Package "linux-gcp-5.15"
Name: |
linux-gcp-5.15
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Linux kernel buildinfo for version 5.15.0 on 64 bit x86 SMP
- Linux kernel buildinfo for version 5.15.0 on 64 bit x86 SMP
- Linux kernel buildinfo for version 5.15.0 on 64 bit x86 SMP
- Linux kernel buildinfo for version 5.15.0 on 64 bit x86 SMP
|
Latest version: |
5.15.0-1046.54~20.04.1 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
main |
Links
Other versions of "linux-gcp-5.15" in Focal
Packages in group
Deleted packages are displayed in grey.
Changelog
linux-gcp-5.15 (5.15.0-1046.54~20.04.1) focal; urgency=medium
* focal/linux-gcp-5.15: 5.15.0-1046.54~20.04.1 -proposed tracker
(LP: #2038022)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
[ Ubuntu: 5.15.0-1046.54 ]
* jammy/linux-gcp: 5.15.0-1046.54 -proposed tracker (LP: #2038023)
* jammy/linux: 5.15.0-88.98 -proposed tracker (LP: #2038055)
* CVE-2023-4244
- netfilter: nf_tables: don't skip expired elements during walk
- netfilter: nf_tables: adapt set backend to use GC transaction API
- netfilter: nft_set_hash: mark set element as dead when deleting from packet
path
- netfilter: nf_tables: GC transaction API to avoid race with control plane
- netfilter: nf_tables: remove busy mark and gc batch API
- netfilter: nf_tables: don't fail inserts if duplicate has expired
- netfilter: nf_tables: fix kdoc warnings after gc rework
- netfilter: nf_tables: fix GC transaction races with netns and netlink event
exit path
- netfilter: nf_tables: GC transaction race with netns dismantle
- netfilter: nf_tables: GC transaction race with abort path
- netfilter: nf_tables: use correct lock to protect gc_list
- netfilter: nf_tables: defer gc run if previous batch is still pending
- netfilter: nft_dynset: disallow object maps
- netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
* CVE-2023-42756
- netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP
* CVE-2023-4623
- net/sched: sch_hfsc: Ensure inner classes have fsc curve
* PCI BARs larger than 128GB are disabled (LP: #2037403)
- PCI: Support BAR sizes up to 8TB
* Fix unstable audio at low levels on Thinkpad P1G4 (LP: #2037077)
- ALSA: hda/realtek - ALC287 I2S speaker platform support
* Check for changes relevant for security certifications (LP: #1945989)
- [Packaging] Add a new fips-checks script
* Jammy update: v5.15.126 upstream stable release (LP: #2037593)
- io_uring: gate iowait schedule on having pending requests
- perf: Fix function pointer case
- net/mlx5: Free irqs only on shutdown callback
- arm64: errata: Add workaround for TSB flush failures
- arm64: errata: Add detection for TRBE write to out-of-range
- [Config] updateconfigs for ARM64_ERRATUM_ and
ARM64_WORKAROUND_TSB_FLUSH_FAILURE
- iommu/arm-smmu-v3: Work around MMU-600 erratum 1076982
- iommu/arm-smmu-v3: Document MMU-700 erratum 2812531
- iommu/arm-smmu-v3: Add explicit feature for nesting
- iommu/arm-smmu-v3: Document nesting-related errata
- arm64: dts: imx8mn-var-som: add missing pull-up for onboard PHY reset pinmux
- word-at-a-time: use the same return type for has_zero regardless of
endianness
- KVM: s390: fix sthyi error handling
- wifi: cfg80211: Fix return value in scan logic
- net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx
- net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer()
- bpf: Add length check for SK_DIAG_BPF_STORAGE_REQ_MAP_FD parsing
- rtnetlink: let rtnl_bridge_setlink checks IFLA_BRIDGE_MODE length
- net: dsa: fix value check in bcm_sf2_sw_probe()
- perf test uprobe_from_different_cu: Skip if there is no gcc
- net: sched: cls_u32: Fix match key mis-addressing
- mISDN: hfcpci: Fix potential deadlock on &hc->lock
- qed: Fix kernel-doc warnings
- qed: Fix scheduling in a tasklet while getting stats
- net: annotate data-races around sk->sk_max_pacing_rate
- net: add missing READ_ONCE(sk->sk_rcvlowat) annotation
- net: add missing READ_ONCE(sk->sk_sndbuf) annotation
- net: add missing READ_ONCE(sk->sk_rcvbuf) annotation
- net: add missing data-race annotations around sk->sk_peek_off
- net: add missing data-race annotation for sk_ll_usec
- net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX.
- bpf, cpumap: Handle skb as well when clean up ptr_ring
- bpf: sockmap: Remove preempt_disable in sock_map_sk_acquire
- net: ll_temac: Switch to use dev_err_probe() helper
- net: ll_temac: fix error checking of irq_of_parse_and_map()
- net: korina: handle clk prepare error in korina_probe()
- net: netsec: Ignore 'phy-mode' on SynQuacer in DT mode
- net: dcb: choose correct policy to parse DCB_ATTR_BCN
- s390/qeth: Don't call dev_close/dev_open (DOWN/UP)
- ip6mr: Fix skb_under_panic in ip6mr_cache_report()
- vxlan: Fix nexthop hash size
- net/mlx5: fs_core: Make find_closest_ft more generic
- net/mlx5: fs_core: Skip the FTs in the same FS_TYPE_PRIO_CHAINS fs_prio
- prestera: fix fallback to previous version on same major version
- tcp_metrics: fix addr_same() helper
- tcp_metrics: annotate data-races around tm->tcpm_stamp
- tcp_metrics: annotate data-races around tm->tcpm_lock
- tcp_metrics: annotate data-races around tm->tcpm_vals[]
- tcp_metrics: annotate data-races around tm->tcpm_net
- tcp_metrics: fix data-race in tcpm_suck_dst() vs fastopen
- scsi: zfcp: Defer fc_rport blocking until after ADISC response
- scsi: storvsc: Limit max_sectors for virtual Fibre Channel devices
- libceph: fix potential hang in ceph_osdc_notify()
- USB: zaurus: Add ID for A-300/B-500/C-700
- ceph: defer stopping mdsc delayed_work
- firmware: arm_scmi: Drop OF node reference in the transport channel setup
- exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree
- exfat: release s_lock before calling dir_emit()
- mtd: spinand: toshiba: Fix ecc_get_status
- mtd: rawnand: meson: fix OOB available bytes for ECC
- arm64: dts: stratix10: fix incorrect I2C property for SCL signal
- wifi: mt76: mt7615: do not advertise 5 GHz on first phy of MT7615D (DBDC)
- rbd: prevent busy loop when requesting exclusive lock
- bpf: Disable preemption in bpf_event_output
- open: make R
|
Source diff to previous version |
1786013 |
Packaging resync |
2037403 |
PCI BARs larger than 128GB are disabled |
2037077 |
Fix unstable audio at low levels on Thinkpad P1G4 |
1945989 |
Check for changes relevant for security certifications |
2037593 |
Jammy update: v5.15.126 upstream stable release |
2036843 |
Jammy update: v5.15.125 upstream stable release |
2035163 |
Avoid address overwrite in kernel_connect |
2035166 |
NULL Pointer Dereference During KVM MMU Page Invalidation |
2034479 |
Fix suspend hang on Lenovo workstation |
2034745 |
[regression] Unable to initialize SGX enclaves with XFRM other than 3 |
2035400 |
Jammy update: v5.15.124 upstream stable release |
2034612 |
Jammy update: v5.15.123 upstream stable release |
CVE-2023-42756 |
A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic |
CVE-2023-42755 |
wild pointer access in rsvp classifer in the Linux kernel |
CVE-2023-42753 |
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->n |
CVE-2023-42752 |
integer overflows in kmalloc_reserve() |
CVE-2023-4881 |
** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team. |
CVE-2023-31083 |
An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSET |
CVE-2023-3772 |
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADM |
|
linux-gcp-5.15 (5.15.0-1045.53~20.04.2) focal; urgency=medium
* focal/linux-gcp-5.15: 5.15.0-1045.53~20.04.2 -proposed tracker
(LP: #2038176)
* CVE-2023-42755
- [Config] remove NET_CLS_RSVP and NET_CLS_RSVP6
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
[ Ubuntu: 5.15.0-1045.53 ]
* jammy/linux-gcp: 5.15.0-1045.53 -proposed tracker (LP: #2038177)
* CVE-2023-42755
- [Config] remove NET_CLS_RSVP and NET_CLS_RSVP6
* jammy/linux: 5.15.0-87.97 -proposed tracker (LP: #2038209)
* CVE-2023-4623
- net/sched: sch_hfsc: Ensure inner classes have fsc curve
* CVE-2023-42755
- net/sched: Retire rsvp classifier
- [Config] remove NET_CLS_RSVP and NET_CLS_RSVP6
* CVE-2023-34319
- xen/netback: Fix buffer overrun triggered by unusual packet
* CVE-2023-4921
- net: sched: sch_qfq: Fix UAF in qfq_dequeue()
* CVE-2023-42752
- igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU
* CVE-2023-4622
- af_unix: Fix null-ptr-deref in unix_stream_sendpage().
