Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2024-43834

Publication date 17 August 2024

Last updated 29 November 2024


Ubuntu priority

Cvss 3 Severity Score

5.5 · Medium

Score breakdown

In the Linux kernel, the following vulnerability has been resolved: xdp: fix invalid wait context of page_pool_destroy() If the driver uses a page pool, it creates a page pool with page_pool_create(). The reference count of page pool is 1 as default. A page pool will be destroyed only when a reference count reaches 0. page_pool_destroy() is used to destroy page pool, it decreases a reference count. When a page pool is destroyed, ->disconnect() is called, which is mem_allocator_disconnect(). This function internally acquires mutex_lock(). If the driver uses XDP, it registers a memory model with xdp_rxq_info_reg_mem_model(). The xdp_rxq_info_reg_mem_model() internally increases a page pool reference count if a memory model is a page pool. Now the reference count is 2. To destroy a page pool, the driver should call both page_pool_destroy() and xdp_unreg_mem_model(). The xdp_unreg_mem_model() internally calls page_pool_destroy(). Only page_pool_destroy() decreases a reference count. If a driver calls page_pool_destroy() then xdp_unreg_mem_model(), we will face an invalid wait context warning. Because xdp_unreg_mem_model() calls page_pool_destroy() with rcu_read_lock(). The page_pool_destroy() internally acquires mutex_lock(). Splat looks like: ============================= [ BUG: Invalid wait context ] 6.10.0-rc6+ #4 Tainted: G W ----------------------------- ethtool/1806 is trying to lock: ffffffff90387b90 (mem_id_lock){+.+.}-{4:4}, at: mem_allocator_disconnect+0x73/0x150 other info that might help us debug this: context-{5:5} 3 locks held by ethtool/1806: stack backtrace: CPU: 0 PID: 1806 Comm: ethtool Tainted: G W 6.10.0-rc6+ #4 f916f41f172891c800f2fed Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021 Call Trace: <TASK> dump_stack_lvl+0x7e/0xc0 __lock_acquire+0x1681/0x4de0 ? _printk+0x64/0xe0 ? __pfx_mark_lock.part.0+0x10/0x10 ? __pfx___lock_acquire+0x10/0x10 lock_acquire+0x1b3/0x580 ? mem_allocator_disconnect+0x73/0x150 ? __wake_up_klogd.part.0+0x16/0xc0 ? __pfx_lock_acquire+0x10/0x10 ? dump_stack_lvl+0x91/0xc0 __mutex_lock+0x15c/0x1690 ? mem_allocator_disconnect+0x73/0x150 ? __pfx_prb_read_valid+0x10/0x10 ? mem_allocator_disconnect+0x73/0x150 ? __pfx_llist_add_batch+0x10/0x10 ? console_unlock+0x193/0x1b0 ? lockdep_hardirqs_on+0xbe/0x140 ? __pfx___mutex_lock+0x10/0x10 ? tick_nohz_tick_stopped+0x16/0x90 ? __irq_work_queue_local+0x1e5/0x330 ? irq_work_queue+0x39/0x50 ? __wake_up_klogd.part.0+0x79/0xc0 ? mem_allocator_disconnect+0x73/0x150 mem_allocator_disconnect+0x73/0x150 ? __pfx_mem_allocator_disconnect+0x10/0x10 ? mark_held_locks+0xa5/0xf0 ? rcu_is_watching+0x11/0xb0 page_pool_release+0x36e/0x6d0 page_pool_destroy+0xd7/0x440 xdp_unreg_mem_model+0x1a7/0x2a0 ? __pfx_xdp_unreg_mem_model+0x10/0x10 ? kfree+0x125/0x370 ? bnxt_free_ring.isra.0+0x2eb/0x500 ? bnxt_free_mem+0x5ac/0x2500 xdp_rxq_info_unreg+0x4a/0xd0 bnxt_free_mem+0x1356/0x2500 bnxt_close_nic+0xf0/0x3b0 ? __pfx_bnxt_close_nic+0x10/0x10 ? ethnl_parse_bit+0x2c6/0x6d0 ? __pfx___nla_validate_parse+0x10/0x10 ? __pfx_ethnl_parse_bit+0x10/0x10 bnxt_set_features+0x2a8/0x3e0 __netdev_update_features+0x4dc/0x1370 ? ethnl_parse_bitset+0x4ff/0x750 ? __pfx_ethnl_parse_bitset+0x10/0x10 ? __pfx___netdev_update_features+0x10/0x10 ? mark_held_locks+0xa5/0xf0 ? _raw_spin_unlock_irqrestore+0x42/0x70 ? __pm_runtime_resume+0x7d/0x110 ethnl_set_features+0x32d/0xa20 To fix this problem, it uses rhashtable_lookup_fast() instead of rhashtable_lookup() with rcu_read_lock(). Using xa without rcu_read_lock() here is safe. xa is freed by __xdp_mem_allocator_rcu_free() and this is called by call_rcu() of mem_xa_remove(). The mem_xa_remove() is called by page_pool_destroy() if a reference count reaches 0. The xa is already protected by the reference count mechanism well in the control plane. So removing rcu_read_lock() for page_pool_destroy() is safe.

Status

Package Ubuntu Release Status
linux 24.10 oracular
Not affected
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy
Fixed 5.15.0-125.135
20.04 LTS focal
Vulnerable
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Ignored ESM criteria, was needed
14.04 LTS trusty Ignored ESM criteria, was needed
linux-allwinner-5.19 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored end of kernel support
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-aws 24.10 oracular
Not affected
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy
Fixed 5.15.0-1072.78
20.04 LTS focal
Vulnerable
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Ignored ESM criteria, was needed
14.04 LTS trusty Ignored ESM criteria, was needed
linux-aws-5.0 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored superseded by linux-aws-5.3
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-aws-5.11 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-aws-5.13
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-aws-5.13 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-aws-5.15
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-aws-5.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Fixed 5.15.0-1072.78~20.04.1
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-aws-5.19 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-aws-6.2
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-aws-5.3 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored superseded by linux-aws-5.4
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-aws-5.4 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-aws-5.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-aws-5.11
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-aws-6.2 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-aws-6.5
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-aws-6.5 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-aws-6.8
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-aws-6.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Vulnerable, work in progress
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-aws-fips 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Not in release
linux-aws-hwe 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Ignored ESM criteria, was needed
14.04 LTS trusty Not in release
linux-azure 24.10 oracular
Not affected
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy
Fixed 5.15.0-1075.84
20.04 LTS focal
Vulnerable
18.04 LTS bionic Ignored superseded by linux-azure-5.3
16.04 LTS xenial Ignored ESM criteria, was needed
14.04 LTS trusty Ignored ESM criteria, was needed
linux-azure-4.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-5.11 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-azure-5.13
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-5.13 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-azure-5.15
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-5.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Vulnerable, work in progress
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-5.19 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-azure-6.2
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-5.3 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored superseded by linux-azure-5.4
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-5.4 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-5.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-azure-5.11
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-6.2 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-azure-6.5
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-6.5 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-azure-6.8
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-6.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Vulnerable, work in progress
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-edge 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored superseded by linux-azure-5.3
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-fde 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Vulnerable
20.04 LTS focal Ignored superseded by linux-azure-fde-5.15
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-fde-5.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Vulnerable
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-fde-5.19 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-azure-fde-6.2
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-fde-6.2 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored replaced by linux-azure-6.5
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-azure-fips 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Not in release
linux-bluefield 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Vulnerable
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-fips 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gcp 24.10 oracular
Not affected
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy
Fixed 5.15.0-1071.79
20.04 LTS focal
Vulnerable
18.04 LTS bionic Ignored superseded by linux-gcp-5.3
16.04 LTS xenial Ignored ESM criteria, was needed
14.04 LTS trusty Not in release
linux-gcp-4.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gcp-5.11 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-gcp-5.13
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gcp-5.13 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-gcp-5.15
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gcp-5.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Fixed 5.15.0-1071.79~20.04.1
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gcp-5.19 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-gcp-6.2
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gcp-5.3 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored superseded by linux-gcp-5.4
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gcp-5.4 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gcp-5.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-gcp-5.11
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gcp-6.2 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-gcp-6.5
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gcp-6.5 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-gcp-6.8
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gcp-6.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Vulnerable, work in progress
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gcp-fips 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Not in release
linux-gke 24.10 oracular Not in release
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy
Fixed 5.15.0-1069.75
20.04 LTS focal Ignored end of kernel support
18.04 LTS bionic Not in release
16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Not in release
linux-gke-4.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored superseded by linux-gke-5.0
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gke-5.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored end of kernel support
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gke-5.4 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored end of kernel support
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gkeop 24.10 oracular Not in release
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy
Fixed 5.15.0-1055.62
20.04 LTS focal Ignored end of life, was needed
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gkeop-5.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Fixed 5.15.0-1055.62~20.04.1
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-gkeop-5.4 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored end of kernel support
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-hwe 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored replaced by linux-hwe-5.4
16.04 LTS xenial Ignored ESM criteria, was needed
14.04 LTS trusty Not in release
linux-hwe-5.11 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-hwe-5.13
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-hwe-5.13 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-hwe-5.15
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-hwe-5.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Fixed 5.15.0-125.135~20.04.1
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-hwe-5.19 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-hwe-6.2
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-hwe-5.4 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-hwe-5.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-hwe-5.11
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-hwe-6.2 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-hwe-6.5
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-hwe-6.5 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-hwe-6.8
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-hwe-6.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Vulnerable, work in progress
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-hwe-edge 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored superseded by linux-hwe-5.4
16.04 LTS xenial Ignored superseded by linux-hwe
14.04 LTS trusty Not in release
linux-ibm 24.10 oracular Not in release
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy
Fixed 5.15.0-1065.68
20.04 LTS focal
Vulnerable
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-ibm-5.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Fixed 5.15.0-1065.68~20.04.1
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-ibm-5.4 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-intel 24.10 oracular Not in release
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-intel-5.13 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored end of kernel support
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-intel-iot-realtime 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-intel-iotg 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Vulnerable, work in progress
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-intel-iotg-5.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Vulnerable, work in progress
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-iot 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Vulnerable
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-kvm 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Fixed 5.15.0-1069.74
20.04 LTS focal
Vulnerable
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Ignored ESM criteria, was needed
14.04 LTS trusty Not in release
linux-lowlatency 24.10 oracular
Not affected
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy
Fixed 5.15.0-125.135
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-lowlatency-hwe-5.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Fixed 5.15.0-125.135~20.04.1
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-lowlatency-hwe-5.19 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-lowlatency-hwe-6.2
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-lowlatency-hwe-6.2 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-lowlatency-hwe-6.5
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-lowlatency-hwe-6.5 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-lowlatency-hwe-6.8
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-lowlatency-hwe-6.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Vulnerable, work in progress
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-lts-xenial 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Ignored ESM criteria, was needed
linux-nvidia 24.10 oracular Not in release
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy
Fixed 5.15.0-1067.68
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-nvidia-6.2 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-nvidia-6.5
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-nvidia-6.5 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-nvidia-6.8, was needed
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-nvidia-6.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Vulnerable, work in progress
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-nvidia-lowlatency 24.10 oracular Not in release
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oem 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored replaced by linux-hwe-5.4
16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Not in release
linux-oem-5.10 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-oem-5.13
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oem-5.13 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-oem-5.14
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oem-5.14 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored replaced by linux-hwe-5.15
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oem-5.17 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-oem-6.1
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oem-5.6 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-oem-5.10
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oem-6.0 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-oem-6.1
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oem-6.1 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-oem-6.5
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oem-6.11 24.10 oracular Not in release
24.04 LTS noble
Not affected
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oem-6.5 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-oem-6.8
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oem-6.8 24.10 oracular Not in release
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oracle 24.10 oracular
Not affected
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy
Fixed 5.15.0-1070.76
20.04 LTS focal
Vulnerable
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Ignored ESM criteria, was needed
14.04 LTS trusty Not in release
linux-oracle-5.0 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored superseded by linux-oracle-5.3
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oracle-5.11 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-oracle-5.13
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oracle-5.13 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-oracle-5.15
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oracle-5.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Fixed 5.15.0-1070.76~20.04.1
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oracle-5.3 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored superseded by linux-oracle-5.4
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oracle-5.4 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oracle-5.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-oracle-5.11
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oracle-6.5 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-oracle-6.8
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-oracle-6.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Vulnerable, work in progress
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-raspi 24.10 oracular
Not affected
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy
Fixed 5.15.0-1065.68
20.04 LTS focal
Vulnerable
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-raspi-5.4 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Ignored ESM criteria, was needed
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-raspi-realtime 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-raspi2 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored replaced by linux-raspi
18.04 LTS bionic Ignored end of standard support
16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Not in release
linux-realtime 24.10 oracular
Not affected
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by Ubuntu Pro ppa version
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-riscv 24.10 oracular
Not affected
24.04 LTS noble
Vulnerable, work in progress
22.04 LTS jammy Ignored end of kernel support
20.04 LTS focal Ignored superseded by linux-riscv-5.8
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-riscv-5.11 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-riscv-5.13
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-riscv-5.15 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Fixed 5.15.0-1068.72~20.04.1
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-riscv-5.19 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored end of kernel support
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-riscv-5.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Ignored superseded by linux-riscv-5.11
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-riscv-6.5 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-riscv-6.8
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-riscv-6.8 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Vulnerable, work in progress
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-starfive-5.19 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored end of kernel support
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-starfive-6.2 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored superseded by linux-starfive-6.5
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-starfive-6.5 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Ignored end of kernel support
20.04 LTS focal Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
linux-xilinx-zynqmp 24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Fixed 5.15.0-1038.42
20.04 LTS focal
Vulnerable
18.04 LTS bionic Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
linux

Severity score breakdown

Parameter Value
Base score 5.5 · Medium
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H