It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service (infinite recursion). (CVE-2020-36691)
Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl() in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-0168)
It was discovered that the ext4 file system implementation in the Linux kernel contained a use-after-free vulnerability. An attacker could use this to construct a malicious ext4 file system image that, when mounted, could cause a denial of service (system crash). (CVE-2022-1184)
It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. (CVE-2022-27672)
William Zhao discovered that the Traffic Control (TC) subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2022-4269)
It was discovered that a race condition existed in the qdisc implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-0590)
It was discovered that a race condition existed in the btrfs file system implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-1611)
It was discovered that the APM X-Gene SoC hardware monitoring driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). (CVE-2023-1855)
It was discovered that the ST NCI NFC driver did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2023-1990)
It was discovered that the XFS file system implementation in the Linux kernel did not properly perform metadata validation when mounting certain images. An attacker could use this to specially craft a file system image that, when mounted, could cause a denial of service (system crash). (CVE-2023-2124)
It was discovered that the SLIMpro I2C device driver in the Linux kernel did not properly validate user-supplied data in some situations, leading to an out-of-bounds write vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-2194)
It was discovered that a race condition existed in the TLS subsystem in the Linux kernel, leading to a use-after-free or a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-28466)
It was discovered that the DA9150 charger driver in the Linux kernel did not properly handle device removal, leading to a user-after free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-30772)
It was discovered that the btrfs file system implementation in the Linux kernel did not properly handle error conditions in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-3111)
It was discovered that the Ricoh R5C592 MemoryStick card reader driver in the Linux kernel contained a race condition during module unload, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3141)
It was discovered that the Qualcomm EMAC ethernet driver in the Linux kernel did not properly handle device removal, leading to a user-after free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-33203)
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "linux-buildinfo-5.4.0-1107-aws": "5.4.0-1107.115~18.04.1", "linux-aws-5.4-cloud-tools-5.4.0-1107": "5.4.0-1107.115~18.04.1", "linux-headers-5.4.0-1107-aws": "5.4.0-1107.115~18.04.1", "linux-tools-5.4.0-1107-aws": "5.4.0-1107.115~18.04.1", "linux-aws-5.4-tools-5.4.0-1107": "5.4.0-1107.115~18.04.1", "linux-modules-5.4.0-1107-aws": "5.4.0-1107.115~18.04.1", "linux-image-unsigned-5.4.0-1107-aws-dbgsym": "5.4.0-1107.115~18.04.1", "linux-cloud-tools-5.4.0-1107-aws": "5.4.0-1107.115~18.04.1", "linux-image-unsigned-5.4.0-1107-aws": "5.4.0-1107.115~18.04.1", "linux-aws-5.4-headers-5.4.0-1107": "5.4.0-1107.115~18.04.1", "linux-modules-extra-5.4.0-1107-aws": "5.4.0-1107.115~18.04.1" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "linux-buildinfo-5.4.0-1110-gcp": "5.4.0-1110.119~18.04.1", "linux-modules-extra-5.4.0-1110-gcp": "5.4.0-1110.119~18.04.1", "linux-gcp-5.4-headers-5.4.0-1110": "5.4.0-1110.119~18.04.1", "linux-image-unsigned-5.4.0-1110-gcp": "5.4.0-1110.119~18.04.1", "linux-gcp-5.4-tools-5.4.0-1110": "5.4.0-1110.119~18.04.1", "linux-image-unsigned-5.4.0-1110-gcp-dbgsym": "5.4.0-1110.119~18.04.1", "linux-modules-5.4.0-1110-gcp": "5.4.0-1110.119~18.04.1", "linux-headers-5.4.0-1110-gcp": "5.4.0-1110.119~18.04.1", "linux-tools-5.4.0-1110-gcp": "5.4.0-1110.119~18.04.1" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "linux-buildinfo-5.4.0-1106-oracle": "5.4.0-1106.115~18.04.1", "linux-image-unsigned-5.4.0-1106-oracle": "5.4.0-1106.115~18.04.1", "linux-headers-5.4.0-1106-oracle": "5.4.0-1106.115~18.04.1", "linux-modules-5.4.0-1106-oracle": "5.4.0-1106.115~18.04.1", "linux-oracle-5.4-tools-5.4.0-1106": "5.4.0-1106.115~18.04.1", "linux-oracle-5.4-headers-5.4.0-1106": "5.4.0-1106.115~18.04.1", "linux-tools-5.4.0-1106-oracle": "5.4.0-1106.115~18.04.1", "linux-image-unsigned-5.4.0-1106-oracle-dbgsym": "5.4.0-1106.115~18.04.1", "linux-modules-extra-5.4.0-1106-oracle": "5.4.0-1106.115~18.04.1" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "linux-buildinfo-5.4.0-1091-raspi": "5.4.0-1091.102~18.04.1", "linux-raspi-5.4-tools-5.4.0-1091": "5.4.0-1091.102~18.04.1", "linux-tools-5.4.0-1091-raspi": "5.4.0-1091.102~18.04.1", "linux-image-5.4.0-1091-raspi-dbgsym": "5.4.0-1091.102~18.04.1", "linux-modules-5.4.0-1091-raspi": "5.4.0-1091.102~18.04.1", "linux-image-5.4.0-1091-raspi": "5.4.0-1091.102~18.04.1", "linux-raspi-5.4-headers-5.4.0-1091": "5.4.0-1091.102~18.04.1", "linux-headers-5.4.0-1091-raspi": "5.4.0-1091.102~18.04.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "nic-shared-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-tools-5.4.0-156-generic-lpae": "5.4.0-156.173", "pcmcia-storage-modules-5.4.0-156-generic-di": "5.4.0-156.173", "kernel-image-5.4.0-156-generic-di": "5.4.0-156.173", "linux-modules-5.4.0-156-lowlatency": "5.4.0-156.173", "sata-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "nfs-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "linux-headers-5.4.0-156-lowlatency": "5.4.0-156.173", "sata-modules-5.4.0-156-generic-di": "5.4.0-156.173", "block-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "linux-udebs-generic": "5.4.0-156.173", "usb-modules-5.4.0-156-generic-di": "5.4.0-156.173", "vlan-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "input-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-tools-5.4.0-156-lowlatency": "5.4.0-156.173", "linux-cloud-tools-5.4.0-156-lowlatency": "5.4.0-156.173", "plip-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "kernel-image-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "pata-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-cloud-tools-5.4.0-156-generic": "5.4.0-156.173", "storage-core-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "nfs-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-image-5.4.0-156-generic-lpae-dbgsym": "5.4.0-156.173", "linux-modules-extra-5.4.0-156-generic": "5.4.0-156.173", "linux-tools-5.4.0-156": "5.4.0-156.173", "dasd-extra-modules-5.4.0-156-generic-di": "5.4.0-156.173", "input-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "plip-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-image-5.4.0-156-generic-dbgsym": "5.4.0-156.173", "linux-image-5.4.0-156-generic-lpae": "5.4.0-156.173", "nic-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "linux-headers-5.4.0-156": "5.4.0-156.173", "crypto-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "scsi-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "vlan-modules-5.4.0-156-generic-di": "5.4.0-156.173", "nic-usb-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "multipath-modules-5.4.0-156-generic-di": "5.4.0-156.173", "block-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-headers-5.4.0-156-generic-lpae": "5.4.0-156.173", "linux-image-5.4.0-156-generic": "5.4.0-156.173", "linux-cloud-tools-common": "5.4.0-156.173", "pcmcia-modules-5.4.0-156-generic-di": "5.4.0-156.173", "dasd-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-cloud-tools-5.4.0-156": "5.4.0-156.173", "linux-libc-dev": "5.4.0-156.173", "linux-source-5.4.0": "5.4.0-156.173", "mouse-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "floppy-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-doc": "5.4.0-156.173", "parport-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-buildinfo-5.4.0-156-generic": "5.4.0-156.173", "fb-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-buildinfo-5.4.0-156-generic-lpae": "5.4.0-156.173", "fat-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "md-modules-5.4.0-156-generic-di": "5.4.0-156.173", "nic-pcmcia-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-image-unsigned-5.4.0-156-lowlatency": "5.4.0-156.173", "ppp-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "ipmi-modules-5.4.0-156-generic-di": "5.4.0-156.173", "parport-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "storage-core-modules-5.4.0-156-generic-di": "5.4.0-156.173", "ppp-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-image-unsigned-5.4.0-156-lowlatency-dbgsym": "5.4.0-156.173", "linux-modules-5.4.0-156-generic": "5.4.0-156.173", "nic-modules-5.4.0-156-generic-di": "5.4.0-156.173", "fs-secondary-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-image-unsigned-5.4.0-156-generic": "5.4.0-156.173", "linux-modules-5.4.0-156-generic-lpae": "5.4.0-156.173", "ipmi-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "linux-buildinfo-5.4.0-156-lowlatency": "5.4.0-156.173", "linux-tools-host": "5.4.0-156.173", "multipath-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "virtio-modules-5.4.0-156-generic-di": "5.4.0-156.173", "fs-core-modules-5.4.0-156-generic-di": "5.4.0-156.173", "usb-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "scsi-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-headers-5.4.0-156-generic": "5.4.0-156.173", "linux-udebs-generic-lpae": "5.4.0-156.173", "linux-tools-5.4.0-156-generic": "5.4.0-156.173", "fat-modules-5.4.0-156-generic-di": "5.4.0-156.173", "firewire-core-modules-5.4.0-156-generic-di": "5.4.0-156.173", "fs-core-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "nic-usb-modules-5.4.0-156-generic-di": "5.4.0-156.173", "linux-image-unsigned-5.4.0-156-generic-dbgsym": "5.4.0-156.173", "crypto-modules-5.4.0-156-generic-di": "5.4.0-156.173", "fs-secondary-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "linux-tools-common": "5.4.0-156.173", "mouse-modules-5.4.0-156-generic-di": "5.4.0-156.173", "nic-shared-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173", "message-modules-5.4.0-156-generic-di": "5.4.0-156.173", "serial-modules-5.4.0-156-generic-di": "5.4.0-156.173", "md-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173" } ] }
{ "availability": "No subscription required", "binaries": [ { "linux-aws-tools-5.4.0-1107": "5.4.0-1107.115", "linux-tools-5.4.0-1107-aws": "5.4.0-1107.115", "linux-headers-5.4.0-1107-aws": "5.4.0-1107.115", "linux-buildinfo-5.4.0-1107-aws": "5.4.0-1107.115", "linux-aws-headers-5.4.0-1107": "5.4.0-1107.115", "linux-aws-cloud-tools-5.4.0-1107": "5.4.0-1107.115", "linux-image-unsigned-5.4.0-1107-aws-dbgsym": "5.4.0-1107.115", "linux-cloud-tools-5.4.0-1107-aws": "5.4.0-1107.115", "linux-image-unsigned-5.4.0-1107-aws": "5.4.0-1107.115", "linux-modules-extra-5.4.0-1107-aws": "5.4.0-1107.115", "linux-modules-5.4.0-1107-aws": "5.4.0-1107.115" } ] }