* CVE-2023-4244
- netfilter: nft_set_rbtree: fix overlap expiration walk
- netfilter: nf_tables: don't skip expired elements during walk
- netfilter: nf_tables: adapt set backend to use GC transaction API
- netfilter: nft_set_hash: mark set element as dead when deleting from packet
path
- netfilter: nf_tables: GC transaction API to avoid race with control plane
- netfilter: nf_tables: remove busy mark and gc batch API
- netfilter: nf_tables: don't fail inserts if duplicate has expired
- netfilter: nf_tables: fix kdoc warnings after gc rework
- netfilter: nf_tables: fix GC transaction races with netns and netlink event
exit path
- netfilter: nf_tables: GC transaction race with netns dismantle
- netfilter: nf_tables: GC transaction race with abort path
- netfilter: nf_tables: use correct lock to protect gc_list
- netfilter: nf_tables: defer gc run if previous batch is still pending
- netfilter: nft_dynset: disallow object maps
- netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
* CVE-2023-42756
- netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP
* CVE-2023-42753
- netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for
ip_set_hash_netportnet.c
* CVE-2023-5197
- netfilter: nf_tables: skip bound chain in netns release path
- netfilter: nf_tables: disallow rule removal from chain binding
* CVE-2023-4881
- netfilter: nftables: exthdr: fix 4-byte stack OOB write
-- Agathe Porte <email address hidden> Mon, 16 Oct 2023 12:13:29 +0200
|
Source diff to previous version |
1786013 |
Packaging resync |
CVE-2023-42755 |
wild pointer access in rsvp classifer in the Linux kernel |
CVE-2023-42752 |
integer overflows in kmalloc_reserve() |
CVE-2023-42756 |
A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic |
CVE-2023-42753 |
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->n |
CVE-2023-4881 |
** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team. |
|
linux-gcp-5.15 (5.15.0-1044.52~20.04.1) focal; urgency=medium
* focal/linux-gcp-5.15: 5.15.0-1044.52~20.04.1 -proposed tracker
(LP: #2036540)
[ Ubuntu: 5.15.0-1044.52 ]
* jammy/linux-gcp: 5.15.0-1044.52 -proposed tracker (LP: #2036541)
* Avoid address overwrite in kernel_connect (LP: #2035163)
- net: Avoid address overwrite in kernel_connect
* Fix requested for SEV live-migration (LP: #2034894)
- x86/sev: Make enc_dec_hypercall() accept a size instead of npages
* jammy/linux: 5.15.0-86.96 -proposed tracker (LP: #2036575)
* 5.15.0-85 live migration regression (LP: #2036675)
- Revert "KVM: x86: Always enable legacy FP/SSE in allowed user XFEATURES"
- Revert "x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0"
* Regression for ubuntu_bpf test build on Jammy 5.15.0-85.95 (LP: #2035181)
- selftests/bpf: fix static assert compilation issue for test_cls_*.c
* `refcount_t: underflow; use-after-free.` on hidon w/ 5.15.0-85-generic
(LP: #2034447)
- crypto: rsa-pkcs1pad - Use helper to set reqsize
-- John Cabaj <email address hidden> Wed, 20 Sep 2023 11:00:36 -0500
|
Source diff to previous version |
2035163 |
Avoid address overwrite in kernel_connect |
2034894 |
Fix requested for SEV live-migration |
2036675 |
5.15.0-85 live migration regression |
2035181 |
Regression for ubuntu_bpf test build on Jammy 5.15.0-85.95 |
2034447 |
`refcount_t: underflow; use-after-free.` on hidon w/ 5.15.0-85-generic |
|
linux-gcp-5.15 (5.15.0-1042.50~20.04.1) focal; urgency=medium
* focal/linux-gcp-5.15: 5.15.0-1042.50~20.04.1 -proposed tracker
(LP: #2034169)
[ Ubuntu: 5.15.0-1042.50 ]
* jammy/linux-gcp: 5.15.0-1042.50 -proposed tracker (LP: #2034170)
* jammy/linux: 5.15.0-84.93 -proposed tracker (LP: #2034202)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
* CVE-2023-4569
- netfilter: nf_tables: deactivate catchall elements in next generation
* CVE-2023-40283
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb
* CVE-2023-20588
- x86/bugs: Increase the x86 bugs vector size to two u32s
- x86/CPU/AMD: Do not leak quotient data after a division by 0
- x86/CPU/AMD: Fix the DIV(0) initial fix attempt
* CVE-2023-4128
- net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-
free
- net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-
free
