This bug was fixed in the package linux-xilinx-zynqmp - 5.15.0-1052.56 --------------- linux-xilinx-zynqmp (5.15.0-1052.56) jammy; urgency=medium
* jammy/linux-xilinx-zynqmp: 5.15.0-1052.56 -proposed tracker (LP: #2114578) * Fix kernel error logs on sda (LP: #2115853) - scsi: sd: Print write through due to no caching mode page as warning * Fix kernel crash in V4L module on exit of realsense application (LP: #2115849) - SAUCE: Revert "uvcvideo: Prevent new URBs being processed at stream stop" * Fix DP not working on Kria boards with 1.04 firmware (Jammy) (LP: #2114250) - drm: xlnx: dp: Reset DisplayPort IP [ Ubuntu: 5.15.0-144.157 ] * jammy/linux: 5.15.0-144.157 -proposed tracker (LP: #2114581) * cifs: NULL pointer dereference in refresh_cache_worker (LP: #2112440) - cifs: fix NULL ptr dereference in refresh_mounts() * Jammy update: v5.15.184 upstream stable release (LP: #2112581) - platform/x86: asus-wmi: Fix wlan_ctrl_by_user detection - tracing: probes: Fix a possible race in trace_probe_log APIs - iio: adc: ad7768-1: Fix insufficient alignment of timestamp. - iio: chemical: sps30: use aligned_s64 for timestamp - RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug - nfs: handle failure of nfs_get_lock_context in unlock path - spi: loopback-test: Do not split 1024-byte hexdumps - net: cadence: macb: Fix a possible deadlock in macb_halt_tx. - net: dsa: sja1105: discard incoming frames in BR_STATE_LISTENING - ALSA: sh: SND_AICA should depend on SH_DMA_API - qlcnic: fix memory leak in qlcnic_sriov_channel_cfg_cmd() - NFSv4/pnfs: Reset the layout state after a layoutreturn - x86,nospec: Simplify {JMP,CALL}_NOSPEC - x86/speculation: Simplify and make CALL_NOSPEC consistent - x86/speculation: Add a conditional CS prefix to CALL_NOSPEC - x86/speculation: Remove the extra #ifdef around CALL_NOSPEC - Documentation: x86/bugs/its: Add ITS documentation - x86/its: Enumerate Indirect Target Selection (ITS) bug - x86/its: Add support for ITS-safe indirect thunk - [Config] enable ITS mitigation - x86/alternative: Optimize returns patching - x86/alternatives: Remove faulty optimization - x86/its: Add support for ITS-safe return thunk - x86/its: Enable Indirect Target Selection mitigation - x86/its: Add "vmexit" option to skip mitigation on some CPUs - x86/its: Align RETs in BHB clear sequence to avoid thunking - x86/its: Use dynamic thunks for indirect branches - x86/its: Fix build errors when CONFIG_MODULES=n - x86/its: FineIBT-paranoid vs ITS - dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when interrupted" - btrfs: fix discard worker infinite loop after disabling discard - ACPI: PPTT: Fix processor subtable walk - ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() - ALSA: usb-audio: Add sample rate quirk for Audioengine D1 - ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera - ftrace: Fix preemption accounting for stacktrace trigger command - ftrace: Fix preemption accounting for stacktrace filter command - tracing: samples: Initialize trace_array_printk() with the correct function - phy: Fix error handling in tegra_xusb_port_init - phy: renesas: rcar-gen3-usb2: Set timing registers only once - wifi: mt76: disable napi on driver removal - dmaengine: ti: k3-udma: Add missing locking - dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure instead of a local copy - dmaengine: idxd: fix memory leak in error handling path of idxd_setup_engines - dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups - block: fix direct io NOWAIT flag not work - clocksource/i8253: Use raw_spinlock_irqsave() in clockevent_i8253_disable() - usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control() - selftests/mm: compaction_test: support platform with huge mount of memory - netfilter: nf_tables: pass nft_chain to destroy function, not nft_ctx - netfilter: nf_tables: wait for rcu grace period on net_device removal - netfilter: nf_tables: do not defer rule destruction via call_rcu - x86/modules: Set VM_FLUSH_RESET_PERMS in module_alloc() - Linux 5.15.184 * Jammy update: v5.15.184 upstream stable release (LP: #2112581) // CVE-2022-49063 - ice: arfs: fix use-after-free when freeing @rx_cpu_rmap * Jammy update: v5.15.184 upstream stable release (LP: #2112581) // CVE-2022-49168 - btrfs: do not clean up repair bio if submit fails * Jammy update: v5.15.184 upstream stable release (LP: #2112581) // CVE-2024-46751 - btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info() * Jammy update: v5.15.184 upstream stable release (LP: #2112581) // CVE-2025-22062 - sctp: add mutual exclusion in proc_sctp_do_udp_port() * Jammy update: v5.15.184 upstream stable release (LP: #2112581) // CVE-2024-53203 - usb: typec: fix potential array underflow in ucsi_ccg_sync_control() * Jammy update: v5.15.184 upstream stable release (LP: #2112581) // CVE-2024-35790 - usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group * Jammy update: v5.15.184 upstream stable release (LP: #2112581) // CVE-2025-37967 - usb: typec: ucsi: displayport: Fix deadlock * Jammy update: v5.15.184 upstream stable release (LP: #2112581) // CVE-2025-37992 - net_sched: Flush gso_skb list too during ->change() * Mounting btrfs LVM volumes changes mountpoint location and breaks lsblk output (LP: #2107516) - SAUCE: Revert "btrfs: avoid unnecessary device path update for the same device" * Jammy update: v5.15.183 upstream stable release (LP: #2111705) - can: mcan: m_can_class_unregister(): fix order of unregistration calls - can: mcp251xfd: mcp251xfd_remove(): fix order of unregistration calls - openvswitch: Fix unsafe attribute parsing in output_userspace() - gre: Fix again IPv6 link-local address generation. - can: gw: use call_rcu() instead of costly synchronize_rcu() - rcu/kvfree: Add kvfree_rcu_mightsleep() and kfree_rcu_mightsleep() - can: gw: fix RCU/BH usage in cgw_create_job() - net: dsa: b53: allow leaky reserved multicast - net: dsa: b53: fix clearing PVID of a port - net: dsa: b53: fix flushing old pvid VLAN on pvid change - net: dsa: b53: fix VLAN ID for untagged vlan on bridge leave - net: dsa: b53: always rejoin default untagged VLAN on bridge leave - net: dsa: b53: fix learning on VLAN unaware bridges - Input: synaptics - enable InterTouch on Dynabook Portege X30-D - Input: synaptics - enable InterTouch on Dynabook Portege X30L-G - Input: synaptics - enable InterTouch on Dell Precision M3800 - Input: synaptics - enable SMBus for HP Elitebook 850 G1 - Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5 - staging: iio: adc: ad7816: Correct conditional logic for store mode - staging: axis-fifo: Remove hardware resets for user errors - staging: axis-fifo: Correct handling of tx_fifo_depth for size validation - iio: adc: ad7606: fix serial register access - iio: adis16201: Correct inclinometer channel resolution - drm/amd/display: Fix wrong handling for AUX_DEFER case - usb: uhci-platform: Make the clock really optional - module: ensure that kobject_put() is safe for module type kobjects - ocfs2: switch osb->disable_recovery to enum - ocfs2: implement handshaking with ocfs2 recovery thread - ocfs2: stop quota recovery before disabling quotas - usb: cdnsp: Fix issue with resuming from L1 - usb: cdnsp: fix L1 resume issue for RTL_REVISION_NEW_LPM version - usb: gadget: tegra-xudc: ACK ST_RC after clearing CTRL_RUN - usb: host: tegra: Prevent host controller crash when OTG port is used - usb: typec: tcpm: delay SNK_TRY_WAIT_DEBOUNCE to SRC_TRYWAIT transition - usb: typec: ucsi: displayport: Fix NULL pointer access - USB: usbtmc: use interruptible sleep in usbtmc_read - usb: usbtmc: Fix erroneous get_stb ioctl error returns - usb: usbtmc: Fix erroneous wait_srq ioctl return - usb: usbtmc: Fix erroneous generic_read ioctl return - types: Complement the aligned types with signed 64-bit one - iio: adc: dln2: Use aligned_s64 for timestamp - MIPS: Fix MAX_REG_OFFSET - drm/panel: simple: Update timings for AUO G101EVN010 - nvme: unblock ctrl state transition for firmware update - do_umount(): add missing barrier before refcount checks in sync case - x86/bpf: Call branch history clearing sequence on exit - x86/bpf: Add IBHF call at end of classic BPF - x86/bhi: Do not set BHI_DIS_S in 32-bit mode - Linux 5.15.183 * Jammy update: v5.15.183 upstream stable release (LP: #2111705) // CVE-2025-37949 - xenbus: Use kref to track req lifetime * Jammy update: v5.15.183 upstream stable release (LP: #2111705) // CVE-2025-37969 - iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo * Jammy update: v5.15.183 upstream stable release (LP: #2111705) // CVE-2025-37970 - iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo * Jammy update: v5.15.183 upstream stable release (LP: #2111705) // CVE-2025-37964 - x86/mm: Eliminate window where TLB flushes may be inadvertently skipped * Jammy update: v5.15.182 upstream stable release (LP: #2111618) - ALSA: usb-audio: Add second USB ID for Jabra Evolve 65 headset - EDAC/altera: Test the correct error reg offset - EDAC/altera: Set DDR and SDMMC interrupt mask before registration - i2c: imx-lpi2c: Fix clock count when probe defers - arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays - amd-xgbe: Fix to ensure dependent features are toggled with RX checksum offload - mmc: renesas_sdhi: Fix error handling in renesas_sdhi_probe - dm-integrity: fix a warning on invalid table line - dm: always update the array size in realloc_argv on success - iommu/vt-d: Apply quirk_iommu_igfx for 8086:0044 (QM57/QS57) - net/mlx5: E-Switch, Initialize MAC Address for Default GID - net/mlx5: E-switch, Fix error handling for enabling roce - net: ethernet: mtk-star-emac: separate tx/rx handling with two NAPIs - net: ethernet: mtk-star-emac: fix spinlock recursion issues on rx/tx poll - net: ethernet: mtk-star-emac: rearm interrupts in rx_poll only when advised - ice: Refactor promiscuous functions - net: dlink: Correct endianness handling of led_mode - net: ipv6: fix UDPv6 GSO segmentation with NAT - bnxt_en: Fix coredump logic to free allocated buffer - bnxt_en: Fix ethtool -d byte order for 32-bit values - nvme-tcp: fix premature queue removal and I/O failover - net: fec: ERR007885 Workaround for conventional TX - net: hns3: store rx VLAN tag offload state for VF - net: hns3: add support for external loopback test - net: hns3: fix an interrupt residual problem - net: hns3: fixed debugfs tm_qset size - net: hns3: defer calling ptp_clock_register() - PCI: imx6: Skip controller_id generation logic for i.MX7D - net: hns3: fix deadlock issue when externel_lb and reset are executed together - ARM: dts: opos6ul: add ksz8081 phy properties - Revert "drm/meson: vclk: fix calculation of 59.94 fractional rates" - irqchip/gic-v2m: Add const to of_device_id - irqchip/gic-v2m: Mark a few functions __init - iommu/arm-smmu-v3: Use the new rb tree helpers - iommu/arm-smmu-v3: Fix iommu_device_probe bug due to duplicated stream ids - dm: fix copying after src array boundaries - Linux 5.15.182 * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2022-21546 - scsi: target: Fix WRITE_SAME No Data Buffer crash * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37819 - irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37905 - firmware: arm_scmi: Balance device refcount when destroying devices * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2024-38541 - of: module: add buffer overflow check in of_modalias() * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37909 - net: lan743x: Fix memleak issue when GSO enabled * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37911 - bnxt_en: Fix out-of-bound memcpy() during ethtool -w * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37912 - ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37913 - net_sched: qfq: Fix double list add in class with netem as child qdisc * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37914 - net_sched: ets: Fix double list add in class with netem as child qdisc * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37915 - net_sched: drr: Fix double list add in class with netem as child qdisc * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2024-26739 - net/sched: act_mirred: don't override retval if we already lost the skb * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-21839 - KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37923 - tracing: Fix oob write in trace_seq_to_buffer() * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37927 - iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37990 - wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37991 - parisc: Fix double SIGFPE crash * Jammy update: v5.15.182 upstream stable release (LP: #2111618) // CVE-2025-37930 - drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) - net: ethtool: Don't call .cleanup_data when prepare_data fails - ata: sata_sx4: Drop pointless VPRINTK() calls and convert the remaining ones - ata: sata_sx4: Add error handling in pdc20621_i2c_read() - nvmet-fcloop: swap list_add_tail arguments - nft_set_pipapo: fix incorrect avx2 match of 5th field octet - umount: Allow superblock owners to force umount - x86/cpu: Don't clear X86_FEATURE_LAHF_LM flag in init_amd_k8() on AMD when running in a virtual machine - perf: arm_pmu: Don't disable counter in armpmu_add() - arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD - xen/mcelog: Add __nonstring annotations for unterminated strings - HID: pidff: Convert infinite length from Linux API to PID standard - HID: pidff: Do not send effect envelope if it's empty - ALSA: hda: intel: Fix Optimus when GPU has no sound - ASoC: fsl_audmix: register card device depends on 'dais' property - ALSA: usb-audio: Fix CME quirk for UF series keyboards - fs/jfs: cast inactags to s64 to prevent potential overflow - ata: libata-eh: Do not use ATAPI DMA for a device limited to PIO mode - ahci: add PCI ID for Marvell 88SE9215 SATA Controller - ext4: protect ext4_release_dquot against freezing - wifi: mt76: mt76x2u: add TP-Link TL-WDN6200 ID to device table - tracing: fix return value in __ftrace_event_enable_disable for TRACE_REG_UNREGISTER - Bluetooth: hci_uart: fix race during initialization - drm: allow encoder mode_set even when connectors change for crtc - drm/amd/display: Update Cursor request mode to the beginning prefetch always - drm: panel-orientation-quirks: Add support for AYANEO 2S - drm: panel-orientation-quirks: Add new quirk for GPD Win 2 - drm/bridge: panel: forbid initializing a panel with unknown connector type - drivers: base: devres: Allow to release group on device release - drm/amdkfd: clamp queue size to minimum - drm/amdkfd: Fix pqm_destroy_queue race with GPU reset - drm/mediatek: mtk_dpi: Explicitly manage TVD clock in power on/off - ktest: Fix Test Failures Due to Missing LOG_FILE Directories - pwm: rcar: Simplify multiplication/shift logic - pwm: rcar: Improve register calculation - pwm: fsl-ftm: Handle clk_get_rate() returning 0 - bpf: Add endian modifiers to fix endian warnings - bpf: support SKF_NET_OFF and SKF_LL_OFF on skb frags - ext4: don't treat fhandle lookup of ea_inode as FS corruption - media: i2c: adv748x: Fix test pattern selection mask - media: vim2m: print device name after registering device - media: siano: Fix error handling in smsdvb_module_init() - xenfs/xensyms: respect hypervisor's "next" indication - arm64: cputype: Add MIDR_CORTEX_A76AE - arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list - arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre BHB - arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe list - spi: cadence-qspi: Fix probe on AM62A LP SK - media: streamzap: prevent processing IR data on URB failure - media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() - media: i2c: ccs: Set the device's runtime PM status correctly in remove - media: i2c: ccs: Set the device's runtime PM status correctly in probe - media: i2c: ov7251: Set enable GPIO low in probe - media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO - mtd: Add check for devm_kcalloc() - net: dsa: mv88e6xxx: workaround RGMII transmit delay erratum for 6320 family - mtd: Replace kcalloc() with devm_kcalloc() - clocksource/drivers/stm32-lptimer: Use wakeup capable instead of init wakeup - wifi: mt76: Add check for devm_kstrdup() - wifi: mac80211: fix integer overflow in hwmp_route_info_get() - ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path - vdpa/mlx5: Fix oversized null mkey longer than 32bit - i3c: master: svc: Use readsb helper for reading MDB - locking/lockdep: Decrease nr_unused_locks if lock unused in zap_class() - lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets - mptcp: only inc MPJoinAckHMacFailure for HMAC failures - mtd: rawnand: Add status chack in r852_ready() - arm64: dts: mediatek: mt8173: Fix disp-pwm compatible string - sparc/mm: disable preemption in lazy mmu mode - mm: add missing release barrier on PGDAT_RECLAIM_LOCKED unlock - mm/hwpoison: do not send SIGBUS to processes with recovered clean pages - thermal/drivers/rockchip: Add missing rk3328 mapping entry - crypto: ccp - Fix check for the primary ASP device - dm-integrity: set ti->error on memory allocation failure - gpio: zynq: Fix wakeup source leaks on device unbind - ntb: use 64-bit arithmetic for the MSI doorbell mask - of/irq: Fix device node refcount leakages in of_irq_count() - of/irq: Fix device node refcount leakage in API irq_of_parse_and_map() - of/irq: Fix device node refcount leakages in of_irq_init() - PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() - PCI: Fix reference leak in pci_alloc_child_bus() - pinctrl: qcom: Clear latched interrupt status when changing IRQ type - arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() lists - ACPI: platform-profile: Fix CFI violation when accessing sysfs files - x86/e820: Fix handling of subpage regions when calculating nosave ranges in e820__register_nosave_regions() - Bluetooth: hci_uart: Fix another race during initialization - scsi: hisi_sas: Start delivery hisi_sas_task_exec() directly - scsi: hisi_sas: Pass abort structure for internal abort - scsi: hisi_sas: Factor out task prep and delivery code - scsi: hisi_sas: Fix setting of hisi_sas_slot.is_internal - scsi: libsas: Delete lldd_clear_aca callback - scsi: libsas: Add struct sas_tmf_task - scsi: hisi_sas: Enable force phy when SATA disk directly connected - wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue() - scsi: iscsi: Fix missing scsi_host_put() in error path - md/raid10: fix missing discard IO accounting - RDMA/usnic: Fix passing zero to PTR_ERR in usnic_ib_pci_probe() - RDMA/hns: Fix wrong maximum DMA segment size - Bluetooth: hci_event: Fix sending MGMT_EV_DEVICE_FOUND for invalid address - Bluetooth: l2cap: Check encryption key size on incoming connection - Revert "wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()" - igc: move ktime snapshot into PTM retry loop - igc: handle the IGC_PTP_ENABLED flag correctly - igc: cleanup PTP module if probe fails - net: b53: enable BPDU reception for management port - net: dsa: avoid refcount warnings when ds->ops->tag_8021q_vlan_del() fails - riscv: Properly export reserved regions in /proc/iomem - riscv: KGDB: Do not inline arch_kgdb_breakpoint() - riscv: KGDB: Remove ".option norvc/.option rvc" for kgdb_compiled_break - cpufreq/sched: Fix the usage of CPUFREQ_NEED_UPDATE_LIMITS - writeback: fix false warning in inode_to_wb() - Revert "PCI: Avoid reset when disabled via sysfs" - ASoC: codecs:lpass-wsa-macro: Fix vi feedback rate - ASoC: codecs:lpass-wsa-macro: Fix logic of enabling vi channels - asus-laptop: Fix an uninitialized variable - nfs: move nfs_fhandle_hash to common include file - nfs: add missing selections of CONFIG_CRC32 - btrfs: correctly escape subvol in btrfs_show_options() - crypto: caam/qi - Fix drv_ctx refcount bug - loop: properly send KOBJ_CHANGED uevent for disk device - loop: LOOP_SET_FD: send uevents for partitions - mm/gup: fix wrongly calculated returned value in fault_in_safe_writeable() - riscv: Avoid fortify warning in syscall_get_arguments() - tracing: Fix filter string testing - perf/x86/intel: Allow to update user space GPRs from PEBS records - perf/x86/intel/uncore: Fix the scale of IIO free running counters on SNR - perf/x86/intel/uncore: Fix the scale of IIO free running counters on ICX - perf/x86/intel/uncore: Fix the scale of IIO free running counters on SPR - drm/repaper: fix integer overflows in repeat functions - drm/amdgpu/dma_buf: fix page_link check - drm/sti: remove duplicate object names - KVM: arm64: Get rid of host SVE tracking/saving - KVM: arm64: Always start with clearing SVE flag on load - KVM: arm64: Discard any SVE state when entering KVM guests - arm64/fpsimd: Track the saved FPSIMD state type separately to TIF_SVE - arm64/fpsimd: Have KVM explicitly say which FP registers to save - arm64/fpsimd: Stop using TIF_SVE to manage register saving in KVM - KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state - KVM: arm64: Remove host FPSIMD saving for non-protected KVM - KVM: arm64: Remove VHE host restore of CPACR_EL1.ZEN - KVM: arm64: Calculate cptr_el2 traps on activating traps - KVM: arm64: Eagerly switch ZCR_EL{1,2} - cpufreq: Reference count policy in cpufreq_update_limits() - kbuild: Add '-fno-builtin-wcslen' - mptcp: sockopt: fix getting IPV6_V6ONLY - misc: pci_endpoint_test: Fix displaying 'irq_type' after 'request_irq' error - misc: pci_endpoint_test: Fix 'irq_type' to convey the correct type - x86/pvh: Call C code via the kernel virtual mapping - landlock: Add the errata interface - nvmet-fc: Remove unused functions - Revert "smb: client: fix use-after-free bug in cifs_debug_data_proc_show()" - smb: client: fix use-after-free bug in cifs_debug_data_proc_show() - blk-cgroup: support to track if policy is online - net: openvswitch: fix race on port output - openvswitch: fix lockup on tx to unregistering netdev with carrier - MIPS: dec: Declare which_prom() as static - MIPS: cevt-ds1287: Add missing ds1287.h include - MIPS: ds1287: Match ds1287_set_base_clock() function types - mm: fix apply_to_existing_page_range() - module: sign with sha512 instead of sha1 by default - media: streamzap: remove unnecessary ir_raw_event_reset and handle - media: streamzap: no need for usb pid/vid in device name - media: streamzap: less chatter - media: streamzap: remove unused struct members - auxdisplay: hd44780: Convert to platform remove callback returning void - auxdisplay: hd44780: Fix an API misuse in hd44780.c - net: dsa: mv88e6xxx: fix VTU methods for 6320 family - soc: samsung: exynos-chipid: avoid soc_device_to_device() - soc: samsung: exynos-chipid: Pass revision reg offsets - iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary return value check - iio: adc: ad7768-1: Fix conversion result sign - backlight: led_bl: Convert to platform remove callback returning void - cifs: print TIDs as hex - cifs: fix integer overflow in match_server() - gpio: tegra186: Force one interrupt per bank - gpio: tegra186: fix resource handling in ACPI probe path - Revert "PCI: Coalesce host bridge contiguous apertures" - PCI: Coalesce host bridge contiguous apertures - PCI: Assign PCI domain IDs by ida_alloc() - ksmbd: Prevent integer overflow in calculation of deadtime - selftests/mm: generate a temporary mountpoint for cgroup filesystem - kmsan: disable strscpy() optimization under KMSAN - string: Add load_unaligned_zeropad() code path to sized_strscpy() - drm/msm/a6xx: Improve gpu recovery sequence - drm/msm/a6xx: Handle GMU prepare-slumber hfi failure - drm/msm/a6xx: Avoid gx gbit halt during rpm suspend - drm/msm/a6xx: Fix stale rpmh votes from GPU - dma/contiguous: avoid warning about unused size_bytes - cpufreq: cppc: Fix invalid return value in .get() callback - iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE - virtio_console: fix missing byte order handling for cols and rows - net: selftests: initialize TCP header and skb payload with zero - drm/amd/display: Fix gpu reset in multidisplay config - KVM: SVM: Allocate IR data using atomic allocation - USB: storage: quirk for ADATA Portable HDD CH94 - mei: me: add panther lake H DID - serial: sifive: lock port in startup()/shutdown() callbacks - USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe - USB: serial: option: add Sierra Wireless EM9291 - USB: serial: simple: add OWON HDS200 series oscilloscope support - usb: chipidea: ci_hdrc_imx: fix call balance of regulator routines - usb: chipidea: ci_hdrc_imx: implement usb_phy_init() error handling - USB: OHCI: Add quirk for LS7A OHCI controller (rev 0x02) - usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive - usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive - USB: VLI disk crashes if LPM is used - USB: wdm: handle IO errors in wdm_wwan_port_start - USB: wdm: wdm_wwan_port_tx_complete mutex in atomic context - USB: wdm: add annotation - MIPS: cm: Detect CM quirks from device tree - clk: check for disabled clock-provider in of_clk_get_hw_from_clkspec() - parisc: PDT: Fix missing prototype warning - s390/tty: Fix a potential memory leak bug - usb: host: max3421-hcd: Add missing spi_device_id table - fs/ntfs3: Fix WARNING in ntfs_extend_initialized_size - usb: dwc3: gadget: Avoid using reserved endpoints on Intel Merrifield - dmaengine: dmatest: Fix dmatest waiting less when interrupted - usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems Running - objtool, ASoC: codecs: wcd934x: Remove potential undefined behavior in wcd934x_slim_irq_handler() - ntb: reduce stack usage in idt_scan_mws - sched/isolation: Make CONFIG_CPU_ISOLATION depend on CONFIG_SMP - KVM: s390: Don't use %pK through tracepoints - selftests: ublk: fix test_stripe_04 - xen: Change xen-acpi-processor dom0 dependency - nvme: requeue namespace scan on missed AENs - ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls - nvme: re-read ANA log page after ns scan completes - objtool: Stop UNRET validation on UD2 - selftests/mincore: Allow read-ahead pages to reach the end of the file - x86/bugs: Use SBPB in write_ibpb() if applicable - x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline - x86/bugs: Don't fill RSB on context switch with eIBRS - nvmet-fc: take tgtport reference only once - nvmet-fc: put ref when assoc->del_work is already scheduled - ext4: make block validity check resistent to sb bh corruption - scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes - scsi: pm80xx: Set phy_attached to zero when device is gone - loop: aio inherit the ioprio of original request - ubsan: Fix panic from test_ubsan_out_of_bounds - md/raid1: Add check for missing source disk in process_checks() - jfs: define xtree root and page independently - comedi: jr3_pci: Fix synchronous deletion of timer - crypto: atmel-sha204a - Set hwrng quality to lowest possible - net: dsa: mv88e6xxx: fix atu_move_port_mask for 6341 family - net: dsa: mv88e6xxx: enable PVT for 6321 switch - net: dsa: mv88e6xxx: enable .port_set_policy() for 6320 family - xdp: Reset bpf_redirect_info before running a xdp's BPF prog. - MIPS: cm: Fix warning if MIPS_CM is disabled - nvme: fixup scan failure for non-ANA multipath controllers - PCI: Fix use-after-free in pci_bus_release_domain_nr() - PCI: Fix dropping valid root bus resources with .end = zero - PCI: Release resource invalidated by coalescing - Linux 5.15.181 * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-49989 - drm/amd/display: fix double free issue during amdgpu module unload * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37803 - udmabuf: fix a buf size overflow issue during udmabuf creation * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37983 - qibfs: fix _another_ leak * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37881 - usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37805 - sound/virtio: Fix cancel_sync warnings on uninitialized work_structs * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37883 - s390/sclp: Add check for get_zeroed_page() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37808 - crypto: null - Use spin lock instead of mutex * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37985 - USB: wdm: close race between wdm_open and wdm_wwan_port_stop * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37810 - usb: dwc3: gadget: check that event count does not exceed event buffer length * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37811 - usb: chipidea: ci_hdrc_imx: fix usbmisc handling * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37812 - usb: cdns3: Fix deadlock when using NCM gadget * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37885 - KVM: x86: Reset IRTE to host control if *new* route isn't postable * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37817 - mcb: fix a double free bug in chameleon_parse_gdd() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37823 - net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37797 - net_sched: hfsc: Fix a UAF vulnerability in class handling * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37824 - tipc: fix NULL pointer dereference in tipc_mon_reinit_self() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37989 - net: phy: leds: fix memory leak * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37829 - cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37830 - cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37836 - PCI: Fix reference leak in pci_register_host_bridge() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37844 - cifs: avoid NULL pointer dereference in dbg call * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23144 - backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23148 - soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-22027 - media: streamzap: fix race between device disconnection and urb callback * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-50125 - Bluetooth: SCO: Fix UAF on sco_sock_timeout * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2022-49535 - scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-35943 - pmdomain: ti: Add a null pointer check to the omap_prm_domain_init * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-26686 - fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2022-48893 - drm/i915/gt: Cleanup partial engine discovery failures * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-50280 - dm cache: fix flushing uninitialized delayed_work on cache_ctr error * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-54458 - scsi: ufs: bsg: Set bsg_queue to NULL after removal * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-42322 - ipvs: properly dereference pe in ip_vs_add_service * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-49960 - ext4: fix timer use-after-free on failed mount * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-36908 - blk-iocost: do not WARN if iocg was already offlined * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-21853 - bpf: avoid holding freeze_mutex during mmap operation * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-53128 - sched/task_stack: fix object_is_on_stack() for KASAN tagged pointers * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-35867 - smb: client: fix potential UAF in cifs_stats_proc_show() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2023-52757 - smb: client: fix potential deadlock when releasing mids * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-46742 - smb/server: fix potential null-ptr-deref of lease_ctx_info in smb2_open() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2023-52572 - cifs: Fix UAF in cifs_demultiplex_thread() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-35866 - smb: client: fix potential UAF in cifs_dump_full_key() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-46816 - drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-46774 - powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-38540 - bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-27402 - phonet/pep: fix racy skb_queue_empty() use * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-50272 - filemap: Fix bounds checking in filemap_read() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-50258 - net: fix crash when config small gso_max_size/gso_ipv4_max_size * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2024-56751 - ipv6: release nexthop on device removal * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23140 - misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37765 - drm/nouveau: prime: fix ttm_bo_delayed_delete oops * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37766 - drm/amd/pm/powerplay/hwmgr/vega20_thermal: Prevent division by zero * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37767 - drm/amd/pm/swsmu/smu13/smu_v13_0: Prevent division by zero * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37768 - drm/amd/pm/powerplay/hwmgr/smu7_thermal: Prevent division by zero * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37770 - drm/amd/pm/powerplay: Prevent division by zero * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37768 // CVE-2025-37771 - drm/amd/pm: Prevent division by zero * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37773 - virtiofs: add filesystem context source name check * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37780 - isofs: Prevent the use of too small fid * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37781 - i2c: cros-ec-tunnel: defer probe if parent EC is not present * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37782 - hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-0927 has been rejected. Revert this fix and apply upstream fix - Revert "UBUNTU: SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key" * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37871 - nfsd: decrease sc_count directly if fail to queue dl_recall * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37787 - net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37788 - cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37789 - net: openvswitch: fix nested key length validation in the set() action * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37790 - net: mctp: Set SOCK_RCU_FREE * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37875 - igc: fix PTM cycle trigger logic * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37792 - Bluetooth: btrtl: Prevent potential NULL dereference * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37867 - RDMA/core: Silence oversized kvmalloc() warning * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37982 - wifi: wl1251: fix memory leak in wl1251_tx_work * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37794 - wifi: mac80211: Purge vif txq in ieee80211_do_stop() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37796 - wifi: at76c50x: fix use after free access in at76_disconnect * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37838 - HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37940 - ftrace: Add cond_resched() to ftrace_graph_set_hash() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23142 - sctp: detect and prevent references to a freed transport in sendmsg * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37892 - mtd: inftlcore: Add error check for inftl_read_oob() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23145 - mptcp: fix NULL pointer in can_accept_new_subflow * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23146 - mfd: ene-kb3930: Fix a potential NULL pointer dereference * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37839 - jbd2: remove wrong sb->s_sequence check * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23147 - i3c: Add NULL pointer check in i3c_master_queue_ibi() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23150 - ext4: fix off-by-one error in do_split * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23151 - bus: mhi: host: Fix race between unprepare and queue_buf * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23156 - media: venus: hfi_parser: refactor hfi packet parsing logic * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23157 - media: venus: hfi_parser: add check to avoid out of bound access * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37840 - mtd: rawnand: brcmnand: fix PM resume warning * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23158 - media: venus: hfi: add check to handle incorrect queue size * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23159 - media: venus: hfi: add a check to handle OOB in sfr region * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37850 - pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37851 - fbdev: omapfb: Add 'plane' value check * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23161 - PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-23163 - net: vlan: don't propagate flags on open * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37857 - scsi: st: Fix array overflow in st_setup() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37738 - ext4: ignore xattrs past end * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37739 - f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks() * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37740 - jfs: add sanity check for agwidth in dbMount * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37741 - jfs: Prevent copying of nlink with value 0 from disk inode * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37858 - fs/jfs: Prevent integer overflow in AG size calculation * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37742 - jfs: Fix uninit-value access of imap allocated in the diMount() function * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37859 - page_pool: avoid infinite loop to schedule delayed worker * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37862 - HID: pidff: Fix null pointer dereference in pidff_find_fields * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37841 - pm: cpupower: bench: Prevent NULL dereference on malloc failure * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37749 - net: ppp: Add bound checking for skb data on ppp_sync_txmung * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37756 - net: tls: explicitly disallow disconnect * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37757 - tipc: fix memory leak in tipc_link_xmit * Jammy update: v5.15.181 upstream stable release (LP: #2111606) // CVE-2025-37758 - ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe() * CVE-2024-53051 - drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability * CVE-2024-46787 - userfaultfd: fix checks for huge PMDs * CVE-2025-37890 - net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc - sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() - net_sched: hfsc: Address reentrant enqueue adding class to eltree twice * CVE-2025-37997 - netfilter: ipset: fix region locking in hash types * CVE-2025-37798 - sch_htb: make htb_qlen_notify() idempotent - sch_htb: make htb_deactivate() idempotent - sch_drr: make drr_qlen_notify() idempotent - sch_hfsc: make hfsc_qlen_notify() idempotent - sch_qfq: make qfq_qlen_notify() idempotent - sch_ets: make est_qlen_notify() idempotent - codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() * CVE-2025-37750 - smb: client: fix UAF in decryption with multichannel * CVE-2024-53185 - smb: client: fix NULL ptr deref in crypto_aead_setkey() * CVE-2024-50047 - smb: client: fix UAF in async decryption * Packaging resync (LP: #1786013) - [Packaging] update variants - [Packaging] update annotations scripts -- Wei-Lin Chang <weilin.ch...@canonical.com> Tue, 08 Jul 2025 11:38:19 +0800 ** Changed in: linux-xilinx-zynqmp (Ubuntu Jammy) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-21546 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-48893 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-49063 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-49168 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-49535 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-52572 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-52757 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26686 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26739 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-27402 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-35790 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-35866 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-35867 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-35943 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-36908 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38540 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38541 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42322 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-46742 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-46751 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-46774 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-46787 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-46816 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-49960 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-49989 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50047 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50125 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50258 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50272 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50280 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53051 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53128 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53185 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53203 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-54458 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56751 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-0927 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21839 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21853 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22027 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22062 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23140 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23142 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23144 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23145 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23146 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23147 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23148 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23150 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23151 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23156 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23157 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23158 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23159 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23161 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23163 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37738 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37739 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37740 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37741 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37742 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37749 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37750 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37756 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37757 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37758 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37765 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37766 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37767 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37768 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37770 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37771 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37773 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37780 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37781 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37782 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37787 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37788 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37789 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37790 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37792 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37794 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37796 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37797 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37798 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37803 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37805 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37808 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37810 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37811 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37812 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37817 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37819 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37823 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37824 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37829 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37830 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37836 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37838 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37839 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37840 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37841 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37844 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37850 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37851 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37857 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37858 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37859 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37862 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37867 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37871 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37875 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37881 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37883 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37885 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37890 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37892 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37905 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37909 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37911 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37912 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37913 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37914 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37915 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37923 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37927 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37930 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37940 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37949 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37964 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37967 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37969 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37970 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37982 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37983 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37985 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37989 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37990 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37991 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37992 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37997 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2115849 Title: Fix kernel crash in V4L module on exit of realsense application To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/+bug/2115849/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs