Bugs fixes in "linux-lowlatency-hwe-5.15"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2024-38611 | In the Linux kernel, the following vulnerability has been resolved: media: i2c: et8ek8: Don't strip remove function when driver is builtin Using __ | 2024-10-17 |
CVE | CVE-2024-40915 | In the Linux kernel, the following vulnerability has been resolved: riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context __kernel | 2024-10-17 |
CVE | CVE-2024-41071 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Avoid address calculations via out of bounds array indexing req | 2024-10-17 |
CVE | CVE-2024-26800 | In the Linux kernel, the following vulnerability has been resolved: tls: fix use-after-free on failed backlog decryption When the decrypt request g | 2024-10-17 |
Launchpad | 2076100 | Jammy update: v5.15.164 upstream stable release | 2024-10-17 |
Launchpad | 2074380 | [UBUNTU 22.04] s390/cpum_cf: make crypto counters upward compatible | 2024-10-17 |
Launchpad | 2078428 | Jammy update: v5.15.165 upstream stable release | 2024-10-17 |
Launchpad | 2069961 | turbostat fails with too many open files on large systems | 2024-10-17 |
Launchpad | 1959940 | [22.10 FEAT] KVM: Secure Execution guest dump encryption with customer keys - kernel part | 2024-10-17 |
Launchpad | 2080594 | Jammy update: v5.15.166 upstream stable release | 2024-10-17 |
Launchpad | 2081279 | Jammy update: v5.15.167 upstream stable release | 2024-10-17 |
Launchpad | 2077321 | Please backport the more restrictive XSAVES deactivation for Zen1/2 arch | 2024-10-17 |
CVE | CVE-2024-27397 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time | 2024-10-16 |
CVE | CVE-2024-38630 | In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the | 2024-10-16 |
CVE | CVE-2024-45016 | In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu | 2024-10-16 |
CVE | CVE-2024-27397 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time | 2024-10-15 |
CVE | CVE-2024-38630 | In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the | 2024-10-15 |
CVE | CVE-2024-45016 | In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu | 2024-10-15 |
CVE | CVE-2024-27397 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time | 2024-10-07 |
CVE | CVE-2024-38630 | In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the | 2024-10-07 |
About
-
Send Feedback to @ubuntu_updates