15.0-163.173
- CVE-2025-38574
- Description:
pptp: ensure minimal skb length in pptp_xmit()
- CVE: https://ubuntu.com/security/CVE-2025-38574
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38574-pptp-ensure-minimal-skb-length-in-pptp-xmit.patch
- From: 5.15.0-163.173
- CVE-2025-38572
- Description:
ipv6: reject malicious packets in ipv6_gso_segment()
- CVE: https://ubuntu.com/security/CVE-2025-38572
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38572-ipv6-reject-malicious-packets-in-ipv6-gso-segment.patch
- From: 5.15.0-163.173
- CVE-2025-38569
- Description:
benet: fix BUG when creating VFs
- CVE: https://ubuntu.com/security/CVE-2025-38569
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38569-benet-fix-bug-when-creating-vfs.patch
- From: 5.15.0-163.173
- CVE-2025-38555
- Description:
usb: gadget : fix use-after-free in composite_dev_cleanup()
- CVE: https://ubuntu.com/security/CVE-2025-38555
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38555-usb-gadget-fix-use-after-free-in-composite-dev-cleanup.patch
- From: 5.15.0-163.173
- CVE-2025-39757
- Description:
ALSA: usb-audio: Validate UAC3 cluster segment descriptors
- CVE: https://ubuntu.com/security/CVE-2025-39757
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39757-alsa-usb-audio-validate-uac3-cluster-segment-descriptors.patch
- From: 5.15.0-163.173
- CVE-2025-39757
- Description:
ALSA: usb-audio: Fix size validation in convert_chmap_v3()
- CVE: https://ubuntu.com/security/CVE-2025-39757
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39757-ALSA-usb-audio-Fix-size-validation-in-convert_chmap_v3.patch
- From: 5.15.0-163.173
- CVE-2025-38725
- Description:
net: usb: asix_devices: add phy_mask for ax88772 mdio bus
- CVE: https://ubuntu.com/security/CVE-2025-38725
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38725-net-usb-asix-devices-add-phy-mask-for-ax88772-mdio-bus.patch
- From: 5.15.0-163.173
- CVE-2025-38724
- Description:
nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
- CVE: https://ubuntu.com/security/CVE-2025-38724
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38724-nfsd-handle-get-client-locked-failure-in-nfsd4-setclientid-confirm.patch
- From: 5.15.0-163.173
- CVE-2025-39756
- Description:
fs: Prevent file descriptor table allocations exceeding INT_MAX
- CVE: https://ubuntu.com/security/CVE-2025-39756
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39756-fs-prevent-file-descriptor-table-allocations-exceeding-int-max.patch
- From: 5.15.0-163.173
- CVE-2025-38718
- Description:
sctp: linearize cloned gso packets in sctp_rcv
- CVE: https://ubuntu.com/security/CVE-2025-38718
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38718-sctp-linearize-cloned-gso-packets-in-sctp-rcv.patch
- From: 5.15.0-163.173
- CVE-2025-38715
- Description:
hfs: fix slab-out-of-bounds in hfs_bnode_read()
- CVE: https://ubuntu.com/security/CVE-2025-38715
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38715-hfs-fix-slab-out-of-bounds-in-hfs-bnode-read.patch
- From: 5.15.0-163.173
- CVE-2025-38714
- Description:
hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()
- CVE: https://ubuntu.com/security/CVE-2025-38714
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38714-hfsplus-fix-slab-out-of-bounds-in-hfsplus-bnode-read.patch
- From: 5.15.0-163.173
- CVE-2025-38713
- Description:
hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
- CVE: https://ubuntu.com/security/CVE-2025-38713
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38713-hfsplus-fix-slab-out-of-bounds-read-in-hfsplus-uni2asc.patch
- From: 5.15.0-163.173
- CVE-2025-38712
- Description:
hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()
- CVE: https://ubuntu.com/security/CVE-2025-38712
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38712-hfsplus-don-t-use-bug-on-in-hfsplus-create-attributes-file.patch
- From: 5.15.0-163.173
- CVE-2025-38706
- Description:
ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()
- CVE: https://ubuntu.com/security/CVE-2025-38706
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38706-asoc-core-check-for-rtd-null-in-snd-soc-remove-pcm-runtime.patch
- From: 5.15.0-163.173
- CVE-2025-38701
- Description:
ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr
- CVE: https://ubuntu.com/security/CVE-2025-38701
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38701-ext4-do-not-bug-when-inline-data-fl-lacks-system-data-xattr.patch
- From: 5.15.0-163.173
- CVE-2025-38700
- Description:
scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated
- CVE: https://ubuntu.com/security/CVE-2025-38700
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38700-scsi-libiscsi-initialize-iscsi-conn-dd-data-only-if-memory-is-allocated.patch
- From: 5.15.0-163.173
- CVE-2025-38699
- Description:
scsi: bfa: Double-free fix
- CVE: https://ubuntu.com/security/CVE-2025-38699
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38699-scsi-bfa-double-free-fix.patch
- From: 5.15.0-163.173
- CVE-2025-38699
- Description:
scsi: bfa: Double-free fix
- CVE: https://ubuntu.com/security/CVE-2025-38699
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38699-scsi-bfa-double-free-fix-kpatch.patch
- From: 5.15.0-163.173
- CVE-2025-39743
- Description:
jfs: truncate good inode pages when hard link is 0
- CVE: https://ubuntu.com/security/CVE-2025-39743
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39743-jfs-truncate-good-inode-pages-when-hard-link-is-0.patch
- From: 5.15.0-163.173
- CVE-2025-38698
- Description:
jfs: Regular file corruption check
- CVE: https://ubuntu.com/security/CVE-2025-38698
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38698-jfs-regular-file-corruption-check.patch
- From: 5.15.0-163.173
- CVE-2025-38697
- Description:
jfs: upper bound check of tree index in dbAllocAG
- CVE: https://ubuntu.com/security/CVE-2025-38697
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38697-jfs-upper-bound-check-of-tree-index-in-dballocag.patch
- From: 5.15.0-163.173
- CVE-2025-39742
- Description:
RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()
- CVE: https://ubuntu.com/security/CVE-2025-39742
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39742-rdma-hfi1-fix-possible-divide-by-zero-in-find-hw-thread-mask.patch
- From: 5.15.0-163.173
- CVE-2025-38695
- Description:
scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure
- CVE: https://ubuntu.com/security/CVE-2025-38695
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38695-scsi-lpfc-check-for-hdwq-null-ptr-when-cleaning-up-lpfc-vport-structure.patch
- From: 5.15.0-163.173
- CVE-2025-38694
- Description:
media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()
- CVE: https://ubuntu.com/security/CVE-2025-38694
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38694-media-dvb-frontends-dib7090p-fix-null-ptr-deref-in-dib7090p-rw-on-apb.patch
- From: 5.15.0-163.173
- CVE-2025-38693
- Description:
media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar
- CVE: https://ubuntu.com/security/CVE-2025-38693
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38693-media-dvb-frontends-w7090p-fix-null-ptr-deref-in-w7090p-tuner-write-serpar-and-w7090p-tuner-read-serpar.patch
- From: 5.15.0-163.173
- CVE-2025-39795
- Description:
block: avoid possible overflow for chunk_sectors check in blk_stack_limits()
- CVE: https://ubuntu.com/security/CVE-2025-39795
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39795-block-avoid-possible-overflow-for-chunk-sectors-check-in-blk-stack-limits.patch
- From: 5.15.0-163.173
- CVE-2025-38685
- Description:
fbdev: Fix vmalloc out-of-bounds write in fast_imageblit
- CVE: https://ubuntu.com/security/CVE-2025-38685
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38685-fbdev-fix-vmalloc-out-of-bounds-write-in-fast-imageblit.patch
- From: 5.15.0-163.173
- CVE-2025-38680
- Description:
media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()
- CVE: https://ubuntu.com/security/CVE-2025-38680
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38680-media-uvcvideo-fix-1-byte-out-of-bounds-read-in-uvc-parse-format.patch
- From: 5.15.0-163.173
- CVE-2025-39783
- Description:
PCI: endpoint: Fix configfs group list head handling
- CVE: https://ubuntu.com/security/CVE-2025-39783
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39783-pci-endpoint-fix-configfs-group-list-head-handling.patch
- From: 5.15.0-163.173
- CVE-2025-39782
- Description:
jbd2: prevent softlockup in jbd2_log_do_checkpoint()
- CVE: https://ubuntu.com/security/CVE-2025-39782
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39782-jbd2-prevent-softlockup-in-jbd2-log-do-checkpoint.patch
- From: 5.15.0-163.173
- CVE-2025-39714
- Description:
media: usbtv: Lock resolution while streaming
- CVE: https://ubuntu.com/security/CVE-2025-39714
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39714-media-usbtv-lock-resolution-while-streaming.patch
- From: 5.15.0-163.173
- CVE-2025-39713
- Description:
media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()
- CVE: https://ubuntu.com/security/CVE-2025-39713
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39713-media-rainshadow-cec-fix-toctou-race-condition-in-rain-interrupt.patch
- From: 5.15.0-163.173
- CVE-2025-39703
- Description:
net, hsr: reject HSR frame if skb can't hold tag
- CVE: https://ubuntu.com/security/CVE-2025-39703
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39703-net-hsr-reject-hsr-frame-if-skb-can-t-hold-tag.patch
- From: 5.15.0-163.173
- CVE-2025-39702
- Description:
ipv6: sr: Fix MAC comparison to be constant-time
- CVE: https://ubuntu.com/security/CVE-2025-39702
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39702-ipv6-sr-fix-mac-comparison-to-be-constant-time.patch
- From: 5.15.0-163.173
- CVE-2025-38664
- Description:
ice: Fix a null pointer dereference in ice_copy_and_init_pkg()
- CVE: https://ubuntu.com/security/CVE-2025-38664
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38664-ice-fix-a-null-pointer-dereference-in-ice-copy-and-init-pkg.patch
- From: 5.15.0-163.173
- CVE-2025-38488
- Description:
smb: client: fix use-after-free in crypt_message when using async crypto
- CVE: https://ubuntu.com/security/CVE-2025-38488
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38488-smb-client-fix-use-after-free-in-crypt-message-when-using-async-crypto.patch
- From: 5.15.0-163.173
- CVE-2025-39790
- Description:
bus: mhi: host: Detect events pointing to unexpected TREs
- CVE: https://ubuntu.com/security/CVE-2025-39790
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39790-bus-mhi-host-detect-events-pointing-to-unexpected-tres.patch
- From: 5.15.0-163.173
- CVE-2025-38684
- Description:
net/sched: ets: use old 'nbands' while purging unused classes
- CVE: https://ubuntu.com/security/CVE-2025-38684
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38684-net-sched-ets-use-old-nbands-while-purging-unused-classes.patch
- From: 5.15.0-163.173
- CVE-2022-50327
- Description:
ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value
- CVE: https://ubuntu.com/security/CVE-2022-50327
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2022-50327-acpi-processor-idle-check-acpi-fetch-acpi-dev-return-value.patch
- From: 5.15.0-163.173
- CVE-2022-50070
- Description:
mptcp: do not queue data on closed subflows
- CVE: https://ubuntu.com/security/CVE-2022-50070
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2022-50070-mptcp-do-not-queue-data-on-closed-subflows.patch
- From: 5.15.0-163.173
- CVE-2025-39693
- Description:
drm/amd/display: Avoid a NULL pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-39693
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39693-drm-amd-display-avoid-a-null-pointer-dereference.patch
- From: 5.15.0-163.173
- CVE-2025-39691
- Description:
fs/buffer: fix use-after-free when call bh_read() helper
- CVE: https://ubuntu.com/security/CVE-2025-39691
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39691-fs-buffer-fix-use-after-free-when-call-bh-read-helper.patch
- From: 5.15.0-163.173
- CVE-2025-39689
- Description:
ftrace: Also allocate and copy hash for reading of filter files
- CVE: https://ubuntu.com/security/CVE-2025-39689
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39689-ftrace-also-allocate-and-copy-hash-for-reading-of-filter-files.patch
- From: 5.15.0-163.173
- CVE-2025-38677
- Description:
f2fs: fix to avoid out-of-boundary access in dnode page
- CVE: https://ubuntu.com/security/CVE-2025-38677
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38677-f2fs-fix-to-avoid-out-of-boundary-access-in-dnode-page.patch
- From: 5.15.0-163.173
- CVE-2025-39787
- Description:
soc: qcom: mdt_loader: Ensure we don't read past the ELF header
- CVE: https://ubuntu.com/security/CVE-2025-39787
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39787-soc-qcom-mdt-loader-ensure-we-don-t-read-past-the-elf-header.patch
- From: 5.15.0-163.173
- CVE-2025-39788
- Description:
scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE
- CVE: https://ubuntu.com/security/CVE-2025-39788
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39788-scsi-ufs-exynos-fix-programming-of-hci-utrl-nexus-type.patch
- From: 5.15.0-163.173
- CVE-2025-39773
- Description:
net: bridge: fix soft lockup in br_multicast_query_expired()
- CVE: https://ubuntu.com/security/CVE-2025-39773
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39773-net-bridge-fix-soft-lockup-in-br_multicast_query_expired.patch
- From: 5.15.0-163.173
- CVE-2025-39773
- Description:
net: bridge: fix soft lockup in br_multicast_query_expired()
- CVE: https://ubuntu.com/security/CVE-2025-39773
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39773-net-bridge-fix-soft-lockup-in-br_multicast_query_expired-kpatch.patch
- From: 5.15.0-163.173
- CVE-2025-39676
- Description:
scsi: qla4xxx: Prevent a potential error pointer dereference
- CVE: https://ubuntu.com/security/CVE-2025-39676
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39676-scsi-qla4xxx-prevent-a-potential-error-pointer-dereference.patch
- From: 5.15.0-163.173
- CVE-2025-39675
- Description:
drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()
- CVE: https://ubuntu.com/security/CVE-2025-39675
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39675-drm-amd-display-add-null-pointer-check-in-mod-hdcp-hdcp1-create-session.patch
- From: 5.15.0-163.173
- CVE-2025-39673
- Description:
ppp: fix race conditions in ppp_fill_forward_path
- CVE: https://ubuntu.com/security/CVE-2025-39673
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39673-ppp-fix-race-conditions-in-ppp-fill-forward-path.patch
- From: 5.15.0-163.173
- CVE-2025-39766
- Description:
net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit
- CVE: https://ubuntu.com/security/CVE-2025-39766
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39766-net-sched-make-cake-enqueue-return-net-xmit-cn-when-past-buffer-limit.patch
- From: 5.15.0-163.173
- CVE-2025-38732
- Description:
netfilter: nf_reject: don't leak dst refcount for loopback packets
- CVE: https://ubuntu.com/security/CVE-2025-38732
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38732-netfilter-nf-reject-don-t-leak-dst-refcount-for-loopback-packets.patch
- From: 5.15.0-163.173
- CVE-2025-39817
- Description:
efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
- CVE: https://ubuntu.com/security/CVE-2025-39817
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39817-efivarfs-fix-slab-out-of-bounds-in-efivarfs-d-compare.patch
- From: 5.15.0-163.173
- CVE-2025-39823
- Description:
KVM: x86: use array_index_nospec with indices that come from guest
- CVE: https://ubuntu.com/security/CVE-2025-39823
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39823-kvm-x86-use-array-index-nospec-with-indices-that-come-from-guest.patch
- From: 5.15.0-163.173
- CVE-2025-39824
- Description:
HID: asus: fix UAF via HID_CLAIMED_INPUT validation
- CVE: https://ubuntu.com/security/CVE-2025-39824
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39824-hid-asus-fix-uaf-via-hid-claimed-input-validation.patch
- From: 5.15.0-163.173
- CVE-2025-39806
- Description:
HID: multitouch: fix slab out-of-bounds access in mt_report_fixup()
- CVE: https://ubuntu.com/security/CVE-2025-39806
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39806-hid-multitouch-fix-slab-out-of-bounds-access-in-mt-report-fixup.patch
- From: 5.15.0-163.173
- CVE-2025-39808
- Description:
Patch adds cross-module dependency: hid_ntrig -> usbhid (usb_hid_driver symbol). Cannot be resolved without userland modprobe modifications to ensure proper module loading order.
- CVE:
- Patch: skipped/CVE-2025-39808.patch
- From:
- CVE-2025-39866
- Description:
fs: writeback: fix use-after-free in __mark_inode_dirty()
- CVE: https://ubuntu.com/security/CVE-2025-39866
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39866-fs-writeback-fix-use-after-free-in-mark-inode-dirty.patch
- From: 5.15.0-163.173
- CVE-2025-39865
- Description:
tee: fix NULL pointer dereference in tee_shm_put
- CVE: https://ubuntu.com/security/CVE-2025-39865
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39865-tee-fix-null-pointer-dereference-in-tee-shm-put.patch
- From: 5.15.0-163.173
- CVE-2025-39864
- Description:
wifi: cfg80211: fix use-after-free in cmp_bss()
- CVE: https://ubuntu.com/security/CVE-2025-39864
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39864-wifi-cfg80211-fix-use-after-free-in-cmp-bss.patch
- From: 5.15.0-163.173
- CVE-2025-39894
- Description:
netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm
- CVE: https://ubuntu.com/security/CVE-2025-39894
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39894-netfilter-br-netfilter-do-not-check-confirmed-bit-in-br-nf-local-in-after-confirm.patch
- From: 5.15.0-163.173
- CVE-2025-39860
- Description:
Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()
- CVE: https://ubuntu.com/security/CVE-2025-39860
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39860-bluetooth-fix-use-after-free-in-l2cap-sock-cleanup-listen.patch
- From: 5.15.0-163.173
- CVE-2025-39853
- Description:
i40e: Fix potential invalid access when MAC list is empty
- CVE: https://ubuntu.com/security/CVE-2025-39853
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39853-i40e-fix-potential-invalid-access-when-mac-list-is-empty.patch
- From: 5.15.0-163.173
- CVE-2025-39847
- Description:
ppp: fix memory leak in pad_compress_skb
- CVE: https://ubuntu.com/security/CVE-2025-39847
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39847-ppp-fix-memory-leak-in-pad-compress-skb.patch
- From: 5.15.0-163.173
- CVE-2025-39844
- Description:
Out of scope: boot time issue
- CVE:
- Patch: skipped/CVE-2025-39844.patch
- From:
- CVE-2023-52935
- Description:
mm/khugepaged: fix ->anon_vma race
- CVE: https://ubuntu.com/security/CVE-2023-52935
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2023-52935-mm-khugepaged-fix-anon-vma-race.patch
- From: 5.15.0-163.173
- CVE-2025-37968
- Description:
iio: light: opt3001: fix deadlock due to concurrent flag access
- CVE: https://ubuntu.com/security/CVE-2025-37968
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-37968-iio-light-opt3001-fix-deadlock-due-to-concurrent-flag-access.patch
- From: 5.15.0-163.173
- CVE-2025-38095
- Description:
dma-buf: insert memory barrier before updating num_fences
- CVE: https://ubuntu.com/security/CVE-2025-38095
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-38095-dma-buf-insert-memory-barrier-before-updating-num-fences.patch
- From: 5.15.0-163.173
- CVE-2025-39902
- Description:
mm/slub: avoid accessing metadata when pointer is invalid in object_err()
- CVE: https://ubuntu.com/security/CVE-2025-39902
- Patch: ubuntu-jammy/5.15.0-163.173/CVE-2025-39902-mm-slub-avoid-accessing-metadata-when-pointer-is-invalid-in-object-err.patch
- From: 5.15.0-163.173
- CVE-2022-49390
- Description:
macsec: fix UAF bug for real_dev
- CVE: https://ubuntu.com/security/CVE-2022-49390
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2022-49390-macsec-fix-uaf-bug-for-real-dev.patch
- From: 5.15.0-164.174
- CVE-2022-49390
- Description:
macsec: fix UAF bug for real_dev
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-49390.html
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2022-49390-macsec-fix-uaf-bug-for-real-dev-kpatch.patch
- From: 5.15.0-164.174
- CVE-2025-39964
- Description:
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-39964
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-39964-crypto-af-alg-disallow-concurrent-writes-in-af-alg-sendmsg.patch
- From: 5.15.0-164.174
- CVE-2025-39964
- Description:
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
- CVE: https://ubuntu.com/security/CVE-2025-39964
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-39964-crypto-af-alg-disallow-concurrent-writes-in-af-alg-sendmsg-kpatch.patch
- From: 5.15.0-164.174
- CVE-2024-53090
- Description:
afs: Fix lock recursion
- CVE: https://ubuntu.com/security/CVE-2024-53090
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-53090-afs-fix-lock-recursion-kpatch.patch
- From: 5.15.0-164.174
- CVE-2024-50067
- Description:
uprobe: avoid out-of-bounds memory access of fetching args
- CVE: https://ubuntu.com/security/CVE-2024-50067
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-50067-uprobe-avoid-out-of-bounds-memory-access-of-fetching-args.patch
- From: 5.15.0-164.174
- CVE-2025-21855
- Description:
ibmvnic: Don't reference skb after sending to VIOS
- CVE: https://ubuntu.com/security/CVE-2025-21855
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-21855-ibmvnic-don-t-reference-skb-after-sending-to-vios.patch
- From: 5.15.0-164.174
- CVE-2025-40018
- Description:
ipvs: Defer ip_vs_ftp unregister during netns cleanup
- CVE: https://ubuntu.com/security/CVE-2025-40018
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-40018-ipvs-defer-ip-vs-ftp-unregister-during-netns-cleanup.patch
- From: 5.15.0-164.174
- CVE-2025-39993
- Description:
media: rc: fix races with imon_disconnect()
- CVE: https://ubuntu.com/security/CVE-2025-39993
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2025-39993-media-rc-fix-races-with-imon-disconnect.patch
- From: 5.15.0-164.174
- CVE-2024-47691
- Description:
f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()
- CVE: https://ubuntu.com/security/CVE-2024-47691
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-47691-f2fs-fix-to-avoid-use-after-free-in-f2fs-stop-gc-thread.patch
- From: 5.15.0-164.174
- CVE-2024-53218
- Description:
f2fs: fix race in concurrent f2fs_stop_gc_thread
- CVE: https://ubuntu.com/security/CVE-2024-53218
- Patch: ubuntu-jammy/5.15.0-164.174/CVE-2024-53218-f2fs-fix-race-in-concurrent-f2fs-stop-gc-thread.patch
- From: 5.15.0-164.174
- CVE-2025-38561
- Description:
ksmbd: fix Preauh_HashValue race condition
- CVE: https://ubuntu.com/security/CVE-2025-38561
- Patch: ubuntu-jammy/5.15.0-168.178/CVE-2025-38561-ksmbd-fix-preauh-hashvalue-race-condition.patch
- From: 5.15.0-168.178
- CVE-2025-40019
- Description:
crypto: essiv - Check ssize for decryption and in-place encryption
- CVE: https://ubuntu.com/security/CVE-2025-40019
- Patch: ubuntu-jammy/5.15.0-168.178/CVE-2025-40019-crypto-essiv-check-ssize-for-decryption-and-in-place-encryption.patch
- From: 5.15.0-168.178
- CVE-2025-38584
- Description:
padata: Fix pd UAF once and for all
- CVE: https://ubuntu.com/security/CVE-2025-38584
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-38584-padata-fix-pd-uaf-once-and-for-all.patch
- From: 5.15.0-170.180
- CVE-2025-38584
- Description:
padata: Fix pd UAF once and for all
- CVE: https://ubuntu.com/security/CVE-2025-38584
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-38584-padata-fix-pd-uaf-once-and-for-all-kpatch.patch
- From: 5.15.0-170.180
- CVE-2024-56538
- Description:
Vulnerability affects only ZynqMP SoCs.
- CVE:
- Patch: skipped/CVE-2024-56538.patch
- From:
- CVE-2025-39913
- Description:
tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.
- CVE: https://ubuntu.com/security/CVE-2025-39913
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39913-tcp-bpf-call-sk-msg-free-when-tcp-bpf-send-verdict-fails-to-allocate-psock-cork.patch
- From: 5.15.0-170.180
- CVE-2025-39880
- Description:
libceph: fix invalid accesses to ceph_connection_v1_info
- CVE: https://ubuntu.com/security/CVE-2025-39880
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39880-libceph-fix-invalid-accesses-to-ceph-connection-v1-info.patch
- From: 5.15.0-170.180
- CVE-2025-39876
- Description:
net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable()
- CVE: https://ubuntu.com/security/CVE-2025-39876
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39876-net-fec-fix-possible-npd-in-fec-enet-phy-reset-after-clk-enable.patch
- From: 5.15.0-170.180
- CVE-2025-39911
- Description:
i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
- CVE: https://ubuntu.com/security/CVE-2025-39911
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39911-i40e-fix-irq-freeing-in-i40e-vsi-request-irq-msix-error-path-5.15.0-168.178.patch
- From: 5.15.0-170.180
- CVE-2025-39873
- Description:
can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB
- CVE: https://ubuntu.com/security/CVE-2025-39873
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39873-can-xilinx-can-xcan-write-frame-fix-use-after-free-of-transmitted-skb.patch
- From: 5.15.0-170.180
- CVE-2025-39869
- Description:
dmaengine: ti: edma: Fix memory allocation size for queue_priority_map
- CVE: https://ubuntu.com/security/CVE-2025-39869
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39869-dmaengine-ti-edma-fix-memory-allocation-size-for-queue-priority-map.patch
- From: 5.15.0-170.180
- CVE-2025-39923
- Description:
dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees
- CVE: https://ubuntu.com/security/CVE-2025-39923
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39923-dmaengine-qcom-bam-dma-fix-dt-error-handling-for-num-channels-ees.patch
- From: 5.15.0-170.180
- CVE-2025-39883
- Description:
mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory
- CVE: https://ubuntu.com/security/CVE-2025-39883
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39883-mm-memory-failure-fix-vm-bug-on-page-pagepoisoned-page-when-unpoison-memory.patch
- From: 5.15.0-170.180
- CVE-2025-39949
- Description:
qed: Don't collect too many protection override GRC elements
- CVE: https://ubuntu.com/security/CVE-2025-39949
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39949-qed-don-t-collect-too-many-protection-override-grc-elements.patch
- From: 5.15.0-170.180
- CVE-2025-39955
- Description:
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
- CVE: https://ubuntu.com/security/CVE-2025-39955
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39955-tcp-clear-tcp-sk-sk-fastopen-rsk-in-tcp-disconnect.patch
- From: 5.15.0-170.180
- CVE-2025-39945
- Description:
cnic: Fix use-after-free bugs in cnic_delete_task
- CVE: https://ubuntu.com/security/CVE-2025-39945
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39945-cnic-fix-use-after-free-bugs-in-cnic-delete-task.patch
- From: 5.15.0-170.180
- CVE-2025-39934
- Description:
drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ
- CVE: https://ubuntu.com/security/CVE-2025-39934
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39934-drm-bridge-anx7625-fix-null-pointer-dereference-with-early-irq.patch
- From: 5.15.0-170.180
- CVE-2025-39943
- Description:
ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer
- CVE: https://ubuntu.com/security/CVE-2025-39943
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39943-ksmbd-smbdirect-validate-data-offset-and-data-length-field-of-smb-direct-data-transfer-5.15.0-161.171.patch
- From: 5.15.0-170.180
- CVE-2025-40020
- Description:
can: peak_usb: fix shift-out-of-bounds issue
- CVE: https://ubuntu.com/security/CVE-2025-40020
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40020-can-peak-usb-fix-shift-out-of-bounds-issue.patch
- From: 5.15.0-170.180
- CVE-2025-39980
- Description:
nexthop: Forbid FDB status change while nexthop is in a group
- CVE: https://ubuntu.com/security/CVE-2025-39980
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39980-nexthop-forbid-fdb-status-change-while-nexthop-is-in-a-group.patch
- From: 5.15.0-170.180
- CVE-2025-40011
- Description:
drm/gma500: Fix null dereference in hdmi teardown
- CVE: https://ubuntu.com/security/CVE-2025-40011
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40011-drm-gma500-fix-null-dereference-in-hdmi-teardown.patch
- From: 5.15.0-170.180
- CVE-2025-40021
- Description:
tracing: dynevent: Add a missing lockdown check on dynevent
- CVE: https://ubuntu.com/security/CVE-2025-40021
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40021-tracing-dynevent-add-a-missing-lockdown-check-on-dynevent.patch
- From: 5.15.0-170.180
- CVE-2025-39967
- Description:
fbcon: fix integer overflow in fbcon_do_set_font
- CVE: https://ubuntu.com/security/CVE-2025-39967
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39967-fbcon-fix-integer-overflow-in-fbcon-do-set-font.patch
- From: 5.15.0-170.180
- CVE-2025-39967
- Description:
fbcon: Fix OOB access in font allocation
- CVE: https://ubuntu.com/security/CVE-2025-39967
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39967-fbcon-fix-OOB-access-in-font-allocation.patch
- From: 5.15.0-170.180
- CVE-2025-38236
- Description:
Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem..
- CVE:
- Patch: skipped/CVE-2025-38236.patch
- From:
- CVE-2025-21861
- Description:
mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize()
- CVE: https://ubuntu.com/security/CVE-2025-21861
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-21861-mm-migrate-device-don-t-add-folio-to-be-freed-to-lru-in-migrate-device-finalize.patch
- From: 5.15.0-170.180
- CVE-2025-39998
- Description:
scsi: target: target_core_configfs: Add length check to avoid buffer overflow
- CVE: https://ubuntu.com/security/CVE-2025-39998
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39998-scsi-target-target-core-configfs-add-length-check-to-avoid-buffer-overflow.patch
- From: 5.15.0-170.180
- CVE-2025-39996
- Description:
media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove
- CVE: https://ubuntu.com/security/CVE-2025-39996
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39996-media-b2c2-fix-use-after-free-causing-by-irq-check-work-in-flexcop-pci-remove.patch
- From: 5.15.0-170.180
- CVE-2025-22058
- Description:
udp: Fix memory accounting leak.
- CVE: https://ubuntu.com/security/CVE-2025-22058
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-22058-udp-fix-memory-accounting-leak.patch
- From: 5.15.0-170.180
- CVE-2025-39994
- Description:
media: tuner: xc5000: Fix use-after-free in xc5000_release
- CVE: https://ubuntu.com/security/CVE-2025-39994
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39994-media-tuner-xc5000-fix-use-after-free-in-xc5000-release-5.15.0-168.178.patch
- From: 5.15.0-170.180
- CVE-2025-39995
- Description:
media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe
- CVE: https://ubuntu.com/security/CVE-2025-39995
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-39995-media-i2c-tc358743-fix-use-after-free-bugs-caused-by-orphan-timer-in-probe.patch
- From: 5.15.0-170.180
- CVE-2025-40081
- Description:
perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
- CVE: https://ubuntu.com/security/CVE-2025-40081
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40081-perf-arm-spe-prevent-overflow-in-perf-idx2off.patch
- From: 5.15.0-170.180
- CVE-2025-40125
- Description:
blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx
- CVE: https://ubuntu.com/security/CVE-2025-40125
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40125-blk-mq-check-kobject-state-in-sysfs-before-deleting-in-blk-mq-unregister-hctx.patch
- From: 5.15.0-170.180
- CVE-2025-40078
- Description:
bpf: Explicitly check accesses to bpf_sock_addr
- CVE: https://ubuntu.com/security/CVE-2025-40078
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40078-bpf-explicitly-check-accesses-to-bpf-sock-addr.patch
- From: 5.15.0-170.180
- CVE-2025-40116
- Description:
usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup
- CVE: https://ubuntu.com/security/CVE-2025-40116
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40116-usb-host-max3421-hcd-fix-error-pointer-dereference-in-probe-cleanup.patch
- From: 5.15.0-170.180
- CVE-2025-40118
- Description:
scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod
- CVE: https://ubuntu.com/security/CVE-2025-40118
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40118-scsi-pm80xx-fix-array-index-out-of-of-bounds-on-rmmod.patch
- From: 5.15.0-170.180
- CVE-2025-40070
- Description:
pps: fix warning in pps_register_cdev when register device fail
- CVE: https://ubuntu.com/security/CVE-2025-40070
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40070-pps-fix-warning-in-pps-register-cdev-when-register-device-fail.patch
- From: 5.15.0-170.180
- CVE-2025-40154
- Description:
ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
- CVE: https://ubuntu.com/security/CVE-2025-40154
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40154-asoc-intel-bytcr-rt5640-fix-invalid-quirk-input-mapping.patch
- From: 5.15.0-170.180
- CVE-2025-40121
- Description:
ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping
- CVE: https://ubuntu.com/security/CVE-2025-40121
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40121-asoc-intel-bytcr-rt5651-fix-invalid-quirk-input-mapping.patch
- From: 5.15.0-170.180
- CVE-2025-40140
- Description:
net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast
- CVE: https://ubuntu.com/security/CVE-2025-40140
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40140-net-usb-remove-disruptive-netif-wake-queue-in-rtl8150-set-multicast.patch
- From: 5.15.0-170.180
- CVE-2025-40053
- Description:
net: dlink: handle copy_thresh allocation failure
- CVE: https://ubuntu.com/security/CVE-2025-40053
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40053-net-dlink-handle-copy-thresh-allocation-failure.patch
- From: 5.15.0-170.180
- CVE-2025-40048
- Description:
uio_hv_generic: Let userspace take care of interrupt mask
- CVE: https://ubuntu.com/security/CVE-2025-40048
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40048-uio-hv-generic-let-userspace-take-care-of-interrupt-mask.patch
- From: 5.15.0-170.180
- CVE-2025-40044
- Description:
fs: udf: fix OOB read in lengthAllocDescs handling
- CVE: https://ubuntu.com/security/CVE-2025-40044
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40044-fs-udf-fix-oob-read-in-lengthallocdescs-handling.patch
- From: 5.15.0-170.180
- CVE-2025-40153
- Description:
mm: hugetlb: avoid soft lockup when mprotect to large memory area
- CVE: https://ubuntu.com/security/CVE-2025-40153
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40153-mm-hugetlb-avoid-soft-lockup-when-mprotect-to-large-memory-area.patch
- From: 5.15.0-170.180
- CVE-2025-40030
- Description:
pinctrl: check the return value of pinmux_ops::get_function_name()
- CVE: https://ubuntu.com/security/CVE-2025-40030
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40030-pinctrl-check-the-return-value-of-pinmux-ops-get-function-name.patch
- From: 5.15.0-170.180
- CVE-2025-40029
- Description:
bus: fsl-mc: Check return value of platform_get_resource()
- CVE: https://ubuntu.com/security/CVE-2025-40029
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40029-bus-fsl-mc-check-return-value-of-platform-get-resource.patch
- From: 5.15.0-170.180
- CVE-2025-40111
- Description:
drm/vmwgfx: Fix Use-after-free in validation
- CVE: https://ubuntu.com/security/CVE-2025-40111
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40111-drm-vmwgfx-fix-use-after-free-in-validation.patch
- From: 5.15.0-170.180
- CVE-2025-40187
- Description:
net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()
- CVE: https://ubuntu.com/security/CVE-2025-40187
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40187-net-sctp-fix-a-null-dereference-in-sctp-disposition-sctp-sf-do-5-1d-ce.patch
- From: 5.15.0-170.180
- CVE-2025-40183
- Description:
bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}
- CVE: https://ubuntu.com/security/CVE-2025-40183
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40183-bpf-fix-metadata-dst-leak-bpf-redirect-neigh-v-46.patch
- From: 5.15.0-170.180
- CVE-2025-40194
- Description:
cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
- CVE: https://ubuntu.com/security/CVE-2025-40194
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40194-cpufreq-intel-pstate-fix-object-lifecycle-issue-in-update-qos-request.patch
- From: 5.15.0-170.180
- CVE-2025-40204
- Description:
sctp: Fix MAC comparison to be constant-time
- CVE: https://ubuntu.com/security/CVE-2025-40204
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40204-sctp-fix-mac-comparison-to-be-constant-time.patch
- From: 5.15.0-170.180
- CVE-2025-40179
- Description:
ext4: verify orphan file size is not too big
- CVE: https://ubuntu.com/security/CVE-2025-40179
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40179-ext4-verify-orphan-file-size-is-not-too-big-161.patch
- From: 5.15.0-170.180
- CVE-2025-40179
- Description:
ext4: verify orphan file size is not too big
- CVE: https://ubuntu.com/security/CVE-2025-40179
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40179-ext4-verify-orphan-file-size-is-not-too-big-kpatch.patch
- From: 5.15.0-170.180
- CVE-2025-40179
- Description:
ext4: align max orphan file size with e2fsprogs limit
- CVE: https://ubuntu.com/security/CVE-2025-40179
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40179-ext4-align-max-orphan-file-size-with-e2fsprogs-limit.patch
- From: 5.15.0-170.180
- CVE-2025-40026
- Description:
KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O
- CVE: https://ubuntu.com/security/CVE-2025-40026
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40026-kvm-x86-don-t-re-check-l1-intercepts-when-completing-userspace-i-o.patch
- From: 5.15.0-170.180
- CVE-2025-40134
- Description:
dm: fix NULL pointer dereference in __dm_suspend()
- CVE: https://ubuntu.com/security/CVE-2025-40134
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40134-dm-fix-null-pointer-dereference-in-dm-suspend.patch
- From: 5.15.0-170.180
- CVE-2025-40178
- Description:
pid: Add a judgment for ns null in pid_nr_ns
- CVE: https://ubuntu.com/security/CVE-2025-40178
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40178-pid-add-a-judgment-for-ns-null-in-pid-nr-ns.patch
- From: 5.15.0-170.180
- CVE-2025-40167
- Description:
ext4: detect invalid INLINE_DATA + EXTENTS flag combination
- CVE: https://ubuntu.com/security/CVE-2025-40167
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40167-ext4-detect-invalid-inline-data-extents-flag-combination.patch
- From: 5.15.0-170.180
- CVE-2025-40173
- Description:
net/ip6_tunnel: Prevent perpetual tunnel growth
- CVE: https://ubuntu.com/security/CVE-2025-40173
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40173-net-ip6-tunnel-prevent-perpetual-tunnel-growth.patch
- From: 5.15.0-170.180
- CVE-2025-40085
- Description:
ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
- CVE: https://ubuntu.com/security/CVE-2025-40085
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40085-alsa-usb-audio-fix-null-pointer-deference-in-try-to-register-card.patch
- From: 5.15.0-170.180
- CVE-2025-40088
- Description:
hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()
- CVE: https://ubuntu.com/security/CVE-2025-40088
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40088-hfsplus-fix-slab-out-of-bounds-read-in-hfsplus-strcasecmp.patch
