1786013 |
Packaging resync |
2046184 |
[arm64] Increase max CPU count to 512 |
2028158 |
[SRU] Duplicate Device_dax ids Created and hence Probing is Failing. |
2045387 |
Add ODM driver f81604 usb-can |
2045386 |
Add ODM driver gpio-m058ssan |
2045385 |
Add ODM driver rtc-pcf85263 |
2045384 |
AppArmor patch for mq-posix interface is missing in jammy |
2047382 |
Hotplugging SCSI disk in QEMU VM fails |
2044192 |
Patches needed for AmpereOne (arm64) |
2047630 |
Add quirk to disable i915 fastboot on B\u0026R PC |
2035971 |
linux tools packages for derived kernels refuse to install simultaneously due to libcpupower name collision |
2045562 |
[Debian] autoreconstruct - Do not generate chmod -x for deleted files |
2046008 |
Jammy update: v5.15.136 upstream stable release |
2045809 |
Jammy update: v5.15.135 upstream stable release |
2029405 |
Change in trace file leads to test timeout in ftrace tests on 5.15 ARM64 |
2041842 |
Kernel doesn't compile with CONFIG_IMA |
2044023 |
Jammy update: v5.15.134 upstream stable release |
2043422 |
Jammy update: v5.15.133 upstream stable release |
2041702 |
Jammy update: v5.15.132 upstream stable release |
CVE-2023-6622 |
A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue ma |
CVE-2024-0193 |
A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is r |
CVE-2023-6040 |
An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported |
CVE-2023-6931 |
A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escala |
CVE-2023-6932 |
A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition c |
CVE-2023-6606 |
An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker |
CVE-2023-6817 |
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func |
CVE-2023-46813 |
An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checki |
CVE-2023-6111 |
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func |
CVE-2023-32252 |
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_LOGOFF co |
CVE-2023-6176 |
A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a |
CVE-2023-6039 |
A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. |