Bugs fixes in "linux-mtk"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
Launchpad | 2076100 | Jammy update: v5.15.164 upstream stable release | 2024-10-21 |
Launchpad | 2076957 | isolcpus are ignored when using cgroups V2, causing processes to have wrong affinity | 2024-10-21 |
Launchpad | 2081686 | [g1200] possible kernel memory leak through CONFIG_DEBUG_KMEMLEAK | 2024-10-21 |
Launchpad | 2081696 | [g1200] Call trace appeared when reload mtk_rng module | 2024-10-21 |
Launchpad | 2081699 | [g700] support p1v4 hardware | 2024-10-21 |
Launchpad | 2084626 | [g510] ddc failed message when the monitor does not support SCDC | 2024-10-21 |
CVE | CVE-2024-26922 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate the parameters of bo mapping operations more clearly Verif | 2024-10-17 |
CVE | CVE-2024-26926 | In the Linux kernel, the following vulnerability has been resolved: binder: check offset alignment in binder_get_object() Commit 6d98eb95b450 ("bin | 2024-10-17 |
CVE | CVE-2024-26642 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets a | 2024-10-17 |
CVE | CVE-2024-24861 | A race condition was found in the Linux kernel's media/xc4000 device driver in xc4000 xc4000_get_frequency() function. This can result in return valu | 2024-10-17 |
CVE | CVE-2024-26828 | In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through | 2024-10-17 |
CVE | CVE-2024-23307 | Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow | 2024-10-17 |
CVE | CVE-2024-36016 | In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following | 2024-10-17 |
CVE | CVE-2024-25742 | In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This | 2024-10-17 |
CVE | CVE-2023-52752 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB ses | 2024-10-17 |
CVE | CVE-2024-26886 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: af_bluetooth: Fix deadlock Attemting to do sock_lock on .recvmsg may | 2024-10-17 |
CVE | CVE-2024-26952 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix potencial out-of-bounds when buffer offset is invalid I found potenc | 2024-10-17 |
CVE | CVE-2024-27017 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generatio | 2024-10-17 |
CVE | CVE-2023-52629 | In the Linux kernel, the following vulnerability has been resolved: sh: push-switch: Reorder cleanup operations to avoid use-after-free bug The ori | 2024-10-17 |
CVE | CVE-2023-52760 | In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc In gfs2_put_super(), whether w | 2024-10-17 |
About
-
Send Feedback to @ubuntu_updates