Bugs fixes in "linux-qcom"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2024-53222 | In the Linux kernel, the following vulnerability has been resolved: zram: fix NULL pointer in comp_algorithm_show() LTP reported a NULL pointer der | 2025-06-04 |
CVE | CVE-2024-56650 | In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the | 2025-06-04 |
CVE | CVE-2024-56783 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level cgroup maxim | 2025-06-04 |
CVE | CVE-2024-56649 | In the Linux kernel, the following vulnerability has been resolved: net: enetc: Do not configure preemptible TCs if SIs do not support Both ENETC P | 2025-06-04 |
CVE | CVE-2024-56648 | In the Linux kernel, the following vulnerability has been resolved: net: hsr: avoid potential out-of-bound access in fill_frame_info() syzbot is ab | 2025-06-04 |
CVE | CVE-2024-56645 | In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_session_new(): fix skb reference counting Since j1939_session | 2025-06-04 |
CVE | CVE-2024-56644 | In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked | 2025-06-04 |
CVE | CVE-2024-56643 | In the Linux kernel, the following vulnerability has been resolved: dccp: Fix memory leak in dccp_feat_change_recv If dccp_feat_push_confirm() fail | 2025-06-04 |
CVE | CVE-2024-56641 | In the Linux kernel, the following vulnerability has been resolved: net/smc: initialize close_work early to avoid warning We encountered a warning | 2025-06-04 |
CVE | CVE-2024-56640 | In the Linux kernel, the following vulnerability has been resolved: net/smc: fix LGR and link use-after-free issue We encountered a LGR/link use-af | 2025-06-04 |
CVE | CVE-2024-52332 | In the Linux kernel, the following vulnerability has been resolved: igb: Fix potential invalid memory access in igb_init_module() The pci_register_ | 2025-06-04 |
CVE | CVE-2024-56638 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_inner: incorrect percpu area handling under softirq Softirq can | 2025-06-04 |
CVE | CVE-2024-56637 | In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Hold module reference while requesting a module User space ma | 2025-06-04 |
CVE | CVE-2024-56636 | In the Linux kernel, the following vulnerability has been resolved: geneve: do not assume mac header is set in geneve_xmit_skb() We should not assu | 2025-06-04 |
CVE | CVE-2024-56635 | In the Linux kernel, the following vulnerability has been resolved: net: avoid potential UAF in default_operstate() syzbot reported an UAF in defau | 2025-06-04 |
CVE | CVE-2024-56634 | In the Linux kernel, the following vulnerability has been resolved: gpio: grgpio: Add NULL check in grgpio_probe devm_kasprintf() can return a NULL | 2025-06-04 |
CVE | CVE-2024-56565 | In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to drop all discards after creating snapshot on lvm device Piergiorgi | 2025-06-04 |
CVE | CVE-2024-56633 | In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg The current sk memory | 2025-06-04 |
CVE | CVE-2024-50051 | In the Linux kernel, the following vulnerability has been resolved: spi: mpc52xx: Add cancel_work_sync before module remove If we remove the module | 2025-06-04 |
CVE | CVE-2024-56631 | In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Fix slab-use-after-free read in sg_release() Fix a use-after-free bug | 2025-06-04 |
About
-
Send Feedback to @ubuntu_updates