Bugs addressed in recent updates
Origin | Bug number | Title | Packages |
---|---|---|---|
CVE | CVE-2024-26734 | In the Linux kernel, the following vulnerability has been resolved: devlink: fix possible use-after-free and memory leaks in devlink_init() The per | linux |
CVE | CVE-2024-26789 | In the Linux kernel, the following vulnerability has been resolved: crypto: arm64/neonbs - fix out-of-bounds access on short input The bit-sliced i | linux |
CVE | CVE-2024-26805 | In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter syzbot reported | linux |
CVE | CVE-2024-26801 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Avoid potential use-after-free in hci_error_reset While handling the | linux |
Launchpad | 2059991 | Mantic update: upstream stable patchset 2024-04-02 | linux |
Launchpad | 2061814 | Mantic update: upstream stable patchset 2024-04-16 | linux |
Launchpad | 2057734 | proc_sched_rt01 from ubuntu_ltp failed | linux |
Launchpad | 2060919 | cifs: Copying file to same directory results in page fault | linux |
CVE | CVE-2024-26622 | In the Linux kernel, the following vulnerability has been resolved: tomoyo: fix UAF write bug in tomoyo_write_control() Since tomoyo_write_control( | linux linux linux linux linux linux-aws-5.15 |
CVE | CVE-2023-47233 | The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by | linux linux linux linux linux linux-aws-5.15 |
CVE | CVE-2024-26748 | In the Linux kernel, the following vulnerability has been resolved: usb: cdns3: fix memory double free when handle zero packet 829 if (request->co | linux linux linux linux-aws-5.15 |
CVE | CVE-2024-26736 | In the Linux kernel, the following vulnerability has been resolved: afs: Increase buffer size in afs_update_volume_status() The max length of volum | linux linux linux linux-aws-5.15 |
CVE | CVE-2024-26735 | In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations | linux linux linux linux-aws-5.15 |
CVE | CVE-2024-26733 | In the Linux kernel, the following vulnerability has been resolved: arp: Prevent overflow in arp_req_get(). syzkaller reported an overflown write i | linux linux linux linux linux linux-aws-5.15 |
CVE | CVE-2024-26782 | In the Linux kernel, the following vulnerability has been resolved: mptcp: fix double-free on socket dismantle when MPTCP server accepts an incomin | linux linux linux linux-aws-5.15 |
CVE | CVE-2023-52447 | In the Linux kernel, the following vulnerability has been resolved: bpf: Defer the free of inner map when necessary When updating or deleting an in | linux linux linux-aws-5.15 |
CVE | CVE-2023-52530 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential key use-after-free When ieee80211_key_link() is c | linux linux linux linux linux-aws-5.15 |
CVE | CVE-2024-26792 | In the Linux kernel, the following vulnerability has been resolved: btrfs: fix double free of anonymous device after snapshot creation failure When | linux linux linux linux-aws-5.15 |
CVE | CVE-2024-26809 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: release elements in clone only from destroy path Clo | linux linux linux linux-aws-5.15 |
Launchpad | 2060142 | Jammy update: v5.15.150 upstream stable release | linux linux linux-aws-5.15 |
About
-
Send Feedback to @ubuntu_updates