代码拉取完成,页面将自动刷新
1700
release 5.10.0-136.88.0
已合并
TASK | COMMIT |
---|---|
bugzilla: #IAGEN5:CVE-2024-41027 | efeef0fc8c32 Fix userfaultfd_api to return EINVAL as expected 2153f4027b13 mm/userfaultfd: fail uffd-wp registration if not supported |
bugzilla: #IAGEP3:CVE-2024-42089 | 9bc13b598b0e ASoC: fsl-asoc-card: set priv->pdev before using it |
bugzilla: #IAGTJ2:CVE-2024-42124 | 7b8771e5d805 scsi: qedf: Make qedf_execute_tmf() non-preemptible |
bugzilla: #IAGEPB:CVE-2024-42093 | a156825cbe70 net/dpaa2: Avoid explicit cpumask var allocation on stack |
bugzilla: #IAH97R:CVE-2023-52888 | fff6bf4eb1ee media: mediatek: vcodec: Only free buffer VA that is not NULL |
bugzilla: #IAGS16:CVE-2024-42160 | f5de96f3877c f2fs: Add inline to f2fs_build_fault_attr() stub a746e7a6d50d f2fs: check validation of fault attrs in f2fs_build_fault_attr() |
bugzilla: #IAGEOW:CVE-2024-42084 | dbb071bac419 ftruncate: pass a signed offset |
bugzilla: #IAGRP3:CVE-2024-42161 | 27a3736e83d9 bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD |
bugzilla: #IAGS04:CVE-2024-42101 | 85ab853e7df8 drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes |
bugzilla: #IAGEMT:CVE-2024-41079 | 6ce9dccfe4c9 nvmet: always initialize cqe.result |
bugzilla: #IAGEP9:CVE-2024-42094 | 6f80f3d5652e net/iucv: Avoid explicit cpumask var allocation on stack |
bugzilla: #IACS4Z:CVE-2024-39497 | b36f0f358310 drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) |
bugzilla: #IAGRY7:CVE-2024-42162 | 6b7b80c74a3d gve: Account for stopped queues when reading NIC stats |
bugzilla: #IAGS4V:CVE-2024-42129 | 94d443bb54d6 leds: mlxreg: Use devm_mutex_init() for mutex initialization 6b45ef0adbc8 locking/mutex: Introduce devm_mutex_init() |
bugzilla: #IA6SGI:CVE-2024-38546 | 563dd008174d drm: vc4: Fix possible null pointer dereference |
bugzilla: #IAGEON:CVE-2024-41089 | 3a19e37d515b drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes |
bugzilla: #IACZYN:CVE-2024-40910 | ea0a4d8a7f71 ax25: Fix refcount imbalance on inbound connections |
bugzilla: #IAGENQ:CVE-2024-42077 | 6aa70547fb64 ocfs2: fix DIO failure due to insufficient transaction credits |
bugzilla: #IAGEP8:CVE-2024-42092 | f56c03223e4c gpio: davinci: Validate the obtained number of IRQs |
bugzilla: #IAGEOP:CVE-2024-42076 | 520758d1b1e6 net: can: j1939: Initialize unused data in j1939_send_one() 69e4ebd73e04 can: j1939: j1939_send_one(): fix missing CAN header initialization |
bugzilla: #IAGEK1:CVE-2024-41062 | c6afac9cf621 Bluetooth: L2CAP: Fix deadlock 217df4f96d42 bluetooth/l2cap: sync sock recv cb and release |
bugzilla: #IAG8UD:CVE-2024-41013 | 9eb4868ce0f1 xfs: don't walk off the end of a directory data block |
bugzilla: #IAGEKF:CVE-2024-41070 | 2f7deea6db16 KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() |
bugzilla: #IAGEN4:CVE-2024-41023 | 93a561f96f13 sched/deadline: Fix task_struct reference leak |
bugzilla: #IAG8QA:CVE-2024-41014 | 162b6971fd94 xfs: add bounds checking to xlog_recover_process_data |
bugzilla: #IAGEP4:CVE-2024-42090 | 867d18b8f25f pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER |
bugzilla: #IAGEOL:CVE-2024-41097 | 3423993bd87d usb: atm: cxacru: fix endpoint checking in cxacru_bind() |
bugzilla: #IAGPRU:CVE-2024-42106 | be00ff19f2ba inet_diag: Initialize pad field in struct inet_diag_req_v2 |
bugzilla: #IAGEOR:CVE-2024-42080 | 5489364c3ac3 RDMA/restrack: Fix potential invalid address access |
bugzilla: #IAGSOT:CVE-2024-42224 | 03eaf7943222 net: dsa: mv88e6xxx: Correct check for empty list |
bugzilla: #IAGTIZ:CVE-2024-42155 | e21e44fa86ea s390/pkey: Wipe copies of protected- and secure-keys |
bugzilla: #IAGSG3:CVE-2024-42105 | 036104fc9aed nilfs2: fix inode number range checks |
bugzilla: #IAGEN2:CVE-2024-41044 | f913ee2b70ac ppp: reject claimed-as-LCP but actually malformed packets |
bugzilla: #IAGELZ:CVE-2024-41072 | f903680a4da9 wifi: cfg80211: wext: add extra SIOCSIWSCAN data check |
bugzilla: #IAGSPA:CVE-2024-42145 | 5e5e9746ff26 IB/core: Implement a limit on UMAD receive List |
bugzilla: #IAGEM4:CVE-2024-41048 | 64d3f6f51857 skmsg: Skip zero length skb in sk_msg_recvmsg |
bugzilla: #IAGENG:CVE-2024-42082 | 2ee663a8e07e xdp: xdp_mem_allocator can be NULL in trace_mem_connect(). aa751f977a6e xdp: Remove WARN() from __xdp_reg_mem_model() eb8fdc3bd177 xdp: Allow registering memory model without rxq reference 5403073dfd04 xdp: Move the rxq_info.mem clearing to unreg_mem_model() |
bugzilla: #IAGEKE:CVE-2024-41046 | 3e606528a559 net: ethernet: lantiq_etop: fix double free in detach 36dd4847bd6a net: lantiq_etop: add blank line after declaration |
bugzilla: #IAGEMQ:CVE-2024-41081 | c037fde91c36 ila: block BH in ila_output() |
bugzilla: #IAH95F:CVE-2023-52887 | ef9d5cab3d9e net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new |
bugzilla: #IAGEF4:CVE-2024-41020 | d985fcea5d18 filelock: Fix fcntl/close race recovery compat path |
bugzilla: #IAG8ZG:CVE-2024-41090 | c8e7ff9b436f tap: add missing verification for short frame |
bugzilla: #IAD0KR:CVE-2024-40961 | e81a1e86c9d6 ipv6: prevent possible NULL deref in fib6_nh_init() |
bugzilla: #IAHA5K:【openEuler-22.03-LTS-SP1】backport serveral bugfixes for bpf from upstream | 9ef40511f410 bpf, events: Use prog to emit ksymbol event for main program 8f97cc1bd5bf bpf, perf: Use subprog name when reporting subprog ksymbol |
bugzilla: #IAGEOM:CVE-2024-42068 | ac14bb37df2e bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro() |
bugzilla: #IAHA5K:【openEuler-22.03-LTS-SP1】backport serveral bugfixes for bpf from upstream | 254c8a3cc27a bpf: ensure main program has an extable |
bugzilla: #IAGELJ:CVE-2024-41064 | c1c29fcb02b5 powerpc/eeh: avoid possible crash when edev->pdev changes |
bugzilla: #IAGEN8:CVE-2024-41063 | 17057a180cb2 Bluetooth: hci_core: cancel all works upon hci_unregister_dev() |
bugzilla: #IA7D3T:CVE-2024-38627 | f7514debd9bf stm class: Fix a double free in stm_register_device() |
bugzilla: #IAGEP7:CVE-2024-42097 | 99eaf13ab2fa ALSA: emux: improve patch ioctl data validation |
bugzilla: #IAD028:CVE-2024-40982 | ba20c92456f5 ssb: Fix potential NULL pointer dereference in ssb_device_uevent() |
