- kernel-5.15.0-1035.39~20.04.1 (ubuntu-focal-lts-jammy-aws)
- 5.15.0-1073.79~20.04.1
- 2024-12-24 18:54:17
- CVE-2023-1078, CVSSv2 Score: 7.8
- Description:
rds: rds_rm_zerocopy_callback() use list_first_entry()
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2023-1078.html
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-1078-rds-rds_rm_zerocopy_callback-use-list_first_entry.patch
- From: 5.15.0-72.79
- CVE-2023-1118, CVSSv2 Score: 7.8
- Description:
[PATCH] media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
- CVE: https://ubuntu.com/security/CVE-2023-1118
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-1118-patch-media-rc-fix-use-after-free-bugs-caused-by-ene-tx-irqsim.patch
- From: 5.15.0-72.79
- CVE-2023-20938, CVSSv2 Score:
- Description:
Out of scope. Android related patch.
- Patch: skipped/CVE-2023-20938.patch
- From:
- CVE-2022-3707, CVSSv2 Score: 5.5
- Description:
drm/i915/gvt: fix double free bug in split_2MB_gtt_entry
- CVE: https://access.redhat.com/security/cve/CVE-2022-3707
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2022-3707-drm-i915-gvt-fix-double-free-bug-in-split_2MB_gtt_entry.patch
- From: 5.15.0-72.79
- CVE-2023-2162, CVSSv2 Score: 5.5
- Description:
scsi: iscsi_tcp: Fix UAF during login when accessing the shost
- CVE: https://ubuntu.com/security/CVE-2023-2162
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-2162-patch-scsi-iscsi-tcp-fix-uaf-during-login-when-accessing-the.patch
- From: 5.15.0-72.79
- CVE-2022-27672, CVSSv2 Score: 5.6
- Description:
x86/speculation: Identify processors vulnerable to SMT RSB predictions
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: smt_rsb-enable.patch
- From: N/A
- CVE-2022-27672, CVSSv2 Score: 5.6
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug.patch
- From: 5.15.0-72.79
- CVE-2022-27672, CVSSv2 Score: 5.6
- Description:
KVM: x86: Mitigate the cross-thread return address predictions bug (adaptation)
- CVE: https://alas.aws.amazon.com/cve/html/CVE-2022-27672.html
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2022-27672-KVM-x86-Mitigate-the-cross-thread-return-address-predictions-bug-kpatch.patch
- From: 5.15.0-72.79
- CVE-2023-1075, CVSSv2 Score: 3.3
- Description:
net/tls: tls_is_tx_ready() checked list_entry
- CVE: https://ubuntu.com/security/CVE-2023-1075
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-1075-net-tls-tls_is_tx_ready-checked-list_entry.patch
- From: 5.15.0-72.79
- CVE-2023-1513, CVSSv2 Score: 3.3
- Description:
kvm: initialize all of the kvm_debugregs structure before sending it
- CVE: https://ubuntu.com/security/CVE-2023-1513
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-1513-patch-kvm-initialize-all-of-the-kvm-debugregs-structure-before.patch
- From: 5.15.0-72.79
- CVE-2023-0459, CVSSv2 Score:
- Description:
Safety check failed for copy_from_user; zendesk:191568
- Patch: skipped/CVE-2023-0459.patch
- From:
- CVE-2023-32269, CVSSv2 Score: 6.7
- Description:
netrom: Fix use-after-free caused by accept on already connected
- CVE: https://ubuntu.com/security/CVE-2023-32269
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-32269-patch-netrom-fix-use-after-free-caused-by-accept-on-already.patch
- From: 5.15.0-72.79
- CVE-2023-3161, CVSSv2 Score: 5.5
- Description:
fbcon: Check font dimension limits
- CVE: https://ubuntu.com/security/CVE-2023-3161
- Patch: ubuntu-jammy/5.15.0-72.79/CVE-2023-3161-fbcon-check-font-dimension-limits.patch
- From: 5.15.0-72.79
- CVE-2023-32233, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: deactivate anonymous set from preparation phase
- CVE: https://ubuntu.com/security/CVE-2023-32233
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-32233-patch-netfilter-nf-tables-deactivate-anonymous-set-from.patch
- From: 5.15.0-73.80
- CVE-2023-31436, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
- CVE: https://ubuntu.com/security/CVE-2023-31436
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-31436-patch-net-sched-sch-qfq-prevent-slab-out-of-bounds-in.patch
- From: 5.15.0-73.80
- CVE-2023-1380, CVSSv2 Score: 7.1
- Description:
wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
- CVE: https://ubuntu.com/security/CVE-2023-1380
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-1380-patch-wifi-brcmfmac-slab-out-of-bounds-read-in.patch
- From: 5.15.0-73.80
- CVE-2023-30456, CVSSv2 Score: 6.5
- Description:
KVM: nVMX: add missing consistency checks for CR0 and CR4
- CVE: https://ubuntu.com/security/CVE-2023-30456
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-30456-patch-kvm-nvmx-add-missing-consistency-checks-for-cr0-and-cr4.patch
- From: 5.15.0-73.80
- CVE-2023-1670, CVSSv2 Score: 7.8
- Description:
xirc2ps_cs: Fix use after free bug in xirc2ps_detach
- CVE: https://ubuntu.com/security/CVE-2023-1670
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1670-xirc2ps_cs-fix-use-after-free-bug-in-xirc2ps_detach.patch
- From: 5.15.0-75.82
- CVE-2023-1077, CVSSv2 Score: 7.0
- Description:
sched/rt: pick_next_rt_entity(): check list_entry
- CVE: https://ubuntu.com/security/CVE-2023-1077
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1077-sched-rt-pick_next_rt_entity-check-list_entry.patch
- From: 5.15.0-75.82
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers
- CVE: https://ubuntu.com/security/CVE-2023-1079
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers.patch
- From: 5.15.0-75.82
- CVE-2023-1079, CVSSv2 Score: 6.8
- Description:
HID: asus: use spinlock to safely schedule workers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-1079
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1079-HID-asus-use-spinlock-to-safely-schedule-workers-kpatch.patch
- From: 5.15.0-75.82
- CVE-2023-1076, CVSSv2 Score: 5.5
- Description:
net: add sock_init_data_uid()
- CVE: https://ubuntu.com/security/CVE-2023-1076
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1076-net-add-sock_init_data_uid.patch
- From: 5.15.0-75.82
- CVE-2023-1076, CVSSv2 Score: 5.5
- Description:
tap: tap_open(): correctly initialize socket uid
- CVE: https://ubuntu.com/security/CVE-2023-1076
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1076-tap-tap_open-correctly-initialize-socket-uid.patch
- From: 5.15.0-75.82
- CVE-2023-1076, CVSSv2 Score: 5.5
- Description:
tun: tun_chr_open(): correctly initialize socket uid
- CVE: https://ubuntu.com/security/CVE-2023-1076
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1076-tun-tun_chr_open-correctly-initialize-socket-uid.patch
- From: 5.15.0-75.82
- CVE-2023-2985, CVSSv2 Score: 5.5
- Description:
fs: hfsplus: fix UAF issue in hfsplus_put_super
- CVE: https://ubuntu.com/security/CVE-2023-2985
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-2985-fs-hfsplus-fix-uaf-issue-in-hfsplus_put_super.patch
- From: 5.15.0-75.82
- CVE-2023-1859, CVSSv2 Score: 4.7
- Description:
9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition
- CVE: https://ubuntu.com/security/CVE-2023-1859
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-1859-9p-xen-fix-use-after-free-bug-in-xen_9pfs_front_remove-due-to-race-condition.patch
- From: 5.15.0-75.82
- CVE-2023-25012, CVSSv2 Score: 4.6
- Description:
HID: bigben: use spinlock to safely schedule workers
- CVE: https://ubuntu.com/security/CVE-2023-25012
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-25012-HID-bigben-use-spinlock-to-safely-schedule-workers.patch
- From: 5.15.0-75.82
- CVE-2023-25012, CVSSv2 Score: 4.6
- Description:
HID: bigben: use spinlock to safely schedule workers (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-25012
- Patch: ubuntu-jammy/5.15.0-75.82/CVE-2023-25012-HID-bigben-use-spinlock-to-safely-schedule-workers-kpatch.patch
- From: 5.15.0-75.82
- CVE-2023-35788, CVSSv2 Score: 7.8
- Description:
net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
- CVE: https://ubuntu.com/security/CVE-2023-35788
- Patch: ubuntu-jammy/5.15.0-76.83/CVE-2023-35788-patch-net-sched-flower-fix-possible-oob-write-in.patch
- From: 5.15.0-76.83
- CVE-2023-3389, CVSSv2 Score: 7.8
- Description:
io_uring: mutex locked poll hashing
- CVE: https://ubuntu.com/security/CVE-2023-3389
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-3389-patch-io-uring-hold-uring-mutex-around-poll-removal.patch
- From: 5.15.0-78.85
- CVE-2023-3439, CVSSv2 Score: 4.7
- Description:
mctp: defer the kfree of object mdev->addrs
- CVE: https://ubuntu.com/security/CVE-2023-3439
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-3439-patch-mctp-defer-the-kfree-of-object-mdev-addrs.patch
- From: 5.15.0-78.85
- CVE-2023-3390 CVE-2023-3117, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: incorrect error path handling with
- CVE: https://ubuntu.com/security/CVE-2023-3390
- CVE: https://ubuntu.com/security/CVE-2023-3117
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-3117-CVE-2023-3390-patch-netfilter-nf-tables-incorrect-error-path-handling-with.patch
- From: 5.15.0-78.85
- CVE-2023-3090, CVSSv2 Score: 7.8
- Description:
ipvlan:Fix out-of-bounds caused by unclear skb->cb
- CVE: https://ubuntu.com/security/CVE-2023-3090
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-3090-patch-ipvlan-fix-out-of-bounds-caused-by-unclear-skb-cb.patch
- From: 5.15.0-78.85
- CVE-2023-35001, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
- CVE: https://ubuntu.com/security/CVE-2023-35001
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-35001-netfilter-nf_tables-prevent-OOB-access-in-nft_byteorder_eval.patch
- From: 5.15.0-78.85
- CVE-2023-31248, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: do not ignore genmask when looking up chain by id
- CVE: https://ubuntu.com/security/CVE-2023-31248
- Patch: ubuntu-jammy/5.15.0-78.85/CVE-2023-31248-netfilter-nf_tables-do-not-ignore-genmask-when-looking-up-chain-by-id.patch
- From: 5.15.0-78.85
- CVE-2023-1611, CVSSv2 Score: 6.3
- Description:
btrfs: fix race between quota disable and quota assign ioctls
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-1611
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-1611-btrfs-fix-race-between-quota-disable-and-quota-assig.patch
- From: 5.15.0-79.86
- CVE-2023-1855, CVSSv2 Score: 6.3
- Description:
hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-1855
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-1855-hwmon-xgene-Fix-use-after-free-bug-in-xgene_hwmon_re.patch
- From: 5.15.0-79.86
- CVE-2023-1990, CVSSv2 Score: 4.7
- Description:
nfc: st-nci: Fix use after free bug in ndlc_remove due to race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-1990
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-1990-nfc-st-nci-Fix-use-after-free-bug-in-ndlc_remove-due.patch
- From: 5.15.0-79.86
- CVE-2023-2002, CVSSv2 Score: 6.8
- Description:
bluetooth: Perform careful capability checks in hci_sock_ioctl()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2002
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2002-bluetooth-Perform-careful-capability-checks-in-hci_s.patch
- From: 5.15.0-79.86
- CVE-2023-2124, CVSSv2 Score: 7.8
- Description:
xfs: verify buffer contents when we skip log replay
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2124
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2124-xfs-verify-buffer-contents-when-we-skip-log-replay.patch
- From: 5.15.0-79.86
- CVE-2023-2163, CVSSv2 Score: 10
- Description:
bpf: Fix incorrect verifier pruning due to missing register precision
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2163
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2163-bpf-Fix-incorrect-verifier-pruning-due-to-missing-re.patch
- From: 5.15.0-79.86
- CVE-2023-2194, CVSSv2 Score: 6.7
- Description:
i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2194
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2194-i2c-xgene-slimpro-Fix-out-of-bounds-bug-in-xgene_sli.patch
- From: 5.15.0-79.86
- CVE-2023-2235, CVSSv2 Score: 7.8
- Description:
perf: Fix check before add_event_to_groups() in perf_group_detach()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2235
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2235-perf-Fix-check-before-add_event_to_groups-in-perf_gr.patch
- From: 5.15.0-79.86
- CVE-2023-2269, CVSSv2 Score: 4.4
- Description:
dm ioctl: fix nested locking in table_clear() to remove deadlock concern
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-2269
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-2269-dm-ioctl-fix-nested-locking-in-table_clear-to-remove.patch
- From: 5.15.0-79.86
- CVE-2023-23004, CVSSv2 Score: 5.5
- Description:
malidp: Fix NULL vs IS_ERR() checking
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-23004
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-23004-malidp-Fix-NULL-vs-IS_ERR-checking.patch
- From: 5.15.0-79.86
- CVE-2023-28466, CVSSv2 Score: 7
- Description:
net: tls: fix possible race condition between
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-28466
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-28466-net-tls-fix-possible-race-condition-between-do_tls_g_kpatch.patch
- From: 5.15.0-79.86
- CVE-2023-30772, CVSSv2 Score: 6.4
- Description:
power: supply: da9150: Fix use after free bug in
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-30772
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-30772-power-supply-da9150-Fix-use-after-free-bug-in-da9150.patch
- From: 5.15.0-79.86
- CVE-2023-3141, CVSSv2 Score: 7.1
- Description:
memstick: r592: Fix UAF bug in r592_remove due to race condition
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-3141
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-3141-memstick-r592-Fix-UAF-bug-in-r592_remove-due-to-race.patch
- From: 5.15.0-79.86
- CVE-2023-32248, CVSSv2 Score: 7.5
- Description:
ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-32248
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-32248-ksmbd-fix-NULL-pointer-dereference-in-smb2_get_info_.patch
- From: 5.15.0-79.86
- CVE-2023-3268, CVSSv2 Score: 7.1
- Description:
relayfs: fix out-of-bounds access in relay_file_read
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-3268
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-3268-relayfs-fix-out-of-bounds-access-in-relay_file_read.patch
- From: 5.15.0-79.86
- CVE-2023-33203, CVSSv2 Score: 6.4
- Description:
net: qcom/emac: Fix use after free bug in emac_remove due to race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-33203
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-33203-net-qcom-emac-Fix-use-after-free-bug-in-emac_remove-.patch
- From: 5.15.0-79.86
- CVE-2023-33288, CVSSv2 Score: 4.7
- Description:
power: supply: bq24190: Fix use after free bug in bq24190_remove due
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-33288
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-33288-power-supply-bq24190-Fix-use-after-free-bug-in-bq241_kpatch.patch
- From: 5.15.0-79.86
- CVE-2023-35823, CVSSv2 Score: 7
- Description:
media: saa7134: fix use after free bug in saa7134_finidev due to race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-35823
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-35823-media-saa7134-fix-use-after-free-bug-in-saa7134_fini.patch
- From: 5.15.0-79.86
- CVE-2023-35824, CVSSv2 Score: 7
- Description:
media: dm1105: Fix use after free bug in dm1105_remove due to race
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-35824
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-35824-media-dm1105-Fix-use-after-free-bug-in-dm1105_remove.patch
- From: 5.15.0-79.86
- CVE-2023-35828, CVSSv2 Score: 7
- Description:
usb: gadget: udc: renesas_usb3: Fix use after free bug in
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-35828
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-35828-usb-gadget-udc-renesas_usb3-Fix-use-after-free-bug-i.patch
- From: 5.15.0-79.86
- CVE-2023-35829, CVSSv2 Score: 7
- Description:
media: rkvdec: fix use after free bug in rkvdec_remove
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2023-35829
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2023-35829-media-rkvdec-fix-use-after-free-bug-in-rkvdec_remove.patch
- From: 5.15.0-79.86
- CVE-2022-4269, CVSSv2 Score: 5.5
- Description:
act_mirred: use the backlog for nested calls to mirred ingress
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-4269
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2022-4269-act_mirred-use-the-backlog-for-nested-calls-to-mirre_kpatch.patch
- From: 5.15.0-79.86
- CVE-2022-48502, CVSSv2 Score: 7.1
- Description:
fs/ntfs3: Check fields while reading
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-48502
- Patch: ubuntu-jammy/5.15.0-79.86/CVE-2022-48502-fs-ntfs3-Check-fields-while-reading.patch
- From: 5.15.0-79.86
- CVE-2023-0597, CVSSv2 Score:
- Description:
Medium severity vulnerability CVE requiring extremely complex adaptation (if at all possible)
- Patch: skipped/CVE-2023-0597.patch
- From:
- CVE-2023-21400, CVSSv2 Score: 6.7
- Description:
io_uring: ensure IOPOLL locks around deferred work
- CVE: https://ubuntu.com/security/CVE-2023-21400
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-21400-patch-io-uring-ensure-iopoll-locks-around-deferred-work.patch
- From: 5.15.0-82.91
- CVE-2023-3777, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: skip bound chain on rule flush
- CVE: https://ubuntu.com/security/CVE-2023-3777
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3777-patch-netfilter-nf-tables-skip-bound-chain-on-rule-flush.patch
- From: 5.15.0-82.91
- CVE-2023-3995 CVE-2023-4147, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: disallow rule addition to bound chain via
- CVE: https://ubuntu.com/security/CVE-2023-3995
- CVE: https://ubuntu.com/security/CVE-2023-4147
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3995-CVE-2023-4147-patch-netfilter-nf-tables-disallow-rule-addition-to-bound-chain.patch
- From: 5.15.0-82.91
- CVE-2023-20593, CVSSv2 Score: 6.5
- Description:
hw: amd: Cross-Process Information Leak
- CVE: https://access.redhat.com/security/cve/cve-2023-20593
- Patch: zenbleed-enable.patch
- From: N/A
- CVE-2023-3776, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: Fix improper refcount update leads to
- CVE: https://ubuntu.com/security/CVE-2023-3776
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3776-patch-net-sched-cls-fw-fix-improper-refcount-update-leads-to.patch
- From: 5.15.0-82.91
- CVE-2023-4004, CVSSv2 Score: 7.8
- Description:
netfilter: nft_set_pipapo: fix improper element removal
- CVE: https://ubuntu.com/security/CVE-2023-4004
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-4004-patch-netfilter-nft-set-pipapo-fix-improper-element-removal.patch
- From: 5.15.0-82.91
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: refactor parsing of netlink parameters
- CVE: https://ubuntu.com/security/CVE-2023-3611
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3611-net-sched-sch_qfq-refactor-parsing-of-netlink-parameters.patch
- From: 5.15.0-82.91
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: account for stab overhead in qfq_enqueue
- CVE: https://ubuntu.com/security/CVE-2023-3611
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3611-patch-net-sched-sch-qfq-account-for-stab-overhead-in-qfq-enqueue.patch
- From: 5.15.0-82.91
- CVE-2023-3611, CVSSv2 Score: 7.8
- Description:
net/sched: sch_qfq: refactor parsing of netlink parameters (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-3611
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3611-net-sched-sch_qfq-refactor-parsing-of-netlink-parameters-kpatch.patch
- From: 5.15.0-82.91
- CVE-2023-3610, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: fix chain binding transaction logic
- CVE: https://ubuntu.com/security/CVE-2023-3610
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3610-patch-netfilter-nf-tables-fix-chain-binding-transaction-logic-78.85.patch
- From: 5.15.0-82.91
- CVE-2023-3610, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: fix chain binding transaction logic
- CVE: https://ubuntu.com/security/CVE-2023-3610
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3610-netfilter-nf_tables-fix-chain-binding-transaction-lo-kpatch.patch
- From: 5.15.0-82.91
- CVE-2023-3609, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: Fix reference counter leak leading to overflow
- CVE: https://ubuntu.com/security/CVE-2023-3609
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-3609-patch-net-sched-cls-u32-fix-reference-counter-leak-leading-to.patch
- From: 5.15.0-82.91
- CVE-2023-4015, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain
- CVE: https://ubuntu.com/security/CVE-2023-4015
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-4015-0001-netfilter-nf_tables-add-NFT_TRANS_PREPARE_ERROR-to-d-78.85.patch
- From: 5.15.0-82.91
- CVE-2023-4015, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: unbind non-anonymous set if rule construction fails
- CVE: https://ubuntu.com/security/CVE-2023-4015
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-4015-0002-netfilter-nf_tables-unbind-non-anonymous-set-if-rule.patch
- From: 5.15.0-82.91
- CVE-2023-4015, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
- CVE: https://ubuntu.com/security/CVE-2023-4015
- Patch: ubuntu-jammy/5.15.0-82.91/CVE-2023-4015-0003-netfilter-nf_tables-skip-immediate-deactivate-in-_PR.patch
- From: 5.15.0-82.91
- CVE-2022-40982, CVSSv2 Score:
- Description:
Complex adaptation required.
- Patch: skipped/CVE-2022-40982.patch
- From:
- CVE-2023-3212, CVSSv2 Score: 4.4
- Description:
gfs2: Don't deref jdesc in evict
- CVE: https://ubuntu.com/security/CVE-2023-3212
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-3212-patch-gfs2-don-t-deref-jdesc-in-evict.patch
- From: 5.15.0-83.92
- CVE-2023-21255, CVSSv2 Score: 7.8
- Description:
binder: fix UAF caused by faulty buffer cleanup
- CVE: https://ubuntu.com/security/CVE-2023-21255
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-21255-patch-binder-fix-uaf-caused-by-faulty-buffer-cleanup.patch
- From: 5.15.0-83.92
- CVE-2023-38426, CVSSv2 Score: 9.1
- Description:
ksmbd: fix global-out-of-bounds in smb2_find_context_vals
- CVE: https://ubuntu.com/security/CVE-2023-38426
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-38426-patch-ksmbd-fix-global-out-of-bounds-in-smb2-find-context-vals.patch
- From: 5.15.0-83.92
- CVE-2023-38428, CVSSv2 Score: 9.1
- Description:
ksmbd: fix wrong UserName check in session_user
- CVE: https://ubuntu.com/security/CVE-2023-38428
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-38428-patch-ksmbd-fix-wrong-username-check-in-session-user.patch
- From: 5.15.0-83.92
- CVE-2023-38429, CVSSv2 Score: 9.8
- Description:
ksmbd: allocate one more byte for implied bcc[0]
- CVE: https://ubuntu.com/security/CVE-2023-38429
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-38429-patch-ksmbd-allocate-one-more-byte-for-implied-bcc-0-2.patch
- From: 5.15.0-83.92
- CVE-2023-1192 CVE-2022-48425, CVSSv2 Score: 7.8
- Description:
fs/ntfs3: Validate MFT flags before replaying logs
- CVE: https://ubuntu.com/security/CVE-2023-1192
- CVE: https://ubuntu.com/security/CVE-2022-48425
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2022-48425-CVE-2023-1192-patch-fs-ntfs3-validate-mft-flags-before-replaying-logs.patch
- From: 5.15.0-83.92
- CVE-2023-34256, CVSSv2 Score: 5.5
- Description:
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
- CVE: https://ubuntu.com/security/CVE-2023-34256
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-34256-patch-ext4-avoid-a-potential-slab-out-of-bounds-in.patch
- From: 5.15.0-83.92
- CVE-2023-31084, CVSSv2 Score: 5.5
- Description:
media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
- CVE: https://ubuntu.com/security/CVE-2023-31084
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-31084-media-dvb-core-fix-kernel-WARNING-for-blocking-operation-in-wait_event.patch
- From: 5.15.0-83.92
- CVE-2023-2898, CVSSv2 Score: 4.7
- Description:
f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()
- CVE: https://ubuntu.com/security/CVE-2023-2898
- Patch: ubuntu-jammy/5.15.0-83.92/CVE-2023-2898-f2fs-fix-to-avoid-NULL-pointer-dereference-f2fs_write_end_io.patch
- From: 5.15.0-83.92
- CVE-2023-4569, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: deactivate catchall elements in next generation
- CVE: https://ubuntu.com/security/CVE-2023-4569
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-4569-0001-netfilter-nf_tables-deactivate-catchall-elements-in-.patch
- From: 5.15.0-84.93
- CVE-2023-40283, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
- CVE: https://ubuntu.com/security/CVE-2023-40283
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-40283-patch-bluetooth-l2cap-fix-use-after-free-in-l2cap-sock-ready-cb.patch
- From: 5.15.0-84.93
- CVE-2023-4207, CVSSv2 Score: 7.8
- Description:
net/sched: cls_route: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4207
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-patch-net-sched-cls-route-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.15.0-84.93
- CVE-2023-4128 CVE-2023-4207 CVE-2023-4206 CVE-2023-4208, CVSSv2 Score: 7.8
- Description:
net/sched: cls_fw: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4206
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-patch-net-sched-cls-fw-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.15.0-84.93
- CVE-2023-4208, CVSSv2 Score: 7.8
- Description:
net/sched: cls_u32: No longer copy tcf_result on update to avoid
- CVE: https://ubuntu.com/security/CVE-2023-4208
- Patch: ubuntu-jammy/5.15.0-84.93/CVE-2023-4128-CVE-2023-4206-CVE-2023-4207-CVE-2023-4208-patch-net-sched-cls-u32-no-longer-copy-tcf-result-on-update-to.patch
- From: 5.15.0-84.93
- CVE-2023-4194, CVSSv2 Score: 5.5
- Description:
net: tap_open(): set sk_uid from current_fsuid()
- CVE: https://ubuntu.com/security/CVE-2023-4194
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-4194-patch-net-tap-open-set-sk-uid-from-current-fsuid.patch
- From: 5.15.0-86.96
- CVE-2023-4194, CVSSv2 Score: 5.5
- Description:
net: tun_chr_open(): set sk_uid from current_fsuid()
- CVE: https://ubuntu.com/security/CVE-2023-4194
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-4194-patch-net-tun-chr-open-set-sk-uid-from-current-fsuid.patch
- From: 5.15.0-86.96
- CVE-2023-4155, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- Patch: skipped/CVE-2023-4155.patch
- From:
- CVE-2023-1206, CVSSv2 Score:
- Description:
This is a low priority CVE & the patch impacts many critical components of the networking subsystem & it requires multiple complex adaptations in those components to avoid losing existing connections on patch/unpatch.
- Patch: skipped/CVE-2023-1206.patch
- From:
- CVE-2023-44466, CVSSv2 Score: 8.8
- Description:
libceph: harden msgr2.1 frame segment length checks
- CVE: https://ubuntu.com/security/CVE-2023-44466
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-44466-patch-libceph-harden-msgr2-1-frame-segment-length-checks.patch
- From: 5.15.0-86.96
- CVE-2023-3866, CVSSv2 Score:
- Description:
ksmbd: validate session id and tree id in the compound request
- CVE: https://ubuntu.com/security/CVE-2023-3866
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-3866-patch-ksmbd-validate-session-id-and-tree-id-in-the-compound.patch
- From: 5.15.0-86.96
- CVE-2023-3338, CVSSv2 Score:
- Description:
The patch remove functionality.
- Patch: skipped/CVE-2023-3338.patch
- From:
- CVE-2023-4273, CVSSv2 Score: 6.7
- Description:
[PATCH] exfat: check if filename entries exceeds max filename length
- CVE: https://ubuntu.com/security/CVE-2023-4273
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-4273-patch-exfat-check-if-filename-entries-exceeds-max-filename-length.patch
- From: 5.15.0-86.96
- CVE-2023-3863, CVSSv2 Score: 4.1
- Description:
[PATCH] nfc: llcp: simplify llcp_sock_connect() error paths
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-3863-nfc-llcp-simplify-llcp_sock_connect-error-paths.patch
- From: 5.15.0-86.96
- CVE-2023-3863, CVSSv2 Score: 4.1
- Description:
[PATCH] net: nfc: Fix use-after-free caused by nfc_llcp_find_local
- CVE: https://ubuntu.com/security/CVE-2023-3863
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-3863-patch-net-nfc-fix-use-after-free-caused-by-nfc-llcp-find-local.patch
- From: 5.15.0-86.96
- CVE-2023-38432, CVSSv2 Score: 9.1
- Description:
ksmbd: use ksmbd_req_buf_next() in ksmbd_smb2_check_message()
- CVE: https://ubuntu.com/security/CVE-2023-38432
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-38432-ksmbd-use-ksmbd_req_buf_next-in-ksmbd_smb2_check_mes.patch
- From: 5.15.0-86.96
- CVE-2023-38432, CVSSv2 Score: 9.1
- Description:
ksmbd: validate command payload size
- CVE: https://ubuntu.com/security/CVE-2023-38432
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-38432-ksmbd-validate-command-payload-size.patch
- From: 5.15.0-86.96
- CVE-2023-3865, CVSSv2 Score: 4.3
- Description:
ksmbd: fix out-of-bound read in smb2_write
- CVE: https://ubuntu.com/security/CVE-2023-3865
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-3865-ksmbd-fix-out-of-bound-read-in-smb2_write.patch
- From: 5.15.0-86.96
- CVE-2023-4132, CVSSv2 Score: 5.5
- Description:
Smart Patch for drivers/media/usb/siano/smsusb.c
- CVE: https://ubuntu.com/security/CVE-2023-4132
- Patch: ubuntu-jammy/5.15.0-73.80/CVE-2023-4132-smart-backport-for-drivers-media-usb-siano-smsusb-c.patch
- From: 5.15.0-86.96
- CVE-2023-20569, CVSSv2 Score:
- Description:
A low priority AMD Inception vulnerability that affects Zen3/Zen4 & relates to RetBleed fixes requiring microcode updates, we can't do much about it in KCare Infra.
- Patch: skipped/CVE-2023-20569.patch
- From:
- CVE-2023-2156, CVSSv2 Score: 7.5
- Description:
ipv6: rpl: Fix Route of Death.
- CVE: https://ubuntu.com/security/CVE-2023-2156
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-2156-ipv6-rpl-Fix-Route-of-Death.patch
- From: 5.15.0-86.96
- CVE-2023-2156, CVSSv2 Score: 7.5
- Description:
net: rpl: fix rpl header size calculation
- CVE: https://ubuntu.com/security/CVE-2023-2156
- Patch: ubuntu-jammy/5.15.0-86.96/CVE-2023-2156-net-rpl-fix-rpl-header-size-calculation.patch
- From: 5.15.0-86.96
- CVE-2023-42755, CVSSv2 Score:
- Description:
The patch removes functionality.
- Patch: skipped/CVE-2023-42755.patch
- From:
- CVE-2023-4622, CVSSv2 Score: 7.0
- Description:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
- CVE: https://ubuntu.com/security/CVE-2023-4622
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4622-0001-af_unix-Fix-null-ptr-deref-in-unix_stream_sendpage.patch
- From: 5.15.0-87.97
- CVE-2023-4881, CVSSv2 Score: 7.1
- Description:
netfilter: nftables: exthdr: fix 4-byte stack OOB write
- CVE: https://ubuntu.com/security/CVE-2023-4881
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4881-0001-netfilter-nftables-exthdr-fix-4-byte-stack-OOB-write.patch
- From: 5.15.0-87.97
- CVE-2023-42752, CVSSv2 Score: 5.5
- Description:
igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU
- CVE: https://ubuntu.com/security/CVE-2023-42752
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-42752-0001-igmp-limit-igmpv3_newpack-packet-size-to-IP_MAX_MTU.patch
- From: 5.15.0-87.97
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue()
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4921-0001-net-sched-sch_qfq-Fix-UAF-in-qfq_dequeue.patch
- From: 5.15.0-87.97
- CVE-2023-4921, CVSSv2 Score: 7.8
- Description:
net: sched: sch_qfq: Fix UAF in qfq_dequeue() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-4921
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4921-patch-net-sched-sch-qfq-fix-uaf-in-qfq-dequeue-kpatch.patch
- From: 5.15.0-87.97
- CVE-2023-34319, CVSSv2 Score: 7.8
- Description:
xen/netback: Fix buffer overrun triggered by unusual packet
- CVE: https://ubuntu.com/security/CVE-2023-34319
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-34319-0001-xen-netback-Fix-buffer-overrun-triggered-by-unusual-78.85.patch
- From: 5.15.0-87.97
- CVE-2023-42753, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for
- CVE: https://ubuntu.com/security/CVE-2023-42753
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-42753-0001-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET.patch
- From: 5.15.0-87.97
- CVE-2023-4623, CVSSv2 Score: 7.8
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://ubuntu.com/security/CVE-2023-4623
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-4623-0001-net-sched-sch_hfsc-Ensure-inner-classes-have-fsc-cur.patch
- From: 5.15.0-87.97
- CVE-2023-5197, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: skip bound chain in netns release path
- CVE: https://ubuntu.com/security/CVE-2023-5197
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-5197-0001-netfilter-nf_tables-skip-bound-chain-in-netns-releas.patch
- From: 5.15.0-87.97
- CVE-2023-5197, CVSSv2 Score: 6.6
- Description:
netfilter: nf_tables: disallow rule removal from chain binding
- CVE: https://ubuntu.com/security/CVE-2023-5197
- Patch: ubuntu-jammy/5.15.0-87.97/CVE-2023-5197-0002-netfilter-nf_tables-disallow-rule-removal-from-chain-84.93.patch
- From: 5.15.0-87.97
- CVE-2023-4244, CVSSv2 Score:
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use netfilter functionality.
- Patch: skipped/CVE-2023-4244.patch
- From:
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in
- CVE: https://ubuntu.com/security/CVE-2023-31083
- Patch: ubuntu-jammy/5.15.0-88.98/CVE-2023-31083-patch-bluetooth-hci-ldisc-check-hci-uart-proto-ready-flag-in.patch
- From: 5.15.0-88.98
- CVE-2023-3772, CVSSv2 Score: 4.4
- Description:
xfrm: add NULL check in xfrm_update_ae_params
- CVE: https://ubuntu.com/security/CVE-2023-3772
- Patch: ubuntu-jammy/5.15.0-88.98/CVE-2023-3772-0001-xfrm-add-NULL-check-in-xfrm_update_ae_params.patch
- From: 5.15.0-88.98
- CVE-2023-31085, CVSSv2 Score: 5.5
- Description:
ubi: Refuse attaching if mtd's erasesize is 0
- CVE: https://ubuntu.com/security/CVE-2023-31085
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-31085-patch-ubi-refuse-attaching-if-mtd-s-erasesize-is-0.patch
- From: 5.15.0-89.99
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled
- CVE: https://ubuntu.com/security/CVE-2023-45871
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-45871-patch-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled.patch
- From: 5.15.0-89.99
- CVE-2023-45871, CVSSv2 Score: 9.8
- Description:
igb: set max size RX buffer when store bad packet is enabled (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2023-45871
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-45871-igb-set-max-size-rx-buffer-when-store-bad-packet-is-enabled-kpatch.patch
- From: 5.14.0-362.13.1.el9_3
- CVE-2023-25775, CVSSv2 Score: 9.8
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://ubuntu.com/security/CVE-2023-25775
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-25775-0001-RDMA-irdma-Prevent-zero-length-STAG-registration.patch
- From: 5.15.0-89.99
- CVE-2023-25775, CVSSv2 Score: 9.8
- Description:
RDMA/irdma: Prevent zero-length STAG registration (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-25775
- Patch: ubuntu-jammy/5.15.0-89.99/CVE-2023-25775-0001-RDMA-irdma-Prevent-zero-length-STAG-registration-kpatch.patch
- From: 5.15.0-89.99
- CVE-2023-39189, CVSSv2 Score: 6.0
- Description:
netfilter: nfnetlink_osf: avoid OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39189
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39189-patch-netfilter-nfnetlink-osf-avoid-oob-read.patch
- From: 5.15.0-91.101
- CVE-2023-39192, CVSSv2 Score: 6.0
- Description:
netfilter: xt_u32: validate user space input
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39192-patch-netfilter-xt-u32-validate-user-space-input.patch
- From: 5.15.0-91.101
- CVE-2023-39192, CVSSv2 Score: 6.0
- Description:
netfilter: xt_u32: validate user space input (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-39192
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39192-netfilter-xt-u32-validate-user-space-input-kpatch.patch
- From: 5.15.0-91.101
- CVE-2023-39193, CVSSv2 Score: 6.0
- Description:
netfilter: xt_sctp: validate the flag_info count
- CVE: https://ubuntu.com/security/CVE-2023-39193
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39193-patch-netfilter-xt-sctp-validate-the-flag-info-count.patch
- From: 5.15.0-91.101
- CVE-2023-5178, CVSSv2 Score: 8.8
- Description:
nvmet-tcp: Fix a possible UAF in queue intialization setup
- CVE: https://ubuntu.com/security/CVE-2023-5178
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-5178-patch-nvmet-tcp-fix-a-possible-uaf-in-queue-intialization-setup.patch
- From: 5.15.0-91.101
- CVE-2023-5158, CVSSv2 Score: 5.5
- Description:
vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()
- CVE: https://ubuntu.com/security/CVE-2023-5158
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-5158-patch-vringh-don-t-use-vringh-kiov-advance-in-vringh-iov-xfer.patch
- From: 5.15.0-91.101
- CVE-2023-42754, CVSSv2 Score: 5.5
- Description:
ipv4: fix null-deref in ipv4_link_failure
- CVE: https://ubuntu.com/security/CVE-2023-42754
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-42754-patch-ipv4-fix-null-deref-in-ipv4-link-failure.patch
- From: 5.15.0-91.101
- CVE-2023-39198, CVSSv2 Score: 6.4
- Description:
drm/qxl: fix UAF on handle creation
- CVE: https://ubuntu.com/security/CVE-2023-39198
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39198-patch-drm-qxl-fix-uaf-on-handle-creation.patch
- From: 5.15.0-91.101
- CVE-2023-3773, CVSSv2 Score: 4.4
- Description:
xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH
- CVE: https://ubuntu.com/security/CVE-2023-3773
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-3773-patch-xfrm-add-forgotten-nla-policy-for-xfrma-mtimer-thresh.patch
- From: 5.15.0-91.101
- CVE-2023-3773, CVSSv2 Score: 4.4
- Description:
xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH
- CVE: https://ubuntu.com/security/CVE-2023-3773
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-3773-patch-xfrm-add-forgotten-nla-policy-for-xfrma-mtimer-thresh-kpatch.patch
- From: 5.15.0-91.101
- CVE-2023-39194, CVSSv2 Score: 4.4
- Description:
net: xfrm: Fix xfrm_address_filter OOB read
- CVE: https://ubuntu.com/security/CVE-2023-39194
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-39194-patch-net-xfrm-fix-xfrm-address-filter-oob-read.patch
- From: 5.15.0-91.101
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Unite old scheme and new scheme descriptor reads (dependency)
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-37453-02-patch-usb-core-unite-old-scheme-and-new-scheme-descriptor-reads.patch
- From: 5.15.0-91.101
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Change usb_get_device_descriptor() API (dependency)
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-37453-01-patch-usb-core-change-usb-get-device-descriptor-api.patch
- From: 5.15.0-91.101
- CVE-2023-37453, CVSSv2 Score: 4.6
- Description:
USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()
- CVE: https://ubuntu.com/security/CVE-2023-37453
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-37453-patch-usb-core-fix-race-by-not-overwriting-udev-descriptor-in.patch
- From: 5.15.0-91.101
- CVE-2023-6040, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: Reject tables of unsupported family
- CVE: https://ubuntu.com/security/CVE-2023-6040
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-6040-netfilter-nf_tables-Reject-tables-of-unsupported-fam.patch
- From: 5.15.0-92.102
- CVE-2023-6606, CVSSv2 Score: 7.1
- Description:
smb: client: fix OOB in smbCalcSize()
- CVE: https://ubuntu.com/security/CVE-2023-6606
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-6606-smb-client-fix-OOB-in-smbCalcSize.patch
- From: 5.15.0-92.102
- CVE-2023-6931, CVSSv2 Score: 7.8
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://ubuntu.com/security/CVE-2023-6931
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-6931-perf-Fix-perf_event_validate_size.patch
- From: 5.15.0-92.102
- CVE-2023-6931, CVSSv2 Score: 7.8
- Description:
perf: Fix perf_event_validate_size() lockdep splat
- CVE: https://ubuntu.com/security/CVE-2023-6931
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-6931-perf-Fix-perf_event_validate_size-lockdep-splat.patch
- From: 5.15.0-92.102
- CVE-2023-6932, CVSSv2 Score: 7.0
- Description:
ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
- CVE: https://ubuntu.com/security/CVE-2023-6932
- Patch: ubuntu-jammy/5.15.0-91.101/CVE-2023-6932-ipv4-igmp-fix-refcnt-uaf-issue-when-receiving-igmp-q.patch
- From: 5.15.0-92.102
- CVE-2023-6039, CVSSv2 Score:
- Description:
Complex adaptation required, low impact CVE.
- Patch: skipped/CVE-2023-6039.patch
- From:
- CVE-2024-0641, CVSSv2 Score: 5.5
- Description:
tipc: fix a potential deadlock on &tx->lock
- CVE: https://ubuntu.com/security/CVE-2024-0641
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2024-0641-tipc-fix-a-potential-deadlock-on-tx-lock.patch
- From: 5.15.0-94.104
- CVE-2023-34324, CVSSv2 Score: 4.9
- Description:
xen/events: replace evtchn_rwlock with RCU
- CVE: https://ubuntu.com/security/CVE-2023-34324
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-34324-xen-events-replace-evtchn_rwlock-with-RCU-kpatch.patch
- From: 5.15.0-94.104
- CVE-2023-6176, CVSSv2 Score: 4.7
- Description:
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
- CVE: https://ubuntu.com/security/CVE-2023-6176
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-6176-net-tls-do-not-free-tls-rec-on-async-operation-in-bpf_exec_tx_verdict.patch
- From: 5.15.0-94.104
- CVE-2023-6622, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: bail out on mismatching dynset and set expressions
- CVE: https://ubuntu.com/security/CVE-2023-6622
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-6622-netfilter-nf-tables-bail-out-on-mismatching-dynset-and-set-expressions.patch
- From: 5.15.0-94.104
- CVE-2023-32257 CVE-2023-32250 CVE-2023-32252, CVSSv2 Score: 7.5
- Description:
ksmbd: fix racy issue from session setup and logoff
- CVE: https://ubuntu.com/security/CVE-2023-32257
- CVE: https://ubuntu.com/security/CVE-2023-32250
- CVE: https://ubuntu.com/security/CVE-2023-32252
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-32250-ksmbd-fix-racy-issue-from-session-setup-and-logoff-68-78.patch
- From: 5.15.0-94.104
- CVE-2023-32250, CVSSv2 Score: 9.0
- Description:
ksmbd: fix racy issue from session setup and logoff (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-32250
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-32250-ksmbd-fix-racy-issue-from-session-setup-and-logoff-kpatch-pre83.patch
- From: 5.15.0-94.104
- CVE-2023-35827, CVSSv2 Score: 7.0
- Description:
ravb: Fix use-after-free issue in ravb_tx_timeout_work()
- CVE: https://ubuntu.com/security/CVE-2023-35827
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-35827-ravb-fix-use-after-free-issue-in-ravb-tx-timeout-work.patch
- From: 5.15.0-94.104
- CVE-2023-46813, CVSSv2 Score: 7.0
- Description:
x86/sev: Check for user-space IOIO pointing to kernel space
- CVE: https://ubuntu.com/security/CVE-2023-46813
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-46813-x86-sev-check-for-user-space-ioio-pointing-to-kernel-space.patch
- From: 5.15.0-94.104
- CVE-2023-46813, CVSSv2 Score: 7.0
- Description:
x86/sev: Check IOBM for IOIO exceptions from user-space
- CVE: https://ubuntu.com/security/CVE-2023-46813
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-46813-x86-sev-check-iobm-for-ioio-exceptions-from-user-space.patch
- From: 5.15.0-94.104
- CVE-2023-46813, CVSSv2 Score: 7.0
- Description:
x86/sev: Disable MMIO emulation from user mode
- CVE: https://ubuntu.com/security/CVE-2023-46813
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-46813-x86-sev-disable-mmio-emulation-from-user-mode.patch
- From: 5.15.0-94.104
- CVE-2023-52502, CVSSv2 Score: 7.1
- Description:
net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()
- CVE: https://ubuntu.com/security/CVE-2023-52502
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-52502-net-nfc-fix-races-in-nfc_llcp_sock_get-and-nfc_llcp_sock_get_sn.patch
- From: 5.15.0-94.104
- CVE-2023-52507, CVSSv2 Score: 7.1
- Description:
nfc: nci: assert requested protocol is valid
- CVE: https://ubuntu.com/security/CVE-2023-52507
- Patch: ubuntu-jammy/5.15.0-94.104/CVE-2023-52507-nfc-nci-assert-requested-protocol-is-valid.patch
- From: 5.15.0-94.104
- CVE-2024-0565, CVSSv2 Score: 7.4
- Description:
smb: client: fix OOB in receive_encrypted_standard()
- CVE: https://ubuntu.com/security/CVE-2024-0565
- Patch: ubuntu-jammy/5.15.0-97.107/CVE-2024-0565-patch-smb-client-fix-oob-in-receive-encrypted-standard.patch
- From: 5.15.0-97.107
- CVE-2024-0646, CVSSv2 Score: 7.8
- Description:
net: tls, update curr on splice as well
- CVE: https://ubuntu.com/security/CVE-2024-0646
- Patch: ubuntu-jammy/5.15.0-97.107/CVE-2024-0646-patch-net-tls-update-curr-on-splice-as-well.patch
- From: 5.15.0-97.107
- CVE-2023-6915, CVSSv2 Score: 5.5
- Description:
ida: Fix crash in ida_free when the bitmap is empty
- CVE: https://ubuntu.com/security/CVE-2023-6915
- Patch: ubuntu-jammy/5.15.0-97.107/CVE-2023-6915-patch-ida-fix-crash-in-ida-free-when-the-bitmap-is-empty.patch
- From: 5.15.0-97.107
- CVE-2023-51780, CVSSv2 Score: 7.0
- Description:
atm: Fix Use-After-Free in do_vcc_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51780
- Patch: ubuntu-jammy/5.15.0-97.107/CVE-2023-51780-patch-atm-fix-use-after-free-in-do-vcc-ioctl.patch
- From: 5.15.0-97.107
- CVE-2023-51781, CVSSv2 Score: 7.0
- Description:
appletalk: Fix Use-After-Free in atalk_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51781
- Patch: ubuntu-jammy/5.15.0-97.107/CVE-2023-51781-patch-appletalk-fix-use-after-free-in-atalk-ioctl.patch
- From: 5.15.0-97.107
- CVE-2023-4134, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- Patch: skipped/CVE-2023-4134.patch
- From:
- CVE-2023-22995, CVSSv2 Score: 7.8
- Description:
usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core
- CVE: https://ubuntu.com/security/CVE-2023-22995
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-22995-patch-usb-dwc3-dwc3-qcom-add-missing-platform-device-put-in.patch
- From: 5.15.0-100.110
- CVE-2023-51779, CVSSv2 Score: 7.0
- Description:
Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg
- CVE: https://ubuntu.com/security/CVE-2023-51779
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-51779-patch-bluetooth-af-bluetooth-fix-use-after-free-in.patch
- From: 5.15.0-100.110
- CVE-2023-51782, CVSSv2 Score: 7.0
- Description:
net/rose: Fix Use-After-Free in rose_ioctl
- CVE: https://ubuntu.com/security/CVE-2023-51782
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-51782-patch-net-rose-fix-use-after-free-in-rose-ioctl.patch
- From: 5.15.0-100.110
- CVE-2023-46343, CVSSv2 Score: 5.5
- Description:
nfc: nci: fix possible NULL pointer dereference in send_acknowledge()
- CVE: https://ubuntu.com/security/CVE-2023-46343
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-46343-patch-nfc-nci-fix-possible-null-pointer-dereference-in.patch
- From: 5.15.0-100.110
- CVE-2023-46862, CVSSv2 Score: 4.7
- Description:
io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid
- CVE: https://ubuntu.com/security/CVE-2023-46862
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-46862-patch-io-uring-fdinfo-lock-sq-thread-while-retrieving-thread.patch
- From: 5.15.0-100.110
- CVE-2024-0607, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()
- CVE: https://ubuntu.com/security/CVE-2024-0607
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2024-0607-patch-netfilter-nf-tables-fix-pointer-math-issue-in.patch
- From: 5.15.0-100.110
- CVE-2023-6121, CVSSv2 Score: 4.3
- Description:
nvmet: nul-terminate the NQNs passed in the connect command
- CVE: https://ubuntu.com/security/CVE-2023-6121
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-6121-patch-nvmet-nul-terminate-the-nqns-passed-in-the-connect-command.patch
- From: 5.15.0-100.110
- CVE-2024-0340, CVSSv2 Score: 5.5
- Description:
vhost: use kzalloc() instead of kmalloc() followed by memset()
- CVE: https://ubuntu.com/security/CVE-2024-0340
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2024-0340-patch-vhost-use-kzalloc-instead-of-kmalloc-followed-by.patch
- From: 5.15.0-100.110
- CVE-2023-52483, CVSSv2 Score: 7.8
- Description:
mctp: perform route lookups under a RCU read-side lock
- CVE: https://ubuntu.com/security/CVE-2023-52483
- Patch: ubuntu-jammy/5.15.0-100.110/CVE-2023-52483-mctp-perform-route-lookups-under-a-RCU-read-side-lock.patch
- From: 5.15.0-100.110
- CVE-2024-1085, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: check if catch-all set element is active in next generation
- CVE: https://ubuntu.com/security/CVE-2024-1085
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2024-1085-patch-netfilter-nf-tables-check-if-catch-all-set-element-is_86.96_and_older.patch
- From: 5.15.0-101.111
- CVE-2024-1086, CVSSv2 Score: 7.8
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://ubuntu.com/security/CVE-2024-1086
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2024-1086-patch-netfilter-nf-tables-reject-queue-drop-verdict-parameters_89.99_and_older.patch
- From: 5.15.0-101.111
- CVE-2023-23000, CVSSv2 Score: 5.5
- Description:
phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function
- CVE: https://ubuntu.com/security/CVE-2023-23000
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2023-23000-patch-phy-tegra-xusb-fix-return-value-of.patch
- From: 5.15.0-101.111
- CVE-2024-24855, CVSSv2 Score: 5.0
- Description:
scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()
- CVE: https://ubuntu.com/security/CVE-2024-24855
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2024-24855-patch-scsi-lpfc-fix-a-possible-data-race-in.patch
- From: 5.15.0-101.111
- CVE-2023-32247, CVSSv2 Score: 7.5
- Description:
ksmbd: destroy expired sessions
- CVE: https://ubuntu.com/security/CVE-2023-32247
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2023-32247-patch-ksmbd-destroy-expired-sessions.patch
- From: 5.15.0-101.111
- CVE-2023-32247, CVSSv2 Score: 7.5
- Description:
ksmbd: destroy expired sessions
- CVE: https://ubuntu.com/security/CVE-2023-32247
- Patch: ubuntu-jammy/5.15.0-101.111/CVE-2023-32247-patch-ksmbd-destroy-expired-sessions-kpatch.patch
- From: 5.15.0-101.111
- CVE-2023-52439, CVSSv2 Score: 7.8
- Description:
uio: Fix use-after-free in uio_open
- CVE: https://ubuntu.com/security/CVE-2023-52439
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52439-uio-Fix-use-after-free-in-uio_open.patch
- From: 5.15.0-102.112
- CVE-2023-52438, CVSSv2 Score: 7.8
- Description:
binder: fix use-after-free in shinker's callback
- CVE: https://ubuntu.com/security/CVE-2023-52438
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52438-binder-fix-use-after-free-in-shinker-s-callback.patch
- From: 5.15.0-102.112
- CVE-2023-52444, CVSSv2 Score: 7.8
- Description:
f2fs: fix to avoid dirent corruption
- CVE: https://ubuntu.com/security/CVE-2023-52444
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52444-patch-f2fs-fix-to-avoid-dirent-corruption.patch
- From: 5.15.0-102.112
- CVE-2023-52436, CVSSv2 Score: 7.8
- Description:
f2fs: explicitly null-terminate the xattr list
- CVE: https://ubuntu.com/security/CVE-2023-52436
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52436-f2fs-explicitly-null-terminate-the-xattr-list.patch
- From: 5.15.0-102.112
- CVE-2023-52449, CVSSv2 Score: 5.5
- Description:
mtd: Fix gluebi NULL pointer dereference caused by ftl notifier
- CVE: https://ubuntu.com/security/CVE-2023-52449
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52449-mtd-Fix-gluebi-NULL-pointer-dereference-caused-by-ftl-notifier.patch
- From: 5.15.0-102.112
- CVE-2023-52458, CVSSv2 Score: 5.5
- Description:
block: add check that partition length needs to be aligned with block size
- CVE: https://ubuntu.com/security/CVE-2023-52458
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52458-block-add-check-that-partition-length-needs-to-be-aligned-with-block-size.patch
- From: 5.15.0-102.112
- CVE-2023-52464, CVSSv2 Score: 7.8
- Description:
EDAC/thunderx: Fix possible out-of-bounds string access
- CVE: https://ubuntu.com/security/CVE-2023-52464
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52464-EDAC-thunderx-Fix-possible-out-of-bounds-string-access.patch
- From: 5.15.0-102.112
- CVE-2023-52469, CVSSv2 Score: 7.8
- Description:
drivers/amd/pm: fix a use-after-free in kv_parse_power_table
- CVE: https://ubuntu.com/security/CVE-2023-52469
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52469-drivers-amd-pm-fix-a-use-after-free-in-kv_parse_power_table.patch
- From: 5.15.0-102.112
- CVE-2024-23850, CVSSv2 Score: 5.5
- Description:
btrfs: do not ASSERT() if the newly created subvolume already got read
- CVE: https://ubuntu.com/security/CVE-2024-23850
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-23850-btrfs-do-not-assert-if-the-newly-created-subvolume-already-got-read.patch
- From: 5.15.0-102.112
- CVE-2024-24860, CVSSv2 Score: 5.3
- Description:
Bluetooth: Fix atomicity violation in {min,max}_key_size_set
- CVE: https://ubuntu.com/security/CVE-2024-24860
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-24860-bluetooth-fix-atomicity-violation-in-min-max-key-size-set.patch
- From: 5.15.0-102.112
- CVE-2024-26591, CVSSv2 Score: 5.5
- Description:
bpf: Fix re-attachment branch in bpf_tracing_prog_attach
- CVE: https://ubuntu.com/security/CVE-2024-26591
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26591-bpf-fix-re-attachment-branch-in-bpf-tracing-prog-attach.patch
- From: 5.15.0-102.112
- CVE-2023-32254, CVSSv2 Score: 9.8
- Description:
ksmbd: fix racy issue under cocurrent smb2 tree disconnect
- CVE: https://ubuntu.com/security/CVE-2023-32254
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-32254-patch-ksmbd-fix-racy-issue-under-cocurrent-smb2-tree-disconnect-82.91.patch
- From: 5.15.0-102.112
- CVE-2023-32254, CVSSv2 Score: 9.8
- Description:
ksmbd: fix racy issue under cocurrent smb2 tree disconnect (adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-32254
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-32254-patch-ksmbd-fix-racy-issue-under-cocurrent-smb2-tree-disconnect-kpatch-82.91.patch
- From: 5.15.0-102.112
- CVE-2023-38427, CVSSv2 Score: 9.8
- Description:
ksmbd: fix out-of-bound read in deassemble_neg_contexts()
- CVE: https://ubuntu.com/security/CVE-2023-38427
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-38427-patch-ksmbd-fix-out-of-bound-read-in-deassemble-neg-contexts.patch
- From: 5.15.0-102.112
- CVE-2023-1194, CVSSv2 Score: 8.1
- Description:
ksmbd: fix out-of-bound read in parse_lease_state()
- CVE: https://ubuntu.com/security/CVE-2023-1194
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-1194-patch-ksmbd-fix-out-of-bound-read-in-parse-lease-state.patch
- From: 5.15.0-102.112
- CVE-2023-52441, CVSSv2 Score: 7.8
- Description:
ksmbd: fix out of bounds in init_smb2_rsp_hdr()
- CVE: https://ubuntu.com/security/CVE-2023-52441
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52441-ksmbd-fix-out-of-bounds-in-init_smb2_rsp_hdr.patch
- From: 5.15.0-102.112
- CVE-2023-52445, CVSSv2 Score: 7.8
- Description:
media: pvrusb2: fix use after free on context disconnection
- CVE: https://ubuntu.com/security/CVE-2023-52445
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52445-media-pvrusb2-fix-use-after-free-on-context-disconnection.patch
- From: 5.15.0-102.112
- CVE-2024-22705, CVSSv2 Score: 7.8
- Description:
ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()
- CVE: https://ubuntu.com/security/CVE-2024-22705
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-22705-patch-ksmbd-fix-slab-out-of-bounds-in-smb-strndup-from-utf16.patch
- From: 5.15.0-102.112
- CVE-2023-52451, CVSSv2 Score: 7.8
- Description:
powerpc/pseries/memhp: Fix access beyond end of drmem array
- CVE: https://ubuntu.com/security/CVE-2023-52451
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52451-patch-powerpc-pseries-memhp-fix-access-beyond-end-of-drmem-array.patch
- From: 5.15.0-102.112
- CVE-2024-26586, CVSSv2 Score: 7.8
- Description:
mlxsw: spectrum_acl_tcam: Fix stack corruption
- CVE: https://ubuntu.com/security/CVE-2024-26586
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26586-mlxsw-spectrum_acl_tcam-fix-stack-corruption.patch
- From: 5.15.0-102.112
- CVE-2024-26589, CVSSv2 Score: 7.8
- Description:
bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS
- CVE: https://ubuntu.com/security/CVE-2024-26589
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26589-patch-bpf-reject-variable-offset-alu-on-ptr-to-flow-keys.patch
- From: 5.15.0-102.112
- CVE-2023-46838, CVSSv2 Score: 7.5
- Description:
xen-netback: don't produce zero-size SKB frags
- CVE: https://ubuntu.com/security/CVE-2023-46838
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-46838-patch-xen-netback-don-t-produce-zero-size-skb-frags.patch
- From: 5.15.0-102.112
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://ubuntu.com/security/CVE-2023-52340
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52340-patch-ipv6-remove-max-size-check-inline-with-ipv4.patch
- From: 5.15.0-102.112
- CVE-2023-52340, CVSSv2 Score: 6.5
- Description:
ipv6: remove max_size check inline with ipv4
- CVE: https://ubuntu.com/security/CVE-2023-52340
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52340-fix-decnet-function-declaration.patch
- From: 5.4.0-176.196
- CVE-2024-23851, CVSSv2 Score: 5.5
- Description:
dm ioctl: log an error if the ioctl structure is corrupted
- CVE: https://ubuntu.com/security/CVE-2024-23851
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-23851-patch-dm-ioctl-log-an-error-if-the-ioctl-structure-is-corrupted.patch
- From: 5.15.0-102.112
- CVE-2023-52429 CVE-2024-23851, CVSSv2 Score: 5.5
- Description:
dm: limit the number of targets and parameter size area
- CVE: https://ubuntu.com/security/CVE-2023-52429
- CVE: https://ubuntu.com/security/CVE-2024-23851
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52429-CVE-2024-23851-patch-dm-limit-the-number-of-targets-and-parameter-size-area.patch
- From: 5.15.0-102.112
- CVE-2023-52443, CVSSv2 Score: 5.5
- Description:
apparmor: avoid crash when parsed profile name is empty
- CVE: https://ubuntu.com/security/CVE-2023-52443
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52443-apparmor-avoid-crash-when-parsed-profile-name-is-empty.patch
- From: 5.15.0-102.112
- CVE-2023-52448, CVSSv2 Score: 5.5
- Description:
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
- CVE: https://ubuntu.com/security/CVE-2023-52448
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52448-gfs2-fix-kernel-NULL-pointer-dereference-in-gfs2_rgrp_dump.patch
- From: 5.15.0-102.112
- CVE-2023-3867, CVSSv2 Score: 7.2
- Description:
binder: ksmbd: add missing compound request handing in some commands
- CVE: https://ubuntu.com/security/CVE-2023-3867
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-3867-ksmbd-add-missing-compound-request-handing.patch
- From: 5.15.0-102.112
- CVE-2024-26597, CVSSv2 Score: 7.1
- Description:
net: qualcomm: rmnet: fix global oob in rmnet_policy
- CVE: https://ubuntu.com/security/CVE-2024-26597
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26597-net-qualcomm-rmnet-fix-global-oob-in-rmnet_policy.patch
- From: 5.15.0-102.112
- CVE-2024-26597, CVSSv2 Score: N/A
- Description:
net: qualcomm: rmnet: fix global oob in rmnet_policy
- CVE: https://ubuntu.com/security/CVE-2024-26597
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26597-net-qualcomm-rmnet-fix-global-oob-in-rmnet_policy-kpatch.patch
- From: 5.15.0-102.112
- CVE-2024-26598, CVSSv2 Score: 7.8
- Description:
KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache
- CVE: https://ubuntu.com/security/CVE-2024-26598
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26598-kvm-arm64-vgic-its-avoid-potential-uaf.patch
- From: 5.15.0-102.112
- CVE-2024-26631, CVSSv2 Score: 5.5
- Description:
ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
- CVE: https://ubuntu.com/security/CVE-2024-26631
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26631-ipv6-mcast-fix-data-race-in-ipv6_mc_down.patch
- From: 5.15.0-102.112
- CVE-2024-26633, CVSSv2 Score: 5.5
- Description:
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
- CVE: https://ubuntu.com/security/CVE-2024-26633
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2024-26633-ip6_tunnel-fix-NEXTHDR_FRAGMENT-handling-in-ip6_tnl_parse_tlv_enc_lim.patch
- From: 5.15.0-102.112
- CVE-2023-52442, CVSSv2 Score: N/A
- Description:
ksmdb: use cmd helper variable in smb2_get_ksmbd_tcon()
- CVE: https://ubuntu.com/security/CVE-2023-52442
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52442-1-ksmdb-use-cmd-helper-variable-in-smb2_get_ksmbd_tcon.patch
- From: 5.15.0-102.112
- CVE-2023-52442, CVSSv2 Score: N/A
- Description:
ksmbd: validate session id and tree id in compound request
- CVE: https://ubuntu.com/security/CVE-2023-52442
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52442-2-ksmbd-validate-session-id-and-tree-id-in-compound-re.patch
- From: 5.15.0-102.112
- CVE-2023-52456, CVSSv2 Score: 5.5
- Description:
serial: imx: fix tx statemachine deadlock
- CVE: https://ubuntu.com/security/CVE-2023-52456
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52456-serial-imx-fix-tx-statemachine-deadlock.patch
- From: 5.15.0-102.112
- CVE-2023-52457, CVSSv2 Score: 7.8
- Description:
serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed
- CVE: https://ubuntu.com/security/CVE-2023-52457
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52457-serial-8250-omap-Don-t-skip-resource-freeing-if-pm_r-107.patch
- From: 5.15.0-102.112
- CVE-2023-52454, CVSSv2 Score: 5.5
- Description:
nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length
- CVE: https://ubuntu.com/security/CVE-2023-52454
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52454-1-nvmet-tcp-Fix-a-kernel-panic-when-host-sends-an-inva.patch
- From: 5.15.0-102.112
- CVE-2023-52454, CVSSv2 Score: 5.5
- Description:
nvmet-tcp: Fix the H2C expected PDU len calculation
- CVE: https://ubuntu.com/security/CVE-2023-52454
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52454-2-nvmet-tcp-Fix-the-H2C-expected-PDU-len-calculation.patch
- From: 5.15.0-102.112
- CVE-2023-6536, CVSSv2 Score: 7.5
- Description:
nvmet-tcp: fix a crash in nvmet_req_complete()
- CVE: https://ubuntu.com/security/CVE-2023-6536
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-6536-nvmet-tcp-fix-a-crash-in-nvmet_req_complete.patch
- From: 5.15.0-102.112
- CVE-2023-52462, CVSSv2 Score: 5.5
- Description:
bpf: fix check for attempt to corrupt spilled pointer
- CVE: https://ubuntu.com/security/CVE-2023-52462
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52462-bpf-fix-check-for-attempt-to-corrupt-spilled-pointer.patch
- From: 5.15.0-102.112
- CVE-2023-52463, CVSSv2 Score:
- Description:
Complex adaptation required. Issue can be reproduced with special UEFI implementation only.
- Patch: skipped/CVE-2023-52463.patch
- From:
- CVE-2023-52467, CVSSv2 Score: 5.5
- Description:
mfd: syscon: Fix null pointer dereference in of_syscon_register()
- CVE: https://ubuntu.com/security/CVE-2023-52467
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52467-mfd-syscon-Fix-null-pointer-dereference-in-of_syscon.patch
- From: 5.15.0-102.112
- CVE-2023-52467, CVSSv2 Score: 5.5
- Description:
drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()
- CVE: https://ubuntu.com/security/CVE-2023-52467
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52470-drm-radeon-check-the-alloc_workqueue-return-value-in.patch
- From: 5.15.0-102.112
- CVE-2023-52480, CVSSv2 Score:
- Description:
Complex adaptation required.
- Patch: skipped/CVE-2023-52480.patch
- From:
- CVE-2023-52609, CVSSv2 Score: 4.1
- Description:
binder: fix UAF of alloc->vma in race with munmap()
- CVE: https://ubuntu.com/security/CVE-2023-52609
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52609-binder-fix-UAF-of-alloc-vma-in-race-with-munmap.patch
- From: kernel-5.15.0-83.92
- CVE-2023-52609, CVSSv2 Score: 4.1
- Description:
binder: fix race between mmput() and do_exit()
- CVE: https://ubuntu.com/security/CVE-2023-52609
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52609-binder-fix-race-between-mmput-and-do_exit.patch
- From: 5.15.0-102.112
- CVE-2023-52610, CVSSv2 Score: 6.4
- Description:
net/sched: act_ct: fix skb leak and crash on ooo frags
- CVE: https://ubuntu.com/security/CVE-2023-52610
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52610-net-sched-act_ct-fix-skb-leak-and-crash-on-ooo-frags.patch
- From: 5.15.0-102.112
- CVE-2023-52612, CVSSv2 Score: 6
- Description:
crypto: scomp - fix req->dst buffer overflow
- CVE: https://ubuntu.com/security/CVE-2023-52612
- Patch: ubuntu-jammy/5.15.0-102.112/CVE-2023-52612-crypto-scomp-fix-req-dst-buffer-overflow.patch
- From: 5.15.0-102.112
- CVE-2023-52603, CVSSv2 Score: 7.1
- Description:
UBSAN: array-index-out-of-bounds in dtSplitRoot
- CVE: https://ubuntu.com/security/CVE-2023-52603
- Patch: ubuntu-jammy/5.15.0-105.115/CVE-2023-52603-ubsan-array-index-out-of-bounds-in-dtsplitroot.patch
- From: 5.15.0-105.115
- CVE-2023-52600, CVSSv2 Score: 7.8
- Description:
jfs: fix uaf in jfs_evict_inode
- CVE: https://ubuntu.com/security/CVE-2023-52600
- Patch: ubuntu-jammy/5.15.0-105.115/CVE-2023-52600-jfs-fix-uaf-in-jfs-evict-inode.patch
- From: 5.15.0-105.115
- CVE-2023-24023, CVSSv2 Score: 6.8
- Description:
Bluetooth: Add more enc key size check
- CVE: https://ubuntu.com/security/CVE-2023-24023
- Patch: ubuntu-jammy/5.15.0-105.115/CVE-2023-24023-bluetooth-add-more-enc-key-size-check.patch
- From: 5.4.0-177.197
- CVE-2024-26592, CVSSv2 Score: 7.8
- Description:
ksmbd: fix UAF issue in ksmbd_tcp_new_connection()
- CVE: https://ubuntu.com/security/CVE-2024-26592
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26592-ksmbd-fix-uaf-issue-in-ksmbd-tcp-new-connection-5.15.0-92.102.patch
- From: 5.15.0-106.116
- CVE-2024-26592, CVSSv2 Score: 7.8
- Description:
ksmbd: fix UAF issue in ksmbd_tcp_new_connection() (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26592
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26592-ksmbd-fix-uaf-issue-in-ksmbd-tcp-new-connection-kpatch.patch
- From: 5.15.0-106.116
- CVE-2023-52604, CVSSv2 Score: 7.8
- Description:
FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2023-52604
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52604-fs-jfs-ubsan-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-106.116
- CVE-2023-52599, CVSSv2 Score: 7.1
- Description:
jfs: fix array-index-out-of-bounds in diNewExt
- CVE: https://ubuntu.com/security/CVE-2023-52599
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52599-jfs-fix-array-index-out-of-bounds-in-dinewext.patch
- From: 5.15.0-106.116
- CVE-2023-52597, CVSSv2 Score: 7.1
- Description:
KVM: s390: fix setting of fpc register
- CVE: https://ubuntu.com/security/CVE-2023-52597
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52597-kvm-s390-fix-setting-of-fpc-register.patch
- From: 5.15.0-106.116
- CVE-2023-52588, CVSSv2 Score: 7.1
- Description:
f2fs: fix to tag gcing flag on page during block migration
- CVE: https://ubuntu.com/security/CVE-2023-52588
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52588-f2fs-fix-to-tag-gcing-flag-on-page-during-block-migration.patch
- From: 5.15.0-106.116
- CVE-2024-26625, CVSSv2 Score: 7.8
- Description:
llc: call sock_orphan() at release time
- CVE: https://ubuntu.com/security/CVE-2024-26625
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26625-llc-call-sock-orphan-at-release-time.patch
- From: 5.15.0-106.116
- CVE-2023-52606, CVSSv2 Score: 7.1
- Description:
powerpc/lib: Validate size for vector operations
- CVE: https://ubuntu.com/security/CVE-2023-52606
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52606-powerpc-lib-validate-size-for-vector-operations.patch
- From: 5.15.0-106.116
- CVE-2023-52601, CVSSv2 Score: 7.1
- Description:
jfs: fix array-index-out-of-bounds in dbAdjTree
- CVE: https://ubuntu.com/security/CVE-2023-52601
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52601-jfs-fix-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.15.0-106.116
- CVE-2024-26593, CVSSv2 Score: 7.1
- Description:
i2c: i801: Fix block process call transactions
- CVE: https://ubuntu.com/security/CVE-2024-26593
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26593-i2c-i801-fix-block-process-call-transactions.patch
- From: 5.15.0-106.116
- CVE-2024-26608, CVSSv2 Score: 7.1
- Description:
ksmbd: fix global oob in ksmbd_nl_policy
- CVE: https://ubuntu.com/security/CVE-2024-26608
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26608-ksmbd-fix-global-oob-in-ksmbd-nl-policy.patch
- From: 5.15.0-106.116
- CVE-2024-26608, CVSSv2 Score: 7.1
- Description:
ksmbd: fix global oob in ksmbd_nl_policy (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26608
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26608-ksmbd-fix-global-oob-in-ksmbd-nl-policy-kpatch.patch
- From: 5.15.0-106.116
- CVE-2024-26641, CVSSv2 Score: 5.5
- Description:
ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
- CVE: https://ubuntu.com/security/CVE-2024-26641
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26641-ip6-tunnel-make-sure-to-pull-inner-header-in-ip6-tnl-rcv.patch
- From: 5.15.0-106.116
- CVE-2024-26660, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Implement bounds check for stream encoder
- CVE: https://ubuntu.com/security/CVE-2024-26660
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26660-drm-amd-display-implement-bounds-check-for-stream-encoder.patch
- From: 5.15.0-106.116
- CVE-2024-26615, CVSSv2 Score: 5.5
- Description:
net/smc: fix illegal rmb_desc access in SMC-D connection dump
- CVE: https://ubuntu.com/security/CVE-2024-26615
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26615-net-smc-fix-illegal-rmb-desc-access-in-smc-d-connection-dump.patch
- From: 5.15.0-106.116
- CVE-2024-26636, CVSSv2 Score: 5.5
- Description:
llc: make llc_ui_sendmsg() more robust against bonding
- CVE: https://ubuntu.com/security/CVE-2024-26636
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26636-llc-make-llc-ui-sendmsg-more-robust-against-bonding.patch
- From: 5.15.0-106.116
- CVE-2024-26644, CVSSv2 Score: 5.5
- Description:
btrfs: don't abort filesystem when attempting to snapshot
- CVE: https://ubuntu.com/security/CVE-2024-26644
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26644-btrfs-don-t-abort-filesystem-when-attempting-to-snapshot.patch
- From: 5.15.0-106.116
- CVE-2024-26627, CVSSv2 Score: 5.5
- Description:
scsi: core: Move scsi_host_busy() out of host lock for waking
- CVE: https://ubuntu.com/security/CVE-2024-26627
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26627-scsi-core-move-scsi-host-busy-out-of-host-lock-for-waking.patch
- From: 5.15.0-106.116
- CVE-2024-26640, CVSSv2 Score: 5.5
- Description:
tcp: add sanity checks to rx zerocopy
- CVE: https://ubuntu.com/security/CVE-2024-26640
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26640-tcp-add-sanity-checks-to-rx-zerocopy.patch
- From: 5.15.0-106.116
- CVE-2024-26663, CVSSv2 Score: 5.5
- Description:
tipc: Check the bearer type before calling
- CVE: https://ubuntu.com/security/CVE-2024-26663
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26663-tipc-check-the-bearer-type-before-calling.patch
- From: 5.15.0-106.116
- CVE-2024-26606, CVSSv2 Score: 5.5
- Description:
binder: signal epoll threads of self-work
- CVE: https://ubuntu.com/security/CVE-2024-26606
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26606-binder-signal-epoll-threads-of-self-work.patch
- From: 5.15.0-106.116
- CVE-2023-52587, CVSSv2 Score: 6.0
- Description:
IB/ipoib: Fix mcast list locking
- CVE: https://ubuntu.com/security/CVE-2023-52587
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52587-ib-ipoib-fix-mcast-list-locking.patch
- From: 5.15.0-106.116
- CVE-2024-26610, CVSSv2 Score: 6.1
- Description:
wifi: iwlwifi: fix a memory corruption
- CVE: https://ubuntu.com/security/CVE-2024-26610
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26610-wifi-iwlwifi-fix-a-memory-corruption.patch
- From: 5.15.0-106.116
- CVE-2023-52607, CVSSv2 Score: 5.5
- Description:
powerpc/mm: Fix null-pointer dereference in pgtable_cache_add
- CVE: https://ubuntu.com/security/CVE-2023-52607
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52607-powerpc-mm-fix-null-pointer-dereference-in-pgtable-cache-add.patch
- From: 5.15.0-106.116
- CVE-2023-52619, CVSSv2 Score: 5.5
- Description:
pstore/ram: Fix crash when setting number of cpus to an odd
- CVE: https://ubuntu.com/security/CVE-2023-52619
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52619-pstore-ram-fix-crash-when-setting-number-of-cpus-to-an-odd.patch
- From: 5.15.0-106.116
- CVE-2023-52598, CVSSv2 Score: 6.0
- Description:
s390/ptrace: handle setting of fpc register correctly
- CVE: https://ubuntu.com/security/CVE-2023-52598
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52598-s390-ptrace-handle-setting-of-fpc-register-correctly.patch
- From: 5.15.0-106.116
- CVE-2023-52623, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix a suspicious RCU usage warning
- CVE: https://ubuntu.com/security/CVE-2023-52623
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52623-sunrpc-fix-a-suspicious-rcu-usage-warning.patch
- From: 5.15.0-106.116
- CVE-2023-52583, CVSSv2 Score: 5.5
- Description:
ceph: fix deadlock or deadcode of misusing dget()
- CVE: https://ubuntu.com/security/CVE-2023-52583
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52583-ceph-fix-deadlock-or-deadcode-of-misusing-dget.patch
- From: 5.15.0-106.116
- CVE-2023-52616, CVSSv2 Score: 5.5
- Description:
crypto: lib/mpi - Fix unexpected pointer access in
- CVE: https://ubuntu.com/security/CVE-2023-52616
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52616-crypto-lib-mpi-fix-unexpected-pointer-access-in.patch
- From: 5.15.0-106.116
- CVE-2023-52435, CVSSv2 Score: 5.5
- Description:
net: prevent mss overflow in skb_segment()
- CVE: https://ubuntu.com/security/CVE-2023-52435
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52435-net-prevent-mss-overflow-in-skb-segment.patch
- From: 5.15.0-106.116
- CVE-2023-52631, CVSSv2 Score: 5.5
- Description:
fs/ntfs3: Fix an NULL dereference bug
- CVE: https://ubuntu.com/security/CVE-2023-52631
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52631-fs-ntfs3-fix-an-null-dereference-bug.patch
- From: 5.15.0-106.116
- CVE-2023-52633, CVSSv2 Score: 5.5
- Description:
um: time-travel: fix time corruption
- CVE: https://ubuntu.com/security/CVE-2023-52633
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52633-um-time-travel-fix-time-corruption.patch
- From: 5.15.0-106.116
- CVE-2023-52635, CVSSv2 Score: 5.5
- Description:
PM / devfreq: Synchronize devfreq_monitor_[start/stop]
- CVE: https://ubuntu.com/security/CVE-2023-52635
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52635-pm-devfreq-synchronize-devfreq-monitor-start-stop.patch
- From: 5.15.0-106.116
- CVE-2024-1151, CVSSv2 Score: 5.5
- Description:
net: openvswitch: limit the number of recursions from action sets
- CVE: https://ubuntu.com/security/CVE-2024-1151
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-1151-net-openvswitch-limit-the-number-of-recursions-from-action-sets.patch
- From: 5.15.0-106.116
- CVE-2024-23849, CVSSv2 Score: 5.5
- Description:
net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv
- CVE: https://ubuntu.com/security/CVE-2024-23849
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-23849-net-rds-fix-ubsan-array-index-out-of-bounds-in.patch
- From: 5.15.0-106.116
- CVE-2024-26600, CVSSv2 Score: 5.5
- Description:
phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
- CVE: https://ubuntu.com/security/CVE-2024-26600
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26600-phy-ti-phy-omap-usb2-fix-null-pointer-dereference-for-srp.patch
- From: 5.15.0-106.116
- CVE-2024-26602, CVSSv2 Score: 5.5
- Description:
sched/membarrier: reduce the ability to hammer on sys_membarrier
- CVE: https://ubuntu.com/security/CVE-2024-26602
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26602-sched-membarrier-reduce-the-ability-to-hammer-on.patch
- From: 5.15.0-106.116
- CVE-2023-52638, CVSSv2 Score: 5.5
- Description:
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
- CVE: https://ubuntu.com/security/CVE-2023-52638
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52638-can-j1939-prevent-deadlock-by-changing-j1939-socks-lock-to-5.15.0-84.93.patch
- From: 5.15.0-106.116
- CVE-2023-52638, CVSSv2 Score: 5.5
- Description:
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock (adaptation)
- CVE: https://ubuntu.com/security/CVE-2023-52638
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52638-can-j1939-prevent-deadlock-by-changing-j1939-socks-lock-to-kpatch.patch
- From: 5.15.0-106.116
- CVE-2023-52622, CVSSv2 Score: 5.5
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://ubuntu.com/security/CVE-2023-52622
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg.patch
- From: 5.15.0-106.116
- CVE-2023-52622, CVSSv2 Score: 5.5
- Description:
ext4: avoid online resizing failures due to oversized flex bg
- CVE: https://ubuntu.com/security/CVE-2023-52622
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52622-ext4-avoid-online-resizing-failures-due-to-oversized-flex-bg-kpatch.patch
- From: 5.15.0-106.116
- CVE-2024-26635, CVSSv2 Score: 5.5
- Description:
llc: Drop support for ETH_P_TR_802_2.
- CVE: https://ubuntu.com/security/CVE-2024-26635
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26635-llc-drop-support-for-eth-p-tr-802-2.patch
- From: 5.15.0-106.116
- CVE-2024-26635, CVSSv2 Score: 5.5
- Description:
llc: Drop support for ETH_P_TR_802_2 (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26635
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26635-llc-drop-support-for-eth-p-tr-802-2-kpatch.patch
- From: 5.15.0-106.116
- CVE-2023-52489, CVSSv2 Score:
- Description:
The modified structure mem_section_usage is used only during bootup time. As we patch the changes after booting they will have no effect. Therefore we cannot patch this CVE.
- Patch: skipped/CVE-2023-52489.patch
- From:
- CVE-2023-52498, CVSSv2 Score:
- Description:
Power management subsystem - sleep mode. Irrelevant for servers.
- Patch: skipped/CVE-2023-52498.patch
- From:
- CVE-2023-52594, CVSSv2 Score: 4.4
- Description:
wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52594
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52594-wifi-ath9k-Fix-potential-array-index-out-of-bounds-r.patch
- From: 5.15.0-106.116
- CVE-2023-52595, CVSSv2 Score: 4.4
- Description:
wifi: rt2x00: restart beacon queue when hardware reset
- CVE: https://access.redhat.com/security/cve/CVE-2023-52595
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52595-wifi-rt2x00-restart-beacon-queue-when-hardware-reset.patch
- From: 5.15.0-106.116
- CVE-2023-52608, CVSSv2 Score: 4.4
- Description:
firmware: arm_scmi: Check mailbox/SMT channel for consistency
- CVE: https://ubuntu.com/security/CVE-2023-52608
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52608-firmware-arm-scmi-check-mailbox-smt-channel-for-consistency.patch
- From: 5.15.0-106.116
- CVE-2023-52614, CVSSv2 Score: 4.4
- Description:
PM / devfreq: Fix buffer overflow in trans_stat_show
- CVE: https://access.redhat.com/security/cve/CVE-2023-52614
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52614-pm-devfreq-fix-buffer-overflow-in-trans-stat-show.patch
- From: 5.15.0-106.116
- CVE-2023-52615, CVSSv2 Score: 4.4
- Description:
hwrng: core - Fix page fault dead lock on mmap-ed hwrng
- CVE: https://access.redhat.com/security/cve/CVE-2023-52615
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52615-hwrng-core-fix-page-fault-dead-lock-on-mmap-ed-hwrng.patch
- From: 5.15.0-106.116
- CVE-2023-52618, CVSSv2 Score: 4.4
- Description:
block/rnbd-srv: Check for unlikely string overflow
- CVE: https://access.redhat.com/security/cve/CVE-2023-52618
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52618-block-rnbd-srv-check-for-unlikely-string-overflow.patch
- From: 5.15.0-106.116
- CVE-2024-26645, CVSSv2 Score: 4.4
- Description:
tracing: Ensure visibility when inserting an element into tracing_map
- CVE: https://access.redhat.com/security/cve/CVE-2024-26645
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26645-tracing-ensure-visibility-when-inserting-an-element-into-tracing-map.patch
- From: 5.15.0-106.116
- CVE-2024-26675, CVSSv2 Score: 5.5
- Description:
ppp_async: limit MRU to 64K
- CVE: https://ubuntu.com/security/CVE-2024-26675
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26675-ppp-async-limit-mru-to-64k.patch
- From: 5.15.0-106.116
- CVE-2024-26671, CVSSv2 Score: 5.5
- Description:
blk-mq: fix IO hang from sbitmap wakeup race
- CVE: https://ubuntu.com/security/CVE-2024-26671
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26671-blk-mq-fix-io-hang-from-sbitmap-wakeup-race.patch
- From: 5.15.0-106.116
- CVE-2024-26679, CVSSv2 Score: 5.5
- Description:
inet: read sk->sk_family once in inet_recv_error()
- CVE: https://ubuntu.com/security/CVE-2024-26679
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26679-inet-read-sk-sk-family-once-in-inet-recv-error.patch
- From: 5.15.0-106.116
- CVE-2024-26665, CVSSv2 Score: 5.5
- Description:
tunnels: fix out of bounds access when building IPv6 PMTU error
- CVE: https://ubuntu.com/security/CVE-2024-26665
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26665-tunnels-fix-out-of-bounds-access-when-building-ipv6-pmtu-error.patch
- From: 5.15.0-106.116
- CVE-2024-26684, CVSSv2 Score: 5.5
- Description:
net: stmmac: xgmac: fix handling of DPP safety error for DMA channels
- CVE: https://ubuntu.com/security/CVE-2024-26684
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26684-net-stmmac-xgmac-fix-handling-of-dpp-safety-error-for-dma-channels.patch
- From: 5.15.0-106.116
- CVE-2024-26684, CVSSv2 Score: 5.5
- Description:
net: stmmac: xgmac: fix handling of DPP safety error for DMA channels
- CVE: https://ubuntu.com/security/CVE-2024-26684
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26684-net-stmmac-xgmac-fix-handling-of-dpp-safety-error-for-dma-channels-kpatch.patch
- From: 5.15.0-106.116
- CVE-2024-26673, CVSSv2 Score: 5.5
- Description:
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations
- CVE: https://ubuntu.com/security/CVE-2024-26673
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26673-netfilter-nft-ct-sanitize-layer-3-and-4-protocol-number-in-custom-expectations.patch
- From: 5.15.0-106.116
- CVE-2024-26664, CVSSv2 Score: 5.5
- Description:
hwmon: (coretemp) Fix out-of-bounds memory access
- CVE: https://ubuntu.com/security/CVE-2024-26664
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26664-hwmon-coretemp-fix-out-of-bounds-memory-access.patch
- From: 5.15.0-106.116
- CVE-2024-26685, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential bug in end_buffer_async_write
- CVE: https://ubuntu.com/security/CVE-2024-26685
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26685-nilfs2-fix-potential-bug-in-end-buffer-async-write-84.patch
- From: 5.15.0-106.116
- CVE-2024-26676, CVSSv2 Score: 5.5
- Description:
af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.
- CVE: https://ubuntu.com/security/CVE-2024-26676
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26676-af-unix-call-kfree-skb-for-dead-unix-sk-oob-skb-in-gc.patch
- From: 5.15.0-106.116
- CVE-2024-26668, CVSSv2 Score: 5.5
- Description:
netfilter: nft_limit: reject configurations that cause integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-26668
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26668-netfilter-nft-limit-reject-configurations-that-cause-integer-overflow-101.patch
- From: 5.15.0-106.116
- CVE-2024-26715, CVSSv2 Score: 5.5
- Description:
usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend
- CVE: https://ubuntu.com/security/CVE-2024-26715
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26715-usb-dwc3-gadget-fix-null-pointer-dereference-in-5.15.0-89.99.patch
- From: 5.15.0-106.116
- CVE-2024-26695, CVSSv2 Score: 5.5
- Description:
crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
- CVE: https://ubuntu.com/security/CVE-2024-26695
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26695-crypto-ccp-fix-null-pointer-dereference-in.patch
- From: 5.15.0-106.116
- CVE-2024-26698, CVSSv2 Score: 5.5
- Description:
hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove
- CVE: https://ubuntu.com/security/CVE-2024-26698
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26698-hv-netvsc-fix-race-condition-between-netvsc-probe-and.patch
- From: 5.15.0-106.116
- CVE-2024-26704, CVSSv2 Score: 5.5
- Description:
ext4: fix double-free of blocks due to wrong extents moved_len
- CVE: https://ubuntu.com/security/CVE-2024-26704
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26704-ext4-fix-double-free-of-blocks-due-to-wrong-extents.patch
- From: 5.15.0-106.116
- CVE-2024-26702, CVSSv2 Score: 5.5
- Description:
iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC
- CVE: https://ubuntu.com/security/CVE-2024-26702
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26702-iio-magnetometer-rm3100-add-boundary-check-for-the-value.patch
- From: 5.15.0-106.116
- CVE-2024-26697, CVSSv2 Score: 5.5
- Description:
nilfs2: fix data corruption in dsync block recovery for small block sizes
- CVE: https://ubuntu.com/security/CVE-2024-26697
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26697-nilfs2-fix-data-corruption-in-dsync-block-recovery-for-small.patch
- From: 5.15.0-106.116
- CVE-2024-26696, CVSSv2 Score: 5.5
- Description:
nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()
- CVE: https://ubuntu.com/security/CVE-2024-26696
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26696-nilfs2-fix-hang-in-nilfs-lookup-dirty-data-buffers.patch
- From: 5.15.0-106.116
- CVE-2024-26689, CVSSv2 Score: 5.5
- Description:
ceph: prevent use-after-free in encode_cap_msg()
- CVE: https://ubuntu.com/security/CVE-2024-26689
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26689-ceph-prevent-use-after-free-in-encode-cap-msg.patch
- From: 5.15.0-106.116
- CVE-2024-26712, CVSSv2 Score:
- Description:
Do not support powerpc build with kasan sanitizer 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0
- Patch: skipped/CVE-2024-26712.patch
- From:
- CVE-2023-52491, CVSSv2 Score: 4.1
- Description:
media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run
- CVE: https://ubuntu.com/security/CVE-2023-52491
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52491-media-mtk-jpeg-Fix-use-after-free-bug-due-to-error-path-handling-in-mtk_jpeg_dec_device_run.patch
- From: kernel-5.15.0-106-116
- CVE-2024-26614, CVSSv2 Score:
- Description:
Complex adaptation required. Network services prevents update because sleeps in inet_csk_accept() function.
- Patch: skipped/CVE-2024-26614.patch
- From:
- CVE-2023-52642, CVSSv2 Score: 4.4
- Description:
media: rc: bpf attach/detach requires write permission
- CVE: https://ubuntu.com/security/CVE-2023-52642
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52642-media-rc-bpf-attach-detach-requires-write-permission.patch
- From: kernel-5.15.0-106-116
- CVE-2023-52643, CVSSv2 Score: 4.4
- Description:
iio: core: fix memleak in iio_device_register_sysfs
- CVE: https://ubuntu.com/security/CVE-2023-52643
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52643-iio-core-fix-memleak-in-iio_device_register_sysfs.patch
- From: 5.15.0-106.116
- CVE-2024-26825, CVSSv2 Score: 5.5
- Description:
nfc: nci: free rx_data_reassembly skb on NCI device cleanup
- CVE: https://ubuntu.com/security/CVE-2024-26825
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26825-nfc-nci-free-rx_data_reassembly-skb-on-NCI-device-cleanup.patch
- From: 5.15.0-106.116
- CVE-2024-26826, CVSSv2 Score: 5.5
- Description:
mptcp: fix data re-injection from stale subflow
- CVE: https://ubuntu.com/security/CVE-2024-26826
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26826-mptcp-fix-data-re-injection-from-stale-subflow.patch
- From: 5.15.0-106.116
- CVE-2024-26829, CVSSv2 Score: 4.4
- Description:
media: ir_toy: fix a memleak in irtoy_tx
- CVE: https://ubuntu.com/security/CVE-2024-26829
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26829-media-ir_toy-fix-a-memleak-in-irtoy_tx.patch
- From: kernel-5.15.0-106.116
- CVE-26920, CVSSv2 Score: 5.5
- Description:
tracing/trigger: Fix to return error if failed to alloc snapshot
- CVE: https://ubuntu.com/security/CVE-2024-26920
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26920-tracing-trigger-Fix-to-return-error-if-failed-to-alloc-snapshot.patch
- From: kernel-5.15.0-106.116
- CVE-2023-52492, CVSSv2 Score: 4.4
- Description:
dmaengine: fix NULL pointer in channel unregistration
- CVE: https://ubuntu.com/security/CVE-2023-52492
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52492-dmaengine-fix-null-pointer-in-channel-unregistration.patch
- From: 5.15.0-106.116
- CVE-2023-52493, CVSSv2 Score: 4.4
- Description:
bus: mhi: host: Drop chan lock before queuing buffers
- CVE: https://ubuntu.com/security/CVE-2023-52493
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52493-bus-mhi-host-drop-chan-lock-before-queuing-buffers-upto-82.91.patch
- From: 5.15.0-106.116
- CVE-2023-52494, CVSSv2 Score: 4.4
- Description:
bus: mhi: host: Add alignment check for event ring read
- CVE: https://ubuntu.com/security/CVE-2023-52494
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52494-bus-mhi-host-add-alignment-check-for-event-ring-read-upto-82.91.patch
- From: 5.15.0-106.116
- CVE-2024-26808, CVSSv2 Score: 5.5
- Description:
netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for
- CVE: https://ubuntu.com/security/CVE-2024-26808
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26808-netfilter-nft-chain-filter-handle-netdev-unregister-for.patch
- From: 5.15.0-106.116
- CVE-2023-52486, CVSSv2 Score: 4.4
- Description:
drm: Don't unref the same fb many times by mistake due to
- CVE: https://ubuntu.com/security/CVE-2023-52486
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52486-drm-don-t-unref-the-same-fb-many-times-by-mistake-due-to.patch
- From: 5.15.0-106.116
- CVE-2023-52602, CVSSv2 Score: 4.7
- Description:
jfs: fix slab-out-of-bounds Read in dtSearch
- CVE: https://ubuntu.com/security/CVE-2023-52602
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2023-52602-jfs-fix-slab-out-of-bounds-read-in-dtsearch.patch
- From: 5.15.0-106.116
- CVE-2024-26717, CVSSv2 Score: 5.5
- Description:
HID: i2c-hid-of: fix NULL-deref on failed power up
- CVE: https://ubuntu.com/security/CVE-2024-26717
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26717-hid-i2c-hid-of-fix-null-deref-on-failed-power-up.patch
- From: 5.15.0-106.116
- CVE-2024-26720, CVSSv2 Score: 5.5
- Description:
mm/writeback: fix possible divide-by-zero in
- CVE: https://ubuntu.com/security/CVE-2024-26720
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26720-mm-writeback-fix-possible-divide-by-zero-in.patch
- From: 5.15.0-106.116
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: 5.15.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- CVE-2024-2201, CVSSv2 Score: 4.7
- Description:
x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
- CVE: https://linux.oracle.com/cve/CVE-2024-2201.html
- Patch: 5.15.0/CVE-2024-2201-x86-bugs-Change-commas-to-semicolons-in-spectre_v2-sysfs-file.patch
- From: kernel-uek-5.15.0-205.149.5.1.el8uek
- CVE-2024-2201, CVSSv2 Score: 4.7
- Description:
x86/bhi: Add support for clearing branch history at syscall entry
- CVE: https://ubuntu.com/security/CVE-2024-2201
- Patch: 5.15.0/CVE-2024-2201-x86-bhi-Add-support-for-clearing-branch-history-at-syscall-entry-jammy.patch
- From: kernel-5.15.0-105.115
- CVE-2024-26707, CVSSv2 Score: 5.5
- Description:
net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()
- CVE: https://ubuntu.com/security/CVE-2024-26707
- Patch: ubuntu-jammy/5.15.0-106.116/CVE-2024-26707-net-hsr-remove-warn-once-in-send-hsr-supervision-frame.patch
- From: 5.15.0-106.116
- CVE-2023-47233 CVE-2024-35811, CVSSv2 Score: 5.5
- Description:
wifi: brcmfmac: Fix use-after-free bug in
- CVE: https://ubuntu.com/security/CVE-2023-47233
- CVE: https://ubuntu.com/security/CVE-2024-35811
- Patch: ubuntu-jammy/5.15.0-107.117/CVE-2023-47233-wifi-brcmfmac-fix-use-after-free-bug-in.patch
- From: 5.15.0-107.117
- CVE-2024-26622, CVSSv2 Score: 7.8
- Description:
tomoyo: fix UAF write bug in tomoyo_write_control()
- CVE: https://ubuntu.com/security/CVE-2024-26622
- Patch: ubuntu-jammy/5.15.0-107.117/CVE-2024-26622-tomoyo-fix-uaf-write-bug-in-tomoyo-write-control.patch
- From: 5.15.0-107.117
- CVE-2023-52530, CVSSv2 Score: 7.1
- Description:
wifi: mac80211: fix potential key use-after-free
- CVE: https://ubuntu.com/security/CVE-2023-52530
- Patch: ubuntu-jammy/5.15.0-107.117/CVE-2023-52530-wifi-mac80211-fix-potential-key-use-after-free.patch
- From: 5.15.0-107.117
- CVE-2023-52434, CVSSv2 Score: 8.0
- Description:
smb: client: fix potential OOBs in
- CVE: https://access.redhat.com/security/cve/CVE-2023-52434
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52434-smb-client-fix-potential-oobs-in.patch
- From: 5.15.0-112.122
- CVE-2024-0841, CVSSv2 Score: 7.8
- Description:
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-0841
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-0841-fs-hugetlb-fix-null-pointer-dereference-in.patch
- From: 5.15.0-112.122
- CVE-2023-6270 CVE-2024-26898, CVSSv2 Score: 7.0
- Description:
aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-6270
- CVE: https://ubuntu.com/security/CVE-2024-26898
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-6270-aoe-fix-the-potential-use-after-free-problem-in.patch
- From: 5.15.0-112.122
- CVE-2024-26852, CVSSv2 Score: 7.0
- Description:
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
- CVE: https://ubuntu.com/security/CVE-2024-26852
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26852-net-ipv6-avoid-possible-uaf-in-ip6_route_mpath_notify.patch
- From: 5.15.0-112.122
- CVE-2023-52641, CVSSv2 Score: 5.5
- Description:
fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()
- CVE: https://ubuntu.com/security/CVE-2023-52641
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52641-fs-ntfs3-add-null-ptr-dereference-checking-at-the-end-of-5.15.0-97.107.patch
- From: 5.15.0-112.122
- CVE-2023-52640, CVSSv2 Score: 5.5
- Description:
fs/ntfs3: Fix oob in ntfs_listxattr
- CVE: https://ubuntu.com/security/CVE-2023-52640
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52640-fs-ntfs3-fix-oob-in-ntfs-listxattr-5.15.0-84.93.patch
- From: 5.15.0-112.122
- CVE-2023-52620, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: disallow timeout for anonymous sets
- CVE: https://ubuntu.com/security/CVE-2023-52620
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52620-netfilter-nf-tables-disallow-timeout-for-anonymous-sets.patch
- From: 5.15.0-112.122
- CVE-2023-52650, CVSSv2 Score: 5.5
- Description:
drm/tegra: dsi: Add missing check for of_find_device_by_node
- CVE: https://ubuntu.com/security/CVE-2023-52650
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52650-drm-tegra-dsi-add-missing-check-for-of-find-device-by-node.patch
- From: 5.15.0-112.122
- CVE-2023-52497, CVSSv2 Score: 5.5
- Description:
erofs: fix lz4 inplace decompression
- CVE: https://ubuntu.com/security/CVE-2023-52497
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52497-erofs-fix-lz4-inplace-decompression.patch
- From: 5.15.0-112.122
- CVE-2023-52644, CVSSv2 Score: 5.5
- Description:
wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is
- CVE: https://ubuntu.com/security/CVE-2023-52644
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52644-wifi-b43-stop-wake-correct-queue-in-dma-tx-path-when-qos-is.patch
- From: 5.15.0-112.122
- CVE-2023-52645, CVSSv2 Score: 5.5
- Description:
pmdomain: mediatek: fix race conditions with genpd
- CVE: https://ubuntu.com/security/CVE-2023-52645
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52645-pmdomain-mediatek-fix-race-conditions-with-genpd.patch
- From: 5.15.0-112.122
- CVE-2023-52652, CVSSv2 Score: 5.5
- Description:
NTB: fix possible name leak in ntb_register_device()
- CVE: https://ubuntu.com/security/CVE-2023-52652
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52652-NTB-fix-possible-name-leak-in-ntb_register_device.patch
- From: 5.15.0-112.122
- CVE-2023-52662, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node
- CVE: https://ubuntu.com/security/CVE-2023-52662
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-52662-drm-vmwgfx-fix-a-memleak-in-vmw_gmrid_man_get_node.patch
- From: 5.15.0-112.122
- CVE-2024-26883, CVSSv2 Score: 7.8
- Description:
bpf: Fix stackmap overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26883
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26883-bpf-fix-stackmap-overflow-check-on-32-bit-arches.patch
- From: 5.15.0-112.122
- CVE-2024-26907, CVSSv2 Score: 7.8
- Description:
RDMA/mlx5: Fix fortify source warning while accessing Eth segment
- CVE: https://ubuntu.com/security/CVE-2024-26907
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26907-rdma-mlx5-fix-fortify-source-warning-while-accessing-eth.patch
- From: 5.15.0-112.122
- CVE-2024-26816, CVSSv2 Score: 6.0
- Description:
x86, relocs: Ignore relocations in .notes section
- CVE: https://ubuntu.com/security/CVE-2024-26816
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26816-x86-relocs-ignore-relocations-in-notes-section.patch
- From: 5.15.0-112.122
- CVE-2024-26894, CVSSv2 Score: 6.0
- Description:
ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
- CVE: https://ubuntu.com/security/CVE-2024-26894
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26894-acpi-processor-idle-fix-memory-leak-in.patch
- From: 5.15.0-112.122
- CVE-2024-26884, CVSSv2 Score: 7.8
- Description:
bpf: Fix hashtab overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26884
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26884-bpf-fix-hashtab-overflow-check-on-32-bit-arches.patch
- From: 5.15.0-112.122
- CVE-2024-26885, CVSSv2 Score: 7.8
- Description:
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
- CVE: https://ubuntu.com/security/CVE-2024-26885
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26885-bpf-fix-devmap-hash-overflow-check-on-32-bit-arches.patch
- From: 5.15.0-112.122
- CVE-2024-26843, CVSSv2 Score:
- Description:
EFI Firmware: CVE patch is for EFI firmware which runs at boot time.
- Patch: skipped/CVE-2024-26843.patch
- From:
- CVE-2024-27030, CVSSv2 Score:
- Description:
octeontx2: CVE patch is outside the scope.
- Patch: skipped/CVE-2024-27030.patch
- From:
- CVE-2024-26736, CVSSv2 Score: 5.5
- Description:
afs: Increase buffer size in afs_update_volume_status()
- CVE: https://ubuntu.com/security/CVE-2024-26736
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26736-afs-Increase-buffer-size-in-afs_update_volume_status.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26735, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix possible use-after-free and null-ptr-deref
- CVE: https://ubuntu.com/security/CVE-2024-26735
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26735-ipv6-sr-fix-possible-use-after-free-and-null-ptr-deref.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26659, CVSSv2 Score: 5.5
- Description:
xhci: process isoc TD properly when there was a transaction error mid TD.
- CVE: https://ubuntu.com/security/CVE-2024-26659
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26659-xhci-process-isoc-TD-properly-when-there-was-a-transaction-error-mid-TD.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26659, CVSSv2 Score: 5.5
- Description:
xhci: process isoc TD properly when there was a transaction error mid TD.
- CVE: https://ubuntu.com/security/CVE-2024-26659
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26659-xhci-process-isoc-TD-properly-when-there-was-a-transaction-error-mid-TD-kpatch.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26659, CVSSv2 Score: 5.5
- Description:
xhci: handle isoc Babble and Buffer Overrun events properly
- CVE: https://ubuntu.com/security/CVE-2024-26659
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26659-xhci-handle-isoc-Babble-and-Buffer-Overrun-events-properly.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26651, CVSSv2 Score: 5.5
- Description:
sr9800: Add check for usbnet_get_endpoints
- CVE: https://ubuntu.com/security/CVE-2024-26651
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26651-sr9800-Add-check-for-usbnet_get_endpoints.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26603, CVSSv2 Score: 5.5
- Description:
x86/fpu: Stop relying on userspace for info to fault in xsave buffer
- CVE: https://ubuntu.com/security/CVE-2024-26603
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26603-x86-fpu-Stop-relying-on-userspace-for-info-to-fault-in-xsave-buffer.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26601, CVSSv2 Score: 5.5
- Description:
ext4: regenerate buddy after block freeing failed if under fc replay
- CVE: https://ubuntu.com/security/CVE-2024-26601
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26601-ext4-regenerate-buddy-after-block-freeing-failed-if-under-fc-replay-83.92.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26584, CVSSv2 Score:
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- Patch: skipped/CVE-2024-26584.patch
- From:
- CVE-2023-7042, CVSSv2 Score: 5.5
- Description:
wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()
- CVE: https://ubuntu.com/security/CVE-2023-7042
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2023-7042-wifi-ath10k-fix-NULL-pointer-dereference-in-ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26790, CVSSv2 Score: 5.5
- Description:
dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read
- CVE: https://ubuntu.com/security/CVE-2024-26790
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26790-dmaengine-fsl-qdma-fix-SoC-may-hang-on-16-byte-unaligned-read.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26791, CVSSv2 Score: 5.5
- Description:
btrfs: dev-replace: properly validate device names
- CVE: https://ubuntu.com/security/CVE-2024-26791
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26791-btrfs-dev-replace-properly-validate-device-names.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26792, CVSSv2 Score: 5.5
- Description:
btrfs: fix double free of anonymous device after snapshot creation failure
- CVE: https://ubuntu.com/security/CVE-2024-26792
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26792-btrfs-fix-double-free-of-anonymous-device-after-snapshot-creation-failure.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26793, CVSSv2 Score: 5.5
- Description:
gtp: fix use-after-free and null-ptr-deref in gtp_newlink()
- CVE: https://ubuntu.com/security/CVE-2024-26793
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26793-gtp-fix-use-after-free-and-null-ptr-deref-in-gtp_newlink.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26795, CVSSv2 Score:
- Description:
RISCV arch not supported.
- Patch: skipped/CVE-2024-26795.patch
- From:
- CVE-2024-26798, CVSSv2 Score: 5.5
- Description:
fbcon: always restore the old font data in fbcon_do_set_font()
- CVE: https://ubuntu.com/security/CVE-2024-26798
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26798-fbcon-always-restore-the-old-font-data-in-fbcon_do_set_font.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26801, CVSSv2 Score: 5.5
- Description:
Bluetooth: Avoid potential use-after-free in hci_error_reset
- CVE: https://ubuntu.com/security/CVE-2024-26801
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26801-Bluetooth-Avoid-potential-use-after-free-in-hci_error_reset.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26802, CVSSv2 Score: 5.5
- Description:
stmmac: Clear variable when destroying workqueue
- CVE: https://ubuntu.com/security/CVE-2024-26802
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26802-stmmac-Clear-variable-when-destroying-workqueue.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26803, CVSSv2 Score: 5.5
- Description:
net: veth: clear GRO when clearing XDP even when down
- CVE: https://ubuntu.com/security/CVE-2024-26803
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26803-net-veth-clear-GRO-when-clearing-XDP-even-when-down.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26804, CVSSv2 Score: 5.5
- Description:
net: ip_tunnel: prevent perpetual headroom growth
- CVE: https://ubuntu.com/security/CVE-2024-26804
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26804-net-ip_tunnel-prevent-perpetual-headroom-growth-79.86.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26805, CVSSv2 Score: 5.5
- Description:
netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
- CVE: https://ubuntu.com/security/CVE-2024-26805
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26805-netlink-Fix-kernel-infoleak-after-free-in-__skb_datagram_iter.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27390, CVSSv2 Score: 5.5
- Description:
ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down()
- CVE: https://ubuntu.com/security/CVE-2024-27390
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27390-ipv6-mcast-remove-one-synchronize_net-barrier-in-ipv.patch
- From: 5.15.0-112.122
- CVE-2024-27403, CVSSv2 Score: 5.5
- Description:
netfilter: nft_flow_offload: reset dst in route object after setting up flow
- CVE: https://ubuntu.com/security/CVE-2024-27403
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27403-netfilter-nft_flow_offload-reset-dst-in-route-object.patch
- From: 5.15.0-112.122
- CVE-2024-27413, CVSSv2 Score: 5.5
- Description:
efi/capsule-loader: fix incorrect allocation size
- CVE: https://ubuntu.com/security/CVE-2024-27413
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27413-efi-capsule-loader-fix-incorrect-allocation-size.patch
- From: 5.15.0-112.122
- CVE-2024-27417, CVSSv2 Score: 5.5
- Description:
ipv6: fix potential "struct net" leak in inet6_rtm_getaddr()
- CVE: https://ubuntu.com/security/CVE-2024-27417
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27417-ipv6-fix-potential-struct-net-leak-in-inet6_rtm_getaddr.patch
- From: 5.15.0-112.122
- CVE-2024-27419, CVSSv2 Score: 5.5
- Description:
netrom: Fix data-races around sysctl_net_busy_read
- CVE: https://ubuntu.com/security/CVE-2024-27419
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27419-netrom-Fix-data-races-around-sysctl_net_busy_read.patch
- From: 5.15.0-112.122
- CVE-2024-27410, CVSSv2 Score: 5.5
- Description:
wifi: nl80211: reject iftype change with mesh ID change
- CVE: https://ubuntu.com/security/CVE-2024-27410
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27410-wifi-nl80211-reject-iftype-change-with-mesh-ID-change.patch
- From: 5.15.0-112.122
- CVE-2024-26771, CVSSv2 Score: 5.5
- Description:
dmaengine: ti: edma: Add some null pointer checks to the
- CVE: https://ubuntu.com/security/CVE-2024-26771
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26771-dmaengine-ti-edma-add-some-null-pointer-checks-to-the-5.15.0-97.107.patch
- From: 5.15.0-112.122
- CVE-2024-26772, CVSSv2 Score: 5.5
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
- CVE: https://ubuntu.com/security/CVE-2024-26772
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26772-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 5.15.0-112.122
- CVE-2024-26773, CVSSv2 Score: 5.5
- Description:
ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
- CVE: https://ubuntu.com/security/CVE-2024-26773
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26773-ext4-avoid-allocating-blocks-from-corrupted-group-in.patch
- From: 5.15.0-112.122
- CVE-2024-26774, CVSSv2 Score: 5.5
- Description:
ext4: avoid dividing by 0 in mb_update_avg_fragment_size()
- CVE: https://ubuntu.com/security/CVE-2024-26774
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26774-ext4-avoid-dividing-by-0-in-mb-update-avg-fragment-size.patch
- From: 5.15.0-112.122
- CVE-2024-26776, CVSSv2 Score: 5.5
- Description:
spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were
- CVE: https://ubuntu.com/security/CVE-2024-26776
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26776-spi-hisi-sfc-v3xx-return-irq-none-if-no-interrupts-were.patch
- From: 5.15.0-112.122
- CVE-2024-26777, CVSSv2 Score: 5.5
- Description:
fbdev: sis: Error out if pixclock equals zero
- CVE: https://ubuntu.com/security/CVE-2024-26777
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26777-fbdev-sis-error-out-if-pixclock-equals-zero.patch
- From: 5.15.0-112.122
- CVE-2024-26778, CVSSv2 Score: 5.5
- Description:
fbdev: savage: Error out if pixclock equals zero
- CVE: https://ubuntu.com/security/CVE-2024-26778
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26778-fbdev-savage-error-out-if-pixclock-equals-zero.patch
- From: 5.15.0-112.122
- CVE-2024-26779, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: fix race condition on enabling fast-xmit
- CVE: https://ubuntu.com/security/CVE-2024-26779
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26779-wifi-mac80211-fix-race-condition-on-enabling-fast-xmit.patch
- From: 5.15.0-112.122
- CVE-2024-26782, CVSSv2 Score: 5.5
- Description:
mptcp: fix double-free on socket dismantle
- CVE: https://ubuntu.com/security/CVE-2024-26782
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26782-mptcp-fix-double-free-on-socket-dismantle-5.15.0-84.93.patch
- From: 5.15.0-112.122
- CVE-2024-26787, CVSSv2 Score:
- Description:
STM32 arch is not supported. Low impact CVE.
- Patch: skipped/CVE-2024-26787.patch
- From:
- CVE-2024-26788, CVSSv2 Score:
- Description:
NXP Layerscape SoCs affected only. Unable to fix early initialization.
- Patch: skipped/CVE-2024-26788.patch
- From:
- CVE-2024-26870, CVSSv2 Score: 5.5
- Description:
NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102
- CVE: https://ubuntu.com/security/CVE-2024-26870
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26870-nfsv4-2-fix-nfs4-listxattr-kernel-bug-at-mm-usercopy-c-102-73.patch
- From: 5.15.0-112.122
- CVE-2024-26878, CVSSv2 Score: 5.5
- Description:
quota: Fix potential NULL pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-26878
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26878-quota-fix-potential-null-pointer-dereference-92.patch
- From: 5.15.0-112.122
- CVE-2024-26840, CVSSv2 Score: 5.5
- Description:
cachefiles: fix memory leak in cachefiles_add_cache()
- CVE: https://ubuntu.com/security/CVE-2024-26840
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26840-cachefiles-fix-memory-leak-in-cachefiles-add-cache.patch
- From: 5.15.0-112.122
- CVE-2024-26851, CVSSv2 Score: 5.5
- Description:
netfilter: nf_conntrack_h323: Add protection for bmp length
- CVE: https://ubuntu.com/security/CVE-2024-26851
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26851-netfilter-nf-conntrack-h323-add-protection-for-bmp-length.patch
- From: 5.15.0-112.122
- CVE-2024-26863, CVSSv2 Score: 5.5
- Description:
hsr: Fix uninit-value access in hsr_get_node()
- CVE: https://ubuntu.com/security/CVE-2024-26863
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26863-hsr-fix-uninit-value-access-in-hsr-get-node.patch
- From: 5.15.0-112.122
- CVE-2024-26882, CVSSv2 Score: 7.8
- Description:
net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
- CVE: https://ubuntu.com/security/CVE-2024-26882
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26882-net-ip-tunnel-make-sure-to-pull-inner-header-in.patch
- From: 5.15.0-112.122
- CVE-2024-26889, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_core: Fix possible buffer overflow
- CVE: https://ubuntu.com/security/CVE-2024-26889
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26889-bluetooth-hci-core-fix-possible-buffer-overflow.patch
- From: 5.15.0-112.122
- CVE-2024-26901, CVSSv2 Score: 5.5
- Description:
do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
- CVE: https://ubuntu.com/security/CVE-2024-26901
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26901-do-sys-name-to-handle-use-kzalloc-to-fix-kernel-infoleak.patch
- From: 5.15.0-112.122
- CVE-2024-26906, CVSSv2 Score: 5.5
- Description:
x86/sev-es: Allow copy_from_kernel_nofault() in earlier boot
- CVE: https://ubuntu.com/security/CVE-2024-26906
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26906-x86-sev-es-Allow-copy_from_kernel_nofault-in-earlier.patch
- From: 5.15.0-112.122
- CVE-2024-26906, CVSSv2 Score: 5.5
- Description:
x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()
- CVE: https://ubuntu.com/security/CVE-2024-26906
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26906-x86-mm-disallow-vsyscall-page-read-for-97.patch
- From: 5.15.0-112.122
- CVE-2024-27024, CVSSv2 Score: 5.5
- Description:
net/rds: fix WARNING in rds_conn_connect_if_down
- CVE: https://ubuntu.com/security/CVE-2024-27024
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27024-net-rds-fix-WARNING-in-rds_conn_connect_if_down.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27028, CVSSv2 Score: 5.5
- Description:
spi: spi-mt65xx: Fix NULL pointer access in interrupt handler
- CVE: https://ubuntu.com/security/CVE-2024-27028
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27028-spi-spi-mt65xx-Fix-NULL-pointer-access-in-interrupt-handler.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27034, CVSSv2 Score: 5.5
- Description:
f2fs: replace congestion_wait() calls with io_schedule_timeout()
- CVE: https://ubuntu.com/security/CVE-2024-27034
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27034-f2fs-replace-congestion_wait-calls-with-io_schedule_timeout.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27034, CVSSv2 Score: 5.5
- Description:
f2fs: compress: fix to cover normal cluster write with cp_rwsem
- CVE: https://ubuntu.com/security/CVE-2024-27034
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27034-f2fs-compress-fix-to-cover-normal-cluster-write-with-cp_rwsem.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27037, CVSSv2 Score: 5.5
- Description:
clk: zynq: Prevent null pointer dereference caused by kmalloc failure
- CVE: https://ubuntu.com/security/CVE-2024-27037
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27037-clk-zynq-Prevent-null-pointer-dereference-caused-by-kmalloc-failure.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27038, CVSSv2 Score: 5.5
- Description:
clk: Fix clk_core_get NULL dereference
- CVE: https://ubuntu.com/security/CVE-2024-27038
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27038-clk-Fix-clk_core_get-NULL-dereference.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27039, CVSSv2 Score: 5.5
- Description:
clk: hisilicon: hi3559a: Fix an erroneous devm_kfree()
- CVE: https://ubuntu.com/security/CVE-2024-27039
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27039-clk-hisilicon-hi3559a-Fix-an-erroneous-devm_kfree.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27044, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Fix potential NULL pointer dereferences in 'dcn10_set_output_transfer_func()'
- CVE: https://ubuntu.com/security/CVE-2024-27044
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27044-drm-amd-display-Fix-potential-NULL-pointer-dereferences-in-dcn10_set_output_transfer_func.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27045, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'
- CVE: https://ubuntu.com/security/CVE-2024-27045
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27045-drm-amd-display-Fix-a-potential-buffer-overflow-in-dp_dsc_clock_en_read.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27046, CVSSv2 Score: 5.5
- Description:
nfp: flower: handle acti_netdevs allocation failure
- CVE: https://ubuntu.com/security/CVE-2024-27046
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27046-nfp-flower-handle-acti_netdevs-allocation-failure.patch
- From: kernel-5.15.0-112.122
- CVE-2024-27047, CVSSv2 Score: 5.5
- Description:
net: phy: fix phy_get_internal_delay accessing an empty array
- CVE: https://ubuntu.com/security/CVE-2024-27047
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27047-net-phy-fix-phy_get_internal_delay-accessing-an-empty-array.patch
- From: kernel-5.15.0-112.122
- CVE-2024-26769, CVSSv2 Score: 5.5
- Description:
nvmet-fc: release reference on target port
- CVE: https://ubuntu.com/security/CVE-2024-26769
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26769-0001-nvmet-fc-release-reference-on-target-port.patch
- From: 5.15.0-112.122
- CVE-2024-26769, CVSSv2 Score: 5.5
- Description:
nvmet-fc: avoid deadlock on delete association path
- CVE: https://ubuntu.com/security/CVE-2024-26769
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26769-0002-nvmet-fc-avoid-deadlock-on-delete-association-path-kpatch.patch
- From: 5.15.0-112.122
- CVE-2024-26752, CVSSv2 Score: 5.5
- Description:
ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
- CVE: https://ubuntu.com/security/CVE-2024-26752
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26752-0002-ipv4-ipv6-Fix-handling-of-transhdrlen-in-__ip-6-_app.patch
- From: 5.15.0-112.122
- CVE-2024-26752, CVSSv2 Score: 5.5
- Description:
l2tp: pass correct message length to ip6_append_data
- CVE: https://ubuntu.com/security/CVE-2024-26752
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26752-0003-l2tp-pass-correct-message-length-to-ip6-append-data.patch
- From: 5.15.0-112.122
- CVE-2024-26763, CVSSv2 Score: 5.5
- Description:
dm-crypt: don't modify the data when using authenticated
- CVE: https://ubuntu.com/security/CVE-2024-26763
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26763-dm-crypt-don-t-modify-the-data-when-using-authenticated.patch
- From: 5.15.0-112.122
- CVE-2024-26751, CVSSv2 Score:
- Description:
CVE targets a specific ARM processor.
- Patch: skipped/CVE-2024-26751.patch
- From:
- CVE-2024-26749, CVSSv2 Score: 5.5
- Description:
usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()
- CVE: https://ubuntu.com/security/CVE-2024-26749
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26749-usb-cdns3-fixed-memory-use-after-free-at.patch
- From: 5.15.0-112.122
- CVE-2024-26747, CVSSv2 Score: 5.5
- Description:
usb: roles: fix NULL pointer issue when put module's reference
- CVE: https://ubuntu.com/security/CVE-2024-26747
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26747-usb-roles-fix-null-pointer-issue-when-put-module-s-kpatch.patch
- From: 5.15.0-112.122
- CVE-2024-26748, CVSSv2 Score: 5.5
- Description:
usb: cdns3: fix memory double free when handle zero packet
- CVE: https://ubuntu.com/security/CVE-2024-26748
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26748-usb-cdns3-fix-memory-double-free-when-handle-zero-packet.patch
- From: 5.15.0-112.122
- CVE-2024-26744, CVSSv2 Score: 5.5
- Description:
RDMA/srpt: Support specifying the srpt_service_guid
- CVE: https://access.redhat.com/security/cve/CVE-2024-26744
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26744-rdma-srpt-support-specifying-the-srpt-service-guid-kpatch.patch
- From: 4.18.0-553.5.1.el8_10
- CVE-2024-26743, CVSSv2 Score: 5.5
- Description:
RDMA/qedr: Fix qedr_create_user_qp error flow
- CVE: https://ubuntu.com/security/CVE-2024-26743
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26743-rdma-qedr-fix-qedr-create-user-qp-error-flow.patch
- From: 5.15.0-112.122
- CVE-2024-26764, CVSSv2 Score: 5.5
- Description:
fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio
- CVE: https://ubuntu.com/security/CVE-2024-26764
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26764-fs-aio-restrict-kiocb-set-cancel-fn-to-i-o-submitted-via.patch
- From: 5.15.0-112.122
- CVE-2024-22099, CVSSv2 Score: 5.5
- Description:
Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
- CVE: https://ubuntu.com/security/CVE-2024-22099
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-22099-CVE-2024-26903-bluetooth-rfcomm-fix-null-ptr-deref.patch
- From: 5.15.0-112.122
- CVE-2024-22099, CVSSv2 Score: 5.5
- Description:
Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
- CVE: https://ubuntu.com/security/CVE-2024-22099
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-22099-CVE-2024-26903-bluetooth-rfcomm-fix-null-ptr-deref-kpatch.patch
- From: 5.15.0-112.122
- CVE-2024-27043, CVSSv2 Score: 5.2
- Description:
media: edia: dvbdev: fix a use-after-free
- CVE: https://ubuntu.com/security/CVE-2024-27043
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27043-media-edia-dvbdev-fix-a-use-after-free-5.15.0-82.91.patch
- From: 5.15.0-112.122
- CVE-2024-27431, CVSSv2 Score: 5.5
- Description:
cpumap: Zero-initialise xdp_rxq_info struct before running XDP program
- CVE: https://ubuntu.com/security/CVE-2024-27431
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27431-cpumap-zero-initialise-xdp-rxq-info-struct-before-running-xdp-program.patch
- From: 5.15.0-112.122
- CVE-2024-35845, CVSSv2 Score: 9.1
- Description:
wifi: iwlwifi: dbg-tlv: ensure NUL termination
- CVE: https://ubuntu.com/security/CVE-2024-35845
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-35845-wifi-iwlwifi-dbg-tlv-ensure-nul-termination.patch
- From: 5.15.0-112.122
- CVE-2024-35830, CVSSv2 Score: 5.5
- Description:
media: tc358743: register v4l2 async device only after successful setup
- CVE: https://ubuntu.com/security/CVE-2024-35830
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-35830-media-tc358743-register-v4l2-async-device-only-after-successful-setup.patch
- From: 5.15.0-112.122
- CVE-2024-35844, CVSSv2 Score: 5.5
- Description:
f2fs: compress: fix reserve_cblocks counting error when out of space
- CVE: https://ubuntu.com/security/CVE-2024-35844
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-35844-f2fs-compress-fix-reserve-cblocks-counting-error-when-out-of-space.patch
- From: 5.15.0-112.122
- CVE-2024-27432, CVSSv2 Score: 5.5
- Description:
net: ethernet: mtk_eth_soc: fix PPE hanging issue
- CVE: https://ubuntu.com/security/CVE-2024-27432
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27432-net-ethernet-mtk-eth-soc-fix-ppe-hanging-issue.patch
- From: 5.15.0-112.122
- CVE-2024-35829, CVSSv2 Score: 5.5
- Description:
drm/lima: fix a memleak in lima_heap_alloc
- CVE: https://ubuntu.com/security/CVE-2024-35829
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-35829-drm-lima-fix-a-memleak-in-lima-heap-alloc.patch
- From: 5.15.0-112.122
- CVE-2024-35828, CVSSv2 Score: 5.5
- Description:
wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer()
- CVE: https://ubuntu.com/security/CVE-2024-35828
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-35828-wifi-libertas-fix-some-memleaks-in-lbs-allocate-cmd-buffer.patch
- From: 5.15.0-112.122
- CVE-2024-27436, CVSSv2 Score: 5.5
- Description:
ALSA: usb-audio: Stop parsing channels bits when all channels are found.
- CVE: https://ubuntu.com/security/CVE-2024-27436
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27436-alsa-usb-audio-stop-parsing-channels-bits-when-all-channels-are-found.patch
- From: 5.15.0-112.122
- CVE-2024-26845, CVSSv2 Score: 4.4
- Description:
scsi: target: core: Add TMF to tmr_list handling
- CVE: https://ubuntu.com/security/CVE-2024-26845
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26845-scsi-target-core-add-tmf-to-tmr-list-handling.patch
- From: 5.15.0-112.122
- CVE-2024-26839, CVSSv2 Score: 4.4
- Description:
IB/hfi1: Fix a memleak in init_credit_return
- CVE: https://ubuntu.com/security/CVE-2024-26839
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26839-ib-hfi1-fix-a-memleak-in-init-credit-return.patch
- From: 5.15.0-112.122
- CVE-2024-26835, CVSSv2 Score: 4.7
- Description:
netfilter: nf_tables: set dormant flag on hook register failure
- CVE: https://ubuntu.com/security/CVE-2024-26835
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26835-netfilter-nf-tables-set-dormant-flag-on-hook-register-failure.patch
- From: 5.15.0-112.122
- CVE-2024-26833, CVSSv2 Score: 4.4
- Description:
drm/amd/display: Fix memory leak in dm_sw_fini()
- CVE: https://ubuntu.com/security/CVE-2024-26833
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26833-drm-amd-display-fix-memory-leak-in-dm-sw-fini.patch
- From: 5.15.0-112.122
- CVE-2024-26915, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Reset IH OVERFLOW_CLEAR bit
- CVE: https://ubuntu.com/security/CVE-2024-26915
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26915-drm-amdgpu-reset-ih-overflow-clear-bit.patch
- From: 5.15.0-112.122
- CVE-2024-26862, CVSSv2 Score: 4.7
- Description:
packet: annotate data-races around ignore_outgoing
- CVE: https://ubuntu.com/security/CVE-2024-26862
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26862-packet-annotate-data-races-around-ignore-outgoing.patch
- From: 5.15.0-112.122
- CVE-2024-26838, CVSSv2 Score: 4.4
- Description:
RDMA/irdma: Fix KASAN issue with tasklet
- CVE: https://ubuntu.com/security/CVE-2024-26838
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26838-rdma-irdma-fix-kasan-issue-with-tasklet.patch
- From: 5.15.0-112.122
- CVE-2024-26583, CVSSv2 Score:
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- Patch: skipped/CVE-2024-26583.patch
- From:
- CVE-2024-26585, CVSSv2 Score:
- Description:
Low-severity patch proven to suffer from stack-unsafety problem when patching during network load.
- Patch: skipped/CVE-2024-26585.patch
- From:
- CVE-2024-26856, CVSSv2 Score: 4.4
- Description:
net: sparx5: Fix use after free inside sparx5_del_mact_entry
- CVE: https://ubuntu.com/security/CVE-2024-26856
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26856-net-sparx5-fix-use-after-free-inside-sparx5-del-mact-entry.patch
- From: 5.15.0-112.122
- CVE-2024-26855, CVSSv2 Score: 4.4
- Description:
net: ice: Fix potential NULL pointer dereference in
- CVE: https://ubuntu.com/security/CVE-2024-26855
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26855-net-ice-fix-potential-null-pointer-dereference-in-ice-bridge-setlink.patch
- From: 5.15.0-112.122
- CVE-2024-26881, CVSSv2 Score: 5.5
- Description:
net: hns3: fix kernel crash when 1588 is received on HIP08 devices
- CVE: https://ubuntu.com/security/CVE-2024-26881
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26881-net-hns3-fix-kernel-crash-when-1588-is-received-on-hip08-devices.patch
- From: 5.15.0-112.122
- CVE-2024-26880, CVSSv2 Score: 6.3
- Description:
dm: call the resume method on internal suspend
- CVE: https://ubuntu.com/security/CVE-2024-26880
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26880-dm-call-the-resume-method-on-internal-suspend.patch
- From: 5.15.0-112.122
- CVE-2024-26877, CVSSv2 Score: 4.4
- Description:
crypto: xilinx - call finalize with bh disabled
- CVE: https://ubuntu.com/security/CVE-2024-26877
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26877-crypto-xilinx-call-finalize-with-bh-disabled.patch
- From: 5.15.0-112.122
- CVE-2024-26875, CVSSv2 Score: 6.4
- Description:
media: pvrusb2: fix uaf in pvr2_context_set_notify
- CVE: https://ubuntu.com/security/CVE-2024-26875
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26875-media-pvrusb2-fix-uaf-in-pvr2-context-set-notify.patch
- From: 5.15.0-112.122
- CVE-2024-26874, CVSSv2 Score: 4.4
- Description:
drm/mediatek: Fix a null pointer crash in
- CVE: https://ubuntu.com/security/CVE-2024-26874
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26874-drm-mediatek-fix-a-null-pointer-crash-in-mtk-drm-crtc-finish-page-flip.patch
- From: 5.15.0-112.122
- CVE-2024-26872, CVSSv2 Score: 4.4
- Description:
RDMA/srpt: Do not register event handler until srpt device is fully setup
- CVE: https://ubuntu.com/security/CVE-2024-26872
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26872-rdma-srpt-do-not-register-event-handler-until-srpt-device-is-fully-setup.patch
- From: 5.15.0-112.122
- CVE-2024-26891, CVSSv2 Score: 4.4
- Description:
PCI: Make pci_dev_is_disconnected() helper public for other drivers
- CVE: https://ubuntu.com/security/CVE-2024-26891
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26891-0001-PCI-Make-pci_dev_is_disconnected-helper-public-for-o.patch
- From: 5.15.0-112.122
- CVE-2024-26891, CVSSv2 Score: 4.4
- Description:
iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected
- CVE: https://ubuntu.com/security/CVE-2024-26891
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26891-iommu-vt-d-don-t-issue-ats-invalidation-request-when-device-is-disconnected.patch
- From: 5.15.0-112.122
- CVE-2024-26861, CVSSv2 Score: 4.1
- Description:
wireguard: receive: annotate data-race around receiving_counter.counter
- CVE: https://ubuntu.com/security/CVE-2024-26861
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26861-wireguard-receive-annotate-data-race-around-receiving-counter-counter.patch
- From: 5.15.0-112.122
- CVE-2024-26859, CVSSv2 Score: 4.1
- Description:
net/bnx2x: Prevent access to a freed page in page_pool
- CVE: https://ubuntu.com/security/CVE-2024-26859
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26859-net-bnx2x-prevent-access-to-a-freed-page-in-page-pool.patch
- From: 5.15.0-112.122
- CVE-2024-27051, CVSSv2 Score: 5.5
- Description:
cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's
- CVE: https://ubuntu.com/security/CVE-2024-27051
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27051-cpufreq-brcmstb-avs-cpufreq-add-check-for-cpufreq-cpu-get-s.patch
- From: 5.15.0-112.122
- CVE-2024-27052, CVSSv2 Score: 5.5
- Description:
wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work
- CVE: https://ubuntu.com/security/CVE-2024-27052
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27052-wifi-rtl8xxxu-add-cancel-work-sync-for-c2hcmd-work.patch
- From: 5.15.0-112.122
- CVE-2024-27053, CVSSv2 Score: 5.5
- Description:
wifi: wilc1000: fix RCU usage in connect path
- CVE: https://ubuntu.com/security/CVE-2024-27053
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27053-wifi-wilc1000-fix-rcu-usage-in-connect-path-5.15.0-84.93.patch
- From: 5.15.0-112.122
- CVE-2024-27054, CVSSv2 Score:
- Description:
Out of scope: s390 architecture isn't supported
- Patch: skipped/CVE-2024-27054.patch
- From:
- CVE-2024-27065, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: do not compare internal table flags on
- CVE: https://ubuntu.com/security/CVE-2024-27065
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27065-netfilter-nf-tables-do-not-compare-internal-table-flags-on.patch
- From: 5.15.0-112.122
- CVE-2024-27073, CVSSv2 Score: 5.5
- Description:
media: ttpci: fix two memleaks in budget_av_attach
- CVE: https://ubuntu.com/security/CVE-2024-27073
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27073-media-ttpci-fix-two-memleaks-in-budget-av-attach.patch
- From: 5.15.0-112.122
- CVE-2024-27074, CVSSv2 Score: 5.5
- Description:
media: go7007: fix a memleak in go7007_load_encoder
- CVE: https://ubuntu.com/security/CVE-2024-27074
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27074-media-go7007-fix-a-memleak-in-go7007-load-encoder.patch
- From: 5.15.0-112.122
- CVE-2024-27075, CVSSv2 Score: 5.5
- Description:
media: dvb-frontends: avoid stack overflow warnings with
- CVE: https://ubuntu.com/security/CVE-2024-27075
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27075-media-dvb-frontends-avoid-stack-overflow-warnings-with.patch
- From: 5.15.0-112.122
- CVE-2024-27076, CVSSv2 Score: 5.5
- Description:
media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak
- CVE: https://ubuntu.com/security/CVE-2024-27076
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27076-media-imx-csc-scaler-fix-v4l2-ctrl-handler-memory-leak.patch
- From: 5.15.0-112.122
- CVE-2024-27077, CVSSv2 Score: 5.5
- Description:
media: v4l2-mem2mem: fix a memleak in
- CVE: https://ubuntu.com/security/CVE-2024-27077
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27077-media-v4l2-mem2mem-fix-a-memleak-in.patch
- From: 5.15.0-112.122
- CVE-2024-27078, CVSSv2 Score: 5.5
- Description:
media: v4l2-tpg: fix some memleaks in tpg_alloc
- CVE: https://ubuntu.com/security/CVE-2024-27078
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27078-media-v4l2-tpg-fix-some-memleaks-in-tpg-alloc.patch
- From: 5.15.0-112.122
- CVE-2024-27388, CVSSv2 Score: 5.5
- Description:
SUNRPC: fix some memleaks in gssx_dec_option_array
- CVE: https://ubuntu.com/security/CVE-2024-27388
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-27388-sunrpc-fix-some-memleaks-in-gssx-dec-option-array.patch
- From: 5.15.0-112.122
- CVE-2024-26733, CVSSv2 Score: 5.5
- Description:
arp: Prevent overflow in arp_req_get().
- CVE: https://ubuntu.com/security/CVE-2024-26733
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26733-arp-prevent-overflow-in-arp-req-get.patch
- From: 5.15.0-112.122
- CVE-2024-26737, CVSSv2 Score:
- Description:
eBPF: low score UAF with CONFIG_BPF_UNPRIV_DEFAULT_OFF=y by default but needs complex adaptation.
- Patch: skipped/CVE-2024-26737.patch
- From:
- CVE-2024-21823, CVSSv2 Score: 7.5
- Description:
VFIO: Add the SPR_DSA and SPR_IAX devices to the denylist
- CVE: https://ubuntu.com/security/CVE-2024-21823
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-21823-VFIO-Add-the-SPR_DSA-and-SPR_IAX-devices-to-the-denylist.patch
- From: 5.15.0-112.122
- CVE-2024-26897, CVSSv2 Score:
- Description:
WiFi - Complex adaptation required.
- Patch: skipped/CVE-2024-26897.patch
- From:
- CVE-2024-26846, CVSSv2 Score: 4.4
- Description:
nvme-fc: do not wait in vain when unloading module
- CVE: https://ubuntu.com/security/CVE-2024-26846
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26846-nvme-fc-do-not-wait-in-vain-when-unloading-module.patch
- From: 5.15.0-112.122
- CVE-2024-26846, CVSSv2 Score: 4.4
- Description:
nvme-fc: do not wait in vain when unloading module
- CVE: https://ubuntu.com/security/CVE-2024-26846
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26846-nvme-fc-do-not-wait-in-vain-when-unloading-module-kpatch.patch
- From: 5.15.0-112.122
- CVE-2024-26857, CVSSv2 Score: 5.5
- Description:
geneve: make sure to pull inner header in geneve_rx()
- CVE: https://ubuntu.com/security/CVE-2024-26857
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26857-geneve-make-sure-to-pull-inner-header-in-geneve-rx.patch
- From: 5.15.0-112.122
- CVE-2024-26879, CVSSv2 Score: 4.4
- Description:
clk: meson: Add missing clocks to axg_clk_regmaps
- CVE: https://ubuntu.com/security/CVE-2024-26879
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26879-clk-meson-add-missing-clocks-to-axg-clk-regmaps.patch
- From: 5.15.0-112.122
- CVE-2024-26879, CVSSv2 Score: 4.4
- Description:
clk: meson: Add missing clocks to axg_clk_regmaps
- CVE: https://ubuntu.com/security/CVE-2024-26879
- Patch: ubuntu-jammy/5.15.0-112.122/CVE-2024-26879-clk-meson-add-missing-clocks-to-axg-clk-regmaps-kpatch.patch
- From: 5.15.0-112.122
- CVE-2024-26924, CVSSv2 Score: 5.5
- Description:
netfilter: nft_set_pipapo: do not free live element
- CVE: https://ubuntu.com/security/CVE-2024-26924
- Patch: ubuntu-jammy/5.15.0-113.123/CVE-2024-26924-netfilter-nft-set-pipapo-do-not-free-live-element-old.patch
- From: 5.15.0-113.123
- CVE-2024-26828, CVSSv2 Score: 6.7
- Description:
cifs: fix underflow in parse_server_interfaces()
- CVE: https://ubuntu.com/security/CVE-2024-26828
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26828-cifs-fix-underflow-in-parse_server_interfaces.patch
- From: 5.15.0-116.126
- CVE-2024-24857 CVE-2024-24858 CVE-2024-24859, CVSSv2 Score: 6.8
- Description:
Bluetooth: Fix TOCTOU in HCI debugfs implementation
- CVE: https://ubuntu.com/security/CVE-2024-24857
- CVE: https://ubuntu.com/security/CVE-2024-24858
- CVE: https://ubuntu.com/security/CVE-2024-24859
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-24857-Bluetooth-Fix-TOCTOU-in-HCI-debugfs-implementation.patch
- From: 5.15.0-116.126
- CVE-2024-26934, CVSSv2 Score: 7.8
- Description:
USB: core: Fix deadlock in usb_deauthorize_interface()
- CVE: https://ubuntu.com/security/CVE-2024-26934
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26934-USB-core-Fix-deadlock-in-usb_deauthorize_interface.patch
- From: 5.15.0-116.126
- CVE-2024-23307, CVSSv2 Score: 7.8
- Description:
md/raid5: fix atomicity violation in raid5_cache_count
- CVE: https://ubuntu.com/security/CVE-2024-23307
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-23307-md-raid5-fix-atomicity-violation-in-raid5_cache_count.patch
- From: 5.15.0-116.126
- CVE-2024-26923, CVSSv2 Score: 7.0
- Description:
af_unix: Do not use atomic ops for unix_sk(sk)->inflight
- CVE: https://ubuntu.com/security/CVE-2024-26923
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26923-01-af_unix-Do-not-use-atomic-ops-for-unix_sk-sk-infligh.patch
- From: 5.15.0-116.126
- CVE-2024-26923, CVSSv2 Score: 7.0
- Description:
af_unix: Fix garbage collector racing against connect()
- CVE: https://ubuntu.com/security/CVE-2024-26923
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26923-02-af_unix-Fix-garbage-collector-racing-against-connect.patch
- From: 5.15.0-116.126
- CVE-2024-24861, CVSSv2 Score: 6.3
- Description:
media: xc4000: Fix atomicity violation in xc4000_get_frequency
- CVE: https://ubuntu.com/security/CVE-2024-24861
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-24861-media-xc4000-Fix-atomicity-violation-in-xc4000_get_frequency.patch
- From: 5.15.0-116.126
- CVE-2024-26929, CVSSv2 Score: 7.8
- Description:
scsi: qla2xxx: Fix double free of fcport
- CVE: https://ubuntu.com/security/CVE-2024-26929
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26929-scsi-qla2xxx-Fix-double-free-of-fcport.patch
- From: 5.15.0-116.126
- CVE-2022-38096, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Fix possible null pointer derefence with invalid contexts
- CVE: https://ubuntu.com/security/CVE-2022-38096
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2022-38096-drm-vmwgfx-Fix-possible-null-pointer-derefence-with-invalid-contexts.patch
- From: 5.15.0-116.126
- CVE-2024-27020, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()
- CVE: https://ubuntu.com/security/CVE-2024-27020
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27020-netfilter-nf_tables-Fix-potential-data-race-in-__nft_obj_type_get-105.patch
- From: 5.15.0-116.126
- CVE-2024-27020 CVE-2024-27019, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
- CVE: https://ubuntu.com/security/CVE-2024-27020
- CVE: https://ubuntu.com/security/CVE-2024-27019
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27020-netfilter-nf_tables-Fix-potential-data-race-in-__nft_expr_type_get.patch
- From: 5.15.0-116.126
- CVE-2023-52699, CVSSv2 Score: 5.5
- Description:
sysv: don't call sb_bread() with pointers_lock held
- CVE: https://ubuntu.com/security/CVE-2023-52699
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2023-52699-sysv-dont-call-sb_bread-with-pointers_lock-held.patch
- From: 5.15.0-116.126
- CVE-2024-25739, CVSSv2 Score: 5.5
- Description:
ubi: Check for too small LEB size in VTBL code
- CVE: https://ubuntu.com/security/CVE-2024-25739
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-25739-ubi-Check-for-too-small-LEB-size-in-VTBL-code.patch
- From: 5.15.0-116.126
- CVE-2024-26642, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: disallow anonymous set with timeout flag
- CVE: https://ubuntu.com/security/CVE-2024-26642
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26642-netfilter-nf_tables-disallow-anonymous-set-with-timeout-flag.patch
- From: 5.15.0-116.126
- CVE-2024-26687, CVSSv2 Score: 5.5
- Description:
xen/events: close evtchn after mapping cleanup
- CVE: https://ubuntu.com/security/CVE-2024-26687
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26687-xen-events-close-evtchn-after-mapping-cleanup.patch
- From: 5.15.0-116.126
- CVE-2024-26817, CVSSv2 Score: 5.5
- Description:
amdkfd: use calloc instead of kzalloc to avoid integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-26817
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26817-amdkfd-use-calloc-instead-of-kzalloc-to-avoid-integer-overflow.patch
- From: 5.15.0-116.126
- CVE-2024-35910, CVSSv2 Score:
- Description:
tcp_close is sleepable and called from kthread, which may prevent patching and unpatchng.
- Patch: skipped/CVE-2024-35910.patch
- From:
- CVE-2023-52880, CVSSv2 Score: 5.5
- Description:
tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc
- CVE: https://ubuntu.com/security/CVE-2023-52880
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2023-52880-tty-n_gsm-require-CAP_NET_ADMIN-to-attach-N_GSM0710-ldisc.patch
- From: 5.15.0-116.126
- CVE-2024-26629, CVSSv2 Score: 5.5
- Description:
nfsd: fix RELEASE_LOCKOWNER
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26629
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26629-nfsd-fix-RELEASE_LOCKOWNER.patch
- From: 5.10.221-1
- CVE-2024-26629, CVSSv2 Score: 5.5
- Description:
nfsd: don't take fi_lock in nfsd_break_deleg_cb()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26629
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26629-nfsd-dont-take-fi_lock-in-nfsd_break_deleg_cb.patch
- From: 5.10.221-1
- CVE-2024-26958, CVSSv2 Score: 5.5
- Description:
nfs: fix UAF in direct writes
- CVE: https://ubuntu.com/security/CVE-2024-26958
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26958-nfs-fix-uaf-in-direct-writes.patch
- From: 5.15.0-116.126
- CVE-2024-26957, CVSSv2 Score:
- Description:
Out of scope: IBM System/390 architecture isn't supported for current kernel
- Patch: skipped/CVE-2024-26957.patch
- From:
- CVE-2024-26956, CVSSv2 Score: 5.5
- Description:
nilfs2: fix failure to detect DAT corruption in btree and
- CVE: https://ubuntu.com/security/CVE-2024-26956
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26956-nilfs2-fix-failure-to-detect-dat-corruption-in-btree-and-direct-mappings.patch
- From: 5.15.0-116.126
- CVE-2024-26955, CVSSv2 Score: 5.5
- Description:
nilfs2: prevent kernel bug at submit_bh_wbc()
- CVE: https://ubuntu.com/security/CVE-2024-26955
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26955-nilfs2-prevent-kernel-bug-at-submit-bh-wbc.patch
- From: 5.15.0-116.126
- CVE-2024-26951, CVSSv2 Score: 5.5
- Description:
wireguard: netlink: check for dangling peer via is_dead instead of empty list
- CVE: https://ubuntu.com/security/CVE-2024-26951
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26951-wireguard-netlink-check-for-dangling-peer-via-is-dead-instead-of-empty-list.patch
- From: 5.15.0-116.126
- CVE-2024-26950, CVSSv2 Score: 5.5
- Description:
wireguard: netlink: access device through ctx instead of peer
- CVE: https://ubuntu.com/security/CVE-2024-26950
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26950-wireguard-netlink-access-device-through-ctx-instead-of-peer.patch
- From: 5.15.0-116.126
- CVE-2024-26937, CVSSv2 Score: 5.5
- Description:
drm/i915/gt: Reset queue_priority_hint on parking
- CVE: https://ubuntu.com/security/CVE-2024-26937
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26937-drm-i915-gt-reset-queue-priority-hint-on-parking.patch
- From: 5.15.0-116.126
- CVE-2024-26935, CVSSv2 Score: 5.5
- Description:
scsi: core: Fix unremoved procfs host directory regression
- CVE: https://ubuntu.com/security/CVE-2024-26935
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26935-scsi-core-fix-unremoved-procfs-host-directory-regression.patch
- From: 5.15.0-116.126
- CVE-2024-26931, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Fix command flush on cable pull
- CVE: https://ubuntu.com/security/CVE-2024-26931
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26931-scsi-qla2xxx-fix-command-flush-on-cable-pull.patch
- From: 5.15.0-116.126
- CVE-2024-26974, CVSSv2 Score: 5.5
- Description:
crypto: qat - fix double free during reset (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-26974
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26974-01-crypto-qat-fix-double-free-during-reset-5.15.0-113.123.patch
- From: 5.15.0-116.126
- CVE-2024-26974, CVSSv2 Score: 5.5
- Description:
crypto: qat - resolve race condition during AER recovery
- CVE: https://ubuntu.com/security/CVE-2024-26974
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26974-crypto-qat-resolve-race-condition-during-aer-recovery.patch
- From: 5.15.0-116.126
- CVE-2024-26960, CVSSv2 Score: 5.5
- Description:
mm: swap: fix race between free_swap_and_cache() and
- CVE: https://ubuntu.com/security/CVE-2024-26960
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26960-mm-swap-fix-race-between-free-swap-and-cache-and-swapoff-5.15.0-113.123.patch
- From: 5.15.0-116.126
- CVE-2024-26977, CVSSv2 Score: 5.5
- Description:
pci_iounmap(): Fix MMIO mapping leak
- CVE: https://ubuntu.com/security/CVE-2024-26977
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26977-pci-iounmap-fix-mmio-mapping-leak.patch
- From: 5.15.0-116.126
- CVE-2024-26976, CVSSv2 Score: 7.0
- Description:
KVM: Always flush async #PF workqueue when vCPU is being destroyed
- CVE: https://ubuntu.com/security/CVE-2024-26976
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26976-kvm-always-flush-async-pf-workqueue-when-vcpu-is-being-destroyed.patch
- From: 5.15.0-116.126
- CVE-2024-26973, CVSSv2 Score: 5.5
- Description:
fat: fix uninitialized field in nostale filehandles
- CVE: https://ubuntu.com/security/CVE-2024-26973
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26973-fat-fix-uninitialized-field-in-nostale-filehandles.patch
- From: 5.15.0-116.126
- CVE-2024-26964, CVSSv2 Score: 5.5
- Description:
usb: xhci: Add error handling in xhci_map_urb_for_dma
- CVE: https://ubuntu.com/security/CVE-2024-26964
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26964-usb-xhci-add-error-handling-in-xhci-map-urb-for-dma.patch
- From: 5.15.0-116.126
- CVE-2024-27001, CVSSv2 Score: 5.5
- Description:
comedi: vmk80xx: fix incomplete endpoint checking
- CVE: https://ubuntu.com/security/CVE-2024-27001
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27001-comedi-vmk80xx-fix-incomplete-endpoint-checking.patch
- From: 5.15.0-116.126
- CVE-2024-26999, CVSSv2 Score: 5.5
- Description:
serial/pmac_zilog: Remove flawed mitigation for rx irq flood
- CVE: https://ubuntu.com/security/CVE-2024-26999
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26999-serial-pmac-zilog-remove-flawed-mitigation-for-rx-irq-flood.patch
- From: 5.15.0-116.126
- CVE-2024-26996, CVSSv2 Score: 5.5
- Description:
usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error
- CVE: https://ubuntu.com/security/CVE-2024-26996
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26996-usb-gadget-f-ncm-fix-uaf-ncm-object-at-re-bind-after-usb-ep-transport-error.patch
- From: 5.15.0-116.126
- CVE-2024-26994, CVSSv2 Score: 5.9
- Description:
speakup: Avoid crash on very long word
- CVE: https://ubuntu.com/security/CVE-2024-26994
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26994-speakup-avoid-crash-on-very-long-word.patch
- From: 5.15.0-116.126
- CVE-2024-26993, CVSSv2 Score: 5.5
- Description:
fs: sysfs: Fix reference leak in sysfs_break_active_protection()
- CVE: https://ubuntu.com/security/CVE-2024-26993
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26993-fs-sysfs-fix-reference-leak-in-sysfs-break-active-protection.patch
- From: 5.15.0-116.126
- CVE-2024-26989, CVSSv2 Score: 5.5
- Description:
arm64: hibernate: Fix level3 translation fault in swsusp_save()
- CVE: https://ubuntu.com/security/CVE-2024-26989
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26989-arm64-hibernate-fix-level3-translation-fault-in-swsusp-save.patch
- From: 5.15.0-116.126
- CVE-2024-26988, CVSSv2 Score:
- Description:
Out of scope as the patch is for vmlinux init sections which are discarded after the boot
- Patch: skipped/CVE-2024-26988.patch
- From:
- CVE-2024-26984, CVSSv2 Score: 5.5
- Description:
nouveau: fix instmem race condition around ptr stores
- CVE: https://ubuntu.com/security/CVE-2024-26984
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26984-nouveau-fix-instmem-race-condition-around-ptr-stores.patch
- From: 5.15.0-116.126
- CVE-2024-27000, CVSSv2 Score: 5.5
- Description:
serial: mxs-auart: add spinlock around changing cts state
- CVE: https://ubuntu.com/security/CVE-2024-27000
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27000-serial-mxs-auart-add-spinlock-around-changing-cts-state.patch
- From: 5.15.0-116.126
- CVE-2024-27059, CVSSv2 Score: 5.5
- Description:
USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
- CVE: https://ubuntu.com/security/CVE-2024-27059
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27059-usb-usb-storage-prevent-divide-by-0-error-in-isd200-ata-command.patch
- From: 5.15.0-116.126
- CVE-2024-27393, CVSSv2 Score: 5.5
- Description:
xen-netfront: Add missing skb_mark_for_recycle
- CVE: https://ubuntu.com/security/CVE-2024-27393
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27393-xen-netfront-add-missing-skb-mark-for-recycle.patch
- From: 5.15.0-116.126
- CVE-2024-27015, CVSSv2 Score: 5.5
- Description:
netfilter: flowtable: incorrect pppoe tuple
- CVE: https://ubuntu.com/security/CVE-2024-27015
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27015-netfilter-flowtable-incorrect-pppoe-tuple.patch
- From: 5.15.0-116.126
- CVE-2024-27013, CVSSv2 Score: 5.5
- Description:
tun: limit printing rate when illegal packet received by tun dev
- CVE: https://ubuntu.com/security/CVE-2024-27013
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27013-tun-limit-printing-rate-when-illegal-packet-received-by-tun-dev.patch
- From: 5.15.0-116.126
- CVE-2024-27009, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- Patch: skipped/CVE-2024-27009.patch
- From:
- CVE-2024-27008, CVSSv2 Score: 5.5
- Description:
drm: nv04: Fix out of bounds access
- CVE: https://ubuntu.com/security/CVE-2024-27008
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27008-drm-nv04-fix-out-of-bounds-access.patch
- From: 5.15.0-116.126
- CVE-2024-27396, CVSSv2 Score: 5.5
- Description:
net: gtp: Fix Use-After-Free in gtp_dellink
- CVE: https://ubuntu.com/security/CVE-2024-27396
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27396-net-gtp-fix-use-after-free-in-gtp-dellink.patch
- From: 5.15.0-116.126
- CVE-2024-27395, CVSSv2 Score: 5.5
- Description:
net: openvswitch: Fix Use-After-Free in ovs_ct_exit
- CVE: https://ubuntu.com/security/CVE-2024-27395
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27395-net-openvswitch-fix-use-after-free-in-ovs-ct-exit.patch
- From: 5.15.0-116.126
- CVE-2024-35809, CVSSv2 Score: 5.5
- Description:
PCI: Drop pci_device_remove() test of pci_dev->driver (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-35809
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35809-01-pci-drop-pci-device-remove-test-of-pci-dev-driver-5.15.0-113.123.patch
- From: 5.15.0-116.126
- CVE-2024-35809, CVSSv2 Score: 5.5
- Description:
PCI/PM: Drain runtime-idle callbacks before driver removal
- CVE: https://ubuntu.com/security/CVE-2024-35809
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35809-pci-pm-drain-runtime-idle-callbacks-before-driver-removal.patch
- From: 5.15.0-116.126
- CVE-2024-35806, CVSSv2 Score: 5.5
- Description:
soc: fsl: qbman: Always disable interrupts when taking cgr_lock
- CVE: https://ubuntu.com/security/CVE-2024-35806
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35806-soc-fsl-qbman-always-disable-interrupts-when-taking-cgr-lock.patch
- From: 5.15.0-116.126
- CVE-2024-35805, CVSSv2 Score: 5.5
- Description:
dm snapshot: fix lockup in dm_exception_table_exit
- CVE: https://ubuntu.com/security/CVE-2024-35805
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35805-dm-snapshot-fix-lockup-in-dm-exception-table-exit.patch
- From: 5.15.0-116.126
- CVE-2024-35791, CVSSv2 Score: 5.5
- Description:
KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()
- CVE: https://ubuntu.com/security/CVE-2024-35791
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35791-kvm-svm-flush-pages-under-kvm-lock-to-fix-uaf-in-svm-register-enc-region.patch
- From: 5.15.0-116.126
- CVE-2024-35789, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes
- CVE: https://ubuntu.com/security/CVE-2024-35789
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35789-wifi-mac80211-check-clear-fast-rx-for-non-4addr-sta-vlan-changes.patch
- From: 5.15.0-116.126
- CVE-2024-35796, CVSSv2 Score: 5.5
- Description:
net: ll_temac: platform_get_resource replaced by wrong function
- CVE: https://ubuntu.com/security/CVE-2024-35796
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35796-net-ll-temac-platform-get-resource-replaced-by-wrong-function.patch
- From: 5.15.0-116.126
- CVE-2024-35817, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag
- CVE: https://ubuntu.com/security/CVE-2024-35817
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35817-drm-amdgpu-amdgpu-ttm-gart-bind-set-gtt-bound-flag.patch
- From: 5.15.0-116.126
- CVE-2024-35823, CVSSv2 Score: 5.5
- Description:
vt: fix unicode buffer corruption when deleting characters
- CVE: https://ubuntu.com/security/CVE-2024-35823
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35823-vt-fix-unicode-buffer-corruption-when-deleting-characters.patch
- From: 5.15.0-116.126
- CVE-2024-35815, CVSSv2 Score: 5.5
- Description:
fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion
- CVE: https://ubuntu.com/security/CVE-2024-35815
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35815-fs-aio-check-iocb-aio-rw-before-the-struct-aio-kiocb-conversion.patch
- From: 5.15.0-116.126
- CVE-2024-35822, CVSSv2 Score: 5.5
- Description:
usb: udc: remove warning when queue disabled ep
- CVE: https://ubuntu.com/security/CVE-2024-35822
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35822-usb-udc-remove-warning-when-queue-disabled-ep.patch
- From: 5.15.0-116.126
- CVE-2024-35849, CVSSv2 Score: 5.5
- Description:
btrfs: fix information leak in btrfs_ioctl_logical_to_ino()
- CVE: https://ubuntu.com/security/CVE-2024-35849
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35849-btrfs-fix-information-leak-in-btrfs-ioctl-logical-to-ino.patch
- From: 5.15.0-116.126
- CVE-2024-35847, CVSSv2 Score: 5.5
- Description:
irqchip/gic-v3-its: Prevent double free on error
- CVE: https://ubuntu.com/security/CVE-2024-35847
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35847-irqchip-gic-v3-its-prevent-double-free-on-error.patch
- From: 5.15.0-116.126
- CVE-2024-35879, CVSSv2 Score: 5.5
- Description:
of: dynamic: Synchronize of_changeset_destroy() with the devlink removals
- CVE: https://ubuntu.com/security/CVE-2024-35879
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35879-of-dynamic-synchronize-of-changeset-destroy-with-the-devlink-removals.patch
- From: 5.15.0-116.126
- CVE-2024-35871, CVSSv2 Score:
- Description:
Out of scope as the patch is for riscv arch only, x86_64 is not affected
- Patch: skipped/CVE-2024-35871.patch
- From:
- CVE-2024-35872, CVSSv2 Score: 5.5
- Description:
mm/secretmem: fix GUP-fast succeeding on secretmem folios
- CVE: https://ubuntu.com/security/CVE-2024-35872
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35872-mm-secretmem-fix-gup-fast-succeeding-on-secretmem-folios.patch
- From: 5.15.0-116.126
- CVE-2024-35877, CVSSv2 Score: 5.5
- Description:
x86/mm/pat: fix VM_PAT handling in COW mappings
- CVE: https://ubuntu.com/security/CVE-2024-35877
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35877-x86-mm-pat-fix-vm-pat-handling-in-cow-mappings.patch
- From: 5.15.0-116.126
- CVE-2024-35857, CVSSv2 Score: 5.5
- Description:
icmp: prevent possible NULL dereferences from icmp_build_probe()
- CVE: https://ubuntu.com/security/CVE-2024-35857
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35857-icmp-prevent-possible-null-dereferences-from-icmp-build-probe.patch
- From: 5.15.0-116.126
- CVE-2024-35855, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix possible use-after-free during
- CVE: https://ubuntu.com/security/CVE-2024-35855
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35855-mlxsw-spectrum-acl-tcam-fix-possible-use-after-free-during-activity-update.patch
- From: 5.15.0-116.126
- CVE-2024-35854, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix possible use-after-free during
- CVE: https://ubuntu.com/security/CVE-2024-35854
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35854-mlxsw-spectrum-acl-tcam-fix-possible-use-after-free-during-rehash.patch
- From: 5.15.0-116.126
- CVE-2024-35853, CVSSv2 Score: 6.4
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak during rehash
- CVE: https://ubuntu.com/security/CVE-2024-35853
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35853-mlxsw-spectrum-acl-tcam-fix-memory-leak-during-rehash.patch
- From: 5.15.0-116.126
- CVE-2024-35852, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix memory leak when canceling
- CVE: https://ubuntu.com/security/CVE-2024-35852
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35852-mlxsw-spectrum-acl-tcam-fix-memory-leak-when-canceling-rehash-work.patch
- From: 5.15.0-116.126
- CVE-2024-35898, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
- CVE: https://ubuntu.com/security/CVE-2024-35898
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35898-netfilter-nf-tables-fix-potential-data-race-in-nft-flowtable-type-get.patch
- From: 5.15.0-116.126
- CVE-2024-35896, CVSSv2 Score: 5.5
- Description:
netfilter: validate user input for expected length
- CVE: https://ubuntu.com/security/CVE-2024-35896
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35896-netfilter-validate-user-input-for-expected-length.patch
- From: 5.15.0-116.126
- CVE-2024-35895, CVSSv2 Score: 5.5
- Description:
bpf, sockmap: Prevent lock inversion deadlock in map delete
- CVE: https://ubuntu.com/security/CVE-2024-35895
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35895-bpf-sockmap-prevent-lock-inversion-deadlock-in-map-delete-elem.patch
- From: 5.15.0-116.126
- CVE-2024-35893, CVSSv2 Score: 5.5
- Description:
net/sched: act_skbmod: prevent kernel-infoleak
- CVE: https://ubuntu.com/security/CVE-2024-35893
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35893-net-sched-act-skbmod-prevent-kernel-infoleak.patch
- From: 5.15.0-116.126
- CVE-2024-35888, CVSSv2 Score: 5.5
- Description:
erspan: make sure erspan_base_hdr is present in skb->head
- CVE: https://ubuntu.com/security/CVE-2024-35888
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35888-erspan-make-sure-erspan-base-hdr-is-present-in-skb-head.patch
- From: 5.15.0-116.126
- CVE-2024-35886, CVSSv2 Score: 5.5
- Description:
ipv6: Fix infinite recursion in fib6_dump_done().
- CVE: https://ubuntu.com/security/CVE-2024-35886
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35886-ipv6-fix-infinite-recursion-in-fib6-dump-done.patch
- From: 5.15.0-116.126
- CVE-2024-35885, CVSSv2 Score: 5.5
- Description:
mlxbf_gige: stop interface during shutdown
- CVE: https://ubuntu.com/security/CVE-2024-35885
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35885-mlxbf-gige-stop-interface-during-shutdown.patch
- From: 5.15.0-116.126
- CVE-2024-35890, CVSSv2 Score: 5.5
- Description:
gro: fix ownership transfer
- CVE: https://ubuntu.com/security/CVE-2024-35890
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35890-gro-fix-ownership-transfer.patch
- From: 5.15.0-116.126
- CVE-2024-35912, CVSSv2 Score: 5.5
- Description:
iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-35912
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35912-01-iwlwifi-mvm-rfi-use-kmemdup-to-replace-kzalloc-memcpy-5.15.0-113.123.patch
- From: 5.15.0-116.126
- CVE-2024-35912, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: rfi: fix potential response leaks
- CVE: https://ubuntu.com/security/CVE-2024-35912
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35912-wifi-iwlwifi-mvm-rfi-fix-potential-response-leaks.patch
- From: 5.15.0-116.126
- CVE-2024-35915, CVSSv2 Score: 5.5
- Description:
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
- CVE: https://ubuntu.com/security/CVE-2024-35915
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35915-nfc-nci-fix-uninit-value-in-nci-dev-up-and-nci-ntf-packet.patch
- From: 5.15.0-116.126
- CVE-2024-35902, CVSSv2 Score: 5.5
- Description:
net/rds: fix possible cp null dereference
- CVE: https://ubuntu.com/security/CVE-2024-35902
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35902-net-rds-fix-possible-cp-null-dereference.patch
- From: 5.15.0-116.126
- CVE-2024-35925, CVSSv2 Score: 5.5
- Description:
block: prevent division by zero in blk_rq_stat_sum()
- CVE: https://ubuntu.com/security/CVE-2024-35925
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35925-block-prevent-division-by-zero-in-blk-rq-stat-sum.patch
- From: 5.15.0-116.126
- CVE-2024-35922, CVSSv2 Score: 5.5
- Description:
fbmon: prevent division by zero in fb_videomode_from_videomode()
- CVE: https://ubuntu.com/security/CVE-2024-35922
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35922-fbmon-prevent-division-by-zero-in-fb-videomode-from-videomode.patch
- From: 5.15.0-116.126
- CVE-2024-35918, CVSSv2 Score:
- Description:
It is not possible to fix this vulnerability using kernel livepatching because it lies below the system call level.
- Patch: skipped/CVE-2024-35918.patch
- From:
- CVE-2024-35901, CVSSv2 Score:
- Description:
Out of scope as the patch that introduces the vulnerability 2fbbd712baf1 (net: mana: Enable RX path to handle various MTU sizes) is missing from these kernels
- Patch: skipped/CVE-2024-35901.patch
- From:
- CVE-2024-35944, CVSSv2 Score: 5.5
- Description:
VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()
- CVE: https://ubuntu.com/security/CVE-2024-35944
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35944-vmci-fix-memcpy-run-time-warning-in-dg-dispatch-as-host.patch
- From: 5.15.0-116.126
- CVE-2024-35944, CVSSv2 Score: 5.5
- Description:
VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler()
- CVE: https://ubuntu.com/security/CVE-2024-35944
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35944-0001-VMCI-Fix-possible-memcpy-run-time-warning-in-vmci_da.patch
- From: 5.15.0-116.126
- CVE-2024-35940, CVSSv2 Score: 5.5
- Description:
pstore/zone: Add a null pointer check to the psz_kmsg_read
- CVE: https://ubuntu.com/security/CVE-2024-35940
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35940-pstore-zone-add-a-null-pointer-check-to-the-psz-kmsg-read.patch
- From: 5.15.0-116.126
- CVE-2024-35936, CVSSv2 Score: 5.5
- Description:
btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()
- CVE: https://ubuntu.com/security/CVE-2024-35936
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35936-btrfs-handle-chunk-tree-lookup-error-in-btrfs-relocate-sys-chunks.patch
- From: 5.15.0-116.126
- CVE-2024-35935, CVSSv2 Score: 5.5
- Description:
btrfs: send: handle path ref underflow in header iterate_inode_ref()
- CVE: https://ubuntu.com/security/CVE-2024-35935
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35935-btrfs-send-handle-path-ref-underflow-in-header-iterate-inode-ref.patch
- From: 5.15.0-116.126
- CVE-2024-35934, CVSSv2 Score: 5.5
- Description:
net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()
- CVE: https://ubuntu.com/security/CVE-2024-35934
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35934-net-smc-reduce-rtnl-pressure-in-smc-pnet-create-pnetids-list.patch
- From: 5.15.0-116.126
- CVE-2024-35933, CVSSv2 Score: 5.5
- Description:
Bluetooth: btintel: Fix null ptr deref in btintel_read_version
- CVE: https://ubuntu.com/security/CVE-2024-35933
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35933-bluetooth-btintel-fix-null-ptr-deref-in-btintel-read-version.patch
- From: 5.15.0-116.126
- CVE-2024-35930, CVSSv2 Score: 5.5
- Description:
scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()
- CVE: https://ubuntu.com/security/CVE-2024-35930
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35930-scsi-lpfc-fix-possible-memory-leak-in-lpfc-rcv-padisc.patch
- From: 5.15.0-116.126
- CVE-2024-35950, CVSSv2 Score: 5.5
- Description:
drm/client: Fully protect modes[] with dev->mode_config.mutex
- CVE: https://ubuntu.com/security/CVE-2024-35950
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35950-drm-client-fully-protect-modes-with-dev-mode-config-mutex.patch
- From: 5.15.0-116.126
- CVE-2024-35938, CVSSv2 Score:
- Description:
wifi:ath11k, low score CVE that needs complex adaptation but decreasing MHI Bus' buf-len isn't a typical security fix.
- Patch: skipped/CVE-2024-35938.patch
- From:
- CVE-2024-35982, CVSSv2 Score: 5.5
- Description:
batman-adv: Avoid infinite loop trying to resize local TT
- CVE: https://ubuntu.com/security/CVE-2024-35982
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35982-batman-adv-avoid-infinite-loop-trying-to-resize-local-tt.patch
- From: 5.15.0-116.126
- CVE-2024-35978, CVSSv2 Score: 5.5
- Description:
Bluetooth: Fix memory leak in hci_req_sync_complete()
- CVE: https://ubuntu.com/security/CVE-2024-35978
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35978-bluetooth-fix-memory-leak-in-hci-req-sync-complete.patch
- From: 5.15.0-116.126
- CVE-2024-35976, CVSSv2 Score: 6.7
- Description:
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
- CVE: https://ubuntu.com/security/CVE-2024-35976
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35976-xsk-validate-user-input-for-xdp-umem-completion-fill-ring.patch
- From: 5.15.0-116.126
- CVE-2024-35973, CVSSv2 Score: 5.5
- Description:
geneve: fix header validation in geneve[6]_xmit_skb
- CVE: https://ubuntu.com/security/CVE-2024-35973
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35973-geneve-fix-header-validation-in-geneve-6-xmit-skb.patch
- From: 5.15.0-116.126
- CVE-2024-35970, CVSSv2 Score:
- Description:
Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem..
- Patch: skipped/CVE-2024-35970.patch
- From:
- CVE-2024-35969, CVSSv2 Score: 5.5
- Description:
ipv6: fix race condition between ipv6_get_ifaddr and
- CVE: https://ubuntu.com/security/CVE-2024-35969
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35969-ipv6-fix-race-condition-between-ipv6-get-ifaddr-and-ipv6-del-addr.patch
- From: 5.15.0-116.126
- CVE-2024-35960, CVSSv2 Score: 9.1
- Description:
net/mlx5: Properly link new fs rules into the tree
- CVE: https://ubuntu.com/security/CVE-2024-35960
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35960-net-mlx5-properly-link-new-fs-rules-into-the-tree.patch
- From: 5.15.0-116.126
- CVE-2024-35958, CVSSv2 Score: 5.5
- Description:
net: ena: Fix incorrect descriptor free behavior
- CVE: https://ubuntu.com/security/CVE-2024-35958
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35958-net-ena-fix-incorrect-descriptor-free-behavior.patch
- From: 5.15.0-116.126
- CVE-2024-35984, CVSSv2 Score: 5.5
- Description:
i2c: smbus: fix NULL function pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-35984
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35984-i2c-smbus-fix-null-function-pointer-dereference.patch
- From: 5.15.0-116.126
- CVE-2024-35988, CVSSv2 Score:
- Description:
Out of scope as the patch is for riscv arch only, x86_64 is not affected
- Patch: skipped/CVE-2024-35988.patch
- From:
- CVE-2024-36008, CVSSv2 Score: 5.5
- Description:
ipv4: check for NULL idev in ip_route_use_hint()
- CVE: https://ubuntu.com/security/CVE-2024-36008
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36008-ipv4-check-for-null-idev-in-ip-route-use-hint.patch
- From: 5.15.0-116.126
- CVE-2024-36007, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix warning during rehash
- CVE: https://ubuntu.com/security/CVE-2024-36007
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36007-mlxsw-spectrum-acl-tcam-fix-warning-during-rehash.patch
- From: 5.15.0-116.126
- CVE-2024-36006, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_tcam: Fix incorrect list API usage
- CVE: https://ubuntu.com/security/CVE-2024-36006
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36006-mlxsw-spectrum-acl-tcam-fix-incorrect-list-api-usage.patch
- From: 5.15.0-116.126
- CVE-2024-36005, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: honor table dormant flag from netdev release event path
- CVE: https://ubuntu.com/security/CVE-2024-36005
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36005-netfilter-nf-tables-honor-table-dormant-flag-from-netdev-release-event-path.patch
- From: 5.15.0-116.126
- CVE-2024-35990, CVSSv2 Score: 5.5
- Description:
dma: xilinx_dpdma: Fix locking
- CVE: https://ubuntu.com/security/CVE-2024-35990
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35990-dma-xilinx-dpdma-fix-locking.patch
- From: 5.15.0-116.126
- CVE-2024-35989, CVSSv2 Score: 5.5
- Description:
dmaengine: idxd: Fix oops during rmmod on single-CPU platforms
- CVE: https://ubuntu.com/security/CVE-2024-35989
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35989-dmaengine-idxd-fix-oops-during-rmmod-on-single-cpu-platforms.patch
- From: 5.15.0-116.126
- CVE-2024-35997, CVSSv2 Score: 5.5
- Description:
HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up
- CVE: https://ubuntu.com/security/CVE-2024-35997
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-35997-hid-i2c-hid-remove-i2c-hid-read-pending-flag-to-prevent-lock-up.patch
- From: 5.15.0-116.126
- CVE-2024-26926, CVSSv2 Score: 4.4
- Description:
binder: check offset alignment in binder_get_object()
- CVE: https://ubuntu.com/security/CVE-2024-26926
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26926-binder-check-offset-alignment-in-binder-get-object.patch
- From: 5.15.0-116.126
- CVE-2024-26810, CVSSv2 Score: 4.4
- Description:
vfio/pci: Lock external INTx masking ops
- CVE: https://ubuntu.com/security/CVE-2024-26810
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26810-vfio-pci-lock-external-intx-masking-ops.patch
- From: 5.15.0-116.126
- CVE-2024-26814, CVSSv2 Score: 4.4
- Description:
vfio/fsl-mc: Block calling interrupt handler without trigger
- CVE: https://ubuntu.com/security/CVE-2024-26814
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-26814-vfio-fsl-mc-block-calling-interrupt-handler-without-trigger.patch
- From: 5.15.0-116.126
- CVE-2024-36025, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Fix off by one in qla_edif_app_getstats()
- CVE: https://ubuntu.com/security/CVE-2024-36025
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36025-scsi-qla2xxx-fix-off-by-one-in-qla-edif-app-getstats.patch
- From: 5.15.0-116.126
- CVE-2024-36029, CVSSv2 Score: 5.5
- Description:
mmc: sdhci-msm: pervent access to suspended controller
- CVE: https://ubuntu.com/security/CVE-2024-36029
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-36029-mmc-sdhci-msm-pervent-access-to-suspended-controller.patch
- From: 5.15.0-116.126
- CVE-2024-27437, CVSSv2 Score: 5.5
- Description:
vfio/pci: Disable auto-enable of exclusive INTx IRQ
- CVE: https://ubuntu.com/security/CVE-2024-27437
- Patch: ubuntu-jammy/5.15.0-116.126/CVE-2024-27437-0001-vfio-pci-Disable-auto-enable-of-exclusive-INTx-IRQ.patch
- From: 5.15.0-116.126
- CVE-2024-36016, CVSSv2 Score: 5.5
- Description:
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
- CVE: https://ubuntu.com/security/CVE-2024-36016
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-36016-tty-n-gsm-fix-possible-out-of-bounds-in-gsm0-receive.patch
- From: 5.15.0-117.127
- CVE-2024-26952, CVSSv2 Score: 7.8
- Description:
ksmbd: fix potencial out-of-bounds when buffer offset is
- CVE: https://ubuntu.com/security/CVE-2024-26952
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-26952-ksmbd-fix-potencial-out-of-bounds-when-buffer-offset-is-5.15.0-82.91.patch
- From: 5.15.0-117.127
- CVE-2023-52752, CVSSv2 Score: 7.8
- Description:
smb: client: fix use-after-free bug in
- CVE: https://ubuntu.com/security/CVE-2023-52752
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2023-52752-smb-client-fix-use-after-free-bug-in.patch
- From: 5.15.0-117.127
- CVE-2024-26886, CVSSv2 Score: 5.3
- Description:
Bluetooth: af_bluetooth: Fix deadlock
- CVE: https://ubuntu.com/security/CVE-2024-26886
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-26886-bluetooth-af-bluetooth-fix-deadlock.patch
- From: 5.15.0-117.127
- CVE-2024-25742, CVSSv2 Score: 7.1
- Description:
x86/sev: Harden #VC instruction emulation somewhat
- CVE: https://ubuntu.com/security/CVE-2024-25742
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-25742-x86-sev-harden-vc-instruction-emulation-somewhat.patch
- From: 5.15.0-117.127
- CVE-2024-25742, CVSSv2 Score: 7.1
- Description:
x86/sev: Check for MWAITX and MONITORX opcodes in the #VC
- CVE: https://ubuntu.com/security/CVE-2024-25742
- Patch: ubuntu-jammy/5.15.0-117.127/CVE-2024-25742-x86-sev-check-for-mwaitx-and-monitorx-opcodes-in-the-vc.patch
- From: 5.15.0-117.127
- CVE-2024-26980, CVSSv2 Score: 5.5
- Description:
ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf
- CVE: https://ubuntu.com/security/CVE-2024-26980
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-26980-ksmbd-fix-slab-out-of-bounds-in-smb2-allocate-rsp-buf-5.15.0-101.111.patch
- From: 5.15.0-118.128
- CVE-2024-26936, CVSSv2 Score: 5.5
- Description:
ksmbd: validate request buffer size in
- CVE: https://ubuntu.com/security/CVE-2024-26936
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-26936-ksmbd-validate-request-buffer-size-in-5.15.0-101.111.patch
- From: 5.15.0-118.128
- CVE-2024-35848, CVSSv2 Score: 5.5
- Description:
eeprom: at24: Probe for DDR3 thermal sensor in the SPD case (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-35848
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-35848-01-eeprom-at24-probe-for-ddr3-thermal-sensor-in-the-spd-case-5.15.0-117.127.patch
- From: 5.15.0-118.128
- CVE-2024-35848, CVSSv2 Score: 5.5
- Description:
eeprom: at24: Use dev_err_probe for nvmem register failure (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-35848
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-35848-02-eeprom-at24-use-dev-err-probe-for-nvmem-register-failure-5.15.0-117.127.patch
- From: 5.15.0-118.128
- CVE-2024-35848, CVSSv2 Score: 5.5
- Description:
eeprom: at24: fix memory corruption race condition
- CVE: https://ubuntu.com/security/CVE-2024-35848
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-35848-eeprom-at24-fix-memory-corruption-race-condition.patch
- From: 5.15.0-118.128
- CVE-2024-27398, CVSSv2 Score: 5.5
- Description:
Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-27398
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-27398-bluetooth-fix-use-after-free-bugs-caused-by-sco-sock-timeout.patch
- From: 5.15.0-118.128
- CVE-2024-27399, CVSSv2 Score: 5.5
- Description:
Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
- CVE: https://ubuntu.com/security/CVE-2024-27399
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-27399-bluetooth-l2cap-fix-null-ptr-deref-in-l2cap-chan-timeout.patch
- From: 5.15.0-118.128
- CVE-2024-27401, CVSSv2 Score: 5.5
- Description:
firewire: nosy: ensure user_length is taken into account when
- CVE: https://ubuntu.com/security/CVE-2024-27401
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-27401-firewire-nosy-ensure-user-length-is-taken-into-account-when.patch
- From: 5.15.0-118.128
- CVE-2024-35947, CVSSv2 Score: 5.5
- Description:
dyndbg: fix old BUG_ON in >control parser
- CVE: https://ubuntu.com/security/CVE-2024-35947
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-35947-dyndbg-fix-old-bug-on-in-control-parser.patch
- From: 5.15.0-118.128
- CVE-2024-26900, CVSSv2 Score: 6.0
- Description:
md: fix kmemleak of rdev->serial
- CVE: https://ubuntu.com/security/CVE-2024-26900
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-26900-md-fix-kmemleak-of-rdev-serial.patch
- From: 5.15.0-118.128
- CVE-2024-36967, CVSSv2 Score: 5.5
- Description:
KEYS: trusted: Fix memory leak in tpm2_key_encode()
- CVE: https://ubuntu.com/security/CVE-2024-36967
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36967-keys-trusted-fix-memory-leak-in-tpm2-key-encode.patch
- From: 5.15.0-118.128
- CVE-2024-36975, CVSSv2 Score: 5.5
- Description:
KEYS: trusted: Do not use WARN when encode fails
- CVE: https://ubuntu.com/security/CVE-2024-36975
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36975-keys-trusted-do-not-use-warn-when-encode-fails.patch
- From: 5.15.0-118.128
- CVE-2024-36965, CVSSv2 Score: 5.5
- Description:
remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
- CVE: https://ubuntu.com/security/CVE-2024-36965
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36965-remoteproc-mediatek-make-sure-ipi-buffer-fits-in-l2tcm.patch
- From: 5.15.0-118.128
- CVE-2024-36883, CVSSv2 Score: 5.5
- Description:
net: fix out-of-bounds access in ops_init
- CVE: https://ubuntu.com/security/CVE-2024-36883
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36883-net-fix-out-of-bounds-access-in-ops-init.patch
- From: 5.15.0-118.128
- CVE-2024-36886, CVSSv2 Score: 5.5
- Description:
tipc: fix UAF in error path
- CVE: https://ubuntu.com/security/CVE-2024-36886
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36886-tipc-fix-uaf-in-error-path.patch
- From: 5.15.0-118.128
- CVE-2024-36960, CVSSv2 Score: 5.5
- Description:
drm/vmwgfx: Fix invalid reads in fence signaled events
- CVE: https://ubuntu.com/security/CVE-2024-36960
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36960-drm-vmwgfx-fix-invalid-reads-in-fence-signaled-events.patch
- From: 5.15.0-118.128
- CVE-2024-36969, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Fix division by zero in setup_dsc_config
- CVE: https://ubuntu.com/security/CVE-2024-36969
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36969-drm-amd-display-fix-division-by-zero-in-setup-dsc-config.patch
- From: 5.15.0-118.128
- CVE-2024-38600, CVSSv2 Score: 5.5
- Description:
ALSA: Fix deadlocks with kctl removals at disconnection
- CVE: https://ubuntu.com/security/CVE-2024-38600
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-38600-alsa-fix-deadlocks-with-kctl-removals-at-disconnection.patch
- From: 5.15.0-118.128
- CVE-2024-36906, CVSSv2 Score:
- Description:
arm: arch is not supported
- Patch: skipped/CVE-2024-36906.patch
- From:
- CVE-2024-36905, CVSSv2 Score: 9.8
- Description:
tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
- CVE: https://ubuntu.com/security/CVE-2024-36905
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36905-tcp-defer-shutdown-send-shutdown-for-tcp-syn-recv-sockets.patch
- From: 5.15.0-118.128
- CVE-2024-36904, CVSSv2 Score: 5.5
- Description:
tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().
- CVE: https://ubuntu.com/security/CVE-2024-36904
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36904-tcp-use-refcount-inc-not-zero-in-tcp-twsk-unique.patch
- From: 5.15.0-118.128
- CVE-2024-36017, CVSSv2 Score: 5.5
- Description:
rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
- CVE: https://ubuntu.com/security/CVE-2024-36017
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36017-rtnetlink-correct-nested-ifla-vf-vlan-list-attribute-validation.patch
- From: 5.15.0-118.128
- CVE-2024-36902, CVSSv2 Score: 5.5
- Description:
ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
- CVE: https://ubuntu.com/security/CVE-2024-36902
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36902-ipv6-fib6-rules-avoid-possible-null-dereference-in-fib6-rule-action.patch
- From: 5.15.0-118.128
- CVE-2024-36897, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Atom Integrated System Info v2_2 for DCN35
- CVE: https://ubuntu.com/security/CVE-2024-36897
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36897-drm-amd-display-atom-integrated-system-info-v2-2-for-dcn35.patch
- From: 5.15.0-118.128
- CVE-2024-36889, CVSSv2 Score: 5.5
- Description:
mptcp: ensure snd_nxt is properly initialized on connect
- CVE: https://ubuntu.com/security/CVE-2024-36889
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36889-mptcp-ensure-snd-nxt-is-properly-initialized-on-connect.patch
- From: 5.15.0-118.128
- CVE-2024-36880, CVSSv2 Score: 5.5
- Description:
Bluetooth: qca: add missing firmware sanity checks
- CVE: https://ubuntu.com/security/CVE-2024-36880
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36880-bluetooth-qca-add-missing-firmware-sanity-checks.patch
- From: 5.15.0-118.128
- CVE-2024-36928, CVSSv2 Score:
- Description:
s390: arch is not supported
- Patch: skipped/CVE-2024-36928.patch
- From:
- CVE-2024-36938, CVSSv2 Score: 5.5
- Description:
bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
- CVE: https://ubuntu.com/security/CVE-2024-36938
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36938-bpf-skmsg-fix-null-pointer-dereference-in-sk-psock-skb-ingress-enqueue.patch
- From: 5.15.0-118.128
- CVE-2024-36934, CVSSv2 Score: 5.5
- Description:
bna: ensure the copied buf is NUL terminated
- CVE: https://ubuntu.com/security/CVE-2024-36934
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36934-bna-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.15.0-118.128
- CVE-2024-36931, CVSSv2 Score:
- Description:
s390: arch is not supported
- Patch: skipped/CVE-2024-36931.patch
- From:
- CVE-2024-36929, CVSSv2 Score: 5.5
- Description:
net: core: reject skb_copy(_expand) for fraglist GSO skbs
- CVE: https://ubuntu.com/security/CVE-2024-36929
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36929-net-core-reject-skb-copy-expand-for-fraglist-gso-skbs.patch
- From: 5.15.0-118.128
- CVE-2024-36919, CVSSv2 Score: 5.5
- Description:
scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload
- CVE: https://ubuntu.com/security/CVE-2024-36919
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36919-scsi-bnx2fc-remove-spin-lock-bh-while-releasing-resources-after-upload.patch
- From: 5.15.0-118.128
- CVE-2024-36916, CVSSv2 Score: 6.5
- Description:
blk-iocost: avoid out of bounds shift
- CVE: https://ubuntu.com/security/CVE-2024-36916
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36916-blk-iocost-avoid-out-of-bounds-shift.patch
- From: 5.15.0-118.128
- CVE-2024-36953, CVSSv2 Score: 5.5
- Description:
KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-36953
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36953-01-kvm-arm64-vgic-v2-use-cpuid-from-userspace-as-vcpu-id-5.15.0-117.127.patch
- From: 5.15.0-118.128
- CVE-2024-36953, CVSSv2 Score: 5.5
- Description:
KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()
- CVE: https://ubuntu.com/security/CVE-2024-36953
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36953-kvm-arm64-vgic-v2-check-for-non-null-vcpu-in-vgic-v2-parse-attr.patch
- From: 5.15.0-118.128
- CVE-2024-36941, CVSSv2 Score: 5.5
- Description:
wifi: nl80211: don't free NULL coalescing rule
- CVE: https://ubuntu.com/security/CVE-2024-36941
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36941-wifi-nl80211-don-t-free-null-coalescing-rule.patch
- From: 5.15.0-118.128
- CVE-2024-36940, CVSSv2 Score: 5.5
- Description:
pinctrl: core: delete incorrect free in pinctrl_enable()
- CVE: https://ubuntu.com/security/CVE-2024-36940
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36940-pinctrl-core-delete-incorrect-free-in-pinctrl-enable.patch
- From: 5.15.0-118.128
- CVE-2024-36955, CVSSv2 Score: 7.7
- Description:
ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()
- CVE: https://ubuntu.com/security/CVE-2024-36955
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36955-alsa-hda-intel-sdw-acpi-fix-usage-of-device-get-named-child-node.patch
- From: 5.15.0-118.128
- CVE-2024-36954, CVSSv2 Score: 5.5
- Description:
tipc: fix a possible memleak in tipc_buf_append
- CVE: https://ubuntu.com/security/CVE-2024-36954
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36954-tipc-fix-a-possible-memleak-in-tipc-buf-append.patch
- From: 5.15.0-118.128
- CVE-2024-36952, CVSSv2 Score: 5.5
- Description:
scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
- CVE: https://ubuntu.com/security/CVE-2024-36952
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36952-scsi-lpfc-move-npiv-s-transport-unregistration-to-after-resource-clean-up.patch
- From: 5.15.0-118.128
- CVE-2024-36950, CVSSv2 Score: 5.5
- Description:
firewire: ohci: mask bus reset interrupts between ISR and bottom half
- CVE: https://ubuntu.com/security/CVE-2024-36950
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36950-firewire-ohci-mask-bus-reset-interrupts-between-isr-and-bottom-half.patch
- From: 5.15.0-118.128
- CVE-2024-36947, CVSSv2 Score: 5.5
- Description:
qibfs: fix dentry leak
- CVE: https://ubuntu.com/security/CVE-2024-36947
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36947-qibfs-fix-dentry-leak.patch
- From: 5.15.0-118.128
- CVE-2024-36946, CVSSv2 Score: 5.5
- Description:
phonet: fix rtm_phonet_notify() skb allocation
- CVE: https://ubuntu.com/security/CVE-2024-36946
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36946-phonet-fix-rtm-phonet-notify-skb-allocation.patch
- From: 5.15.0-118.128
- CVE-2024-36957, CVSSv2 Score: 5.5
- Description:
octeontx2-af: avoid off-by-one read from userspace
- CVE: https://ubuntu.com/security/CVE-2024-36957
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36957-octeontx2-af-avoid-off-by-one-read-from-userspace.patch
- From: 5.15.0-118.128
- CVE-2024-36964, CVSSv2 Score: 5.5
- Description:
fs/9p: only translate RWX permissions for plain 9P2000
- CVE: https://ubuntu.com/security/CVE-2024-36964
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2024-36964-fs-9p-only-translate-rwx-permissions-for-plain-9p2000.patch
- From: 5.15.0-118.128
- CVE-2023-52585, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
- CVE: https://ubuntu.com/security/CVE-2023-52585
- Patch: ubuntu-jammy/5.15.0-118.128/CVE-2023-52585-drm-amdgpu-fix-possible-null-dereference-in-amdgpu-ras-query-error-status-helper.patch
- From: 5.15.0-118.128
- CVE-2024-26921, CVSSv2 Score:
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- Patch: skipped/CVE-2024-26921.patch
- From:
- CVE-2023-52629, CVSSv2 Score:
- Description:
Out of scope - related to SuperH
- Patch: skipped/CVE-2023-52629.patch
- From:
- CVE-2023-52760, CVSSv2 Score: 7.8
- Description:
gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
- CVE: https://ubuntu.com/security/CVE-2023-52760
- Patch: ubuntu-jammy/5.15.0-119.129/CVE-2023-52760-gfs2-fix-slab-use-after-free-in-gfs2-qd-dealloc.patch
- From: 5.15.0-119.129
- CVE-2024-26680, CVSSv2 Score: 5.5
- Description:
net: atlantic: Fix DMA mapping for PTP hwts ring
- CVE: https://ubuntu.com/security/CVE-2024-26680
- Patch: ubuntu-jammy/5.15.0-119.129/CVE-2024-26680-net-atlantic-fix-dma-mapping-for-ptp-hwts-ring.patch
- From: 5.15.0-119.129
- CVE-2024-26830, CVSSv2 Score:
- Description:
Fixed function sleeps and executed in kthread, which may prevent patching/unpatching. Low score CVE.
- Patch: skipped/CVE-2024-26830.patch
- From:
- CVE-2024-36901, CVSSv2 Score: 5.5
- Description:
ipv6: prevent NULL dereference in ip6_output()
- CVE: https://ubuntu.com/security/CVE-2024-36901
- Patch: ubuntu-jammy/5.15.0-119.129/CVE-2024-36901-ipv6-prevent-null-dereference-in-ip6-output.patch
- From: 5.15.0-119.129
- CVE-2024-39292, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- Patch: skipped/CVE-2024-39292.patch
- From:
- CVE-2024-39484, CVSSv2 Score: 5.5
- Description:
mmc: davinci: Don't strip remove function when driver is
- CVE: https://ubuntu.com/security/CVE-2024-39484
- Patch: ubuntu-jammy/5.15.0-119.129/CVE-2024-39484-mmc-davinci-don-t-strip-remove-function-when-driver-is-kpatch.patch
- From: 5.15.0-119.129
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://ubuntu.com/security/CVE-2024-42154
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 5.15.0-121.131
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://ubuntu.com/security/CVE-2024-42154
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42154-tcp_metrics-validate-source-addr-length-kpatch.patch
- From: 5.15.0-121.131
- CVE-2024-36978, CVSSv2 Score: 7.8
- Description:
net: sched: sch_multiq: fix possible OOB write in multiq_tune()
- CVE: https://ubuntu.com/security/CVE-2024-36978
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36978-net-sched-sch-multiq-fix-possible-oob-write-in.patch
- From: 5.15.0-121.131
- CVE-2024-38552, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix potential index out of bounds in color transformation function
- CVE: https://ubuntu.com/security/CVE-2024-38552
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38552-drm-amd-display-fix-potential-index-out-of-bounds-in-color.patch
- From: 5.15.0-121.131
- CVE-2024-38555, CVSSv2 Score: 7.8
- Description:
net/mlx5: Discard command completions in internal error
- CVE: https://ubuntu.com/security/CVE-2024-38555
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38555-net-mlx5-discard-command-completions-in-internal-error.patch
- From: 5.15.0-121.131
- CVE-2024-38583, CVSSv2 Score:
- Description:
nilfs2: We cannot patch functions that sleep in kthread().
- Patch: skipped/CVE-2024-38583.patch
- From:
- CVE-2024-38627, CVSSv2 Score: 7.8
- Description:
stm class: Fix a double free in stm_register_device()
- CVE: https://ubuntu.com/security/CVE-2024-38627
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38627-stm-class-fix-a-double-free-in-stm-register-device.patch
- From: 5.15.0-121.131
- CVE-2024-39480, CVSSv2 Score: 7.8
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://ubuntu.com/security/CVE-2024-39480
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39480-kdb-fix-buffer-overflow-during-tab-complete.patch
- From: 5.15.0-121.131
- CVE-2024-39495, CVSSv2 Score: 7.8
- Description:
greybus: Fix use-after-free bug in gb_interface_release due to race condition.
- CVE: https://ubuntu.com/security/CVE-2024-39495
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39495-greybus-fix-use-after-free-bug-in-gb-interface-release-due.patch
- From: 5.15.0-121.131
- CVE-2024-39277, CVSSv2 Score: 7.8
- Description:
dma-mapping: benchmark: handle NUMA_NO_NODE correctly
- CVE: https://ubuntu.com/security/CVE-2024-39277
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39277-dma-mapping-benchmark-handle-numa-no-node-correctly.patch
- From: 5.15.0-121.131
- CVE-2024-36971, CVSSv2 Score: 7.8
- Description:
net: fix __dst_negative_advice() race
- CVE: https://ubuntu.com/security/CVE-2024-36971
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36971-net-fix-dst-negative-advice-race-93.patch
- From: 5.15.0-121.131
- CVE-2024-38381, CVSSv2 Score:
- Description:
Out of scope as the patch is for NFC/Android
- Patch: skipped/CVE-2024-38381.patch
- From:
- CVE-2024-42093, CVSSv2 Score: 7.8
- Description:
net/dpaa2: Avoid explicit cpumask var allocation on stack
- CVE: https://ubuntu.com/security/CVE-2024-42093
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42093-net-dpaa2-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.15.0-121.131
- CVE-2024-42094, CVSSv2 Score: 7.8
- Description:
net/iucv: Avoid explicit cpumask var allocation on stack
- CVE: https://ubuntu.com/security/CVE-2024-42094
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42094-net-iucv-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 5.15.0-121.131
- CVE-2024-42104, CVSSv2 Score: 7.8
- Description:
nilfs2: add missing check for inode numbers on directory
- CVE: https://ubuntu.com/security/CVE-2024-42104
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42104-nilfs2-add-missing-check-for-inode-numbers-on-directory.patch
- From: 5.15.0-121.131
- CVE-2024-42161, CVSSv2 Score:
- Description:
BPF selftest fix, not a kernel code.
- Patch: skipped/CVE-2024-42161.patch
- From:
- CVE-2024-42224, CVSSv2 Score: 7.8
- Description:
net: dsa: mv88e6xxx: Correct check for empty list
- CVE: https://ubuntu.com/security/CVE-2024-42224
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42224-net-dsa-mv88e6xxx-correct-check-for-empty-list.patch
- From: 5.15.0-121.131
- CVE-2024-42225, CVSSv2 Score: 7.5
- Description:
wifi: mt76: replace skb_put with skb_put_zero
- CVE: https://ubuntu.com/security/CVE-2024-42225
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42225-wifi-mt76-replace-skb-put-with-skb-put-zero.patch
- From: 5.15.0-121.131
- CVE-2024-39471, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: add error handle to avoid out-of-bounds
- CVE: https://ubuntu.com/security/CVE-2024-39471
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39471-drm-amdgpu-add-error-handle-to-avoid-out-of-bounds.patch
- From: 5.15.0-121.131
- CVE-2024-39487, CVSSv2 Score: 7.1
- Description:
bonding: Fix out-of-bounds read in
- CVE: https://ubuntu.com/security/CVE-2024-39487
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39487-bonding-fix-out-of-bounds-read-in.patch
- From: 5.15.0-121.131
- CVE-2024-41040, CVSSv2 Score: 7.0
- Description:
net/sched: Fix UAF when resolving a clash
- CVE: https://ubuntu.com/security/CVE-2024-41040
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41040-net-sched-fix-uaf-when-resolving-a-clash.patch
- From: 5.15.0-121.131
- CVE-2022-48772, CVSSv2 Score: 5.5
- Description:
media: lgdt3306a: Add a check against null-pointer-def
- CVE: https://ubuntu.com/security/CVE-2022-48772
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2022-48772-media-lgdt3306a-add-a-check-against-null-pointer-def.patch
- From: 5.15.0-121.131
- CVE-2023-52884, CVSSv2 Score:
- Description:
Patched functions sleep and are called from a kthread. Trackpad suspend/resume fix.
- Patch: skipped/CVE-2023-52884.patch
- From:
- CVE-2023-52887, CVSSv2 Score: 5.5
- Description:
net: can: j1939: enhanced error handling for tightly received
- CVE: https://ubuntu.com/security/CVE-2023-52887
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2023-52887-net-can-j1939-enhanced-error-handling-for-tightly-received.patch
- From: 5.15.0-121.131
- CVE-2024-23848, CVSSv2 Score: 5.5
- Description:
media: cec: cec-api: add locking in cec_release()
- CVE: https://ubuntu.com/security/CVE-2024-23848
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-23848-media-cec-cec-api-add-locking-in-cec_release.patch
- From: 5.15.0-121.131
- CVE-2024-25741, CVSSv2 Score: 5.5
- Description:
usb: gadget: printer: fix races against disable
- CVE: https://ubuntu.com/security/CVE-2024-25741
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-25741-usb-gadget-printer-fix-races-against-disable.patch
- From: 5.15.0-121.131
- CVE-2024-31076, CVSSv2 Score: 5.5
- Description:
genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU
- CVE: https://ubuntu.com/security/CVE-2024-31076
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-31076-genirq-cpuhotplug-x86-vector-prevent-vector-leak-during-cpu.patch
- From: 5.15.0-121.131
- CVE-2024-33621, CVSSv2 Score: 5.5
- Description:
ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound
- CVE: https://ubuntu.com/security/CVE-2024-33621
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-33621-ipvlan-dont-use-skb-sk-in-ipvlan-process-v-46-outbound-97.patch
- From: 5.15.0-121.131
- CVE-2024-33847, CVSSv2 Score: 5.5
- Description:
f2fs: compress: don't allow unaligned truncation on released
- CVE: https://ubuntu.com/security/CVE-2024-33847
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-33847-f2fs-compress-don-t-allow-unaligned-truncation-on-released.patch
- From: 5.15.0-121.131
- CVE-2024-34027, CVSSv2 Score: 5.5
- Description:
f2fs: compress: fix to cover
- CVE: https://ubuntu.com/security/CVE-2024-34027
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-34027-f2fs-compress-fix-to-cover.patch
- From: 5.15.0-121.131
- CVE-2024-34777, CVSSv2 Score: 5.5
- Description:
dma-mapping: benchmark: fix node id validation
- CVE: https://ubuntu.com/security/CVE-2024-34777
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-34777-dma-mapping-benchmark-fix-node-id-validation.patch
- From: 5.15.0-121.131
- CVE-2024-36489, CVSSv2 Score: 5.5
- Description:
tls: fix missing memory barrier in tls_init
- CVE: https://ubuntu.com/security/CVE-2024-36489
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36489-tls-fix-missing-memory-barrier-in-tls-init.patch
- From: 5.15.0-121.131
- CVE-2024-36015, CVSSv2 Score: 5.5
- Description:
ppdev: Add an error check in register_device
- CVE: https://ubuntu.com/security/CVE-2024-36015
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36015-ppdev-add-an-error-check-in-register-device.patch
- From: 5.15.0-121.131
- CVE-2024-36032, CVSSv2 Score: 5.5
- Description:
Bluetooth: qca: fix info leak when fetching fw build id
- CVE: https://ubuntu.com/security/CVE-2024-36032
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36032-bluetooth-qca-fix-info-leak-when-fetching-fw-build-id.patch
- From: 5.15.0-121.131
- CVE-2024-36014, CVSSv2 Score: 5.5
- Description:
drm/arm/malidp: fix a possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-36014
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36014-drm-arm-malidp-fix-a-possible-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-36270, CVSSv2 Score: 5.5
- Description:
netfilter: tproxy: bail out if IP has been disabled on the device
- CVE: https://ubuntu.com/security/CVE-2024-36270
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36270-netfilter-tproxy-bail-out-if-ip-has-been-disabled-on-the-device.patch
- From: 5.15.0-121.131
- CVE-2024-36894, CVSSv2 Score: 5.6
- Description:
usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete
- CVE: https://ubuntu.com/security/CVE-2024-36894
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36894-usb-gadget-f-fs-fix-race-between-aio-cancel-and-aio-request-complete.patch
- From: 5.15.0-121.131
- CVE-2024-36286, CVSSv2 Score: 5.5
- Description:
netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()
- CVE: https://ubuntu.com/security/CVE-2024-36286
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36286-netfilter-nfnetlink-queue-acquire-rcu-read-lock-in-instance-destroy-rcu.patch
- From: 5.15.0-121.131
- CVE-2024-35927, CVSSv2 Score: 5.5
- Description:
drm: Check output polling initialized before disabling
- CVE: https://ubuntu.com/security/CVE-2024-35927
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-35927-drm-Check-output-polling-initialized-before-disabling.patch
- From: 5.15.0-121.131
- CVE-2024-35972, CVSSv2 Score:
- Description:
Complex adaptation required. Livepatching of this vulnerability can harm the network subsystem.
- Patch: skipped/CVE-2024-35972.patch
- From:
- CVE-2024-38559, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Ensure the copied buf is NUL terminated
- CVE: https://ubuntu.com/security/CVE-2024-38559
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38559-scsi-qedf-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.15.0-121.131
- CVE-2024-38558, CVSSv2 Score: 5.5
- Description:
net: openvswitch: fix overwriting ct original tuple for ICMPv6
- CVE: https://ubuntu.com/security/CVE-2024-38558
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38558-net-openvswitch-fix-overwriting-ct-original-tuple-for-icmpv6.patch
- From: 5.15.0-121.131
- CVE-2024-38550, CVSSv2 Score: 5.5
- Description:
ASoC: kirkwood: Fix potential NULL dereference
- CVE: https://ubuntu.com/security/CVE-2024-38550
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38550-asoc-kirkwood-fix-potential-null-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-38549, CVSSv2 Score: 5.5
- Description:
drm/mediatek: Add 0 size check to mtk_drm_gem_obj
- CVE: https://ubuntu.com/security/CVE-2024-38549
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38549-drm-mediatek-add-0-size-check-to-mtk-drm-gem-obj.patch
- From: 5.15.0-121.131
- CVE-2024-38548, CVSSv2 Score: 5.5
- Description:
drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-38548
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38548-drm-bridge-cdns-mhdp8546-fix-possible-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-38547, CVSSv2 Score: 5.5
- Description:
media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries
- CVE: https://ubuntu.com/security/CVE-2024-38547
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38547-media-atomisp-ssh-css-fix-a-null-pointer-dereference-in-load-video-binaries.patch
- From: 5.15.0-121.131
- CVE-2024-38546, CVSSv2 Score: 5.5
- Description:
drm: vc4: Fix possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-38546
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38546-drm-vc4-fix-possible-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-36974, CVSSv2 Score: 5.5
- Description:
net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
- CVE: https://ubuntu.com/security/CVE-2024-36974
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-36974-net-sched-taprio-always-validate-tca-taprio-attr-priomap.patch
- From: 5.15.0-121.131
- CVE-2024-37078, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential kernel bug due to lack of writeback
- CVE: https://ubuntu.com/security/CVE-2024-37078
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-37078-nilfs2-fix-potential-kernel-bug-due-to-lack-of-writeback-flag-waiting.patch
- From: 5.15.0-121.131
- CVE-2024-38586, CVSSv2 Score: 5.5
- Description:
r8169: Fix possible ring buffer corruption on fragmented Tx packets.
- CVE: https://ubuntu.com/security/CVE-2024-38586
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38586-r8169-fix-possible-ring-buffer-corruption-on-fragmented-tx-packets.patch
- From: 5.15.0-121.131
- CVE-2024-38582, CVSSv2 Score: 5.5
- Description:
nilfs2: fix unexpected freezing of nilfs_segctor_sync() (dependency)
- CVE: https://ubuntu.com/security/CVE-2024-38582
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38582-01-nilfs2-fix-unexpected-freezing-of-nilfs-segctor-sync-5.15.0-119.129.patch
- From: 5.15.0-121.131
- CVE-2024-38582, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential hang in nilfs_detach_log_writer()
- CVE: https://ubuntu.com/security/CVE-2024-38582
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38582-nilfs2-fix-potential-hang-in-nilfs-detach-log-writer.patch
- From: 5.15.0-121.131
- CVE-2024-38580, CVSSv2 Score: 5.5
- Description:
epoll: be better about file lifetimes
- CVE: https://ubuntu.com/security/CVE-2024-38580
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38580-epoll-be-better-about-file-lifetimes.patch
- From: 5.15.0-121.131
- CVE-2024-38579, CVSSv2 Score: 5.5
- Description:
crypto: bcm - Fix pointer arithmetic
- CVE: https://ubuntu.com/security/CVE-2024-38579
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38579-crypto-bcm-fix-pointer-arithmetic.patch
- From: 5.15.0-121.131
- CVE-2024-38578, CVSSv2 Score: 5.5
- Description:
ecryptfs: Fix buffer size for tag 66 packet
- CVE: https://ubuntu.com/security/CVE-2024-38578
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38578-ecryptfs-fix-buffer-size-for-tag-66-packet.patch
- From: 5.15.0-121.131
- CVE-2024-38573, CVSSv2 Score: 7.5
- Description:
cppc_cpufreq: Fix possible null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-38573
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38573-cppc-cpufreq-fix-possible-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-38571, CVSSv2 Score: 5.5
- Description:
thermal/drivers/tsens: Fix null pointer dereference
- CVE: https://ubuntu.com/security/CVE-2024-38571
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38571-thermal-drivers-tsens-fix-null-pointer-dereference.patch
- From: 5.15.0-121.131
- CVE-2024-38560, CVSSv2 Score: 5.5
- Description:
scsi: bfa: Ensure the copied buf is NUL terminated
- CVE: https://ubuntu.com/security/CVE-2024-38560
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38560-scsi-bfa-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.15.0-121.131
- CVE-2024-38587, CVSSv2 Score: 5.5
- Description:
speakup: Fix sizeof() vs ARRAY_SIZE() bug
- CVE: https://ubuntu.com/security/CVE-2024-38587
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38587-speakup-fix-sizeof-vs-array-size-bug.patch
- From: 5.15.0-121.131
- CVE-2024-38601, CVSSv2 Score: 5.5
- Description:
ring-buffer: Fix a race between readers and resize checks
- CVE: https://ubuntu.com/security/CVE-2024-38601
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38601-ring-buffer-fix-a-race-between-readers-and-resize-checks.patch
- From: 5.15.0-121.131
- CVE-2024-38599, CVSSv2 Score: 5.5
- Description:
jffs2: prevent xattr node from overflowing the eraseblock
- CVE: https://ubuntu.com/security/CVE-2024-38599
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38599-jffs2-prevent-xattr-node-from-overflowing-the-eraseblock.patch
- From: 5.15.0-121.131
- CVE-2024-38596, CVSSv2 Score: 5.5
- Description:
af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
- CVE: https://ubuntu.com/security/CVE-2024-38596
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38596-af-unix-fix-data-races-in-unix-release-sock-unix-stream-sendmsg.patch
- From: 5.15.0-121.131
- CVE-2024-38591, CVSSv2 Score: 5.5
- Description:
RDMA/hns: Fix deadlock on SRQ async events.
- CVE: https://ubuntu.com/security/CVE-2024-38591
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38591-rdma-hns-fix-deadlock-on-srq-async-events.patch
- From: 5.15.0-121.131
- CVE-2024-38590, CVSSv2 Score: 5.5
- Description:
RDMA/hns: Modify the print level of CQE error
- CVE: https://ubuntu.com/security/CVE-2024-38590
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38590-rdma-hns-modify-the-print-level-of-cqe-error.patch
- From: 5.15.0-121.131
- CVE-2024-38605, CVSSv2 Score: 5.5
- Description:
ALSA: core: Fix NULL module pointer assignment at card init
- CVE: https://ubuntu.com/security/CVE-2024-38605
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38605-alsa-core-fix-null-module-pointer-assignment-at-card-init.patch
- From: 5.15.0-121.131
- CVE-2024-38607, CVSSv2 Score: 5.5
- Description:
macintosh/via-macii: Fix "BUG: sleeping function called from invalid context"
- CVE: https://ubuntu.com/security/CVE-2024-38607
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38607-macintosh-via-macii-fix-bug-sleeping-function-called-from-invalid-context.patch
- From: 5.15.0-121.131
- CVE-2024-38613, CVSSv2 Score:
- Description:
Out of scope as the patch is for m68k arch only, x86_64, arm64 is not affected
- Patch: skipped/CVE-2024-38613.patch
- From:
- CVE-2024-38612, CVSSv2 Score:
- Description:
Vulnerability affects OS during boot time and can't be closed via livepatching.
- Patch: skipped/CVE-2024-38612.patch
- From:
- CVE-2024-38623, CVSSv2 Score:
- Description:
Patch changes global data size, which may lead to FS errors. Low-score CVE requires complex adaptation.
- Patch: skipped/CVE-2024-38623.patch
- From:
- CVE-2024-38621, CVSSv2 Score: 5.5
- Description:
media: stk1160: fix bounds checking in stk1160_copy_video()
- CVE: https://ubuntu.com/security/CVE-2024-38621
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38621-media-stk1160-fix-bounds-checking-in-stk1160-copy-video.patch
- From: 5.15.0-121.131
- CVE-2024-38618, CVSSv2 Score: 5.5
- Description:
ALSA: timer: Set lower bound of start tick time
- CVE: https://ubuntu.com/security/CVE-2024-38618
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38618-alsa-timer-set-lower-bound-of-start-tick-time.patch
- From: 5.15.0-121.131
- CVE-2024-38637, CVSSv2 Score: 5.5
- Description:
greybus: lights: check return of get_channel_from_mode
- CVE: https://ubuntu.com/security/CVE-2024-38637
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38637-greybus-lights-check-return-of-get-channel-from-mode.patch
- From: 5.15.0-121.131
- CVE-2024-38635, CVSSv2 Score: 5.5
- Description:
soundwire: cadence: fix invalid PDI offset
- CVE: https://ubuntu.com/security/CVE-2024-38635
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38635-soundwire-cadence-fix-invalid-pdi-offset.patch
- From: 5.15.0-121.131
- CVE-2024-38633, CVSSv2 Score: 5.5
- Description:
serial: max3100: Update uart_driver_registered on driver removal
- CVE: https://ubuntu.com/security/CVE-2024-38633
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38633-serial-max3100-update-uart-driver-registered-on-driver-removal.patch
- From: 5.15.0-121.131
- CVE-2024-38780, CVSSv2 Score: 5.5
- Description:
dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
- CVE: https://ubuntu.com/security/CVE-2024-38780
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38780-dma-buf-sw-sync-don-t-enable-irq-from-sync-print-obj.patch
- From: 5.15.0-121.131
- CVE-2024-38659, CVSSv2 Score: 5.5
- Description:
enic: Validate length of nl attributes in enic_set_vf_port
- CVE: https://ubuntu.com/security/CVE-2024-38659
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38659-enic-validate-length-of-nl-attributes-in-enic-set-vf-port.patch
- From: 5.15.0-121.131
- CVE-2024-38662, CVSSv2 Score: 5.5
- Description:
bpf: Allow delete from sockmap/sockhash only if update is allowed
- CVE: https://ubuntu.com/security/CVE-2024-38662
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-38662-bpf-allow-delete-from-sockmap-sockhash-only-if-update-is-allowed.patch
- From: 5.15.0-121.131
- CVE-2024-39276, CVSSv2 Score: 5.5
- Description:
ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()
- CVE: https://ubuntu.com/security/CVE-2024-39276
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39276-ext4-fix-mb-cache-entry-s-e-refcnt-leak-in-ext4-xattr-block-cache-find.patch
- From: 5.15.0-121.131
- CVE-2024-38661, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64, arm64 is not affected
- Patch: skipped/CVE-2024-38661.patch
- From:
- CVE-2024-39490, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix missing sk_buff release in seg6_input_core
- CVE: https://ubuntu.com/security/CVE-2024-39490
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39490-ipv6-sr-fix-missing-sk-buff-release-in-seg6-input-core.patch
- From: 5.15.0-121.131
- CVE-2024-39489, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix memleak in seg6_hmac_init_algo
- CVE: https://ubuntu.com/security/CVE-2024-39489
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39489-ipv6-sr-fix-memleak-in-seg6-hmac-init-algo.patch
- From: 5.15.0-121.131
- CVE-2024-39467, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode()
- CVE: https://ubuntu.com/security/CVE-2024-39467
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39467-f2fs-fix-to-do-sanity-check-on-i-xattr-nid-in-sanity-check-inode.patch
- From: 5.15.0-121.131
- CVE-2024-39466, CVSSv2 Score: 5.5
- Description:
thermal/drivers/qcom/lmh: Check for SCM availability at probe
- CVE: https://ubuntu.com/security/CVE-2024-39466
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39466-thermal-drivers-qcom-lmh-check-for-scm-availability-at-probe.patch
- From: 5.15.0-121.131
- CVE-2024-39475, CVSSv2 Score: 5.5
- Description:
fbdev: savage: Handle err return when savagefb_check_var failed
- CVE: https://ubuntu.com/security/CVE-2024-39475
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39475-fbdev-savage-handle-err-return-when-savagefb-check-var-failed.patch
- From: 5.15.0-121.131
- CVE-2024-39301, CVSSv2 Score: 5.5
- Description:
net/9p: fix uninit-value in p9_client_rpc()
- CVE: https://ubuntu.com/security/CVE-2024-39301
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39301-net-9p-fix-uninit-value-in-p9-client-rpc.patch
- From: 5.15.0-121.131
- CVE-2024-39468, CVSSv2 Score: 5.5
- Description:
smb: client: fix deadlock in smb2_find_smb_tcon()
- CVE: https://ubuntu.com/security/CVE-2024-39468
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39468-smb-client-fix-deadlock-in-smb2-find-smb-tcon.patch
- From: 5.15.0-121.131
- CVE-2024-39493, CVSSv2 Score: 5.5
- Description:
crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- CVE: https://ubuntu.com/security/CVE-2024-39493
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39493-crypto-qat-fix-adf-dev-reset-sync-memory-leak.patch
- From: 5.15.0-121.131
- CVE-2024-39506, CVSSv2 Score: 5.5
- Description:
liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
- CVE: https://ubuntu.com/security/CVE-2024-39506
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39506-liquidio-adjust-a-null-pointer-handling-path-in-lio-vf-rep-copy-packet.patch
- From: 5.15.0-121.131
- CVE-2024-39505, CVSSv2 Score: 5.5
- Description:
drm/komeda: check for error-valued pointer
- CVE: https://ubuntu.com/security/CVE-2024-39505
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39505-drm-komeda-check-for-error-valued-pointer.patch
- From: 5.15.0-121.131
- CVE-2024-39501, CVSSv2 Score: 5.5
- Description:
drivers: core: synchronize really_probe() and dev_uevent()
- CVE: https://ubuntu.com/security/CVE-2024-39501
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39501-drivers-core-synchronize-really-probe-and-dev-uevent.patch
- From: 5.15.0-121.131
- CVE-2024-39499, CVSSv2 Score: 5.5
- Description:
vmci: prevent speculation leaks by sanitizing event in event_deliver()
- CVE: https://ubuntu.com/security/CVE-2024-39499
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39499-vmci-prevent-speculation-leaks-by-sanitizing-event-in-event-deliver.patch
- From: 5.15.0-121.131
- CVE-2024-39509, CVSSv2 Score: 5.5
- Description:
HID: core: remove unnecessary WARN_ON() in implement()
- CVE: https://ubuntu.com/security/CVE-2024-39509
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-39509-hid-core-remove-unnecessary-warn-on-in-implement.patch
- From: 5.15.0-121.131
- CVE-2024-40912, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()
- CVE: https://ubuntu.com/security/CVE-2024-40912
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40912-wifi-mac80211-fix-deadlock-in-ieee80211-sta-ps-deliver-wakeup.patch
- From: 5.15.0-121.131
- CVE-2024-40911, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: Lock wiphy in cfg80211_get_station
- CVE: https://ubuntu.com/security/CVE-2024-40911
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40911-wifi-cfg80211-lock-wiphy-in-cfg80211-get-station.patch
- From: 5.15.0-121.131
- CVE-2024-40929, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: check n_ssids before accessing the ssids
- CVE: https://ubuntu.com/security/CVE-2024-40929
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40929-wifi-iwlwifi-mvm-check-n-ssids-before-accessing-the-ssids.patch
- From: 5.15.0-121.131
- CVE-2024-40908, CVSSv2 Score: 5.5
- Description:
bpf: Set run context for rawtp test_run callback
- CVE: https://ubuntu.com/security/CVE-2024-40908
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40908-bpf-set-run-context-for-rawtp-test-run-callback.patch
- From: 5.15.0-121.131
- CVE-2024-40905, CVSSv2 Score: 5.5
- Description:
ipv6: fix possible race in __fib6_drop_pcpu_from()
- CVE: https://ubuntu.com/security/CVE-2024-40905
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40905-ipv6-fix-possible-race-in-fib6-drop-pcpu-from.patch
- From: 5.15.0-121.131
- CVE-2024-40904, CVSSv2 Score: 5.5
- Description:
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log
- CVE: https://ubuntu.com/security/CVE-2024-40904
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40904-usb-class-cdc-wdm-fix-cpu-lockup-caused-by-excessive-log-messages.patch
- From: 5.15.0-121.131
- CVE-2024-40901, CVSSv2 Score: 5.5
- Description:
scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
- CVE: https://ubuntu.com/security/CVE-2024-40901
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40901-scsi-mpt3sas-avoid-test-set-bit-operating-in-non-allocated-memory.patch
- From: 5.15.0-121.131
- CVE-2024-40942, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects
- CVE: https://ubuntu.com/security/CVE-2024-40942
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40942-wifi-mac80211-mesh-fix-leak-of-mesh-preq-queue-objects.patch
- From: 5.15.0-121.131
- CVE-2024-40941, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: don't read past the mfuart notifcation
- CVE: https://ubuntu.com/security/CVE-2024-40941
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40941-wifi-iwlwifi-mvm-don-t-read-past-the-mfuart-notifcation.patch
- From: 5.15.0-121.131
- CVE-2024-40945, CVSSv2 Score: 5.5
- Description:
iommu: Return right value in iommu_sva_bind_device()
- CVE: https://ubuntu.com/security/CVE-2024-40945
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40945-iommu-return-right-value-in-iommu-sva-bind-device.patch
- From: 5.15.0-121.131
- CVE-2024-40932, CVSSv2 Score: 5.5
- Description:
drm/exynos/vidi: fix memory leak in .get_modes()
- CVE: https://ubuntu.com/security/CVE-2024-40932
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40932-drm-exynos-vidi-fix-memory-leak-in-get-modes.patch
- From: 5.15.0-121.131
- CVE-2024-40943, CVSSv2 Score: 5.5
- Description:
ocfs2: fix races between hole punching and AIO+DIO
- CVE: https://ubuntu.com/security/CVE-2024-40943
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40943-ocfs2-fix-races-between-hole-punching-and-aio-dio.patch
- From: 5.15.0-121.131
- CVE-2024-40959, CVSSv2 Score: 5.5
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://ubuntu.com/security/CVE-2024-40959
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40959-xfrm6-check-ip6-dst-idev-return-value-in-xfrm6-get-saddr.patch
- From: 5.15.0-121.131
- CVE-2024-40957, CVSSv2 Score: 5.5
- Description:
seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors
- CVE: https://ubuntu.com/security/CVE-2024-40957
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40957-seg6-fix-parameter-passing-when-calling-nf-hook-in-end-dx4-and-end-dx6-behaviors.patch
- From: 5.15.0-121.131
- CVE-2024-40978, CVSSv2 Score: 5.5
- Description:
scsi: qedi: Fix crash while reading debugfs attribute
- CVE: https://ubuntu.com/security/CVE-2024-40978
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40978-scsi-qedi-fix-crash-while-reading-debugfs-attribute.patch
- From: 5.15.0-121.131
- CVE-2024-40976, CVSSv2 Score: 5.5
- Description:
drm/lima: mask irqs in timeout path before hard reset
- CVE: https://ubuntu.com/security/CVE-2024-40976
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40976-drm-lima-mask-irqs-in-timeout-path-before-hard-reset.patch
- From: 5.15.0-121.131
- CVE-2024-40974, CVSSv2 Score:
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- Patch: skipped/CVE-2024-40974.patch
- From:
- CVE-2024-40971, CVSSv2 Score: 5.5
- Description:
f2fs: remove clear SB_INLINECRYPT flag in default_options
- CVE: https://ubuntu.com/security/CVE-2024-40971
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40971-f2fs-remove-clear-sb-inlinecrypt-flag-in-default-options.patch
- From: 5.15.0-121.131
- CVE-2024-40968, CVSSv2 Score:
- Description:
MIPS related CVE.
- Patch: skipped/CVE-2024-40968.patch
- From:
- CVE-2024-40967, CVSSv2 Score: 5.5
- Description:
serial: imx: Introduce timeout when waiting on transmitter empty
- CVE: https://ubuntu.com/security/CVE-2024-40967
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40967-serial-imx-introduce-timeout-when-waiting-on-transmitter-empty.patch
- From: 5.15.0-121.131
- CVE-2024-40963, CVSSv2 Score:
- Description:
Out of scope as the patch is for MIPS arch only, x86_64 is not affected
- Patch: skipped/CVE-2024-40963.patch
- From:
- CVE-2024-40961, CVSSv2 Score: 5.5
- Description:
ipv6: prevent possible NULL deref in fib6_nh_init()
- CVE: https://ubuntu.com/security/CVE-2024-40961
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40961-ipv6-prevent-possible-null-deref-in-fib6-nh-init.patch
- From: 5.15.0-121.131
- CVE-2024-40960, CVSSv2 Score: 5.5
- Description:
ipv6: prevent possible NULL dereference in rt6_probe()
- CVE: https://ubuntu.com/security/CVE-2024-40960
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40960-ipv6-prevent-possible-null-dereference-in-rt6-probe.patch
- From: 5.15.0-121.131
- CVE-2024-41002, CVSSv2 Score: 5.5
- Description:
crypto: hisilicon/sec - Fix memory leak for sec resource release
- CVE: https://ubuntu.com/security/CVE-2024-41002
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41002-crypto-hisilicon-sec-fix-memory-leak-for-sec-resource-release.patch
- From: 5.15.0-121.131
- CVE-2024-40981, CVSSv2 Score: 5.5
- Description:
batman-adv: bypass empty buckets in batadv_purge_orig_ref()
- CVE: https://ubuntu.com/security/CVE-2024-40981
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40981-batman-adv-bypass-empty-buckets-in-batadv-purge-orig-ref.patch
- From: 5.15.0-121.131
- CVE-2024-41004, CVSSv2 Score: 5.5
- Description:
tracing: Build event generation tests only as modules
- CVE: https://ubuntu.com/security/CVE-2024-41004
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41004-tracing-build-event-generation-tests-only-as-modules.patch
- From: 5.15.0-121.131
- CVE-2024-41004, CVSSv2 Score: 5.5
- Description:
tracing: Build event generation tests only as modules
- CVE: https://ubuntu.com/security/CVE-2024-41004
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41004-tracing-Build-event-generation-tests-only-as-modules-kpatch.patch
- From: 5.15.0-121.131
- CVE-2024-40983, CVSSv2 Score: 5.5
- Description:
tipc: force a dst refcount before doing decryption
- CVE: https://ubuntu.com/security/CVE-2024-40983
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40983-tipc-force-a-dst-refcount-before-doing-decryption.patch
- From: 5.15.0-121.131
- CVE-2024-40984, CVSSv2 Score: 5.5
- Description:
ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs.
- CVE: https://ubuntu.com/security/CVE-2024-40984
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40984-acpica-revert-acpica-avoid-info-mapping-multiple-bars-your-kernel-is-fine.patch
- From: 5.15.0-121.131
- CVE-2024-40990, CVSSv2 Score: 5.5
- Description:
RDMA/mlx5: Add check for srq max_sge attribute
- CVE: https://ubuntu.com/security/CVE-2024-40990
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40990-rdma-mlx5-add-check-for-srq-max-sge-attribute.patch
- From: 5.15.0-121.131
- CVE-2024-40988, CVSSv2 Score: 5.5
- Description:
drm/radeon: fix UBSAN warning in kv_dpm.c
- CVE: https://ubuntu.com/security/CVE-2024-40988
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40988-drm-radeon-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 5.15.0-121.131
- CVE-2024-40987, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: fix UBSAN warning in kv_dpm.c
- CVE: https://ubuntu.com/security/CVE-2024-40987
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40987-drm-amdgpu-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 5.15.0-121.131
- CVE-2024-41005, CVSSv2 Score: 5.5
- Description:
netpoll: Fix race condition in netpoll_owner_active
- CVE: https://ubuntu.com/security/CVE-2024-41005
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41005-netpoll-fix-race-condition-in-netpoll-owner-active.patch
- From: 5.15.0-121.131
- CVE-2024-41044, CVSSv2 Score: 5.5
- Description:
ppp: reject claimed-as-LCP but actually malformed packets
- CVE: https://ubuntu.com/security/CVE-2024-41044
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41044-ppp-reject-claimed-as-lcp-but-actually-malformed-packets.patch
- From: 5.15.0-121.131
- CVE-2024-41041, CVSSv2 Score: 5.5
- Description:
udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
- CVE: https://ubuntu.com/security/CVE-2024-41041
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41041-udp-set-sock-rcu-free-earlier-in-udp-lib-get-port.patch
- From: 5.15.0-121.131
- CVE-2024-41027, CVSSv2 Score: 5.5
- Description:
Fix userfaultfd_api to return EINVAL as expected
- CVE: https://ubuntu.com/security/CVE-2024-41027
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41027-fix-userfaultfd-api-to-return-einval-as-expected.patch
- From: 5.15.0-121.131
- CVE-2024-41097, CVSSv2 Score: 5.5
- Description:
usb: atm: cxacru: fix endpoint checking in cxacru_bind()
- CVE: https://ubuntu.com/security/CVE-2024-41097
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41097-usb-atm-cxacru-fix-endpoint-checking-in-cxacru-bind.patch
- From: 5.15.0-121.131
- CVE-2024-41095, CVSSv2 Score: 5.5
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
- CVE: https://ubuntu.com/security/CVE-2024-41095
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41095-drm-nouveau-dispnv04-fix-null-pointer-dereference-in-nv17-tv-get-ld-modes.patch
- From: 5.15.0-121.131
- CVE-2024-41093, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: avoid using null object of framebuffer
- CVE: https://ubuntu.com/security/CVE-2024-41093
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41093-drm-amdgpu-avoid-using-null-object-of-framebuffer.patch
- From: 5.15.0-121.131
- CVE-2024-41089, CVSSv2 Score: 5.5
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
- CVE: https://ubuntu.com/security/CVE-2024-41089
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41089-drm-nouveau-dispnv04-fix-null-pointer-dereference-in-nv17-tv-get-hd-modes.patch
- From: 5.15.0-121.131
- CVE-2024-41055, CVSSv2 Score:
- Description:
The patch affects too much kernel code. Low impact CVE.
- Patch: skipped/CVE-2024-41055.patch
- From:
- CVE-2024-42090, CVSSv2 Score: 5.5
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
- CVE: https://ubuntu.com/security/CVE-2024-42090
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42090-pinctrl-fix-deadlock-in-create-pinctrl-when-handling-eprobe-defer.patch
- From: 5.15.0-121.131
- CVE-2024-42089, CVSSv2 Score: 5.5
- Description:
ASoC: fsl-asoc-card: set priv->pdev before using it
- CVE: https://ubuntu.com/security/CVE-2024-42089
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42089-asoc-fsl-asoc-card-set-priv-pdev-before-using-it.patch
- From: 5.15.0-121.131
- CVE-2024-42087, CVSSv2 Score: 5.5
- Description:
drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep
- CVE: https://ubuntu.com/security/CVE-2024-42087
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42087-drm-panel-ilitek-ili9881c-fix-warning-with-gpio-controllers-that-sleep.patch
- From: 5.15.0-121.131
- CVE-2024-42092, CVSSv2 Score: 5.5
- Description:
gpio: davinci: Validate the obtained number of IRQs
- CVE: https://ubuntu.com/security/CVE-2024-42092
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42092-gpio-davinci-validate-the-obtained-number-of-irqs.patch
- From: 5.15.0-121.131
- CVE-2024-42096, CVSSv2 Score: 5.5
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://ubuntu.com/security/CVE-2024-42096
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 5.15.0-121.131
- CVE-2024-42086, CVSSv2 Score: 5.5
- Description:
iio: chemical: bme680: Fix overflows in compensate() functions
- CVE: https://ubuntu.com/security/CVE-2024-42086
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42086-iio-chemical-bme680-fix-overflows-in-compensate-functions.patch
- From: 5.15.0-121.131
- CVE-2024-42084, CVSSv2 Score: 5.5
- Description:
ftruncate: pass a signed offset
- CVE: https://ubuntu.com/security/CVE-2024-42084
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42084-ftruncate-pass-a-signed-offset.patch
- From: 5.15.0-121.131
- CVE-2024-42098, CVSSv2 Score: 5.5
- Description:
crypto: ecdh - explicitly zeroize private_key
- CVE: https://ubuntu.com/security/CVE-2024-42098
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42098-crypto-ecdh-explicitly-zeroize-private-key.patch
- From: 5.15.0-121.131
- CVE-2024-42097, CVSSv2 Score: 5.5
- Description:
ALSA: emux: improve patch ioctl data validation
- CVE: https://ubuntu.com/security/CVE-2024-42097
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42097-alsa-emux-improve-patch-ioctl-data-validation.patch
- From: 5.15.0-121.131
- CVE-2024-42120, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Check pipe offset before setting vblank
- CVE: https://ubuntu.com/security/CVE-2024-42120
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42120-drm-amd-display-check-pipe-offset-before-setting-vblank.patch
- From: 5.15.0-121.131
- CVE-2024-42119, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Skip finding free audio for unknown engine_id
- CVE: https://ubuntu.com/security/CVE-2024-42119
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42119-drm-amd-display-skip-finding-free-audio-for-unknown-engine-id.patch
- From: 5.15.0-121.131
- CVE-2024-42115, CVSSv2 Score: 5.5
- Description:
jffs2: Fix potential illegal address access in jffs2_free_inode
- CVE: https://ubuntu.com/security/CVE-2024-42115
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42115-jffs2-fix-potential-illegal-address-access-in-jffs2-free-inode.patch
- From: 5.15.0-121.131
- CVE-2024-42106, CVSSv2 Score: 5.5
- Description:
inet_diag: Initialize pad field in struct inet_diag_req_v2
- CVE: https://ubuntu.com/security/CVE-2024-42106
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42106-inet-diag-initialize-pad-field-in-struct-inet-diag-req-v2.patch
- From: 5.15.0-121.131
- CVE-2024-42101, CVSSv2 Score: 5.5
- Description:
drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
- CVE: https://ubuntu.com/security/CVE-2024-42101
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42101-drm-nouveau-fix-null-pointer-dereference-in-nouveau-connector-get-modes.patch
- From: 5.15.0-121.131
- CVE-2024-42127, CVSSv2 Score: 5.5
- Description:
drm/lima: fix shared irq handling on driver remove
- CVE: https://ubuntu.com/security/CVE-2024-42127
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42127-drm-lima-fix-shared-irq-handling-on-driver-remove.patch
- From: 5.15.0-121.131
- CVE-2024-42124, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Make qedf_execute_tmf() non-preemptible
- CVE: https://ubuntu.com/security/CVE-2024-42124
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42124-scsi-qedf-make-qedf-execute-tmf-non-preemptible.patch
- From: 5.15.0-121.131
- CVE-2024-42140, CVSSv2 Score:
- Description:
Arch riscv is not supported.
