1TASK


4.19.90-2406.1.0~1...4.19.90-2406.2.0


TASK COMMIT
bugzilla: #I9TMCC:CVE-2024-36883 c73bf4eb88fa net: fix out-of-bounds access in ops_init
bugzilla: #I9RK78:CVE-2023-52865 c56590427da0 clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data
bugzilla: #I9Q91J:CVE-2024-35809 bb61a9fa13a7 PCI/PM: Drain runtime-idle callbacks before driver removal
bugzilla: #I9UNVB:CVE-2024-36964 c0b1c50dcc97 fs/9p: only translate RWX permissions for plain 9P2000
bugzilla: #I9U211:CVE-2024-36924 d7baf9e3694a scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
bugzilla: #I9RKXC:CVE-2021-47315 f1ebe5070cee memory: fsl_ifc: fix leak of IO mapping on probe failure
bugzilla: #I9R4CY:CVE-2021-47344 a49b69b65bcf media: zr364xx: fix memory leak in zr364xx_start_readpipe
bugzilla: #I9R4N9:CVE-2023-52708 0551b3d1b0a9 mmc: mmc_spi: fix error handling in mmc_spi_probe()
bugzilla: #I9RCV5:CVE-2021-47479 2beb66b8d01d staging: rtl8712: fix use-after-free in rtl8712_dl_fw
bugzilla: #I9U8MH:CVE-2024-36933 30f3c2c9d428 nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
bugzilla: #I9ROH3:CVE-2021-47324 fdff0e351e62 watchdog: Fix possible use-after-free in wdt_startup()
bugzilla: #I9S23J:CVE-2021-47518 1691157c5119 nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
bugzilla: #I9S202:CVE-2021-47543 83bfd26d119a perf report: Fix memory leaks around perf_tip()
bugzilla: #I9US4T:CVE-2024-36954 b393f02162dd tipc: fix a possible memleak in tipc_buf_append
bugzilla: #I9TM8A:CVE-2024-36902 90fca2d1b9e1 ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
bugzilla: #I9R4JQ:CVE-2021-47294 66fe83caf9bc netrom: Fix use-after-free of a listening socket.
b815f0f3b926 netrom: Decrease sock refcount when sock timers expire
bugzilla: #I9QG0F:CVE-2024-35888 4d50a113305d erspan: make sure erspan_base_hdr is present in skb->head
bugzilla: #I9QG5Z:CVE-2024-35910 6803d0847d02 tcp: properly terminate timers for kernel sockets
c2fc6443b647 mptcp: add sk_stop_timer_sync helper
bugzilla: #I9RC18:CVE-2021-47460 c9149852b9f0 ocfs2: fix data corruption after conversion from inline format
bugzilla: #I9U4LA:CVE-2024-36904 d5548025b110 tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().
bugzilla: #I9UAZH:CVE-2024-36903 230b889ae948 ipv6: Fix potential uninit-value access in __ip6_make_skb()
bugzilla: #I9VPMT:unthrottle_cfs_rq 死锁 e2754113c90c sched: remove WARN_ON on checking rq->tmp_alone_branch
bugzilla: #I9S211:CVE-2021-47520 3b1e9e9edc67 can: pch_can: pch_can_rx_normal: fix use after free
bugzilla: #I9S282:CVE-2021-47547 a72e75abd032 net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
bugzilla: #I9R4N0:CVE-2023-52754 5de3f53532d2 media: imon: fix access to invalid resource for the second interface
bugzilla: #I9RD9Z:CVE-2021-47483 bd11f92ccab5 regmap: Fix possible double-free in regcache_rbtree_exit()
bugzilla: #I9RC2J:CVE-2021-47468 518314bf6269 isdn: mISDN: Fix sleeping function called from invalid context
