1786013 |
Packaging resync |
2115209 |
NVMe namespace ID mismatch on repeated map/unmap |
2116072 |
integrated I219-LM network adapter appears to be running too fast, causing synchronization issues when using the I219-LM PTP feature |
2115652 |
intel_rapl: support ARL-H hardware |
2115068 |
Ubuntu 24.04+ arm64: screen resolution fixed to 1024x768 with last kernel update |
2116212 |
Noble update: upstream stable patchset 2025-07-09 |
2114785 |
[SRU]Request E825-C driver into latest LTS of Ubuntu OS 24.04 |
2114450 |
[UBUNTU 22.04] kernel: Fix z17 elf platform recognition |
2114258 |
[UBUNTU 24.04] Kernel: Add CPUMF extended counter set for z17 |
2115616 |
Noble update: upstream stable patchset 2025-06-29 |
2114849 |
Noble update: upstream stable patchset 2025-06-17 |
2117494 |
[Regression Updates] \ |
CVE-2025-21861 |
In the Linux kernel, the following vulnerability has been resolved: mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize |
CVE-2025-21868 |
In the Linux kernel, the following vulnerability has been resolved: net: allow small head cache usage with large MAX_SKB_FRAGS values Sabrina repor |
CVE-2025-21869 |
In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Disable KASAN report during patching via temporary mm Er |
CVE-2025-21870 |
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers Other, non DA |
CVE-2025-21844 |
In the Linux kernel, the following vulnerability has been resolved: smb: client: Add check for next_buffer in receive_encrypted_standard() Add chec |
CVE-2025-21846 |
In the Linux kernel, the following vulnerability has been resolved: acct: perform last write from workqueue In [1] it was reported that the acct(2) |
CVE-2025-21847 |
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() The null |
CVE-2025-21848 |
In the Linux kernel, the following vulnerability has been resolved: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() Add check for the return value |
CVE-2025-21862 |
In the Linux kernel, the following vulnerability has been resolved: drop_monitor: fix incorrect initialization order Syzkaller reports the followin |
CVE-2025-21871 |
In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix supplicant wait loop OP-TEE supplicant is a user-space daemon a |
CVE-2025-21863 |
In the Linux kernel, the following vulnerability has been resolved: io_uring: prevent opcode speculation sqe->opcode is used for different tables, |
CVE-2024-58088 |
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix deadlock when freeing cgroup storage The following commit bc235cdb423a |
CVE-2025-21853 |
In the Linux kernel, the following vulnerability has been resolved: bpf: avoid holding freeze_mutex during mmap operation We use map->freeze_mutex |
CVE-2025-21867 |
In the Linux kernel, the following vulnerability has been resolved: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() KMSAN reported a |
CVE-2025-21864 |
In the Linux kernel, the following vulnerability has been resolved: tcp: drop secpath at the same time as we currently drop dst Xiumei reported hit |
CVE-2025-21854 |
In the Linux kernel, the following vulnerability has been resolved: sockmap, vsock: For connectible sockets allow only connected sockmap expects al |
CVE-2025-21855 |
In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Don't reference skb after sending to VIOS Previously, after successful |
CVE-2025-21856 |
In the Linux kernel, the following vulnerability has been resolved: s390/ism: add release function for struct device According to device_release() |
CVE-2025-21857 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_api: fix error handling causing NULL dereference tcf_exts_miss_c |
CVE-2025-21858 |
In the Linux kernel, the following vulnerability has been resolved: geneve: Fix use-after-free in geneve_find_dev(). syzkaller reported a use-after |
CVE-2025-21866 |
In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_AL |
CVE-2025-21859 |
In the Linux kernel, the following vulnerability has been resolved: USB: gadget: f_midi: f_midi_complete to call queue_work When using USB MIDI, a |
CVE-2025-21746 |
In the Linux kernel, the following vulnerability has been resolved: Input: synaptics - fix crash when enabling pass-through port When enabling a pa |
CVE-2024-57977 |
In the Linux kernel, the following vulnerability has been resolved: memcg: fix soft lockup in the OOM process A soft lockup issue was found in the |
CVE-2025-21712 |
In the Linux kernel, the following vulnerability has been resolved: md/md-bitmap: Synchronize bitmap_get_stats() with bitmap lifetime After commit |
CVE-2024-58093 |
In the Linux kernel, the following vulnerability has been resolved: PCI/ASPM: Fix link state exit during switch upstream function removal Before 45 |
CVE-2025-38083 |
In the Linux kernel, the following vulnerability has been resolved: net_sched: prio: fix a race in prio_tune() Gerrard Tai reported a race conditio |
CVE-2025-37797 |
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a U |