UbuntuUpdates.org

Bugs fixes in "linux-oem-6.8"

Origin Bug number Title Date fixed
Launchpad 2077321 Please backport the more restrictive XSAVES deactivation for Zen1/2 arch 2024-10-16
Launchpad 2076190 perf build disables tracepoint support 2024-10-16
Launchpad 2076406 L2 Guest migration: continuously dumping while running NFS guest migration 2024-10-16
Launchpad 2070329 KOP L2 guest fails to boot with 1 core - SMT8 topology 2024-10-16
Launchpad 2076147 Add 'mm: hold PTL from the first PTE while reclaiming a large folio' to fix L2 Guest hang during LTP Test 2024-10-16
Launchpad 2076866 Guest crashes post migration with migrate_misplaced_folio+0x4cc/0x5d0 2024-10-16
Launchpad 2077729 x86/vmware: Add TDX hypercall support 2024-10-16
Launchpad 2078834 power: Enable intel_rapl driver 2024-10-16
Launchpad 2077470 [SRU][Noble] Bad EPP defaults cause performance regressions on select Intel CPUs 2024-10-16
CVE CVE-2024-45016 In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu 2024-10-15
Launchpad 2072679 Regression: unable to reach low idle states on Tiger Lake 2024-10-15
Launchpad 2083022 [SRU] Fix AST DP output after resume 2024-10-15
CVE CVE-2024-42159 In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Sanitise num_phys Information is stored in mr_sas_port->phy_mask, 2024-09-17
CVE CVE-2024-42228 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc In 2024-09-17
CVE CVE-2024-42154 In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don't see anything checking that TCP 2024-09-17
CVE CVE-2024-42224 In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Correct check for empty list Since commit a3c53be55c95 ("n 2024-09-17
CVE CVE-2024-42160 In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to 2024-09-17
CVE CVE-2024-41009 In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overrunning reservations in ringbuf The BPF ring buffer internally is 2024-09-17
Launchpad 2077600 Noble update: upstream stable patchset 2024-08-22 2024-09-17
Launchpad 2076435 Noble update: upstream stable patchset 2024-08-09 2024-09-17



About   -   Send Feedback to @ubuntu_updates