UbuntuUpdates.org

Package "linux-image-unsigned-5.15.0-134-generic"

Name: linux-image-unsigned-5.15.0-134-generic

Description:

Linux kernel image for version 5.15.0 on 64 bit x86 SMP

Latest version: 5.15.0-134.145
Release: jammy (22.04)
Level: updates
Repository: main
Head package: linux

Links


Download "linux-image-unsigned-5.15.0-134-generic"


Other versions of "linux-image-unsigned-5.15.0-134-generic" in Jammy

Repository Area Version
security main 5.15.0-134.145

Changelog

Version: 5.15.0-134.145 2025-03-04 20:07:05 UTC

  linux (5.15.0-134.145) jammy; urgency=medium

  * jammy/linux: 5.15.0-134.145 -proposed tracker (LP: #2097944)

  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/s2025.01.13)

  * CVE-2024-56672
    - blk-cgroup: Fix UAF in blkcg_unpin_online()

 -- Manuel Diewald <email address hidden> Wed, 12 Feb 2025 19:47:13 +0100

Source diff to previous version
1786013 Packaging resync
CVE-2024-56672 In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the b

Version: 5.15.0-133.144 2025-02-19 14:06:55 UTC

  linux (5.15.0-133.144) jammy; urgency=medium

  * CVE-2025-0927
    - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key

Source diff to previous version

Version: 5.15.0-131.141 2025-01-27 21:07:21 UTC

  linux (5.15.0-131.141) jammy; urgency=medium

  * jammy/linux: 5.15.0-131.141 -proposed tracker (LP: #2093573)

  * CVE-2024-53164
    - net: sched: fix ordering of qlen adjustment

  * CVE-2024-53141
    - netfilter: ipset: add missing range check in bitmap_ip_uadt

  * CVE-2024-53103
    - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer

 -- Manuel Diewald <email address hidden> Fri, 10 Jan 2025 18:45:15 +0100

Source diff to previous version
CVE-2024-53164 In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch->q.qlen around qdisc
CVE-2024-53141 In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_
CVE-2024-53103 In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs

Version: 5.15.0-130.140 2024-12-20 00:06:59 UTC

  linux (5.15.0-130.140) jammy; urgency=medium

  * jammy/linux: 5.15.0-130.140 -proposed tracker (LP: #2092132)

  * ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel
    5.15.0-127.137 (LP: #2091990)
    - netfilter: xtables: fix typo causing some targets not to load on IPv6

 -- Mehmet Basaran <email address hidden> Wed, 18 Dec 2024 20:19:08 +0300

Source diff to previous version
2091990 ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel 5.15.0-127.137

Version: 5.15.0-128.138 2024-12-18 00:07:16 UTC

  linux (5.15.0-128.138) jammy; urgency=medium

  * jammy/linux: 5.15.0-128.138 -proposed tracker (LP: #2090163)

  * CVE-2024-50264
    - vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans

  * CVE-2024-53057
    - net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT

  * CVE-2024-43904
    - drm/amd/display: Add null checks for 'stream' and 'plane' before
      dereferencing

  * CVE-2024-40973
    - media: mtk-vcodec: potential null pointer deference in SCP

  * CVE-2024-38553
    - net: fec: remove .ndo_poll_controller to avoid deadlocks

  * CVE-2024-26822
    - smb: client: set correct id, uid and cruid for multiuser automounts

  * CVE-2020-12351 // CVE-2020-12352 // CVE-2020-24490
    - [Config] Disable BlueZ highspeed support

  * CVE-2024-40910
    - ax25: Fix refcount imbalance on inbound connections

  * CVE-2024-35963
    - Bluetooth: hci_sock: Fix not validating setsockopt user input

  * CVE-2024-35965
    - Bluetooth: L2CAP: Fix not validating setsockopt user input

  * CVE-2024-35966
    - Bluetooth: RFCOMM: Fix not validating setsockopt user input

  * CVE-2024-35967
    - Bluetooth: SCO: Fix not validating setsockopt user input

 -- Manuel Diewald <email address hidden> Sat, 30 Nov 2024 19:12:45 +0100

CVE-2024-50264 In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans Du
CVE-2024-53057 In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_bac
CVE-2024-43904 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing
CVE-2024-40973 In the Linux kernel, the following vulnerability has been resolved: media: mtk-vcodec: potential null pointer deference in SCP The return value of
CVE-2024-38553 In the Linux kernel, the following vulnerability has been resolved: net: fec: remove .ndo_poll_controller to avoid deadlocks There is a deadlock is
CVE-2024-26822 In the Linux kernel, the following vulnerability has been resolved: smb: client: set correct id, uid and cruid for multiuser automounts When uid, g
CVE-2020-12351 Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
CVE-2020-12352 Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
CVE-2020-24490 Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all
CVE-2024-40910 In the Linux kernel, the following vulnerability has been resolved: ax25: Fix refcount imbalance on inbound connections When releasing a socket in
CVE-2024-35963 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sock: Fix not validating setsockopt user input Check user input
CVE-2024-35965 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix not validating setsockopt user input Check user input len
CVE-2024-35966 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: Fix not validating setsockopt user input syzbot reported rfc
CVE-2024-35967 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix not validating setsockopt user input syzbot reported sco_so



About   -   Send Feedback to @ubuntu_updates