Package "linux-intel-iotg-5.15-tools-host"
Name: |
linux-intel-iotg-5.15-tools-host
|
Description: |
Linux kernel VM host tools
|
Latest version: |
5.15.0-1066.72~20.04.1 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
main |
Head package: |
linux-intel-iotg-5.15 |
Links
Download "linux-intel-iotg-5.15-tools-host"
Other versions of "linux-intel-iotg-5.15-tools-host" in Focal
Changelog
linux-intel-iotg-5.15 (5.15.0-1066.72~20.04.1) focal; urgency=medium
* focal/linux-intel-iotg-5.15: 5.15.0-1066.72~20.04.1 -proposed tracker
(LP: #2082158)
[ Ubuntu: 5.15.0-1066.72 ]
* jammy/linux-intel-iotg: 5.15.0-1066.72 -proposed tracker (LP: #2082159)
* jammy/linux: 5.15.0-124.134 -proposed tracker (LP: #2082176)
* CVE-2024-45016
- netem: fix return value if duplicate enqueue fails
* CVE-2024-38630
- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
* CVE-2024-27397
- netfilter: nf_tables: use timestamp to check for set element timeout
-- Thibault Ferrante <email address hidden> Mon, 07 Oct 2024 17:15:56 +0200
|
Source diff to previous version |
CVE-2024-45016 |
In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu |
CVE-2024-38630 |
In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the |
CVE-2024-27397 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time |
|
linux-intel-iotg-5.15 (5.15.0-1065.71~20.04.1) focal; urgency=medium
* focal/linux-intel-iotg-5.15: 5.15.0-1065.71~20.04.1 -proposed tracker
(LP: #2078138)
[ Ubuntu: 5.15.0-1065.71 ]
* jammy/linux-intel-iotg: 5.15.0-1065.71 -proposed tracker (LP: #2078139)
* jammy/linux: 5.15.0-122.132 -proposed tracker (LP: #2078154)
* isolcpus are ignored when using cgroups V2, causing processes to have wrong
affinity (LP: #2076957)
- cgroup/cpuset: Optimize cpuset_attach() on v2
* Jammy update: v5.15.164 upstream stable release (LP: #2076100) //
CVE-2024-41009
- bpf: Fix overrunning reservations in ringbuf
* CVE-2024-39494
- ima: Fix use-after-free on a dentry's dname.name
* CVE-2024-39496
- btrfs: zoned: fix use-after-free due to race with dev replace
* CVE-2024-42160
- f2fs: check validation of fault attrs in f2fs_build_fault_attr()
- f2fs: Add inline to f2fs_build_fault_attr() stub
* CVE-2024-38570
- gfs2: Rename sd_{ glock => kill }_wait
- gfs2: Fix potential glock use-after-free on unmount
* CVE-2024-42228
- drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
* CVE-2024-27012
- netfilter: nf_tables: restore set elements when delete set fails
* CVE-2024-26677
- rxrpc: Fix delayed ACKs to not set the reference serial number
-- Mehmet Basaran <email address hidden> Wed, 04 Sep 2024 10:08:05 +0300
|
Source diff to previous version |
2076957 |
isolcpus are ignored when using cgroups V2, causing processes to have wrong affinity |
2076100 |
Jammy update: v5.15.164 upstream stable release |
CVE-2024-41009 |
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overrunning reservations in ringbuf The BPF ring buffer internally is |
CVE-2024-39494 |
In the Linux kernel, the following vulnerability has been resolved: ima: Fix use-after-free on a dentry's dname.name ->d_name.name can change on re |
CVE-2024-39496 |
In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix use-after-free due to race with dev replace While loading a z |
CVE-2024-42160 |
In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to |
CVE-2024-38570 |
In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix potential glock use-after-free on unmount When a DLM lockspace is rel |
CVE-2024-42228 |
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc In |
CVE-2024-27012 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: restore set elements when delete set fails From abort pat |
CVE-2024-26677 |
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix delayed ACKs to not set the reference serial number Fix the construc |
|
linux-intel-iotg-5.15 (5.15.0-1064.70~20.04.1) focal; urgency=medium
* focal/linux-intel-iotg-5.15: 5.15.0-1064.70~20.04.1 -proposed tracker
(LP: #2075887)
