Bugs fixes in "linux-qcom"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2024-50302 | In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by | 2025-06-04 |
CVE | CVE-2024-53063 | In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: prevent the risk of out of memory access The dvbdev contains a s | 2025-06-04 |
CVE | CVE-2024-53140 | In the Linux kernel, the following vulnerability has been resolved: netlink: terminate outstanding dump on socket close Netlink supports iterative | 2025-06-04 |
CVE | CVE-2024-56595 | In the Linux kernel, the following vulnerability has been resolved: jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree When the val | 2025-06-04 |
CVE | CVE-2024-56598 | In the Linux kernel, the following vulnerability has been resolved: jfs: array-index-out-of-bounds fix in dtReadFirst The value of stbl can be some | 2025-06-04 |
CVE | CVE-2024-56658 | In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use- | 2025-06-04 |
CVE | CVE-2024-56672 | In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the b | 2025-06-04 |
CVE | CVE-2024-57798 | In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() W | 2025-06-04 |
CVE | CVE-2025-21701 | In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace | 2025-06-04 |
CVE | CVE-2024-50248 | In the Linux kernel, the following vulnerability has been resolved: ntfs3: Add bounds checking to mi_enum_attr() Added bounds checking to make sure | 2025-06-04 |
CVE | CVE-2024-50249 | In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Make rmw_lock a raw_spin_lock The following BUG was triggered: === | 2025-06-04 |
CVE | CVE-2024-50265 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() S | 2025-06-04 |
CVE | CVE-2024-53166 | In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix bfqq uaf in bfq_limit_depth() Set new allocated bfqq to bic or | 2025-06-04 |
CVE | CVE-2024-53237 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: fix use-after-free in device_for_each_child() Syzbot has reported th | 2025-06-04 |
CVE | CVE-2024-53227 | In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Fix use-after-free in bfad_im_module_exit() BUG: KASAN: slab-use-aft | 2025-06-04 |
CVE | CVE-2024-56642 | In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free of kernel socket in cleanup_bearer(). syzkaller report | 2025-06-04 |
CVE | CVE-2024-56661 | In the Linux kernel, the following vulnerability has been resolved: tipc: fix NULL deref in cleanup_bearer() syzbot found [1] that after blamed com | 2025-06-04 |
CVE | CVE-2024-56600 | In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data | 2025-06-04 |
CVE | CVE-2024-56627 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read An offset from client co | 2025-06-04 |
CVE | CVE-2024-56651 | In the Linux kernel, the following vulnerability has been resolved: can: hi311x: hi3110_can_ist(): fix potential use-after-free The commit a22bd630 | 2025-06-04 |
About
-
Send Feedback to @ubuntu_updates