Bugs fixes in "linux"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2024-43882 | In the Linux kernel, the following vulnerability has been resolved: exec: Fix ToCToU between perm check and set-uid/gid usage When opening a file f | 2024-11-19 |
CVE | CVE-2024-46800 | In the Linux kernel, the following vulnerability has been resolved: sch/netem: fix use after free in netem_dequeue If netem_dequeue() enqueues pack | 2024-11-19 |
Launchpad | 2085495 | mm/folios: xfs hangs with hung task timeouts with corrupted folio pointer lists | 2024-11-19 |
Launchpad | 2085082 | Cannot detect audio sinks and sources in proposed kernel | 2024-11-19 |
CVE | CVE-2024-43882 | In the Linux kernel, the following vulnerability has been resolved: exec: Fix ToCToU between perm check and set-uid/gid usage When opening a file f | 2024-11-18 |
CVE | CVE-2024-46800 | In the Linux kernel, the following vulnerability has been resolved: sch/netem: fix use after free in netem_dequeue If netem_dequeue() enqueues pack | 2024-11-18 |
Launchpad | 2085495 | mm/folios: xfs hangs with hung task timeouts with corrupted folio pointer lists | 2024-11-18 |
CVE | CVE-2023-52639 | In the Linux kernel, the following vulnerability has been resolved: KVM: s390: vsie: fix race during shadow creation Right now it is possible to se | 2024-11-18 |
CVE | CVE-2024-26947 | In the Linux kernel, the following vulnerability has been resolved: ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses Sin | 2024-11-18 |
CVE | CVE-2023-52621 | In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers These thre | 2024-11-18 |
CVE | CVE-2023-52532 | In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix TX CQE error handling For an unknown TX CQE error type (probably | 2024-11-18 |
CVE | CVE-2024-35951 | In the Linux kernel, the following vulnerability has been resolved: drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() Subject: [PAT | 2024-11-18 |
CVE | CVE-2024-42079 | In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix NULL pointer dereference in gfs2_log_flush In gfs2_jindex_free(), set | 2024-11-18 |
CVE | CVE-2024-44940 | In the Linux kernel, the following vulnerability has been resolved: fou: remove warn in gue_gro_receive on unsupported protocol Drop the WARN_ON_ON | 2024-11-18 |
CVE | CVE-2024-38667 | In the Linux kernel, the following vulnerability has been resolved: riscv: prevent pt_regs corruption for secondary idle threads Top of the kernel | 2024-11-18 |
CVE | CVE-2024-42158 | In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings Replace memzero_exp | 2024-11-18 |
CVE | CVE-2024-38538 | In the Linux kernel, the following vulnerability has been resolved: net: bridge: xmit: make sure we have at least eth header len bytes syzbot trigg | 2024-11-18 |
CVE | CVE-2024-44942 | In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC syzbot | 2024-11-18 |
CVE | CVE-2024-42156 | In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe copies of clear-key structures on failure Wipe all sensitive da | 2024-11-18 |
CVE | CVE-2024-35904 | In the Linux kernel, the following vulnerability has been resolved: selinux: avoid dereference of garbage after mount failure In case kern_mount() | 2024-11-18 |
About
-
Send Feedback to @ubuntu_updates