Package "linux-buildinfo-5.15.0-1078-gcp"
Name: |
linux-buildinfo-5.15.0-1078-gcp
|
Description: |
Linux kernel buildinfo for version 5.15.0 on 64 bit x86 SMP
|
Latest version: |
5.15.0-1078.87~20.04.1 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
main |
Head package: |
linux-gcp-5.15 |
Links
Download "linux-buildinfo-5.15.0-1078-gcp"
Other versions of "linux-buildinfo-5.15.0-1078-gcp" in Focal
Changelog
linux-gcp-5.15 (5.15.0-1078.87~20.04.1) focal; urgency=medium
* focal/linux-gcp-5.15: 5.15.0-1078.87~20.04.1 -proposed tracker
(LP: #2097907)
* Packaging resync (LP: #1786013)
- [Packaging] debian.gcp-5.15/dkms-versions -- update from kernel-versions
(main/s2025.01.13)
[ Ubuntu: 5.15.0-1078.87 ]
* jammy/linux-gcp: 5.15.0-1078.87 -proposed tracker (LP: #2097908)
* Packaging resync (LP: #1786013)
- [Packaging] debian.gcp/dkms-versions -- update from kernel-versions
(main/s2025.01.13)
* jammy/linux: 5.15.0-134.145 -proposed tracker (LP: #2097944)
* Packaging resync (LP: #1786013)
- [Packaging] debian.master/dkms-versions -- update from kernel-versions
(main/s2025.01.13)
* CVE-2024-56672
- blk-cgroup: Fix UAF in blkcg_unpin_online()
* CVE-2025-0927
- SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key
-- En-Wei Wu <email address hidden> Mon, 24 Feb 2025 10:50:59 +0800
|
Source diff to previous version |
1786013 |
Packaging resync |
CVE-2024-56672 |
In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the b |
CVE-2025-0927 |
hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key |
|
linux-gcp-5.15 (5.15.0-1077.86~20.04.1) focal; urgency=medium
* focal/linux-gcp-5.15: 5.15.0-1077.86~20.04.1 -proposed tracker
(LP: #2097307)
[ Ubuntu: 5.15.0-1077.86 ]
* jammy/linux-gcp: 5.15.0-1077.86 -proposed tracker (LP: #2097047)
* IDPF: TX timeout and crash (LP: #2093622)
- Revert "idpf: trigger SW interrupt when exiting wb_on_itr mode"
- Revert "idpf: add support for SW triggered interrupts"
- Revert "idpf: fix idpf_vc_core_init error path"
- Revert "idpf: avoid vport access in idpf_get_link_ksettings"
- Revert "idpf: enable WB_ON_ITR"
|
Source diff to previous version |
|
linux-gcp-5.15 (5.15.0-1075.84~20.04.1) focal; urgency=medium
* focal/linux-gcp-5.15: 5.15.0-1075.84~20.04.1 -proposed tracker
(LP: #2093539)
[ Ubuntu: 5.15.0-1075.84 ]
* jammy/linux-gcp: 5.15.0-1075.84 -proposed tracker (LP: #2093540)
* jammy/linux: 5.15.0-131.141 -proposed tracker (LP: #2093573)
* CVE-2024-53164
- net: sched: fix ordering of qlen adjustment
* CVE-2024-53141
- netfilter: ipset: add missing range check in bitmap_ip_uadt
* CVE-2024-53103
- hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
-- Bethany Jamison <email address hidden> Wed, 15 Jan 2025 16:38:31 -0600
|
Source diff to previous version |
CVE-2024-53164 |
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch->q.qlen around qdisc |
CVE-2024-53141 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_ |
CVE-2024-53103 |
In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs |
|
linux-gcp-5.15 (5.15.0-1074.83~20.04.1) focal; urgency=medium
* focal/linux-gcp-5.15: 5.15.0-1074.83~20.04.1 -proposed tracker
(LP: #2092097)
[ Ubuntu: 5.15.0-1074.83 ]
* jammy/linux-gcp: 5.15.0-1074.83 -proposed tracker (LP: #2092098)
* jammy/linux: 5.15.0-130.140 -proposed tracker (LP: #2092132)
* ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel
5.15.0-127.137 (LP: #2091990)
- netfilter: xtables: fix typo causing some targets not to load on IPv6
-- Bethany Jamison <email address hidden> Wed, 18 Dec 2024 13:49:32 -0600
|
Source diff to previous version |
2091990 |
ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel 5.15.0-127.137 |
|
linux-gcp-5.15 (5.15.0-1073.81~20.04.1) focal; urgency=medium
* focal/linux-gcp-5.15: 5.15.0-1073.81~20.04.1 -proposed tracker
(LP: #2090123)
[ Ubuntu: 5.15.0-1073.81 ]
* jammy/linux-gcp: 5.15.0-1073.81 -proposed tracker (LP: #2090124)
* jammy/linux: 5.15.0-128.138 -proposed tracker (LP: #2090163)
* CVE-2024-50264
- vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
* CVE-2024-53057
- net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
* CVE-2024-43904
- drm/amd/display: Add null checks for 'stream' and 'plane' before
dereferencing
* CVE-2024-40973
- media: mtk-vcodec: potential null pointer deference in SCP
* CVE-2024-38553
- net: fec: remove .ndo_poll_controller to avoid deadlocks
* CVE-2024-26822
- smb: client: set correct id, uid and cruid for multiuser automounts
* CVE-2020-12351 // CVE-2020-12352 // CVE-2020-24490
- [Config] Disable BlueZ highspeed support
* CVE-2024-40910
- ax25: Fix refcount imbalance on inbound connections
* CVE-2024-35963
- Bluetooth: hci_sock: Fix not validating setsockopt user input
* CVE-2024-35965
- Bluetooth: L2CAP: Fix not validating setsockopt user input
* CVE-2024-35966
- Bluetooth: RFCOMM: Fix not validating setsockopt user input
* CVE-2024-35967
- Bluetooth: SCO: Fix not validating setsockopt user input
-- Bethany Jamison <email address hidden> Wed, 11 Dec 2024 12:03:19 -0600
|
CVE-2024-50264 |
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans Du |
CVE-2024-53057 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_bac |
CVE-2024-43904 |
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing |
CVE-2024-40973 |
In the Linux kernel, the following vulnerability has been resolved: media: mtk-vcodec: potential null pointer deference in SCP The return value of |
CVE-2024-38553 |
In the Linux kernel, the following vulnerability has been resolved: net: fec: remove .ndo_poll_controller to avoid deadlocks There is a deadlock is |
CVE-2024-26822 |
In the Linux kernel, the following vulnerability has been resolved: smb: client: set correct id, uid and cruid for multiuser automounts When uid, g |
CVE-2020-12351 |
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. |
CVE-2020-12352 |
Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access. |
CVE-2020-24490 |
Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all |
CVE-2024-40910 |
In the Linux kernel, the following vulnerability has been resolved: ax25: Fix refcount imbalance on inbound connections When releasing a socket in |
CVE-2024-35963 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sock: Fix not validating setsockopt user input Check user input |
CVE-2024-35965 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix not validating setsockopt user input Check user input len |
CVE-2024-35966 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: Fix not validating setsockopt user input syzbot reported rfc |
CVE-2024-35967 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix not validating setsockopt user input syzbot reported sco_so |
|
About
-
Send Feedback to @ubuntu_updates