- net/sched: cls_route: No longer copy tcf_result on update to avoid use-
after-free
-- Khalid Elmously <email address hidden> Fri, 08 Sep 2023 06:11:12 -0400
|
Source diff to previous version |
1786013 |
Packaging resync |
CVE-2023-4569 |
A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to |
CVE-2023-40283 |
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the |
CVE-2023-4128 |
A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local a |
|
linux-gcp-5.15 (5.15.0-1041.49~20.04.1) focal; urgency=medium
* focal/linux-gcp-5.15: 5.15.0-1041.49~20.04.1 -proposed tracker
(LP: #2030390)
[ Ubuntu: 5.15.0-1041.49 ]
* jammy/linux-gcp: 5.15.0-1041.49 -proposed tracker (LP: #2030391)
* jammy/linux: 5.15.0-83.92 -proposed tracker (LP: #2031132)
* libgnutls report "trap invalid opcode" when trying to install packages over
https (LP: #2031093)
- [Config]: disable CONFIG_GDS_FORCE_MITIGATION
* jammy/linux: 5.15.0-81.90 -proposed tracker (LP: #2030422)
* Packaging resync (LP: #1786013)
- [Packaging] resync update-dkms-versions helper
- [Packaging] resync getabis
- debian/dkms-versions -- update from kernel-versions (main/2023.08.07)
* CVE-2022-40982
- x86/mm: Initialize text poking earlier
- x86/mm: fix poking_init() for Xen PV guests
- x86/mm: Use mm_alloc() in poking_init()
- mm: Move mm_cachep initialization to mm_init()
- init: Provide arch_cpu_finalize_init()
- x86/cpu: Switch to arch_cpu_finalize_init()
- ARM: cpu: Switch to arch_cpu_finalize_init()
- sparc/cpu: Switch to arch_cpu_finalize_init()
- um/cpu: Switch to arch_cpu_finalize_init()
- init: Remove check_bugs() leftovers
- init: Invoke arch_cpu_finalize_init() earlier
- init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init()
- x86/init: Initialize signal frame size late
- x86/fpu: Remove cpuinfo argument from init functions
- x86/fpu: Mark init functions __init
- x86/fpu: Move FPU initialization into arch_cpu_finalize_init()
- x86/xen: Fix secondary processors' FPU initialization
- x86/speculation: Add Gather Data Sampling mitigation
- x86/speculation: Add force option to GDS mitigation
- x86/speculation: Add Kconfig option for GDS
- KVM: Add GDS_NO support to KVM
- Documentation/x86: Fix backwards on/off logic about YMM support
- [Config]: Enable CONFIG_ARCH_HAS_CPU_FINALIZE_INIT and
CONFIG_GDS_FORCE_MITIGATION
* CVE-2023-3609
- net/sched: cls_u32: Fix reference counter leak leading to overflow
* CVE-2023-21400
- io_uring: ensure IOPOLL locks around deferred work
* CVE-2023-4015
- netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound
set/chain
- netfilter: nf_tables: unbind non-anonymous set if rule construction fails
- netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
* CVE-2023-3995
- netfilter: nf_tables: disallow rule addition to bound chain via
NFTA_RULE_CHAIN_ID
* CVE-2023-3777
- netfilter: nf_tables: skip bound chain on rule flush
* losetup with mknod fails on jammy with kernel 5.15.0-69-generic
(LP: #2015400)
- loop: do not enforce max_loop hard limit by (new) default
* Include the MAC address pass through function on RTL8153DD-CG (LP: #2020295)
- r8152: add USB device driver for config selection
* Jammy update: v5.15.116 upstream stable release (LP: #2029401)
- RDMA/bnxt_re: Fix the page_size used during the MR creation
- RDMA/efa: Fix unsupported page sizes in device
- RDMA/hns: Fix base address table allocation
- RDMA/hns: Modify the value of long message loopback slice
- dmaengine: at_xdmac: Move the free desc to the tail of the desc list
- dmaengine: at_xdmac: fix potential Oops in at_xdmac_prep_interleaved()
- RDMA/bnxt_re: Fix a possible memory leak
- RDMA/bnxt_re: Fix return value of bnxt_re_process_raw_qp_pkt_rx
- iommu/rockchip: Fix unwind goto issue
- iommu/amd: Don't block updates to GATag if guest mode is on
- dmaengine: pl330: rename _start to prevent build error
- riscv: Fix unused variable warning when BUILTIN_DTB is set
- net/mlx5: fw_tracer, Fix event handling
- net/mlx5e: Don't attach netdev profile while handling internal error
- net: mellanox: mlxbf_gige: Fix skb_panic splat under memory pressure
- netrom: fix info-leak in nr_write_internal()
- af_packet: Fix data-races of pkt_sk(sk)->num.
