Bugs fixes in "linux-bluefield"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2023-52760 | In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc In gfs2_put_super(), whether w | 2024-08-13 |
CVE | CVE-2024-24860 | A race condition was found in the Linux kernel's bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dere | 2024-08-13 |
CVE | CVE-2024-26830 | In the Linux kernel, the following vulnerability has been resolved: i40e: Do not allow untrusted VF to remove administratively set MAC Currently wh | 2024-08-13 |
CVE | CVE-2024-36901 | In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a | 2024-08-13 |
CVE | CVE-2024-39484 | In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit f | 2024-08-13 |
CVE | CVE-2024-26929 | In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix double free of fcport The server was crashing after LOGO bec | 2024-08-13 |
CVE | CVE-2024-26921 | In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and oth | 2024-08-13 |
Launchpad | 2073621 | Focal update: v5.4.279 upstream stable release | 2024-08-13 |
Launchpad | 2074215 | [SRU] UBSAN warnings in bnx2x kernel driver | 2024-08-13 |
Launchpad | 2075175 | Focal update: v5.4.280 upstream stable release | 2024-08-13 |
CVE | CVE-2024-26583 | In the Linux kernel, the following vulnerability has been resolved: tls: fix race between async notify and socket close The submitting thread (one | 2024-07-25 |
CVE | CVE-2024-26584 | In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests Since we're setting the CRYPTO_ | 2024-07-25 |
CVE | CVE-2024-26585 | In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous | 2024-07-25 |
CVE | CVE-2024-26907 | In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix fortify source warning while accessing Eth segment ------------ | 2024-07-25 |
CVE | CVE-2022-48655 | In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Harden accesses to the reset domains Accessing reset domain | 2024-07-25 |
CVE | CVE-2024-36016 | In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following | 2024-07-25 |
CVE | CVE-2024-26583 | In the Linux kernel, the following vulnerability has been resolved: tls: fix race between async notify and socket close The submitting thread (one | 2024-07-25 |
CVE | CVE-2024-26584 | In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests Since we're setting the CRYPTO_ | 2024-07-25 |
CVE | CVE-2024-26585 | In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous | 2024-07-25 |
CVE | CVE-2024-26907 | In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix fortify source warning while accessing Eth segment ------------ | 2024-07-25 |
About
-
Send Feedback to @ubuntu_updates