UbuntuUpdates.org

Package "linux-oem-5.14"




Name: linux-oem-5.14

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: focal (20.04)
Level: proposed
Repository: main

Links



Other versions of "linux-oem-5.14" in Focal

Repository Area Version
security main 5.14.0-1059.67
updates main 5.14.0-1059.67
PPA: Canonical Kernel Team 5.14.0-1059.67

Changelog

Version: 5.14.0-1057.64 2023-01-27 16:07:00 UTC

  linux-oem-5.14 (5.14.0-1057.64) focal; urgency=medium

  * focal/linux-oem-5.14: 5.14.0-1057.64 -proposed tracker (LP: #2003500)

  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/2023.01.02)

  * CVE-2022-3545
    - nfp: fix use-after-free in area_cache_get()

  * CVE-2022-42895
    - Bluetooth: L2CAP: Fix attempting to access uninitialized memory

  * CVE-2022-4139
    - drm/i915/gt: Serialize TLB invalidates with GT resets
    - drm/i915: fix TLB invalidation for Gen12 video and compute engines

  * Revoke & rotate to new signing key (LP: #2002812)
    - [Packaging] Revoke and rotate to new signing key

  * CVE-2023-0179
    - netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits

 -- Timo Aaltonen <email address hidden> Mon, 23 Jan 2023 12:34:55 +0200

1786013 Packaging resync
2002812 Revoke \u0026 rotate to new signing key
CVE-2022-3545 A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file
CVE-2022-42895 There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel
CVE-2023-0179 netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits

Version: *DELETED* 2023-01-18 01:07:45 UTC
No changelog for deleted or moved packages.

Version: 5.14.0-1056.63 2022-12-17 00:07:16 UTC

  linux-oem-5.14 (5.14.0-1056.63) focal; urgency=medium

  * focal/linux-oem-5.14: 5.14.0-1056.63 -proposed tracker (LP: #1997836)

  * CVE-2022-4378
    - proc: proc_skip_spaces() shouldn't think it is working on C strings
    - proc: avoid integer type confusion in get_proc_long

  * CVE-2022-45934
    - Bluetooth: L2CAP: Fix u8 overflow

  * CVE-2022-42896
    - Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
    - Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm

  * Fix AMD-PState driver for Genoa CPU (LP: #1998106)
    - Documentation: amd-pstate: add tracer tool introduction
    - Documentation: amd-pstate: grammar and sentence structure updates
    - Documentation: amd-pstate: Add unit test introduction
    - cpufreq: amd-pstate: cpufreq: amd-pstate: reset MSR_AMD_PERF_CTL register at
      init
    - cpufreq: amd-pstate: change amd-pstate driver to be built-in type
    - cpufreq: amd-pstate: add amd-pstate driver parameter for mode selection
    - Documentation: amd-pstate: add driver working mode introduction
    - Documentation: add amd-pstate kernel command line options

 -- Timo Aaltonen <email address hidden> Fri, 16 Dec 2022 16:23:14 +0200

CVE-2022-45934 An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_R
CVE-2022-42896 There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which ma

Version: *DELETED* 2022-10-20 21:07:17 UTC
No changelog for deleted or moved packages.

Version: 5.14.0-1053.60 2022-10-14 13:07:16 UTC

  linux-oem-5.14 (5.14.0-1053.60) focal; urgency=medium

  * focal/linux-oem-5.14: 5.14.0-1053.60 -proposed tracker (LP: #1989893)

  * CVE-2022-40768
    - scsi: stex: Properly zero out the passthrough command structure

  * Fix resume on AMD platforms when TBT monitor is plugged (LP: #1990920)
    - drm/amd/display: Detect dpcd_rev when hotplug mst monitor
    - drm/amd/display: Release remote dc_sink under mst scenario

  * pcieport 0000:00:1b.0: PCIe Bus Error: severity=Uncorrected (Non-Fatal),
    type=Transaction Layer, (Requester ID) (LP: #1988797)
    - Revert "PCI: Make pci_enable_ptm() private"
    - PCI: Add pcie_ptm_enabled()
    - SAUCE: PCI/PTM: Cache PTM Capability offset
    - SAUCE: PCI/PTM: Add pci_upstream_ptm() helper
    - SAUCE: PCI/PTM: Separate configuration and enable
    - SAUCE: PCI/PTM: Add pci_suspend_ptm() and pci_resume_ptm()
    - SAUCE: PCI/PTM: Move pci_ptm_info() body into its only caller
    - SAUCE: PCI/PTM: Preserve RsvdP bits in PTM Control register
    - SAUCE: PCI/PTM: Reorder functions in logical order
    - SAUCE: PCI/PTM: Consolidate PTM interface declarations
    - SAUCE: PCI/PM: Always disable PTM for all devices during suspend
    - SAUCE: PCI/PM: Simplify pci_pm_suspend_noirq()

  * AMD Yellow Carp system hang on HDMI plug in/out over HP hook2 docking
    (LP: #1991974)
    - drm/amd/display: Fix for link encoder access for MST.
    - drm/amd/display: Fix MST link encoder availability check.
    - drm/amd/display: FEC configuration for dpia links
    - drm/amd/display: FEC configuration for dpia links in MST mode
    - drm/amd/display: Add work around for tunneled MST.

 -- Timo Aaltonen <email address hidden> Fri, 07 Oct 2022 19:44:26 +0300

1990920 Fix resume on AMD platforms when TBT monitor is plugged
1991974 AMD Yellow Carp system hang on HDMI plug in/out over HP hook2 docking
CVE-2022-40768 drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecomman



About   -   Send Feedback to @ubuntu_updates