bugzilla: #IAG8V2:CVE-2024-41091 | e20e6335efc1 tun: add missing verification for short frame |
bugzilla: #IA8AED:CVE-2024-39471 | 01b5efb37847 drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() 23696b51b8d7 drm/amdgpu: add error handle to avoid out-of-bounds |
bugzilla: #IAGEMW:CVE-2024-41077 | b31f91f701b7 null_blk: fix validation of block size |
bugzilla: #IAGS1R:CVE-2024-42115 | 02569076b23e jffs2: Fix potential illegal address access in jffs2_free_inode |
bugzilla: #IAGEK8:CVE-2024-41080 | bca1a8acce91 io_uring: fix possible deadlock in io_register_iowq_max_workers() |
bugzilla: #IAG8RW:CVE-2024-41019 | c9bcbf89613c fs/ntfs3: Validate ff offset |
bugzilla: #IAGEKL:CVE-2024-41041 | fd83a7b003de udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port(). |
bugzilla: #IAGSW7:CVE-2024-42228 | 1b244ee4a81d drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc |
bugzilla: #IAGEOZ:CVE-2024-42086 | 9527a5736a38 iio: chemical: bme680: Fix overflows in compensate() functions |
bugzilla: #I9DZOS:Backport 5.10.202 LTS patches from upstream | f1ae64335ba5 media: gspca: cpia1: shift-out-of-bounds in set_flicker |
bugzilla: #I9Q9ID:CVE-2023-52674 | 0f54ce8d00c2 ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put() |
bugzilla: #I9QG73:CVE-2024-35904 | e04c832c0bc2 selinux: avoid dereference of garbage after mount failure |
bugzilla: #IACR1V:CVE-2024-40988 | 40ac13dacd7b drm/radeon: fix UBSAN warning in kv_dpm.c |
bugzilla: #IA6SDW:CVE-2024-38561 | e01a173cbfe5 kunit: Fix kthread reference 12be8ed9a400 kunit: Fix kthread reference |
bugzilla: #IAEDJI:【OLK-5.10】 FSC = 0x21: alignment fault | 0973ef317fb2 PCI/ROM: Fix PCI ROM header check bug |
bugzilla: #IAD0D8:CVE-2024-40959 | 489c6e2edbd3 xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() |
bugzilla: #IAGELE:CVE-2024-41069 | ecc103a9556f ASoC: topology: Fix route memory corruption 592066a2d853 ASoC: topology: Fix references to freed memory |
bugzilla: #IACV6I:CVE-2024-40976 | 84a7cafed777 drm/lima: mask irqs in timeout path before hard reset dafaa0bf0fe0 drm/lima: add mask irq callback to gp and pp |
bugzilla: #IAD00R:CVE-2024-39509 | 4924badfcfd2 HID: core: remove unnecessary WARN_ON() in implement() |
bugzilla: #I9R4P3:CVE-2021-47382 | a1d51629643c s390/qeth: fix deadlock during failing recovery |
bugzilla: #IAGEM2:CVE-2024-41040 | 1a2d17c8c59e net/sched: Fix UAF when resolving a clash |
bugzilla: #IACS9I:CVE-2024-40999 | 391704d5a654 net: ena: Add validation for completion descriptors consistency |
bugzilla: #IA6S5U:CVE-2024-38594 | 9203e995d9fe net: stmmac: move the EST lock to struct stmmac_priv |
| bugzilla: #I9R4M7:CVE-2023-52764 | f1ae64335ba502ac6f169a9688a6b956ffd59b47 media: gspca: cpia1: shift-out-of-bounds in set_flicker |
| bugzilla: #IAGEF5:CVE-2024-41022 | 01b5efb37847231e24918846c4aed8622a80966c drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() |
| bugzilla: #IAGSC9:CVE-2024-42105 | 036104fc9aedfefc96b098b7ca3a0b269fe4b923 nilfs2: fix inode number range checks |