Package "linux"
Name: |
linux
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Linux kernel buildinfo for version 5.4.0 on 64 bit x86 SMP
- Linux kernel buildinfo for version 5.4.0 on 64 bit x86 SMP
- Linux kernel buildinfo for version 5.4.0 on 64 bit x86 SMP
- Linux kernel buildinfo for version 5.4.0 on 64 bit x86 SMP
|
Latest version: |
5.4.0-214.234 |
Release: |
focal (20.04) |
Level: |
base |
Repository: |
main |
Links
Other versions of "linux" in Focal
Packages in group
Deleted packages are displayed in grey.
Changelog
linux (5.4.0-214.234) focal; urgency=medium
.
* focal/linux: 5.4.0-214.234 -proposed tracker (LP: #2102635)
.
* CVE-2024-50256
- netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
.
* CVE-2025-21702
- pfifo_tail_enqueue: Drop new packet when sch->limit == 0
.
* CVE-2025-21703
- netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
.
* CVE-2024-26915
- drm/amdgpu: Reset IH OVERFLOW_CLEAR bit
.
* CVE-2025-21700
- net: sched: Disallow replacing of child qdisc from one parent to another
.
* CVE-2024-46826
- ELF: fix kernel.randomize_va_space double read
.
* CVE-2024-56651
- can: hi311x: hi3110_can_ist(): fix potential use-after-free
.
* CVE-2024-53237
- driver core: Introduce device_find_any_child() helper
- Bluetooth: fix use-after-free in device_for_each_child()
.
* CVE-2024-35958
- net: ena: Fix incorrect descriptor free behavior
.
* CVE-2024-49974
- NFSD: Limit the number of concurrent async COPY operations
.
* CVE-2021-47119
- ext4: fix memory leak in ext4_fill_super
.
* CVE-2024-56658
- net: defer final 'struct net' free in netns dismantle
.
* CVE-2024-35864
- smb: client: fix potential UAF in smb2_is_valid_lease_break()
.
* CVE-2024-35864/CVE-2024-26928
- smb: client: fix potential UAF in cifs_debug_files_proc_show()
|
Source diff to previous version |
CVE-2024-50256 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() I got a syzb |
CVE-2025-21702 |
In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 Expected behaviour: In |
CVE-2025-21703 |
In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_ |
CVE-2024-26915 |
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit Allows us to detect subsequent IH ring |
CVE-2025-21700 |
In the Linux kernel, the following vulnerability has been resolved: net: sched: Disallow replacing of child qdisc from one parent to another Lion A |
CVE-2024-46826 |
In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses "randomize_va_sp |
CVE-2024-56651 |
In the Linux kernel, the following vulnerability has been resolved: can: hi311x: hi3110_can_ist(): fix potential use-after-free The commit a22bd630 |
CVE-2024-53237 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: fix use-after-free in device_for_each_child() Syzbot has reported th |
CVE-2024-35958 |
In the Linux kernel, the following vulnerability has been resolved: net: ena: Fix incorrect descriptor free behavior ENA has two types of TX queues |
CVE-2024-49974 |
In the Linux kernel, the following vulnerability has been resolved: NFSD: Limit the number of concurrent async COPY operations Nothing appears to l |
CVE-2021-47119 |
In the Linux kernel, the following vulnerability has been resolved: ext4: fix memory leak in ext4_fill_super Buffer head references must be release |
CVE-2024-56658 |
In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use- |
CVE-2024-35864 |
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions tha |
CVE-2024-26928 |
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions th |
|
linux (5.4.0-211.231) focal; urgency=medium
.
* focal/linux: 5.4.0-211.231 -proposed tracker (LP: #2101996)
.
* cve-2018-5803 kernel panic (LP: #2101091)
- SAUCE: sctp: sysctl: pass right argument to container_of
.
|
Source diff to previous version |
|
linux (5.4.0-210.230) focal; urgency=medium
.
* focal/linux: 5.4.0-210.230 -proposed tracker (LP: #2098353)
.
* Focal update: v5.4.290 upstream stable release (LP: #2098439)
- jbd2: flush filesystem device before updating tail sequence
- dm array: fix releasing a faulty array block twice in dm_array_cursor_end
- dm array: fix unreleased btree blocks on closing a faulty array cursor
- dm array: fix cursor index when skipping across block boundaries
- ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe()
- net: 802: LLC+SNAP OID:PID lookup on start of skb data
- tcp/dccp: complete lockless accesses to sk->sk_max_ack_backlog
- tcp/dccp: allow a connection when sk_max_ack_backlog is zero
- net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
- tls: Fix tls_sw_sendmsg error handling
- dm thin: make get_first_thin use rcu-safe list first function
- sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
- sctp: sysctl: auth_enable: avoid using current->nsproxy
- drm/amd/display: Add check for granularity in dml ceil/floor helpers
- ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[]
- ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[]
- drm/amd/display: increase MAX_SURFACES to the value supported by hw
- USB: serial: option: add MeiG Smart SRM815
- USB: serial: option: add Neoway N723-EA support
- staging: iio: ad9834: Correct phase range check
- staging: iio: ad9832: Correct phase range check
- usb-storage: Add max sectors quirk for Nokia 208
- USB: serial: cp210x: add Phoenix Contact UPS Device
- usb: gadget: u_serial: Disable ep before setting port to null to fix the
crash caused by port being null
- USB: usblp: return error when setting unsupported protocol
- USB: core: Disable LPM only for non-suspended ports
- usb: fix reference leak in usb_new_device()
- usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
- iio: pressure: zpa2326: fix information leak in triggered buffer
- iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered
buffer
- iio: light: vcnl4035: fix information leak in triggered buffer
- iio: imu: kmx61: fix information leak in triggered buffer
- iio: adc: ti-ads8688: fix information leak in triggered buffer
- iio: gyro: fxas21002c: Fix missing data update in trigger handler
- iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep()
- iio: adc: at91: call input_free_device() on allocated iio_dev
- iio: inkern: call iio_device_put() only on mapped devices
- arm64: dts: rockchip: fix defines in pd_vio node for rk3399
- arm64: dts: rockchip: fix pd_tcpc0 and pd_tcpc1 node position on rk3399
- arm64: dts: rockchip: add #power-domain-cells to power domain nodes
- arm64: dts: rockchip: add hevc power domain clock to rk3328
- phy: core: fix code style in devm_of_phy_provider_unregister
- phy: core: Fix that API devm_of_phy_provider_unregister() fails to
unregister the phy provider
- ocfs2: correct return value of ocfs2_local_free_info()
- ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
- sctp: sysctl: rto_min/max: avoid using current->nsproxy
- net: ethernet: ti: cpsw_ale: Fix cpsw_ale_get_field()
- net: net_namespace: Optimize the code
- net: add exit_batch_rtnl() method
- gtp: use exit_batch_rtnl() method
- gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp().
- gtp: Destroy device along with udp socket's netns dismantle.
- nfp: bpf: prevent integer overflow in nfp_bpf_event_output()
- drm/v3d: Ensure job pointer is set to NULL after job completion
- i2c: mux: demux-pinctrl: check initial mux selection, too
- mac802154: check local interfaces before deleting sdata list
- hfs: Sanity check the root record
- kheaders: Ignore silly-rename files
- poll_wait: add mb() to fix theoretical race between waitqueue_active() and
.poll()
- nvmet: propagate npwg topology
- net: ethernet: xgbe: re-add aneg to supported features in PHY quirks
- fs/proc: fix softlockup in __read_vmcore (part 2)
- irqchip/gic-v3: Handle CPU_PM_ENTER_FAILED correctly
- hrtimers: Handle CPU state correctly on hotplug
- ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
- scsi: sg: Fix slab-use-after-free read in sg_release()
- net: fix data-races around sk->sk_forward_alloc
- ASoC: wm8994: Add depends on MFD core
- scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request
- irqchip/sunxi-nmi: Add missing SKIP_WAKE flag
- gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
- m68k: Update ->thread.esp0 before calling syscall_trace() in ret_from_signal
- m68k: Add missing mmap_read_lock() to sys_cacheflush()
- signal/m68k: Use force_sigsegv(SIGSEGV) in fpsp040_die
- net: xen-netback: hash.c: Use built-in RCU list checking
- net/xen-netback: prevent UAF in xenvif_flush_hash()
- vfio/platform: check the bounds of read/write syscalls
- ext4: avoid ext4_error()'s caused by ENOMEM in the truncate path
- ext4: fix slab-use-after-free in ext4_split_extent_at()
- USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
- Revert "usb: gadget: u_serial: Disable ep before setting port to null to fix
the crash caused by port being null"
- Input: atkbd - map F23 key to support default copilot shortcut
- Input: xpad - add unofficial Xbox 360 wireless receiver clone
- Input: xpad - add support for wooting two he (arm)
- drm/v3d: Assign job pointer to NULL before signaling the fence
- xhci: use pm_ptr() instead of #ifdef for CONFIG_PM conditionals
- Partial revert of xhci: use pm_ptr() inste
|
Source diff to previous version |
2098439 |
Focal update: v5.4.290 upstream stable release |
2095376 |
net: stmmac: kernel continually prints wol unbalance irq warning |
2095437 |
Focal update: v5.4.289 upstream stable release |
2095199 |
Focal update: v5.4.288 upstream stable release |
2095145 |
Focal update: v5.4.287 upstream stable release |
CVE-2021-47219 |
In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() The following i |
CVE-2024-49925 |
In the Linux kernel, the following vulnerability has been resolved: fbdev: efifb: Register sysfs groups through driver core The driver core can reg |
CVE-2024-56614 |
In the Linux kernel, the following vulnerability has been resolved: xsk: fix OOB map writes when deleting elements Jordy says: " In the xsk_map_de |
CVE-2024-44938 |
In the Linux kernel, the following vulnerability has been resolved: jfs: Fix shift-out-of-bounds in dbDiscardAG When searching for the next smaller |
CVE-2024-43900 |
In the Linux kernel, the following vulnerability has been resolved: media: xc2028: avoid use-after-free in load_firmware_cb() syzkaller reported us |
CVE-2024-38588 |
In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix possible use-after-free issue in ftrace_location() KASAN reports a |
CVE-2024-23848 |
In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/ |
|
linux (5.4.0-208.228) focal; urgency=medium
.
* CVE-2025-0927
- SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key
.
|
Source diff to previous version |
linux (5.4.0-207.227) focal; urgency=medium
.
* focal/linux: 5.4.0-207.227 -proposed tracker (LP: #2095347)
.
* Remove "ftrace: Fix possible use-after-free issue in ftrace_location()" bad
commit from focal (LP: #2095348)
- Revert "ftrace: Fix possible use-after-free issue in ftrace_location()"
.
|
|
About
-
Send Feedback to @ubuntu_updates