- kernel-5.15.0-1092.101 (ubuntu-jammy-azure)
- 5.15.0-1094.103
- 2025-09-26 15:45:39
- 2025-10-01 12:46:42
- K20250926_06
- CVE-2025-37749
- Description:
net: ppp: Add bound checking for skb data on ppp_sync_txmung
- CVE: https://ubuntu.com/security/CVE-2025-37749
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37749-net-ppp-add-bound-checking-for-skb-data-on-ppp-sync-txmung.patch
- From: 5.15.0-144.157
- CVE-2025-37841
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-37841.patch
- From:
- CVE-2025-37892
- Description:
mtd: inftlcore: Add error check for inftl_read_oob()
- CVE: https://ubuntu.com/security/CVE-2025-37892
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37892-mtd-inftlcore-add-error-check-for-inftl-read-oob.patch
- From: 5.15.0-144.157
- CVE-2025-37838
- Description:
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
- CVE: https://ubuntu.com/security/CVE-2025-37838
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37838-hsi-ssi-protocol-fix-use-after-free-vulnerability-in-ssi-protocol-driver-due-to-race-condition.patch
- From: 5.15.0-144.157
- CVE-2025-37982
- Description:
wifi: wl1251: fix memory leak in wl1251_tx_work
- CVE: https://ubuntu.com/security/CVE-2025-37982
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37982-wifi-wl1251-fix-memory-leak-in-wl1251-tx-work.patch
- From: 5.15.0-144.157
- CVE-2024-46774
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-46774.patch
- From:
- CVE-2024-35866
- Description:
smb: client: fix potential UAF in cifs_dump_full_key()
- CVE: https://ubuntu.com/security/CVE-2024-35866
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-35866-smb-client-fix-potential-uaf-in-cifs-dump-full-key-azure-1051.patch
- From: 5.15.0-144.157
- CVE-2024-35867
- Description:
smb: client: fix potential UAF in cifs_stats_proc_show()
- CVE: https://ubuntu.com/security/CVE-2024-35867
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-35867-smb-client-fix-potential-uaf-in-cifs-stats-proc-show-azure-1051.patch
- From: 5.15.0-144.157
- CVE-2024-49960
- Description:
ext4: fix timer use-after-free on failed mount
- CVE: https://ubuntu.com/security/CVE-2024-49960
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-49960-ext4-fix-timer-use-after-free-on-failed-mount.patch
- From: 5.15.0-144.157
- CVE-2024-54458
- Description:
scsi: ufs: bsg: Set bsg_queue to NULL after removal
- CVE: https://ubuntu.com/security/CVE-2024-54458
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-54458-scsi-ufs-bsg-set-bsg-queue-to-null-after-removal.patch
- From: 5.15.0-144.157
- CVE-2024-50280
- Description:
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
- CVE: https://ubuntu.com/security/CVE-2024-50280
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50280-dm-cache-fix-flushing-uninitialized-delayed-work-on-cache-ctr-error.patch
- From: 5.15.0-144.157
- CVE-2022-49535
- Description:
scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI
- CVE: https://ubuntu.com/security/CVE-2022-49535
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-49535-scsi-lpfc-fix-null-pointer-dereference-after-failing-to-issue-flogi-and-plogi.patch
- From: 5.15.0-144.157
- CVE-2024-50125
- Description:
Bluetooth: SCO: Fix UAF on sco_sock_timeout
- CVE: https://ubuntu.com/security/CVE-2024-50125
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-50125-bluetooth-sco-fix-uaf-on-sco-sock-timeout.patch
- From: 5.15.0-144.157
- CVE-2025-22027
- Description:
media: streamzap: fix race between device disconnection and urb callback
- CVE: https://ubuntu.com/security/CVE-2025-22027
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-22027-media-streamzap-fix-race-between-device-disconnection-and-urb-callback.patch
- From: 5.15.0-144.157
- CVE-2025-23148
- Description:
Out of scope: ARM architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-23148.patch
- From:
- CVE-2025-37844
- Description:
cifs: avoid NULL pointer dereference in dbg call
- CVE: https://ubuntu.com/security/CVE-2025-37844
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37844-cifs-avoid-null-pointer-dereference-in-dbg-call-azure.patch
- From: 5.15.0-144.157
- CVE-2025-37985
- Description:
USB: wdm: close race between wdm_open and wdm_wwan_port_stop
- CVE: https://ubuntu.com/security/CVE-2025-37985
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37985-usb-wdm-close-race-between-wdm-open-and-wdm-wwan-port-stop.patch
- From: 5.15.0-144.157
- CVE-2025-37803
- Description:
udmabuf: fix a buf size overflow issue during udmabuf creation
- CVE: https://ubuntu.com/security/CVE-2025-37803
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37803-udmabuf-fix-a-buf-size-overflow-issue-during-udmabuf-creation.patch
- From: 5.15.0-144.157
- CVE-2024-49989
- Description:
drm/amd/display: fix double free issue during amdgpu module unload
- CVE: https://ubuntu.com/security/CVE-2024-49989
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-49989-drm-amd-display-fix-double-free-issue-during-amdgpu-module-unload.patch
- From: 5.15.0-144.157
- CVE-2025-37930
- Description:
drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()
- CVE: https://ubuntu.com/security/CVE-2025-37930
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37930-drm-nouveau-fix-warn-on-in-nouveau-fence-context-kill.patch
- From: 5.15.0-144.157
- CVE-2025-37991
- Description:
Out of scope: PA-RISC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-37991.patch
- From:
- CVE-2025-37990
- Description:
wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()
- CVE: https://ubuntu.com/security/CVE-2025-37990
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37990-wifi-brcm80211-fmac-add-error-handling-for-brcmf-usb-dl-writeimage.patch
- From: 5.15.0-144.157
- CVE-2025-37923
- Description:
tracing: Fix oob write in trace_seq_to_buffer()
- CVE: https://ubuntu.com/security/CVE-2025-37923
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37923-tracing-fix-oob-write-in-trace-seq-to-buffer.patch
- From: 5.15.0-144.157
- CVE-2024-26739
- Description:
net/sched: act_mirred: don't override retval if we already lost the skb
- CVE: https://ubuntu.com/security/CVE-2024-26739
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-26739-net-sched-act-mirred-don-t-override-retval-if-we-already-lost-the-skb.patch
- From: 5.15.0-144.157
- CVE-2025-37915
- Description:
net_sched: drr: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37915
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37915-net-sched-drr-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-144.157
- CVE-2025-37914
- Description:
net_sched: ets: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37914
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37914-net-sched-ets-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-144.157
- CVE-2025-37913
- Description:
net_sched: qfq: Fix double list add in class with netem as child qdisc
- CVE: https://ubuntu.com/security/CVE-2025-37913
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37913-net-sched-qfq-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-144.157
- CVE-2025-37912
- Description:
ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr()
- CVE: https://ubuntu.com/security/CVE-2025-37912
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37912-ice-check-vf-vsi-pointer-value-in-ice-vc-add-fdir-fltr.patch
- From: 5.15.0-144.157
- CVE-2025-37911
- Description:
bnxt_en: Fix out-of-bound memcpy() during ethtool -w
- CVE: https://ubuntu.com/security/CVE-2025-37911
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37911-bnxt-en-fix-out-of-bound-memcpy-during-ethtool-w.patch
- From: 5.15.0-144.157
- CVE-2025-37909
- Description:
net: lan743x: Fix memleak issue when GSO enabled
- CVE: https://ubuntu.com/security/CVE-2025-37909
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37909-net-lan743x-fix-memleak-issue-when-gso-enabled.patch
- From: 5.15.0-144.157
- CVE-2025-37909
- Description:
net: lan743x: Fix memleak issue when GSO enabled
- CVE: https://ubuntu.com/security/CVE-2025-37909
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37909-net-lan743x-fix-memleak-issue-when-gso-enabled-kpatch.patch
- From: 5.15.0-144.157
- CVE-2024-38541
- Description:
of: module: add buffer overflow check in of_modalias()
- CVE: https://ubuntu.com/security/CVE-2024-38541
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-38541-of-module-add-buffer-overflow-check-in-of-modalias.patch
- From: 5.15.0-144.157
- CVE-2025-37905
- Description:
firmware: arm_scmi: Balance device refcount when destroying devices
- CVE: https://ubuntu.com/security/CVE-2025-37905
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37905-firmware-arm-scmi-balance-device-refcount-when-destroying-devices.patch
- From: 5.15.0-144.157
- CVE-2022-21546
- Description:
scsi: target: Fix WRITE_SAME No Data Buffer crash
- CVE: https://ubuntu.com/security/CVE-2022-21546
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-21546-scsi-target-fix-write-same-no-data-buffer-crash.patch
- From: 5.15.0-144.157
- CVE-2025-37998
- Description:
openvswitch: Fix unsafe attribute parsing in output_userspace()
- CVE: https://ubuntu.com/security/CVE-2025-37998
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37998-openvswitch-fix-unsafe-attribute-parsing-in-output-userspace.patch
- From: 5.15.0-144.157
- CVE-2025-37964
- Description:
x86/mm: Eliminate window where TLB flushes may be inadvertently skipped
- CVE: https://ubuntu.com/security/CVE-2025-37964
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37964-x86-mm-eliminate-window-where-tlb-flushes-may-be-inadvertently-skipped.patch
- From: 5.15.0-144.157
- CVE-2025-37970
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo
- CVE: https://ubuntu.com/security/CVE-2025-37970
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37970-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-fifo.patch
- From: 5.15.0-144.157
- CVE-2025-37969
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo
- CVE: https://ubuntu.com/security/CVE-2025-37969
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37969-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-tagged-fifo.patch
- From: 5.15.0-144.157
- CVE-2025-37995
- Description:
module: ensure that kobject_put() is safe for module type kobjects
- CVE: https://ubuntu.com/security/CVE-2025-37995
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37995-module-ensure-that-kobject-put-is-safe-for-module-type-kobjects.patch
- From: 5.15.0-144.157
- CVE-2025-37994
- Description:
usb: typec: ucsi: displayport: Fix NULL pointer access
- CVE: https://ubuntu.com/security/CVE-2025-37994
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37994-usb-typec-ucsi-displayport-fix-null-pointer-access.patch
- From: 5.15.0-144.157
- CVE-2025-38024
- Description:
RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug
- CVE: https://ubuntu.com/security/CVE-2025-38024
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38024-rdma-rxe-fix-slab-use-after-free-read-in-rxe-queue-cleanup-bug.patch
- From: 5.15.0-144.157
- CVE-2025-38023
- Description:
nfs: handle failure of nfs_get_lock_context in unlock path
- CVE: https://ubuntu.com/security/CVE-2025-38023
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38023-nfs-handle-failure-of-nfs-get-lock-context-in-unlock-path.patch
- From: 5.15.0-144.157
- CVE-2025-38009
- Description:
wifi: mt76: disable napi on driver removal
- CVE: https://ubuntu.com/security/CVE-2025-38009
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38009-wifi-mt76-disable-napi-on-driver-removal.patch
- From: 5.15.0-144.157
- CVE-2025-38005
- Description:
dmaengine: ti: k3-udma: Add missing locking
- CVE: https://ubuntu.com/security/CVE-2025-38005
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-38005-dmaengine-ti-k3-udma-add-missing-locking.patch
- From: 5.15.0-144.157
- CVE-2025-37967
- Description:
usb: typec: ucsi: displayport: Fix deadlock
- CVE: https://ubuntu.com/security/CVE-2025-37967
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2025-37967-usb-typec-ucsi-displayport-fix-deadlock.patch
- From: 5.15.0-144.157
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://ubuntu.com/security/CVE-2024-53203
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-53203-usb-typec-fix-potential-array-underflow-in-ucsi-ccg-sync-control.patch
- From: 5.15.0-144.157
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://ubuntu.com/security/CVE-2024-53203
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2024-53203-usb-typec-fix-pm-usage-counter-imbalance-in-ucsi_ccg_sync_control.patch
- From: 5.15.0-144.157
- CVE-2022-49168
- Description:
btrfs: do not clean up repair bio if submit fails
- CVE: https://ubuntu.com/security/CVE-2022-49168
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-49168-btrfs-do-not-clean-up-repair-bio-if-submit-fails.patch
- From: 5.15.0-144.157
- CVE-2022-49063
- Description:
ice: arfs: fix use-after-free when freeing @rx_cpu_rmap
- CVE: https://ubuntu.com/security/CVE-2022-49063
- Patch: ubuntu-jammy/5.15.0-144.157/CVE-2022-49063-ice-arfs-fix-use-after-free-when-freeing-rx-cpu-rmap.patch
- From: 5.15.0-144.157
- CVE-2024-50073
- Description:
tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
- CVE: https://ubuntu.com/security/CVE-2024-50073
- Patch: ubuntu-jammy/5.15.0-151.161/CVE-2024-50073-tty-n-gsm-fix-use-after-free-in-gsm-cleanup-mux.patch
- From: 5.15.0-151.161
- CVE-2025-38083
- Description:
net_sched: prio: fix a race in prio_tune()
- CVE: https://ubuntu.com/security/CVE-2025-38083
- Patch: ubuntu-jammy/5.15.0-151.161/CVE-2025-38083-net-sched-prio-fix-a-race-in-prio-tune.patch
- From: 5.15.0-151.161
- CVE-2025-38075
- Description:
scsi: target: iscsi: Fix timeout on deleted connection
- CVE: https://ubuntu.com/security/CVE-2025-38075
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38075-scsi-target-iscsi-fix-timeout-on-deleted-connection.patch
- From: 5.15.0-152.162
- CVE-2025-38048
- Description:
virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN
- CVE: https://ubuntu.com/security/CVE-2025-38048
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38048-virtio-ring-fix-data-race-by-tagging-event-triggered-as-racy-for-kcsan.patch
- From: 5.15.0-152.162
- CVE-2025-38072
- Description:
libnvdimm/labels: Fix divide error in nd_label_data_init()
- CVE: https://ubuntu.com/security/CVE-2025-38072
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38072-libnvdimm-labels-fix-divide-error-in-nd-label-data-init.patch
- From: 5.15.0-152.162
- CVE-2025-38066
- Description:
dm cache: prevent BUG_ON by blocking retries on failed device resumes
- CVE: https://ubuntu.com/security/CVE-2025-38066
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38066-dm-cache-prevent-bug-on-by-blocking-retries-on-failed-device-resumes.patch
- From: 5.15.0-152.162
- CVE-2025-38065
- Description:
orangefs: Do not truncate file size
- CVE: https://ubuntu.com/security/CVE-2025-38065
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38065-orangefs-do-not-truncate-file-size.patch
- From: 5.15.0-152.162
- CVE-2025-38044
- Description:
media: cx231xx: set device_caps for 417
- CVE: https://ubuntu.com/security/CVE-2025-38044
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38044-media-cx231xx-set-device-caps-for-417.patch
- From: 5.15.0-152.162
- CVE-2025-38043
- Description:
firmware: arm_ffa: Set dma_mask for ffa devices
- CVE: https://ubuntu.com/security/CVE-2025-38043
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38043-firmware-arm-ffa-set-dma-mask-for-ffa-devices.patch
- From: 5.15.0-152.162
- CVE-2025-38043
- Description:
firmware: arm_ffa: Set dma_mask for ffa devices
- CVE: https://ubuntu.com/security/CVE-2025-38043
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38043-firmware-arm-ffa-set-dma-mask-for-ffa-devices-kpatch.patch
- From: 5.15.0-152.162
- CVE-2025-38061
