Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v6.17.1 upstream stable release
from git://git.kernel.org/
4a245d5610b1706 Linux 6.17.1
ef08ce6304d30b5 ASoC: qcom: audioreach: fix potential null pointer dereference
4eeafff163e80d5 media: stm32-csi: Fix dereference before NULL check
ec2f87ad035e8d1 media: iris: Fix memory leak by freeing untracked persist buffer
500fcc31e488d79 wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()
e4e99d69b8b8295 mm: swap: check for stable address space before operating on
the VMA
0f140cede24334b media: uvcvideo: Mark invalid entities with id
UVC_INVALID_ENTITY_ID
2e7fd93b9cc565b media: rc: fix races with imon_disconnect()
4266f012806fc18 media: tuner: xc5000: Fix use-after-free in xc5000_release
2610617effb4454 media: i2c: tc358743: Fix use-after-free bugs caused by orphan
timer in probe
6a92f5796880f5a media: b2c2: Fix use-after-free causing by irq_check_work in
flexcop_pci_remove
bdb3c41b358cf87 wifi: rtw89: fix use-after-free in
rtw89_core_tx_kick_off_and_wait()
353d8c715cc951a ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free
a150275831b765b scsi: target: target_core_configfs: Add length check to avoid
buffer overflow
0424e4ee60a621d gcc-plugins: Remove TODO_verify_il for GCC >= 16
392b1d64911f4de blk-mq: fix blk_mq_tags double free while nr_requests grown
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Confirmed
** Affects: linux (Ubuntu Questing)
Importance: Undecided
Status: Confirmed
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: kernel-stable-tracking-bug
** Also affects: linux (Ubuntu Questing)
Importance: Undecided
Status: Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2126948
Title:
Questing update: v6.17.1 upstream stable release
Status in linux package in Ubuntu:
Confirmed
Status in linux source package in Questing:
Confirmed
Bug description:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v6.17.1 upstream stable release
from git://git.kernel.org/
4a245d5610b1706 Linux 6.17.1
ef08ce6304d30b5 ASoC: qcom: audioreach: fix potential null pointer dereference
4eeafff163e80d5 media: stm32-csi: Fix dereference before NULL check
ec2f87ad035e8d1 media: iris: Fix memory leak by freeing untracked persist
buffer
500fcc31e488d79 wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()
e4e99d69b8b8295 mm: swap: check for stable address space before operating on
the VMA
0f140cede24334b media: uvcvideo: Mark invalid entities with id
UVC_INVALID_ENTITY_ID
2e7fd93b9cc565b media: rc: fix races with imon_disconnect()
4266f012806fc18 media: tuner: xc5000: Fix use-after-free in xc5000_release
2610617effb4454 media: i2c: tc358743: Fix use-after-free bugs caused by
orphan timer in probe
6a92f5796880f5a media: b2c2: Fix use-after-free causing by irq_check_work in
flexcop_pci_remove
bdb3c41b358cf87 wifi: rtw89: fix use-after-free in
rtw89_core_tx_kick_off_and_wait()
353d8c715cc951a ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free
a150275831b765b scsi: target: target_core_configfs: Add length check to avoid
buffer overflow
0424e4ee60a621d gcc-plugins: Remove TODO_verify_il for GCC >= 16
392b1d64911f4de blk-mq: fix blk_mq_tags double free while nr_requests grown
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2126948/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp