- kernel-5.4.0-1109.118 (ubuntu-focal-aws)
- 5.4.0-1122.132
- 2024-04-15 15:45:43
- CVE-2023-40283, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
- CVE: https://ubuntu.com/security/CVE-2023-40283
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-40283-patch-bluetooth-l2cap-fix-use-after-free-in-l2cap-sock-ready-cb.patch
- From: 5.4.0-163.180
- CVE-2023-4128, CVSSv2 Score: 7.8
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4128
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-4128-patch-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.4.0-163.180
- CVE-2023-4128, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4128
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-4128-patch-net-sched-cls-fw-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.4.0-163.180
- CVE-2023-4128, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4128
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-4128-patch-net-sched-cls-u32-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.4.0-163.180
- CVE-2023-20588, CVSSv2 Score: 5.5
- Description:
x86/CPU/AMD: Do not leak quotient data after a division by 0
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-20588.html
- Patch: ubuntu-focal/5.4.0-163.180/CVE-2023-20588-x86-CPU-AMD-Do-not-leak-quotient-data-after-a-division-by-0.patch
- From: kernel-4.14.322-244.539.amzn2
- CVE-2023-4194, CVSSv2 Score: 5.5
- Description:
net: tap_open(): set sk_uid from current_fsuid()
- CVE: https://ubuntu.com/security/CVE-2023-4194
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-4194-patch-net-tap-open-set-sk-uid-from-current-fsuid.patch
- From: 5.4.0-164.181
- CVE-2023-4194, CVSSv2 Score: 5.5
- Description:
net: tun_chr_open(): set sk_uid from current_fsuid()
- CVE: https://ubuntu.com/security/CVE-2023-4194
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-4194-patch-net-tun-chr-open-set-sk-uid-from-current-fsuid.patch
- From: 5.4.0-164.181
- CVE-2023-1206, CVSSv2 Score:
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-3338, CVSSv2 Score:
- Description:
The patch remove functionality.
- Patch: skipped/CVE-2023-3338.patch
- From:
- CVE-2023-3863, CVSSv2 Score: 4.1
- Description:
[PATCH] nfc: llcp: simplify llcp_sock_connect() error paths
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-3863-nfc-llcp-simplify-llcp_sock_connect-error-paths.patch
- From: 5.4.0-164.181
- CVE-2023-3863, CVSSv2 Score: 4.1
- Description:
[PATCH] net: nfc: Fix use-after-free caused by nfc_llcp_find_local
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-3863-patch-net-nfc-fix-use-after-free-caused-by-nfc-llcp-find-local.patch
- From: 5.4.0-164.181
- CVE-2023-3212, CVSSv2 Score: 4.4
- Description:
gfs2: Don't deref jdesc in evict
- CVE: https://ubuntu.com/security/CVE-2023-3212
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2023-3212-patch-gfs2-don-t-deref-jdesc-in-evict.patch
- From: 5.4.0-164.181
- CVE-2021-4001, CVSSv2 Score: 4.1
- Description:
bpf: Fix toctou on read-only map's constant scalar tracking
- CVE: https://ubuntu.com/security/CVE-2021-4001
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2021-4001-bpf-Fix-toctou-on-read-only-maps-constant-scalar-tracking.patch
- From: 5.4.0-164.181
- CVE-2021-4001, CVSSv2 Score: 4.1
- Description:
bpf: Fix toctou on read-only map's constant scalar tracking
- CVE: https://ubuntu.com/security/CVE-2021-4001
- Patch: ubuntu-focal/5.4.0-164.181/CVE-2021-4001-bpf-Fix-toctou-on-read-only-maps-constant-scalar-tracking-kpatch.patch
- From: 5.4.0-164.181
- CVE-2023-4622, CVSSv2 Score: 7.0
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://ubuntu.com/security/CVE-2023-4622
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4622-patch-af-unix-fix-null-ptr-deref-in-unix-stream-sendpage.patch
- From: 5.4.0-165.182
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://ubuntu.com/security/CVE-2023-4623
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4623-patch-net-sched-sch-hfsc-ensure-inner-classes-have-fsc-curve.patch
- From: 5.4.0-165.182
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue.patch
- From: 5.4.0-165.182
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue-kpatch.patch
- From: 5.4.0-165.182
- CVE-2023-42753, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for
- CVE: https://ubuntu.com/security/CVE-2023-42753
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
- From: 5.4.0-165.182
- CVE-2023-42752, CVSSv2 Score: 5.5
- Description:
igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU
- CVE: https://ubuntu.com/security/CVE-2023-42752
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42752-patch-igmp-limit-igmpv3-newpack-packet-size-to-ip-max-mtu.patch
- From: 5.4.0-165.182
- CVE-2023-4881, CVSSv2 Score:
- Description:
CVE was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.
- Patch: skipped/CVE-2023-4881.patch
- From:
- CVE-2023-42755, CVSSv2 Score:
- Description:
The patch removes functionality.
- Patch: skipped/CVE-2023-42755.patch
- From:
- CVE-2023-42756, CVSSv2 Score: 4.7
- Description:
netfilter: ipset: Add schedule point in call_ad().
- CVE: https://ubuntu.com/security/CVE-2023-42756
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42756-netfilter-ipset-Add-schedule-point-in-call_ad.patch
- From: 5.4.0-165.182
- CVE-2023-42756, CVSSv2 Score: 4.7
- Description:
netfilter: ipset: Fix race between IPSET_CMD_CREATE and
- CVE: https://ubuntu.com/security/CVE-2023-42756
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-42756-patch-netfilter-ipset-fix-race-between-ipset-cmd-create-and.patch
- From: 5.4.0-165.182
- CVE-2023-34319, CVSSv2 Score: 7.8
- Description:
xen/netback: Fix buffer overrun triggered by unusual packet
- CVE: https://ubuntu.com/security/CVE-2023-34319
- Patch: ubuntu-focal/5.4.0-165.182/CVE-2023-34319-patch-xen-netback-fix-buffer-overrun-triggered-by-unusual-packet.patch
- From: 5.4.0-165.182
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in
- CVE: https://ubuntu.com/security/CVE-2023-31083
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-31083-patch-bluetooth-hci-ldisc-check-hci-uart-proto-ready-flag-in.patch
- From: 5.4.0-166.183
- CVE-2023-4132, CVSSv2 Score: 5.5
- Description:
media: usb: siano: Fix warning due to null work_func_t function
- CVE: https://ubuntu.com/security/CVE-2023-4132
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-4132-patch-media-usb-siano-fix-warning-due-to-null-work-func-t.patch
- From: 5.4.0-166.183
- CVE-2023-0597, CVSSv2 Score:
- Description:
Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
- Patch: skipped/CVE-2023-0597.patch
- From:
- CVE-2023-3772, CVSSv2 Score: 4.4
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://ubuntu.com/security/CVE-2023-3772
- Patch: ubuntu-focal/5.4.0-166.183/CVE-2023-3772-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: 5.4.0-166.183
- CVE-2023-31085, CVSSv2 Score: 5.5
- Description:
ubi: Refuse attaching if mtd's erasesize is 0
- CVE: https://ubuntu.com/security/CVE-2023-31085
- Patch: ubuntu-focal/5.4.0-167.184/CVE-2023-31085-ubi-Refuse-attaching-if-mtd-s-erasesize-is-0.patch
- From: 5.4.0-167.184
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://ubuntu.com/security/CVE-2023-45871
- Patch: ubuntu-focal/5.4.0-167.184/CVE-2023-45871-patch-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 5.4.0-167.184
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-45871
- Patch: ubuntu-focal/5.4.0-167.184/CVE-2023-45871-kpatch.patch
- From: 5.4.0-167.184
- CVE-2023-6176, CVSSv2 Score: 7.8
- Description:
net/tls: do not free tls_rec on async operation in
- CVE: https://ubuntu.com/security/CVE-2023-6176
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-6176-patch-net-tls-do-not-free-tls-rec-on-async-operation-in.patch
- From: 5.4.0-169.187
- CVE-2023-39189, CVSSv2 Score: 6.0
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39189
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39189-patch-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 5.4.0-169.187
- CVE-2023-39193, CVSSv2 Score: 6.1
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://ubuntu.com/security/CVE-2023-39193
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39193-patch-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 5.4.0-169.187
- CVE-2023-39192, CVSSv2 Score: 6.7
- Description:
netfilter: xt_u32: validate user space input
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39192-patch-netfilter-xt-u32-validate-user-space-input.patch
- From: 5.4.0-169.187
- CVE-2023-39192, CVSSv2 Score: 6.7
- Description:
netfilter: xt_u32: validate user space input (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39192-netfilter-xt-u32-validate-user-space-input-kpatch.patch
- From: 5.4.0-169.187
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://ubuntu.com/security/CVE-2023-5717
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5717-patch-perf-disallow-mis-matched-inherited-group-reads.patch
- From: 5.4.0-169.187
- CVE-2023-5717, CVSSv2 Score: 7.8
- Description:
perf: Disallow mis-matched inherited group reads
- CVE: https://ubuntu.com/security/CVE-2023-5717
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5717-perf-disallow-mis-matched-inherited-group-reads-kpatch.patch
- From: 5.4.0-169.187
- CVE-2023-5178, CVSSv2 Score: 8.8
- Description:
nvmet-tcp: move send/recv error handling in the send/recv methods instead of call-sites
- CVE: https://ubuntu.com/security/CVE-2023-5178
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5178-0001-nvmet-tcp-move-send-recv-error-handling-in-the-send-.patch
- From: 5.4.0-169.187
- CVE-2023-5178, CVSSv2 Score: 8.8
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://ubuntu.com/security/CVE-2023-5178
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-5178-patch-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 5.4.0-169.187
- CVE-2023-42754, CVSSv2 Score: 5.5
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://ubuntu.com/security/CVE-2023-42754
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-42754-patch-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 5.4.0-169.187
- CVE-2023-39194, CVSSv2 Score: 4.4
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39194
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-39194-patch-net-xfrm-fix-xfrm-address-filter-oob-read.patch
- From: 5.4.0-169.187
- CVE-2023-3006, CVSSv2 Score:
- Description:
Complex adaptation required.
- Patch: skipped/CVE-2023-3006.patch
- From:
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: hub: Clean up use of port initialization schemes and retries
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-37453-0001-USB-hub-Clean-up-use-of-port-initialization-schemes-.patch
- From: 5.4.0-169.187
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: hub: Add Kconfig option to reduce number of port initialization retries
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-37453-0002-USB-hub-Add-Kconfig-option-to-reduce-number-of-port-.patch
- From: 5.4.0-169.187
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Unite old scheme and new scheme descriptor reads
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-37453-0003-USB-core-Unite-old-scheme-and-new-scheme-descriptor-.patch
- From: 5.4.0-169.187
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
usb: hub: Check device descriptor before resusciation
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-37453-0004-usb-hub-Check-device-descriptor-before-resusciation.patch
- From: 5.4.0-169.187
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Change usb_get_device_descriptor() API
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-37453-0005-USB-core-Change-usb_get_device_descriptor-API.patch
- From: 5.4.0-169.187
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-focal/5.4.0-169.187/CVE-2023-37453-0006-USB-core-Fix-race-by-not-overwriting-udev-descriptor.patch
- From: 5.4.0-169.187
- CVE-2023-6040, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: Reject tables of unsupported family
- CVE: https://ubuntu.com/security/CVE-2023-6040
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6040-netfilter-nf_tables-Reject-tables-of-unsupported-family-165.patch
- From: 5.4.0-170.188
- CVE-2023-6606, CVSSv2 Score: 7.1
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://ubuntu.com/security/CVE-2023-6606
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6606-smb-client-fix-OOB-in-smbCalcSize.patch
- From: 5.4.0-170.188
- CVE-2023-6931, CVSSv2 Score: 7.0
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://ubuntu.com/security/CVE-2023-6931
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6931-perf-Fix-perf_event_validate_size.patch
- From: 5.4.0-170.188
- CVE-2023-6931, CVSSv2 Score: 7.0
- Description:
perf: Fix perf_event_validate_size() lockdep splat
- CVE: https://ubuntu.com/security/CVE-2023-6931
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6931-perf-Fix-perf_event_validate_size-lockdep-splat.patch
- From: 5.4.0-170.188
- CVE-2023-6932, CVSSv2 Score: 7.0
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://ubuntu.com/security/CVE-2023-6932
- Patch: ubuntu-focal/5.4.0-170.188/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-query-packet.patch
- From: 5.4.0-170.188
- CVE-2023-35827, CVSSv2 Score: 7.0
- Description:
ravb: Fix use-after-free issue in ravb_tx_timeout_work()
- CVE: https://ubuntu.com/security/CVE-2023-35827
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-35827-patch-ravb-fix-use-after-free-issue-in-ravb-tx-timeout-work.patch
- From: 5.4.0-171.189
- CVE-2023-46343, CVSSv2 Score: 5.5
- Description:
nfc: nci: fix possible NULL pointer dereference in send_acknowledge()
- CVE: https://ubuntu.com/security/CVE-2023-46343
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-46343-patch-nfc-nci-fix-possible-null-pointer-dereference-in.patch
- From: 5.4.0-171.189
- CVE-2023-45863, CVSSv2 Score: 6.4
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://ubuntu.com/security/CVE-2023-45863
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-45863-patch-kobject-fix-slab-out-of-bounds-in-fill-kobj-path.patch
- From: 5.4.0-171.189
- CVE-2023-34324, CVSSv2 Score: 4.9
- Description:
xen/events: replace evtchn_rwlock with RCU
- CVE: https://ubuntu.com/security/CVE-2023-34324
- Patch: ubuntu-focal/5.4.0-171.189/CVE-2023-34324-xen-events-replace-evtchn_rwlock-with-RCU-kpatch.patch
- From: 5.4.0-171.189
- CVE-2024-0646, CVSSv2 Score: 7.8
- Description:
net: tls, update curr on splice as well
- CVE: https://ubuntu.com/security/CVE-2024-0646
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2024-0646-patch-net-tls-update-curr-on-splice-as-well.patch
