UbuntuUpdates.org

Package "linux-headers-6.11.0-19-generic"

Name: linux-headers-6.11.0-19-generic

Description:

Linux kernel headers for version 6.11.0 on 64 bit x86 SMP

Latest version: 6.11.0-19.19
Release: oracular (24.10)
Level: security
Repository: main
Head package: linux

Links


Download "linux-headers-6.11.0-19-generic"


Other versions of "linux-headers-6.11.0-19-generic" in Oracular

Repository Area Version
updates main 6.11.0-19.19

Changelog

Version: 6.11.0-19.19 2025-03-05 01:07:32 UTC

  linux (6.11.0-19.19) oracular; urgency=medium

  * oracular/linux: 6.11.0-19.19 -proposed tracker (LP: #2098000)

  * python perf module missing in realtime kernel (LP: #2089411)
    - [Packaging] linux-tools: Add missing python perf symlink
    - [Packaging] linux-tools: Fix python perf library packaging
    - [Packaging] linux-tools: Fall back to old python perf path

  * CVE-2024-56672
    - blk-cgroup: Fix UAF in blkcg_unpin_online()

  * CVE-2024-56658
    - net: defer final 'struct net' free in netns dismantle

 -- Manuel Diewald <email address hidden> Wed, 12 Feb 2025 19:45:25 +0100

Source diff to previous version
2089411 python perf module missing in realtime kernel
CVE-2024-56672 In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the b
CVE-2024-56658 In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-

Version: 6.11.0-18.18 2025-02-19 14:07:04 UTC

  linux (6.11.0-18.18) oracular; urgency=medium

  * CVE-2025-0927
    - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key

Source diff to previous version

Version: 6.11.0-14.15 2025-01-28 01:07:24 UTC

  linux (6.11.0-14.15) oracular; urgency=medium

  * oracular/linux: 6.11.0-14.15 -proposed tracker (LP: #2093483)

  * CVE-2024-53164
    - net: sched: fix ordering of qlen adjustment

  * CVE-2024-53103
    - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer

 -- Manuel Diewald <email address hidden> Fri, 10 Jan 2025 18:31:51 +0100

Source diff to previous version
CVE-2024-53164 In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch->q.qlen around qdisc
CVE-2024-53103 In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs

Version: 6.11.0-13.14 2024-12-17 01:07:38 UTC

  linux (6.11.0-13.14) oracular; urgency=medium

  * oracular/linux: 6.11.0-13.14 -proposed tracker (LP: #2090463)

  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log

  * MGLRU: kswapd uses 100% CPU when MGLRU is enabled and under memory pressure
    (LP: #2087886)
    - mm/mglru: only clear kswapd_failures if reclaimable

  * CVE-2024-50264
    - vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans

  * CVE-2024-53057
    - net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT

  * CVE-2024-49967
    - ext4: no need to continue when the number of entries is 1

 -- Manuel Diewald <email address hidden> Sat, 30 Nov 2024 23:09:01 +0100

1786013 Packaging resync
2087886 MGLRU: kswapd uses 100% CPU when MGLRU is enabled and under memory pressure
CVE-2024-50264 In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans Du
CVE-2024-53057 In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_bac
CVE-2024-49967 In the Linux kernel, the following vulnerability has been resolved: ext4: no need to continue when the number of entries is 1

Version: *DELETED* 2024-12-13 05:07:04 UTC
No changelog for deleted or moved packages.



About   -   Send Feedback to @ubuntu_updates