- From: 5.15.0-170.180
- CVE-2025-40244
- Description:
hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()
- CVE: https://ubuntu.com/security/CVE-2025-40244
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40244-hfsplus-fix-kmsan-uninit-value-issue-in-hfsplus-ext-cache-extent.patch
- From: 5.15.0-170.180
- CVE-2025-40349
- Description:
hfs: validate record offset in hfsplus_bmap_alloc
- CVE: https://ubuntu.com/security/CVE-2025-40349
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40349-hfs-validate-record-offset-in-hfsplus-bmap-alloc.patch
- From: 5.15.0-170.180
- CVE-2025-40351
- Description:
hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()
- CVE: https://ubuntu.com/security/CVE-2025-40351
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40351-hfsplus-fix-kmsan-uninit-value-issue-in-hfsplus-delete-cat.patch
- From: 5.15.0-170.180
- CVE-2025-40243
- Description:
hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()
- CVE: https://ubuntu.com/security/CVE-2025-40243
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40243-hfs-fix-kmsan-uninit-value-issue-in-hfs-find-set-zero-bits.patch
- From: 5.15.0-170.180
- CVE-2025-40240
- Description:
sctp: avoid NULL dereference when chunk data buffer is missing
- CVE: https://ubuntu.com/security/CVE-2025-40240
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40240-sctp-avoid-null-dereference-when-chunk-data-buffer-is-missing.patch
- From: 5.15.0-170.180
- CVE-2025-40233
- Description:
ocfs2: clear extent cache after moving/defragmenting extents
- CVE: https://ubuntu.com/security/CVE-2025-40233
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40233-ocfs2-clear-extent-cache-after-moving-defragmenting-extents.patch
- From: 5.15.0-170.180
- CVE-2025-40231
- Description:
vsock: fix lock inversion in vsock_assign_transport()
- CVE: https://ubuntu.com/security/CVE-2025-40231
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40231-vsock-fix-lock-inversion-in-vsock-assign-transport.patch
- From: 5.15.0-170.180
- CVE-2025-40106
- Description:
comedi: fix divide-by-zero in comedi_buf_munge()
- CVE: https://ubuntu.com/security/CVE-2025-40106
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40106-comedi-fix-divide-by-zero-in-comedi-buf-munge.patch
- From: 5.15.0-170.180
- CVE-2025-40223
- Description:
most: usb: Fix use-after-free in hdm_disconnect
- CVE: https://ubuntu.com/security/CVE-2025-40223
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40223-most-usb-fix-use-after-free-in-hdm-disconnect.patch
- From: 5.15.0-170.180
- CVE-2025-68249
- Description:
most: usb: hdm_probe: Fix calling put_device() before device initialization
- CVE: https://ubuntu.com/security/CVE-2025-68249
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-68249-most-usb-hdm-probe-fix-calling-put-device-before-device-initialization.patch
- From: 5.15.0-170.180
- CVE-2025-68249
- Description:
most: usb: fix double free on late probe failure
- CVE: https://ubuntu.com/security/CVE-2025-68249
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-68249-most-usb-fix-double-free-on-late-probe-failure.patch
- From: 5.15.0-170.180
- CVE-2025-40220
- Description:
fuse: fix livelock in synchronous file put from fuseblk workers
- CVE: https://ubuntu.com/security/CVE-2025-40220
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40220-fuse-fix-livelock-in-synchronous-file-put-from-fuseblk-workers-5.15.0-168.178.patch
- From: 5.15.0-170.180
- CVE-2025-40105
- Description:
vfs: Don't leak disconnected dentries on umount
- CVE: https://ubuntu.com/security/CVE-2025-40105
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40105-vfs-don-t-leak-disconnected-dentries-on-umount.patch
- From: 5.15.0-170.180
- CVE-2025-40092
- Description:
usb: gadget: f_ncm: Refactor bind path to use __free()
- CVE: https://ubuntu.com/security/CVE-2025-40092
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40092-usb-gadget-f-ncm-refactor-bind-path-to-use-free.patch
- From: 5.15.0-170.180
- CVE-2025-40094
- Description:
usb: gadget: f_acm: Refactor bind path to use __free()
- CVE: https://ubuntu.com/security/CVE-2025-40094
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40094-usb-gadget-f-acm-refactor-bind-path-to-use-free.patch
- From: 5.15.0-170.180
- CVE-2025-40092 CVE-2025-40094
- Description:
usb: gadget: f_acm: Refactor bind path to use __free()
- CVE: https://ubuntu.com/security/CVE-2025-40094
- Patch: ubuntu-jammy/5.15.0-170.180/CVE-2025-40094-CVE-2025-40092-kpatch.patch
- From: 5.15.0-170.180
- CVE-2025-21780
- Description:
drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
- CVE: https://ubuntu.com/security/CVE-2025-21780
- Patch: ubuntu-jammy/5.15.0-171.181/CVE-2025-21780-drm-amdgpu-avoid-buffer-overflow-attach-in-smu-sys-set-pp-table.patch
- From: 5.15.0-171.181
- CVE-2022-49267
- Description:
mmc: core: use sysfs_emit() instead of sprintf()
- CVE: https://ubuntu.com/security/CVE-2022-49267
- Patch: ubuntu-jammy/5.15.0-171.181/CVE-2022-49267-mmc-core-use-sysfs-emit-instead-of-sprintf.patch
- From: 5.15.0-171.181