UbuntuUpdates.org

Package "linux-modules-iwlwifi-5.15.0-140-generic"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-modules-iwlwifi-5.15.0-140-generic

Description:

Linux kernel iwlwifi modules for version 5.15.0-140

Latest version: 5.15.0-140.150
Release: jammy (22.04)
Level: base
Repository: main
Head package: linux

Links


Download "linux-modules-iwlwifi-5.15.0-140-generic"


Other versions of "linux-modules-iwlwifi-5.15.0-140-generic" in Jammy

No other version of this package is available in the Jammy release.

Changelog

Version: 5.15.0-140.150 2025-04-12 09:08:44 UTC

 linux (5.15.0-140.150) jammy; urgency=medium
 .
   * jammy/linux: 5.15.0-140.150 -proposed tracker (LP: #2106996)
 .
   * Packaging resync (LP: #1786013)
     - [Packaging] debian.master/dkms-versions -- update from kernel-versions
       (main/2025.04.14)
 .
   * NFS, overlay, fstab issue after update to kernel 5.15.0-133-generic and -134
     (LP: #2103598)
     - udf: Fix directory iteration for longer tail extents
 .
   * Remove floppy kernel module causes null pointer deference (LP: #2104326)
     - floppy: fix add_disk() assumption on exit due to new developments
 .
   * CVE-2025-21971
     - net_sched: Prevent creation of classes with TC_H_ROOT
 .
   * CVE-2024-56599
     - wifi: ath10k: avoid NULL pointer error during sdio remove
 .
   * CVE-2024-56721
     - x86/CPU/AMD: Terminate the erratum_1386_microcode array
 .
   * Jammy update: v5.15.179 upstream stable release (LP: #2106026)
     - afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY
     - afs: Fix directory format encoding struct
     - hung_task: move hung_task sysctl interface to hung_task.c
     - sysctl: use const for typically used max/min proc sysctls
     - sysctl: share unsigned long const values
     - fs: move inode sysctls to its own file
     - fs: move fs stat sysctls to file_table.c
     - fs: fix proc_handler for sysctl_nr_open
     - block: deprecate autoloading based on dev_t
     - block: retry call probe after request_module in blk_request_module
     - pstore/blk: trivial typo fixes
     - nvme: Add error check for xa_store in nvme_get_effects_log
     - partitions: ldm: remove the initial kernel-doc notation
     - select: Fix unbalanced user_access_end()
     - afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call
     - sched/psi: Use task->psi_flags to clear in CPU migration
     - sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat
     - drm/etnaviv: Fix page property being used for non writecombine buffers
     - genirq: Make handle_enforce_irqctx() unconditionally available
     - wifi: rtlwifi: do not complete firmware loading needlessly
     - wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last step
     - wifi: rtlwifi: wait for firmware loading before releasing memory
     - wifi: rtlwifi: fix init_sw_vars leak when probe fails
     - wifi: rtlwifi: usb: fix workqueue leak when probe fails
     - spi: zynq-qspi: Add check for clk_enable()
     - dt-bindings: mmc: controller: clarify the address-cells description
     - spi: dt-bindings: add schema listing peripheral-specific properties
     - dt-bindings: Another pass removing cases of 'allOf' containing a '$ref'
     - dt-bindings: leds: Add Qualcomm Light Pulse Generator binding
     - dt-bindings: leds: Optional multi-led unit address
     - dt-bindings: leds: Add multicolor PWM LED bindings
     - dt-bindings: leds: class-multicolor: reference class directly in multi-led
       node
     - dt-bindings: leds: class-multicolor: Fix path to color definitions
     - rtlwifi: replace usage of found with dedicated list iterator variable
     - wifi: rtlwifi: remove unused timer and related code
     - wifi: rtlwifi: remove unused dualmac control leftovers
     - wifi: rtlwifi: destroy workqueue at rtl_deinit_core
     - wifi: rtlwifi: pci: wait for firmware loading before releasing memory
     - HID: multitouch: Add support for lenovo Y9000P Touchpad
     - Revert "HID: multitouch: Add support for lenovo Y9000P Touchpad"
     - HID: multitouch: fix support for Goodix PID 0x01e9
     - regulator: dt-bindings: mt6315: Drop regulator-compatible property
     - ACPI: fan: cleanup resources in the error path of .probe()
     - cpupower: fix TSC MHz calculation
     - dt-bindings: mfd: bd71815: Fix rsense and typos
     - leds: netxbig: Fix an OF node reference leak in netxbig_leds_get_of_pdata()
     - cpufreq: schedutil: Fix superfluous updates caused by need_freq_update
     - clk: imx8mp: Fix clkout1/2 support
     - regulator: of: Implement the unwind path of of_regulator_match()
     - samples/landlock: Fix possible NULL dereference in parse_path()
     - wifi: wlcore: fix unbalanced pm_runtime calls
     - net/smc: fix data error when recvmsg with MSG_PEEK flag
     - landlock: Move filesystem helpers and add a new one
     - wifi: mt76: mt76u_vendor_request: Do not print error messages when -EPROTO
     - cpufreq: ACPI: Fix max-frequency computation
     - selftests: harness: fix printing of mismatch values in __EXPECT()
     - wifi: cfg80211: Handle specific BSSID in 6GHz scanning
     - wifi: cfg80211: adjust allocation of colocated AP data
     - clk: analogbits: Fix incorrect calculation of vco rate delta
     - selftests/landlock: Fix error message
     - net/mlxfw: Drop hard coded max FW flash image size
     - netfilter: nft_flow_offload: update tcp state flags under lock
     - tcp_cubic: fix incorrect HyStart round start detection
     - tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind
     - libbpf: Fix segfault due to libelf functions not setting errno
     - ASoC: sun4i-spdif: Add clock multiplier settings
     - perf header: Fix one memory leakage in process_bpf_btf()
     - perf header: Fix one memory leakage in process_bpf_prog_info()
     - perf bpf: Fix two memory leakages when calling
       perf_env__insert_bpf_prog_info()
     - ASoC: renesas: rz-ssi: Use only the proper amount of dividers
     - ktest.pl: Remove unused declarations in run_bisect_test function
     - crypto: hisilicon/sec - add some comments for soft fallback
     - crypto: hisilicon/sec - delete redundant blank lines
     - crypto: hisilicon/sec2 - optimize the error return process
     - crypto: hisilicon/sec2 - fix for aead icv error
     - crypto: hisilicon/sec2 - fix for aead invalid authsize
     - crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto()
     - padata: fix sysfs store callback check
     - perf top: Don't complain about lack of vmlinux w

Source diff to previous version
1786013 Packaging resync
2103598 NFS, overlay, fstab issue after update to kernel 5.15.0-133-generic and -134
2104326 Remove floppy kernel module causes null pointer deference
2106026 Jammy update: v5.15.179 upstream stable release
2097811 Fix bugs preventing boot on Intel TDX-enabled hosts
2104380 Build failure when CONFIG_NET_SWITCHDEV=n due to CVE-2024-26837 fix backport
2103564 nfsd hangs and never recovers after NFS4ERR_DELAY and a connection loss
2089318 kernel hard lockup in cgroups during eBPF workload
CVE-2025-21971 In the Linux kernel, the following vulnerability has been resolved: net_sched: Prevent creation of classes with TC_H_ROOT The function qdisc_tree_r
CVE-2024-56599 In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: avoid NULL pointer error during sdio remove When running 'rmmod a
CVE-2024-56721 In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Terminate the erratum_1386_microcode array The erratum_1386_microc
CVE-2025-21647 In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: add bounds checks to host bulk flow fairness counts Even thoug
CVE-2024-58002 In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Remove dangling pointers When an async control is written, we
CVE-2024-58079 In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix crash during unbind if gpio unit is in use We used the wro
CVE-2025-21721 In the Linux kernel, the following vulnerability has been resolved: nilfs2: handle errors that nilfs_prepare_chunk() may return Patch series "nilfs
CVE-2024-26982 In the Linux kernel, the following vulnerability has been resolved: Squashfs: check the inode number is not the invalid value of zero Syskiller has
CVE-2025-21844 In the Linux kernel, the following vulnerability has been resolved: smb: client: Add check for next_buffer in receive_encrypted_standard() Add chec
CVE-2024-58090 In the Linux kernel, the following vulnerability has been resolved: sched/core: Prevent rescheduling when interrupts are disabled David reported a
CVE-2025-21875 In the Linux kernel, the following vulnerability has been resolved: mptcp: always handle address removal under msk socket lock Syzkaller reported a
CVE-2025-21877 In the Linux kernel, the following vulnerability has been resolved: usbnet: gl620a: fix endpoint checking in genelink_bind() Syzbot reports [1] a w
CVE-2025-21878 In the Linux kernel, the following vulnerability has been resolved: i2c: npcm: disable interrupt enable bit before devm_request_irq The customer re
CVE-2025-21887 In the Linux kernel, the following vulnerability has been resolved: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up The iss
CVE-2025-21846 In the Linux kernel, the following vulnerability has been resolved: acct: perform last write from workqueue In [1] it was reported that the acct(2)
CVE-2025-21848 In the Linux kernel, the following vulnerability has been resolved: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() Add check for the return value
CVE-2025-21862 In the Linux kernel, the following vulnerability has been resolved: drop_monitor: fix incorrect initialization order Syzkaller reports the followin
CVE-2025-21871 In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix supplicant wait loop OP-TEE supplicant is a user-space daemon a
CVE-2025-21865 In the Linux kernel, the following vulnerability has been resolved: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Brad Spengler
CVE-2025-21858 In the Linux kernel, the following vulnerability has been resolved: geneve: Fix use-after-free in geneve_find_dev(). syzkaller reported a use-after
CVE-2025-21866 In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_AL
CVE-2025-21859 In the Linux kernel, the following vulnerability has been resolved: USB: gadget: f_midi: f_midi_complete to call queue_work When using USB MIDI, a
CVE-2025-21823 In the Linux kernel, the following vulnerability has been resolved: batman-adv: Drop unmanaged ELP metric worker The ELP worker needs to calculate
CVE-2024-58005 In the Linux kernel, the following vulnerability has been resolved: tpm: Change to kvalloc() in eventlog/acpi.c The following failure was reported
CVE-2025-21748 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix integer overflows on 32 bit systems On 32bit systems the addition op
CVE-2024-57977 In the Linux kernel, the following vulnerability has been resolved: memcg: fix soft lockup in the OOM process A soft lockup issue was found in the
CVE-2024-57978 In the Linux kernel, the following vulnerability has been resolved: media: imx-jpeg: Fix potential error pointer dereference in detach_pm() The pro
CVE-2024-57979 In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consis
CVE-2024-47726 In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to wait dio completion It should wait all existing dio write IOs befo
CVE-2025-21811 In the Linux kernel, the following vulnerability has been resolved: nilfs2: protect access to buffers with no active references nilfs_lookup_dirty_
CVE-2025-21722 In the Linux kernel, the following vulnerability has been resolved: nilfs2: do not force clear folio if buffer is referenced Patch series "nilfs2:
CVE-2024-58086 In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Stop active perfmon if it is being destroyed If the active performance
CVE-2025-21758 In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called wi
CVE-2025-21760 In the Linux kernel, the following vulnerability has been resolved: ndisc: extend RCU protection in ndisc_send_skb() ndisc_send_skb() can be called
CVE-2025-21761 In the Linux kernel, the following vulnerability has been resolved: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() ovs_vport_cmd_fill
CVE-2025-21762 In the Linux kernel, the following vulnerability has been resolved: arp: use RCU protection in arp_xmit() arp_xmit() can be called without RTNL or
CVE-2025-21763 In the Linux kernel, the following vulnerability has been resolved: neighbour: use RCU protection in __neigh_notify() __neigh_notify() can be calle
CVE-2025-21764 In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called
CVE-2025-21765 In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU protection in ip6_default_advmss() ip6_default_advmss() needs rcu
CVE-2025-21766 In the Linux kernel, the following vulnerability has been resolved: ipv4: use RCU protection in __ip_rt_update_pmtu() __ip_rt_update_pmtu() must us
CVE-2025-21767 In the Linux kernel, the following vulnerability has been resolved: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic c
CVE-2025-21772 In the Linux kernel, the following vulnerability has been resolved: partitions: mac: fix handling of bogus partition table Fix several issues in pa
CVE-2025-21704 In the Linux kernel, the following vulnerability has been resolved: usb: cdc-acm: Check control transfer buffer size before access If the first fra
CVE-2025-21776 In the Linux kernel, the following vulnerability has been resolved: USB: hub: Ignore non-compliant devices with too many configs or interfaces Robe
CVE-2025-21835 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_midi: fix MIDI Streaming descriptor lengths While the MIDI jacks
CVE-2025-21779 In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel Ad
CVE-2025-21781 In the Linux kernel, the following vulnerability has been resolved: batman-adv: fix panic during interface removal Reference counting is used to en
CVE-2025-21782 In the Linux kernel, the following vulnerability has been resolved: orangefs: fix a oob in orangefs_debug_write I got a syzbot report: slab-out-of-
CVE-2024-57834 In the Linux kernel, the following vulnerability has been resolved: media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread syzbot report a nul
CVE-2025-21785 In the Linux kernel, the following vulnerability has been resolved: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array The loop that de
CVE-2025-21787 In the Linux kernel, the following vulnerability has been resolved: team: better TEAM_OPTION_TYPE_STRING validation syzbot reported following splat
CVE-2025-21791 In the Linux kernel, the following vulnerability has been resolved: vrf: use RCU protection in l3mdev_l3_out() l3mdev_l3_out() can be called withou
CVE-2024-58020 In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: Add NULL check in mt_input_configured devm_kasprintf() can ret
CVE-2025-21795 In the Linux kernel, the following vulnerability has been resolved: NFSD: fix hang in nfsd4_shutdown_callback If nfs4_client is in courtesy state t
CVE-2025-21796 In the Linux kernel, the following vulnerability has been resolved: nfsd: clear acl_access/acl_default after releasing them If getting acl_default
CVE-2025-21820 In the Linux kernel, the following vulnerability has been resolved: tty: xilinx_uartps: split sysrq handling lockdep detects the following circular
CVE-2025-21814 In the Linux kernel, the following vulnerability has been resolved: ptp: Ensure info->enable callback is always set The ioctl and sysfs handlers un
CVE-2025-21735 In the Linux kernel, the following vulnerability has been resolved: NFC: nci: Add bounds checking in nci_hci_create_pipe() The "pipe" variable is a
CVE-2025-21736 In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix possible int overflows in nilfs_fiemap() Since nilfs_bmap_lookup_co
CVE-2024-58001 In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle a symlink read error correctly Patch series "Convert ocfs2 to use
CVE-2024-58007 In the Linux kernel, the following vulnerability has been resolved: soc: qcom: socinfo: Avoid out of bounds read of serial number On MSM8916 device
CVE-2025-21744 In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() On removal o
CVE-2025-21745 In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix class @block_class's subsystem refcount leakage blkcg_fill_root
CVE-2024-58076 In the Linux kernel, the following vulnerability has been resolved: clk: qcom: gcc-sm6350: Add missing parent_map for two clocks If a clk_rcg2 has
CVE-2024-58083 In the Linux kernel, the following vulnerability has been resolved: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() Explicitly verif
CVE-2024-58010 In the Linux kernel, the following vulnerability has been resolved: binfmt_flat: Fix integer overflow bug on 32 bit systems Most of these sizes and
CVE-2025-21749 In the Linux kernel, the following vulnerability has been resolved: net: rose: lock the socket in rose_bind() syzbot reported a soft lockup in rose
CVE-2024-57981 In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Fix NULL pointer dereference on certain command aborts If a command
CVE-2025-21684 In the Linux kernel, the following vulnerability has been resolved: gpio: xilinx: Convert gpio_lock to raw spinlock irq_chip functions may be calle
CVE-2024-58085 In the Linux kernel, the following vulnerability has been resolved: tomoyo: don't emit warning in tomoyo_write_control() syzbot is reporting too la
CVE-2024-58014 In the Linux kernel, the following vulnerability has been resolved: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() In 'wlc
CVE-2024-58016 In the Linux kernel, the following vulnerability has been resolved: safesetid: check size of policy writes syzbot attempts to write a buffer with a
CVE-2024-58017 In the Linux kernel, the following vulnerability has been resolved: printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX Shifting 1 <<
CVE-2025-21753 In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free when attempting to join an aborted transaction When w
CVE-2024-58055 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_tcm: Don't free command immediately Don't prematurely free the c
CVE-2024-57980 In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() functio
CVE-2025-21707 In the Linux kernel, the following vulnerability has been resolved: mptcp: consolidate suboption status MPTCP maintains the received sub-options st
CVE-2025-21708 In the Linux kernel, the following vulnerability has been resolved: net: usb: rtl8150: enable basic endpoint checking Syzkaller reports [1] encount
CVE-2025-21826 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject mismatching sum of field_len with set key length T
CVE-2025-21715 In the Linux kernel, the following vulnerability has been resolved: net: davicom: fix UAF in dm9000_drv_remove dm is netdev private data and it can
CVE-2025-21718 In the Linux kernel, the following vulnerability has been resolved: net: rose: fix timer races against user threads Rose timers only acquire the so
CVE-2025-21719 In the Linux kernel, the following vulnerability has been resolved: ipmr: do not call mr_mfc_uses_dev() for unres entries syzbot found that calling
CVE-2025-21802 In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix oops when unload drivers paralleling When unload hclge driver, i
CVE-2024-58058 In the Linux kernel, the following vulnerability has been resolved: ubifs: skip dumping tnc tree when zroot is null Clearing slab cache will free a
CVE-2024-58069 In the Linux kernel, the following vulnerability has been resolved: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read The nvmem interfa
CVE-2025-21804 In the Linux kernel, the following vulnerability has been resolved: PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region()
CVE-2024-58034 In the Linux kernel, the following vulnerability has been resolved: memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_
CVE-2024-57973 In the Linux kernel, the following vulnerability has been resolved: rdma/cxgb4: Prevent potential integer overflow on 32bit The "gl->tot_len" varia
CVE-2025-21726 In the Linux kernel, the following vulnerability has been resolved: padata: avoid UAF for reorder_work Although the previous patch can avoid ps and
CVE-2025-21727 In the Linux kernel, the following vulnerability has been resolved: padata: fix UAF in padata_reorder A bug was found when run ltp test: BUG: KASA
CVE-2025-21728 In the Linux kernel, the following vulnerability has been resolved: bpf: Send signals asynchronously if !preemptible BPF programs can execute in al
CVE-2025-21711 In the Linux kernel, the following vulnerability has been resolved: net/rose: prevent integer overflows in rose_setsockopt() In case of possible un
CVE-2025-21799 In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns()
CVE-2025-21806 In the Linux kernel, the following vulnerability has been resolved: net: let net.core.dev_weight always be non-zero The following problem was encou
CVE-2025-21830 In the Linux kernel, the following vulnerability has been resolved: landlock: Handle weird files A corrupted filesystem (e.g. bcachefs) might retur
CVE-2024-58071 In the Linux kernel, the following vulnerability has been resolved: team: prevent adding a device which is already a team device lower Prevent addi
CVE-2024-58063 In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: fix memory leaks and invalid access at probe error path Deinitia
CVE-2024-58072 In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Up
CVE-2024-58051 In the Linux kernel, the following vulnerability has been resolved: ipmi: ipmb: Add check devm_kasprintf() returned value devm_kasprintf() can retu
CVE-2024-58052 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_rang
CVE-2024-57986 In the Linux kernel, the following vulnerability has been resolved: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collect
CVE-2025-21731 In the Linux kernel, the following vulnerability has been resolved: nbd: don't allow reconnect after disconnect Following process can cause nbd_con
CVE-2024-26837 In the Linux kernel, the following vulnerability has been resolved: net: bridge: switchdev: Skip MDB replays of deferred events on offload Before t
CVE-2023-52664 In the Linux kernel, the following vulnerability has been resolved: net: atlantic: eliminate double free in error handling logic Driver has a logic
CVE-2023-52927 In the Linux kernel, the following vulnerability has been resolved: netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_c

Version: 5.15.0-138.148 2025-03-14 23:08:34 UTC

 linux (5.15.0-138.148) jammy; urgency=medium
 .
   * jammy/linux: 5.15.0-138.148 -proposed tracker (LP: #2102587)
 .
   * ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J
     (LP: #2096976)
     - SAUCE: selftest: netfilter: fix null IP field in kci_test_ipsec_offload
 .
   * CVE-2025-21756
     - vsock: Keep the binding until socket destruction
     - vsock: Orphan socket after transport release
 .
   * CVE-2024-50256
     - netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
 .
   * CVE-2025-21702
     - pfifo_tail_enqueue: Drop new packet when sch->limit == 0
 .
   * CVE-2025-21703
     - netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
 .
   * CVE-2025-21700
     - net: sched: Disallow replacing of child qdisc from one parent to another
 .
   * CVE-2024-46826
     - ELF: fix kernel.randomize_va_space double read
 .
   * CVE-2024-56651
     - can: hi311x: hi3110_can_ist(): fix potential use-after-free
 .
   * iBFT iSCSI out-of-bounds shift UBSAN warning (LP: #2097824)
     - iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
 .
   * CVE-2024-50248
     - ntfs3: Add bounds checking to mi_enum_attr()
     - fs/ntfs3: Sequential field availability check in mi_enum_attr()
 .
   * CVE-2022-0995
     - watch_queue: Use the bitmap API when applicable
 .
   * CVE-2024-26837
     - net: bridge: switchdev: Skip MDB replays of deferred events on offload
 .
   * CVE-2025-21701
     - net: avoid race between device unregistration and ethnl ops
 .
   * CVE-2024-57798
     - drm/dp_mst: Skip CSN if topology probing is not done yet
     - drm/dp_mst: Ensure mst_primary pointer is valid in
       drm_dp_mst_handle_up_req()
 .
   * CVE-2024-56658
     - net: defer final 'struct net' free in netns dismantle
 .
   * CVE-2024-35864
     - smb: client: fix potential UAF in smb2_is_valid_lease_break()
 .
   * CVE-2024-35864/CVE-2024-26928
     - smb: client: fix potential UAF in cifs_debug_files_proc_show()

Source diff to previous version
2096976 ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J
2097824 iBFT iSCSI out-of-bounds shift UBSAN warning
CVE-2025-21756 In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; thi
CVE-2024-50256 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() I got a syzb
CVE-2025-21702 In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 Expected behaviour: In
CVE-2025-21703 In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_
CVE-2025-21700 In the Linux kernel, the following vulnerability has been resolved: net: sched: Disallow replacing of child qdisc from one parent to another Lion A
CVE-2024-46826 In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses "randomize_va_sp
CVE-2024-56651 In the Linux kernel, the following vulnerability has been resolved: can: hi311x: hi3110_can_ist(): fix potential use-after-free The commit a22bd630
CVE-2024-50248 In the Linux kernel, the following vulnerability has been resolved: ntfs3: Add bounds checking to mi_enum_attr() Added bounds checking to make sure
CVE-2022-0995 An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of t
CVE-2024-26837 In the Linux kernel, the following vulnerability has been resolved: net: bridge: switchdev: Skip MDB replays of deferred events on offload Before t
CVE-2025-21701 In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace
CVE-2024-57798 In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() W
CVE-2024-56658 In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-
CVE-2024-35864 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions tha
CVE-2024-26928 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions th