* Packaging resync (LP: #1786013)
- [Packaging] debian.intel-iotg-5.15/dkms-versions -- update from kernel-
versions (main/2024.08.05)
[ Ubuntu: 5.15.0-1064.70 ]
* jammy/linux-intel-iotg: 5.15.0-1064.70 -proposed tracker (LP: #2075888)
* Packaging resync (LP: #1786013)
- [Packaging] debian.intel-iotg/dkms-versions -- update from kernel-versions
(main/2024.08.05)
* testptp send timestamp 2 times faster than setting (LP: #2075137)
- tools: testing: ptp: Remove nsec period update
* jammy/linux: 5.15.0-121.131 -proposed tracker (LP: #2076347)
* jammy:linux bpf selftest do not build (LP: #2076334)
- SAUCE: Revert "bpf: Allow reads from uninit stack"
* jammy/linux: 5.15.0-120.130 -proposed tracker (LP: #2075903)
* Packaging resync (LP: #1786013)
- [Packaging] debian.master/dkms-versions -- update from kernel-versions
(main/2024.08.05)
* Jammy update: v5.15.163 upstream stable release (LP: #2075170)
- Compiler Attributes: Add __uninitialized macro
- locking/mutex: Introduce devm_mutex_init()
- drm/lima: fix shared irq handling on driver remove
- media: dvb: as102-fe: Fix as10x_register_addr packing
- media: dvb-usb: dib0700_devices: Add missing release_firmware()
- IB/core: Implement a limit on UMAD receive List
- scsi: qedf: Make qedf_execute_tmf() non-preemptible
- crypto: aead,cipher - zeroize key buffer after use
- drm/amdgpu: Initialize timestamp for some legacy SOCs
- drm/amd/display: Check index msg_id before read or write
- drm/amd/display: Check pipe offset before setting vblank
- drm/amd/display: Skip finding free audio for unknown engine_id
- media: dw2102: Don't translate i2c read into write
- sctp: prefer struct_size over open coded arithmetic
- firmware: dmi: Stop decoding on broken entry
- Input: ff-core - prefer struct_size over open coded arithmetic
- wifi: mt76: replace skb_put with skb_put_zero
- net: dsa: mv88e6xxx: Correct check for empty list
- media: dvb-frontends: tda18271c2dd: Remove casting during div
- media: s2255: Use refcount_t instead of atomic_t for num_channels
- media: dvb-frontends: tda10048: Fix integer overflow
- i2c: i801: Annotate apanel_addr as __ro_after_init
- powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n
- orangefs: fix out-of-bounds fsid access
- kunit: Fix timeout message
- powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#"
- igc: fix a log entry using uninitialized netdev
- bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
- jffs2: Fix potential illegal address access in jffs2_free_inode
- s390/pkey: Wipe sensitive data on failure
- tools/power turbostat: Remember global max_die_id
- UPSTREAM: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open()
- tcp_metrics: validate source addr length
- KVM: s390: fix LPSWEY handling
- e1000e: Fix S0ix residency on corporate systems
- net: allow skb_datagram_iter to be called from any context
- wifi: wilc1000: fix ies_len type in connect path
- riscv: kexec: Avoid deadlock in kexec crash path
- netfilter: nf_tables: unconditionally flush pending work before notifier
- bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()
- selftests: fix OOM in msg_zerocopy selftest
- selftests: make order checking verbose in msg_zerocopy selftest
- inet_diag: Initialize pad field in struct inet_diag_req_v2
- gpiolib: of: factor out code overriding gpio line polarity
- gpiolib: of: add a quirk for reset line polarity for Himax LCDs
- gpiolib: of: add polarity quirk for TSC2005
- Revert "igc: fix a log entry using uninitialized netdev"
- nilfs2: fix inode number range checks
- nilfs2: add missing check for inode numbers on directory entries
- mm: optimize the redundant loop of mm_update_owner_next()
- mm: avoid overflows in dirty throttling logic
- btrfs: fix adding block group to a reclaim list and the unused list during
reclaim
- Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot
- can: kvaser_usb: Explicitly initialize family in leafimx driver_info struct
- fsnotify: Do not generate events for O_PATH file descriptors
- Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(),
again"
- drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
- drm/amdgpu/atomfirmware: silence UBSAN warning
- mtd: rawnand: Ensure ECC configuration is propagated to upper layers
- mtd: rawnand: Bypass a couple of sanity checks during NAND identification
- mtd: rawnand: rockchip: ensure NVDDR timings are rejected
- ima: Avoid blocking in RCU read-side critical section
- media: dw2102: fix a potential buffer overflow
- clk: qcom: gcc-sm6350: Fix gpll6* & gpll7 parents
- i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr
- fs/ntfs3: Mark volume as dirty if xattr is broken
- ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897
- nvme-multipath: find NUMA path only for online numa-node
- dma-mapping: benchmark: avoid needless copy_to_user if benchmark fails
- nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset
- regmap-i2c: Subtract reg size from max_write
- platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW 11.6"
tablet
- platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro
- nvmet: fix a possible leak when destroy a ctrl during qp establishment
- kbuild: fix short log for AS in link-vmlinux.sh
- nfc/nci: Add the inconsistency check between the input data length and count
- null_blk: Do not allow runt zone with zone capacit
|
Source diff to previous version |
1786013 |
Packaging resync |
2075137 |
testptp send timestamp 2 times faster than setting |
2076334 |
jammy:linux bpf selftest do not build |
2075170 |
Jammy update: v5.15.163 upstream stable release |
2074215 |
[SRU] UBSAN warnings in bnx2x kernel driver |
2073765 |
Jammy update: v5.15.162 upstream stable release |
2072858 |
Fix L2CAP/LE/CPU/BI-02-C bluetooth certification failure |
2073092 |
net/sched: Fix conntrack use-after-free |
2072617 |
Jammy update: v5.15.161 upstream stable release |
2073267 |
Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4 |
CVE-2024-26921 |
In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and oth |
CVE-2024-39484 |
In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit f |
CVE-2024-39292 |
In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winc |
CVE-2024-36901 |
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a |
CVE-2024-26830 |
In the Linux kernel, the following vulnerability has been resolved: i40e: Do not allow untrusted VF to remove administratively set MAC Currently wh |
CVE-2024-26680 |
In the Linux kernel, the following vulnerability has been resolved: net: atlantic: Fix DMA mapping for PTP hwts ring Function aq_ring_hwts_rx_alloc |
CVE-2023-52760 |
In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc In gfs2_put_super(), whether w |
CVE-2023-52629 |
In the Linux kernel, the following vulnerability has been resolved: sh: push-switch: Reorder cleanup operations to avoid use-after-free bug The ori |
|
linux-intel-iotg-5.15 (5.15.0-1063.69~20.04.1) focal; urgency=medium
* focal/linux-intel-iotg-5.15: 5.15.0-1063.69~20.04.1 -proposed tracker
(LP: #2075649)
[ Ubuntu: 5.15.0-1063.69 ]
* jammy/linux-intel-iotg: 5.15.0-1063.69 -proposed tracker (LP: #2075650)
* jammy/linux: 5.15.0-119.129 -proposed tracker (LP: #2075665)
* Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4
(LP: #2073267)
- SAUCE: Revert "randomize_kstack: Improve entropy diffusion"
* CVE-2024-26921
- inet: inet_defrag: prevent sk release while still in use
* Jammy update: v5.15.162 upstream stable release (LP: #2073765) //
CVE-2024-39484
- mmc: davinci: Don't strip remove function when driver is builtin
* Jammy update: v5.15.162 upstream stable release (LP: #2073765)
- mmc: davinci_mmc: Convert to platform remove callback returning void
* CVE-2024-39292
- um: Add winch to winch_handlers before registering winch IRQ
* CVE-2024-36901
- ipv6: prevent NULL dereference in ip6_output()
* CVE-2024-26830
- i40e: Do not allow untrusted VF to remove administratively set MAC
* CVE-2024-26680
- net: atlantic: Fix DMA mapping for PTP hwts ring
* CVE-2023-52760
- gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
* CVE-2023-52629
- sh: push-switch: Reorder cleanup operations to avoid use-after-free bug
-- Thibault Ferrante <email address hidden> Fri, 09 Aug 2024 13:08:55 +0200
|
Source diff to previous version |
2073267 |
Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4 |
2073765 |
Jammy update: v5.15.162 upstream stable release |
CVE-2024-26921 |
In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and oth |
CVE-2024-39484 |
In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit f |
CVE-2024-39292 |
In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winc |
CVE-2024-36901 |
In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a |
CVE-2024-26830 |
In the Linux kernel, the following vulnerability has been resolved: i40e: Do not allow untrusted VF to remove administratively set MAC Currently wh |
CVE-2024-26680 |
In the Linux kernel, the following vulnerability has been resolved: net: atlantic: Fix DMA mapping for PTP hwts ring Function aq_ring_hwts_rx_alloc |
CVE-2023-52760 |
In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc In gfs2_put_super(), whether w |
CVE-2023-52629 |
In the Linux kernel, the following vulnerability has been resolved: sh: push-switch: Reorder cleanup operations to avoid use-after-free bug The ori |
|
linux-intel-iotg-5.15 (5.15.0-1062.68~20.04.1) focal; urgency=medium
* focal/linux-intel-iotg-5.15: 5.15.0-1062.68~20.04.1 -proposed tracker
(LP: #2072238)
[ Ubuntu: 5.15.0-1062.68 ]
* jammy/linux-intel-iotg: 5.15.0-1062.68 -proposed tracker (LP: #2072239)
* jammy/linux: 5.15.0-118.128 -proposed tracker (LP: #2072255)
* Jammy update: v5.15.160 upstream stable release (LP: #2070292)
- drm/amd/display: Fix division by zero in setup_dsc_config
- pinctrl: core: handle radix_tree_insert() errors in
pinctrl_register_one_pin()
- nfsd: don't allow nfsd threads to be signalled.
- KEYS: trusted: Fix memory leak in tpm2_key_encode()
- Revert "selftests: mm: fix map_hugetlb failure on 64K page size systems"
- net: bcmgenet: synchronize EXT_RGMII_OOB_CTRL access
- net: bcmgenet: synchronize UMAC_CMD access
- netlink: annotate lockless accesses to nlk->max_recvmsg_len
- netlink: annotate data-races around sk->sk_err
- KVM: x86: Clear "has_error_code", not "error_code", for RM exception
injection
- drm/amdgpu: Fix possible NULL dereference in
amdgpu_ras_query_error_status_helper()
- binder: fix max_thread type inconsistency
- usb: typec: ucsi: displayport: Fix potential deadlock
- serial: kgdboc: Fix NMI-safety problems from keyboard reset code
- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
- KEYS: trusted: Do not use WARN when encode fails
- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
- docs: kernel_include.py: Cope with docutils 0.21
- Linux 5.15.160
* Jammy update: v5.15.159 upstream stable release (LP: #2070028)
- dmaengine: pl330: issue_pending waits until WFP state
- dmaengine: Revert "dmaengine: pl330: issue_pending waits until WFP state"
- wifi: nl80211: don't free NULL coalescing rule
- ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf
- ksmbd: validate request buffer size in smb2_allocate_rsp_buf()
- ksmbd: clear RENAME_NOREPLACE before calling vfs_rename
- eeprom: at24: Use dev_err_probe for nvmem register failure
- eeprom: at24: Probe for DDR3 thermal sensor in the SPD case
- eeprom: at24: fix memory corruption race condition
- pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T
- pinctrl/meson: fix typo in PDM's pin name
- pinctrl: core: delete incorrect free in pinctrl_enable()
- pinctrl: mediatek: paris: Rework mtk_pinconf_{get,set} switch/case logic
- pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback
- pinctrl: mediatek: paris: Rework support for
PIN_CONFIG_{INPUT,OUTPUT}_ENABLE
- sunrpc: add a struct rpc_stats arg to rpc_create_args
- nfs: expose /proc/net/sunrpc/nfs in net namespaces
- nfs: make the rpc_stat per net namespace
- nfs: Handle error of rpc_proc_register() in nfs_net_init().
- power: rt9455: hide unused rt9455_boost_voltage_values
- power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator
- pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()
- regulator: mt6360: De-capitalize devicetree regulator subnodes
- bpf, kconfig: Fix DEBUG_INFO_BTF_MODULES Kconfig definition
- bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
- bpf: Fix a verifier verbose message
- spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs
- s390/mm: Fix storage key clearing for guest huge pages
- s390/mm: Fix clearing storage keys for huge pages
- xdp: Move conversion to xdp_frame out of map functions
- xdp: Add xdp_do_redirect_frame() for pre-computed xdp_frames
- xdp: use flags field to disambiguate broadcast redirect
- bna: ensure the copied buf is NUL terminated
- octeontx2-af: avoid off-by-one read from userspace
- nsh: Restore skb->{protocol,data,mac_header} for outer header in
nsh_gso_segment().
- net l2tp: drop flow hash on forward
- s390/vdso: Add CFI for RA register to asm macro vdso_func
- net: qede: sanitize 'rc' in qede_add_tc_flower_fltr()
- net: qede: use return from qede_parse_flow_attr() for flower
- net: qede: use return from qede_parse_flow_attr() for flow_spec
- net: qede: use return from qede_parse_actions()
- ASoC: meson: axg-fifo: use FIELD helpers
- ASoC: meson: axg-fifo: use threaded irq to check periods
- ASoC: meson: axg-card: make links nonatomic
- ASoC: meson: axg-tdm-interface: manage formatters in trigger
- ASoC: meson: cards: select SND_DYNAMIC_MINORS
- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()
- s390/cio: Ensure the copied buf is NUL terminated
- cxgb4: Properly lock TX queue for the selftest.
- net: dsa: mv88e6xxx: Fix number of databases for 88E6141 / 88E6341
- net: bridge: fix multicast-to-unicast with fraglist GSO
- net: core: reject skb_copy(_expand) for fraglist GSO skbs
- tipc: fix a possible memleak in tipc_buf_append
- s390/qeth: don't keep track of Input Queue count
- s390/qeth: Fix kernel panic after setting hsuid
- drm/panel: ili9341: Respect deferred probe
- drm/panel: ili9341: Use predefined error codes
- net: gro: add flush check in udp_gro_receive_segment
- clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change
- KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id
- KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()
- scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
- scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic
- scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port()
- gfs2: Fix invalid metadata access in punch_hole
- wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc
- wifi: cfg80211: fix rdev_dump_mpp() arguments order
- net: mark racy access on sk->sk_rcvbuf
- scsi: bnx2fc: Remo
|
2070292 |
Jammy update: v5.15.160 upstream stable release |
2070028 |
Jammy update: v5.15.159 upstream stable release |
2061091 |
Freezing user space processes failed after 20.008 seconds (1 tasks refusing to freeze, wq_busy=0) |
CVE-2024-27017 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generatio |
CVE-2024-26952 |
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix potencial out-of-bounds when buffer offset is invalid I found potenc |
CVE-2024-26886 |
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: af_bluetooth: Fix deadlock Attemting to do sock_lock on .recvmsg may |
CVE-2023-52752 |
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB ses |
CVE-2024-25742 |
In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This |
CVE-2024-36016 |
In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following |
|
About
-
Send Feedback to @ubuntu_updates