bugzilla: #I9RFRD:CVE-2023-52855 b98dfd2c9a01 usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency
bugzilla: #I9R4KZ:CVE-2023-52705 7a1753f28948 nilfs2: fix underflow in second superblock position calculations
bugzilla: #I9TLS8:CVE-2024-36017 2c0cb8063f06 rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
bugzilla: #I9RQ71:CVE-2021-47329 b0a166e995b3 scsi: megaraid_sas: Fix resource leak in case of probe failure
bugzilla: #I9QG86:CVE-2024-35896 953d8f7dddfb netfilter: complete validation of user input
a35b8a4232e2 netfilter: validate user input for expected length
bugzilla: #I9RFGY:CVE-2023-52803 14684af9a415 SUNRPC: Fix RPC client cleaned up the freed pipefs dentries
bugzilla: #I9S257:CVE-2021-47544 ff3f2c8f2cbe tcp: fix page frag corruption on page fault
bugzilla: #I9RD2M:CVE-2021-47478 a94a92495d42 isofs: Fix out of bound access for corrupted isofs image
bugzilla: #I9Q9IH:CVE-2023-52686 d96c8a62cb42 powerpc/powernv: Add a null pointer check in opal_event_init()
bugzilla: #I9R4CX:CVE-2021-47254 563ba93f65ca gfs2: Fix use-after-free in gfs2_glock_shrink_scan
bugzilla: #I9R0VC:【openEuler-1.0-LTS】在arm64架构下,模块中bug_table最后一项bug_entry结构体未对齐,导致模块代码中对应的warn_on生效时触发复位 e44716ed4262 arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY
bugzilla: #I9S1ZN:CVE-2021-47541 e25fe30aa524 net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
bugzilla: #I9R4D9:CVE-2021-47358 9dcb9058522c staging: greybus: uart: fix tty use after free
bugzilla: #I9TMCJ:CVE-2024-36029 c45c6070f830 mmc: sdhci-msm: pervent access to suspended controller
bugzilla: #I9S240:CVE-2021-47542 84bee6996083 net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
bugzilla: #I9S23H:CVE-2021-47538 5cbfb7faf8db rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
bugzilla: #I9R4OY:CVE-2021-47409 71c08c4d2dd3 usb: dwc2: Fix memory leak in dwc2_hcd_init
b4a087e9cbad usb: dwc2: check return value after calling platform_get_resource()
bugzilla: #I9R4M5:CVE-2023-52753 55116d5a60c9 drm/amd/display: Avoid NULL dereference of timing generator
bugzilla: #I9R4KN:CVE-2023-52756 8714cf7eba08 pwm: Fix double shift bug
bugzilla: #I9R4ON:CVE-2021-47424 b3c07e8a44b1 i40e: Fix freeing of uninitialized misc IRQ vector
bugzilla: #I9RD2V:CVE-2021-47476 7e51492b627b comedi: ni_usb6501: fix NULL-deref in command paths
bugzilla: #I9QRRJ:CVE-2024-35984 8bf4d890ec2a i2c: smbus: fix NULL function pointer dereference
bugzilla: #I9S27Y:CVE-2021-47499 fe1bfd090576 iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
bugzilla: #I9RFHT:CVE-2023-52864 60e56403f886 platform/x86: wmi: Fix opening of char device
bugzilla: #I9R4KR:CVE-2023-52774 9df9a6184df4 s390/dasd: protect device queue against concurrent access
bugzilla: #I9S270:CVE-2021-47511 9bda37281f84 ALSA: pcm: oss: Fix negative period/buffer sizes
92b63ec42397 ALSA: pcm: oss: Fix a few more UBSAN fixes
bugzilla: #I9R4NR:CVE-2021-47403 9a4e83474b66 ipack: ipoctal: fix module reference leak