Version: 5.15.0-135.146 2025-02-15 21:08:30 UTC

 linux (5.15.0-135.146) jammy; urgency=medium
 .
   * jammy/linux: 5.15.0-135.146 -proposed tracker (LP: #2098300)
 .
   * Packaging resync (LP: #1786013)
     - [Packaging] debian.master/dkms-versions -- update from kernel-versions
       (main/2025.02.10)
 .
   * Jammy update: v5.15.178 upstream stable release (LP: #2098441)
     - ASoC: wm8994: Add depends on MFD core
     - ASoC: samsung: Add missing selects for MFD_WM8994
     - seccomp: Stub for !CONFIG_SECCOMP
     - scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request
     - irqchip/sunxi-nmi: Add missing SKIP_WAKE flag
     - ASoC: samsung: Add missing depends on I2C
     - regmap: detach regmap from dev on regmap_exit
     - mptcp: don't always assume copied data in mptcp_cleanup_rbuf()
     - gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
     - net: sched: fix ets qdisc OOB Indexing
     - vfio/platform: check the bounds of read/write syscalls
     - fs/ntfs3: Additional check in ntfs_file_release
     - platform/chrome: cros_ec_typec: Check for EC driver
     - ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
     - scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
     - wifi: iwlwifi: add a few rate index validity checks
     - USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
     - ALSA: usb-audio: Add delay quirk for USB Audio Device
     - Input: atkbd - map F23 key to support default copilot shortcut
     - Input: xpad - add unofficial Xbox 360 wireless receiver clone
     - Input: xpad - add support for wooting two he (arm)
     - drm/v3d: Assign job pointer to NULL before signaling the fence
     - Linux 5.15.178
 .
   * CVE-2024-49925
     - fbdev: efifb: Register sysfs groups through driver core
 .
   * Jammy update: v5.15.177 upstream stable release (LP: #2097298)
     - ceph: give up on paths longer than PATH_MAX
     - jbd2: flush filesystem device before updating tail sequence
     - dm array: fix releasing a faulty array block twice in dm_array_cursor_end
     - dm array: fix unreleased btree blocks on closing a faulty array cursor
     - dm array: fix cursor index when skipping across block boundaries
     - exfat: fix the infinite loop in exfat_readdir()
     - exfat: fix the infinite loop in __exfat_free_cluster()
     - ASoC: mediatek: disable buffer pre-allocation
     - ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe()
     - net: 802: LLC+SNAP OID:PID lookup on start of skb data
     - tcp/dccp: complete lockless accesses to sk->sk_max_ack_backlog
     - tcp/dccp: allow a connection when sk_max_ack_backlog is zero
     - net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
     - bnxt_en: Fix possible memory leak when hwrm_req_replace fails
     - cxgb4: Avoid removal of uninserted tid
     - tls: Fix tls_sw_sendmsg error handling
     - netfilter: nf_tables: imbalance in flowtable binding
     - netfilter: conntrack: clamp maximum hashtable size to INT_MAX
     - drm/mediatek: Add support for 180-degree rotation in the display driver
     - ksmbd: fix a missing return value check bug
     - afs: Fix the maximum cell name length
     - dm thin: make get_first_thin use rcu-safe list first function
     - dm-ebs: don't set the flag DM_TARGET_PASSES_INTEGRITY
     - sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
     - sctp: sysctl: rto_min/max: avoid using current->nsproxy
     - sctp: sysctl: auth_enable: avoid using current->nsproxy
     - sctp: sysctl: udp_port: avoid using current->nsproxy
     - sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy
     - drm/amd/display: Add check for granularity in dml ceil/floor helpers
     - riscv: Fix sleeping in invalid context in die()
     - ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[]
     - ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[]
     - drm/amd/display: increase MAX_SURFACES to the value supported by hw
     - scripts/sorttable: fix orc_sort_cmp() to maintain symmetry and transitivity
     - USB: serial: option: add MeiG Smart SRM815
     - USB: serial: option: add Neoway N723-EA support
     - staging: iio: ad9834: Correct phase range check
     - staging: iio: ad9832: Correct phase range check
     - usb-storage: Add max sectors quirk for Nokia 208
     - USB: serial: cp210x: add Phoenix Contact UPS Device
     - usb: dwc3: gadget: fix writing NYET threshold
     - topology: Keep the cpumask unchanged when printing cpumap
     - USB: usblp: return error when setting unsupported protocol
     - USB: core: Disable LPM only for non-suspended ports
     - usb: fix reference leak in usb_new_device()
     - usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints
     - usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
     - iio: pressure: zpa2326: fix information leak in triggered buffer
     - iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered
       buffer
     - iio: light: vcnl4035: fix information leak in triggered buffer
     - iio: imu: kmx61: fix information leak in triggered buffer
     - iio: adc: ti-ads8688: fix information leak in triggered buffer
     - iio: gyro: fxas21002c: Fix missing data update in trigger handler
     - iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep()
     - iio: adc: at91: call input_free_device() on allocated iio_dev
     - iio: inkern: call iio_device_put() only on mapped devices
     - iio: adc: ad7124: Disable all channels at probe time
     - block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()
     - arm64: dts: rockchip: add hevc power domain clock to rk3328
     - of: unittest: Add bus address range parsing tests
     - of/address: Add support for 3 address cell bus
     - of: address: Fix address translation when address-size is greater than 2
     - of: address: Remove duplicated functions
     - of: address: Store number of bus flag cells rather than

