UbuntuUpdates.org

Package "linux-hwe-5.13"

Name: linux-hwe-5.13

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel buildinfo for version 5.13.0 on 64 bit x86 SMP
  • Linux kernel buildinfo for version 5.13.0 on 64 bit x86 SMP
  • Linux kernel buildinfo for version 5.13.0 on 64 bit x86 SMP
  • Linux kernel buildinfo for version 5.13.0 on 64 bit x86 SMP

Latest version: 5.13.0-52.59~20.04.1
Release: focal (20.04)
Level: security
Repository: main

Links



Other versions of "linux-hwe-5.13" in Focal

Repository Area Version
updates main 5.13.0-52.59~20.04.1
proposed main 5.13.0-44.49~20.04.1
PPA: Canonical Kernel Team 5.13.0-52.59~20.04.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.13.0-52.59~20.04.1 2022-06-30 22:06:19 UTC

  linux-hwe-5.13 (5.13.0-52.59~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.13: 5.13.0-52.59~20.04.1 -proposed tracker (LP: #1978627)

  [ Ubuntu: 5.13.0-52.59 ]

  * impish/linux: 5.13.0-52.59 -proposed tracker (LP: #1978628)
  * CVE-2022-28388
    - can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error
      path
  * test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed (Check VM
    connectivity through VXLAN (underlay in the default VRF) [FAIL])
    (LP: #1871015)
    - selftests: net: test_vxlan_under_vrf: fix HV connectivity test
    - selftests: test_vxlan_under_vrf: Fix broken test case
  * [UBUNTU 20.04] CPU-MF: add extended counter set definitions for new IBM z16
    (LP: #1974433)
    - s390/cpumf: add new extended counter set for IBM z16
  * [UBUNTU 20.04] KVM nesting support leaks too much memory, might result in
    stalls during cleanup (LP: #1974017)
    - KVM: s390: vsie/gmap: reduce gmap_rmap overhead
  * [UBUNTU 20.04] Null Pointer issue in nfs code running Ubuntu on IBM Z
    (LP: #1968096)
    - NFS: Fix up nfs_ctx_key_to_expire()
  * prevent kernel panic with overlayfs + shiftfs (LP: #1973620)
    - SAUCE: overlayfs: prevent dereferencing struct file in ovl_vm_prfile_set()
  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/2022.05.30)

 -- Luke Nowakowski-Krijger <email address hidden> Thu, 16 Jun 2022 13:50:21 -0700

Source diff to previous version
1974433 [UBUNTU 20.04] CPU-MF: add extended counter set definitions for new IBM z16
1974017 [UBUNTU 20.04] KVM nesting support leaks too much memory, might result in stalls during cleanup
1968096 [UBUNTU 20.04] Null Pointer issue in nfs code running Ubuntu on IBM Z
1973620 prevent kernel panic with overlayfs + shiftfs
1786013 Packaging resync
CVE-2022-28388 usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.

Version: 5.13.0-51.58~20.04.1 2022-06-15 21:06:27 UTC

  linux-hwe-5.13 (5.13.0-51.58~20.04.1) focal; urgency=medium

  [ Ubuntu: 5.13.0-51.58 ]

  * CVE-2022-21123 // CVE-2022-21125 // CVE-2022-21166
    - Documentation: Add documentation for Processor MMIO Stale Data
    - x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug
    - x86/speculation: Add a common function for MD_CLEAR mitigation update
    - x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
    - x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations
    - x86/speculation/mmio: Enable CPU Fill buffer clearing on idle
    - x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data
    - x86/speculation/srbds: Update SRBDS mitigation selection
    - x86/speculation/mmio: Reuse SRBDS mitigation for SBDS
    - KVM: x86/speculation: Disable Fill buffer clear within guests
    - x86/speculation/mmio: Print SMT warning

 -- Thadeu Lima de Souza Cascardo <email address hidden> Mon, 13 Jun 2022 15:59:56 -0300

Source diff to previous version

Version: 5.13.0-48.54~20.04.1 2022-06-08 11:06:25 UTC

  linux-hwe-5.13 (5.13.0-48.54~20.04.1) focal; urgency=medium

  [ Ubuntu: 5.13.0-48.54 ]

  * CVE-2022-1972
    - netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
  * CVE-2022-1966
    - netfilter: nf_tables: disallow non-stateful expression in sets earlier

 -- Thadeu Lima de Souza Cascardo <email address hidden> Thu, 02 Jun 2022 19:48:21 -0300

Source diff to previous version
CVE-2022-1966 A use-after-free vulnerability was found in the Linux kernel's Netfilt ...

