Bugs fixes in "linux-riscv"
| Origin | Bug number | Title | Date fixed |
|---|---|---|---|
| CVE | CVE-2025-38500 | In the Linux kernel, the following vulnerability has been resolved: xfrm: interface: fix use-after-free after changing collect_md xfrm interface co | 2025-10-01 |
| CVE | CVE-2025-38477 | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc | 2025-10-01 |
| CVE | CVE-2025-38618 | In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to au | 2025-10-01 |
| CVE | CVE-2025-38617 | In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_s | 2025-10-01 |
| CVE | CVE-2025-38500 | In the Linux kernel, the following vulnerability has been resolved: xfrm: interface: fix use-after-free after changing collect_md xfrm interface co | 2025-10-01 |
| CVE | CVE-2025-38477 | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc | 2025-10-01 |
| CVE | CVE-2025-38075 | In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix timeout on deleted connection NOPIN response timer may | 2025-09-23 |
| CVE | CVE-2025-38048 | In the Linux kernel, the following vulnerability has been resolved: virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN syzbot | 2025-09-23 |
| CVE | CVE-2025-38074 | In the Linux kernel, the following vulnerability has been resolved: vhost-scsi: protect vq->log_used with vq->mutex The vhost-scsi completion path | 2025-09-23 |
| CVE | CVE-2025-38073 | In the Linux kernel, the following vulnerability has been resolved: block: fix race between set_blocksize and read paths With the new large sector | 2025-09-23 |
| CVE | CVE-2025-38047 | In the Linux kernel, the following vulnerability has been resolved: x86/fred: Fix system hang during S4 resume with FRED enabled Upon a wakeup from | 2025-09-23 |
| CVE | CVE-2025-38081 | In the Linux kernel, the following vulnerability has been resolved: spi-rockchip: Fix register out of bounds access Do not write native chip select | 2025-09-23 |
| CVE | CVE-2025-38072 | In the Linux kernel, the following vulnerability has been resolved: libnvdimm/labels: Fix divide error in nd_label_data_init() If a faulty CXL memo | 2025-09-23 |
| CVE | CVE-2025-38071 | In the Linux kernel, the following vulnerability has been resolved: x86/mm: Check return value from memblock_phys_alloc_range() At least with CONFI | 2025-09-23 |
| CVE | CVE-2025-38070 | In the Linux kernel, the following vulnerability has been resolved: ASoC: sma1307: Add NULL check in sma1307_setting_loaded() All varibale allocate | 2025-09-23 |
| CVE | CVE-2025-38045 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix debug actions order The order of actions taken for debug was | 2025-09-23 |
| CVE | CVE-2025-38069 | In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: pci-epf-test: Fix double free that causes kernel to oops Fix a k | 2025-09-23 |
| CVE | CVE-2025-38068 | In the Linux kernel, the following vulnerability has been resolved: crypto: lzo - Fix compression buffer overrun Unlike the decompression code, the | 2025-09-23 |
| CVE | CVE-2025-38067 | In the Linux kernel, the following vulnerability has been resolved: rseq: Fix segfault on registration when rseq_cs is non-zero The rseq_cs field i | 2025-09-23 |
| CVE | CVE-2025-38066 | In the Linux kernel, the following vulnerability has been resolved: dm cache: prevent BUG_ON by blocking retries on failed device resumes A cache d | 2025-09-23 |
About
-
Send Feedback to @ubuntu_updates