Package "linux-tools-5.15.0-134-lowlatency"
Name: |
linux-tools-5.15.0-134-lowlatency
|
Description: |
Linux kernel version specific tools for version 5.15.0-134
|
Latest version: |
5.15.0-134.145~20.04.1 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
main |
Head package: |
linux-lowlatency-hwe-5.15 |
Links
Download "linux-tools-5.15.0-134-lowlatency"
Other versions of "linux-tools-5.15.0-134-lowlatency" in Focal
Changelog
linux-lowlatency-hwe-5.15 (5.15.0-134.145~20.04.1) focal; urgency=medium
* focal/linux-lowlatency-hwe-5.15: 5.15.0-134.145~20.04.1 -proposed tracker
(LP: #2097931)
* Packaging resync (LP: #1786013)
- [Packaging] debian.lowlatency-hwe-5.15/dkms-versions -- update from kernel-
versions (main/s2025.01.13)
[ Ubuntu: 5.15.0-134.145 ]
* jammy/linux-lowlatency: 5.15.0-134.145 -proposed tracker (LP: #2097932)
* Packaging resync (LP: #1786013)
- [Packaging] debian.lowlatency/dkms-versions -- update from kernel-versions
(main/s2025.01.13)
* jammy/linux: 5.15.0-134.145 -proposed tracker (LP: #2097944)
* Packaging resync (LP: #1786013)
- [Packaging] debian.master/dkms-versions -- update from kernel-versions
(main/s2025.01.13)
* CVE-2024-56672
- blk-cgroup: Fix UAF in blkcg_unpin_online()
-- Stefan Bader <email address hidden> Mon, 17 Feb 2025 14:24:02 +0100
|
Source diff to previous version |
1786013 |
Packaging resync |
CVE-2024-56672 |
In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the b |
|
linux-lowlatency-hwe-5.15 (5.15.0-133.143~20.04.1) focal; urgency=medium
[ Ubuntu: 5.15.0-133.143 ]
* CVE-2025-0927
- SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key
|
Source diff to previous version |
linux-lowlatency-hwe-5.15 (5.15.0-131.141~20.04.1) focal; urgency=medium
* focal/linux-lowlatency-hwe-5.15: 5.15.0-131.141~20.04.1 -proposed tracker
(LP: #2093560)
[ Ubuntu: 5.15.0-131.141 ]
* jammy/linux-lowlatency: 5.15.0-131.141 -proposed tracker (LP: #2093561)
* jammy/linux: 5.15.0-131.141 -proposed tracker (LP: #2093573)
* CVE-2024-53164
- net: sched: fix ordering of qlen adjustment
* CVE-2024-53141
- netfilter: ipset: add missing range check in bitmap_ip_uadt
* CVE-2024-53103
- hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
-- Stefan Bader <email address hidden> Thu, 16 Jan 2025 16:14:18 +0100
|
Source diff to previous version |
CVE-2024-53164 |
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch->q.qlen around qdisc |
CVE-2024-53141 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_ |
CVE-2024-53103 |
In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs |
|
linux-lowlatency-hwe-5.15 (5.15.0-129.139~20.04.1) focal; urgency=medium
* focal/linux-lowlatency-hwe-5.15: 5.15.0-129.139~20.04.1 -proposed tracker
(LP: #2092118)
[ Ubuntu: 5.15.0-129.139 ]
* jammy/linux-lowlatency: 5.15.0-129.139 -proposed tracker (LP: #2092119)
* jammy/linux: 5.15.0-130.140 -proposed tracker (LP: #2092132)
* ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel
5.15.0-127.137 (LP: #2091990)
- netfilter: xtables: fix typo causing some targets not to load on IPv6
-- Mehmet Basaran <email address hidden> Thu, 19 Dec 2024 00:35:22 +0300
|
Source diff to previous version |
2091990 |
ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel 5.15.0-127.137 |
|
linux-lowlatency-hwe-5.15 (5.15.0-128.138~20.04.1) focal; urgency=medium
* focal/linux-lowlatency-hwe-5.15: 5.15.0-128.138~20.04.1 -proposed tracker
(LP: #2090147)
[ Ubuntu: 5.15.0-128.138 ]
* jammy/linux-lowlatency: 5.15.0-128.138 -proposed tracker
(LP: #2090148)
* jammy/linux: 5.15.0-128.138 -proposed tracker (LP: #2090163)
* CVE-2024-50264
- vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
* CVE-2024-53057
- net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
* CVE-2024-43904
- drm/amd/display: Add null checks for 'stream' and 'plane' before
dereferencing
* CVE-2024-40973
- media: mtk-vcodec: potential null pointer deference in SCP
* CVE-2024-38553
- net: fec: remove .ndo_poll_controller to avoid deadlocks
* CVE-2024-26822
- smb: client: set correct id, uid and cruid for multiuser automounts
* CVE-2020-12351 // CVE-2020-12352 // CVE-2020-24490
- [Config] Disable BlueZ highspeed support
* CVE-2024-40910
- ax25: Fix refcount imbalance on inbound connections
* CVE-2024-35963
- Bluetooth: hci_sock: Fix not validating setsockopt user input
* CVE-2024-35965
- Bluetooth: L2CAP: Fix not validating setsockopt user input
* CVE-2024-35966
- Bluetooth: RFCOMM: Fix not validating setsockopt user input
* CVE-2024-35967
- Bluetooth: SCO: Fix not validating setsockopt user input
-- Stefan Bader <email address hidden> Wed, 04 Dec 2024 16:49:30 +0100
|
CVE-2024-50264 |
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans Du |
CVE-2024-53057 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_bac |
CVE-2024-43904 |
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing |
CVE-2024-40973 |
In the Linux kernel, the following vulnerability has been resolved: media: mtk-vcodec: potential null pointer deference in SCP The return value of |
CVE-2024-38553 |
In the Linux kernel, the following vulnerability has been resolved: net: fec: remove .ndo_poll_controller to avoid deadlocks There is a deadlock is |
CVE-2024-26822 |
In the Linux kernel, the following vulnerability has been resolved: smb: client: set correct id, uid and cruid for multiuser automounts When uid, g |
CVE-2020-12351 |
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. |
CVE-2020-12352 |
Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access. |
CVE-2020-24490 |
Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all |
CVE-2024-40910 |
In the Linux kernel, the following vulnerability has been resolved: ax25: Fix refcount imbalance on inbound connections When releasing a socket in |
CVE-2024-35963 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sock: Fix not validating setsockopt user input Check user input |
CVE-2024-35965 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix not validating setsockopt user input Check user input len |
CVE-2024-35966 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: Fix not validating setsockopt user input syzbot reported rfc |
CVE-2024-35967 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix not validating setsockopt user input syzbot reported sco_so |
|
About
-
Send Feedback to @ubuntu_updates