Package "linux-modules-extra-6.2.0-1018-gcp"
Name: |
linux-modules-extra-6.2.0-1018-gcp
|
Description: |
Linux kernel extra modules for version 6.2.0 on 64 bit x86 SMP
|
Latest version: |
6.2.0-1018.20~22.04.1 |
Release: |
jammy (22.04) |
Level: |
base |
Repository: |
main |
Head package: |
linux-gcp-6.2 |
Links
Download "linux-modules-extra-6.2.0-1018-gcp"
Other versions of "linux-modules-extra-6.2.0-1018-gcp" in Jammy
Changelog
linux-gcp-6.2 (6.2.0-1018.20~22.04.1) jammy; urgency=medium
.
* jammy/linux-gcp-6.2: 6.2.0-1018.20~22.04.1 -proposed tracker (LP: #2038063)
.
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (main/2023.10.02)
.
[ Ubuntu: 6.2.0-1018.20 ]
.
* lunar/linux-gcp: 6.2.0-1018.20 -proposed tracker (LP: #2038064)
* CVE-2023-42755
- [Config] remove NET_CLS_RSVP and NET_CLS_RSVP6
* SEV_SNP failure to init (LP: #2037316)
- x86/sev-es: Allow copy_from_kernel_nofault in earlier boot
- x86/sev-es: Only set x86_virt_bits to correct value
* lunar/linux: 6.2.0-36.37 -proposed tracker (LP: #2038076)
* Regression for ubuntu_bpf test build caused by upstream bdeeed3498c7
(LP: #2035181)
- selftests/bpf: fix static assert compilation issue for test_cls_*.c
* CVE-2023-4244
- netfilter: nf_tables: don't skip expired elements during walk
- netfilter: nf_tables: adapt set backend to use GC transaction API
- netfilter: nft_set_hash: mark set element as dead when deleting from packet
path
- netfilter: nf_tables: GC transaction API to avoid race with control plane
- netfilter: nf_tables: don't fail inserts if duplicate has expired
- netfilter: nf_tables: fix kdoc warnings after gc rework
- netfilter: nf_tables: fix GC transaction races with netns and netlink event
exit path
- netfilter: nf_tables: GC transaction race with netns dismantle
- netfilter: nf_tables: GC transaction race with abort path
- netfilter: nf_tables: use correct lock to protect gc_list
- netfilter: nf_tables: defer gc run if previous batch is still pending
- netfilter: nft_dynset: disallow object maps
- netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
* CVE-2023-4563
- netfilter: nf_tables: remove busy mark and gc batch API
* CVE-2023-42756
- netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP
* CVE-2023-4623
- net/sched: sch_hfsc: Ensure inner classes have fsc curve
* Fix unstable audio at low levels on Thinkpad P1G4 (LP: #2037077)
- ALSA: hda/realtek - ALC287 I2S speaker platform support
* Lunar update: upstream stable patchset 2023-09-21 (LP: #2037005)
- Upstream stable to v6.1.41, v6.4.6
- io_uring: treat -EAGAIN for REQ_F_NOWAIT as final for io-wq
- ALSA: hda/realtek - remove 3k pull low procedure
- ALSA: hda/realtek: Add quirk for Clevo NS70AU
- ALSA: hda/realtek: Enable Mute LED on HP Laptop 15s-eq2xxx
- maple_tree: set the node limit when creating a new root node
- maple_tree: fix node allocation testing on 32 bit
- keys: Fix linking a duplicate key to a keyring's assoc_array
- perf probe: Add test for regression introduced by switch to
die_get_decl_file()
- btrfs: fix warning when putting transaction with qgroups enabled after abort
- fuse: revalidate: don't invalidate if interrupted
- fuse: Apply flags2 only when userspace set the FUSE_INIT_EXT
- btrfs: set_page_extent_mapped after read_folio in btrfs_cont_expand
- btrfs: zoned: fix memory leak after finding block group with super blocks
- fuse: ioctl: translate ENOSYS in outarg
- btrfs: fix race between balance and cancel/pause
- selftests: tc: set timeout to 15 minutes
- selftests: tc: add 'ct' action kconfig dep
- regmap: Drop initial version of maximum transfer length fixes
- of: Preserve "of-display" device name for compatibility
- regmap: Account for register length in SMBus I/O limits
- arm64/fpsimd: Ensure SME storage is allocated after SVE VL changes
- can: mcp251xfd: __mcp251xfd_chip_set_mode(): increase poll timeout
- can: bcm: Fix UAF in bcm_proc_show()
- can: gs_usb: gs_can_open(): improve error handling
- selftests: tc: add ConnTrack procfs kconfig
- dma-buf/dma-resv: Stop leaking on krealloc() failure
- drm/amdgpu/vkms: relax timer deactivation by hrtimer_try_to_cancel
- drm/amdgpu/pm: make gfxclock consistent for sienna cichlid
- drm/amdgpu/pm: make mclk consistent for smu 13.0.7
- drm/client: Fix memory leak in drm_client_target_cloned
- drm/client: Fix memory leak in drm_client_modeset_probe
- drm/amd/display: only accept async flips for fast updates
- drm/amd/display: Disable MPC split by default on special asic
- drm/amd/display: check TG is non-null before checking if enabled
- drm/amd/display: Keep PHY active for DP displays on DCN31
- ASoC: fsl_sai: Disable bit clock with transmitter
- ASoC: fsl_sai: Revert "ASoC: fsl_sai: Enable MCTL_MCLK_EN bit for master
mode"
- ASoC: tegra: Fix ADX byte map
- ASoC: rt5640: Fix sleep in atomic context
- ASoC: cs42l51: fix driver to properly autoload with automatic module loading
- ASoC: codecs: wcd938x: fix missing clsh ctrl error handling
- ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove
- ASoC: qdsp6: audioreach: fix topology probe deferral
- ASoC: tegra: Fix AMX byte map
- ASoC: codecs: wcd938x: fix resource leaks on component remove
- ASoC: codecs: wcd938x: fix missing mbhc init error handling
- ASoC: codecs: wcd934x: fix resource leaks on component remove
- ASoC: codecs: wcd938x: fix codec initialisation race
- ASoC: codecs: wcd938x: fix soundwire initialisation race
- ext4: correct inline offset when handling xattrs in inode body
- drm/radeon: Fix integer overflow in radeon_cs_parser_init
- ALSA: emu10k1: roll up loops in DSP setup code for Audigy
- quota: Properly disable quotas when add_dquot_ref() fails
- quota: fix warning in dqgrab()
- HID: add quirk for 03f0:464a HP Elite Presenter Mouse
- ovl: check type and offset of struct vfsmount in ovl_entry
- udf: Fix uninitialized array access for some pathnames
- fs: jfs: Fix UBSAN: array-index-out
|
1786013 |
Packaging resync |
2037316 |
SEV_SNP failure to init |
2035181 |
Regression for ubuntu_bpf test build on Jammy 5.15.0-85.95 |
2037077 |
Fix unstable audio at low levels on Thinkpad P1G4 |
2037005 |
Lunar update: upstream stable patchset 2023-09-21 |
2035313 |
Fix non-working I219 after system sleep |
2035163 |
Avoid address overwrite in kernel_connect |
2031537 |
Ethernet not stable 23.04 (RTL8168/8169) |
2034479 |
Fix suspend hang on Lenovo workstation |
2034491 |
Fix blank display when Thunderbolt monitor is plugged second time |
2034745 |
[regression] Unable to initialize SGX enclaves with XFRM other than 3 |
2036075 |
Lunar update: upstream stable patchset 2023-09-14 |
2031352 |
Nouveau driver crash - Ubuntu 22.04.3 LTS stuck on power-off/reboot screen |
2034469 |
Lunar update: upstream stable patchset 2023-09-05 |
2033931 |
Lunar update: upstream stable patchset 2023-09-01 |
CVE-2023-42755 |
wild pointer access in rsvp classifer in the Linux kernel |
CVE-2023-4563 |
** REJECT ** This was assigned as a duplicate of CVE-2023-4244. |
CVE-2023-42756 |
A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic |
CVE-2023-42753 |
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->n |
CVE-2023-42752 |
integer overflows in kmalloc_reserve() |
CVE-2023-4881 |
** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team. |
CVE-2023-31083 |
An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSET |
CVE-2023-4132 |
A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano d |
CVE-2023-3863 |
A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special |
CVE-2023-3772 |
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADM |
|
About
-
Send Feedback to @ubuntu_updates