UbuntuUpdates.org

Package "linux-modules-5.15.0-134-lowlatency"

Name: linux-modules-5.15.0-134-lowlatency

Description:

Linux kernel extra modules for version 5.15.0 on 64 bit x86 SMP

Latest version: 5.15.0-134.145~20.04.1
Release: focal (20.04)
Level: security
Repository: main
Head package: linux-lowlatency-hwe-5.15

Links


Download "linux-modules-5.15.0-134-lowlatency"


Other versions of "linux-modules-5.15.0-134-lowlatency" in Focal

Repository Area Version
updates main 5.15.0-134.145~20.04.1

Changelog

Version: 5.15.0-134.145~20.04.1 2025-03-05 01:07:00 UTC

  linux-lowlatency-hwe-5.15 (5.15.0-134.145~20.04.1) focal; urgency=medium

  * focal/linux-lowlatency-hwe-5.15: 5.15.0-134.145~20.04.1 -proposed tracker
    (LP: #2097931)

  * Packaging resync (LP: #1786013)
    - [Packaging] debian.lowlatency-hwe-5.15/dkms-versions -- update from kernel-
      versions (main/s2025.01.13)

  [ Ubuntu: 5.15.0-134.145 ]

  * jammy/linux-lowlatency: 5.15.0-134.145 -proposed tracker (LP: #2097932)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.lowlatency/dkms-versions -- update from kernel-versions
      (main/s2025.01.13)
  * jammy/linux: 5.15.0-134.145 -proposed tracker (LP: #2097944)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/s2025.01.13)
  * CVE-2024-56672
    - blk-cgroup: Fix UAF in blkcg_unpin_online()

 -- Stefan Bader <email address hidden> Mon, 17 Feb 2025 14:24:02 +0100

Source diff to previous version
1786013 Packaging resync
CVE-2024-56672 In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the b

Version: 5.15.0-133.143~20.04.1 2025-02-25 03:06:53 UTC

  linux-lowlatency-hwe-5.15 (5.15.0-133.143~20.04.1) focal; urgency=medium

  [ Ubuntu: 5.15.0-133.143 ]

  * CVE-2025-0927
    - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key

Source diff to previous version

Version: 5.15.0-131.141~20.04.1 2025-01-28 15:06:56 UTC

  linux-lowlatency-hwe-5.15 (5.15.0-131.141~20.04.1) focal; urgency=medium

  * focal/linux-lowlatency-hwe-5.15: 5.15.0-131.141~20.04.1 -proposed tracker
    (LP: #2093560)

  [ Ubuntu: 5.15.0-131.141 ]

  * jammy/linux-lowlatency: 5.15.0-131.141 -proposed tracker (LP: #2093561)
  * jammy/linux: 5.15.0-131.141 -proposed tracker (LP: #2093573)
  * CVE-2024-53164
    - net: sched: fix ordering of qlen adjustment
  * CVE-2024-53141
    - netfilter: ipset: add missing range check in bitmap_ip_uadt
  * CVE-2024-53103
    - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer

 -- Stefan Bader <email address hidden> Thu, 16 Jan 2025 16:14:18 +0100

Source diff to previous version
CVE-2024-53164 In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch->q.qlen around qdisc
CVE-2024-53141 In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_
CVE-2024-53103 In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs

Version: 5.15.0-129.139~20.04.1 2025-01-06 12:07:24 UTC

  linux-lowlatency-hwe-5.15 (5.15.0-129.139~20.04.1) focal; urgency=medium

  * focal/linux-lowlatency-hwe-5.15: 5.15.0-129.139~20.04.1 -proposed tracker
    (LP: #2092118)

  [ Ubuntu: 5.15.0-129.139 ]

  * jammy/linux-lowlatency: 5.15.0-129.139 -proposed tracker (LP: #2092119)
  * jammy/linux: 5.15.0-130.140 -proposed tracker (LP: #2092132)
  * ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel
    5.15.0-127.137 (LP: #2091990)
    - netfilter: xtables: fix typo causing some targets not to load on IPv6

 -- Mehmet Basaran <email address hidden> Thu, 19 Dec 2024 00:35:22 +0300

Source diff to previous version
2091990 ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel 5.15.0-127.137

Version: 5.15.0-128.138~20.04.1 2024-12-20 01:06:54 UTC

  linux-lowlatency-hwe-5.15 (5.15.0-128.138~20.04.1) focal; urgency=medium

  * focal/linux-lowlatency-hwe-5.15: 5.15.0-128.138~20.04.1 -proposed tracker
    (LP: #2090147)

  [ Ubuntu: 5.15.0-128.138 ]

  * jammy/linux-lowlatency: 5.15.0-128.138 -proposed tracker
    (LP: #2090148)
  * jammy/linux: 5.15.0-128.138 -proposed tracker (LP: #2090163)
  * CVE-2024-50264
    - vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
  * CVE-2024-53057
    - net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
  * CVE-2024-43904
    - drm/amd/display: Add null checks for 'stream' and 'plane' before
      dereferencing
  * CVE-2024-40973
    - media: mtk-vcodec: potential null pointer deference in SCP
  * CVE-2024-38553
    - net: fec: remove .ndo_poll_controller to avoid deadlocks
  * CVE-2024-26822
    - smb: client: set correct id, uid and cruid for multiuser automounts
  * CVE-2020-12351 // CVE-2020-12352 // CVE-2020-24490
    - [Config] Disable BlueZ highspeed support
  * CVE-2024-40910
    - ax25: Fix refcount imbalance on inbound connections
  * CVE-2024-35963
    - Bluetooth: hci_sock: Fix not validating setsockopt user input
  * CVE-2024-35965
    - Bluetooth: L2CAP: Fix not validating setsockopt user input
  * CVE-2024-35966
    - Bluetooth: RFCOMM: Fix not validating setsockopt user input
  * CVE-2024-35967
    - Bluetooth: SCO: Fix not validating setsockopt user input

 -- Stefan Bader <email address hidden> Wed, 04 Dec 2024 16:49:30 +0100

CVE-2024-50264 In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans Du
CVE-2024-53057 In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_bac
CVE-2024-43904 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing
CVE-2024-40973 In the Linux kernel, the following vulnerability has been resolved: media: mtk-vcodec: potential null pointer deference in SCP The return value of
CVE-2024-38553 In the Linux kernel, the following vulnerability has been resolved: net: fec: remove .ndo_poll_controller to avoid deadlocks There is a deadlock is
CVE-2024-26822 In the Linux kernel, the following vulnerability has been resolved: smb: client: set correct id, uid and cruid for multiuser automounts When uid, g
CVE-2020-12351 Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
CVE-2020-12352 Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
CVE-2020-24490 Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all
CVE-2024-40910 In the Linux kernel, the following vulnerability has been resolved: ax25: Fix refcount imbalance on inbound connections When releasing a socket in
CVE-2024-35963 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sock: Fix not validating setsockopt user input Check user input
CVE-2024-35965 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix not validating setsockopt user input Check user input len
CVE-2024-35966 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: Fix not validating setsockopt user input syzbot reported rfc
CVE-2024-35967 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix not validating setsockopt user input syzbot reported sco_so



About   -   Send Feedback to @ubuntu_updates