Bugs fixes in "linux-azure-6.8"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
Launchpad | 2078304 | Noble update: upstream stable patchset 2024-09-02 | 2024-10-23 |
Launchpad | 2076190 | perf build disables tracepoint support | 2024-10-23 |
CVE | CVE-2024-42159 | In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Sanitise num_phys Information is stored in mr_sas_port->phy_mask, | 2024-10-23 |
CVE | CVE-2024-42228 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc In | 2024-10-23 |
CVE | CVE-2024-42154 | In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don't see anything checking that TCP | 2024-10-23 |
CVE | CVE-2024-42224 | In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Correct check for empty list Since commit a3c53be55c95 ("n | 2024-10-23 |
CVE | CVE-2024-42160 | In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to | 2024-10-23 |
CVE | CVE-2024-41009 | In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overrunning reservations in ringbuf The BPF ring buffer internally is | 2024-10-23 |
Launchpad | 2077600 | Noble update: upstream stable patchset 2024-08-22 | 2024-10-23 |
Launchpad | 2076435 | Noble update: upstream stable patchset 2024-08-09 | 2024-10-23 |
CVE | CVE-2024-42159 | In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Sanitise num_phys Information is stored in mr_sas_port->phy_mask, | 2024-10-22 |
CVE | CVE-2024-42228 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc In | 2024-10-22 |
CVE | CVE-2024-42154 | In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don't see anything checking that TCP | 2024-10-22 |
CVE | CVE-2024-42224 | In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Correct check for empty list Since commit a3c53be55c95 ("n | 2024-10-22 |
CVE | CVE-2024-42160 | In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to | 2024-10-22 |
CVE | CVE-2024-41009 | In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overrunning reservations in ringbuf The BPF ring buffer internally is | 2024-10-22 |
Launchpad | 2077600 | Noble update: upstream stable patchset 2024-08-22 | 2024-10-22 |
Launchpad | 2076435 | Noble update: upstream stable patchset 2024-08-09 | 2024-10-22 |
CVE | CVE-2024-42159 | In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Sanitise num_phys Information is stored in mr_sas_port->phy_mask, | 2024-10-12 |
CVE | CVE-2024-42228 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc In | 2024-10-12 |
About
-
Send Feedback to @ubuntu_updates