Bugs fixes in "linux-xilinx-zynqmp"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
Launchpad | 2081278 | Focal update: v5.4.284 upstream stable release | 2024-10-17 |
Launchpad | 2081085 | wbt:wbt_* trace event NULL pointer dereference with GENHD_FL_HIDDEN disks | 2024-10-17 |
CVE | CVE-2024-26960 | In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix race between free_swap_and_cache() and swapoff() There was previo | 2024-10-16 |
CVE | CVE-2024-27397 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time | 2024-10-16 |
CVE | CVE-2024-38630 | In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the | 2024-10-16 |
CVE | CVE-2024-45016 | In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu | 2024-10-16 |
CVE | CVE-2024-27397 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time | 2024-10-16 |
CVE | CVE-2024-38630 | In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the | 2024-10-16 |
CVE | CVE-2024-45016 | In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu | 2024-10-16 |
CVE | CVE-2024-26960 | In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix race between free_swap_and_cache() and swapoff() There was previo | 2024-10-15 |
CVE | CVE-2024-27397 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time | 2024-10-15 |
CVE | CVE-2024-38630 | In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the | 2024-10-15 |
CVE | CVE-2024-45016 | In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu | 2024-10-15 |
CVE | CVE-2024-27397 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time | 2024-10-15 |
CVE | CVE-2024-38630 | In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the | 2024-10-15 |
CVE | CVE-2024-45016 | In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu | 2024-10-15 |
CVE | CVE-2024-27397 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time | 2024-10-10 |
CVE | CVE-2024-38630 | In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the | 2024-10-10 |
CVE | CVE-2024-45016 | In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu | 2024-10-10 |
CVE | CVE-2024-25744 | In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c | 2024-10-10 |
About
-
Send Feedback to @ubuntu_updates