UbuntuUpdates.org

Package "linux-image-unsigned-5.6.0-1057-oem"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-image-unsigned-5.6.0-1057-oem

Description:

Linux kernel image for version 5.6.0 on 64 bit x86 SMP

Latest version: 5.6.0-1057.61
Release: focal (20.04)
Level: base
Repository: main
Head package: linux-oem-5.6

Links


Download "linux-image-unsigned-5.6.0-1057-oem"


Other versions of "linux-image-unsigned-5.6.0-1057-oem" in Focal

No other version of this package is available in the Focal release.

Changelog

Version: *DELETED* 2021-03-12 01:08:04 UTC
No changelog for deleted or moved packages.

Version: 5.6.0-1049.53 2021-02-26 05:08:05 UTC

 linux-oem-5.6 (5.6.0-1049.53) focal; urgency=medium
 .
   * focal/linux-oem-5.6: 5.6.0-1049.53 -proposed tracker (LP: #1916171)
 .
   * CVE-2020-25668
     - tty: make FONTX ioctl use the tty pointer they were actually passed
 .
   * Focal update: v5.4.73 upstream stable release (LP: #1902115) //
     CVE-2020-25705
     - icmp: randomize the global rate limiter
 .
   * CVE-2020-27675
     - xen/events: avoid removing an event channel while handling it
 .
   * CVE-2020-25656
     - vt: keyboard, simplify vt_kdgkbsent
     - vt: keyboard, extend func_buf_lock to readers
 .
   * CVE-2021-20239
     - net, sctp, filter: remap copy_from_user failure error

Source diff to previous version
1902115 Focal update: v5.4.73 upstream stable release
CVE-2020-25668 concurrency use-after-free in vt
CVE-2020-25705 A flaw in the way reply ICMP packets are limited in the Linux kernel functionality was found that allows to quickly scan open UDP ports. This flaw al
CVE-2020-27675 An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel rem
CVE-2020-25656 A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local u
CVE-2021-20239 Untrusted Pointer Dereference in setsockopt system call

Version: 5.6.0-1048.52 2021-02-18 16:08:00 UTC

 linux-oem-5.6 (5.6.0-1048.52) focal; urgency=medium
 .
   * focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker (LP: #1913153)
 .
   * Packaging resync (LP: #1786013)
     - update dkms package versions
 .
   * udpgro.sh in net from ubuntu_kernel_selftests seems not reflecting sub-test
     result (LP: #1908499)
     - selftests: fix the return value for UDP GRO test
 .
   * CVE-2020-27815
     - jfs: Fix array index bounds check in dbAdjTree
 .
   * CVE-2020-25704
     - perf/core: Fix a memory leak in perf_event_parse_addr_filter()
 .
   * CVE-2020-25643
     - hdlc_ppp: add range checks in ppp_cp_parse_cr()
 .
   * CVE-2020-25641
     - block: allow for_each_bvec to support zero len bvec
 .
   * CVE-2020-25284
     - rbd: require global CAP_SYS_ADMIN for mapping and unmapping
 .
   * CVE-2020-25212
     - nfs: Fix getxattr kernel panic and memory overflow
 .
   * CVE-2020-28588
     - lib/syscall: fix syscall registers retrieval on 32-bit platforms
 .
   * CVE-2020-29371
     - romfs: fix uninitialized memory leak in romfs_dev_read()
 .
   * CVE-2020-29369
     - mm/mmap.c: close race between munmap() and expand_upwards()/downwards()
 .
   * CVE-2020-29368
     - mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()
 .
   * CVE-2020-29660
     - tty: Fix ->session locking
 .
   * CVE-2020-29661
     - tty: Fix ->pgrp locking in tiocspgrp()
 .
   * CVE-2020-35508
     - fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent
 .
   * CVE-2020-24490
     - Bluetooth: fix kernel oops in store_pending_adv_report
 .
   * CVE-2020-14314
     - ext4: fix potential negative array index in do_split()
 .
   * CVE-2020-10135
     - Bluetooth: Consolidate encryption handling in hci_encrypt_cfm
     - Bluetooth: Disconnect if E0 is used for Level 4
 .
   * CVE-2020-27152
     - KVM: ioapic: break infinite recursion on lazy EOI
 .
   * CVE-2020-28915
     - fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h
     - Fonts: Support FONT_EXTRA_WORDS macros for built-in fonts
 .
   * CVE-2020-15437
     - serial: 8250: fix null-ptr-deref in serial8250_start_tx()
 .
   * CVE-2020-15436
     - block: Fix use-after-free in blkdev_get()
 .
   * switch to an autogenerated nvidia series based core via dkms-versions
     (LP: #1912803)
     - [Config] dkms-versions -- add transitional/skip information for nvidia
       packages
     - [Packaging] nvidia -- use dkms-versions to define versions built
     - [Packaging] update-version-dkms -- maintain flags fields
 .
   * S3 stress test fails with amdgpu errors (LP: #1909453)
     - drm/amdgpu: asd function needs to be unloaded in suspend phase
     - drm/amdgpu: add TMR destory function for psp

Source diff to previous version
1786013 Packaging resync
1908499 udpgro.sh in net from ubuntu_kernel_selftests seems not reflecting sub-test result
1912803 switch to an autogenerated nvidia series based core via dkms-versions
1909453 S3 stress test fails with amdgpu errors
CVE-2020-25704 A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could u
CVE-2020-25643 A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper i
CVE-2020-25641 A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsyst
CVE-2020-25284 The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, w
CVE-2020-25212 A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspeci
CVE-2020-28588 lib/syscall: fix syscall registers retrieval on 32-bit platforms
CVE-2020-29371 An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bc
CVE-2020-29369 An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards
CVE-2020-29368 An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintend
CVE-2020-29660 A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctr
CVE-2020-29661 A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack agai
CVE-2020-24490 Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all
CVE-2020-14314 A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with
CVE-2020-10135 Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated use
CVE-2020-27152 An issue was discovered in ioapic_lazy_update_eoi in arch/x86/kvm/ioapic.c in the Linux kernel before 5.9.2. It has an infinite loop related to impro
CVE-2020-28915 A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel mem
CVE-2020-15437 The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() th
CVE-2020-15436 Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by l

Version: 5.6.0-1047.51 2021-02-05 21:08:44 UTC

 linux-oem-5.6 (5.6.0-1047.51) focal; urgency=medium
 .
   * focal/linux-oem-5.6: 5.6.0-1047.51 -proposed tracker (LP: #1914751)
 .
   * Exploitable vulnerabilities in AF_VSOCK implementation (LP: #1914668)
     - vsock: fix the race conditions in multi-transport support

Source diff to previous version
1914668 Exploitable vulnerabilities in AF_VSOCK implementation

Version: 5.6.0-1046.50 2021-02-02 04:08:39 UTC

 linux-oem-5.6 (5.6.0-1046.50) focal; urgency=medium
 .
   * dkms artifacts may expire from the pool (LP: #1850958)
     - [packaging] handle downloads from the librarian better
 .

1850958 dkms artifacts may expire from the pool



About   -   Send Feedback to @ubuntu_updates