代码拉取完成,页面将自动刷新
1546
release 5.10.0-197.0.0
已合并
TASK | COMMIT |
---|---|
bugzilla: 189676, #I97NHS:CVE-2024-26615 | d69ce4891eda net/smc: fix illegal rmb_desc access in SMC-D connection dump |
bugzilla: #I9E2M1:CVE-2024-26734 | 5d521846280f devlink: fix possible use-after-free and memory leaks in devlink_init() |
bugzilla: #I97NIA:CVE-2023-52498 | 22fdba55eba0 PM: sleep: Fix error handling in dpm_prepare() dcb7d3ed9606 PM: sleep: Fix possible deadlocks in core system-wide PM code f17dd77ff1b4 PM: core: Remove unnecessary (void *) conversions 396d9255bae7 PM: sleep: Avoid calling put_device() under dpm_list_mtx f2a5d7a990d4 PM: sleep: Use dev_printk() when possible 1324bb789604 async: Introduce async_schedule_dev_nocall() c2c1551c7660 async: Split async_schedule_node_domain() |
bugzilla: #I97NHC:CVE-2023-52491 | c0b3cf1541fb media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run |
bugzilla: #I9HK0E:CVE-2024-26908 | 6e631dc7048b x86/xen: Add some null pointer checking to smp.c |
bugzilla: #I9HL6L:CVE-2024-26917 | f8275c087e9d scsi: fnic: Move fnic_fnic_flush_tx() to a work queue |
bugzilla: #I9HKEH:CVE-2024-26895 | c5a73a12a670 wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces |
bugzilla: #I8QF9K:CVE-2023-7042 | 2ea3d8f6700d wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() |
bugzilla: 189811, #I9FNFK:CVE-2021-47182 | 73951e4d9356 scsi: core: Fix scsi_mode_sense() buffer length handling b9f1e531b4a4 scsi: core: Reshuffle response handling in scsi_mode_sense() |
bugzilla: #I9HL6U:CVE-2024-26920 | 4b28b68db9d9 tracing/trigger: Fix to return error if failed to alloc snapshot |
bugzilla: #I9FNF8:CVE-2021-47212 | fedc327ddee9 net/mlx5: Update error handler for UCTX and UMEM |
bugzilla: #I9IQLI:自研补丁net/sched: flower: Fix kabi change,修复kabi变化的时候,引入问题 | a9b6772da456 net/sched: flower: Fix unable to handle page fault bug in fl_init |
bugzilla: #I8DQ75:CVE-2023-47233 | cc4069fb7479 wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach |
bugzilla: #I9E46O:CVE-2024-26801 | 161dc9a3d1fe Bluetooth: Avoid potential use-after-free in hci_error_reset |
bugzilla: 189771, #I9E2MB:CVE-2024-26733 | 3335241610ff arp: Prevent overflow in arp_req_get(). |
bugzilla: #I917JN:CVE-2024-24861 | d75e5a505bb3 media: xc4000: Fix atomicity violation in xc4000_get_frequency |
bugzilla: #I9HXKB:解决SELinux策略重载时IMA偶发的panic问题 | 67169ec84504 ima: Avoid blocking in RCU read-side critical section |
bugzilla: #I8TQCT:CVE-2023-6270 | e5c111ca279e aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts |
bugzilla: #I8V1IQ:【OpenEuler22.03-LTS-SP3】HNS3 UDMA特性问题修复,代码优化 | b441cee34c59 hns3 udma: adjustment of the maximum number of Jettys |
bugzilla: #I9FNFQ:CVE-2021-47211 | 48a1f55e80cd ALSA: usb-audio: fix null pointer dereference on pointer cs_desc |
bugzilla: #I9H4YE:【OLK-5.10】L3CODEPBM:0=0 接口输入0 实际返回 ffffff | 5461710460fe arm64/mpam: Not allowed setting 0 to cache portion bit mask |
bugzilla: #I9H4XD:【OLK-5.10】修改rmid 错误返回码与last_cmd_status 不一致 | c6103c726efa arm64/mpam: return EOPNOTSUPP when changing rmid of monitor group or resource group with monitor |
bugzilla: #I9FNFU:CVE-2021-47199 | 26ccd27b3855 net/mlx5e: CT, Fix multiple allocations and memleak of mod acts |
bugzilla: #I9E2O3:CVE-2024-26764 | 5fe9f982218c fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion 22b082406e46 fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio |
bugzilla: #I8V1IQ:【OpenEuler22.03-LTS-SP3】HNS3 UDMA特性问题修复,代码优化 | 5df20214b974 hns3 udma: fixes errors related to jfr RECORD_DB. |
bugzilla: #I9HNHF:【OLK-5.10】scsi: hisi_sas: Remove hisi_hba->timer for v3 hw | e55e4852486b scsi: hisi_sas: Remove hisi_hba->timer for v3 hw |
bugzilla: #I92OOJ:CVE-2023-52441 | 84ec4610ed06 ksmbd: fix out of bounds in init_smb2_rsp_hdr() ba138450b664 ksmbd: fix slab-out-of-bounds in init_smb2_rsp_hdr d26aacdc7b6e ksmbd: return unsupported error on smb1 mount 8f15bccf53b2 ksmbd: return STATUS_NOT_SUPPORTED on unsupported smb2.0 dialect |
bugzilla: #I9E49K:CVE-2024-26808 | 366f309c5797 netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain |
bugzilla: #I9E46W:CVE-2024-26805 | 451a222aadff netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter |
bugzilla: #I99KM6:【OLK-5.10】cgroup1_writeback softlockup | 763aca820e00 cgroup_writeback: fix softlockup for blkcg->memcg_list |
bugzilla: #I9E2LZ:CVE-2024-26739 | f1fda73437ef net/sched: act_mirred: don't override retval if we already lost the skb |
bugzilla: #I9E2H0:CVE-2023-52637 | c9ae3bfe6424 can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) |
bugzilla: #I9E47C:CVE-2024-26804 | 9f7f7a3fce3c net: ip_tunnel: prevent perpetual headroom growth |
bugzilla: #I9HJY0:CVE-2024-26898 | 58f92ad63af9b25890049e045a59a1c02004a294 aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts |
bugzilla: #I9Q99Q:CVE-2024-35815 | 5fe9f982218cd09b8e4b7fa6c70fc01b5df43438 fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion |
bugzilla: #I9Q990:CVE-2024-35811 | cc4069fb74797a6607177fdfd31d6c78e0489bb2 wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach |