UbuntuUpdates.org

Package "linux-mtk"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-mtk

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel version specific cloud tools for version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0

Latest version: 5.15.0-1035.41
Release: jammy (22.04)
Level: base
Repository: main

Links



Other versions of "linux-mtk" in Jammy

Repository Area Version
security universe 5.15.0-1034.40
updates universe 5.15.0-1034.40
proposed universe 5.15.0-1035.41

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.15.0-1035.41 2024-10-21 06:08:30 UTC

 linux-mtk (5.15.0-1035.41) jammy; urgency=medium
 .
   * jammy/linux-mtk: 5.15.0-1035.41 -proposed tracker (LP: #2081792)
 .
   * [g510] ddc failed message when the monitor does not support SCDC
     (LP: #2084626)
     - SAUCE: (no-up) GENIO: drm: mediatek: hdmi: fix ddc failed message when the
       monitor does not support SCDC
 .
   * [g700] support p1v4 hardware (LP: #2081699)
     - SAUCE: (no-up) GENIO: arm64: dts: mediatek: genio-700-evk: modify gpio 111
       to be regulator-gpio
     - SAUCE: (no-up) GENIO: panel: startek-kd070fhfid015: change enable gpio to be
       optional
     - SAUCE: (no-up) arm: dts: mt8188: add disp_pwm1 node
     - SAUCE: (no-up) dtbo: genio-700-evk: add display-dsi-p1v4.dts for G700 EVK
       p1v4
     - SAUCE: (no-up) arm64: dts: mediatek: genio-700-evk: add p1v4 device tree
       overlay
 .
   * [g1200] Call trace appeared when reload mtk_rng module (LP: #2081696)
     - hwrng: mtk - Use devm_pm_runtime_enable
 .
   * [g1200] possible kernel memory leak through CONFIG_DEBUG_KMEMLEAK
     (LP: #2081686)
     - drm/mediatek: Correctly free sg_table in gem prime vmap
 .
   [ Ubuntu: 5.15.0-124.134 ]
 .
   * jammy/linux: 5.15.0-124.134 -proposed tracker (LP: #2082176)
   * CVE-2024-45016
     - netem: fix return value if duplicate enqueue fails
   * CVE-2024-38630
     - watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
   * CVE-2024-27397
     - netfilter: nf_tables: use timestamp to check for set element timeout
 .
   [ Ubuntu: 5.15.0-122.132 ]
 .
   * jammy/linux: 5.15.0-122.132 -proposed tracker (LP: #2078154)
   * isolcpus are ignored when using cgroups V2, causing processes to have wrong
     affinity (LP: #2076957)
     - cgroup/cpuset: Optimize cpuset_attach() on v2
   * Jammy update: v5.15.164 upstream stable release (LP: #2076100) //
     CVE-2024-41009
     - bpf: Fix overrunning reservations in ringbuf
   * CVE-2024-39494
     - ima: Fix use-after-free on a dentry's dname.name
   * CVE-2024-39496
     - btrfs: zoned: fix use-after-free due to race with dev replace
   * CVE-2024-42160
     - f2fs: check validation of fault attrs in f2fs_build_fault_attr()
     - f2fs: Add inline to f2fs_build_fault_attr() stub
   * CVE-2024-38570
     - gfs2: Rename sd_{ glock => kill }_wait
     - gfs2: Fix potential glock use-after-free on unmount
   * CVE-2024-42228
     - drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
   * CVE-2024-27012
     - netfilter: nf_tables: restore set elements when delete set fails
   * CVE-2024-26677
     - rxrpc: Fix delayed ACKs to not set the reference serial number
 .
   [ Ubuntu: 5.15.0-121.131 ]
 .
   * jammy/linux: 5.15.0-121.131 -proposed tracker (LP: #2076347)
   * jammy:linux bpf selftest do not build (LP: #2076334)
     - SAUCE: Revert "bpf: Allow reads from uninit stack"
 .
   [ Ubuntu: 5.15.0-120.130 ]
 .
   * jammy/linux: 5.15.0-120.130 -proposed tracker (LP: #2075903)
   * Packaging resync (LP: #1786013)
     - [Packaging] debian.master/dkms-versions -- update from kernel-versions
       (main/2024.08.05)
   * Jammy update: v5.15.163 upstream stable release (LP: #2075170)
     - Compiler Attributes: Add __uninitialized macro
     - locking/mutex: Introduce devm_mutex_init()
     - drm/lima: fix shared irq handling on driver remove
     - media: dvb: as102-fe: Fix as10x_register_addr packing
     - media: dvb-usb: dib0700_devices: Add missing release_firmware()
     - IB/core: Implement a limit on UMAD receive List
     - scsi: qedf: Make qedf_execute_tmf() non-preemptible
     - crypto: aead,cipher - zeroize key buffer after use
     - drm/amdgpu: Initialize timestamp for some legacy SOCs
     - drm/amd/display: Check index msg_id before read or write
     - drm/amd/display: Check pipe offset before setting vblank
     - drm/amd/display: Skip finding free audio for unknown engine_id
     - media: dw2102: Don't translate i2c read into write
     - sctp: prefer struct_size over open coded arithmetic
     - firmware: dmi: Stop decoding on broken entry
     - Input: ff-core - prefer struct_size over open coded arithmetic
     - wifi: mt76: replace skb_put with skb_put_zero
     - net: dsa: mv88e6xxx: Correct check for empty list
     - media: dvb-frontends: tda18271c2dd: Remove casting during div
     - media: s2255: Use refcount_t instead of atomic_t for num_channels
     - media: dvb-frontends: tda10048: Fix integer overflow
     - i2c: i801: Annotate apanel_addr as __ro_after_init
     - powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n
     - orangefs: fix out-of-bounds fsid access
     - kunit: Fix timeout message
     - powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#"
     - igc: fix a log entry using uninitialized netdev
     - bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
     - jffs2: Fix potential illegal address access in jffs2_free_inode
     - s390/pkey: Wipe sensitive data on failure
     - tools/power turbostat: Remember global max_die_id
     - UPSTREAM: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open()
     - tcp_metrics: validate source addr length
     - KVM: s390: fix LPSWEY handling
     - e1000e: Fix S0ix residency on corporate systems
     - net: allow skb_datagram_iter to be called from any context
     - wifi: wilc1000: fix ies_len type in connect path
     - riscv: kexec: Avoid deadlock in kexec crash path
     - netfilter: nf_tables: unconditionally flush pending work before notifier
     - bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()
     - selftests: fix OOM in msg_zerocopy selftest
     - selftests: make order checking verbose in msg_zerocopy selftest
     - inet_diag: Initialize pad field in struct inet_diag_req_v2
     - gpiolib: of: factor out code overriding gpio line polarity
     - gpiolib: of: add a quirk for reset line polarity for Himax LCDs
     - gpiolib: of: add polarity quirk for TSC2005
     - Revert "igc: fix a log entry using uninit

Source diff to previous version
2084626 [g510] ddc failed message when the monitor does not support SCDC
2081699 [g700] support p1v4 hardware
2081696 [g1200] Call trace appeared when reload mtk_rng module
2081686 [g1200] possible kernel memory leak through CONFIG_DEBUG_KMEMLEAK
2076957 isolcpus are ignored when using cgroups V2, causing processes to have wrong affinity
2076100 Jammy update: v5.15.164 upstream stable release
2076334 jammy:linux bpf selftest do not build
1786013 Packaging resync
2075170 Jammy update: v5.15.163 upstream stable release
2074215 [SRU] UBSAN warnings in bnx2x kernel driver
2073765 Jammy update: v5.15.162 upstream stable release
2072858 Fix L2CAP/LE/CPU/BI-02-C bluetooth certification failure
2073092 net/sched: Fix conntrack use-after-free
2072617 Jammy update: v5.15.161 upstream stable release
2073267 Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4
CVE-2024-45016 In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu
CVE-2024-38630 In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the
CVE-2024-27397 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time
CVE-2024-41009 In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overrunning reservations in ringbuf The BPF ring buffer internally is
CVE-2024-39494 In the Linux kernel, the following vulnerability has been resolved: ima: Fix use-after-free on a dentry's dname.name ->d_name.name can change on re
CVE-2024-39496 In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix use-after-free due to race with dev replace While loading a z
CVE-2024-42160 In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to
CVE-2024-38570 In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix potential glock use-after-free on unmount When a DLM lockspace is rel
CVE-2024-42228 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc In
CVE-2024-27012 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: restore set elements when delete set fails From abort pat
CVE-2024-26677 In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix delayed ACKs to not set the reference serial number Fix the construc
CVE-2024-26921 In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and oth
CVE-2024-39484 In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit f
CVE-2024-39292 In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winc
CVE-2024-36901 In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a
CVE-2024-26830 In the Linux kernel, the following vulnerability has been resolved: i40e: Do not allow untrusted VF to remove administratively set MAC Currently wh
CVE-2024-26680 In the Linux kernel, the following vulnerability has been resolved: net: atlantic: Fix DMA mapping for PTP hwts ring Function aq_ring_hwts_rx_alloc
CVE-2023-52760 In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc In gfs2_put_super(), whether w
CVE-2023-52629 In the Linux kernel, the following vulnerability has been resolved: sh: push-switch: Reorder cleanup operations to avoid use-after-free bug The ori

