CVE |
CVE-2024-26607 |
In the Linux kernel, the following vulnerability has been resolved: drm/bridge: sii902x: Fix probing race issue A null pointer dereference crash ha |
linux linux-bluefield linux linux linux linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-xilinx-zynqmp linux-xilinx-zynqmp linux-oracle-5.15 linux-aws-5.15 linux-xilinx-zynqmp linux-oracle-5.15 linux-bluefield linux-aws-5.15 linux-riscv-5.15
|
CVE |
CVE-2024-26669 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: flower: Fix chain template offload When a qdisc is deleted from a ne |
linux linux-bluefield linux linux linux linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-xilinx-zynqmp linux-xilinx-zynqmp linux-oracle-5.15 linux-aws-5.15 linux-xilinx-zynqmp linux-oracle-5.15 linux-bluefield linux-aws-5.15 linux-riscv-5.15
|
CVE |
CVE-2024-38602 |
In the Linux kernel, the following vulnerability has been resolved: ax25: Fix reference count leak issues of ax25_dev The ax25_addr_ax25dev() and a |
linux linux-bluefield linux linux linux linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-xilinx-zynqmp linux-xilinx-zynqmp linux-oracle-5.15 linux-aws-5.15 linux-xilinx-zynqmp linux-oracle-5.15 linux-bluefield linux-aws-5.15 linux-riscv-5.15
|
CVE |
CVE-2024-38611 |
In the Linux kernel, the following vulnerability has been resolved: media: i2c: et8ek8: Don't strip remove function when driver is builtin Using __ |
linux linux-bluefield linux linux linux linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-xilinx-zynqmp linux-xilinx-zynqmp linux-oracle-5.15 linux-aws-5.15 linux-xilinx-zynqmp linux-oracle-5.15 linux-bluefield linux-aws-5.15 linux-riscv-5.15
|
CVE |
CVE-2024-40915 |
In the Linux kernel, the following vulnerability has been resolved: riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context __kernel |
linux linux linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-xilinx-zynqmp linux-oracle-5.15 linux-aws-5.15 linux-xilinx-zynqmp linux-oracle-5.15 linux-aws-5.15 linux-riscv-5.15
|
CVE |
CVE-2024-41071 |
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Avoid address calculations via out of bounds array indexing req |
linux linux linux linux linux-lowlatency-hwe-5.15 linux-bluefield linux-hwe-5.15 linux-xilinx-zynqmp linux-xilinx-zynqmp linux-oracle-5.15 linux-aws-5.15 linux-xilinx-zynqmp linux-oracle-5.15 linux-bluefield linux-aws-5.15 linux-riscv-5.15
|
CVE |
CVE-2024-26800 |
In the Linux kernel, the following vulnerability has been resolved: tls: fix use-after-free on failed backlog decryption When the decrypt request g |
linux linux linux linux linux-lowlatency-hwe-5.15 linux-bluefield linux-hwe-5.15 linux-xilinx-zynqmp linux-xilinx-zynqmp linux-oracle-5.15 linux-aws-5.15 linux-xilinx-zynqmp linux-oracle-5.15 linux-bluefield linux-aws-5.15 linux-riscv-5.15
|
Launchpad |
2081279 |
Jammy update: v5.15.167 upstream stable release |
linux linux linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-xilinx-zynqmp linux-oracle-5.15 linux-aws-5.15 linux-xilinx-zynqmp linux-oracle-5.15 linux-aws-5.15 linux-riscv-5.15
|
CVE |
CVE-2024-45016 |
In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu |
linux linux linux linux linux linux linux-bluefield linux-hwe-6.8 linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-xilinx-zynqmp linux-xilinx-zynqmp linux-oracle-6.8 linux-oracle-5.15 linux-aws-5.15 linux-aws-6.8 linux-xilinx-zynqmp linux-oracle-5.15 linux-bluefield linux-aws-5.15 linux-riscv-5.15 linux-aws-6.8 linux-oracle-6.8
|
CVE |
CVE-2024-42271 |
In the Linux kernel, the following vulnerability has been resolved: net/iucv: fix use after free in iucv_sock_close() iucv_sever_path() is called f |
linux linux linux-hwe-6.8 linux-oracle-6.8 linux-aws-6.8 linux-aws-6.8 linux-oracle-6.8
|
CVE |
CVE-2024-42280 |
In the Linux kernel, the following vulnerability has been resolved: mISDN: Fix a use after free in hfcmulti_tx() Don't dereference *sp after callin |
linux linux linux-hwe-6.8 linux-oracle-6.8 linux-aws-6.8 linux-aws-6.8 linux-oracle-6.8
|
CVE |
CVE-2024-43858 |
In the Linux kernel, the following vulnerability has been resolved: jfs: Fix array-index-out-of-bounds in diFree |
linux linux linux-hwe-6.8 linux-oracle-6.8 linux-aws-6.8 linux-aws-6.8 linux-oracle-6.8
|
Launchpad |
2076402 |
Fix alsa scarlett2 driver in 6.8 |
linux linux-hwe-6.8 linux linux-oracle-6.8 linux-aws-6.8 linux-aws-6.8 linux-oracle-6.8
|
Launchpad |
2077321 |
Please backport the more restrictive XSAVES deactivation for Zen1/2 arch |
linux linux linux linux-lowlatency-hwe-5.15 linux-hwe-6.8 linux linux-hwe-5.15 linux-xilinx-zynqmp linux-oracle-6.8 linux-oracle-5.15 linux-aws-5.15 linux-aws-6.8 linux-xilinx-zynqmp linux-oracle-5.15 linux-aws-5.15 linux-riscv-5.15 linux-aws-6.8 linux-oracle-6.8
|
Launchpad |
2076190 |
perf build disables tracepoint support |
linux linux-hwe-6.8 linux linux-oracle-6.8 linux-aws-6.8 linux-aws-6.8 linux-oracle-6.8
|
Launchpad |
2076406 |
L2 Guest migration: continuously dumping while running NFS guest migration |
linux linux-hwe-6.8 linux linux-oracle-6.8 linux-aws-6.8 linux-aws-6.8 linux-oracle-6.8
|
Launchpad |
2070329 |
KOP L2 guest fails to boot with 1 core - SMT8 topology |
linux linux-hwe-6.8 linux linux-oracle-6.8 linux-aws-6.8 linux-aws-6.8 linux-oracle-6.8
|
Launchpad |
2076147 |
Add 'mm: hold PTL from the first PTE while reclaiming a large folio' to fix L2 Guest hang during LTP Test |
linux linux-hwe-6.8 linux linux-oracle-6.8 linux-aws-6.8 linux-aws-6.8 linux-oracle-6.8
|
Launchpad |
2076866 |
Guest crashes post migration with migrate_misplaced_folio+0x4cc/0x5d0 |
linux linux-hwe-6.8 linux linux-oracle-6.8 linux-aws-6.8 linux-aws-6.8 linux-oracle-6.8
|
Launchpad |
2077729 |
x86/vmware: Add TDX hypercall support |
linux linux-hwe-6.8 linux linux-oracle-6.8 linux-aws-6.8 linux-aws-6.8 linux-oracle-6.8
|