UbuntuUpdates.org

Package "linux-headers-5.8.0-63-generic"

Name: linux-headers-5.8.0-63-generic

Description:

Linux kernel headers for version 5.8.0 on 64 bit x86 SMP

Latest version: 5.8.0-63.71~20.04.1
Release: focal (20.04)
Level: updates
Repository: main
Head package: linux-hwe-5.8

Links


Download "linux-headers-5.8.0-63-generic"


Other versions of "linux-headers-5.8.0-63-generic" in Focal

Repository Area Version
security main 5.8.0-63.71~20.04.1

Changelog

Version: 5.8.0-63.71~20.04.1 2021-07-20 19:06:29 UTC

  linux-hwe-5.8 (5.8.0-63.71~20.04.1) focal; urgency=medium

  [ Ubuntu: 5.8.0-63.71 ]

  * Possible io_uring regression with QEMU on Ubuntu's kernel (LP: #1935017)
    - SAUCE: Revert "block: don't ignore REQ_NOWAIT for direct IO"

  [ Ubuntu: 5.8.0-62.70 ]

  * CVE-2021-33909
    - SAUCE: seq_file: Disallow extremely large seq buffer allocations

Source diff to previous version
1935017 Possible io_uring regression with QEMU on Ubuntu's kernel

Version: 5.8.0-59.66~20.04.1 2021-06-22 19:06:39 UTC

  linux-hwe-5.8 (5.8.0-59.66~20.04.1) focal; urgency=medium

  [ Ubuntu: 5.8.0-59.66 ]

  * UAF on CAN J1939 j1939_can_recv (LP: #1932209)
    - SAUCE: can: j1939: delay release of j1939_priv after synchronize_rcu
  * UAF on CAN BCM bcm_rx_handler (LP: #1931855)
    - SAUCE: can: bcm: delay release of struct bcm_op after synchronize_rcu

Source diff to previous version
1932209 UAF on CAN J1939 j1939_can_recv
1931855 UAF on CAN BCM bcm_rx_handler

Version: 5.8.0-55.62~20.04.1 2021-06-03 20:06:23 UTC

  linux-hwe-5.8 (5.8.0-55.62~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.8: 5.8.0-55.62~20.04.1 -proposed tracker (LP: #1930378)

  [ Ubuntu: 5.8.0-55.62 ]

  * groovy/linux: 5.8.0-55.62 -proposed tracker (LP: #1930379)
  * [Potential Regression] Unable to create KVM with uvtool on Groovy ARM64
    (LP: #1929925)
    - SAUCE: KVM: arm64: Assign kvm_ipa_limit

Source diff to previous version
1929925 [Potential Regression] Unable to create KVM with uvtool on Groovy ARM64

Version: 5.8.0-53.60~20.04.1 2021-05-11 19:06:22 UTC

  linux-hwe-5.8 (5.8.0-53.60~20.04.1) focal; urgency=medium

  [ Ubuntu: 5.8.0-53.60 ]

  * CVE-2021-3491
    - io_uring: fix provide_buffers sign extension
    - io_uring: fix overflows checks in provide buffers
    - SAUCE: proc: Avoid mixing integer types in mem_rw()
    - SAUCE: io_uring: truncate lengths larger than MAX_RW_COUNT on provide
      buffers
  * CVE-2021-3490
    - bpf: Fix a verifier failure with xor
    - SAUCE: bpf: verifier: fix ALU32 bounds tracking with bitwise ops
  * CVE-2021-3489
    - SAUCE: bpf: ringbuf: deny reserve of buffers larger than ringbuf
    - SAUCE: bpf: prevent writable memory-mapping of read-only ringbuf pages

 -- Stefan Bader <email address hidden> Thu, 06 May 2021 11:28:58 +0200

Source diff to previous version

Version: 5.8.0-50.56~20.04.1 2021-04-15 19:07:22 UTC

  linux-hwe-5.8 (5.8.0-50.56~20.04.1) focal; urgency=medium

  [ Ubuntu: 5.8.0-50.56 ]

  * overlayfs calls vfs_setxattr without cap_convert_nscap
    - vfs: move cap_convert_nscap() call into vfs_setxattr()
  * CVE-2021-3492
    - SAUCE: shiftfs: free allocated memory in shiftfs_btrfs_ioctl_fd_replace()
      error paths
    - SAUCE: shiftfs: handle copy_to_user() return values correctly
  * CVE-2021-29154
    - SAUCE: bpf, x86: Validate computation of branch displacements for x86-64
    - SAUCE: bpf, x86: Validate computation of branch displacements for x86-32

 -- Kelsey Skunberg <email address hidden> Mon, 12 Apr 2021 12:47:37 -0600

CVE-2021-3492 RESERVED
CVE-2021-29154 BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect c ...



About   -   Send Feedback to @ubuntu_updates