This bug was fixed in the package linux-aws - 6.11.0-1012.13 --------------- linux-aws (6.11.0-1012.13) oracular; urgency=medium
* oracular/linux-aws: 6.11.0-1012.13 -proposed tracker (LP: #2102434) * wdat_wdt.ko should be pulled in by linux-image-virtual (LP: #2098554) - [Packaging]: wdat_wdt.ko is moved from "linux-modules-extra-*-generic" to "linux-modules-*-generic" * Backport patches to support NVIDIA GB200 (LP: #2101185) - iommu/arm-smmu-v3: Issue a batch of commands to the same cmdq - iommu/arm-smmu-v3: Pass in cmdq pointer to arm_smmu_cmdq_build_sync_cmd - iommu/arm-smmu-v3: Pass in cmdq pointer to arm_smmu_cmdq_init - iommu/arm-smmu-v3: Make symbols public for CONFIG_TEGRA241_CMDQV - iommu/arm-smmu-v3: Add ARM_SMMU_OPT_TEGRA241_CMDQV - iommu/arm-smmu-v3: Add acpi_smmu_iort_probe_model for impl - iommu/arm-smmu-v3: Add struct arm_smmu_impl_ops - iommu/arm-smmu-v3: Add in-kernel support for NVIDIA Tegra241 (Grace) CMDQV - [Config] updateconfigs to enable CONFIG_TEGRA241_CMDQV - iommu/arm-smmu-v3: Start a new batch if new command is not supported - iommu/tegra241-cmdqv: Limit CMDs for VCMDQs of a guest owned VINTF - iommu/tegra241-cmdqv: Fix -Wformat-truncation warnings in lvcmdq_error_header - iommu/tegra241-cmdqv: Fix ioremap() error handling in probe() - iommu/tegra241-cmdqv: Drop static at local variable - iommu/tegra241-cmdqv: Do not allocate vcmdq until dma_set_mask_and_coherent - iommu/tegra241-cmdqv: Staticize cmdqv_debugfs_dir - iommu/tegra241-cmdqv: Fix alignment failure at max_n_shift - iommu/tegra241-cmdqv: do not use smp_processor_id in preemptible context - iommu/tegra241-cmdqv: Read SMMU IDR1.CMDQS instead of hardcoding [ Ubuntu: 6.11.0-24.24 ] * oracular/linux: 6.11.0-24.24 -proposed tracker (LP: #2102476) * Packaging resync (LP: #1786013) - [Packaging] debian.master/dkms-versions -- update from kernel-versions (main/2025.03.17) * ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J (LP: #2096976) - SAUCE: selftest: netfilter: fix null IP field in kci_test_ipsec_offload * Add additional PCI ids for BMG support (LP: #2098969) - drm/xe/bmg: Add new PCI IDs * wdat_wdt.ko should be pulled in by linux-image-virtual (LP: #2098554) - [Packaging]: wdat_wdt.ko is moved from "linux-modules-extra-*-generic" to "linux-modules-*-generic" * CVE-2025-21756 - vsock: Keep the binding until socket destruction - vsock: Orphan socket after transport release * Oracular update: upstream stable patchset 2025-03-05 (LP: #2100983) - ASoC: wm8994: Add depends on MFD core - ASoC: samsung: Add missing selects for MFD_WM8994 - seccomp: Stub for !CONFIG_SECCOMP - scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request - of/unittest: Add test that of_address_to_resource() fails on non- translatable address - irqchip/sunxi-nmi: Add missing SKIP_WAKE flag - hwmon: (drivetemp) Set scsi command timeout to 10s - gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag - smb: client: handle lack of EA support in smb2_query_path_info() - net: sched: fix ets qdisc OOB Indexing - Revert "HID: multitouch: Add support for lenovo Y9000P Touchpad" - cachestat: fix page cache statistics permission checking - scsi: storvsc: Ratelimit warning logs to prevent VM denial of service - USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() - ALSA: usb-audio: Add delay quirk for USB Audio Device - Input: xpad - add support for Nacon Pro Compact - Input: atkbd - map F23 key to support default copilot shortcut - Input: xpad - add unofficial Xbox 360 wireless receiver clone - Input: xpad - add QH Electronics VID/PID - Input: xpad - improve name of 8BitDo controller 2dc8:3106 - Input: xpad - add support for Nacon Evol-X Xbox One Controller - Input: xpad - add support for wooting two he (arm) - drm/v3d: Assign job pointer to NULL before signaling the fence - ASoC: codecs: es8316: Fix HW rate calculation for 48Mhz MCLK - ASoC: cs42l43: Add codec force suspend/resume ops - drm/amd/display: Initialize denominator defaults to 1 - ALSA: hda/realtek: Fix volume adjustment issue on Lenovo ThinkBook 16P Gen5 - drm/connector: hdmi: Validate supported_formats matches ycbcr_420_allowed - ASoC: samsung: Add missing depends on I2C - mm: zswap: properly synchronize freeing resources during CPU hotunplug - mm: zswap: move allocations during CPU init outside the lock - libfs: Return ENOSPC when the directory offset range is exhausted - Revert "libfs: Add simple_offset_empty()" - Revert "libfs: fix infinite directory reads for offset dir" - libfs: Replace simple_offset end-of-directory detection - libfs: Use d_children list to iterate simple_offset directories - wifi: rtl8xxxu: add more missing rtl8192cu USB IDs - HID: wacom: Initialize brightness of LED trigger - Upstream stable to v6.6.75, v6.12.12 * CVE-2025-21702 - pfifo_tail_enqueue: Drop new packet when sch->limit == 0 * CVE-2025-21703 - netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() * Fix line-out playback on some platforms with Cirrus Logic “Dolphin” hardware (LP: #2099880) - ALSA: hda/cirrus: Correct the full scale volume set logic * Enable Large Language Model (LLM) workloads using Intel NPU (LP: #2098972) - accel/ivpu: Increase DMA address range * Introduce and use sendpages_ok() instead of sendpage_ok() in nvme-tcp and drbd (LP: #2093871) - net: introduce helper sendpages_ok() - nvme-tcp: use sendpages_ok() instead of sendpage_ok() - drbd: use sendpages_ok() instead of sendpage_ok() * Intel Be201 Bluetooth hardware error 0x0f on Arrow Lake (LP: #2088151) - Bluetooth: btintel: Add DSBR support for BlazarIW, BlazarU and GaP * Oracular update: upstream stable patchset 2025-02-26 (LP: #2100328) - net: ethernet: ti: cpsw_ale: Fix cpsw_ale_get_field() - bpf: Fix bpf_sk_select_reuseport() memory leak - openvswitch: fix lockup on tx to unregistering netdev with carrier - pktgen: Avoid out-of-bounds access in get_imix_entries - gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp(). - gtp: Destroy device along with udp socket's netns dismantle. - nfp: bpf: prevent integer overflow in nfp_bpf_event_output() - net: xilinx: axienet: Fix IRQ coalescing packet count overflow - net: fec: handle page_pool_dev_alloc_pages error - net/mlx5: Fix RDMA TX steering prio - net/mlx5: Clear port select structure when fail to create - net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel - net/mlx5e: Rely on reqid in IPsec tunnel mode - net/mlx5e: Always start IPsec sequence number from 1 - drm/vmwgfx: Add new keep_resv BO param - drm/v3d: Ensure job pointer is set to NULL after job completion - soc: ti: pruss: Fix pruss APIs - hwmon: (tmp513) Fix division of negative numbers - Revert "mtd: spi-nor: core: replace dummy buswidth from addr to data" - i2c: mux: demux-pinctrl: check initial mux selection, too - i2c: rcar: fix NACK handling when being a target - smb: client: fix double free of TCP_Server_Info::hostname - mac802154: check local interfaces before deleting sdata list - hfs: Sanity check the root record - fs: fix missing declaration of init_files - kheaders: Ignore silly-rename files - cachefiles: Parse the "secctx" immediately - scsi: ufs: core: Honor runtime/system PM levels if set by host controller drivers - selftests: tc-testing: reduce rshift value - ACPI: resource: acpi_dev_irq_override(): Check DMI match last - iomap: avoid avoid truncating 64-bit offset to 32 bits - poll_wait: add mb() to fix theoretical race between waitqueue_active() and .poll() - RDMA/bnxt_re: Fix to export port num to ib_query_qp - nvmet: propagate npwg topology - ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA - i2c: atr: Fix client detach - mptcp: be sure to send ack when mptcp-level window re-opens - mptcp: fix spurious wake-up on under memory pressure - selftests: mptcp: avoid spurious errors on disconnect - net: ethernet: xgbe: re-add aneg to supported features in PHY quirks - vsock/bpf: return early if transport is not assigned - vsock/virtio: discard packets if the transport changes - vsock/virtio: cancel close work in the destructor - vsock: reset socket state when de-assigning the transport - vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] - nouveau/fence: handle cross device fences properly - filemap: avoid truncating 64-bit offset to 32 bits - fs/proc: fix softlockup in __read_vmcore (part 2) - gpio: xilinx: Convert gpio_lock to raw spinlock - pmdomain: imx8mp-blk-ctrl: add missing loop break condition - irqchip: Plug a OF node reference leak in platform_irqchip_probe() - irqchip/gic-v3: Handle CPU_PM_ENTER_FAILED correctly - irqchip/gic-v3-its: Don't enable interrupts in its_irq_set_vcpu_affinity() - hrtimers: Handle CPU state correctly on hotplug - drm/i915/fb: Relax clear color alignment to 64 bytes - drm/amdgpu: always sync the GFX pipe on ctx switch - ocfs2: fix deadlock in ocfs2_get_system_file_inode - nfsd: add list_head nf_gc to struct nfsd_file - x86/xen: fix SLS mitigation in xen_hypercall_iret() - efi/zboot: Limit compression options to GZIP and ZSTD - [Config] updateconfigs for EFI_ZBOOT - eth: bnxt: always recalculate features after XDP clearing, fix null-deref - net: ravb: Fix max TX frame size for RZ/V2M - ice: Fix E825 initialization - ice: Fix quad registers read on E825 - ice: Fix ETH56G FC-FEC Rx offset value - ice: Introduce ice_get_phy_model() wrapper - ice: Add ice_get_ctrl_ptp() wrapper to simplify the code - ice: Use ice_adapter for PTP shared data instead of auxdev - ice: Add correct PHY lane assignment - cpuidle: teo: Update documentation after previous changes - pfcp: Destroy device along with udp socket's netns dismantle. - cpufreq: Move endif to the end of Kconfig file - net/mlx5: Fix a lockdep warning as part of the write combining test - net/mlx5: SF, Fix add port error handling - drm/tests: helpers: Fix compiler warning - drm/vmwgfx: Unreserve BO on error - reset: rzg2l-usbphy-ctrl: Assign proper of node to the allocated device - i2c: core: fix reference leak in i2c_register_adapter() - platform/x86: dell-uart-backlight: fix serdev race - platform/x86: lenovo-yoga-tab2-pro-1380-fastcharger: fix serdev race - i2c: testunit: sort case blocks - i2c: testunit: on errors, repeat NACK until STOP - hwmon: (ltc2991) Fix mixed signed/unsigned in DIV_ROUND_CLOSEST - fs/qnx6: Fix building with GCC 15 - gpio: virtuser: lock up configfs that an instantiated device depends on - gpio: sim: lock up configfs that an instantiated device depends on - platform/x86/intel: power-domains: Add Clearwater Forest support - platform/x86: ISST: Add Clearwater Forest to support list - afs: Fix merge preference rule failure condition - sched/fair: Fix update_cfs_group() vs DELAY_DEQUEUE - ALSA: hda/realtek: fixup ASUS GA605W - ALSA: hda/realtek: fixup ASUS H7606W - drm/nouveau/disp: Fix missing backlight control on Macbook 5,1 - net/ncsi: fix locking in Get MAC Address handling - selftests/mm: set allocated memory to non-zero content in cow test - drm/amd/display: Do not elevate mem_type change to full update - mm: clear uffd-wp PTE/PMD state on mremap() - tracing: gfp: Fix the GFP enum values shown for user space tracing tools - timers/migration: Fix another race between hotplug and idle entry/exit - timers/migration: Enforce group initialization visibility to tree walkers - drm/xe: Mark ComputeCS read mode as UC on iGPU - drm/xe/oa: Add missing VISACTL mux registers - drm/amdgpu/smu13: update powersave optimizations - drm/amdgpu: fix fw attestation for MP0_14_0_{2/3} - drm/amdgpu: disable gfxoff with the compute workload on gfx12 - drm/amd/display: Fix PSR-SU not support but still call the amdgpu_dm_psr_enable - drm/amd/display: Disable replay and psr while VRR is enabled - drm/amd/display: Do not wait for PSR disable on vbl enable - Revert "drm/amd/display: Enable urgent latency adjustments for DCN35" - drm/amd/display: Validate mdoe under MST LCT=1 case as well - Upstream stable to v6.6.74, v6.12.11 * CVE-2025-21700 - net: sched: Disallow replacing of child qdisc from one parent to another * iBFT iSCSI out-of-bounds shift UBSAN warning (LP: #2097824) - iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() * Fix dmesg warn during x11perf testing. (LP: #2097106) - drm/xe: Fix xe_pt_abort_unbind * btrfs will WARN_ON() in btrfs_remove_qgroup() unnecessarily (LP: #2091719) - btrfs: improve the warning and error message for btrfs_remove_qgroup() * CVE-2025-21701 - net: avoid race between device unregistration and ethnl ops -- Philip Cox <philip....@canonical.com> Thu, 27 Mar 2025 10:23:22 -0400 ** Changed in: linux-aws (Ubuntu Oracular) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21700 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21701 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21702 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21703 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21756 ** Changed in: linux-aws (Ubuntu Noble) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-49034 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-41014 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-41932 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-41935 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42122 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-43098 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-44955 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-45828 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-47141 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-47143 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-47794 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-47809 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-48873 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-48875 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-48876 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-48881 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-49569 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-49899 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-49906 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50051 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50167 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50215 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50216 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50218 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50220 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50221 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50222 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50223 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50224 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50225 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50226 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50230 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50231 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50232 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50234 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50235 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50236 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50237 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50238 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50239 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50240 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50242 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50243 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50244 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50245 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50246 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50247 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50248 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50249 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50250 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50251 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50252 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50255 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50256 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50257 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50258 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50259 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50261 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50262 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50263 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50265 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50267 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50268 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50269 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50270 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50271 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50272 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50273 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50274 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50275 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50276 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50278 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50279 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50280 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50282 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50283 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50284 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50285 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50286 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50287 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50288 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50289 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50290 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50291 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50292 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50294 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50295 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50296 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50297 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50298 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50299 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50300 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50301 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50302 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50303 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50304 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-52332 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53042 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53043 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53044 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53045 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53046 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53047 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53048 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53050 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53051 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53052 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53053 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53055 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53058 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53059 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53060 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53061 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53062 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53063 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53066 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53067 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53068 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53072 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53076 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53081 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53082 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53083 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53084 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53085 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53086 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53087 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53088 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53140 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53142 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53145 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53146 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53147 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53148 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53150 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53151 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53154 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53155 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53157 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53158 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53160 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53161 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53162 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53163 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53166 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53168 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53169 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53171 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53172 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53173 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53174 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53175 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53176 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53177 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53178 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53180 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53181 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53183 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53184 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53185 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53187 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53188 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53190 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53191 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53194 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53195 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53196 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53197 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53198 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53200 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53201 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53202 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53203 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53208 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53209 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53210 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53213 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53214 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53215 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53216 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53217 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53218 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53219 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53220 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53221 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53222 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53223 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53224 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53226 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53227 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53228 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53229 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53230 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53231 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53232 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53233 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53234 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53236 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53237 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53239 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56531 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56532 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56533 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56538 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56539 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56540 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56543 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56545 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56546 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56548 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56549 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56550 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56551 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56557 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56558 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56561 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56562 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56565 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56566 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56567 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56568 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56569 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56570 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56572 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56573 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56574 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56575 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56576 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56577 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56578 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56579 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56580 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56581 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56583 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56584 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56585 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56586 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56587 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56588 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56589 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56590 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56592 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56593 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56594 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56595 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56596 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56597 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56598 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56599 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56600 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56601 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56602 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56603 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56604 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56605 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56606 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56607 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56608 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56609 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56610 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56611 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56613 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56615 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56616 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56619 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56620 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56621 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56622 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56623 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56625 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56626 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56627 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56628 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56629 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56630 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56631 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56632 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56633 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56634 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56635 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56636 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56637 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56638 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56640 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56641 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56642 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56643 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56644 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56645 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56647 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56648 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56649 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56650 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56651 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56658 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56661 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56672 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56677 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56678 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56679 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56681 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56683 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56685 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56687 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56688 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56689 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56690 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56691 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56692 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56693 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56694 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56698 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56700 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56701 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56703 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56704 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56705 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56707 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56708 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56720 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56721 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56722 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56723 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56724 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56725 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56726 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56727 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56728 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56729 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56739 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56741 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56742 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56744 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56745 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56746 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56747 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56748 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56751 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56752 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56754 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56755 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56756 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56765 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56771 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56772 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56773 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56774 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56775 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56776 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56777 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56778 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56779 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56780 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56781 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56782 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56783 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56785 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56786 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56787 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57798 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57838 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57843 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57849 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57850 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57872 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57874 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57876 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/2101185 Title: Backport patches to support NVIDIA GB200 Status in linux-aws package in Ubuntu: New Status in linux-aws source package in Noble: Fix Released Status in linux-aws source package in Oracular: Fix Released Bug description: [Impact] AWS requested the following patchsets to support GB200 to be backported to 6.8 kernels and newer: #1: Update SMMUv3 to the modern iommu API (part 2b/3) (https://lore.kernel.org/linux-iommu/0-v9-5cd718286059+79186-smmuv3_newapi_p2b_...@nvidia.com/) #2: Add Tegra241 (Grace) CMDQV Support (part 1/2) (https://lore.kernel.org/linux-iommu/cover.1724970714.git.nicol...@nvidia.com/) #3: iommu/tegra241-cmdqv: Fix alignment failure at max_n_shift (https://lore.kernel.org/all/20241111030226.1940737-1-nicol...@nvidia.com/) [Fix] Oracular: - Patchset #1 is already included in the o:aws tree. - All patches from patchset #2 are clean cherry-picks. Fixes to commit 918eb5c856f6 ("iommu/arm-smmu-v3: Add in-kernel support for NVIDIA Tegra241 (Grace) CMDQV"), from patchset 2, which were also clean cherry-picks, were added. - Patchset #3's only patch and one fix to it were clean cherry-picks. Noble: Backporting patchset #1 required backporting the patchsets it was built on top of: - All patches from "Update SMMUv3 to the modern iommu API (part 1/3)" (https://lore.kernel.org/all/0-v6-96275f25c39d+2d4-smmuv3_newapi_p1_...@nvidia.com/), except for "iommu/arm-smmu-v3: Hold arm_smmu_asid_lock during all of attach_dev", which is already in the tree. And * "iommu/arm-smmu-v3: Add cpu_to_le64() around STRTAB_STE_0_V", as a fix to "iommu/arm-smmu-v3: Make STE programming independent of the callers". - Parts of "Update SMMUv3 to the modern iommu API (part 2/3)" (https://lore.kernel.org/all/0-v6-228e7adf25eb+4155-smmuv3_newapi_p2_...@nvidia.com/). - All patches from "Make the SMMUv3 CD logic match the new STE design" (part 2a/3) (https://lore.kernel.org/all/0-v9-5040dc602008+177d7-smmuv3_newapi_p2_...@nvidia.com/). And * "iommu: Introduce iommu_group_mutex_assert()", as pre-req for "iommu/arm-smmu-v3: Move the CD generation for SVA into a function". * "iommu/arm-smmu-v3: Fix access for STE.SHCFG", as pre-req for "iommu/arm-smmu-v3: Add unit tests for arm_smmu_write_entry". * "iommu/arm-smmu-v3: Avoid uninitialized asid in case of error", as a fix for "iommu/arm-smmu-v3: Build the whole CD in arm_smmu_make_s1_cd()". Other pre-reqs for patchset #1 included: - "iommu: Pass domain to remove_dev_pasid() op", as pre-req for "iommu/arm-smmu-v3: Put the SVA mmu notifier in the smmu_domain". - A backport of "iommu: Add ops->domain_alloc_sva()", as pre-req for "iommu/arm-smmu-v3: Convert to domain_alloc_sva()". Patchset #2 was almost all clean cherry-picks except for "iommu/arm-smmu-v3: Add acpi_smmu_iort_probe_model for impl". Additionally, these were needed: * "iommu/arm-smmu-v3: Make the kunit into a module" and "iommu/arm-smmu-v3: Use *-y instead of *-objs in Makefile" to clean cherry-pick "iommu/arm-smmu-v3: Add in-kernel support for NVIDIA Tegra241 (Grace) CMDQV". * "iommu/arm-smmu-v3: add missing MODULE_DESCRIPTION() macro", as a fix for "iommu/arm-smmu-v3: Make the kunit into a module". * Other `Fixes` to commit 918eb5c856f6 ("iommu/arm-smmu-v3: Add in-kernel support for NVIDIA Tegra241 (Grace) CMDQV"), which were clean cherry-picks. Patchset #3's only patch and one fix to it were clean cherry-picks. [Test Case] Compile and boot tested. Tested by AWS. [Where problems could occur] These patches introduce significant refactoring and features to the SMMUv3 driver. Additionally, support to Tegra241's CMDQ-Virtualization is being added. [Other info] SF #00404773 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2101185/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp