UbuntuUpdates.org

Package "linux-tools-5.15.0-1078-gcp"

Name: linux-tools-5.15.0-1078-gcp

Description:

Linux kernel version specific tools for version 5.15.0-1078

Latest version: 5.15.0-1078.87~20.04.1
Release: focal (20.04)
Level: updates
Repository: main
Head package: linux-gcp-5.15

Links


Download "linux-tools-5.15.0-1078-gcp"


Other versions of "linux-tools-5.15.0-1078-gcp" in Focal

Repository Area Version
security main 5.15.0-1078.87~20.04.1

Changelog

Version: 5.15.0-1078.87~20.04.1 2025-03-04 20:06:53 UTC

  linux-gcp-5.15 (5.15.0-1078.87~20.04.1) focal; urgency=medium

  * focal/linux-gcp-5.15: 5.15.0-1078.87~20.04.1 -proposed tracker
    (LP: #2097907)

  * Packaging resync (LP: #1786013)
    - [Packaging] debian.gcp-5.15/dkms-versions -- update from kernel-versions
      (main/s2025.01.13)

  [ Ubuntu: 5.15.0-1078.87 ]

  * jammy/linux-gcp: 5.15.0-1078.87 -proposed tracker (LP: #2097908)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.gcp/dkms-versions -- update from kernel-versions
      (main/s2025.01.13)
  * jammy/linux: 5.15.0-134.145 -proposed tracker (LP: #2097944)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/s2025.01.13)
  * CVE-2024-56672
    - blk-cgroup: Fix UAF in blkcg_unpin_online()
  * CVE-2025-0927
    - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key

 -- En-Wei Wu <email address hidden> Mon, 24 Feb 2025 10:50:59 +0800

Source diff to previous version
1786013 Packaging resync
CVE-2024-56672 In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the b
CVE-2025-0927 hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key

Version: 5.15.0-1077.86~20.04.1 2025-02-24 20:07:04 UTC

  linux-gcp-5.15 (5.15.0-1077.86~20.04.1) focal; urgency=medium

  * focal/linux-gcp-5.15: 5.15.0-1077.86~20.04.1 -proposed tracker
    (LP: #2097307)

  [ Ubuntu: 5.15.0-1077.86 ]

  * jammy/linux-gcp: 5.15.0-1077.86 -proposed tracker (LP: #2097047)
  * IDPF: TX timeout and crash (LP: #2093622)
    - Revert "idpf: trigger SW interrupt when exiting wb_on_itr mode"
    - Revert "idpf: add support for SW triggered interrupts"
    - Revert "idpf: fix idpf_vc_core_init error path"
    - Revert "idpf: avoid vport access in idpf_get_link_ksettings"
    - Revert "idpf: enable WB_ON_ITR"

Source diff to previous version
2093622 IDPF: TX timeout and crash

Version: 5.15.0-1075.84~20.04.1 2025-01-28 00:06:58 UTC

  linux-gcp-5.15 (5.15.0-1075.84~20.04.1) focal; urgency=medium

  * focal/linux-gcp-5.15: 5.15.0-1075.84~20.04.1 -proposed tracker
    (LP: #2093539)

  [ Ubuntu: 5.15.0-1075.84 ]

  * jammy/linux-gcp: 5.15.0-1075.84 -proposed tracker (LP: #2093540)
  * jammy/linux: 5.15.0-131.141 -proposed tracker (LP: #2093573)
  * CVE-2024-53164
    - net: sched: fix ordering of qlen adjustment
  * CVE-2024-53141
    - netfilter: ipset: add missing range check in bitmap_ip_uadt
  * CVE-2024-53103
    - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer

 -- Bethany Jamison <email address hidden> Wed, 15 Jan 2025 16:38:31 -0600

Source diff to previous version
CVE-2024-53164 In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch->q.qlen around qdisc
CVE-2024-53141 In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_
CVE-2024-53103 In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs

Version: 5.15.0-1074.83~20.04.1 2024-12-20 00:06:52 UTC

  linux-gcp-5.15 (5.15.0-1074.83~20.04.1) focal; urgency=medium

  * focal/linux-gcp-5.15: 5.15.0-1074.83~20.04.1 -proposed tracker
    (LP: #2092097)

  [ Ubuntu: 5.15.0-1074.83 ]

  * jammy/linux-gcp: 5.15.0-1074.83 -proposed tracker (LP: #2092098)
  * jammy/linux: 5.15.0-130.140 -proposed tracker (LP: #2092132)
  * ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel
    5.15.0-127.137 (LP: #2091990)
    - netfilter: xtables: fix typo causing some targets not to load on IPv6

 -- Bethany Jamison <email address hidden> Wed, 18 Dec 2024 13:49:32 -0600

Source diff to previous version
2091990 ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel 5.15.0-127.137

Version: 5.15.0-1073.81~20.04.1 2024-12-18 00:06:59 UTC

  linux-gcp-5.15 (5.15.0-1073.81~20.04.1) focal; urgency=medium

  * focal/linux-gcp-5.15: 5.15.0-1073.81~20.04.1 -proposed tracker
    (LP: #2090123)

  [ Ubuntu: 5.15.0-1073.81 ]

  * jammy/linux-gcp: 5.15.0-1073.81 -proposed tracker (LP: #2090124)
  * jammy/linux: 5.15.0-128.138 -proposed tracker (LP: #2090163)
  * CVE-2024-50264
    - vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
  * CVE-2024-53057
    - net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
  * CVE-2024-43904
    - drm/amd/display: Add null checks for 'stream' and 'plane' before
      dereferencing
  * CVE-2024-40973
    - media: mtk-vcodec: potential null pointer deference in SCP
  * CVE-2024-38553
    - net: fec: remove .ndo_poll_controller to avoid deadlocks
  * CVE-2024-26822
    - smb: client: set correct id, uid and cruid for multiuser automounts
  * CVE-2020-12351 // CVE-2020-12352 // CVE-2020-24490
    - [Config] Disable BlueZ highspeed support
  * CVE-2024-40910
    - ax25: Fix refcount imbalance on inbound connections
  * CVE-2024-35963
    - Bluetooth: hci_sock: Fix not validating setsockopt user input
  * CVE-2024-35965
    - Bluetooth: L2CAP: Fix not validating setsockopt user input
  * CVE-2024-35966
    - Bluetooth: RFCOMM: Fix not validating setsockopt user input
  * CVE-2024-35967
    - Bluetooth: SCO: Fix not validating setsockopt user input

 -- Bethany Jamison <email address hidden> Wed, 11 Dec 2024 12:03:19 -0600

CVE-2024-50264 In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans Du
CVE-2024-53057 In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_bac
CVE-2024-43904 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing
CVE-2024-40973 In the Linux kernel, the following vulnerability has been resolved: media: mtk-vcodec: potential null pointer deference in SCP The return value of
CVE-2024-38553 In the Linux kernel, the following vulnerability has been resolved: net: fec: remove .ndo_poll_controller to avoid deadlocks There is a deadlock is
CVE-2024-26822 In the Linux kernel, the following vulnerability has been resolved: smb: client: set correct id, uid and cruid for multiuser automounts When uid, g
CVE-2020-12351 Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
CVE-2020-12352 Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
CVE-2020-24490 Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all
CVE-2024-40910 In the Linux kernel, the following vulnerability has been resolved: ax25: Fix refcount imbalance on inbound connections When releasing a socket in
CVE-2024-35963 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sock: Fix not validating setsockopt user input Check user input
CVE-2024-35965 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix not validating setsockopt user input Check user input len
CVE-2024-35966 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: Fix not validating setsockopt user input syzbot reported rfc
CVE-2024-35967 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix not validating setsockopt user input syzbot reported sco_so



About   -   Send Feedback to @ubuntu_updates