代码拉取完成,页面将自动刷新
1540
release 5.10.0-136.72.0
已合并
TASK | COMMIT |
---|---|
bugzilla: #I95ASP:CVE-2023-52530 | bb19fe482704 wifi: mac80211: fix potential key use-after-free |
bugzilla: #I987V5:Backport 5.10.198 LTS patches from upstream | 3309087130e6 RDMA/siw: Fix connection failure handling |
bugzilla: #I95AT0:CVE-2023-52504 | 126cf4b96a0b x86/alternatives: Disable KASAN in apply_alternatives() |
bugzilla: #I956G4:CVE-2021-47070 | 69d5e2c061a5 uio_hv_generic: Fix another memory leak in error handling paths |
bugzilla: #I95ATF:CVE-2023-52561 | ac2b1cc7f5c4 arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved |
bugzilla: #I9AWJ5:Backport 5.10.199 LTS patches from upstream | 486dfde1f966 tee: amdtee: fix use-after-free vulnerability in amdtee_close_session |
bugzilla: #I96G7W:CVE-2023-52594 | e4736c5b3ac9 wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() |
bugzilla: #I95AUA:CVE-2023-52572 | 6989e5d0df89 cifs: Fix UAF in cifs_demultiplex_thread() |
bugzilla: #I9E6TS:CVE-2024-26810 | 92917ab11fb2 vfio/pci: Lock external INTx masking ops |
bugzilla: #I95RDW:CVE-2021-47101 | 802d3cf089e2 asix: fix wrong return value in asix_check_host_enable() 6d523bd085fe asix: fix uninit-value in asix_mdio_read() b9b3ef56142b net: asix: fix uninit value bugs |
bugzilla: #I96G8W:CVE-2023-52587 | 1411b117abb5 IB/ipoib: Fix mcast list locking fc77a3a4c6bb RDMA/IPoIB: Fix error code return in ipoib_mcast_join |
bugzilla: #I9E6TU:CVE-2024-27437 | c623ec2a02d2 vfio/pci: Disable auto-enable of exclusive INTx IRQ |
bugzilla: #I9E2GU:CVE-2024-26698 | 7338b5fbe75e hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove |
bugzilla: #I95ATG:CVE-2023-52560 | 7aaf9e6a84ff mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions() |
bugzilla: #I96GPO:CVE-2023-52597 | a273f973cf9c KVM: s390: fix setting of fpc register |
bugzilla: #I95ATV:CVE-2023-52578 | 873bc2806ee7 net: fix kabi check warning 9dcb39e0640f net: Fix unwanted sign extension in netdev_stats_to_stats64() 55ca950ac684 net: bridge: use DEV_STATS_INC() 5e8865cf96c7 net: add atomic_long_t to net_device_stats fields |
bugzilla: #I95ATZ:CVE-2023-52574 | 22a2daa9c5ce team: fix null-ptr-deref when team device type is changed |
bugzilla: #I96GO9:CVE-2023-52595 | 851f4198b8a1 wifi: rt2x00: restart beacon queue when hardware reset |
bugzilla: #I9DO1Z:CVE-2024-26656 | 3e36b63c097f drm/amdgpu: fix use-after-free bug |
bugzilla: #I95AXL:CVE-2023-52516 | c1e429ec878b dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock |
bugzilla: #I93EBW:CVE-2023-52464 | 56eda07b1862 EDAC/thunderx: Fix possible out-of-bounds string access |
bugzilla: #I9E2M2:CVE-2024-26759 | ee565f8bdbc5 mm/swap: fix race when skipping swapcache |
bugzilla: #I9E2O0:CVE-2024-26751 | d61095b5c1c7 ARM: ep93xx: Add terminator to gpiod_lookup_table |
bugzilla: #I9E2Y8:CVE-2024-26778 | eacafefde556 fbdev: savage: Error out if pixclock equals zero |
bugzilla: #I9E2MF:CVE-2024-26772 | 959807022f5d ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() |
bugzilla: #I9E2O5:CVE-2023-52640 | 33bbdf1a8224 fs/ntfs3: Fix oob in ntfs_listxattr e53f1b04337f fs/ntfs3: fix panic about slab-out-of-bounds caused by ntfs_list_ea() 318949c5ce79 ntfs: Fix panic about slab-out-of-bounds caused by ntfs_listxattr() |
bugzilla: #I9E2FM:CVE-2024-26695 | e243013c88dc crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked |
bugzilla: #I9E3E9:CVE-2024-26736 | 8ca7971e7474 afs: Increase buffer size in afs_update_volume_status() |
bugzilla: #I9E2MG:CVE-2024-26777 | d8af76de3fb9 fbdev: sis: Error out if pixclock equals zero |
bugzilla: #I9F351:修复CVE-2024-26598修复补丁修改错误 | 0852aa216095 KVM: arm64: vgic-its: Fix CVE-2024-26598 fix patch issue |
bugzilla: #I96G7Q:CVE-2023-52598 | 74069cecb82d s390/ptrace: handle setting of fpc register correctly |
bugzilla: #I9E2MP:CVE-2024-26771 | 318aa132d217 dmaengine: ti: edma: Add some null pointer checks to the edma_probe |
bugzilla: #I95B3Q:CVE-2023-52503 | 62da3e4aeeea83fe05e562902acd931513fa5c44 tee: amdtee: fix use-after-free vulnerability in amdtee_close_session |