bugzilla: #I9RUUX:CVE-2021-47336 8311a66154a6 smackfs: restrict bytes count in smk_set_cipso()
bugzilla: #I9R4M7:CVE-2023-52764 0d56cc93ad4c media: gspca: cpia1: shift-out-of-bounds in set_flicker
bugzilla: #I9RBFB:CVE-2021-47456 b60113db2913 can: peak_pci: peak_pci_remove(): fix UAF
bugzilla: #I9R4AY:CVE-2021-47354 7f4de8b8a15c drm/sched: Avoid data corruptions
bugzilla: #I9R4FF:CVE-2021-47236 66a744b0fd54 net: cdc_eem: fix tx fixup skb leak
bugzilla: #I9Q8LN:CVE-2024-27413 0c465fce3d94 efi/capsule-loader: fix incorrect allocation size
bugzilla: #I9RFK0:CVE-2023-52871 7317e858c7ed soc: qcom: llcc: Handle a second device without data corruption

2CVE


CVE issue
CVE-2021-47236 #I9R4FF:CVE-2021-47236
CVE-2021-47254 #I9R4CX:CVE-2021-47254
CVE-2021-47294 #I9R4JQ:CVE-2021-47294
CVE-2021-47315 #I9RKXC:CVE-2021-47315
CVE-2021-47324 #I9ROH3:CVE-2021-47324
CVE-2021-47329 #I9RQ71:CVE-2021-47329
CVE-2021-47336 #I9RUUX:CVE-2021-47336
CVE-2021-47344 #I9R4CY:CVE-2021-47344
CVE-2021-47354 #I9R4AY:CVE-2021-47354
CVE-2021-47358 #I9R4D9:CVE-2021-47358
CVE-2021-47403 #I9R4NR:CVE-2021-47403
CVE-2021-47409 #I9R4OY:CVE-2021-47409
CVE-2021-47424 #I9R4ON:CVE-2021-47424
CVE-2021-47456 #I9RBFB:CVE-2021-47456
CVE-2021-47460 #I9RC18:CVE-2021-47460
CVE-2021-47468 #I9RC2J:CVE-2021-47468
CVE-2021-47476 #I9RD2V:CVE-2021-47476
CVE-2021-47478 #I9RD2M:CVE-2021-47478
CVE-2021-47479 #I9RCV5:CVE-2021-47479
CVE-2021-47483 #I9RD9Z:CVE-2021-47483
CVE-2021-47499 #I9S27Y:CVE-2021-47499
CVE-2021-47511 #I9S270:CVE-2021-47511
CVE-2021-47518 #I9S23J:CVE-2021-47518
CVE-2021-47520 #I9S211:CVE-2021-47520
CVE-2021-47538 #I9S23H:CVE-2021-47538
CVE-2021-47541 #I9S1ZN:CVE-2021-47541
CVE-2021-47542 #I9S240:CVE-2021-47542
CVE-2021-47543 #I9S202:CVE-2021-47543
CVE-2021-47544 #I9S257:CVE-2021-47544
CVE-2021-47547 #I9S282:CVE-2021-47547
CVE-2023-52686 #I9Q9IH:CVE-2023-52686
CVE-2023-52705 #I9R4KZ:CVE-2023-52705
CVE-2023-52708 #I9R4N9:CVE-2023-52708
CVE-2023-52753 #I9R4M5:CVE-2023-52753
CVE-2023-52754 #I9R4N0:CVE-2023-52754
CVE-2023-52756 #I9R4KN:CVE-2023-52756
CVE-2023-52764 #I9R4M7:CVE-2023-52764
CVE-2023-52774 #I9R4KR:CVE-2023-52774
CVE-2023-52803 #I9RFGY:CVE-2023-52803
CVE-2023-52855 #I9RFRD:CVE-2023-52855
CVE-2023-52864 #I9RFHT:CVE-2023-52864
CVE-2023-52865 #I9RK78:CVE-2023-52865
CVE-2023-52871 #I9RFK0:CVE-2023-52871
CVE-2024-27413 #I9Q8LN:CVE-2024-27413
CVE-2024-35809 #I9Q91J:CVE-2024-35809
CVE-2024-35888 #I9QG0F:CVE-2024-35888
CVE-2024-35896 #I9QG86:CVE-2024-35896
CVE-2024-35910 #I9QG5Z:CVE-2024-35910
CVE-2024-35984 #I9QRRJ:CVE-2024-35984
CVE-2024-36017 #I9TLS8:CVE-2024-36017
CVE-2024-36029 #I9TMCJ:CVE-2024-36029
CVE-2024-36883 #I9TMCC:CVE-2024-36883
CVE-2024-36902 #I9TM8A:CVE-2024-36902
CVE-2024-36903 #I9UAZH:CVE-2024-36903
CVE-2024-36904 #I9U4LA:CVE-2024-36904
CVE-2024-36924 #I9U211:CVE-2024-36924
CVE-2024-36933 #I9U8MH:CVE-2024-36933
CVE-2024-36954 #I9US4T:CVE-2024-36954
CVE-2024-36964 #I9UNVB:CVE-2024-36964