Bugs fixes in "linux-xilinx"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2024-42159 | In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Sanitise num_phys Information is stored in mr_sas_port->phy_mask, | 2024-10-17 |
CVE | CVE-2024-42228 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc In | 2024-10-17 |
CVE | CVE-2024-42154 | In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don't see anything checking that TCP | 2024-10-17 |
CVE | CVE-2024-42224 | In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Correct check for empty list Since commit a3c53be55c95 ("n | 2024-10-17 |
CVE | CVE-2024-42160 | In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to | 2024-10-17 |
CVE | CVE-2024-41009 | In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overrunning reservations in ringbuf The BPF ring buffer internally is | 2024-10-17 |
CVE | CVE-2024-45016 | In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu | 2024-10-17 |
CVE | CVE-2024-41022 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() The "instance" v | 2024-10-17 |
CVE | CVE-2024-27022 | In the Linux kernel, the following vulnerability has been resolved: fork: defer linking file vma until vma is fully initialized Thorvald reported a | 2024-10-17 |
CVE | CVE-2024-42271 | In the Linux kernel, the following vulnerability has been resolved: net/iucv: fix use after free in iucv_sock_close() iucv_sever_path() is called f | 2024-10-17 |
CVE | CVE-2024-42280 | In the Linux kernel, the following vulnerability has been resolved: mISDN: Fix a use after free in hfcmulti_tx() Don't dereference *sp after callin | 2024-10-17 |
CVE | CVE-2024-43858 | In the Linux kernel, the following vulnerability has been resolved: jfs: Fix array-index-out-of-bounds in diFree | 2024-10-17 |
Launchpad | 1786013 | Packaging resync | 2024-10-17 |
Launchpad | 2074380 | [UBUNTU 22.04] s390/cpum_cf: make crypto counters upward compatible | 2024-10-17 |
Launchpad | 2076435 | Noble update: upstream stable patchset 2024-08-09 | 2024-10-17 |
Launchpad | 2073583 | [SRU][22.04.5]: mpi3mr driver update | 2024-10-17 |
Launchpad | 2062951 | Random flickering with Intel i915 (Gen9 GPUs in 6th-8th gen CPUs) on Linux 6.8 | 2024-10-17 |
Launchpad | 2069993 | Panels show garbage or flickering when i915.psr2 enabled | 2024-10-17 |
Launchpad | 2077600 | Noble update: upstream stable patchset 2024-08-22 | 2024-10-17 |
Launchpad | 2072679 | Regression: unable to reach low idle states on Tiger Lake | 2024-10-17 |
About
-
Send Feedback to @ubuntu_updates