CVE |
CVE-2024-57975 |
In the Linux kernel, the following vulnerability has been resolved: btrfs: do proper folio cleanup when run_delalloc_nocow() failed [BUG] With CONF |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8 linux-riscv-6.8 linux-gcp-6.8 linux-hwe-6.8 linux-riscv-6.8
|
CVE |
CVE-2025-40364 |
In the Linux kernel, the following vulnerability has been resolved: io_uring: fix io_req_prep_async with provided buffers io_req_prep_async() can i |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8 linux-riscv-6.8 linux-gcp-6.8 linux-hwe-6.8 linux-riscv-6.8
|
CVE |
CVE-2025-37750 |
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix UAF in decryption with multichannel After commit f7025d861694 |
linux linux linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux linux linux-ibm-6.8 linux-nvidia-tegra linux-riscv-6.8 linux-gcp-6.8 linux-hwe-6.8 linux-riscv-6.8
|
CVE |
CVE-2024-56699 |
In the Linux kernel, the following vulnerability has been resolved: s390/pci: Fix potential double remove of hotplug slot In commit 6ee600bfbe0f (" |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8 linux-riscv-6.8 linux-gcp-6.8 linux-hwe-6.8 linux-riscv-6.8
|
Launchpad |
2112519 |
raid1: Fix NULL pointer dereference in process_checks() |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-riscv linux linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux-hwe-6.11 linux-riscv linux linux-hwe-6.11 linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8 linux-riscv-6.8 linux-gcp-6.8 linux-hwe-6.8 linux-riscv-6.8
|
Launchpad |
2111953 |
Noble update: upstream stable patchset 2025-05-29 |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8 linux-riscv-6.8 linux-gcp-6.8 linux-hwe-6.8 linux-riscv-6.8
|
Launchpad |
2106381 |
nvme/tcp hangs IO on arm |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8 linux-riscv-6.8 linux-gcp-6.8 linux-hwe-6.8 linux-riscv-6.8
|
Launchpad |
2111599 |
[UBUNTU 24.04] s390/pci: Fix zpci_bus_is_isolated_vf() for non-VF |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8 linux-riscv-6.8 linux-gcp-6.8 linux-hwe-6.8 linux-riscv-6.8
|
Launchpad |
2109609 |
cpufreq amd-pstate: cpuinfo_max_freq reports incorrect value |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8 linux-riscv-6.8 linux-gcp-6.8 linux-hwe-6.8 linux-riscv-6.8
|
Launchpad |
2106558 |
Latitude 5450 is experiencing packet loss on Ethernet in Ubuntu 22.04 |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8 linux-riscv-6.8 linux-gcp-6.8 linux-hwe-6.8 linux-riscv-6.8
|
Launchpad |
2114239 |
Noble update: upstream stable patchset 2025-06-12 |
linux linux linux-hwe-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-ibm-6.8 linux-riscv-6.8 linux-gcp-6.8 linux-hwe-6.8 linux-riscv-6.8
|
CVE |
CVE-2025-37890 |
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc As |
linux linux linux linux linux linux linux-hwe-6.14 linux-hwe-6.8 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.14 linux-riscv linux linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux linux-oracle-6.14 linux-riscv linux linux-riscv-6.14 linux-hwe-6.11 linux-riscv linux linux-riscv linux linux-riscv-6.14 linux-hwe-6.11 linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux linux-ibm-6.8 linux-nvidia-tegra linux-riscv-6.8 linux-gcp-6.8 linux-azure-fde-6.14 linux-hwe-6.8 linux-azure-6.14 linux-riscv-6.8
|
CVE |
CVE-2025-37997 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: fix region locking in hash types Region locking introduced in |
linux linux linux linux linux linux linux-hwe-6.14 linux-hwe-6.8 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.14 linux-riscv linux linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux linux-oracle-6.14 linux-riscv linux linux-riscv-6.14 linux-hwe-6.11 linux-riscv linux linux-riscv linux linux-riscv-6.14 linux-hwe-6.11 linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux linux-ibm-6.8 linux-nvidia-tegra linux-riscv-6.8 linux-gcp-6.8 linux-azure-fde-6.14 linux-hwe-6.8 linux-azure-6.14 linux-riscv-6.8
|
CVE |
CVE-2025-37798 |
In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making |
linux linux linux linux linux linux linux-hwe-6.14 linux-hwe-6.8 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-lowlatency-hwe-6.8 linux-oem-6.8 linux-lowlatency-hwe-6.8 linux-oem-6.14 linux-riscv linux linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux linux-oracle-6.14 linux-riscv linux linux-riscv-6.14 linux-hwe-6.11 linux-riscv linux linux-riscv linux linux-riscv-6.14 linux-hwe-6.11 linux linux-riscv-6.8 linux-lowlatency-hwe-6.8 linux linux-ibm-6.8 linux-nvidia-tegra linux-riscv-6.8 linux-gcp-6.8 linux-azure-fde-6.14 linux-hwe-6.8 linux-azure-6.14 linux-riscv-6.8
|
CVE |
CVE-2025-37931 |
In the Linux kernel, the following vulnerability has been resolved: btrfs: adjust subpage bit start based on sectorsize When running machines with |
linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14 linux-azure-fde-6.14 linux-azure-6.14
|
CVE |
CVE-2025-37930 |
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() Nouveau is mostly desi |
linux linux linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14 linux-nvidia-tegra linux-azure-fde-6.14 linux-azure-6.14
|
CVE |
CVE-2025-37929 |
In the Linux kernel, the following vulnerability has been resolved: arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays Commit a5951389 |
linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14 linux-azure-fde-6.14 linux-azure-6.14
|
CVE |
CVE-2025-37991 |
In the Linux kernel, the following vulnerability has been resolved: parisc: Fix double SIGFPE crash Camm noticed that on parisc a SIGFPE exception |
linux linux linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14 linux-nvidia-tegra linux-azure-fde-6.14 linux-azure-6.14
|
CVE |
CVE-2025-37936 |
In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value. When |
linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14 linux-azure-fde-6.14 linux-azure-6.14
|
CVE |
CVE-2025-37901 |
In the Linux kernel, the following vulnerability has been resolved: irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs On Qualcom |
linux linux linux-hwe-6.14 linux-hwe-6.14 linux-riscv-6.14 linux-riscv linux-gcp-6.14 linux-riscv linux-riscv-6.14 linux-oem-6.14 linux-oracle-6.14 linux-azure-fde-6.14 linux-azure-6.14
|