Version: 5.15.0-1034.40 2024-10-02 10:08:41 UTC

 linux-mtk (5.15.0-1034.40) jammy; urgency=medium
 .
   * jammy/linux-mtk: 5.15.0-1034.40 -proposed tracker (LP: #2082876)
 .
   * [g1200] regulators not enabled after sru d2024.08.12 (LP: #2082868)
     - SAUCE: (no-up) regulator: mt6360: fix compatibility issue for downstream
       device tree
     - SAUCE: (no-up) power: supply: mt6360_charger: fix compatibility issue for
       downstream device tree
 .
   * [uc22][g700] systemd-backlight@backlight:1c008000.dsi0.0.service loaded
     failed during cold boot stress test (LP: #2078763)
     - [Config] CONFIG_DRM_MEDIATEK_HDMI=y and CONFIG_PHY_MTK_HDMI=y
 .
   * [g510][g700] add fsource device tree node (LP: #2078762)
     - SAUCE: (no-up) GENIO: arm64: dts: mediatek: genio-700-evk/genio-510-evk: add
       fsource device tree node
 .
   [ Ubuntu: 5.15.0-119.129 ]
 .
   * jammy/linux: 5.15.0-119.129 -proposed tracker (LP: #2075665)
   * Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4
     (LP: #2073267)
     - SAUCE: Revert "randomize_kstack: Improve entropy diffusion"
   * CVE-2024-26921
     - inet: inet_defrag: prevent sk release while still in use
   * Jammy update: v5.15.162 upstream stable release (LP: #2073765) //
     CVE-2024-39484
     - mmc: davinci: Don't strip remove function when driver is builtin
   * Jammy update: v5.15.162 upstream stable release (LP: #2073765)
     - mmc: davinci_mmc: Convert to platform remove callback returning void
   * CVE-2024-39292
     - um: Add winch to winch_handlers before registering winch IRQ
   * CVE-2024-36901
     - ipv6: prevent NULL dereference in ip6_output()
   * CVE-2024-26830
     - i40e: Do not allow untrusted VF to remove administratively set MAC
   * CVE-2024-26680
     - net: atlantic: Fix DMA mapping for PTP hwts ring
   * CVE-2023-52760
     - gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
   * CVE-2023-52629
     - sh: push-switch: Reorder cleanup operations to avoid use-after-free bug
 .
   [ Ubuntu: 5.15.0-118.128 ]
 .
   * jammy/linux: 5.15.0-118.128 -proposed tracker (LP: #2072255)
   * Jammy update: v5.15.160 upstream stable release (LP: #2070292)
     - drm/amd/display: Fix division by zero in setup_dsc_config
     - pinctrl: core: handle radix_tree_insert() errors in
       pinctrl_register_one_pin()
     - nfsd: don't allow nfsd threads to be signalled.
     - KEYS: trusted: Fix memory leak in tpm2_key_encode()
     - Revert "selftests: mm: fix map_hugetlb failure on 64K page size systems"
     - net: bcmgenet: synchronize EXT_RGMII_OOB_CTRL access
     - net: bcmgenet: synchronize UMAC_CMD access
     - netlink: annotate lockless accesses to nlk->max_recvmsg_len
     - netlink: annotate data-races around sk->sk_err
     - KVM: x86: Clear "has_error_code", not "error_code", for RM exception
       injection
     - drm/amdgpu: Fix possible NULL dereference in
       amdgpu_ras_query_error_status_helper()
     - binder: fix max_thread type inconsistency
     - usb: typec: ucsi: displayport: Fix potential deadlock
     - serial: kgdboc: Fix NMI-safety problems from keyboard reset code
     - remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
     - KEYS: trusted: Do not use WARN when encode fails
     - admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
     - docs: kernel_include.py: Cope with docutils 0.21
     - Linux 5.15.160
   * Jammy update: v5.15.159 upstream stable release (LP: #2070028)
     - dmaengine: pl330: issue_pending waits until WFP state
     - dmaengine: Revert "dmaengine: pl330: issue_pending waits until WFP state"
     - wifi: nl80211: don't free NULL coalescing rule
     - ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf
     - ksmbd: validate request buffer size in smb2_allocate_rsp_buf()
     - ksmbd: clear RENAME_NOREPLACE before calling vfs_rename
     - eeprom: at24: Use dev_err_probe for nvmem register failure
     - eeprom: at24: Probe for DDR3 thermal sensor in the SPD case
     - eeprom: at24: fix memory corruption race condition
     - pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T
     - pinctrl/meson: fix typo in PDM's pin name
     - pinctrl: core: delete incorrect free in pinctrl_enable()
     - pinctrl: mediatek: paris: Rework mtk_pinconf_{get,set} switch/case logic
     - pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback
     - pinctrl: mediatek: paris: Rework support for
       PIN_CONFIG_{INPUT,OUTPUT}_ENABLE
     - sunrpc: add a struct rpc_stats arg to rpc_create_args
     - nfs: expose /proc/net/sunrpc/nfs in net namespaces
     - nfs: make the rpc_stat per net namespace
     - nfs: Handle error of rpc_proc_register() in nfs_net_init().
     - power: rt9455: hide unused rt9455_boost_voltage_values
     - power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator
     - pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()
     - regulator: mt6360: De-capitalize devicetree regulator subnodes
     - bpf, kconfig: Fix DEBUG_INFO_BTF_MODULES Kconfig definition
     - bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
     - bpf: Fix a verifier verbose message
     - spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs
     - s390/mm: Fix storage key clearing for guest huge pages
     - s390/mm: Fix clearing storage keys for huge pages
     - xdp: Move conversion to xdp_frame out of map functions
     - xdp: Add xdp_do_redirect_frame() for pre-computed xdp_frames
     - xdp: use flags field to disambiguate broadcast redirect
     - bna: ensure the copied buf is NUL terminated
     - octeontx2-af: avoid off-by-one read from userspace
     - nsh: Restore skb->{protocol,data,mac_header} for outer header in
       nsh_gso_segment().
     - net l2tp: drop flow hash on forward
     - s390/vdso: Add CFI for RA register to asm macro vdso_func
     - net: qede: sanitize 'rc' in qede_add_tc_flower_fltr()
     - net: qede: use return from qede_parse_flow_attr

Source diff to previous version
2082868 [g1200] regulators not enabled after sru d2024.08.12\t
2078763 [uc22][g700] systemd-backlight@backlight:1c008000.dsi0.0.service loaded failed during cold boot stress test
2078762 [g510][g700] add fsource device tree node
2073267 Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4
2073765 Jammy update: v5.15.162 upstream stable release
2070292 Jammy update: v5.15.160 upstream stable release
2070028 Jammy update: v5.15.159 upstream stable release
2061091 Freezing user space processes failed after 20.008 seconds (1 tasks refusing to freeze, wq_busy=0)
2069081 idxd: NULL pointer dereference reading wq op_config attribute
2068738 AMD GPUs fail with null pointer dereference when IOMMU enabled, leading to black screen
1786013 Packaging resync
2067974 Jammy update: v5.15.158 upstream stable release
2067959 Jammy update: v5.15.157 upstream stable release
2046722 [SRU][22.04.4]: megaraid_sas: Critical Bug Fixes
2065857 Jammy update: v5.15.156 upstream stable release
2065805 Jammy update: v5.15.155 upstream stable release
2065435 Jammy update: v5.15.154 upstream stable release
CVE-2024-26921 In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and oth
CVE-2024-39484 In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit f
CVE-2024-39292 In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winc
CVE-2024-36901 In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a
CVE-2024-26830 In the Linux kernel, the following vulnerability has been resolved: i40e: Do not allow untrusted VF to remove administratively set MAC Currently wh
CVE-2024-26680 In the Linux kernel, the following vulnerability has been resolved: net: atlantic: Fix DMA mapping for PTP hwts ring Function aq_ring_hwts_rx_alloc
CVE-2023-52760 In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc In gfs2_put_super(), whether w
CVE-2023-52629 In the Linux kernel, the following vulnerability has been resolved: sh: push-switch: Reorder cleanup operations to avoid use-after-free bug The ori
CVE-2024-27017 In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generatio
CVE-2024-26952 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix potencial out-of-bounds when buffer offset is invalid I found potenc
CVE-2024-26886 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: af_bluetooth: Fix deadlock Attemting to do sock_lock on .recvmsg may
CVE-2023-52752 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB ses
CVE-2024-25742 In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This
CVE-2024-36016 In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following
CVE-2024-23307 Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow
CVE-2024-26828 In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through
CVE-2024-24861 A race condition was found in the Linux kernel's media/xc4000 device driver in xc4000 xc4000_get_frequency() function. This can result in return valu
CVE-2024-26642 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets a
CVE-2024-26926 In the Linux kernel, the following vulnerability has been resolved: binder: check offset alignment in binder_get_object() Commit 6d98eb95b450 ("bin
CVE-2024-26922 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate the parameters of bo mapping operations more clearly Verif
CVE-2023-6039 A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel.
CVE-2024-26924 In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element Pablo reports a crash with
CVE-2024-26643 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout

Version: 5.15.0-1034.39 2024-09-04 17:19:58 UTC

 linux-mtk (5.15.0-1034.39) jammy; urgency=medium
 .
   * jammy/linux-mtk: 5.15.0-1034.39 -proposed tracker (LP: #2078880)
 .
   * [uc22][g700] systemd-backlight@backlight:1c008000.dsi0.0.service loaded
     failed during cold boot stress test (LP: #2078763)
     - [Config] CONFIG_DRM_MEDIATEK_HDMI=y and CONFIG_PHY_MTK_HDMI=y
 .
   * [g510][g700] add fsource device tree node (LP: #2078762)
     - SAUCE: (no-up) GENIO: arm64: dts: mediatek: genio-700-evk/genio-510-evk: add
       fsource device tree node
 .
   [ Ubuntu: 5.15.0-119.129 ]
 .
   * jammy/linux: 5.15.0-119.129 -proposed tracker (LP: #2075665)
   * Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4
     (LP: #2073267)
     - SAUCE: Revert "randomize_kstack: Improve entropy diffusion"
   * CVE-2024-26921
     - inet: inet_defrag: prevent sk release while still in use
   * Jammy update: v5.15.162 upstream stable release (LP: #2073765) //
     CVE-2024-39484
     - mmc: davinci: Don't strip remove function when driver is builtin
   * Jammy update: v5.15.162 upstream stable release (LP: #2073765)
     - mmc: davinci_mmc: Convert to platform remove callback returning void
   * CVE-2024-39292
     - um: Add winch to winch_handlers before registering winch IRQ
   * CVE-2024-36901
     - ipv6: prevent NULL dereference in ip6_output()
   * CVE-2024-26830
     - i40e: Do not allow untrusted VF to remove administratively set MAC
   * CVE-2024-26680
     - net: atlantic: Fix DMA mapping for PTP hwts ring
   * CVE-2023-52760
     - gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
   * CVE-2023-52629
     - sh: push-switch: Reorder cleanup operations to avoid use-after-free bug
 .
   [ Ubuntu: 5.15.0-118.128 ]
 .
   * jammy/linux: 5.15.0-118.128 -proposed tracker (LP: #2072255)
   * Jammy update: v5.15.160 upstream stable release (LP: #2070292)
     - drm/amd/display: Fix division by zero in setup_dsc_config
     - pinctrl: core: handle radix_tree_insert() errors in
       pinctrl_register_one_pin()
     - nfsd: don't allow nfsd threads to be signalled.
     - KEYS: trusted: Fix memory leak in tpm2_key_encode()
     - Revert "selftests: mm: fix map_hugetlb failure on 64K page size systems"
     - net: bcmgenet: synchronize EXT_RGMII_OOB_CTRL access
     - net: bcmgenet: synchronize UMAC_CMD access
     - netlink: annotate lockless accesses to nlk->max_recvmsg_len
     - netlink: annotate data-races around sk->sk_err
     - KVM: x86: Clear "has_error_code", not "error_code", for RM exception
       injection
     - drm/amdgpu: Fix possible NULL dereference in
       amdgpu_ras_query_error_status_helper()
     - binder: fix max_thread type inconsistency
     - usb: typec: ucsi: displayport: Fix potential deadlock
     - serial: kgdboc: Fix NMI-safety problems from keyboard reset code
     - remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
     - KEYS: trusted: Do not use WARN when encode fails
     - admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
     - docs: kernel_include.py: Cope with docutils 0.21
     - Linux 5.15.160
   * Jammy update: v5.15.159 upstream stable release (LP: #2070028)
     - dmaengine: pl330: issue_pending waits until WFP state
     - dmaengine: Revert "dmaengine: pl330: issue_pending waits until WFP state"
     - wifi: nl80211: don't free NULL coalescing rule
     - ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf
     - ksmbd: validate request buffer size in smb2_allocate_rsp_buf()
     - ksmbd: clear RENAME_NOREPLACE before calling vfs_rename
     - eeprom: at24: Use dev_err_probe for nvmem register failure
     - eeprom: at24: Probe for DDR3 thermal sensor in the SPD case
     - eeprom: at24: fix memory corruption race condition
     - pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T
     - pinctrl/meson: fix typo in PDM's pin name
     - pinctrl: core: delete incorrect free in pinctrl_enable()
     - pinctrl: mediatek: paris: Rework mtk_pinconf_{get,set} switch/case logic
     - pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback
     - pinctrl: mediatek: paris: Rework support for
       PIN_CONFIG_{INPUT,OUTPUT}_ENABLE
     - sunrpc: add a struct rpc_stats arg to rpc_create_args
     - nfs: expose /proc/net/sunrpc/nfs in net namespaces
     - nfs: make the rpc_stat per net namespace
     - nfs: Handle error of rpc_proc_register() in nfs_net_init().
     - power: rt9455: hide unused rt9455_boost_voltage_values
     - power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator
     - pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()
     - regulator: mt6360: De-capitalize devicetree regulator subnodes
     - bpf, kconfig: Fix DEBUG_INFO_BTF_MODULES Kconfig definition
     - bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
     - bpf: Fix a verifier verbose message
     - spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs
     - s390/mm: Fix storage key clearing for guest huge pages
     - s390/mm: Fix clearing storage keys for huge pages
     - xdp: Move conversion to xdp_frame out of map functions
     - xdp: Add xdp_do_redirect_frame() for pre-computed xdp_frames
     - xdp: use flags field to disambiguate broadcast redirect
     - bna: ensure the copied buf is NUL terminated
     - octeontx2-af: avoid off-by-one read from userspace
     - nsh: Restore skb->{protocol,data,mac_header} for outer header in
       nsh_gso_segment().
     - net l2tp: drop flow hash on forward
     - s390/vdso: Add CFI for RA register to asm macro vdso_func
     - net: qede: sanitize 'rc' in qede_add_tc_flower_fltr()
     - net: qede: use return from qede_parse_flow_attr() for flower
     - net: qede: use return from qede_parse_flow_attr() for flow_spec
     - net: qede: use return from qede_parse_actions()
     - ASoC: meson: axg-fifo: use FIELD helpers
     - ASoC: meson: axg-fifo: use threaded irq to check periods
     - ASoC: meson: axg-card: make lin

Source diff to previous version
2078763 [uc22][g700] systemd-backlight@backlight:1c008000.dsi0.0.service loaded failed during cold boot stress test
2078762 [g510][g700] add fsource device tree node
2073267 Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4
2073765 Jammy update: v5.15.162 upstream stable release
2070292 Jammy update: v5.15.160 upstream stable release
2070028 Jammy update: v5.15.159 upstream stable release
2061091 Freezing user space processes failed after 20.008 seconds (1 tasks refusing to freeze, wq_busy=0)
2069081 idxd: NULL pointer dereference reading wq op_config attribute
2068738 AMD GPUs fail with null pointer dereference when IOMMU enabled, leading to black screen
1786013 Packaging resync
2067974 Jammy update: v5.15.158 upstream stable release
2067959 Jammy update: v5.15.157 upstream stable release
2046722 [SRU][22.04.4]: megaraid_sas: Critical Bug Fixes
2065857 Jammy update: v5.15.156 upstream stable release
2065805 Jammy update: v5.15.155 upstream stable release
2065435 Jammy update: v5.15.154 upstream stable release
CVE-2024-26921 In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and oth
CVE-2024-39484 In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit f
CVE-2024-39292 In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winc
CVE-2024-36901 In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a
CVE-2024-26830 In the Linux kernel, the following vulnerability has been resolved: i40e: Do not allow untrusted VF to remove administratively set MAC Currently wh
CVE-2024-26680 In the Linux kernel, the following vulnerability has been resolved: net: atlantic: Fix DMA mapping for PTP hwts ring Function aq_ring_hwts_rx_alloc
CVE-2023-52760 In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc In gfs2_put_super(), whether w
CVE-2023-52629 In the Linux kernel, the following vulnerability has been resolved: sh: push-switch: Reorder cleanup operations to avoid use-after-free bug The ori
CVE-2024-27017 In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generatio
CVE-2024-26952 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix potencial out-of-bounds when buffer offset is invalid I found potenc
CVE-2024-26886 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: af_bluetooth: Fix deadlock Attemting to do sock_lock on .recvmsg may
CVE-2023-52752 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB ses
CVE-2024-25742 In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This
CVE-2024-36016 In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following
CVE-2024-23307 Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow
CVE-2024-26828 In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through
CVE-2024-24861 A race condition was found in the Linux kernel's media/xc4000 device driver in xc4000 xc4000_get_frequency() function. This can result in return valu
CVE-2024-26642 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets a
CVE-2024-26926 In the Linux kernel, the following vulnerability has been resolved: binder: check offset alignment in binder_get_object() Commit 6d98eb95b450 ("bin
CVE-2024-26922 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate the parameters of bo mapping operations more clearly Verif
CVE-2023-6039 A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel.
CVE-2024-26924 In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element Pablo reports a crash with
CVE-2024-26643 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout

Version: 5.15.0-1033.38 2024-07-15 10:11:44 UTC

 linux-mtk (5.15.0-1033.38) jammy; urgency=medium
 .
   * jammy/linux-mtk: 5.15.0-1033.38 -proposed tracker (LP: #2072455)
 .
   * [g350] No video output on HDMI (LP: #2072531)
     - SAUCE: (no-up) drm/mediatek: dpi: fix hdmi output for g350(mt8365)
 .
   * [UC22][g350] systemd-backlight@backlight:14014000.dsi0.0.service: Failed to
     write system 'brightness' attribute: Invalid argument during warm-boot /
     cold-boot stress test (LP: #2069787)
     - [Config] CONFIG_DRM_PANEL_STARTEK_KD070FHFID015=m
 .
   * [SRU] UBSAN: shift-out-of-bounds in mt6359-regulator.c:281 (LP: #2059227)
     - SAUCE: (no-up) regulator: mt6359: fix regulator mode setting
 .
   [ Ubuntu: 5.15.0-113.123 ]
 .
   * jammy/linux: 5.15.0-113.123 -proposed tracker (LP: #2068242)
   * CVE-2024-26924
     - netfilter: nft_set_pipapo: do not free live element
   * CVE-2024-26643
     - netfilter: nf_tables: mark set as dead when unbinding anonymous set with
       timeout

