Bugs fixes in "linux-lowlatency-hwe-6.8"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2025-21662 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix variable not being completed when function returns When cmd_alloc | 2025-05-15 |
CVE | CVE-2024-57926 | In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind retur | 2025-05-15 |
CVE | CVE-2024-57925 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix a missing return value check bug In the smb2_send_interim_resp(), if | 2025-05-15 |
CVE | CVE-2025-21646 | In the Linux kernel, the following vulnerability has been resolved: afs: Fix the maximum cell name length The kafs filesystem limits the maximum le | 2025-05-15 |
CVE | CVE-2025-21645 | In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it | 2025-05-15 |
CVE | CVE-2025-21660 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix unexpectedly changed path in ksmbd_vfs_kern_path_locked When `ksmbd_ | 2025-05-15 |
CVE | CVE-2024-57945 | In the Linux kernel, the following vulnerability has been resolved: riscv: mm: Fix the out of bound issue of vmemmap address In sparse vmemmap mode | 2025-05-15 |
CVE | CVE-2025-21664 | In the Linux kernel, the following vulnerability has been resolved: dm thin: make get_first_thin use rcu-safe list first function The documentation | 2025-05-15 |
CVE | CVE-2025-21642 | In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: sched: avoid using current->nsproxy Using the 'net' structure vi | 2025-05-15 |
CVE | CVE-2025-21640 | In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a p | 2025-05-15 |
CVE | CVE-2025-21639 | In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previ | 2025-05-15 |
CVE | CVE-2025-21638 | In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previ | 2025-05-15 |
CVE | CVE-2025-21637 | In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: udp_port: avoid using current->nsproxy As mentioned in a previous | 2025-05-15 |
CVE | CVE-2025-21636 | In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy As mentioned | 2025-05-15 |
CVE | CVE-2024-57939 | In the Linux kernel, the following vulnerability has been resolved: riscv: Fix sleeping in invalid context in die() die() can be called in exceptio | 2025-05-15 |
CVE | CVE-2024-57917 | In the Linux kernel, the following vulnerability has been resolved: topology: Keep the cpumask unchanged when printing cpumap During fuzz testing, | 2025-05-15 |
CVE | CVE-2024-57916 | In the Linux kernel, the following vulnerability has been resolved: misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling Resolv | 2025-05-15 |
CVE | CVE-2025-21632 | In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Ensure shadow stack is active before "getting" registers The x86 shado | 2025-05-15 |
CVE | CVE-2024-57913 | In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Remove WARN_ON in functionfs_bind This commit addresses an i | 2025-05-15 |
CVE | CVE-2024-57912 | In the Linux kernel, the following vulnerability has been resolved: iio: pressure: zpa2326: fix information leak in triggered buffer The 'sample' l | 2025-05-15 |
About
-
Send Feedback to @ubuntu_updates