Launchpad |
2111953 |
Noble update: upstream stable patchset 2025-05-29 |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8
|
Launchpad |
2106381 |
nvme/tcp hangs IO on arm |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8
|
Launchpad |
2111599 |
[UBUNTU 24.04] s390/pci: Fix zpci_bus_is_isolated_vf() for non-VF |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8
|
Launchpad |
2109609 |
cpufreq amd-pstate: cpuinfo_max_freq reports incorrect value |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8
|
Launchpad |
2106558 |
Latitude 5450 is experiencing packet loss on Ethernet in Ubuntu 22.04 |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8
|
Launchpad |
2114239 |
Noble update: upstream stable patchset 2025-06-12 |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8
|
CVE |
CVE-2025-37890 |
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc As |
linux linux linux linux linux linux linux-hwe-6.14 linux-hwe-6.8 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.14 linux-riscv linux linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux linux-oracle-6.14 linux-riscv linux linux-riscv-6.14 linux-hwe-6.11 linux-riscv linux linux-riscv linux linux-riscv-6.14 linux-hwe-6.11 linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux linux-ibm-6.8
|
CVE |
CVE-2025-37997 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: fix region locking in hash types Region locking introduced in |
linux linux linux linux linux linux linux-hwe-6.14 linux-hwe-6.8 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.14 linux-riscv linux linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux linux-oracle-6.14 linux-riscv linux linux-riscv-6.14 linux-hwe-6.11 linux-riscv linux linux-riscv linux linux-riscv-6.14 linux-hwe-6.11 linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux linux-ibm-6.8
|
CVE |
CVE-2025-37798 |
In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making |
linux linux linux linux linux linux linux-hwe-6.14 linux-hwe-6.8 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.14 linux-riscv linux linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux linux-oracle-6.14 linux-riscv linux linux-riscv-6.14 linux-hwe-6.11 linux-riscv linux linux-riscv linux linux-riscv-6.14 linux-hwe-6.11 linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux linux-ibm-6.8
|
CVE |
CVE-2025-37931 |
In the Linux kernel, the following vulnerability has been resolved: btrfs: adjust subpage bit start based on sectorsize When running machines with |
linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14
|
CVE |
CVE-2025-37930 |
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() Nouveau is mostly desi |
linux linux linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14
|
CVE |
CVE-2025-37929 |
In the Linux kernel, the following vulnerability has been resolved: arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays Commit a5951389 |
linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14
|
CVE |
CVE-2025-37991 |
In the Linux kernel, the following vulnerability has been resolved: parisc: Fix double SIGFPE crash Camm noticed that on parisc a SIGFPE exception |
linux linux linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14
|
CVE |
CVE-2025-37936 |
In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value. When |
linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14
|
CVE |
CVE-2025-37901 |
In the Linux kernel, the following vulnerability has been resolved: irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs On Qualcom |
linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14
|
CVE |
CVE-2025-37990 |
In the Linux kernel, the following vulnerability has been resolved: wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() The fun |
linux linux linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14
|
CVE |
CVE-2025-37928 |
In the Linux kernel, the following vulnerability has been resolved: dm-bufio: don't schedule in atomic context A BUG was reported as below when CON |
linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14
|
CVE |
CVE-2025-37927 |
In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid There is a strin |
linux linux linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14
|
CVE |
CVE-2025-37900 |
In the Linux kernel, the following vulnerability has been resolved: iommu: Fix two issues in iommu_copy_struct_from_user() In the review for iommu_ |
linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14
|
CVE |
CVE-2025-37926 |
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_session_rpc_open A UAF issue can occur due t |
linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14
|