代码拉取完成,页面将自动刷新
1627
release 4.19.90-2406.2.0
已合并
1TASK
4.19.90-2406.1.0~1...4.19.90-2406.2.0
TASK | COMMIT |
---|---|
bugzilla: #I9TMCC:CVE-2024-36883 | c73bf4eb88fa net: fix out-of-bounds access in ops_init |
bugzilla: #I9RK78:CVE-2023-52865 | c56590427da0 clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data |
bugzilla: #I9Q91J:CVE-2024-35809 | bb61a9fa13a7 PCI/PM: Drain runtime-idle callbacks before driver removal |
bugzilla: #I9UNVB:CVE-2024-36964 | c0b1c50dcc97 fs/9p: only translate RWX permissions for plain 9P2000 |
bugzilla: #I9U211:CVE-2024-36924 | d7baf9e3694a scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() |
bugzilla: #I9RKXC:CVE-2021-47315 | f1ebe5070cee memory: fsl_ifc: fix leak of IO mapping on probe failure |
bugzilla: #I9R4CY:CVE-2021-47344 | a49b69b65bcf media: zr364xx: fix memory leak in zr364xx_start_readpipe |
bugzilla: #I9R4N9:CVE-2023-52708 | 0551b3d1b0a9 mmc: mmc_spi: fix error handling in mmc_spi_probe() |
bugzilla: #I9RCV5:CVE-2021-47479 | 2beb66b8d01d staging: rtl8712: fix use-after-free in rtl8712_dl_fw |
bugzilla: #I9U8MH:CVE-2024-36933 | 30f3c2c9d428 nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment(). |
bugzilla: #I9ROH3:CVE-2021-47324 | fdff0e351e62 watchdog: Fix possible use-after-free in wdt_startup() |
bugzilla: #I9S23J:CVE-2021-47518 | 1691157c5119 nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done |
bugzilla: #I9S202:CVE-2021-47543 | 83bfd26d119a perf report: Fix memory leaks around perf_tip() |
bugzilla: #I9US4T:CVE-2024-36954 | b393f02162dd tipc: fix a possible memleak in tipc_buf_append |
bugzilla: #I9TM8A:CVE-2024-36902 | 90fca2d1b9e1 ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() |
bugzilla: #I9R4JQ:CVE-2021-47294 | 66fe83caf9bc netrom: Fix use-after-free of a listening socket. b815f0f3b926 netrom: Decrease sock refcount when sock timers expire |
bugzilla: #I9QG0F:CVE-2024-35888 | 4d50a113305d erspan: make sure erspan_base_hdr is present in skb->head |
bugzilla: #I9QG5Z:CVE-2024-35910 | 6803d0847d02 tcp: properly terminate timers for kernel sockets c2fc6443b647 mptcp: add sk_stop_timer_sync helper |
bugzilla: #I9RC18:CVE-2021-47460 | c9149852b9f0 ocfs2: fix data corruption after conversion from inline format |
bugzilla: #I9U4LA:CVE-2024-36904 | d5548025b110 tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). |
bugzilla: #I9UAZH:CVE-2024-36903 | 230b889ae948 ipv6: Fix potential uninit-value access in __ip6_make_skb() |
bugzilla: #I9VPMT:unthrottle_cfs_rq 死锁 | e2754113c90c sched: remove WARN_ON on checking rq->tmp_alone_branch |
bugzilla: #I9S211:CVE-2021-47520 | 3b1e9e9edc67 can: pch_can: pch_can_rx_normal: fix use after free |
bugzilla: #I9S282:CVE-2021-47547 | a72e75abd032 net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound |
bugzilla: #I9R4N0:CVE-2023-52754 | 5de3f53532d2 media: imon: fix access to invalid resource for the second interface |
bugzilla: #I9RD9Z:CVE-2021-47483 | bd11f92ccab5 regmap: Fix possible double-free in regcache_rbtree_exit() |
bugzilla: #I9RC2J:CVE-2021-47468 | 518314bf6269 isdn: mISDN: Fix sleeping function called from invalid context |
bugzilla: #I9RFRD:CVE-2023-52855 | b98dfd2c9a01 usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency |
bugzilla: #I9R4KZ:CVE-2023-52705 | 7a1753f28948 nilfs2: fix underflow in second superblock position calculations |
bugzilla: #I9TLS8:CVE-2024-36017 | 2c0cb8063f06 rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation |
bugzilla: #I9RQ71:CVE-2021-47329 | b0a166e995b3 scsi: megaraid_sas: Fix resource leak in case of probe failure |
bugzilla: #I9QG86:CVE-2024-35896 | 953d8f7dddfb netfilter: complete validation of user input a35b8a4232e2 netfilter: validate user input for expected length |
bugzilla: #I9RFGY:CVE-2023-52803 | 14684af9a415 SUNRPC: Fix RPC client cleaned up the freed pipefs dentries |
bugzilla: #I9S257:CVE-2021-47544 | ff3f2c8f2cbe tcp: fix page frag corruption on page fault |
bugzilla: #I9RD2M:CVE-2021-47478 | a94a92495d42 isofs: Fix out of bound access for corrupted isofs image |
bugzilla: #I9Q9IH:CVE-2023-52686 | d96c8a62cb42 powerpc/powernv: Add a null pointer check in opal_event_init() |
bugzilla: #I9R4CX:CVE-2021-47254 | 563ba93f65ca gfs2: Fix use-after-free in gfs2_glock_shrink_scan |
bugzilla: #I9R0VC:【openEuler-1.0-LTS】在arm64架构下,模块中bug_table最后一项bug_entry结构体未对齐,导致模块代码中对应的warn_on生效时触发复位 | e44716ed4262 arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY |
bugzilla: #I9S1ZN:CVE-2021-47541 | e25fe30aa524 net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() |
bugzilla: #I9R4D9:CVE-2021-47358 | 9dcb9058522c staging: greybus: uart: fix tty use after free |
bugzilla: #I9TMCJ:CVE-2024-36029 | c45c6070f830 mmc: sdhci-msm: pervent access to suspended controller |
bugzilla: #I9S240:CVE-2021-47542 | 84bee6996083 net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() |
bugzilla: #I9S23H:CVE-2021-47538 | 5cbfb7faf8db rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() |
bugzilla: #I9R4OY:CVE-2021-47409 | 71c08c4d2dd3 usb: dwc2: Fix memory leak in dwc2_hcd_init b4a087e9cbad usb: dwc2: check return value after calling platform_get_resource() |
bugzilla: #I9R4M5:CVE-2023-52753 | 55116d5a60c9 drm/amd/display: Avoid NULL dereference of timing generator |
bugzilla: #I9R4KN:CVE-2023-52756 | 8714cf7eba08 pwm: Fix double shift bug |
bugzilla: #I9R4ON:CVE-2021-47424 | b3c07e8a44b1 i40e: Fix freeing of uninitialized misc IRQ vector |
bugzilla: #I9RD2V:CVE-2021-47476 | 7e51492b627b comedi: ni_usb6501: fix NULL-deref in command paths |
bugzilla: #I9QRRJ:CVE-2024-35984 | 8bf4d890ec2a i2c: smbus: fix NULL function pointer dereference |
bugzilla: #I9S27Y:CVE-2021-47499 | fe1bfd090576 iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove |
bugzilla: #I9RFHT:CVE-2023-52864 | 60e56403f886 platform/x86: wmi: Fix opening of char device |
bugzilla: #I9R4KR:CVE-2023-52774 | 9df9a6184df4 s390/dasd: protect device queue against concurrent access |
bugzilla: #I9S270:CVE-2021-47511 | 9bda37281f84 ALSA: pcm: oss: Fix negative period/buffer sizes 92b63ec42397 ALSA: pcm: oss: Fix a few more UBSAN fixes |
bugzilla: #I9R4NR:CVE-2021-47403 | 9a4e83474b66 ipack: ipoctal: fix module reference leak |
bugzilla: #I9RUUX:CVE-2021-47336 | 8311a66154a6 smackfs: restrict bytes count in smk_set_cipso() |
bugzilla: #I9R4M7:CVE-2023-52764 | 0d56cc93ad4c media: gspca: cpia1: shift-out-of-bounds in set_flicker |
bugzilla: #I9RBFB:CVE-2021-47456 | b60113db2913 can: peak_pci: peak_pci_remove(): fix UAF |
bugzilla: #I9R4AY:CVE-2021-47354 | 7f4de8b8a15c drm/sched: Avoid data corruptions |
bugzilla: #I9R4FF:CVE-2021-47236 | 66a744b0fd54 net: cdc_eem: fix tx fixup skb leak |
bugzilla: #I9Q8LN:CVE-2024-27413 | 0c465fce3d94 efi/capsule-loader: fix incorrect allocation size |
bugzilla: #I9RFK0:CVE-2023-52871 | 7317e858c7ed soc: qcom: llcc: Handle a second device without data corruption |