Bugs fixes in "linux-bluefield"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2024-35848 | In the Linux kernel, the following vulnerability has been resolved: eeprom: at24: fix memory corruption race condition If the eeprom is not accessi | 2024-10-10 |
CVE | CVE-2024-38602 | In the Linux kernel, the following vulnerability has been resolved: ax25: Fix reference count leak issues of ax25_dev The ax25_addr_ax25dev() and a | 2024-10-10 |
CVE | CVE-2024-38611 | In the Linux kernel, the following vulnerability has been resolved: media: i2c: et8ek8: Don't strip remove function when driver is builtin Using __ | 2024-10-10 |
CVE | CVE-2024-42229 | In the Linux kernel, the following vulnerability has been resolved: crypto: aead,cipher - zeroize key buffer after use I.G 9.7.B for FIPS 140-3 spe | 2024-10-10 |
CVE | CVE-2024-41071 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Avoid address calculations via out of bounds array indexing req | 2024-10-10 |
CVE | CVE-2024-41073 | In the Linux kernel, the following vulnerability has been resolved: nvme: avoid double free special payload If a discard request needs to be retrie | 2024-10-10 |
CVE | CVE-2024-40929 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids In some versions o | 2024-10-10 |
CVE | CVE-2024-42244 | In the Linux kernel, the following vulnerability has been resolved: USB: serial: mos7840: fix crash on resume Since commit c49cfa917025 ("USB: seri | 2024-10-10 |
CVE | CVE-2021-47212 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Update error handler for UCTX and UMEM In the fast unload flow, the d | 2024-10-10 |
CVE | CVE-2024-26641 | In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() syzbot found __ip | 2024-10-10 |
CVE | CVE-2024-26800 | In the Linux kernel, the following vulnerability has been resolved: tls: fix use-after-free on failed backlog decryption When the decrypt request g | 2024-10-10 |
Launchpad | 2076097 | Focal update: v5.4.281 upstream stable release | 2024-10-10 |
Launchpad | 2078388 | Focal update: v5.4.282 upstream stable release | 2024-10-10 |
Launchpad | 2080595 | Focal update: v5.4.283 upstream stable release | 2024-10-10 |
Launchpad | 2081278 | Focal update: v5.4.284 upstream stable release | 2024-10-10 |
Launchpad | 2081085 | wbt:wbt_* trace event NULL pointer dereference with GENHD_FL_HIDDEN disks | 2024-10-10 |
CVE | CVE-2024-26960 | In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix race between free_swap_and_cache() and swapoff() There was previo | 2024-10-07 |
CVE | CVE-2024-27397 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time | 2024-10-07 |
CVE | CVE-2024-38630 | In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the | 2024-10-07 |
CVE | CVE-2024-45016 | In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu | 2024-10-07 |
About
-
Send Feedback to @ubuntu_updates