Bugs fixes in "linux-oem-6.11"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2024-56564 | In the Linux kernel, the following vulnerability has been resolved: ceph: pass cred pointer to ceph_mds_auth_match() This eliminates a redundant ge | 2025-03-26 |
CVE | CVE-2024-56563 | In the Linux kernel, the following vulnerability has been resolved: ceph: fix cred leak in ceph_mds_check_access() get_current_cred() increments th | 2025-03-26 |
CVE | CVE-2024-56771 | In the Linux kernel, the following vulnerability has been resolved: mtd: spinand: winbond: Fix 512GW, 01GW, 01JW and 02JW ECC information These fou | 2025-03-26 |
CVE | CVE-2024-56550 | In the Linux kernel, the following vulnerability has been resolved: s390/stacktrace: Use break instead of return statement arch_stack_walk_user_com | 2025-03-26 |
CVE | CVE-2024-56561 | In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Fix PCI domain ID release in pci_epc_destroy() pci_epc_destroy() | 2025-03-26 |
CVE | CVE-2024-56559 | In the Linux kernel, the following vulnerability has been resolved: mm/vmalloc: combine all TLB flush operations of KASAN shadow virtual address int | 2025-03-26 |
CVE | CVE-2024-56552 | In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc_submit: fix race around suspend_pending Currently in some testcases | 2025-03-26 |
CVE | CVE-2024-56775 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix handling of plane refcount [Why] The mechanism to backup a | 2025-03-26 |
CVE | CVE-2024-56651 | In the Linux kernel, the following vulnerability has been resolved: can: hi311x: hi3110_can_ist(): fix potential use-after-free The commit a22bd630 | 2025-03-26 |
CVE | CVE-2024-56650 | In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the | 2025-03-26 |
CVE | CVE-2024-56783 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level cgroup maxim | 2025-03-26 |
CVE | CVE-2024-56649 | In the Linux kernel, the following vulnerability has been resolved: net: enetc: Do not configure preemptible TCs if SIs do not support Both ENETC P | 2025-03-26 |
CVE | CVE-2024-56648 | In the Linux kernel, the following vulnerability has been resolved: net: hsr: avoid potential out-of-bound access in fill_frame_info() syzbot is ab | 2025-03-26 |
CVE | CVE-2024-56645 | In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_session_new(): fix skb reference counting Since j1939_session | 2025-03-26 |
CVE | CVE-2024-56644 | In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked | 2025-03-26 |
CVE | CVE-2024-56643 | In the Linux kernel, the following vulnerability has been resolved: dccp: Fix memory leak in dccp_feat_change_recv If dccp_feat_push_confirm() fail | 2025-03-26 |
CVE | CVE-2024-56642 | In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free of kernel socket in cleanup_bearer(). syzkaller report | 2025-03-26 |
CVE | CVE-2024-56641 | In the Linux kernel, the following vulnerability has been resolved: net/smc: initialize close_work early to avoid warning We encountered a warning | 2025-03-26 |
CVE | CVE-2024-56640 | In the Linux kernel, the following vulnerability has been resolved: net/smc: fix LGR and link use-after-free issue We encountered a LGR/link use-af | 2025-03-26 |
CVE | CVE-2024-52332 | In the Linux kernel, the following vulnerability has been resolved: igb: Fix potential invalid memory access in igb_init_module() The pci_register_ | 2025-03-26 |
About
-
Send Feedback to @ubuntu_updates