It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service (infinite recursion). (CVE-2020-36691)
Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl() in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-0168)
It was discovered that the ext4 file system implementation in the Linux kernel contained a use-after-free vulnerability. An attacker could use this to construct a malicious ext4 file system image that, when mounted, could cause a denial of service (system crash). (CVE-2022-1184)
It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. (CVE-2022-27672)
William Zhao discovered that the Traffic Control (TC) subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2022-4269)
It was discovered that a race condition existed in the qdisc implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-0590)
It was discovered that a race condition existed in the btrfs file system implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-1611)
It was discovered that the APM X-Gene SoC hardware monitoring driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). (CVE-2023-1855)
It was discovered that the ST NCI NFC driver did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2023-1990)
It was discovered that the XFS file system implementation in the Linux kernel did not properly perform metadata validation when mounting certain images. An attacker could use this to specially craft a file system image that, when mounted, could cause a denial of service (system crash). (CVE-2023-2124)
It was discovered that the SLIMpro I2C device driver in the Linux kernel did not properly validate user-supplied data in some situations, leading to an out-of-bounds write vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-2194)
It was discovered that a race condition existed in the TLS subsystem in the Linux kernel, leading to a use-after-free or a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-28466)
It was discovered that the DA9150 charger driver in the Linux kernel did not properly handle device removal, leading to a user-after free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-30772)
It was discovered that the btrfs file system implementation in the Linux kernel did not properly handle error conditions in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-3111)
It was discovered that the Ricoh R5C592 MemoryStick card reader driver in the Linux kernel contained a race condition during module unload, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3141)
It was discovered that the Qualcomm EMAC ethernet driver in the Linux kernel did not properly handle device removal, leading to a user-after free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-33203)
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "nic-shared-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-tools-5.4.0-156-generic-lpae": "5.4.0-156.173~18.04.1", "linux-hwe-5.4-headers-5.4.0-156": "5.4.0-156.173~18.04.1", "kernel-image-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "pcmcia-storage-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-modules-5.4.0-156-lowlatency": "5.4.0-156.173~18.04.1", "nfs-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "sata-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "linux-headers-5.4.0-156-lowlatency": "5.4.0-156.173~18.04.1", "sata-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "block-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "usb-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-hwe-5.4-tools-5.4.0-156": "5.4.0-156.173~18.04.1", "linux-image-5.4.0-156-lowlatency": "5.4.0-156.173~18.04.1", "vlan-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "input-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-tools-5.4.0-156-lowlatency": "5.4.0-156.173~18.04.1", "linux-cloud-tools-5.4.0-156-lowlatency": "5.4.0-156.173~18.04.1", "plip-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "kernel-image-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "pata-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-cloud-tools-5.4.0-156-generic": "5.4.0-156.173~18.04.1", "storage-core-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "nfs-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-image-5.4.0-156-generic-lpae-dbgsym": "5.4.0-156.173~18.04.1", "linux-modules-extra-5.4.0-156-generic": "5.4.0-156.173~18.04.1", "dasd-extra-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "input-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "plip-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-image-5.4.0-156-generic-dbgsym": "5.4.0-156.173~18.04.1", "linux-hwe-5.4-cloud-tools-common": "5.4.0-156.173~18.04.1", "linux-image-5.4.0-156-generic-lpae": "5.4.0-156.173~18.04.1", "nic-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "crypto-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "scsi-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "vlan-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "nic-usb-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "multipath-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "block-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-headers-5.4.0-156-generic-lpae": "5.4.0-156.173~18.04.1", "linux-image-5.4.0-156-generic": "5.4.0-156.173~18.04.1", "scsi-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-hwe-5.4-udebs-generic": "5.4.0-156.173~18.04.1", "dasd-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-hwe-5.4-source-5.4.0": "5.4.0-156.173~18.04.1", "linux-buildinfo-5.4.0-156-generic-lpae": "5.4.0-156.173~18.04.1", "floppy-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "mouse-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "fat-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "parport-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "md-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-buildinfo-5.4.0-156-generic": "5.4.0-156.173~18.04.1", "fb-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "usb-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "pcmcia-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "nic-pcmcia-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-image-unsigned-5.4.0-156-lowlatency": "5.4.0-156.173~18.04.1", "ppp-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "ipmi-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "parport-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "storage-core-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "ppp-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-image-unsigned-5.4.0-156-lowlatency-dbgsym": "5.4.0-156.173~18.04.1", "virtio-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "nic-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "fs-secondary-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-image-unsigned-5.4.0-156-generic": "5.4.0-156.173~18.04.1", "linux-modules-5.4.0-156-generic-lpae": "5.4.0-156.173~18.04.1", "ipmi-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "linux-buildinfo-5.4.0-156-lowlatency": "5.4.0-156.173~18.04.1", "multipath-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "linux-modules-5.4.0-156-generic": "5.4.0-156.173~18.04.1", "linux-hwe-5.4-tools-common": "5.4.0-156.173~18.04.1", "fs-core-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-hwe-5.4-udebs-generic-lpae": "5.4.0-156.173~18.04.1", "linux-headers-5.4.0-156-generic": "5.4.0-156.173~18.04.1", "linux-tools-5.4.0-156-generic": "5.4.0-156.173~18.04.1", "fat-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "fs-secondary-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "fs-core-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "nic-usb-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-image-unsigned-5.4.0-156-generic-dbgsym": "5.4.0-156.173~18.04.1", "crypto-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "firewire-core-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "linux-image-5.4.0-156-lowlatency-dbgsym": "5.4.0-156.173~18.04.1", "mouse-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "nic-shared-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1", "linux-hwe-5.4-cloud-tools-5.4.0-156": "5.4.0-156.173~18.04.1", "serial-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "message-modules-5.4.0-156-generic-di": "5.4.0-156.173~18.04.1", "md-modules-5.4.0-156-generic-lpae-di": "5.4.0-156.173~18.04.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "linux-headers-5.4.0-1027-xilinx-zynqmp": "5.4.0-1027.31", "linux-xilinx-zynqmp-headers-5.4.0-1027": "5.4.0-1027.31", "linux-buildinfo-5.4.0-1027-xilinx-zynqmp": "5.4.0-1027.31", "linux-xilinx-zynqmp-tools-5.4.0-1027": "5.4.0-1027.31", "linux-modules-5.4.0-1027-xilinx-zynqmp": "5.4.0-1027.31", "linux-image-5.4.0-1027-xilinx-zynqmp": "5.4.0-1027.31", "linux-image-5.4.0-1027-xilinx-zynqmp-dbgsym": "5.4.0-1027.31", "linux-tools-5.4.0-1027-xilinx-zynqmp": "5.4.0-1027.31" } ] }