- Description:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
- CVE: https://ubuntu.com/security/CVE-2025-38061
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38061-net-pktgen-fix-access-outside-of-user-given-buffer-in-pktgen-thread-write.patch
- From: 5.15.0-152.162
- CVE-2025-38037
- Description:
vxlan: Annotate FDB data races
- CVE: https://ubuntu.com/security/CVE-2025-38037
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38037-vxlan-annotate-fdb-data-races.patch
- From: 5.15.0-152.162
- CVE-2025-38035
- Description:
nvmet-tcp: don't restore null sk_state_change
- CVE: https://ubuntu.com/security/CVE-2025-38035
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38035-nvmet-tcp-don-t-restore-null-sk-state-change.patch
- From: 5.15.0-152.162
- CVE-2025-38058
- Description:
__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock
- CVE: https://ubuntu.com/security/CVE-2025-38058
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38058-legitimize-mnt-check-for-mnt-sync-umount-should-be-under-mount-lock-143.patch
- From: 5.15.0-152.162
- CVE-2025-38052
- Description:
Complex adaptation required. Low impact CVE
- CVE:
- Patch: skipped/CVE-2025-38052.patch
- From:
- CVE-2025-38079
- Description:
crypto: algif_hash - fix double free in hash_accept
- CVE: https://ubuntu.com/security/CVE-2025-38079
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38079-crypto-algif-hash-fix-double-free-in-hash-accept.patch
- From: 5.15.0-152.162
- CVE-2025-38031
- Description:
padata: do not leak refcount in reorder_work
- CVE: https://ubuntu.com/security/CVE-2025-38031
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38031-padata-do-not-leak-refcount-in-reorder-work.patch
- From: 5.15.0-152.162
- CVE-2025-38004
- Description:
can: bcm: add locking for bcm_op runtime updates
- CVE: https://ubuntu.com/security/CVE-2025-38004
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38004-can-bcm-add-locking-for-bcm-op-runtime-updates.patch
- From: 5.15.0-152.162
- CVE-2025-38004
- Description:
can: bcm: add locking for bcm_op runtime updates
- CVE: https://ubuntu.com/security/CVE-2025-38004
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38004-can-bcm-add-locking-for-bcm-op-runtime-updates-kpatch.patch
- From: 5.15.0-152.162
- CVE-2025-38003
- Description:
can: bcm: add missing rcu read protection for procfs content
- CVE: https://ubuntu.com/security/CVE-2025-38003
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38003-can-bcm-add-missing-rcu-read-protection-for-procfs-content.patch
- From: 5.15.0-152.162
- CVE-2025-38078
- Description:
ALSA: pcm: Fix race of buffer access at PCM OSS layer
- CVE: https://ubuntu.com/security/CVE-2025-38078
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38078-alsa-pcm-fix-race-of-buffer-access-at-pcm-oss-layer.patch
- From: 5.15.0-152.162
- CVE-2025-38077
- Description:
platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()
- CVE: https://ubuntu.com/security/CVE-2025-38077
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38077-platform-x86-dell-wmi-sysman-avoid-buffer-overflow-in-current-password-store.patch
- From: 5.15.0-152.162
- CVE-2025-38051
- Description:
smb: client: Fix use-after-free in cifs_fill_dirent
- CVE: https://ubuntu.com/security/CVE-2025-38051
- Patch: ubuntu-jammy/5.15.0-152.162/CVE-2025-38051-smb-client-fix-use-after-free-in-cifs-fill-dirent.patch
- From: 5.15.0-152.162
- CVE-2024-27407
- Description:
fs/ntfs3: Fixed overflow check in mi_enum_attr()
- CVE: https://ubuntu.com/security/CVE-2024-27407
- Patch: ubuntu-jammy/5.15.0-153.163/CVE-2024-27407-fs-ntfs3-fixed-overflow-check-in-mi-enum-attr.patch
- From: 5.15.0-153.163
- CVE-2025-38350
- Description:
net/sched: Always pass notifications when child class becomes empty
- CVE: https://ubuntu.com/security/CVE-2025-38350
- Patch: ubuntu-jammy/5.15.0-153.163/CVE-2025-38350-net-sched-always-pass-notifications-when-child-class-becomes-empty.patch
- From: 5.15.0-153.163