代码拉取完成,页面将自动刷新
1558
release 5.10.0-60.136.0
已合并
TASK | COMMIT |
---|---|
bugzilla: #I8TQCT:CVE-2023-6270 | b4c44578d99d aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts |
bugzilla: #I9HK1R:CVE-2024-26885 | 2d67f69c93a7 bpf: Fix DEVMAP_HASH overflow check on 32-bit arches |
bugzilla: #I9HK6X:CVE-2024-26884 | a5ff2c0986af bpf: Fix hashtab overflow check on 32-bit arches |
bugzilla: 189860 | 502aab9e9436 firmware: arm_scmi: Harden accesses to the reset domains |
bugzilla: #I9HKCB:CVE-2024-26883 | 290bd657ead1 bpf: Fix stackmap overflow check on 32-bit arches |
bugzilla: #I9MXH3:主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe() | 3d3b9d650223 kprobes: Fix check for probe enabled in kill_kprobe() |
bugzilla: #I9HJZO:CVE-2024-26882 | 6181a4e51a46 net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() |
bugzilla: #I9GE8D:CVE-2024-26817 | 7d5afe7c09af amdkfd: use calloc instead of kzalloc to avoid integer overflow |
bugzilla: #I9FNFQ:CVE-2021-47211 | 8c71bde1e466 ALSA: usb-audio: fix null pointer dereference on pointer cs_desc |
bugzilla: #I9HJU0:CVE-2024-26843 | 192ce6cc0603 efi: runtime: Fix potential overflow of soft-reserved region size |
bugzilla: #I9JPDJ:【OLK-5.10】4/5 月内存主线补丁回合 | deb461419eb3 mm/madvise: fix potential pte_unmap_unlock pte error 4631ea7575b3 mm/page_alloc: always attempt to allocate at least one page during bulk allocation |
bugzilla: #I9HJVQ:CVE-2024-26840 | d18219f7fe7a cachefiles: fix memory leak in cachefiles_add_cache() |
bugzilla: #I9HK5V:CVE-2024-26874 | aa856187a501 drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip |
bugzilla: 189820, #I9HKBT:CVE-2024-26900 | 8d3d5cbac440 md: fix kmemleak of rdev->serial |
bugzilla: #I9HK63:CVE-2024-26894 | 2bedd82baac2 ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() |
bugzilla: #I9HJVU:CVE-2023-52642 | eefd6b3e4889 media: rc: bpf attach/detach requires write permission |
bugzilla: #I9HJPD:CVE-2024-26839 | 4bc9d766adea IB/hfi1: Fix a memleak in init_credit_return |
bugzilla: #I9HK2H:CVE-2024-26855 | 244e4770b269 net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() |
bugzilla: #I9HK9F:CVE-2024-26893 | 702c8ac6a5b8 firmware: arm_scmi: Fix double free in SMC transport cleanup path |
bugzilla: #I91L79:CVE-2024-25739 | f6b802a752ab ubi: Check for too small LEB size in VTBL code |
bugzilla: #I9FNF8:CVE-2021-47212 | 3336abddd883 net/mlx5: Update error handler for UCTX and UMEM |
bugzilla: #I9HK1I:CVE-2024-26901 | a97b6aa927c3 do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak |
bugzilla: #I9HK8R:CVE-2024-26875 | 58d1e14b4ff9 media: pvrusb2: fix uaf in pvr2_context_set_notify |
bugzilla: #I9GVYW:【openEuler-22.03-LTS-SP4】Add hugetlb MADV_DONTNEED support | 16c568ff750a hugetlb: don't delete vma_lock in hugetlb MADV_DONTNEED processing 70a5f5fc718c madvise: use zap_page_range_single for madvise dontneed d9a0660366bc mm,madvise,hugetlb: fix unexpected data loss with MADV_DONTNEED on hugetlbfs e9f313f5bd0e mm: enable MADV_DONTNEED for hugetlb mappings |
bugzilla: #I9KHI4:CVE-2022-48655 | f7f5f741c4a683cbbff9476261a052e20f7cf3aa firmware: arm_scmi: Harden accesses to the reset domains |
bugzilla: #I9HJY0:CVE-2024-26898 | b54cd34c7ea136f56d4a3245dd8c0ce32fd0177e aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts |