UbuntuUpdates.org

Package "linux-gcp-5.15-tools-5.15.0-1081"

Name: linux-gcp-5.15-tools-5.15.0-1081

Description:

Linux kernel version specific tools for version 5.15.0-1081

Latest version: 5.15.0-1081.90~20.04.1
Release: focal (20.04)
Level: updates
Repository: main
Head package: linux-gcp-5.15

Links


Download "linux-gcp-5.15-tools-5.15.0-1081"


Other versions of "linux-gcp-5.15-tools-5.15.0-1081" in Focal

Repository Area Version
security main 5.15.0-1081.90~20.04.1
proposed main 5.15.0-1081.90~20.04.1
PPA: Canonical Kernel Team 5.15.0-1081.90~20.04.1

Changelog

Version: 5.15.0-1081.90~20.04.1 2025-04-25 00:07:08 UTC

  linux-gcp-5.15 (5.15.0-1081.90~20.04.1) focal; urgency=medium

  * focal/linux-gcp-5.15: 5.15.0-1081.90~20.04.1 -proposed tracker
    (LP: #2102546)

  [ Ubuntu: 5.15.0-1081.90 ]

  * jammy/linux-gcp: 5.15.0-1081.90 -proposed tracker (LP: #2102547)
  * jammy/linux: 5.15.0-138.148 -proposed tracker (LP: #2102587)
  * ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J
    (LP: #2096976)
    - SAUCE: selftest: netfilter: fix null IP field in kci_test_ipsec_offload
  * CVE-2025-21756
    - vsock: Keep the binding until socket destruction
    - vsock: Orphan socket after transport release
  * CVE-2024-50256
    - netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
  * CVE-2025-21702
    - pfifo_tail_enqueue: Drop new packet when sch->limit == 0
  * CVE-2025-21703
    - netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
  * CVE-2025-21700
    - net: sched: Disallow replacing of child qdisc from one parent to another
  * CVE-2024-46826
    - ELF: fix kernel.randomize_va_space double read
  * CVE-2024-56651
    - can: hi311x: hi3110_can_ist(): fix potential use-after-free
  * iBFT iSCSI out-of-bounds shift UBSAN warning (LP: #2097824)
    - iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
  * CVE-2024-50248
    - ntfs3: Add bounds checking to mi_enum_attr()
    - fs/ntfs3: Sequential field availability check in mi_enum_attr()
  * CVE-2022-0995
    - watch_queue: Use the bitmap API when applicable
  * CVE-2024-26837
    - net: bridge: switchdev: Skip MDB replays of deferred events on offload
  * CVE-2025-21701
    - net: avoid race between device unregistration and ethnl ops
  * CVE-2024-57798
    - drm/dp_mst: Skip CSN if topology probing is not done yet
    - drm/dp_mst: Ensure mst_primary pointer is valid in
      drm_dp_mst_handle_up_req()
  * CVE-2024-56658
    - net: defer final 'struct net' free in netns dismantle
  * CVE-2024-35864
    - smb: client: fix potential UAF in smb2_is_valid_lease_break()
  * CVE-2024-35864/CVE-2024-26928
    - smb: client: fix potential UAF in cifs_debug_files_proc_show()

 -- Stewart Hore <email address hidden> Tue, 01 Apr 2025 18:42:04 +1100

Source diff to previous version
2096976 ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J
2097824 iBFT iSCSI out-of-bounds shift UBSAN warning
CVE-2025-21756 In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; thi
CVE-2024-50256 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() I got a syzb
CVE-2025-21702 In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 Expected behaviour: In
CVE-2025-21703 In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_
CVE-2025-21700 In the Linux kernel, the following vulnerability has been resolved: net: sched: Disallow replacing of child qdisc from one parent to another Lion A
CVE-2024-46826 In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses "randomize_va_sp
CVE-2024-56651 In the Linux kernel, the following vulnerability has been resolved: can: hi311x: hi3110_can_ist(): fix potential use-after-free The commit a22bd630
CVE-2024-50248 In the Linux kernel, the following vulnerability has been resolved: ntfs3: Add bounds checking to mi_enum_attr() Added bounds checking to make sure
CVE-2022-0995 An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of t
CVE-2024-26837 In the Linux kernel, the following vulnerability has been resolved: net: bridge: switchdev: Skip MDB replays of deferred events on offload Before t
CVE-2025-21701 In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace
CVE-2024-57798 In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() W
CVE-2024-56658 In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-
CVE-2024-35864 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions tha
CVE-2024-26928 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions th

Version: 5.15.0-1078.87~20.04.1 2025-03-04 20:06:53 UTC

  linux-gcp-5.15 (5.15.0-1078.87~20.04.1) focal; urgency=medium

  * focal/linux-gcp-5.15: 5.15.0-1078.87~20.04.1 -proposed tracker
    (LP: #2097907)

  * Packaging resync (LP: #1786013)
    - [Packaging] debian.gcp-5.15/dkms-versions -- update from kernel-versions
      (main/s2025.01.13)

  [ Ubuntu: 5.15.0-1078.87 ]

  * jammy/linux-gcp: 5.15.0-1078.87 -proposed tracker (LP: #2097908)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.gcp/dkms-versions -- update from kernel-versions
      (main/s2025.01.13)
  * jammy/linux: 5.15.0-134.145 -proposed tracker (LP: #2097944)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/s2025.01.13)
  * CVE-2024-56672
    - blk-cgroup: Fix UAF in blkcg_unpin_online()
  * CVE-2025-0927
    - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key

 -- En-Wei Wu <email address hidden> Mon, 24 Feb 2025 10:50:59 +0800

Source diff to previous version
1786013 Packaging resync
CVE-2024-56672 In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the b
CVE-2025-0927 hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key

Version: 5.15.0-1077.86~20.04.1 2025-02-24 20:07:04 UTC

  linux-gcp-5.15 (5.15.0-1077.86~20.04.1) focal; urgency=medium

  * focal/linux-gcp-5.15: 5.15.0-1077.86~20.04.1 -proposed tracker
    (LP: #2097307)

  [ Ubuntu: 5.15.0-1077.86 ]

  * jammy/linux-gcp: 5.15.0-1077.86 -proposed tracker (LP: #2097047)
  * IDPF: TX timeout and crash (LP: #2093622)
    - Revert "idpf: trigger SW interrupt when exiting wb_on_itr mode"
    - Revert "idpf: add support for SW triggered interrupts"
    - Revert "idpf: fix idpf_vc_core_init error path"
    - Revert "idpf: avoid vport access in idpf_get_link_ksettings"
    - Revert "idpf: enable WB_ON_ITR"

Source diff to previous version
2093622 IDPF: TX timeout and crash

Version: 5.15.0-1075.84~20.04.1 2025-01-28 00:06:58 UTC

  linux-gcp-5.15 (5.15.0-1075.84~20.04.1) focal; urgency=medium

  * focal/linux-gcp-5.15: 5.15.0-1075.84~20.04.1 -proposed tracker
    (LP: #2093539)

  [ Ubuntu: 5.15.0-1075.84 ]

  * jammy/linux-gcp: 5.15.0-1075.84 -proposed tracker (LP: #2093540)
  * jammy/linux: 5.15.0-131.141 -proposed tracker (LP: #2093573)
  * CVE-2024-53164
    - net: sched: fix ordering of qlen adjustment
  * CVE-2024-53141
    - netfilter: ipset: add missing range check in bitmap_ip_uadt
  * CVE-2024-53103
    - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer

 -- Bethany Jamison <email address hidden> Wed, 15 Jan 2025 16:38:31 -0600

Source diff to previous version
CVE-2024-53164 In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch->q.qlen around qdisc
CVE-2024-53141 In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_
CVE-2024-53103 In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs

Version: 5.15.0-1074.83~20.04.1 2024-12-20 00:06:52 UTC

  linux-gcp-5.15 (5.15.0-1074.83~20.04.1) focal; urgency=medium

  * focal/linux-gcp-5.15: 5.15.0-1074.83~20.04.1 -proposed tracker
    (LP: #2092097)

  [ Ubuntu: 5.15.0-1074.83 ]

  * jammy/linux-gcp: 5.15.0-1074.83 -proposed tracker (LP: #2092098)
  * jammy/linux: 5.15.0-130.140 -proposed tracker (LP: #2092132)
  * ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel
    5.15.0-127.137 (LP: #2091990)
    - netfilter: xtables: fix typo causing some targets not to load on IPv6

 -- Bethany Jamison <email address hidden> Wed, 18 Dec 2024 13:49:32 -0600

2091990 ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel 5.15.0-127.137



About   -   Send Feedback to @ubuntu_updates