Bugs fixes in "linux-xilinx-zynqmp"
| Origin | Bug number | Title | Date fixed |
|---|---|---|---|
| CVE | CVE-2025-37849 | In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Tear down vGIC on failed vCPU creation If kvm_arch_vcpu_create() fa | 2026-04-08 |
| CVE | CVE-2026-23111 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() | 2026-04-08 |
| CVE | CVE-2026-23060 | In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec au | 2026-04-08 |
| CVE | CVE-2026-23074 | In the Linux kernel, the following vulnerability has been resolved: net/sched: Enforce that teql can only be used as root qdisc Design intent of te | 2026-04-08 |
| CVE | CVE-2025-37849 | In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Tear down vGIC on failed vCPU creation If kvm_arch_vcpu_create() fa | 2026-04-08 |
| CVE | CVE-2026-23111 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() | 2026-04-08 |
| CVE | CVE-2026-23060 | In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec au | 2026-04-08 |
| CVE | CVE-2026-23074 | In the Linux kernel, the following vulnerability has been resolved: net/sched: Enforce that teql can only be used as root qdisc Design intent of te | 2026-04-08 |
| CVE | CVE-2025-21780 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It malicious | 2026-02-24 |
| CVE | CVE-2022-49267 | In the Linux kernel, the following vulnerability has been resolved: mmc: core: use sysfs_emit() instead of sprintf() sprintf() (still used in the M | 2026-02-24 |
| CVE | CVE-2025-21780 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It malicious | 2026-02-23 |
| CVE | CVE-2022-49267 | In the Linux kernel, the following vulnerability has been resolved: mmc: core: use sysfs_emit() instead of sprintf() sprintf() (still used in the M | 2026-02-23 |
| CVE | CVE-2025-21780 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It malicious | 2026-02-23 |
| CVE | CVE-2022-49267 | In the Linux kernel, the following vulnerability has been resolved: mmc: core: use sysfs_emit() instead of sprintf() sprintf() (still used in the M | 2026-02-23 |
| CVE | CVE-2024-41014 | In the Linux kernel, the following vulnerability has been resolved: xfs: add bounds checking to xlog_recover_process_data There is a lack of verifi | 2026-02-23 |
| CVE | CVE-2025-40083 | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix null-deref in agg_dequeue To prevent a potential crash | 2026-02-23 |
| CVE | CVE-2025-40324 | In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix crash in nfsd4_read_release() When tracing is enabled, the trace_nfsd | 2026-02-23 |
| CVE | CVE-2025-40211 | In the Linux kernel, the following vulnerability has been resolved: ACPI: video: Fix use-after-free in acpi_video_switch_brightness() The switch_br | 2026-02-23 |
| CVE | CVE-2025-40322 | In the Linux kernel, the following vulnerability has been resolved: fbdev: bitblit: bound-check glyph index in bit_putcs* bit_putcs_aligned()/unali | 2026-02-23 |
| CVE | CVE-2025-40321 | In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode Cur | 2026-02-23 |
About
-
Send Feedback to @ubuntu_updates