- From: 5.4.0-172.190
- CVE-2024-0565, CVSSv2 Score: 7.4
- Description:
smb: client: fix OOB in receive_encrypted_standard()
- CVE: https://ubuntu.com/security/CVE-2024-0565
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2024-0565-patch-smb-client-fix-oob-in-receive-encrypted-standard.patch
- From: 5.4.0-172.190
- CVE-2023-6915, CVSSv2 Score: 5.5
- Description:
ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://ubuntu.com/security/CVE-2023-6915
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2023-6915-patch-ida-fix-crash-in-ida-free-when-the-bitmap-is-empty.patch
- From: 5.4.0-172.190
- CVE-2023-51781, CVSSv2 Score: 7.0
- Description:
appletalk: Fix Use-After-Free in atalk_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51781
- Patch: ubuntu-focal/5.4.0-172.190/CVE-2023-51781-patch-appletalk-fix-use-after-free-in-atalk-ioctl.patch
- From: 5.4.0-172.190
- CVE-2023-22995, CVSSv2 Score: 7.8
- Description:
usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core
- CVE: https://ubuntu.com/security/CVE-2023-22995
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-22995-patch-usb-dwc3-dwc3-qcom-add-missing-platform-device-put-in.patch
- From: 5.4.0-173.191
- CVE-2023-51779, CVSSv2 Score: 7.0
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg
- CVE: https://ubuntu.com/security/CVE-2023-51779
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-51779-patch-bluetooth-af-bluetooth-fix-use-after-free-in.patch
- From: 5.4.0-173.191
- CVE-2021-44879, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check on inode type during garbage collection
- CVE: https://ubuntu.com/security/CVE-2021-44879
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2021-44879-patch-f2fs-fix-to-do-sanity-check-on-inode-type-during-garbage.patch
- From: 5.4.0-173.191
- CVE-2023-4244, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-6121, CVSSv2 Score: 4.3
- Description:
nvmet: nul-terminate the NQNs passed in the connect command
- CVE: https://ubuntu.com/security/CVE-2023-6121
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-6121-patch-nvmet-nul-terminate-the-nqns-passed-in-the-connect-command.patch
- From: 5.4.0-173.191
- CVE-2023-51782, CVSSv2 Score: 7.0
- Description:
net/rose: Fix Use-After-Free in rose_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51782
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-51782-patch-net-rose-fix-use-after-free-in-rose-ioctl.patch
- From: 5.4.0-173.191
- CVE-2023-51780, CVSSv2 Score: 8.1
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51780
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-51780-patch-atm-fix-use-after-free-in-do-vcc-ioctl.patch
- From: 5.4.0-173.191
- CVE-2024-0340, CVSSv2 Score: 5.5
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://ubuntu.com/security/CVE-2024-0340
- Patch: ubuntu-focal/5.4.0-173.191/CVE-2023-0340-CVE-2024-0340-patch-vhost-use-kzalloc-instead-of-kmalloc-followed-by.patch
- From: 5.4.0-173.191
- CVE-2024-1086, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://ubuntu.com/security/CVE-2024-1086
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2024-1086-patch-netfilter-nf-tables-reject-queue-drop-verdict-parameters-5.4.0-167.184.patch
- From: 5.4.0-174.193
- CVE-2023-23000, CVSSv2 Score: 5.5
- Description:
phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function
- CVE: https://ubuntu.com/security/CVE-2023-23000
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2023-23000-patch-phy-tegra-xusb-fix-return-value-of.patch
- From: 5.4.0-174.193
- CVE-2023-23004, CVSSv2 Score: 5.5
- Description:
malidp: Fix NULL vs IS_ERR() checking
- CVE: https://ubuntu.com/security/CVE-2023-23004
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2023-23004-patch-malidp-fix-null-vs-is-err-checking.patch
- From: 5.4.0-174.193
- CVE-2024-24855, CVSSv2 Score: 4.7
- Description:
scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()
- CVE: https://ubuntu.com/security/CVE-2024-24855
- Patch: ubuntu-focal/5.4.0-174.193/CVE-2024-24855-patch-scsi-lpfc-fix-a-possible-data-race-in.patch
- From: 5.4.0-174.193
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A