- Patch: skipped/CVE-2024-42140.patch
- From:
- CVE-2024-42131, CVSSv2 Score: 4.7
- Description:
mm: avoid overflows in dirty throttling logic
- CVE: https://ubuntu.com/security/CVE-2024-42131
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42131-mm-avoid-overflows-in-dirty-throttling-logic.patch
- From: 5.15.0-121.131
- CVE-2024-42152, CVSSv2 Score: 4.7
- Description:
nvmet: fix a possible leak when destroy a ctrl during qp
- CVE: https://ubuntu.com/security/CVE-2024-42152
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42152-nvmet-fix-a-possible-leak-when-destroy-a-ctrl-during-qp-establishment.patch
- From: 5.15.0-121.131
- CVE-2024-42130, CVSSv2 Score: 5.5
- Description:
nfc/nci: Add the inconsistency check between the input data length and count
- CVE: https://ubuntu.com/security/CVE-2024-42130
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42130-nfc-nci-add-the-inconsistency-check-between-the-input-data-length-and-count.patch
- From: 5.15.0-121.131
- CVE-2024-42229, CVSSv2 Score: 4.1
- Description:
crypto: aead,cipher - zeroize key buffer after use
- CVE: https://ubuntu.com/security/CVE-2024-42229
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42229-crypto-aead-cipher-zeroize-key-buffer-after-use.patch
- From: 5.15.0-121.131
- CVE-2024-42223, CVSSv2 Score: 5.5
- Description:
media: dvb-frontends: tda10048: Fix integer overflow
- CVE: https://ubuntu.com/security/CVE-2024-42223
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42223-media-dvb-frontends-tda10048-fix-integer-overflow.patch
- From: 5.15.0-121.131
- CVE-2024-42157, CVSSv2 Score:
- Description:
s390 architecture related CVE.
- Patch: skipped/CVE-2024-42157.patch
- From:
- CVE-2024-42236, CVSSv2 Score: 5.5
- Description:
usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()
- CVE: https://ubuntu.com/security/CVE-2024-42236
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42236-usb-gadget-configfs-prevent-oob-read-write-in-usb-string-copy.patch
- From: 5.15.0-121.131
- CVE-2024-42232, CVSSv2 Score: 5.5
- Description:
libceph: fix race between delayed_work() and ceph_monc_stop()
- CVE: https://ubuntu.com/security/CVE-2024-42232
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42232-libceph-fix-race-between-delayed-work-and-ceph-monc-stop.patch
- From: 5.15.0-121.131
- CVE-2024-42247, CVSSv2 Score: 5.5
- Description:
wireguard: allowedips: avoid unaligned 64-bit memory accesses
- CVE: https://ubuntu.com/security/CVE-2024-42247
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-42247-wireguard-allowedips-avoid-unaligned-64-bit-memory-accesses.patch
- From: 5.15.0-121.131
- CVE-2024-41049, CVSSv2 Score: 7.8
- Description:
filelock: fix potential use-after-free in posix_lock_inode
- CVE: https://ubuntu.com/security/CVE-2024-41049
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41049-filelock-fix-potential-use-after-free-in-posix-lock-inode-5.15.0-92.102.patch
- From: 5.15.0-121.131
- CVE-2024-41046, CVSSv2 Score: 7.8
- Description:
net: ethernet: lantiq_etop: fix double free in detach
- CVE: https://ubuntu.com/security/CVE-2024-41046
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41046-net-ethernet-lantiq-etop-fix-double-free-in-detach-5.15.0-119.129.patch
- From: 5.15.0-121.131
- CVE-2024-40902, CVSSv2 Score: 7.8
- Description:
jfs: xattr: fix buffer overflow for invalid xattr
- CVE: https://ubuntu.com/security/CVE-2024-40902
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40902-jfs-xattr-fix-buffer-overflow-for-invalid-xattr.patch
- From: 5.15.0-121.131
- CVE-2024-41000, CVSSv2 Score: 7.8
- Description:
block/ioctl: prefer different overflow check
- CVE: https://ubuntu.com/security/CVE-2024-41000
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41000-block-ioctl-prefer-different-overflow-check.patch
- From: 5.15.0-121.131
- CVE-2024-40958, CVSSv2 Score: 7.8
- Description:
netns: Make get_net_ns() handle zero refcount net
- CVE: https://ubuntu.com/security/CVE-2024-40958
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40958-netns-make-get-net-ns-handle-zero-refcount-net.patch
- From: 5.15.0-121.131
- CVE-2024-40994, CVSSv2 Score:
- Description:
Applies to 32-bit systems only that we don't cover
- Patch: skipped/CVE-2024-40994.patch
- From:
- CVE-2024-40956, CVSSv2 Score: 7.8
- Description:
dmaengine: idxd: Fix possible Use-After-Free in
- CVE: https://ubuntu.com/security/CVE-2024-40956
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40956-dmaengine-idxd-fix-possible-use-after-free-in.patch
- From: 5.15.0-121.131
- CVE-2024-40954, CVSSv2 Score: 7.8
- Description:
net: do not leave a dangling sk pointer, when socket creation
- CVE: https://ubuntu.com/security/CVE-2024-40954
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-40954-net-do-not-leave-a-dangling-sk-pointer-when-socket-creation.patch
- From: 5.15.0-121.131
- CVE-2024-41092, CVSSv2 Score: 7.8
- Description:
drm/i915/gt: Fix potential UAF by revoke of fence registers
- CVE: https://ubuntu.com/security/CVE-2024-41092
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41092-drm-i915-gt-fix-potential-uaf-by-revoke-of-fence-registers.patch
- From: 5.15.0-121.131
- CVE-2024-41087, CVSSv2 Score: 7.8
- Description:
ata: libata-core: Fix double free on error
- CVE: https://ubuntu.com/security/CVE-2024-41087
- Patch: ubuntu-jammy/5.15.0-121.131/CVE-2024-41087-ata-libata-core-fix-double-free-on-error.patch
- From: 5.15.0-121.131
- CVE-2024-39496, CVSSv2 Score: 7.8
- Description:
btrfs: zoned: fix use-after-free due to race with dev replace
- CVE: https://ubuntu.com/security/CVE-2024-39496
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-39496-btrfs-zoned-fix-use-after-free-due-to-race-with-dev-replace.patch
- From: 5.15.0-122.132
- CVE-2024-42228, CVSSv2 Score: 7.0
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://ubuntu.com/security/CVE-2024-42228
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu_vce_cs_reloc.patch
- From: 5.15.0-122.132
- CVE-2024-39494, CVSSv2 Score: 7.8
- Description:
ima: Fix use-after-free on a dentry's dname.name
- CVE: https://ubuntu.com/security/CVE-2024-39494
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-39494-ima-fix-use-after-free-on-a-dentry-s-dname-name-97.patch
- From: 5.15.0-122.132
- CVE-2024-42160, CVSSv2 Score: 7.8
- Description:
f2fs: check validation of fault attrs in
- CVE: https://ubuntu.com/security/CVE-2024-42160
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-42160-f2fs-check-validation-of-fault-attrs-in-f2fs_build_fault_attr.patch
- From: 5.15.0-122.132
- CVE-2024-26677, CVSSv2 Score: 5.5
- Description:
rxrpc: Fix delayed ACKs to not set the reference serial number
- CVE: https://ubuntu.com/security/CVE-2024-26677
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-26677-rxrpc-Fix-delayed-ACKs-to-not-set-the-reference-serial-number.patch
- From: 5.15.0-122.132
- CVE-2024-26677, CVSSv2 Score: 5.5
- Description:
rxrpc: Fix delayed ACKs to not set the reference serial number (Adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-26677
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-26677-rxrpc-Fix-delayed-ACKs-to-not-set-the-reference-serial-number-kpatch.patch
- From: 5.15.0-122.132
- CVE-2024-41009, CVSSv2 Score: 5.5
- Description:
bpf: Fix overrunning reservations in ringbuf
- CVE: https://ubuntu.com/security/CVE-2024-41009
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-41009-bpf-Fix-overrunning-reservations-in-ringbuf.patch
- From: 5.15.0-122.132
- CVE-2024-41009, CVSSv2 Score: 5.5
- Description:
bpf: Fix overrunning reservations in ringbuf (adaptation)
- CVE: https://ubuntu.com/security/CVE-2024-41009
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-41009-bpf-Fix-overrunning-reservations-in-ringbuf-kpatch.patch
- From: 5.15.0-122.132
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://ubuntu.com/security/CVE-2024-38570
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-38570-01-gfs2-Rename-sd_-glock-kill-_wait.patch
- From: kernel-5.15.0-122.132
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://ubuntu.com/security/CVE-2024-38570
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-38570-02-gfs2-Fix-potential-glock-use-after-free-on-unmount.patch
- From: kernel-5.15.0-122.132
- CVE-2024-38570, CVSSv2 Score: 7.8
- Description:
gfs2: Fix potential glock use-after-free on unmount
- CVE: https://ubuntu.com/security/CVE-2024-38570
- Patch: ubuntu-jammy/5.15.0-122.132/CVE-2024-38570-02-gfs2-Fix-potential-glock-use-after-free-on-unmount-kpatch.patch
- From: kernel-5.15.0-122.132
- CVE-2024-45016, CVSSv2 Score: 5.5
- Description:
netem: fix return value if duplicate enqueue fails
- CVE: https://ubuntu.com/security/CVE-2024-45016
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-45016-netem-fix-return-value-if-duplicate-enqueue-fails.patch
- From: 5.15.0-124.134
- CVE-2024-27397, CVSSv2 Score: 7
- Description:
netfilter: nft_set_rbtree: .deactivate fails if element has expired
- CVE: https://ubuntu.com/security/CVE-2024-27397
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-27397-netfilter-nft_set_rbtree-.deactivate-fails-if-element-has-expired.patch
- From: 5.15.0-124.134
- CVE-2024-27397, CVSSv2 Score: 7
- Description:
netfilter: netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://ubuntu.com/security/CVE-2024-27397
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout-82.patch
- From: 5.15.0-124.134
- CVE-2024-27397, CVSSv2 Score: 7
- Description:
netfilter: netfilter: nf_tables: use timestamp to check for set element timeout kpatch
- CVE: https://ubuntu.com/security/CVE-2024-27397
- Patch: ubuntu-jammy/5.15.0-124.134/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout-kpatch-79.patch
- From: 5.15.0-124.134
- CVE-2024-44986, CVSSv2 Score: 7.8
- Description:
ipv6: fix possible UAF in ip6_finish_output2()
- CVE: https://ubuntu.com/security/CVE-2024-44986
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44986-ipv6-fix-possible-UAF-in-ip6_finish_output2.patch
- From: 5.15.0-125.135
- CVE-2024-44987, CVSSv2 Score: 7.8
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://ubuntu.com/security/CVE-2024-44987
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44987-ipv6-prevent-UAF-in-ip6_send_skb.patch
- From: 5.15.0-125.135
- CVE-2024-44998, CVSSv2 Score: 7.8
- Description:
atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://ubuntu.com/security/CVE-2024-44998
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue_rx.patch
- From: 5.15.0-125.135
- CVE-2024-45026, CVSSv2 Score:
- Description:
Architecture is not supported
- Patch: skipped/CVE-2024-45026.patch
- From:
- CVE-2024-46673, CVSSv2 Score: 7.8
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://ubuntu.com/security/CVE-2024-46673
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46673-scsi-aacraid-Fix-double-free-on-probe-failure.patch
- From: 5.15.0-125.135
- CVE-2024-46725, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: Fix out-of-bounds write warning
- CVE: https://ubuntu.com/security/CVE-2024-46725
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46725-drm-amdgpu-Fix-out-of-bounds-write-warning.patch
- From: 5.15.0-125.135
- CVE-2024-46738, CVSSv2 Score: 7.8
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://ubuntu.com/security/CVE-2024-46738
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46738-VMCI-Fix-use-after-free-when-removing-resource-in-vmci_resource_remove.patch
- From: 5.15.0-125.135
- CVE-2024-46740, CVSSv2 Score: 7.8
- Description:
binder: fix UAF caused by offsets overwrite
- CVE: https://ubuntu.com/security/CVE-2024-46740
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46740-binder-fix-UAF-caused-by-offsets-overwrite.patch
- From: 5.15.0-125.135
- CVE-2024-46744, CVSSv2 Score: 7.8
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://ubuntu.com/security/CVE-2024-46744
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46744-Squashfs-sanity-check-symbolic-link-size.patch
- From: 5.15.0-125.135
- CVE-2024-46746, CVSSv2 Score: 7.8
- Description:
HID: amd_sfh: free driver_data after destroying hid device
- CVE: https://ubuntu.com/security/CVE-2024-46746
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46746-HID-amd_sfh-free-driver_data-after-destroying-hid-device.patch
- From: 5.15.0-125.135
- CVE-2024-41059, CVSSv2 Score: 7.1
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://ubuntu.com/security/CVE-2024-41059
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy-name.patch
- From: 5.15.0-125.135
- CVE-2024-44999, CVSSv2 Score: 7.1
- Description:
gtp: pull network headers in gtp_dev_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-44999
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44999-gtp-pull-network-headers-in-gtp-dev-xmit.patch
- From: 5.15.0-125.135
- CVE-2024-41090, CVSSv2 Score: 7.1
- Description:
tap: add missing verification for short frame
- CVE: https://ubuntu.com/security/CVE-2024-41090
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.15.0-125.135
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://ubuntu.com/security/CVE-2024-41091
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.15.0-125.135
- CVE-2024-46731, CVSSv2 Score: 7.1
- Description:
drm/amd/pm: fix the Out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46731
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46731-drm-amd-pm-fix-the-out-of-bounds-read-warning.patch
- From: 5.15.0-125.135
- CVE-2024-46723, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46723
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.15.0-125.135
- CVE-2024-46844, CVSSv2 Score: 7.8
- Description:
um: line: always fill *error_out in setup_one_line()
- CVE: https://ubuntu.com/security/CVE-2024-46844
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46844-um-line-always-fill-error-out-in-setup-one-line.patch
- From: 5.15.0-125.135
- CVE-2024-46722, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://ubuntu.com/security/CVE-2024-46722
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.15.0-125.135
- CVE-2024-43882, CVSSv2 Score: 7.0
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://ubuntu.com/security/CVE-2024-43882
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.15.0-125.135
- CVE-2024-46724, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://ubuntu.com/security/CVE-2024-46724
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46724-drm-amdgpu-fix-out-of-bounds-read-of-df-v1-7-channel-number.patch
- From: 5.15.0-125.135
- CVE-2024-46747, CVSSv2 Score: 7.1
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://ubuntu.com/security/CVE-2024-46747
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.15.0-125.135
- CVE-2024-46743, CVSSv2 Score: 7.1
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://ubuntu.com/security/CVE-2024-46743
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.15.0-125.135
- CVE-2024-44983, CVSSv2 Score: 7.1
- Description:
netfilter: flowtable: validate vlan header
- CVE: https://ubuntu.com/security/CVE-2024-44983
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44983-netfilter-flowtable-validate-vlan-header.patch
- From: 5.15.0-125.135
- CVE-2024-38602, CVSSv2 Score: 5.5
- Description:
ax25: Fix reference count leak issues of ax25_dev
- CVE: https://ubuntu.com/security/CVE-2024-38602
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-38602-ax25-fix-reference-count-leak-issues-of-ax25-dev.patch
- From: 5.15.0-125.135
- CVE-2024-40915, CVSSv2 Score:
- Description:
CVE patch is for RISCV arch only
- Patch: skipped/CVE-2024-40915.patch
- From:
- CVE-2022-48666, CVSSv2 Score: 7.4
- Description:
scsi: core: Fix a use-after-free
- CVE: https://ubuntu.com/security/CVE-2022-48666
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2022-48666-scsi-core-fix-a-use-after-free-78.patch
- From: 5.15.0-125.135
- CVE-2022-48666, CVSSv2 Score: 7.4
- Description:
scsi: core: Fix a use-after-free
- CVE: https://ubuntu.com/security/CVE-2022-48666
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2022-48666-scsi-core-fix-a-use-after-free-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-26669, CVSSv2 Score: 5.5
- Description:
net: sched: fix possible refcount leak in tc_chain_tmplt_add()
- CVE: https://ubuntu.com/security/CVE-2024-26669
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26669-net-sched-fix-possible-refcount-leak-in-tc_chain_tmp.patch
- From: 5.15.0-125.135
- CVE-2024-26669, CVSSv2 Score: 5.5
- Description:
net/sched: flower: Fix chain template offload
- CVE: https://ubuntu.com/security/CVE-2024-26669
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26669-net-sched-flower-Fix-chain-template-offload.patch
- From: 5.15.0-125.135
- CVE-2024-26669, CVSSv2 Score: 5.5
- Description:
net/sched: flower: Fix chain template offload
- CVE: https://ubuntu.com/security/CVE-2024-26669
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26669-net-sched-flower-Fix-chain-template-offload-kpatch-5.15.0-84.93.patch
- From: 5.15.0-125.135
- CVE-2024-41073, CVSSv2 Score: 7.8
- Description:
nvme: avoid double free special payload
- CVE: https://ubuntu.com/security/CVE-2024-41073
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41073-nvme-avoid-double-free-special-payload.patch
- From: 5.15.0-125.135
- CVE-2024-41070, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- Patch: skipped/CVE-2024-41070.patch
- From:
- CVE-2024-42284, CVSSv2 Score: 7.8
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://ubuntu.com/security/CVE-2024-42284
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.15.0-125.135
- CVE-2024-42280, CVSSv2 Score: 7.8
- Description:
mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://ubuntu.com/security/CVE-2024-42280
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42280-misdn-fix-a-use-after-free-in-hfcmulti-tx.patch
- From: 5.15.0-125.135
- CVE-2024-42271, CVSSv2 Score: 7.8
- Description:
net/iucv: fix use after free in iucv_sock_close()
- CVE: https://ubuntu.com/security/CVE-2024-42271
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv-sock-close.patch
- From: 5.15.0-125.135
- CVE-2024-41011, CVSSv2 Score: 7.8
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://ubuntu.com/security/CVE-2024-41011
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 5.15.0-125.135
- CVE-2024-41071, CVSSv2 Score: 7.8
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://ubuntu.com/security/CVE-2024-41071
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41071-wifi-mac80211-avoid-address-calculations-via-out-of-bounds-array-indexing.patch
- From: 5.15.0-125.135
- CVE-2024-47659, CVSSv2 Score: 8.8
- Description:
smack: tcp: ipv4, fix incorrect labeling
- CVE: https://ubuntu.com/security/CVE-2024-47659
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-47659-smack-tcp-ipv4-fix-incorrect-labeling.patch
- From: 5.15.0-125.135
- CVE-2024-38577, CVSSv2 Score: 7.8
- Description:
rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
- CVE: https://ubuntu.com/security/CVE-2024-38577
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-38577-rcu-tasks-fix-show-rcu-tasks-trace-gp-kthread-buffer-overflow.patch
- From: 5.15.0-125.135
- CVE-2024-42285, CVSSv2 Score: 7.8
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://ubuntu.com/security/CVE-2024-42285
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42285-RDMA-iwcm-Fix-a-use-after-free-related-to-destroying-CM-IDs.patch
- From: 5.15.0-125.135
- CVE-2024-42301, CVSSv2 Score: 7.8
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://ubuntu.com/security/CVE-2024-42301
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 5.15.0-125.135
- CVE-2024-42302, CVSSv2 Score:
- Description:
Patched function waits for external events, which may prevent patching/unpatching.
- Patch: skipped/CVE-2024-42302.patch
- From:
- CVE-2024-42313, CVSSv2 Score: 7.8
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://ubuntu.com/security/CVE-2024-42313
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 5.15.0-125.135
- CVE-2024-43858, CVSSv2 Score: 7.8
- Description:
jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://ubuntu.com/security/CVE-2024-43858
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43858-jfs-fix-array-index-out-of-bounds-in-difree.patch
- From: 5.15.0-125.135
- CVE-2024-43873, CVSSv2 Score: 7.8
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://ubuntu.com/security/CVE-2024-43873
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43873-vhost-vsock-always-initialize-seqpacket-allow.patch
- From: 5.15.0-125.135
- CVE-2024-43873, CVSSv2 Score: 7.8
- Description:
vhost/vsock: always initialize seqpacket_allow
- CVE: https://ubuntu.com/security/CVE-2024-43873
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43873-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-44934, CVSSv2 Score: 7.8
- Description:
net: bridge: mcast: wait for previous gc cycles when removing port
- CVE: https://ubuntu.com/security/CVE-2024-44934
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44934-net-bridge-mcast-wait-for-previous-gc-cycles-when-removing-port.patch
- From: 5.15.0-125.135
- CVE-2024-44974, CVSSv2 Score: 7.8
- Description:
mptcp: pm: avoid possible UaF when selecting endp
- CVE: https://ubuntu.com/security/CVE-2024-44974
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44974-mptcp-pm-avoid-possible-UaF-when-selecting-endp.patch
- From: 5.15.0-125.135
- CVE-2024-44985, CVSSv2 Score: 7.8
- Description:
ipv6: prevent possible UAF in ip6_xmit()
- CVE: https://ubuntu.com/security/CVE-2024-44985
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-44985-ipv6-prevent-possible-UAF-in-ip6_xmit.patch
- From: 5.15.0-125.135
- CVE-2024-41015, CVSSv2 Score: 5.5
- Description:
ocfs2: add bounds checking to ocfs2_check_dir_entry()
- CVE: https://ubuntu.com/security/CVE-2024-41015
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41015-ocfs2-add-bounds-checking-to-ocfs2-check-dir-entry.patch
- From: 5.15.0-125.135
- CVE-2024-41017, CVSSv2 Score: 5.5
- Description:
jfs: don't walk off the end of ealist
- CVE: https://ubuntu.com/security/CVE-2024-41017
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41017-jfs-don-t-walk-off-the-end-of-ealist.patch
- From: 5.15.0-125.135
- CVE-2024-41019, CVSSv2 Score: 5.5
- Description:
fs/ntfs3: Validate ff offset
- CVE: https://ubuntu.com/security/CVE-2024-41019
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41019-fs-ntfs3-validate-ff-offset.patch
- From: 5.15.0-125.135
- CVE-2024-41020, CVSSv2 Score: 5.5
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://ubuntu.com/security/CVE-2024-41020
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41020-filelock-Remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 5.15.0-125.135
- CVE-2024-41022, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
- CVE: https://ubuntu.com/security/CVE-2024-41022
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41022-drm-amdgpu-fix-signedness-bug-in-sdma-v4-0-process-trap-irq.patch
- From: 5.15.0-125.135
- CVE-2024-41042, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://ubuntu.com/security/CVE-2024-41042
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41042-netfilter-nf-tables-prefer-nft-chain-validate.patch
- From: 5.15.0-125.135
- CVE-2024-41060, CVSSv2 Score: 5.5
- Description:
drm/radeon: check bo_va->bo is non-NULL before using it
- CVE: https://ubuntu.com/security/CVE-2024-41060
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41060-drm-radeon-check-bo-va-bo-is-non-null-before-using-it.patch
- From: 5.15.0-125.135
- CVE-2024-41063, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
- CVE: https://ubuntu.com/security/CVE-2024-41063
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41063-bluetooth-hci-core-cancel-all-works-upon-hci-unregister-dev.patch
- From: 5.15.0-125.135
- CVE-2024-41064, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- Patch: skipped/CVE-2024-41064.patch
- From:
- CVE-2024-41065, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- Patch: skipped/CVE-2024-41065.patch
- From:
- CVE-2024-41068, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- Patch: skipped/CVE-2024-41068.patch
- From:
- CVE-2024-41072, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
- CVE: https://ubuntu.com/security/CVE-2024-41072
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41072-wifi-cfg80211-wext-add-extra-siocsiwscan-data-check.patch
- From: 5.15.0-125.135
- CVE-2024-41077, CVSSv2 Score: 5.5
- Description:
null_blk: fix validation of block size
- CVE: https://ubuntu.com/security/CVE-2024-41077
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41077-null-blk-fix-validation-of-block-size-5.15.0-82.91.patch
- From: 5.15.0-125.135
- CVE-2024-41078, CVSSv2 Score: 5.5
- Description:
btrfs: qgroup: fix quota root leak after quota disable failure
- CVE: https://ubuntu.com/security/CVE-2024-41078
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41078-btrfs-qgroup-fix-quota-root-leak-after-quota-disable-failure.patch
- From: 5.15.0-125.135
- CVE-2024-41081, CVSSv2 Score: 5.5
- Description:
ila: block BH in ila_output()
- CVE: https://ubuntu.com/security/CVE-2024-41081
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41081-ila-block-bh-in-ila-output.patch
- From: 5.15.0-125.135
- CVE-2024-41098, CVSSv2 Score: 5.5
- Description:
ata: libata-core: Fix null pointer dereference on error
- CVE: https://ubuntu.com/security/CVE-2024-41098
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41098-ata-libata-core-fix-null-pointer-dereference-on-error.patch
- From: 5.15.0-125.135
- CVE-2024-42114, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
- CVE: https://ubuntu.com/security/CVE-2024-42114
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values.patch
- From: 5.15.0-125.135
- CVE-2024-42114, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (Adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2024-42114
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42114-wifi-cfg80211-restrict-nl80211-attr-txq-quantum-values-kpatch.patch
- From: 4.18.0-553.22.1.el8_10
- CVE-2024-42246, CVSSv2 Score: 5.5
- Description:
net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
- CVE: https://ubuntu.com/security/CVE-2024-42246
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42246-net-sunrpc-remap-eperm-in-case-of-connection-failure-in-xs-tcp-setup-socket.patch
- From: 5.15.0-125.135
- CVE-2024-42126, CVSSv2 Score:
- Description:
powerpc arch not supported.
- Patch: skipped/CVE-2024-42126.patch
- From:
- CVE-2024-42259, CVSSv2 Score: 5.5
- Description:
drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
- CVE: https://ubuntu.com/security/CVE-2024-42259
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42259-drm-i915-gem-fix-virtual-memory-mapping-boundaries-calculation.patch
- From: 5.15.0-125.135
- CVE-2024-43839, CVSSv2 Score: 7.8
- Description:
bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
- CVE: https://ubuntu.com/security/CVE-2024-43839
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-43839-bna-adjust-name-buf-size-of-bna-tcb-and-bna-ccb-structures.patch
- From: 5.15.0-125.135
- CVE-2024-46782, CVSSv2 Score: 7.8
- Description:
ila: call nf_unregister_net_hooks() sooner
- CVE: https://ubuntu.com/security/CVE-2024-46782
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46782-ila-call-nf_unregister_net_hooks-sooner-kpatch.patch
- From: 5.15.0-125.135
- CVE-2024-42265, CVSSv2 Score: 5.5
- Description:
protect the fetch of ->fd[fd] in do_dup2() from mispredictions
- CVE: https://ubuntu.com/security/CVE-2024-42265
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42265-protect-the-fetch-of-fd-fd-in-do-dup2-from-mispredictions.patch
- From: 5.15.0-125.135
- CVE-2024-42267, CVSSv2 Score:
- Description:
RISCV arch not supported.
- Patch: skipped/CVE-2024-42267.patch
- From:
- CVE-2024-42269, CVSSv2 Score: 5.5
- Description:
netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init().
- CVE: https://ubuntu.com/security/CVE-2024-42269
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42269-netfilter-iptables-fix-potential-null-ptr-deref-in-ip6table-nat-table-init.patch
- From: 5.15.0-125.135
- CVE-2024-42270, CVSSv2 Score: 5.5
- Description:
netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init().
- CVE: https://ubuntu.com/security/CVE-2024-42270
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42270-netfilter-iptables-fix-null-ptr-deref-in-iptable-nat-table-init.patch
- From: 5.15.0-125.135
- CVE-2024-42281, CVSSv2 Score: 5.5
- Description:
bpf: Fix a segment issue when downgrading gso_size
- CVE: https://ubuntu.com/security/CVE-2024-42281
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42281-bpf-fix-a-segment-issue-when-downgrading-gso-size.patch
- From: 5.15.0-125.135
- CVE-2024-42283, CVSSv2 Score: 5.5
- Description:
net: nexthop: Initialize all fields in dumped nexthops
- CVE: https://ubuntu.com/security/CVE-2024-42283
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-42283-net-nexthop-initialize-all-fields-in-dumped-nexthops.patch
- From: 5.15.0-125.135
- CVE-2024-46804, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Add array index check for hdcp ddc access
- CVE: https://ubuntu.com/security/CVE-2024-46804
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46804-drm-amd-display-add-array-index-check-for-hdcp-ddc-access-5.15.0-119.129.patch
- From: 5.15.0-125.135
- CVE-2024-46818, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Check gpio_id before used as array index
- CVE: https://ubuntu.com/security/CVE-2024-46818
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46818-drm-amd-display-check-gpio-id-before-used-as-array-index.patch
- From: 5.15.0-125.135
- CVE-2024-46814, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Check msg_id before processing transcation
- CVE: https://ubuntu.com/security/CVE-2024-46814
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46814-drm-amd-display-check-msg-id-before-processing-transcation.patch
- From: 5.15.0-125.135
- CVE-2024-46800, CVSSv2 Score: 7.8
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://ubuntu.com/security/CVE-2024-46800
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.15.0-125.135
- CVE-2024-46798, CVSSv2 Score: 7.8
- Description:
ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://ubuntu.com/security/CVE-2024-46798
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46798-asoc-dapm-fix-uaf-for-snd-soc-pcm-runtime-object.patch
- From: 5.15.0-125.135
- CVE-2024-46759, CVSSv2 Score: 7.8
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46759
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2024-46758, CVSSv2 Score: 7.8
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46758
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2024-46757, CVSSv2 Score: 7.8
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46757
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2024-46756, CVSSv2 Score: 7.8
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://ubuntu.com/security/CVE-2024-46756
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.15.0-125.135
- CVE-2023-52889, CVSSv2 Score: 5.5
- Description:
apparmor: Fix null pointer deref when receiving skb during sock creation
- CVE: https://ubuntu.com/security/CVE-2023-52889
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2023-52889-apparmor-fix-null-pointer-deref-when-receiving-skb-during-sock-creation.patch
- From: 5.15.0-125.135
- CVE-2023-52918, CVSSv2 Score: 5.5
- Description:
media: pci: cx23885: check cx23885_vdev_init() return
- CVE: https://ubuntu.com/security/CVE-2023-52918
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2023-52918-media-pci-cx23885-check-cx23885-vdev-init-return.patch
- From: 5.15.0-125.135
- CVE-2024-26661, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'
- CVE: https://ubuntu.com/security/CVE-2024-26661
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-26661-drm-amd-display-Add-NULL-test-for-timing-generator-i.patch
- From: 5.15.0-125.135
- CVE-2024-38611, CVSSv2 Score: 5.5
- Description:
media: i2c: et8ek8: Don't strip remove function when driver is builtin
- CVE: https://ubuntu.com/security/CVE-2024-38611
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-38611-media-i2c-et8ek8-don-t-strip-remove-function-when-driver-is-builtin.patch
- From: 5.15.0-125.135
- CVE-2024-39472, CVSSv2 Score: 5.5
- Description:
xfs: fix log recovery buffer allocation for the legacy h_size fixup
- CVE: https://ubuntu.com/security/CVE-2024-39472
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-39472-xfs-fix-log-recovery-buffer-allocation-for-the-legacy-h-size-fixup.patch
- From: 5.15.0-125.135
- CVE-2024-41012, CVSSv2 Score: 6.3
- Description:
filelock: Remove locks reliably when fcntl/close race is detected
- CVE: https://ubuntu.com/security/CVE-2024-41012
- Patch: ubuntu-jammy/5.15.0-125.135/CVE-2024-41012-filelock-remove-locks-reliably-when-fcntl-close-race-is-detected.patch
- From: 5.15.0-125.135
- CVE-2024-44940, CVSSv2 Score: 7.8
- Description:
fou: remove warn in gue_gro_receive on unsupported protocol
- CVE: https://ubuntu.com/security/CVE-2024-44940
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-44940-fou-remove-warn-in-gue-gro-receive-on-unsupported-protocol-5.15.0-124.134.patch
- From: 5.15.0-127.137
- CVE-2024-38667, CVSSv2 Score:
- Description:
Out of scope: RISC V architecture isn't supported for current kernel
- Patch: skipped/CVE-2024-38667.patch
- From:
- CVE-2024-44942, CVSSv2 Score: 7.8
- Description:
f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC
- CVE: https://ubuntu.com/security/CVE-2024-44942
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-44942-f2fs-fix-to-do-sanity-check-on-f2fs-inline-data-flag-in-inode-during-gc.patch
- From: 5.15.0-127.137
- CVE-2024-46853, CVSSv2 Score: 7.8
- Description:
spi: nxp-fspi: fix the KASAN report out-of-bounds bug
- CVE: https://ubuntu.com/security/CVE-2024-46853
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46853-spi-nxp-fspi-fix-the-kasan-report-out-of-bounds-bug.patch
- From: 5.15.0-127.137
- CVE-2024-46852, CVSSv2 Score: 7.8
- Description:
dma-buf: heaps: Fix off-by-one in CMA heap fault handler
- CVE: https://ubuntu.com/security/CVE-2024-46852
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46852-dma-buf-heaps-fix-off-by-one-in-cma-heap-fault-handler.patch
- From: 5.15.0-127.137
- CVE-2024-46849, CVSSv2 Score: 7.8
- Description:
ASoC: meson: axg-card: fix 'use-after-free'
- CVE: https://ubuntu.com/security/CVE-2024-46849
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-46849-asoc-meson-axg-card-fix-use-after-free.patch
- From: 5.15.0-127.137
- CVE-2024-47685, CVSSv2 Score: 9.1
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://ubuntu.com/security/CVE-2024-47685
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.15.0-127.137
- CVE-2024-39463, CVSSv2 Score: 7.8
- Description:
9p: add missing locking around taking dentry fid list
- CVE: https://ubuntu.com/security/CVE-2024-39463
- Patch: ubuntu-jammy/5.15.0-127.137/CVE-2024-39463-9p-add-missing-locking-around-taking-dentry-fid-list.patch
- From: 5.15.0-127.137