UbuntuUpdates.org

Package "linux-oem-5.6"




Name: linux-oem-5.6

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: focal (20.04)
Level: proposed
Repository: main

Links



Other versions of "linux-oem-5.6" in Focal

Repository Area Version
base main 5.6.0-1007.7
security main 5.6.0-1056.60
updates main 5.6.0-1056.60
PPA: Canonical Kernel Team 5.6.0-1057.61

Changelog

Version: 5.6.0-1049.53 2021-02-26 14:07:09 UTC

  linux-oem-5.6 (5.6.0-1049.53) focal; urgency=medium

  * focal/linux-oem-5.6: 5.6.0-1049.53 -proposed tracker (LP: #1916171)

  * CVE-2020-25668
    - tty: make FONTX ioctl use the tty pointer they were actually passed

  * Focal update: v5.4.73 upstream stable release (LP: #1902115) //
    CVE-2020-25705
    - icmp: randomize the global rate limiter

  * CVE-2020-27675
    - xen/events: avoid removing an event channel while handling it

  * CVE-2020-25656
    - vt: keyboard, simplify vt_kdgkbsent
    - vt: keyboard, extend func_buf_lock to readers

  * CVE-2021-20239
    - net, sctp, filter: remap copy_from_user failure error

 -- Chia-Lin Kao (AceLan) <email address hidden> Fri, 26 Feb 2021 10:56:08 +0800

1902115 Focal update: v5.4.73 upstream stable release
CVE-2020-25668 concurrency use-after-free in vt
CVE-2020-25705 A flaw in the way reply ICMP packets are limited in the Linux kernel functionality was found that allows to quickly scan open UDP ports. This flaw al
CVE-2020-27675 An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel rem
CVE-2020-25656 A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local u
CVE-2021-20239 Untrusted Pointer Dereference in setsockopt system call



About   -   Send Feedback to @ubuntu_updates