UbuntuUpdates.org

Package "linux-tools-5.6.0-1057-oem"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-tools-5.6.0-1057-oem

Description:

Linux kernel version specific tools for version 5.6.0-1057

Latest version: 5.6.0-1057.61
Release: focal (20.04)
Level: base
Repository: main
Head package: linux-oem-5.6

Links


Download "linux-tools-5.6.0-1057-oem"


Other versions of "linux-tools-5.6.0-1057-oem" in Focal

No other version of this package is available in the Focal release.

Changelog

Version: 5.6.0-1057.61 2021-05-13 13:08:34 UTC

 linux-oem-5.6 (5.6.0-1057.61) focal; urgency=medium
 .
   * focal/linux-oem-5.6: 5.6.0-1057.61 -proposed tracker (LP: #1927621)
 .
   * xfrm_policy.sh / pmtu.sh / udpgso_bench.sh from net in
     ubuntu_kernel_selftests will fail if running the whole suite (LP: #1856010)
     - selftests/net: bump timeout to 5 minutes

Source diff to previous version
1856010 xfrm_policy.sh / pmtu.sh / udpgso_bench.sh from net in ubuntu_kernel_selftests will fail if running the whole suite

Version: 5.6.0-1056.60 2021-05-04 09:08:16 UTC

 linux-oem-5.6 (5.6.0-1056.60) focal; urgency=medium
 .
   * focal/linux-oem-5.6: 5.6.0-1056.60 -proposed tracker (LP: #1923783)
 .
   * CVE-2021-29646
     - tipc: better validate user input in tipc_nl_retrieve_key()
 .
   * CVE-2021-28375
     - misc: fastrpc: restrict user apps from sending kernel RPC messages
 .
   * CVE-2020-35519
     - net/x25: prevent a couple of overflows
 .
   * CVE-2021-30002
     - media: v4l: ioctl: Fix memory leak in video_usercopy
 .
   * SND_PCI_QUIRK for Clevo NH55RZQ and Intel NUC10 (LP: #1922759)
     - ALSA: hda/realtek: Add quirk for Intel NUC 10
     - ALSA: hda/realtek: Add quirk for Clevo NH55RZQ
 .
   * CVE-2021-29650
     - netfilter: x_tables: Use correct memory barriers.
 .
   * Fix implicit declaration warnings for kselftests/memfd test on newer
     releases (LP: #1910323)
     - selftests/memfd: Fix implicit declaration warnings

Source diff to previous version
1922759 SND_PCI_QUIRK for Clevo NH55RZQ and Intel NUC10
1910323 Fix implicit declaration warnings for kselftests/memfd test on newer releases
CVE-2021-29646 An issue was discovered in the Linux kernel before 5.11.11. tipc_nl_retrieve_key in net/tipc/node.c does not properly validate certain data sizes, ak
CVE-2021-28375 An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from
CVE-2021-30002 An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a m
CVE-2021-29650 An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net

Version: 5.6.0-1055.59 2021-04-16 11:10:02 UTC

 linux-oem-5.6 (5.6.0-1055.59) focal; urgency=medium
 .
   * focal/linux-oem-5.6: 5.6.0-1055.59 -proposed tracker (LP: #1924646)
 .
   * setting extended attribute may cause memory leak (LP: #1924611)
     - SAUCE: vfs_setxattr: free converted value if xattr_permission returns error

Source diff to previous version

Version: 5.6.0-1053.57 2021-04-09 18:08:01 UTC

 linux-oem-5.6 (5.6.0-1053.57) focal; urgency=medium
 .
   * focal/linux-oem-5.6: 5.6.0-1053.57 -proposed tracker (LP: #1921042)
 .
   * Packaging resync (LP: #1786013)
     - update dkms package versions
 .
   * LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key
     (LP: #1918134)
     - [Packaging] sync dkms-build et al from LRMv4
 .
   * CVE-2021-29154
     - SAUCE: bpf, x86: Validate computation of branch displacements for x86-64
     - SAUCE: bpf, x86: Validate computation of branch displacements for x86-32
 .
   * xfrm_policy.sh in net from ubuntu_kernel_selftests passed with failed sub-
     cases (LP: #1909647)
     - selftests: xfrm: fix test return value override issue in xfrm_policy.sh
 .
   * ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255
     on F-oem-5.6 (LP: #1919147)
     - selftests: net: ip_defrag: modprobe missing nf_defrag_ipv6 support
 .
   * l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
     "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on
     F-OEM-5.6 (LP: #1919277)
     - l2tp: remove skb_dst_set() from l2tp_xmit_skb()
 .
   * CVE-2020-0466
     - epoll: Keep a reference on files added to the check list
     - do_epoll_ctl(): clean the failure exits up a bit
     - fix regression in "epoll: Keep a reference on files added to the check list"
 .
   * CVE-2021-3178
     - nfsd4: readdirplus shouldn't return parent of export
 .
   * CVE-2020-25285
     - mm/hugetlb: fix a race between hugetlb sysctl handlers
 .
   * CVE-020-10781
     - Revert "zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()"
 .
   * CVE-2020-14351
     - perf/core: Fix race in the perf_mmap_close() function
 .
   * CVE-2020-25669
     - Input: sunkbd - avoid use-after-free in teardown paths
 .
   * CVE-2020-14390
     - fbcon: remove soft scrollback code
 .
   * CVE-2021-3411
     - x86/kprobes: Fix optprobe to detect INT3 padding correctly
 .
   * CVE-2020-0423
     - binder: fix UAF when releasing todo list
 .
   * CVE-2020-27830
     - speakup: Reject setting the speakup line discipline outside of speakup
 .
   * CVE-2020-0465
     - HID: core: Correctly handle ReportSize being zero
     - HID: core: Sanitize event code and type when mapping input
 .
   * CVE-2020-25645
     - geneve: add transport ports in route lookup for geneve
 .
   * CVE-2021-20194
     - bpf, cgroup: Fix optlen WARN_ON_ONCE toctou
     - bpf, cgroup: Fix problematic bounds check
 .
   * CVE-2020-36158
     - mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start

Source diff to previous version
1786013 Packaging resync
1918134 LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key
1919147 ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255 on F-oem-5.6
1919277 l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with \
CVE-2021-29154 BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect c ...
CVE-2020-0466 In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation o
CVE-2021-3178 ** DISPUTED ** fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote att
CVE-2020-25285 A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory,
CVE-2020-14351 perf: Fix race in perf_mmap_close function
CVE-2020-14390 A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory
CVE-2021-3411 A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linki
CVE-2020-0423 In binder_release_work of binder.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in t
CVE-2020-27830 Linux kernel NULL-ptr deref bug in spk_ttyio_receive_buf2
CVE-2020-0465 In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of
CVE-2020-25645 A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to
CVE-2021-20194 heap overflow in __cgroup_bpf_run_filter_getsockopt()
CVE-2020-36158 mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to exe

Version: 5.6.0-1050.54 2021-03-12 02:08:08 UTC

 linux-oem-5.6 (5.6.0-1050.54) focal; urgency=medium
 .
   * focal/linux-oem-5.6: 5.6.0-1050.54 -proposed tracker (LP: #1918665)
 .
   * Please trust Canonical Livepatch Service kmod signing key (LP: #1898716)
     - [Config] enable CONFIG_MODVERSIONS=y
     - [Packaging] build canonical-certs.pem from branch/arch certs
     - [Config] add Canonical Livepatch Service key to SYSTEM_TRUSTED_KEYS
     - [Config] add ubuntu-drivers key to SYSTEM_TRUSTED_KEYS
     - [Config] Allow ASM_MODVERSIONS and MODULE_REL_CRCS

1898716 Please trust Canonical Livepatch Service kmod signing key



About   -   Send Feedback to @ubuntu_updates