- amd-xgbe: fix the false linkup in xgbe_phy_status
- mtd: rawnand: ingenic: fix empty stub helper definitions
- RDMA/irdma: Add SW mechanism to generate completions on error
- RDMA/irdma: Prevent QP use after free
- RDMA/irdma: Fix Local Invalidate fencing
- af_packet: do not use READ_ONCE() in packet_bind()
- tcp: deny tcp_disconnect() when threads are waiting
- tcp: Return user_mss for TCP_MAXSEG in CLOSE/LISTEN state if user_mss set
- net/sched: sch_ingress: Only create under TC_H_INGRESS
- net/sched: sch_clsact: Only create under TC_H_CLSACT
- net/sched: Reserve TC_H_INGRESS (TC_H_CLSACT) for ingress (clsact) Qdiscs
- net/sched: Prohibit regrafting ingress or clsact Qdiscs
- net: sched: fix NULL pointer dereference in mq_attach
- net/netlink: fix NETLINK_LIST_MEMBERSHIPS length report
- udp6: Fix race condition in udp6_sendmsg & connect
- net/mlx5e: Fix error handling in mlx5e_refresh_tirs
- net/mlx5: Read embedded cpu after init bit cleared
- net: dsa: mv88e6xxx: Increase wait after reset deactivation
- mtd: rawnand: marvell: ensure timing values are written
- mtd: rawnand: marvell: don't set the NAND frequency select
- rtnetlink: call validate_linkmsg in rtnl_create_link
- drm/amdgpu: release gpu full access after "amdgpu_device_ip_late_init"
- watchdog: menz069_wdt: fix watchdog initialisation
- ALSA: hda: Glenfly: add HD Audio PCI IDs and HDMI Codec Vendor IDs.
- drm/amdgpu: Use the default reset when loading or reloading the driver
- mailbox: mailbox-test: Fix potential double-free in
mbox_test_message_write()
- drm/ast: Fix ARM compatibility
- btrfs: abort transaction when sibling keys check fails for leaves
- ARM: 9295/1: unwind:fix unwind abort for uleb128 case
- media: rcar-vin: Select correct interrupt mode for V4L2_FIELD_ALTERNATE
- platform/x86: intel_scu_pcidrv: Add back PCI ID for Medfield
- g
|
2031093 |
libgnutls report \ |
1786013 |
Packaging resync |
2015400 |
losetup with mknod fails on jammy with kernel 5.15.0-69-generic |
2029401 |
Jammy update: v5.15.116 upstream stable release |
2028550 |
Backport support to tolerate ZSTD compressed firmware files |
2016398 |
stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?) |
2026028 |
usbrtl sometimes doesn't reload firmware |
2029138 |
cifs: fix mid leak during reconnection after timeout threshold |
2028799 |
Jammy update: v5.15.115 upstream stable release |
2028701 |
Jammy update: v5.15.114 upstream stable release |
2028408 |
Jammy update: v5.15.113 upstream stable release |
2026607 |
Jammy update: v5.15.112 upstream stable release |
CVE-2022-40982 |
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may al |
CVE-2023-4015 |
netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR |
CVE-2023-3995 |
** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is a duplicate of CVE-2023-4147. |
CVE-2023-3777 |
netfilter: nf_tables: skip bound chain on rule flush |
CVE-2023-20593 |
An issue in \u201cZen 2\u201d CPUs, under specific microarchitectural ... |
CVE-2023-4004 |
A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a |
CVE-2023-2898 |
There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user t |
CVE-2023-31084 |
An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNI |
|
About
-
Send Feedback to @ubuntu_updates