1786013 |
Packaging resync |
2118499 |
minimal kernel lacks modules for blk disk in arm64 openstack environments where config_drive is required |
2117123 |
rcu: Eliminate deadlocks involving do_exit() and RCU tasks |
2118965 |
BPF header file in wrong location |
2117716 |
i915: support ARL-H gpu |
2115447 |
Ubuntu 24.04.2: NULL pointer dereference with Ceph and selinux |
2119458 |
Noble update: upstream stable patchset 2025-08-04 |
2118927 |
Noble update: upstream stable patchset 2025-07-28 |
2117533 |
Noble update: upstream stable patchset 2025-07-22 |
2116878 |
Noble update: upstream stable patchset 2025-07-14 |
CVE-2025-21872 |
In the Linux kernel, the following vulnerability has been resolved: efi: Don't map the entire mokvar table to determine its size Currently, when va |
CVE-2025-21880 |
In the Linux kernel, the following vulnerability has been resolved: drm/xe/userptr: fix EFAULT handling Currently we treat EFAULT from hmm_range_fa |
CVE-2025-21890 |
In the Linux kernel, the following vulnerability has been resolved: idpf: fix checksums set in idpf_rx_rsc() idpf_rx_rsc() uses skb_transport_offse |
CVE-2025-21885 |
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers Whil |
CVE-2025-21888 |
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix a WARN during dereg_mr for DM type Memory regions (MR) of type D |
CVE-2025-21892 |
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix the recovery flow of the UMR QP This patch addresses an issue in |
CVE-2025-21873 |
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: bsg: Fix crash when arpmb command fails If the device doesn't |
CVE-2024-58090 |
In the Linux kernel, the following vulnerability has been resolved: sched/core: Prevent rescheduling when interrupts are disabled David reported a |
CVE-2025-21875 |
In the Linux kernel, the following vulnerability has been resolved: mptcp: always handle address removal under msk socket lock Syzkaller reported a |
CVE-2025-21877 |
In the Linux kernel, the following vulnerability has been resolved: usbnet: gl620a: fix endpoint checking in genelink_bind() Syzbot reports [1] a w |
CVE-2025-21878 |
In the Linux kernel, the following vulnerability has been resolved: i2c: npcm: disable interrupt enable bit before devm_request_irq The customer re |
CVE-2025-21889 |
In the Linux kernel, the following vulnerability has been resolved: perf/core: Add RCU read lock protection to perf_iterate_ctx() The perf_iterate_ |
CVE-2025-21898 |
In the Linux kernel, the following vulnerability has been resolved: ftrace: Avoid potential division by zero in function_stat_show() Check whether |
CVE-2025-21899 |
In the Linux kernel, the following vulnerability has been resolved: tracing: Fix bad hist from corrupting named_triggers list The following command |
CVE-2025-21881 |
In the Linux kernel, the following vulnerability has been resolved: uprobes: Reject the shared zeropage in uprobe_write_opcode() We triggered the f |
CVE-2025-21895 |
In the Linux kernel, the following vulnerability has been resolved: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list Syska |
CVE-2025-21883 |
In the Linux kernel, the following vulnerability has been resolved: ice: Fix deinitializing VF in error path If ice_ena_vfs() fails after calling i |
CVE-2025-21891 |
In the Linux kernel, the following vulnerability has been resolved: ipvlan: ensure network headers are in skb linear part syzbot found that ipvlan_ |
CVE-2024-57996 |
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does |
CVE-2025-37752 |
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly |
CVE-2025-38350 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain cla |
CVE-2025-21887 |
In the Linux kernel, the following vulnerability has been resolved: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up The iss |