Bugs fixes in "linux-riscv-6.8"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2025-37890 | In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc As | 2025-07-04 |
CVE | CVE-2025-22088 | In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() After the erdma_ce | 2025-07-04 |
CVE | CVE-2025-37997 | In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: fix region locking in hash types Region locking introduced in | 2025-07-04 |
CVE | CVE-2025-37798 | In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making | 2025-07-04 |
CVE | CVE-2025-21731 | In the Linux kernel, the following vulnerability has been resolved: nbd: don't allow reconnect after disconnect Following process can cause nbd_con | 2025-07-04 |
CVE | CVE-2024-57986 | In the Linux kernel, the following vulnerability has been resolved: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collect | 2025-07-04 |
CVE | CVE-2024-58052 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_rang | 2025-07-04 |
CVE | CVE-2024-57998 | In the Linux kernel, the following vulnerability has been resolved: OPP: add index check to assert to avoid buffer overflow in _read_freq() Pass th | 2025-07-04 |
CVE | CVE-2024-58068 | In the Linux kernel, the following vulnerability has been resolved: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized If a drive | 2025-07-04 |
CVE | CVE-2024-58051 | In the Linux kernel, the following vulnerability has been resolved: ipmi: ipmb: Add check devm_kasprintf() returned value devm_kasprintf() can retu | 2025-07-04 |
CVE | CVE-2024-57997 | In the Linux kernel, the following vulnerability has been resolved: wifi: wcn36xx: fix channel survey memory allocation size KASAN reported a memor | 2025-07-04 |
CVE | CVE-2024-57996 | In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does | 2025-07-04 |
CVE | CVE-2024-58053 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix handling of received connection abort Fix the handling of a connecti | 2025-07-04 |
CVE | CVE-2024-58072 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Up | 2025-07-04 |
CVE | CVE-2024-58063 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: fix memory leaks and invalid access at probe error path Deinitia | 2025-07-04 |
CVE | CVE-2024-58071 | In the Linux kernel, the following vulnerability has been resolved: team: prevent adding a device which is already a team device lower Prevent addi | 2025-07-04 |
CVE | CVE-2025-21812 | In the Linux kernel, the following vulnerability has been resolved: ax25: rcu protect dev->ax25_ptr syzbot found a lockdep issue [1]. We should re | 2025-07-04 |
CVE | CVE-2024-57993 | In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint chec | 2025-07-04 |
CVE | CVE-2024-58061 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: prohibit deactivating all links In the internal API this calls | 2025-07-04 |
CVE | CVE-2025-21828 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't flush non-uploaded STAs If STA state is pre-moved to AUTH | 2025-07-04 |
About
-
Send Feedback to @ubuntu_updates