1TASK


4.19.90-2404.1.0~1...4.19.90-2404.2.0


TASK COMMIT
bugzilla: #I97R4T:【20.03-LTS-SP1~SP4】4.19 kernel加载并卸载vkms模块即可导致系统崩溃重启 3a6e2c3a125c drm/vkms: call drm_atomic_helper_shutdown before drm_dev_put()
bugzilla: #I9E2H0:CVE-2023-52637 38095d431e65 can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)
bugzilla: #I9E2LZ:CVE-2024-26739 8853ccb08115 net/sched: act_mirred: don't override retval if we already lost the skb
bugzilla: #I9E6TE:CVE-2024-26812 632dc114a9af vfio/pci: Create persistent INTx handler
43c4211edba5 vfio: Introduce interface to flush virqfd inject workqueue
bugzilla: #I9FNG0:CVE-2021-47201 a415d73c853e iavf: free q_vectors before queues in iavf_disable_vf
bugzilla: #I9FNG2:CVE-2021-47194 e4bd4459ad71 cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
bugzilla: #I9E2GS:CVE-2024-26687 d32ea8d9ea56 xen/events: close evtchn after mapping cleanup
bugzilla: #I9E47C:CVE-2024-26804 d9bd4b355b1f net: ip_tunnel: prevent perpetual headroom growth
bugzilla: #I9E2GQ:CVE-2023-52639 78dd77efcef0 KVM: s390: vsie: fix race during shadow creation
bugzilla: #I9E6TU:CVE-2024-27437 bf2222575aee vfio/pci: Disable auto-enable of exclusive INTx IRQ
8e07a68209c8 genirq: Add IRQF_NO_AUTOEN for request_irq/nmi()
bugzilla: #I9E2EL:CVE-2024-26686 4f8730514c73 fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats
f59c1abf66d1 fs/proc: do_task_stat: move thread_group_cputime_adjusted() outside of lock_task_sighand()
dfb6ca3bc5ce fs/proc: do_task_stat: use __for_each_thread()
08132d3d089b exit: Use the correct exit_code in /proc//stat
bugzilla: #I9E2MI:CVE-2024-26779 c2e1ca48ad0b wifi: mac80211: fix race condition on enabling fast-xmit
bugzilla: #I9E2F9:CVE-2024-26704 089b5acac053 ext4: fix double-free of blocks due to wrong extents moved_len
bugzilla: #I9E6TS:CVE-2024-26810 b6f47d04e499 vfio/pci: Lock external INTx masking ops
bugzilla: #I9E2MH:CVE-2024-26754 9c10b0446227 gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()
bugzilla: #I9E2LW:CVE-2024-26763 4a1f40d0cd2d dm-crypt: don't modify the data when using authenticated encryption
bugzilla: #I9E2FH:CVE-2024-26697 85553d8cb3c6 nilfs2: fix data corruption in dsync block recovery for small block sizes
bugzilla: #I9E2FP:CVE-2024-26685 ec3e7aad838f nilfs2: fix potential bug in end_buffer_async_write
9d540b8f09df nilfs2: fix buffer corruption due to concurrent device reads
bugzilla: #I9E2F7:CVE-2024-26726 c671f65e8aa5 btrfs: don't drop extent_map for free space inode on write error
bugzilla: #I9E469:CVE-2024-26791 7d0161833fd3 btrfs: dev-replace: properly validate device names
bugzilla: #I9E2M2:CVE-2024-26759 0cf13f3bcff1 mm/swap: fix race when skipping swapcache
bugzilla: #I9E2LT:CVE-2024-26740 2dc6241e1bbc net/sched: act_mirred: use the backlog for mirred ingress
bugzilla: #I9DNGK:CVE-2023-52635 104955a02cd3 PM / devfreq: Synchronize devfreq_monitor_[start/stop]
bugzilla: #I9E2MF:CVE-2024-26772 b11a05b583ba ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
bugzilla: #I9E3E4:CVE-2024-26735 a967a094839e ipv6: sr: fix possible use-after-free and null-ptr-deref
bugzilla: #I9E2M7:CVE-2024-26743 e2fbaa3269df RDMA/qedr: Fix qedr_create_user_qp error flow
bugzilla: #I9E2Y8:CVE-2024-26778 9bddf52475f7 fbdev: savage: Error out if pixclock equals zero
bugzilla: #I9E2MP:CVE-2024-26771 a654421e56cc dmaengine: ti: edma: Add some null pointer checks to the edma_probe
f8fe893919c2 dmaengine: ti: edma: Fix error return code in edma_probe()
fbdb41fc7bf0 dmaengine: ti: edma: add missed operations
f7e3bd41f723 dmaengine: ti: edma: fix missed failure handling
bugzilla: #I9E3EE:CVE-2024-26744 b2139f57cfa0 RDMA/srpt: Support specifying the srpt_service_guid parameter
bugzilla: #I9E2M9:CVE-2024-26773 5e19c94aa663 ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
bugzilla: #I9E2MG:CVE-2024-26777 03e98280b89d fbdev: sis: Error out if pixclock equals zero
bugzilla: #I9E2EQ:CVE-2024-26696 174f712be9f6 nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()

2CVE


CVE issue
CVE-2021-47194 #I9FNG2:CVE-2021-47194
CVE-2021-47201 #I9FNG0:CVE-2021-47201
CVE-2023-52635 #I9DNGK:CVE-2023-52635
CVE-2023-52637 #I9E2H0:CVE-2023-52637
CVE-2023-52639 #I9E2GQ:CVE-2023-52639
CVE-2024-26685 #I9E2FP:CVE-2024-26685
CVE-2024-26686 #I9E2EL:CVE-2024-26686
CVE-2024-26687 #I9E2GS:CVE-2024-26687
CVE-2024-26696 #I9E2EQ:CVE-2024-26696
CVE-2024-26697 #I9E2FH:CVE-2024-26697
CVE-2024-26704 #I9E2F9:CVE-2024-26704
CVE-2024-26726 #I9E2F7:CVE-2024-26726
CVE-2024-26735 #I9E3E4:CVE-2024-26735
CVE-2024-26739 #I9E2LZ:CVE-2024-26739
CVE-2024-26740 #I9E2LT:CVE-2024-26740
CVE-2024-26743 #I9E2M7:CVE-2024-26743
CVE-2024-26744 #I9E3EE:CVE-2024-26744
CVE-2024-26754 #I9E2MH:CVE-2024-26754
CVE-2024-26759 #I9E2M2:CVE-2024-26759
CVE-2024-26763 #I9E2LW:CVE-2024-26763
CVE-2024-26771 #I9E2MP:CVE-2024-26771
CVE-2024-26772 #I9E2MF:CVE-2024-26772
CVE-2024-26773 #I9E2M9:CVE-2024-26773
CVE-2024-26777 #I9E2MG:CVE-2024-26777
CVE-2024-26778 #I9E2Y8:CVE-2024-26778
CVE-2024-26779 #I9E2MI:CVE-2024-26779
CVE-2024-26791 #I9E469:CVE-2024-26791
CVE-2024-26804 #I9E47C:CVE-2024-26804
CVE-2024-26810 #I9E6TS:CVE-2024-26810
CVE-2024-26812 #I9E6TE:CVE-2024-26812
CVE-2024-27437 #I9E6TU:CVE-2024-27437