Source diff to previous version
CVE-2024-26924 In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element Pablo reports a crash with
CVE-2024-26643 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout

Version: 5.15.0-1032.37 2024-06-14 15:11:55 UTC

 linux-mtk (5.15.0-1032.37) jammy; urgency=medium
 .
   * jammy/linux-mtk: 5.15.0-1032.37 -proposed tracker (LP: #2069247)
 .
   * [uc22][g350] Call trace "WARNING: CPU: 1 PID: 2055 at
     drivers/net/phy/phy_device.c:324 mdio_bus_phy_resume+0x148/0x150" be
     observed during suspend (LP: #2062505)
     - SAUCE: (no-up) net: ethernet: mtk-star-emac: set mac_managed_pm during
       enable
 .
   * [g1200-evk] kernel null pointer deference happened when unload apusys module
     (LP: #2067439)
     - SAUCE: (no-up) apusys: vpu: Set return value correctly if core0 can't be
       probed
     - SAUCE: (no-up) apusys: sw_logger: Check dma addr in sw_logger_remove
 .
   * [g1200-evk] Kernel Sanity Check - The log shown with level > error are
     regarded as fail. (LP: #2033716)
     - SAUCE: (no-up) apusys: vpu: Replace trace_printk with vpu_met_debug
     - SAUCE: (no-up) apusys: Don't call trace_puts if CONFIG_UBUNTU_HOST is
       enabled
 .
   * Miscellaneous Ubuntu changes
     - SAUCE: (no-up) drm/tegra: dpaux: fix build error for include statements
     - SAUCE: (no-up) apusys: Include header file from correct place
     - SAUCE: (no-up) GENIO: media: platform: mtk-mdp3: Include header file from
       correct place
     - SAUCE: (no-up) GENIO: soc: mediatek: hdmirx: Include header file from
       correct place
     - [Packaging] arm64: enable signed kernel
 .
   [ Ubuntu: 5.15.0-112.122 ]
 .
   * jammy/linux: 5.15.0-112.122 -proposed tracker (LP: #2065898)
   * CVE-2024-21823
     - dmanegine: idxd: reformat opcap output to match bitmap_parse() input
     - dmaengine: idxd: add WQ operation cap restriction support
     - dmaengine: idxd: add knob for enqcmds retries
     - VFIO: Add the SPR_DSA and SPR_IAX devices to the denylist
     - dmaengine: idxd: add a new security check to deal with a hardware erratum
     - dmaengine: idxd: add a write() method for applications to submit work
 .
   [ Ubuntu: 5.15.0-111.121 ]
 .
   * jammy/linux: 5.15.0-111.121 -proposed tracker (LP: #2063763)
   * RTL8852BE fw security fail then lost WIFI function during suspend/resume
     cycle (LP: #2063096)
     - wifi: rtw89: download firmware with five times retry
   * Mount CIFS fails with Permission denied (LP: #2061986)
     - cifs: fix ntlmssp auth when there is no key exchange
   * USB stick can't be detected (LP: #2040948)
     - usb: Disable USB3 LPM at shutdown
   * Jammy update: v5.15.153 upstream stable release (LP: #2063290)
     - io_uring/unix: drop usage of io_uring socket
     - io_uring: drop any code related to SCM_RIGHTS
     - selftests: tls: use exact comparison in recv_partial
     - ASoC: rt5645: Make LattePanda board DMI match more precise
     - x86/xen: Add some null pointer checking to smp.c
     - MIPS: Clear Cause.BD in instruction_pointer_set
     - HID: multitouch: Add required quirk for Synaptics 0xcddc device
     - gen_compile_commands: fix invalid escape sequence warning
     - RDMA/mlx5: Fix fortify source warning while accessing Eth segment
     - RDMA/mlx5: Relax DEVX access upon modify commands
     - riscv: dts: sifive: add missing #interrupt-cells to pmic
     - x86/mm: Move is_vsyscall_vaddr() into asm/vsyscall.h
     - x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()
     - net/iucv: fix the allocation size of iucv_path_table array
     - parisc/ftrace: add missing CONFIG_DYNAMIC_FTRACE check
     - block: sed-opal: handle empty atoms when parsing response
     - dm-verity, dm-crypt: align "struct bvec_iter" correctly
     - scsi: mpt3sas: Prevent sending diag_reset when the controller is ready
     - ALSA: hda/realtek - ALC285 reduce pop noise from Headphone port
     - drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series
     - Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
     - firewire: core: use long bus reset on gap count error
     - ASoC: Intel: bytcr_rt5640: Add an extra entry for the Chuwi Vi8 tablet
     - Input: gpio_keys_polled - suppress deferred probe error for gpio
     - ASoC: wm8962: Enable oscillator if selecting WM8962_FLL_OSC
     - ASoC: wm8962: Enable both SPKOUTR_ENA and SPKOUTL_ENA in mono mode
     - ASoC: wm8962: Fix up incorrect error message in wm8962_set_fll
     - do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
     - s390/dasd: put block allocation in separate function
     - s390/dasd: add query PPRC function
     - s390/dasd: add copy pair setup
     - s390/dasd: add autoquiesce feature
     - s390/dasd: Use dev_*() for device log messages
     - s390/dasd: fix double module refcount decrement
     - fs/select: rework stack allocation hack for clang
     - md: Don't clear MD_CLOSING when the raid is about to stop
     - lib/cmdline: Fix an invalid format specifier in an assertion msg
     - time: test: Fix incorrect format specifier
     - rtc: test: Fix invalid format specifier.
     - aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
     - timekeeping: Fix cross-timestamp interpolation on counter wrap
     - timekeeping: Fix cross-timestamp interpolation corner case decision
     - timekeeping: Fix cross-timestamp interpolation for non-x86
     - sched/fair: Take the scheduling domain into account in select_idle_core()
     - wifi: ath10k: fix NULL pointer dereference in
       ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()
     - wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled
     - wifi: b43: Stop/wake correct queue in PIO Tx path when QoS is disabled
     - wifi: b43: Stop correct queue in DMA worker when QoS is disabled
     - wifi: b43: Disable QoS for bcm4331
     - wifi: wilc1000: fix declarations ordering
     - wifi: wilc1000: fix RCU usage in connect path
     - wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work
     - wifi: wilc1000: fix multi-vif management when deleting a vif
     - wifi: mwifiex: debugfs: Drop unnecessary error check for
       debugfs_create_dir()
     - cpufreq: brcmstb-avs-cpufreq: add ch

2063096 RTL8852BE fw security fail then lost WIFI function during suspend/resume cycle
2061986 Mount CIFS fails with Permission denied
2063290 Jammy update: v5.15.153 upstream stable release
2063276 Jammy update: v5.15.152 upstream stable release
2060422 Avoid creating non-working backlight sysfs knob from ASUS board
2058477 [Ubuntu 22.04.4/linux-image-6.5.0-26-generic] Kernel output \
2060209 Jammy update: v5.15.151 upstream stable release
2063067 Fix bluetooth connections with 3.0 device
2060142 Jammy update: v5.15.150 upstream stable release
2055083 Drop fips-checks script from trees
2058573 alsa/realtek: adjust max output valume for headphone on 2 LG machines
2032164 A general-proteciton exception during guest migration to unsupported PKRU machine
2058485 [ICX] [SPR] [ipc/msg] performance: Mitigate the lock contention with percpu counter
2059014 Jammy update: v5.15.149 upstream stable release
2056418 Fix headphone mic detection issue on ALC897
2056373 Problems with HVCS and hotplugging
2056227 KVM: arm64: softlockups in stage2_apply_range
CVE-2024-21823 Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow
CVE-2024-26809 In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: release elements in clone only from destroy path Clo
CVE-2024-26792 In the Linux kernel, the following vulnerability has been resolved: btrfs: fix double free of anonymous device after snapshot creation failure When
CVE-2023-52530 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential key use-after-free When ieee80211_key_link() is c
CVE-2023-52447 In the Linux kernel, the following vulnerability has been resolved: bpf: Defer the free of inner map when necessary When updating or deleting an in
CVE-2024-26782 In the Linux kernel, the following vulnerability has been resolved: mptcp: fix double-free on socket dismantle when MPTCP server accepts an incomin
CVE-2024-26733 In the Linux kernel, the following vulnerability has been resolved: arp: Prevent overflow in arp_req_get(). syzkaller reported an overflown write i
CVE-2024-26735 In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations
CVE-2024-26736 In the Linux kernel, the following vulnerability has been resolved: afs: Increase buffer size in afs_update_volume_status() The max length of volum
CVE-2024-26748 In the Linux kernel, the following vulnerability has been resolved: usb: cdns3: fix memory double free when handle zero packet 829 if (request->co
CVE-2023-47233 The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by
CVE-2024-26584 In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests Since we're setting the CRYPTO_
CVE-2024-26585 In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous
CVE-2024-26583 In the Linux kernel, the following vulnerability has been resolved: tls: fix race between async notify and socket close The submitting thread (one
CVE-2024-26622 In the Linux kernel, the following vulnerability has been resolved: tomoyo: fix UAF write bug in tomoyo_write_control() Since tomoyo_write_control(
CVE-2024-2201 Native Branch History Injection
CVE-2023-6039 A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel.



About   -   Send Feedback to @ubuntu_updates