tag:www.ubuntuupdates.org,2010-02-06:/bugsUbuntu Bugs & Vulnerabilities2024-03-28T19:36:07Ztag:www.ubuntuupdates.org,2010-02-06:Bug/859792024-03-28T19:36:07Z2024-03-28T19:36:07ZLaunchpad: Focal update: v5.4.269 upstream stable release<a href='https://bugs.launchpad.net/bugs/2058948'>2058948</a><br/>Launchpad<br/>Focal update: v5.4.269 upstream stable release<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859782024-03-28T18:36:24Z2024-03-28T18:36:24ZCVE: Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-<a href='https://security-tracker.debian.org/tracker/CVE-2023-24023'>CVE-2023-24023</a><br/>CVE<br/>Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859772024-03-28T18:36:23Z2024-03-28T18:36:23ZLaunchpad: KVM: arm64: softlockups in stage2_apply_range<a href='https://bugs.launchpad.net/bugs/2056227'>2056227</a><br/>Launchpad<br/>KVM: arm64: softlockups in stage2_apply_range<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859762024-03-28T18:36:22Z2024-03-28T18:36:22ZLaunchpad: Jammy update: v5.15.149 upstream stable release<a href='https://bugs.launchpad.net/bugs/2059014'>2059014</a><br/>Launchpad<br/>Jammy update: v5.15.149 upstream stable release<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859752024-03-28T18:36:21Z2024-03-28T18:36:21ZLaunchpad: [ICX] [SPR] [ipc/msg] performance: Mitigate the lock contention with percpu counter<a href='https://bugs.launchpad.net/bugs/2058485'>2058485</a><br/>Launchpad<br/> [ICX] [SPR] [ipc/msg] performance: Mitigate the lock contention with percpu counter<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859742024-03-28T18:36:19Z2024-03-28T18:36:19ZCVE: In the Linux kernel, the following vulnerability has been resolved: bpf: Fix re-attachment branch in bpf_tracing_prog_attach The following case can<a href='https://security-tracker.debian.org/tracker/CVE-2024-26591'>CVE-2024-26591</a><br/>CVE<br/>In the Linux kernel, the following vulnerability has been resolved: bpf: Fix re-attachment branch in bpf_tracing_prog_attach The following case can<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859732024-03-28T18:36:19Z2024-03-28T18:36:19ZCVE: In the Linux kernel, the following vulnerability has been resolved: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS For PTR_TO_FLOW_KEYS, check<a href='https://security-tracker.debian.org/tracker/CVE-2024-26589'>CVE-2024-26589</a><br/>CVE<br/>In the Linux kernel, the following vulnerability has been resolved: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS For PTR_TO_FLOW_KEYS, check<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859722024-03-28T18:36:18Z2024-03-28T18:36:18ZCVE: In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on <a href='https://security-tracker.debian.org/tracker/CVE-2024-26581'>CVE-2024-26581</a><br/>CVE<br/>In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip end interval element from gc rbtree lazy gc on <br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859712024-03-28T18:36:18Z2024-03-28T18:36:18ZCVE: In the Linux kernel, the following vulnerability has been resolved: jfs: fix uaf in jfs_evict_inode When the execution of diMount(ipimap) fails, th<a href='https://security-tracker.debian.org/tracker/CVE-2023-52600'>CVE-2023-52600</a><br/>CVE<br/>In the Linux kernel, the following vulnerability has been resolved: jfs: fix uaf in jfs_evict_inode When the execution of diMount(ipimap) fails, th<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859702024-03-28T18:36:18Z2024-03-28T18:36:18ZCVE: In the Linux kernel, the following vulnerability has been resolved: tls: fix race between async notify and socket close The submitting thread (one <a href='https://security-tracker.debian.org/tracker/CVE-2024-26583'>CVE-2024-26583</a><br/>CVE<br/>In the Linux kernel, the following vulnerability has been resolved: tls: fix race between async notify and socket close The submitting thread (one <br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859692024-03-28T18:36:18Z2024-03-28T18:36:18ZCVE: In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous<a href='https://security-tracker.debian.org/tracker/CVE-2024-26585'>CVE-2024-26585</a><br/>CVE<br/>In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859682024-03-28T18:36:18Z2024-03-28T18:36:18ZCVE: In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests Since we're setting the CRYPTO_<a href='https://security-tracker.debian.org/tracker/CVE-2024-26584'>CVE-2024-26584</a><br/>CVE<br/>In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests Since we're setting the CRYPTO_<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859672024-03-28T18:36:18Z2024-03-28T18:36:18ZCVE: In the Linux kernel, the following vulnerability has been resolved: net: tls: fix use-after-free with partial reads and async decrypt tls_decrypt_s<a href='https://security-tracker.debian.org/tracker/CVE-2024-26582'>CVE-2024-26582</a><br/>CVE<br/>In the Linux kernel, the following vulnerability has been resolved: net: tls: fix use-after-free with partial reads and async decrypt tls_decrypt_s<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859662024-03-28T18:36:17Z2024-03-28T18:36:17ZCVE: In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the followin<a href='https://security-tracker.debian.org/tracker/CVE-2023-52603'>CVE-2023-52603</a><br/>CVE<br/>In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the followin<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859652024-03-28T18:36:17Z2024-03-28T18:36:17ZLaunchpad: Mantic update: upstream stable patchset 2024-03-07<a href='https://bugs.launchpad.net/bugs/2056403'>2056403</a><br/>Launchpad<br/>Mantic update: upstream stable patchset 2024-03-07<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859642024-03-28T18:36:16Z2024-03-28T18:36:16ZLaunchpad: Dynamically determine acpi_handle_list size<a href='https://bugs.launchpad.net/bugs/2049733'>2049733</a><br/>Launchpad<br/>Dynamically determine acpi_handle_list size<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859632024-03-28T18:36:16Z2024-03-28T18:36:16ZLaunchpad: Mantic update: upstream stable patchset 2024-03-26<a href='https://bugs.launchpad.net/bugs/2059068'>2059068</a><br/>Launchpad<br/>Mantic update: upstream stable patchset 2024-03-26<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859622024-03-28T18:36:14Z2024-03-28T18:36:14ZLaunchpad: iwlwifi disconnect and crash - intel wifi7<a href='https://bugs.launchpad.net/bugs/2058808'>2058808</a><br/>Launchpad<br/>iwlwifi disconnect and crash - intel wifi7<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859612024-03-28T18:36:13Z2024-03-28T18:36:13ZLaunchpad: Mantic update: upstream stable patchset 2024-03-27<a href='https://bugs.launchpad.net/bugs/2059284'>2059284</a><br/>Launchpad<br/>Mantic update: upstream stable patchset 2024-03-27<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetamtag:www.ubuntuupdates.org,2010-02-06:Bug/859602024-03-28T18:36:12Z2024-03-28T18:36:12ZLaunchpad: Remove getabis scripts<a href='https://bugs.launchpad.net/bugs/2059143'>2059143</a><br/>Launchpad<br/>Remove getabis scripts<br/>Full list of bugs: <a href="/bugs">https://www.ubuntuupdates.org/bugs</a>Bikethetam