Source diff to previous version
1786013 Packaging resync
2098441 Jammy update: v5.15.178 upstream stable release
2097298 Jammy update: v5.15.177 upstream stable release
2095327 Jammy update: v5.15.176 upstream stable release
2095302 Jammy update: v5.15.175 upstream stable release
2095283 Jammy update: v5.15.174 upstream stable release
CVE-2024-49925 In the Linux kernel, the following vulnerability has been resolved: fbdev: efifb: Register sysfs groups through driver core The driver core can reg
CVE-2024-46784 In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup Currently n
CVE-2024-44938 In the Linux kernel, the following vulnerability has been resolved: jfs: Fix shift-out-of-bounds in dbDiscardAG When searching for the next smaller
CVE-2024-43900 In the Linux kernel, the following vulnerability has been resolved: media: xc2028: avoid use-after-free in load_firmware_cb() syzkaller reported us
CVE-2024-57884 In the Linux kernel, the following vulnerability has been resolved: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_r
CVE-2024-57889 In the Linux kernel, the following vulnerability has been resolved: pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking If a de
CVE-2024-57890 In the Linux kernel, the following vulnerability has been resolved: RDMA/uverbs: Prevent integer overflow issue In the expression "cmd.wqe_size * c
CVE-2024-57896 In the Linux kernel, the following vulnerability has been resolved: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmou
CVE-2024-57897 In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Correct the migration DMA map direction The SVM DMA device map dire
CVE-2024-56759 In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free when COWing tree bock and tracing is enabled When a C
CVE-2024-57900 In the Linux kernel, the following vulnerability has been resolved: ila: serialize calls to nf_register_net_hooks() syzbot found a race in ila_add_
CVE-2024-57901 In the Linux kernel, the following vulnerability has been resolved: af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK Blamed commit forgot MSG_P
CVE-2024-57902 In the Linux kernel, the following vulnerability has been resolved: af_packet: fix vlan_get_tci() vs MSG_PEEK Blamed commit forgot MSG_PEEK case, a
CVE-2024-57903 In the Linux kernel, the following vulnerability has been resolved: net: restrict SO_REUSEPORT to inet sockets After blamed commit, crypto sockets
CVE-2024-36476 In the Linux kernel, the following vulnerability has been resolved: RDMA/rtrs: Ensure 'ib_sge list' is accessible Move the declaration of the 'ib_s
CVE-2024-57802 In the Linux kernel, the following vulnerability has been resolved: netrom: check buffer length before accessing it Syzkaller reports an uninit val
CVE-2024-57841 In the Linux kernel, the following vulnerability has been resolved: net: fix memory leak in tcp_conn_request() If inet_csk_reqsk_queue_hash_add() r
CVE-2024-49998 In the Linux kernel, the following vulnerability has been resolved: net: dsa: improve shutdown sequence Alexander Sverdlin presents 2 problems duri
CVE-2024-50121 In the Linux kernel, the following vulnerability has been resolved: nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net In t
CVE-2024-57792 In the Linux kernel, the following vulnerability has been resolved: power: supply: gpio-charger: Fix set charge current limits Fix set charge curre
CVE-2024-56763 In the Linux kernel, the following vulnerability has been resolved: tracing: Prevent bad count for tracing_cpumask_write If a large count is provid
CVE-2024-56626 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write An offset from client
CVE-2024-56627 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read An offset from client co
CVE-2024-56616 In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Fix MST sideband message body length check Fix the MST sideband mes
CVE-2024-53099 In the Linux kernel, the following vulnerability has been resolved: bpf: Check validity of link->type in bpf_link_show_fdinfo() If a newly-added li
CVE-2024-57807 In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circula
CVE-2024-56767 In the Linux kernel, the following vulnerability has been resolved: dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset The at_xd
CVE-2024-56769 In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg Syzbot r
CVE-2024-53690 In the Linux kernel, the following vulnerability has been resolved: nilfs2: prevent use of deleted inode syzbot reported a WARNING in nilfs_rmdir.
CVE-2024-55881 In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Play nice with protected guests in complete_hypercall_exit() Use is_6
CVE-2024-55916 In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet If the KVP
CVE-2024-56369 In the Linux kernel, the following vulnerability has been resolved: drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() drm_mode_vrefresh
CVE-2024-56715 In the Linux kernel, the following vulnerability has been resolved: ionic: Fix netdev notifier unregister on failure If register_netdev() fails, th
CVE-2024-56716 In the Linux kernel, the following vulnerability has been resolved: netdevsim: prevent bad user input in nsim_dev_health_break_write() If either a
CVE-2024-57791 In the Linux kernel, the following vulnerability has been resolved: net/smc: check return value of sock_recvmsg when draining clc data When receivi
CVE-2024-47408 In the Linux kernel, the following vulnerability has been resolved: net/smc: check smcd_v2_ext_offset when receiving proposal msg When receiving pr
CVE-2024-49571 In the Linux kernel, the following vulnerability has been resolved: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg
CVE-2024-53125 In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not aff
CVE-2024-56770 In the Linux kernel, the following vulnerability has been resolved: net/sched: netem: account for backlog updates from child qdisc In general, 'qle
CVE-2024-56659 In the Linux kernel, the following vulnerability has been resolved: net: lapb: increase LAPB_HEADER_LEN It is unclear if net/lapb code is supposed
CVE-2024-56662 In the Linux kernel, the following vulnerability has been resolved: acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl Fix an issue detected b
CVE-2024-42315 In the Linux kernel, the following vulnerability has been resolved: exfat: fix potential deadlock on __exfat_get_dentry_set When accessing a file w
CVE-2024-53119 In the Linux kernel, the following vulnerability has been resolved: virtio/vsock: Fix accept_queue memory leak As the final stages of socket destru
CVE-2024-56670 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing n
CVE-2024-46871 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Wh
CVE-2024-49950 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect [Syzbot reported] BUG: KASAN: slab-u
CVE-2024-50275 In the Linux kernel, the following vulnerability has been resolved: arm64/sve: Discard stale CPU state when handling SVE traps The logic for handli
CVE-2024-47730 In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - inject error before stopping queue The master ooo cannot
CVE-2024-46809 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check BIOS images before it is used BIOS images may fail to lo
CVE-2024-57850 In the Linux kernel, the following vulnerability has been resolved: jffs2: Prevent rtime decompress memory corruption The rtime decompression routi
CVE-2024-56781 In the Linux kernel, the following vulnerability has been resolved: powerpc/prom_init: Fixup missing powermac #size-cells On some powermacs `escc`
CVE-2024-56785 In the Linux kernel, the following vulnerability has been resolved: MIPS: Loongson64: DTS: Really fix PCIe port nodes for ls7a Fix the dtc warnings
CVE-2024-43098 In the Linux kernel, the following vulnerability has been resolved: i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid de
CVE-2024-45828 In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request Bus cleanup pa
CVE-2024-56586 In the Linux kernel, the following vulnerability has been resolved: f2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode. creat
CVE-2024-56587 In the Linux kernel, the following vulnerability has been resolved: leds: class: Protect brightness_show() with led_cdev->led_access mutex There is
CVE-2024-56589 In the Linux kernel, the following vulnerability has been resolved: scsi: hisi_sas: Add cond_resched() for no forced preemption model For no forced
CVE-2024-56590 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet This fix
CVE-2024-56593 In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_r
CVE-2024-56594 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: set the right AMDGPU sg segment limitation The driver needs to set
CVE-2024-56595 In the Linux kernel, the following vulnerability has been resolved: jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree When the val
CVE-2024-56596 In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in jfs_readdir The stbl might contain some i
CVE-2024-56597 In the Linux kernel, the following vulnerability has been resolved: jfs: fix shift-out-of-bounds in dbSplit When dmt_budmin is less than zero, it c
CVE-2024-56598 In the Linux kernel, the following vulnerability has been resolved: jfs: array-index-out-of-bounds fix in dtReadFirst The value of stbl can be some
CVE-2024-47143 In the Linux kernel, the following vulnerability has been resolved: dma-debug: fix a possible deadlock on radix_lock radix_lock() shouldn't be held
CVE-2024-56600 In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data
CVE-2024-56601 In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data()
CVE-2024-56602 In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() sock
CVE-2024-56603 In the Linux kernel, the following vulnerability has been resolved: net: af_can: do not leave a dangling sk pointer in can_create() On error can_cr
CVE-2024-56605 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create
CVE-2024-56606 In the Linux kernel, the following vulnerability has been resolved: af_packet: avoid erroring out after sock_init_data() in packet_create() After s
CVE-2024-56787 In the Linux kernel, the following vulnerability has been resolved: soc: imx8m: Probe the SoC driver as platform driver With driver_async_probe=* o
CVE-2024-56610 In the Linux kernel, the following vulnerability has been resolved: kcsan: Turn report_filterlist_lock into a raw_spinlock Ran Xiaokai reports that
CVE-2024-57849 In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove hand
CVE-2024-56568 In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu: Defer probe of clients after smmu device bound Null pointer der
CVE-2024-56614 In the Linux kernel, the following vulnerability has been resolved: xsk: fix OOB map writes when deleting elements Jordy says: " In the xsk_map_de
CVE-2024-56615 In the Linux kernel, the following vulnerability has been resolved: bpf: fix OOB devmap writes when deleting elements Jordy reported issue against
CVE-2024-48881 In the Linux kernel, the following vulnerability has been resolved: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again Commit 028ddcac477b (
CVE-2024-56619 In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() Syzbot
CVE-2024-56622 In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: sysfs: Prevent div by zero Prevent a division by 0 when monito
CVE-2024-56623 In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix use after free on unload System crash is observed with stack
CVE-2024-57874 In the Linux kernel, the following vulnerability has been resolved: arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL Currently tagg
CVE-2024-56625 In the Linux kernel, the following vulnerability has been resolved: can: dev: can_set_termination(): allow sleeping GPIOs In commit 6e86a1543c37 ("
CVE-2024-56629 In the Linux kernel, the following vulnerability has been resolved: HID: wacom: fix when get product name maybe null pointer Due to incorrect dev->
CVE-2024-56630 In the Linux kernel, the following vulnerability has been resolved: ocfs2: free inode when ocfs2_get_init_inode() fails syzbot is reporting busy in
CVE-2024-50051 In the Linux kernel, the following vulnerability has been resolved: spi: mpc52xx: Add cancel_work_sync before module remove If we remove the module
CVE-2024-56633 In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg The current sk memory
CVE-2024-56634 In the Linux kernel, the following vulnerability has been resolved: gpio: grgpio: Add NULL check in grgpio_probe devm_kasprintf() can return a NULL
CVE-2024-56636 In the Linux kernel, the following vulnerability has been resolved: geneve: do not assume mac header is set in geneve_xmit_skb() We should not assu
CVE-2024-56637 In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Hold module reference while requesting a module User space ma
CVE-2024-52332 In the Linux kernel, the following vulnerability has been resolved: igb: Fix potential invalid memory access in igb_init_module() The pci_register_
CVE-2024-56640 In the Linux kernel, the following vulnerability has been resolved: net/smc: fix LGR and link use-after-free issue We encountered a LGR/link use-af
CVE-2024-56642 In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free of kernel socket in cleanup_bearer(). syzkaller report
CVE-2024-56643 In the Linux kernel, the following vulnerability has been resolved: dccp: Fix memory leak in dccp_feat_change_recv If dccp_feat_push_confirm() fail
CVE-2024-56644 In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked
CVE-2024-56645 In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_session_new(): fix skb reference counting Since j1939_session
CVE-2024-56648 In the Linux kernel, the following vulnerability has been resolved: net: hsr: avoid potential out-of-bound access in fill_frame_info() syzbot is ab
CVE-2024-56650 In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the
CVE-2024-56776 In the Linux kernel, the following vulnerability has been resolved: drm/sti: avoid potential dereference of error pointers The return value of drm_
CVE-2024-56777 In the Linux kernel, the following vulnerability has been resolved: drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check
CVE-2024-56778 In the Linux kernel, the following vulnerability has been resolved: drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check
CVE-2024-46841 In the Linux kernel, the following vulnerability has been resolved: btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc(
CVE-2024-56779 In the Linux kernel, the following vulnerability has been resolved: nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur The action force
CVE-2024-56558 In the Linux kernel, the following vulnerability has been resolved: nfsd: make sure exp active before svc_export_show The function `e_show` was cal
CVE-2024-56562 In the Linux kernel, the following vulnerability has been resolved: i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() if (dev-
CVE-2024-57838 In the Linux kernel, the following vulnerability has been resolved: s390/entry: Mark IRQ entries to fix stack depot warnings The stack depot filter
CVE-2024-56567 In the Linux kernel, the following vulnerability has been resolved: ad7780: fix division by zero in ad7780_write_raw() In the ad7780_write_raw() ,
CVE-2024-56581 In the Linux kernel, the following vulnerability has been resolved: btrfs: ref-verify: fix use-after-free after invalid ref action At btrfs_ref_tre
CVE-2024-56774 In the Linux kernel, the following vulnerability has been resolved: btrfs: add a sanity check for btrfs root in btrfs_search_slot() Syzbot reports
CVE-2024-56780 In the Linux kernel, the following vulnerability has been resolved: quota: flush quota_release_work upon quota writeback One of the paths quota wri
CVE-2024-53165 In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error han
CVE-2024-56688 In the Linux kernel, the following vulnerability has been resolved: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport Since transport->sock
CVE-2024-56704 In the Linux kernel, the following vulnerability has been resolved: 9p/xen: fix release of IRQ Kernel logs indicate an IRQ was double-freed. Pass
CVE-2024-53171 In the Linux kernel, the following vulnerability has been resolved: ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit After an inse
CVE-2024-53172 In the Linux kernel, the following vulnerability has been resolved: ubi: fastmap: Fix duplicate slab cache names while attaching Since commit 4c395
CVE-2024-56739 In the Linux kernel, the following vulnerability has been resolved: rtc: check if __rtc_read_time was successful in rtc_timer_do_work() If the __rt
CVE-2024-53173 In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun rep
CVE-2024-53145 In the Linux kernel, the following vulnerability has been resolved: um: Fix potential integer overflow during physmem setup This issue happens when
CVE-2024-53174 In the Linux kernel, the following vulnerability has been resolved: SUNRPC: make sure cache entry active before cache_show The function `c_show` wa
CVE-2024-53146 In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent a potential integer overflow If the tag length is >= U32_MAX - 3
CVE-2024-56698 In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: Fix looping of queued SG entries The dwc3_request->num_queue
CVE-2024-53180 In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Add sanity NULL check for the default mmap fault handler A driver mi
CVE-2024-56700 In the Linux kernel, the following vulnerability has been resolved: media: wl128x: Fix atomicity violation in fmc_send_cmd() Atomicity violation oc
CVE-2022-49034 In the Linux kernel, the following vulnerability has been resolved: sh: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK When CONFIG_CPUMASK_OFFS
CVE-2024-53181 In the Linux kernel, the following vulnerability has been resolved: um: vector: Do not use drvdata in release The drvdata is not available in relea
CVE-2024-53183 In the Linux kernel, the following vulnerability has been resolved: um: net: Do not use drvdata in release The drvdata is not available in release.
CVE-2024-53184 In the Linux kernel, the following vulnerability has been resolved: um: ubd: Do not use drvdata in release The drvdata is not available in release.
CVE-2024-50055 In the Linux kernel, the following vulnerability has been resolved: driver core: bus: Fix double free in driver API bus_register() For bus_register
CVE-2024-56741 In the Linux kernel, the following vulnerability has been resolved: apparmor: test: Fix memory leak for aa_unpack_strdup() The string allocated by
CVE-2024-53148 In the Linux kernel, the following vulnerability has been resolved: comedi: Flush partial mappings in error case If some remap_pfn_range() calls su
CVE-2024-53194 In the Linux kernel, the following vulnerability has been resolved: PCI: Fix use-after-free of slot->bus on hot remove Dennis reports a boot crash
CVE-2024-53197 In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
CVE-2024-53150 In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current
CVE-2024-53198 In the Linux kernel, the following vulnerability has been resolved: xen: Fix the issue of resource not being properly released in xenbus_dev_probe()
CVE-2024-50283 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp ksmbd_user_session_put
CVE-2024-53206 In the Linux kernel, the following vulnerability has been resolved: tcp: Fix use-after-free of nreq in reqsk_timer_handler(). The cited commit repl
CVE-2024-53214 In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Properly hide first-in-list PCIe extended capability There are cases
CVE-2024-53215 In the Linux kernel, the following vulnerability has been resolved: svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() There's issue
CVE-2024-53217 In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent NULL dereference in nfsd4_process_cb_update() @ses is initialized
CVE-2024-53151 In the Linux kernel, the following vulnerability has been resolved: svcrdma: Address an integer overflow Dan Carpenter reports: > Commit 78147ca8b4
CVE-2024-56745 In the Linux kernel, the following vulnerability has been resolved: PCI: Fix reset_method_store() memory leak In reset_method_store(), a string is
CVE-2024-56746 In the Linux kernel, the following vulnerability has been resolved: fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() When inform
CVE-2024-53155 In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix uninitialized value in ocfs2_file_read_iter() Syzbot has reported th
CVE-2024-53226 In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() ib_map_mr_sg() al
CVE-2024-56747 In the Linux kernel, the following vulnerability has been resolved: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() Hook "qedi_o
CVE-2024-56748 In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() Hook "qed_op
CVE-2024-53227 In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Fix use-after-free in bfad_im_module_exit() BUG: KASAN: slab-use-aft
CVE-2024-56701 In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore The dtl_access_lock n
CVE-2024-56678 In the Linux kernel, the following vulnerability has been resolved: powerpc/mm/fault: Fix kfence page fault reporting copy_from_kernel_nofault() ca
CVE-2024-56723 In the Linux kernel, the following vulnerability has been resolved: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices While design wise th
CVE-2024-56724 In the Linux kernel, the following vulnerability has been resolved: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device While design wise the
CVE-2024-56691 In the Linux kernel, the following vulnerability has been resolved: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device While design wi
CVE-2024-56694 In the Linux kernel, the following vulnerability has been resolved: bpf: fix recursive lock when verdict program return SK_PASS When the stream_ver
CVE-2024-53237 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: fix use-after-free in device_for_each_child() Syzbot has reported th
CVE-2024-53239 In the Linux kernel, the following vulnerability has been resolved: ALSA: 6fire: Release resources at card release The current 6fire code tries to
CVE-2024-56531 In the Linux kernel, the following vulnerability has been resolved: ALSA: caiaq: Use snd_card_free_when_closed() at disconnection The USB disconnec
CVE-2024-56532 In the Linux kernel, the following vulnerability has been resolved: ALSA: us122l: Use snd_card_free_when_closed() at disconnection The USB disconne
CVE-2024-56533 In the Linux kernel, the following vulnerability has been resolved: ALSA: usx2y: Use snd_card_free_when_closed() at disconnection The USB disconnec
CVE-2024-56720 In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Several fixes to bpf_msg_pop_data Several fixes to bpf_msg_pop_da
CVE-2024-56726 In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c Add error pointer chec
CVE-2024-56728 In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c Add error point
CVE-2024-56679 In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c Add error pointe
CVE-2024-56539 In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan(
CVE-2024-53156 In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() I found
CVE-2024-56705 In the Linux kernel, the following vulnerability has been resolved: media: atomisp: Add check for rgby_data memory allocation failure In ia_css_3a_
CVE-2024-53157 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Check the DVFS OPP count returned by the firmware Fix a ker
CVE-2024-53158 In the Linux kernel, the following vulnerability has been resolved: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() This loop is s
CVE-2024-56681 In the Linux kernel, the following vulnerability has been resolved: crypto: bcm - add error check in the ahash_hmac_init function The ahash_init fu
CVE-2024-56708 In the Linux kernel, the following vulnerability has been resolved: EDAC/igen6: Avoid segmentation fault on module unload The segmentation fault ha
CVE-2024-56690 In the Linux kernel, the following vulnerability has been resolved: crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EB
CVE-2024-53161 In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow The 64-bit argument for the "get
CVE-2024-56754 In the Linux kernel, the following vulnerability has been resolved: crypto: caam - Fix the pointer passed to caam_qi_shutdown() The type of the las
CVE-2024-56548 In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't query the device logical block size multiple times Devices block
CVE-2024-56756 In the Linux kernel, the following vulnerability has been resolved: nvme-pci: fix freeing of the HMB descriptor table The HMB descriptor table is s
CVE-2024-53142 In the Linux kernel, the following vulnerability has been resolved: initramfs: avoid filename buffer overrun The initramfs filename field is define
CVE-2024-56693 In the Linux kernel, the following vulnerability has been resolved: brd: defer automatic disk creation until module initialization succeeds My coll
CVE-2024-49996 In the Linux kernel, the following vulnerability has been resolved: cifs: Fix buffer overflow when parsing NFS reparse points ReparseDataLength is
CVE-2024-53096 In the Linux kernel, the following vulnerability has been resolved: mm: resolve faulty mmap_region() error path behaviour The mmap_region() functio
CVE-2024-53122 In the Linux kernel, the following vulnerability has been resolved: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust Additional active
CVE-2024-49974 In the Linux kernel, the following vulnerability has been resolved: NFSD: Limit the number of concurrent async COPY operations Nothing appears to l
CVE-2024-53127 In the Linux kernel, the following vulnerability has been resolved: Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" The commit
CVE-2024-53130 In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint When using the "blo
CVE-2024-53131 In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint Patch series "nilfs
CVE-2024-53135 In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN H
CVE-2024-53112 In the Linux kernel, the following vulnerability has been resolved: ocfs2: uncache inode which has failed entering the group Syzbot has reported th
CVE-2024-53113 In the Linux kernel, the following vulnerability has been resolved: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof We triggered a NULL
CVE-2024-53120 In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: CT: Fix null-ptr-deref in add rule err flow In error flow of mlx5_tc
CVE-2024-53138 In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: kTLS, Fix incorrect page refcounting The kTLS tx handling code is us
CVE-2024-53121 In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fs, lock FTE when checking if active The referenced commits introduce
CVE-2024-53129 In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: vop: Fix a dereferenced before check warning The 'state' can't be
CVE-2024-53140 In the Linux kernel, the following vulnerability has been resolved: netlink: terminate outstanding dump on socket close Netlink supports iterative
CVE-2024-56569 In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix regression with module command in stack_trace_filter When executing
CVE-2024-56570 In the Linux kernel, the following vulnerability has been resolved: ovl: Filter invalid inodes with missing lookup function Add a check to the ovl_
CVE-2024-56572 In the Linux kernel, the following vulnerability has been resolved: media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_inter
CVE-2024-56574 In the Linux kernel, the following vulnerability has been resolved: media: ts2020: fix null-ptr-deref in ts2020_probe() KASAN reported a null-ptr-d
CVE-2024-56575 In the Linux kernel, the following vulnerability has been resolved: media: imx-jpeg: Ensure power suppliers be suspended before detach them The pow
CVE-2024-56576 In the Linux kernel, the following vulnerability has been resolved: media: i2c: tc358743: Fix crash in the probe error path when using polling If a
CVE-2024-56578 In the Linux kernel, the following vulnerability has been resolved: media: imx-jpeg: Set video drvdata before register video device The video drvda
CVE-2024-56672 In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the b

