Package "linux-modules-5.15.0-1079-azure"
Name: |
linux-modules-5.15.0-1079-azure
|
Description: |
Linux kernel extra modules for version 5.15.0 on 64 bit x86 SMP
|
Latest version: |
5.15.0-1079.88~20.04.1 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
main |
Head package: |
linux-azure-5.15 |
Links
Download "linux-modules-5.15.0-1079-azure"
Other versions of "linux-modules-5.15.0-1079-azure" in Focal
Changelog
linux-azure-5.15 (5.15.0-1079.88~20.04.1) focal; urgency=medium
* focal/linux-azure-5.15: 5.15.0-1079.88~20.04.1 -proposed tracker
(LP: #2093529)
[ Ubuntu: 5.15.0-1079.88 ]
* jammy/linux-azure: 5.15.0-1079.88 -proposed tracker (LP: #2093530)
* jammy/linux: 5.15.0-131.141 -proposed tracker (LP: #2093573)
* CVE-2024-53164
- net: sched: fix ordering of qlen adjustment
* CVE-2024-53141
- netfilter: ipset: add missing range check in bitmap_ip_uadt
* CVE-2024-53103
- hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
-- Vinicius Peixoto <email address hidden> Fri, 17 Jan 2025 13:40:54 -0300
|
Source diff to previous version |
CVE-2024-53164 |
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch->q.qlen around qdisc |
CVE-2024-53141 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_ |
CVE-2024-53103 |
In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs |
|
linux-azure-5.15 (5.15.0-1078.87~20.04.1) focal; urgency=medium
* focal/linux-azure-5.15: 5.15.0-1078.87~20.04.1 -proposed tracker
(LP: #2092087)
[ Ubuntu: 5.15.0-1078.87 ]
* jammy/linux-azure: 5.15.0-1078.87 -proposed tracker (LP: #2092088)
* jammy/linux: 5.15.0-130.140 -proposed tracker (LP: #2092132)
* ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel
5.15.0-127.137 (LP: #2091990)
- netfilter: xtables: fix typo causing some targets not to load on IPv6
|
Source diff to previous version |
2091990 |
ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel 5.15.0-127.137 |
|
linux-azure-5.15 (5.15.0-1074.83~20.04.1) focal; urgency=medium
* focal/linux-azure-5.15: 5.15.0-1074.83~20.04.1 -proposed tracker
(LP: #2082128)
[ Ubuntu: 5.15.0-1074.83 ]
* jammy/linux-azure: 5.15.0-1074.83 -proposed tracker (LP: #2082129)
* net: mana: Fix RX buf alloc_size alignment and atomic op panic
(LP: #2079854)
- net: mana: Fix RX buf alloc_size alignment and atomic op panic
* Backport "net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response"
(LP: #2078001)
- net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response
* jammy/linux: 5.15.0-124.134 -proposed tracker (LP: #2082176)
* CVE-2024-45016
- netem: fix return value if duplicate enqueue fails
* CVE-2024-38630
- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
* CVE-2024-27397
- netfilter: nf_tables: use timestamp to check for set element timeout
-- Vinicius Peixoto <email address hidden> Thu, 03 Oct 2024 22:01:03 -0300
|
Source diff to previous version |
2079854 |
net: mana: Fix RX buf alloc_size alignment and atomic op panic |
2078001 |
Backport \ |
CVE-2024-45016 |
In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu |
CVE-2024-38630 |
In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the |
CVE-2024-27397 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time |
|
linux-azure-5.15 (5.15.0-1073.82~20.04.1) focal; urgency=medium
* focal/linux-azure-5.15: 5.15.0-1073.82~20.04.1 -proposed tracker
(LP: #2078108)
[ Ubuntu: 5.15.0-1073.82 ]
* jammy/linux-azure: 5.15.0-1073.82 -proposed tracker (LP: #2078109)
* jammy/linux: 5.15.0-122.132 -proposed tracker (LP: #2078154)
* isolcpus are ignored when using cgroups V2, causing processes to have wrong
affinity (LP: #2076957)
- cgroup/cpuset: Optimize cpuset_attach() on v2
* Jammy update: v5.15.164 upstream stable release (LP: #2076100) //
CVE-2024-41009
- bpf: Fix overrunning reservations in ringbuf
* CVE-2024-39494
- ima: Fix use-after-free on a dentry's dname.name
* CVE-2024-39496
- btrfs: zoned: fix use-after-free due to race with dev replace
* CVE-2024-42160
- f2fs: check validation of fault attrs in f2fs_build_fault_attr()
- f2fs: Add inline to f2fs_build_fault_attr() stub
* CVE-2024-38570
- gfs2: Rename sd_{ glock => kill }_wait
- gfs2: Fix potential glock use-after-free on unmount
* CVE-2024-42228
- drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
* CVE-2024-27012
- netfilter: nf_tables: restore set elements when delete set fails
* CVE-2024-26677
- rxrpc: Fix delayed ACKs to not set the reference serial number
-- Roxana Nicolescu <email address hidden> Tue, 03 Sep 2024 14:11:50 +0200
|
2076957 |
isolcpus are ignored when using cgroups V2, causing processes to have wrong affinity |
2076100 |
Jammy update: v5.15.164 upstream stable release |
CVE-2024-41009 |
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overrunning reservations in ringbuf The BPF ring buffer internally is |
CVE-2024-39494 |
In the Linux kernel, the following vulnerability has been resolved: ima: Fix use-after-free on a dentry's dname.name ->d_name.name can change on re |
CVE-2024-39496 |
In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix use-after-free due to race with dev replace While loading a z |
CVE-2024-42160 |
In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to |
CVE-2024-38570 |
In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix potential glock use-after-free on unmount When a DLM lockspace is rel |
CVE-2024-42228 |
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc In |
CVE-2024-27012 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: restore set elements when delete set fails From abort pat |
CVE-2024-26677 |
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix delayed ACKs to not set the reference serial number Fix the construc |
|
About
-
Send Feedback to @ubuntu_updates