{ "availability": "No subscription required", "binaries": [ { "linux-gcp-tools-5.4.0-1110": "5.4.0-1110.119", "linux-buildinfo-5.4.0-1110-gcp": "5.4.0-1110.119", "linux-modules-extra-5.4.0-1110-gcp": "5.4.0-1110.119", "linux-image-unsigned-5.4.0-1110-gcp": "5.4.0-1110.119", "linux-modules-5.4.0-1110-gcp": "5.4.0-1110.119", "linux-image-unsigned-5.4.0-1110-gcp-dbgsym": "5.4.0-1110.119", "linux-tools-5.4.0-1110-gcp": "5.4.0-1110.119", "linux-headers-5.4.0-1110-gcp": "5.4.0-1110.119", "linux-gcp-headers-5.4.0-1110": "5.4.0-1110.119" } ] }
{ "availability": "No subscription required", "binaries": [ { "linux-gkeop-tools-5.4.0-1074": "5.4.0-1074.78", "linux-headers-5.4.0-1074-gkeop": "5.4.0-1074.78", "linux-modules-5.4.0-1074-gkeop": "5.4.0-1074.78", "linux-tools-5.4.0-1074-gkeop": "5.4.0-1074.78", "linux-gkeop-source-5.4.0": "5.4.0-1074.78", "linux-gkeop-cloud-tools-5.4.0-1074": "5.4.0-1074.78", "linux-image-unsigned-5.4.0-1074-gkeop": "5.4.0-1074.78", "linux-gkeop-headers-5.4.0-1074": "5.4.0-1074.78", "linux-cloud-tools-5.4.0-1074-gkeop": "5.4.0-1074.78", "linux-buildinfo-5.4.0-1074-gkeop": "5.4.0-1074.78", "linux-modules-extra-5.4.0-1074-gkeop": "5.4.0-1074.78", "linux-image-unsigned-5.4.0-1074-gkeop-dbgsym": "5.4.0-1074.78" } ] }
{ "availability": "No subscription required", "binaries": [ { "linux-image-unsigned-5.4.0-1019-iot-dbgsym": "5.4.0-1019.20", "linux-image-5.4.0-1019-iot-dbgsym": "5.4.0-1019.20", "linux-iot-tools-common": "5.4.0-1019.20", "linux-modules-5.4.0-1019-iot": "5.4.0-1019.20", "linux-image-5.4.0-1019-iot": "5.4.0-1019.20", "linux-tools-5.4.0-1019-iot": "5.4.0-1019.20", "linux-buildinfo-5.4.0-1019-iot": "5.4.0-1019.20", "linux-iot-tools-5.4.0-1019": "5.4.0-1019.20", "linux-iot-headers-5.4.0-1019": "5.4.0-1019.20", "linux-headers-5.4.0-1019-iot": "5.4.0-1019.20", "linux-image-unsigned-5.4.0-1019-iot": "5.4.0-1019.20" } ] }
{ "availability": "No subscription required", "binaries": [ { "linux-image-unsigned-5.4.0-1096-kvm-dbgsym": "5.4.0-1096.102", "linux-buildinfo-5.4.0-1096-kvm": "5.4.0-1096.102", "linux-tools-5.4.0-1096-kvm": "5.4.0-1096.102", "linux-kvm-tools-5.4.0-1096": "5.4.0-1096.102", "linux-kvm-headers-5.4.0-1096": "5.4.0-1096.102", "linux-modules-5.4.0-1096-kvm": "5.4.0-1096.102", "linux-headers-5.4.0-1096-kvm": "5.4.0-1096.102", "linux-image-unsigned-5.4.0-1096-kvm": "5.4.0-1096.102" } ] }
{ "availability": "No subscription required", "binaries": [ { "linux-buildinfo-5.4.0-1106-oracle": "5.4.0-1106.115", "linux-image-unsigned-5.4.0-1106-oracle": "5.4.0-1106.115", "linux-headers-5.4.0-1106-oracle": "5.4.0-1106.115", "linux-modules-5.4.0-1106-oracle": "5.4.0-1106.115", "linux-oracle-headers-5.4.0-1106": "5.4.0-1106.115", "linux-oracle-tools-5.4.0-1106": "5.4.0-1106.115", "linux-image-unsigned-5.4.0-1106-oracle-dbgsym": "5.4.0-1106.115", "linux-modules-extra-5.4.0-1106-oracle": "5.4.0-1106.115", "linux-tools-5.4.0-1106-oracle": "5.4.0-1106.115" } ] }
{ "availability": "No subscription required", "binaries": [ { "linux-buildinfo-5.4.0-1091-raspi": "5.4.0-1091.102", "linux-tools-5.4.0-1091-raspi": "5.4.0-1091.102", "linux-raspi-headers-5.4.0-1091": "5.4.0-1091.102", "linux-image-5.4.0-1091-raspi-dbgsym": "5.4.0-1091.102", "linux-headers-5.4.0-1091-raspi": "5.4.0-1091.102", "linux-image-5.4.0-1091-raspi": "5.4.0-1091.102", "linux-modules-5.4.0-1091-raspi": "5.4.0-1091.102", "linux-raspi-tools-5.4.0-1091": "5.4.0-1091.102" } ] }