Version: 5.15.0-133.144 2025-02-13 13:08:35 UTC

 linux (5.15.0-133.144) jammy; urgency=medium
 .
   * CVE-2025-0927
     - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key
 .

Source diff to previous version

Version: 5.15.0-132.143 2025-01-16 00:08:25 UTC

 linux (5.15.0-132.143) jammy; urgency=medium
 .
   * jammy/linux: 5.15.0-132.143 -proposed tracker (LP: #2093735)
 .
   * Packaging resync (LP: #1786013)
     - [Packaging] debian.master/dkms-versions -- update from kernel-versions
       (main/2025.01.13)
 .
   * KVM: Cache CPUID at KVM.ko module init to reduce latency of VM-Enter and VM-
     Exit (LP: #2093146)
     - kvm: x86: Fix xstate_required_size() to follow XSTATE alignment rule
     - KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init
 .
   * Jammy update: v5.15.173 upstream stable release (LP: #2089541)
     - 9p: Avoid creating multiple slab caches with the same name
     - irqchip/ocelot: Fix trigger register address
     - block: Fix elevator_get_default() checking for NULL q->tag_set
     - HID: multitouch: Add support for B2402FVA track point
     - HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad
     - bpf: use kvzmalloc to allocate BPF verifier environment
     - crypto: marvell/cesa - Disable hash algorithms
     - sound: Make CONFIG_SND depend on INDIRECT_IOMEM instead of UML
     - drm/vmwgfx: Limit display layout ioctl array size to
       VMWGFX_NUM_DISPLAY_UNITS
     - powerpc/powernv: Free name on error in opal_event_init()
     - vDPA/ifcvf: Fix pci_read_config_byte() return code handling
     - fs: Fix uninitialized value issue in from_kuid and from_kgid
     - HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
     - HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard
     - net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition
     - md/raid10: improve code of mrdev in raid10_sync_request
     - mm/memory: add non-anonymous page check in the copy_present_page()
     - udf: Allocate name buffer in directory iterator on heap
     - udf: Avoid directory type conversion failure due to ENOMEM
     - 9p: fix slab cache name creation for real
     - Linux 5.15.173
 .
   * Jammy update: v5.15.173 upstream stable release (LP: #2089541) //
     CVE-2024-41080
     - io_uring: fix possible deadlock in io_register_iowq_max_workers()
 .
   * Jammy update: v5.15.172 upstream stable release (LP: #2089533)
     - arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-sapphire-
       excavator
     - arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328
     - arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards
     - arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma lion
     - arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc
     - arm64: dts: imx8mp: correct sdhc ipg clk
     - ARM: dts: rockchip: fix rk3036 acodec node
     - ARM: dts: rockchip: drop grf reference from rk3036 hdmi
     - ARM: dts: rockchip: Fix the spi controller on rk3036
     - ARM: dts: rockchip: Fix the realtek audio codec on rk3036-kylin
     - NFSv3: only use NFS timeout for MOUNT when protocols are compatible
     - NFS: Add a tracepoint to show the results of nfs_set_cache_invalid()
     - NFSv3: handle out-of-order write replies.
     - nfs: avoid i_lock contention in nfs_clear_invalid_mapping
     - net: enetc: set MAC address to the VF net_device
     - can: c_can: fix {rx,tx}_errors statistics
     - net: phy: ti: add PHY_RST_AFTER_CLK_EN flag
     - net: stmmac: Fix unbalanced IRQ wake disable warning on single irq case
     - Revert "ALSA: hda/conexant: Mute speakers at suspend / shutdown"
     - media: stb0899_algo: initialize cfr before using it
     - media: dvb_frontend: don't play tricks with underflow values
     - media: adv7604: prevent underflow condition when reporting colorspace
     - scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer
     - ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init()
     - media: pulse8-cec: fix data timestamp at pulse8_setup()
     - media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl()
     - pwm: imx-tpm: Use correct MODULO value for EPWM mode
     - drm/amdgpu: Adjust debugfs eviction and IB access permissions
     - drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
     - thermal/drivers/qcom/lmh: Remove false lockdep backtrace
     - dm cache: correct the number of origin blocks to match the target length
     - dm cache: optimize dirty bit checking with find_next_bit when resizing
     - dm-unstriped: cast an operand to sector_t to prevent potential uint32_t
       overflow
     - ALSA: usb-audio: Add quirk for HP 320 FHD Webcam
     - posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone
     - io_uring: rename kiocb_end_write() local helper
     - fs: create kiocb_{start,end}_write() helpers
     - io_uring: use kiocb_{start,end}_write() helpers
     - media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in
       uvc_parse_format
     - fs/proc: fix compile warning about variable 'vmcore_mmap_ops'
     - usb: dwc3: fix fault at system suspend if device was already runtime
       suspended
     - USB: serial: qcserial: add support for Sierra Wireless EM86xx
     - USB: serial: option: add Fibocom FG132 0x0112 composition
     - USB: serial: option: add Quectel RG650V
     - irqchip/gic-v3: Force propagation of the active state with a read-back
     - ucounts: fix counter leak in inc_rlimit_get_ucounts()
     - ALSA: usb-audio: Support jack detection on Dell dock
     - ALSA: usb-audio: Add quirks for Dell WD19 dock
     - ACPI: PRM: Clean up guid type in struct prm_handler_info
     - ALSA: usb-audio: Add endianness annotations
     - Linux 5.15.172
 .
   * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
     CVE-2024-50265
     - ocfs2: remove entry once instead of null-ptr-dereference in
       ocfs2_xa_remove()
 .
   * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
     CVE-2024-50267
     - USB: serial: io_edgeport: fix use after free in debug printk
 .
   * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
     CVE-2024-50268
     - usb: typec: fix potential ou

1786013 Packaging resync
2093146 KVM: Cache CPUID at KVM.ko module init to reduce latency of VM-Enter and VM-Exit
2089541 Jammy update: v5.15.173 upstream stable release
2089533 Jammy update: v5.15.172 upstream stable release
2089405 Jammy update: v5.15.171 upstream stable release
2089272 Jammy update: v5.15.170 upstream stable release
2089699 kernel:nft \
2089373 WARN in trc_wait_for_one_reader about failed IPIs
2086606 Add list of source files to linux-buildinfo
2087853 UFS: uspi-\u003es_3apb UBSAN: shift-out-of-bounds
2088231 Jammy update: v5.15.169 upstream stable release
CVE-2024-41080 In the Linux kernel, the following vulnerability has been resolved: io_uring: fix possible deadlock in io_register_iowq_max_workers() The io_regist
CVE-2024-50265 In the Linux kernel, the following vulnerability has been resolved: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() S
CVE-2024-50267 In the Linux kernel, the following vulnerability has been resolved: USB: serial: io_edgeport: fix use after free in debug printk The "dev_dbg(&urb-
CVE-2024-50268 In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() Th
CVE-2024-50269 In the Linux kernel, the following vulnerability has been resolved: usb: musb: sunxi: Fix accessing an released usb phy Commit 6ed05c68cbca ("usb:
CVE-2024-50036 In the Linux kernel, the following vulnerability has been resolved: net: do not delay dst_entries_add() in dst_release() dst_entries_add() uses per
CVE-2024-42291 In the Linux kernel, the following vulnerability has been resolved: ice: Add a per-VF limit on number of FDIR filters While the iavf driver adds a
CVE-2024-50273 In the Linux kernel, the following vulnerability has been resolved: btrfs: reinitialize delayed ref list after deleting it from the list At insert_
CVE-2024-53066 In the Linux kernel, the following vulnerability has been resolved: nfs: Fix KMSAN warning in decode_getfattr_attrs() Fix the following KMSAN warni
CVE-2024-53052 In the Linux kernel, the following vulnerability has been resolved: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write When io_uring st
CVE-2024-50278 In the Linux kernel, the following vulnerability has been resolved: dm cache: fix potential out-of-bounds access on the first resume Out-of-bounds
CVE-2024-50279 In the Linux kernel, the following vulnerability has been resolved: dm cache: fix out-of-bounds access to the dirty bitset when resizing dm-cache c
CVE-2024-50282 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a pos
CVE-2024-50287 In the Linux kernel, the following vulnerability has been resolved: media: v4l2-tpg: prevent the risk of a division by zero As reported by Coverity
CVE-2024-50290 In the Linux kernel, the following vulnerability has been resolved: media: cx24116: prevent overflows on SNR calculus as reported by Coverity, if r
CVE-2024-53061 In the Linux kernel, the following vulnerability has been resolved: media: s5p-jpeg: prevent buffer overflows The current logic allows word to be l
CVE-2024-50292 In the Linux kernel, the following vulnerability has been resolved: ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove In case o
CVE-2024-53063 In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: prevent the risk of out of memory access The dvbdev contains a s
CVE-2024-50295 In the Linux kernel, the following vulnerability has been resolved: net: arc: fix the device for dma_map_single/dma_unmap_single The ndev->dev and
CVE-2024-50296 In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix kernel crash when uninstalling driver When the driver is uninsta
CVE-2024-53088 In the Linux kernel, the following vulnerability has been resolved: i40e: fix race condition by adding filter's intermediate sync state Fix a race
CVE-2024-50299 In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb() A size validation fix simi
CVE-2024-50301 In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission KASAN reports an o
CVE-2024-50302 In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by
CVE-2023-52913 In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix potential context UAFs gem_context_register() makes the context v
CVE-2024-53055 In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix 6 GHz scan construction If more than 255 colocated APs
CVE-2024-50230 In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix kernel bug due to missing clearing of checked flag Syzbot reported
CVE-2024-50072 In the Linux kernel, the following vulnerability has been resolved: x86/bugs: Use code segment selector for VERW operand Robert Gill reported below
CVE-2024-50218 In the Linux kernel, the following vulnerability has been resolved: ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow Syzbot reported a kerne
CVE-2024-50229 In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential deadlock with newly created symlinks Syzbot reported that
CVE-2024-50232 In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() In the ad712
CVE-2024-50233 In the Linux kernel, the following vulnerability has been resolved: staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg()
CVE-2024-50234 In the Linux kernel, the following vulnerability has been resolved: wifi: iwlegacy: Clear stale interrupts before resuming device iwl4965 fails upo
CVE-2024-50236 In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: Fix memory leak in management tx In the current logic, memory is
CVE-2024-50237 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower Avoid p
CVE-2024-50244 In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Additional check in ni_clear() Checking of NTFS_FLAGS_LOG_REPLAYING a
CVE-2024-50245 In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix possible deadlock in mi_read Mutex lock with another subclass use
CVE-2024-50247 In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Check if more than chunk-size bytes are written A incorrectly formatt
CVE-2024-50249 In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Make rmw_lock a raw_spin_lock The following BUG was triggered: ===
CVE-2024-50251 In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
CVE-2024-50257 In the Linux kernel, the following vulnerability has been resolved: netfilter: Fix use-after-free in get_info() ip6table_nat module unload has refc
CVE-2024-50262 In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds write in trie_get_next_key() trie_get_next_key() allocat
CVE-2024-50259 In the Linux kernel, the following vulnerability has been resolved: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_acti
CVE-2024-53042 In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() Ther
CVE-2024-53058 In the Linux kernel, the following vulnerability has been resolved: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data In case t
CVE-2024-53059 In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() 1. The
CVE-2024-50141 In the Linux kernel, the following vulnerability has been resolved: ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context PRMT needs
CVE-2024-50086 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix user-after-free from session log off There is racy issue between smb
CVE-2024-50142 In the Linux kernel, the following vulnerability has been resolved: xfrm: validate new SA's prefixlen using SA family when sel.family is unset This
CVE-2024-50103 In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() A devm
CVE-2024-50058 In the Linux kernel, the following vulnerability has been resolved: serial: protect uart_port_dtr_rts() in uart_shutdown() too Commit af224ca2df29
CVE-2024-50110 In the Linux kernel, the following vulnerability has been resolved: xfrm: fix one more kernel-infoleak in algo dumping During fuzz testing, the fol
CVE-2024-50115 In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] wh
CVE-2024-50116 In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix kernel bug due to missing clearing of buffer delay flag Syzbot repo
CVE-2024-50117 In the Linux kernel, the following vulnerability has been resolved: drm/amd: Guard against bad data for ATIF ACPI method If a BIOS provides bad dat
CVE-2024-50205 In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() The st
CVE-2024-50127 In the Linux kernel, the following vulnerability has been resolved: net: sched: fix use-after-free in taprio_change() In 'taprio_change()', 'admin'
CVE-2024-50128 In the Linux kernel, the following vulnerability has been resolved: net: wwan: fix global oob in wwan_rtnl_policy The variable wwan_rtnl_link_ops a
CVE-2024-50167 In the Linux kernel, the following vulnerability has been resolved: be2net: fix potential memory leak in be_xmit() The be_xmit() returns NETDEV_TX_
CVE-2024-50168 In the Linux kernel, the following vulnerability has been resolved: net/sun3_82586: fix potential memory leak in sun3_82586_send_packet() The sun3_
CVE-2024-50131 In the Linux kernel, the following vulnerability has been resolved: tracing: Consider the NULL character when validating the event length strlen()
CVE-2024-50143 In the Linux kernel, the following vulnerability has been resolved: udf: fix uninit-value use in udf_get_fileshortad Check for overflow when comput
CVE-2024-50134 In the Linux kernel, the following vulnerability has been resolved: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA
CVE-2024-50010 In the Linux kernel, the following vulnerability has been resolved: exec: don't WARN for racy path_noexec check Both i_mode and noexec checks wrapp
CVE-2024-50194 In the Linux kernel, the following vulnerability has been resolved: arm64: probes: Fix uprobes for big-endian kernels The arm64 uprobes code is bro
CVE-2024-50148 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: bnep: fix wild-memory-access in proto_unregister There's issue as fo
CVE-2024-50150 In the Linux kernel, the following vulnerability has been resolved: usb: typec: altmode should keep reference to parent The altmode device release
CVE-2024-50151 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOBs when building SMB2_IOCTL request When using encryption, e
CVE-2024-50153 In the Linux kernel, the following vulnerability has been resolved: scsi: target: core: Fix null-ptr-deref in target_alloc_device() There is a null
CVE-2024-50154 In the Linux kernel, the following vulnerability has been resolved: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). Martin KaFai Lau r
CVE-2024-50171 In the Linux kernel, the following vulnerability has been resolved: net: systemport: fix potential memory leak in bcm_sysport_xmit() The bcm_syspor
CVE-2024-50156 In the Linux kernel, the following vulnerability has been resolved: drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() If the allocatio
CVE-2024-50208 In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages Avoid memory corrupt
CVE-2024-50160 In the Linux kernel, the following vulnerability has been resolved: ALSA: hda/cs8409: Fix possible NULL dereference If snd_hda_gen_add_kctl fails t
CVE-2024-50209 In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Add a check for memory allocation __alloc_pbl() can return error
CVE-2024-50162 In the Linux kernel, the following vulnerability has been resolved: bpf: devmap: provide rxq after redirect rxq contains a pointer to the device fr
CVE-2024-50163 In the Linux kernel, the following vulnerability has been resolved: bpf: Make sure internal and UAPI bpf_redirect flags don't overlap The bpf_redir
CVE-2024-35887 In the Linux kernel, the following vulnerability has been resolved: ax25: fix use-after-free bugs caused by ax25_ds_del_timer When the ax25 device
CVE-2024-40965 In the Linux kernel, the following vulnerability has been resolved: i2c: lpi2c: Avoid calling clk_get_rate during transfer Instead of repeatedly ca
CVE-2024-40982 In the Linux kernel, the following vulnerability has been resolved: ssb: Fix potential NULL pointer dereference in ssb_device_uevent() The ssb_devi
CVE-2024-41066 In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Add tx check to prevent skb leak Below is a summary of how the driver
CVE-2024-42252 In the Linux kernel, the following vulnerability has been resolved: closures: Change BUG_ON() to WARN_ON() If a BUG_ON() can be hit in the wild, it
CVE-2024-53097 In the Linux kernel, the following vulnerability has been resolved: mm: krealloc: Fix MTE false alarm in __do_krealloc This patch addresses an issu



About   -   Send Feedback to @ubuntu_updates