Version: 5.13.0-44.49~20.04.1 2022-05-23 21:06:21 UTC

  linux-hwe-5.13 (5.13.0-44.49~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.13: 5.13.0-44.49~20.04.1 -proposed tracker (LP: #1973940)

  [ Ubuntu: 5.13.0-44.49 ]

  * impish/linux: 5.13.0-44.49 -proposed tracker (LP: #1973941)
  * CVE-2022-29581
    - net/sched: cls_u32: fix netns refcount changes in u32_change()
  * Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP
    option (LP: #1972740)
    - ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE
  * ext4: limit length to bitmap_maxbytes (LP: #1972281)
    - ext4: limit length to bitmap_maxbytes - blocksize in punch_hole

 -- Stefan Bader <email address hidden> Wed, 18 May 2022 17:44:03 +0200

Source diff to previous version
1972740 Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option
1972281 ext4: limit length to bitmap_maxbytes
CVE-2022-29581 Improper Update of Reference Count vulnerability in net/sched of Linux ...

Version: 5.13.0-41.46~20.04.1 2022-05-11 12:06:28 UTC

  linux-hwe-5.13 (5.13.0-41.46~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.13: 5.13.0-41.46~20.04.1 -proposed tracker (LP: #1969013)

  [ Ubuntu: 5.13.0-41.46 ]

  * impish/linux: 5.13.0-41.46 -proposed tracker (LP: #1969014)
  * NVMe devices fail to probe due to ACPI power state change (LP: #1942624)
    - ACPI: power: Rework turning off unused power resources
    - ACPI: PM: Do not turn off power resources in unknown state
  * Recent 5.13 kernel has broken KVM support (LP: #1966499)
    - KVM: Add infrastructure and macro to mark VM as bugged
    - KVM: x86: Use KVM_BUG/KVM_BUG_ON to handle bugs that are fatal to the VM
    - KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled
  * LRMv6: add multi-architecture support (LP: #1968774)
    - [Packaging] resync dkms-build{,--nvidia-N}
  * io_uring regression - lost write request (LP: #1952222)
    - io-wq: split bounded and unbounded work into separate lists
  * xfrm interface cannot be changed anymore (LP: #1968591)
    - xfrm: fix the if_id check in changelink
  * Use kernel-testing repo from launchpad for ADT tests (LP: #1968016)
    - [Debian] Use kernel-testing repo from launchpad
  * vmx_ldtr_test in ubuntu_kvm_unit_tests failed (FAIL: Expected 0 for L1 LDTR
    selector (got 50)) (LP: #1956315)
    - KVM: nVMX: Set LDTR to its architecturally defined value on nested VM-Exit
  * audio from external sound card is distorted (LP: #1966066)
    - ALSA: usb-audio: Fix packet size calculation regression
  * Impish update: upstream stable patchset 2022-04-12 (LP: #1968771)
    - cgroup/cpuset: Fix a race between cpuset_attach() and cpu hotplug
    - btrfs: tree-checker: check item_size for inode_item
    - btrfs: tree-checker: check item_size for dev_item
    - clk: jz4725b: fix mmc0 clock gating
    - vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
    - parisc/unaligned: Fix fldd and fstd unaligned handlers on 32-bit kernel
    - parisc/unaligned: Fix ldw() and stw() unalignment handlers
    - KVM: x86/mmu: make apf token non-zero to fix bug
    - drm/amdgpu: disable MMHUB PG for Picasso
    - drm/i915: Correctly populate use_sagv_wm for all pipes
    - sr9700: sanity check for packet length
    - USB: zaurus: support another broken Zaurus
    - CDC-NCM: avoid overflow in sanity checking
    - x86/fpu: Correct pkru/xstate inconsistency
    - tee: export teedev_open() and teedev_close_context()
    - optee: use driver internal tee_context for some rpc
    - ping: remove pr_err from ping_lookup
    - perf data: Fix double free in perf_session__delete()
    - bnx2x: fix driver load from initrd
    - bnxt_en: Fix active FEC reporting to ethtool
    - hwmon: Handle failure to register sensor with thermal zone correctly
    - bpf: Do not try bpf_msg_push_data with len 0
    - selftests: bpf: Check bpf_msg_push_data return value
    - bpf: Add schedule points in batch ops
    - io_uring: add a schedule point in io_add_buffers()
    - net: __pskb_pull_tail() & pskb_carve_frag_list() drop_monitor friends
    - tipc: Fix end of loop tests for list_for_each_entry()
    - gso: do not skip outer ip header in case of ipip and net_failover
    - openvswitch: Fix setting ipv6 fields causing hw csum failure
    - drm/edid: Always set RGB444
    - net/mlx5e: Fix wrong return value on ioctl EEPROM query failure
    - net/sched: act_ct: Fix flow table lookup after ct clear or switching zones
    - net: ll_temac: check the return value of devm_kmalloc()
    - net: Force inlining of checksum functions in net/checksum.h
    - nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()
    - netfilter: nf_tables: fix memory leak during stateful obj update
    - net/smc: Use a mutex for locking "struct smc_pnettable"
    - surface: surface3_power: Fix battery readings on batteries without a serial
      number
    - udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister()
    - net/mlx5: Fix possible deadlock on rule deletion
    - net/mlx5: Fix wrong limitation of metadata match on ecpf
    - net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets
    - spi: spi-zynq-qspi: Fix a NULL pointer dereference in
      zynq_qspi_exec_mem_op()
    - regmap-irq: Update interrupt clear register for proper reset
    - RDMA/rtrs-clt: Fix possible double free in error case
    - RDMA/rtrs-clt: Move free_permit from free_clt to rtrs_clt_close
    - configfs: fix a race in configfs_{,un}register_subsystem()
    - RDMA/ib_srp: Fix a deadlock
    - tracing: Have traceon and traceoff trigger honor the instance
    - iio: adc: men_z188_adc: Fix a resource leak in an error handling path
    - iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits
    - iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot
    - iio: Fix error handling for PM
    - sc16is7xx: Fix for incorrect data being transmitted
    - ata: pata_hpt37x: disable primary channel on HPT371
    - Revert "USB: serial: ch341: add new Product ID for CH341A"
    - usb: gadget: rndis: add spinlock for rndis response list
    - tracefs: Set the group ownership in apply_options() not parse_options()
    - USB: serial: option: add support for DW5829e
    - USB: serial: option: add Telit LE910R1 compositions
    - usb: dwc3: pci: Fix Bay Trail phy GPIO mappings
    - usb: dwc3: gadget: Let the interrupt handler disable bottom halves.
    - xhci: re-initialize the HC during resume if HCE was set
    - xhci: Prevent futile URB re-submissions due to incorrect return value.
    - driver core: Free DMA range map when device is released
    - RDMA/cma: Do not change route.addr.src_addr outside state checks
    - thermal: int340x: fix memory leak in int3400_notify()
    - riscv: fix oops caused by irqsoff latency tracer
    - tty: n_gsm: fix encoding of control signal octet bit DV
    - tty: n_gsm: fix proper link termination after failed open
    - tty: n_gsm: fix NULL pointer access due to DLCI release
    - tty: n_gsm:

1942624 NVMe devices fail to probe due to ACPI power state change
1966499 Recent 5.13 kernel has broken KVM support
1968774 LRMv6: add multi-architecture support
1968591 xfrm interface cannot be changed anymore
1966066 audio from external sound card is distorted
1968771 Impish update: upstream stable patchset 2022-04-12
1968223 Impish update: upstream stable patchset 2022-04-07
1967439 Impish update: upstream stable patchset 2022-03-31
1966021 Impish update: upstream stable patchset 2022-03-22
1965589 Impish update: upstream stable patchset 2022-03-18
1968210 USB devices not detected during boot on USB 3.0 hubs
CVE-2022-27223 In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host f
CVE-2022-26490 st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of
CVE-2021-26401 LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.
CVE-2022-0001 Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable



About   -   Send Feedback to @ubuntu_updates