2092506 |
mtk-fsource: ubuntu kernel integration |
2090981 |
[g1200-evk] Call trace appeared when reload mtk_mdp3 module |
2090978 |
[g510] mt8188-mdla-devfreq probe failed message found in dmesg |
2090979 |
Fail to detect card after unplugging DPoC cable and reboot |
2091990 |
ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel 5.15.0-127.137 |
2086242 |
Jammy update: v5.15.168 upstream stable release |
2080378 |
IOMMU warnings on AMD systems after booting into kdump kernel |
2064176 |
LXD fan bridge causes blocked tasks |
2085082 |
Cannot detect audio sinks and sources in proposed kernel |
2077321 |
Please backport the more restrictive XSAVES deactivation for Zen1/2 arch |
2081279 |
Jammy update: v5.15.167 upstream stable release |
2080594 |
Jammy update: v5.15.166 upstream stable release |
1959940 |
[22.10 FEAT] KVM: Secure Execution guest dump encryption with customer keys - kernel part |
2069961 |
turbostat fails with too many open files on large systems |
2078428 |
Jammy update: v5.15.165 upstream stable release |
2074380 |
[UBUNTU 22.04] s390/cpum_cf: make crypto counters upward compatible |
2076100 |
Jammy update: v5.15.164 upstream stable release |
CVE-2024-50264 |
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans Du |
CVE-2024-53057 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_bac |
CVE-2024-43904 |
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing |
CVE-2024-40973 |
In the Linux kernel, the following vulnerability has been resolved: media: mtk-vcodec: potential null pointer deference in SCP The return value of |
CVE-2024-38553 |
In the Linux kernel, the following vulnerability has been resolved: net: fec: remove .ndo_poll_controller to avoid deadlocks There is a deadlock is |
CVE-2024-26822 |
In the Linux kernel, the following vulnerability has been resolved: smb: client: set correct id, uid and cruid for multiuser automounts When uid, g |
CVE-2020-12351 |
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. |
CVE-2020-12352 |
Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access. |
CVE-2020-24490 |
Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all |
CVE-2024-40910 |
In the Linux kernel, the following vulnerability has been resolved: ax25: Fix refcount imbalance on inbound connections When releasing a socket in |
CVE-2024-35963 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sock: Fix not validating setsockopt user input Check user input |
CVE-2024-35965 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix not validating setsockopt user input Check user input len |
CVE-2024-35966 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: Fix not validating setsockopt user input syzbot reported rfc |
CVE-2024-35967 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix not validating setsockopt user input syzbot reported sco_so |
CVE-2024-36968 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() l2cap_le_flowctl_i |
CVE-2024-35904 |
In the Linux kernel, the following vulnerability has been resolved: selinux: avoid dereference of garbage after mount failure In case kern_mount() |
CVE-2024-42156 |
In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe copies of clear-key structures on failure Wipe all sensitive da |
CVE-2024-44942 |
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC syzbot |
CVE-2024-38538 |
In the Linux kernel, the following vulnerability has been resolved: net: bridge: xmit: make sure we have at least eth header len bytes syzbot trigg |
CVE-2024-42158 |
In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings Replace memzero_exp |
CVE-2024-38667 |
In the Linux kernel, the following vulnerability has been resolved: riscv: prevent pt_regs corruption for secondary idle threads Top of the kernel |
CVE-2024-44940 |
In the Linux kernel, the following vulnerability has been resolved: fou: remove warn in gue_gro_receive on unsupported protocol Drop the WARN_ON_ON |
CVE-2024-42079 |
In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix NULL pointer dereference in gfs2_log_flush In gfs2_jindex_free(), set |
CVE-2024-35951 |
In the Linux kernel, the following vulnerability has been resolved: drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() Subject: [PAT |
CVE-2023-52532 |
In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix TX CQE error handling For an unknown TX CQE error type (probably |
CVE-2023-52621 |
In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers These thre |
CVE-2024-26947 |
In the Linux kernel, the following vulnerability has been resolved: ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses Sin |
CVE-2023-52639 |
In the Linux kernel, the following vulnerability has been resolved: KVM: s390: vsie: fix race during shadow creation Right now it is possible to se |
CVE-2024-26800 |
In the Linux kernel, the following vulnerability has been resolved: tls: fix use-after-free on failed backlog decryption When the decrypt request g |
CVE-2024-41071 |
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Avoid address calculations via out of bounds array indexing req |
CVE-2024-40915 |
In the Linux kernel, the following vulnerability has been resolved: riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context __kernel |
CVE-2024-38611 |
In the Linux kernel, the following vulnerability has been resolved: media: i2c: et8ek8: Don't strip remove function when driver is builtin Using __ |
CVE-2024-38602 |
In the Linux kernel, the following vulnerability has been resolved: ax25: Fix reference count leak issues of ax25_dev The ax25_addr_ax25dev() and a |
CVE-2024-26669 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: flower: Fix chain template offload When a qdisc is deleted from a ne |
CVE-2024-26607 |
In the Linux kernel, the following vulnerability has been resolved: drm/bridge: sii902x: Fix probing race issue A null pointer dereference crash ha |
CVE-2024-26893 |
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Fix double free in SMC transport cleanup path When the gene |
CVE-2024-26661 |
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' In |
CVE-2024-25744 |
In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c |
CVE-2024-45016 |
In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu |
CVE-2024-38630 |
In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the |
CVE-2024-27397 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time |