UbuntuUpdates.org

Package "linux-tools-common"

Name: linux-tools-common

Description:

Linux kernel version specific tools for version 5.4.0

Latest version: 5.4.0-212.232
Release: focal (20.04)
Level: security
Repository: main
Head package: linux

Links


Download "linux-tools-common"


Other versions of "linux-tools-common" in Focal

Repository Area Version
base main 5.4.0-26.30
updates main 5.4.0-212.232
proposed main 5.4.0-214.234
PPA: Canonical Kernel Team 5.4.0-214.234

Changelog

Version: 5.4.0-212.232 2025-03-31 23:07:08 UTC

  linux (5.4.0-212.232) focal; urgency=medium

  * focal/linux: 5.4.0-212.232 -proposed tracker (LP: #2102367)

  * CVE-2024-56658
    - net: defer final 'struct net' free in netns dismantle

  * CVE-2024-35864
    - smb: client: fix potential UAF in smb2_is_valid_lease_break()

  * CVE-2024-35864/CVE-2024-26928
    - smb: client: fix potential UAF in cifs_debug_files_proc_show()

 -- Manuel Diewald <email address hidden> Fri, 14 Mar 2025 18:48:36 +0100

Source diff to previous version
CVE-2024-56658 In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-
CVE-2024-35864 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions tha
CVE-2024-26928 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions th

Version: 5.4.0-211.231 2025-03-26 18:07:04 UTC

  linux (5.4.0-211.231) focal; urgency=medium

  * focal/linux: 5.4.0-211.231 -proposed tracker (LP: #2101996)

  * cve-2018-5803 kernel panic (LP: #2101091)
    - SAUCE: sctp: sysctl: pass right argument to container_of

Source diff to previous version
2101091 cve-2018-5803 kernel panic

Version: 5.4.0-208.228 2025-02-25 03:06:53 UTC

  linux (5.4.0-208.228) focal; urgency=medium

  * CVE-2025-0927
    - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key

Source diff to previous version

Version: 5.4.0-205.225 2025-01-28 00:06:53 UTC

  linux (5.4.0-205.225) focal; urgency=medium

  * focal/linux: 5.4.0-205.225 -proposed tracker (LP: #2093621)

  * Hold IOPOLL locks when triggering io_uring's deferred work (LP: #2078659) //
    CVE-2023-21400
    - io_uring: remove extra check in __io_commit_cqring
    - io_uring: dont kill fasync under completion_lock
    - io_uring: ensure IOPOLL locks around deferred work

  * CVE-2024-40967
    - iopoll: introduce read_poll_timeout macro
    - iopoll: Introduce read_poll_timeout_atomic macro
    - serial: imx: Introduce timeout when waiting on transmitter empty

  * CVE-2024-53164
    - net: sched: fix ordering of qlen adjustment

  * CVE-2024-53141
    - netfilter: ipset: add missing range check in bitmap_ip_uadt

  * CVE-2024-53103
    - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer

 -- Manuel Diewald <email address hidden> Fri, 10 Jan 2025 22:28:21 +0100

Source diff to previous version
2078659 Hold IOPOLL locks when triggering io_uring's deferred work
CVE-2023-21400 In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of pr
CVE-2024-40967 In the Linux kernel, the following vulnerability has been resolved: serial: imx: Introduce timeout when waiting on transmitter empty By waiting at
CVE-2024-53164 In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch->q.qlen around qdisc
CVE-2024-53141 In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_
CVE-2024-53103 In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs

Version: 5.4.0-204.224 2024-12-17 01:06:59 UTC

  linux (5.4.0-204.224) focal; urgency=medium

  * focal/linux: 5.4.0-204.224 -proposed tracker (LP: #2091090)

  * CVE-2024-50264
    - vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans

  * CVE-2024-53057
    - net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT

  * CVE-2024-49967
    - ext4: no need to continue when the number of entries is 1

  * CVE-2024-43892
    - memcg: protect concurrent access to mem_cgroup_idr

  * CVE-2024-38553
    - net: fec: remove .ndo_poll_controller to avoid deadlocks

  * CVE-2024-38597
    - eth: sungem: remove .ndo_poll_controller to avoid deadlocks

  * CVE-2023-52821
    - drm/panel: fix a possible null pointer dereference

  * CVE-2024-36952
    - scsi: lpfc: Move NPIV's transport unregistration to after resource clean up

  * CVE-2024-40910
    - ax25: Fix refcount imbalance on inbound connections

  * CVE-2024-35963
    - Bluetooth: hci_sock: Fix not validating setsockopt user input

  * CVE-2024-35965
    - Bluetooth: L2CAP: uninitialized variables in l2cap_sock_setsockopt()
    - Bluetooth: L2CAP: Fix not validating setsockopt user input

  * CVE-2024-35966
    - Bluetooth: RFCOMM: Fix not validating setsockopt user input

  * CVE-2024-35967
    - Bluetooth: SCO: Fix not validating setsockopt user input

  * CVE-2021-47101
    - net: asix: fix uninit value bugs
    - asix: fix wrong return value in asix_check_host_enable()
    - asix: fix uninit-value in asix_mdio_read()

  * CVE-2022-38096
    - drm/vmwgfx: Fix possible null pointer derefence with invalid contexts

  * CVE-2021-47001
    - xprtrdma: Fix cwnd update ordering

 -- Manuel Diewald <email address hidden> Thu, 05 Dec 2024 12:35:34 +0100

CVE-2024-50264 In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans Du
CVE-2024-53057 In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_bac
CVE-2024-49967 In the Linux kernel, the following vulnerability has been resolved: ext4: no need to continue when the number of entries is 1
CVE-2024-43892 In the Linux kernel, the following vulnerability has been resolved: memcg: protect concurrent access to mem_cgroup_idr Commit 73f576c04b94 ("mm: me
CVE-2024-38553 In the Linux kernel, the following vulnerability has been resolved: net: fec: remove .ndo_poll_controller to avoid deadlocks There is a deadlock is
CVE-2024-38597 In the Linux kernel, the following vulnerability has been resolved: eth: sungem: remove .ndo_poll_controller to avoid deadlocks Erhard reports netp
CVE-2023-52821 In the Linux kernel, the following vulnerability has been resolved: drm/panel: fix a possible null pointer dereference In versatile_panel_get_modes
CVE-2024-36952 In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up The
CVE-2024-40910 In the Linux kernel, the following vulnerability has been resolved: ax25: Fix refcount imbalance on inbound connections When releasing a socket in
CVE-2024-35963 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sock: Fix not validating setsockopt user input Check user input
CVE-2024-35965 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix not validating setsockopt user input Check user input len
CVE-2024-35966 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: Fix not validating setsockopt user input syzbot reported rfc
CVE-2024-35967 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix not validating setsockopt user input syzbot reported sco_so
CVE-2021-47101 In the Linux kernel, the following vulnerability has been resolved: asix: fix uninit-value in asix_mdio_read() asix_read_cmd() may read less than s
CVE-2022-38096 A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with devi
CVE-2021-47001 In the Linux kernel, the following vulnerability has been resolved: xprtrdma: Fix cwnd update ordering After a reconnect, the reply handler is open



About   -   Send Feedback to @ubuntu_updates