1786013 |
Packaging resync |
1896578 |
raid10: Block discard is very slow, causing severe delays for mkfs and fstrim operations |
1926517 |
[SRU] mpt3sas: only one vSES is handy even IOC has multi vSES |
1920944 |
kvm: properly tear down PV features on hibernate |
1920180 |
Can't detect intel wifi 6235 |
1926030 |
IR Remote Keys Repeat Many Times Starting with Kernel 5.8.0-49 |
1929132 |
Groovy update: upstream stable patchset 2021-05-20 |
1922651 |
r8152 tx status -71 |
1928386 |
Groovy update: upstream stable patchset 2021-05-13 |
CVE-2021-33200 |
kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces inco ... |
CVE-2021-3490 |
The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in th ... |
CVE-2021-3489 |
The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel di ... |
CVE-2020-26145 |
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcas |
CVE-2020-26141 |
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check |
CVE-2020-24587 |
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments |
CVE-2020-24588 |
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU fl |
CVE-2020-26139 |
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet s |
CVE-2020-24586 |
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received frag |
CVE-2020-26147 |
An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were se |
CVE-2021-23133 |
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a netwo |
CVE-2021-31440 |
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.11.15. An attacker must first obtain the |