Package "linux-riscv-5.15"
Name: |
linux-riscv-5.15
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Header files related to Linux kernel version 5.15.0
- Header files related to Linux kernel version 5.15.0
|
Latest version: |
5.15.0-1017.19~20.04.1 |
Release: |
focal (20.04) |
Level: |
security |
Repository: |
universe |
Links
Other versions of "linux-riscv-5.15" in Focal
Packages in group
Deleted packages are displayed in grey.
Changelog
linux-riscv-5.15 (5.15.0-1017.19~20.04.1) focal; urgency=medium
[ Ubuntu: 5.15.0-1017.19 ]
* CVE-2022-2585
- SAUCE: posix-cpu-timers: Cleanup CPU timers before freeing them during exec
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow CHAIN_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another chain
* CVE-2022-2588
- SAUCE: net_sched: cls_route: remove from list when handle is 0
* CVE-2022-29900 // CVE-2022-29901
- x86/lib/atomic64_386_32: Rename things
- x86: Prepare asm files for straight-line-speculation
- x86: Prepare inline-asm for straight-line-speculation
- x86/alternative: Relax text_poke_bp() constraint
- kbuild: move objtool_args back to scripts/Makefile.build
- x86: Add straight-line-speculation mitigation
- kvm/emulate: Fix SETcc emulation function offsets with SLS
- crypto: x86/poly1305 - Fixup SLS
- objtool: Add straight-line-speculation validation
- objtool: Fix SLS validation for kcov tail-call replacement
- objtool: Fix objtool regression on x32 systems
- objtool: Fix symbol creation
- objtool: Introduce CFI hash
- objtool: Default ignore INT3 for unreachable
- x86, kvm: use proper ASM macros for kvm_vcpu_is_preempted
- x86/traps: Use pt_regs directly in fixup_bad_iret()
- x86/entry: Switch the stack after error_entry() returns
- x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry()
- x86/entry: Don't call error_entry() for XENPV
- x86/entry: Remove skip_r11rcx
- x86/realmode: build with -D__DISABLE_EXPORTS
- x86/ibt,ftrace: Make function-graph play nice
- x86/kvm/vmx: Make noinstr clean
- x86/cpufeatures: Move RETPOLINE flags to word 11
- x86/retpoline: Cleanup some #ifdefery
- x86/retpoline: Swizzle retpoline thunk
- x86/retpoline: Use -mfunction-return
- x86: Undo return-thunk damage
- x86,objtool: Create .return_sites
- objtool: skip non-text sections when adding return-thunk sites
- x86,static_call: Use alternative RET encoding
- x86/ftrace: Use alternative RET encoding
- x86/bpf: Use alternative RET encoding
- x86/kvm: Fix SETcc emulation for return thunks
- x86/vsyscall_emu/64: Don't use RET in vsyscall emulation
- x86/sev: Avoid using __x86_return_thunk
- x86: Use return-thunk in asm code
- x86/entry: Avoid very early RET
- objtool: Treat .text.__x86.* as noinstr
- x86: Add magic AMD return-thunk
- x86/bugs: Report AMD retbleed vulnerability
- x86/bugs: Add AMD retbleed= boot parameter
- x86/bugs: Enable STIBP for JMP2RET
- x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
- x86/entry: Add kernel IBRS implementation
- x86/bugs: Optimize SPEC_CTRL MSR writes
- x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
- x86/bugs: Split spectre_v2_select_mitigation() and
spectre_v2_user_select_mitigation()
- x86/bugs: Report Intel retbleed vulnerability
- intel_idle: Disable IBRS during long idle
- objtool: Update Retpoline validation
- x86/xen: Rename SYS* entry points
- x86/xen: Add UNTRAIN_RET
- x86/bugs: Add retbleed=ibpb
- x86/bugs: Do IBPB fallback check only once
- objtool: Add entry UNRET validation
- x86/cpu/amd: Add Spectral Chicken
- x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
- x86/speculation: Fix firmware entry SPEC_CTRL handling
- x86/speculation: Fix SPEC_CTRL write on SMT state change
- x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
- x86/speculation: Remove x86_spec_ctrl_mask
- objtool: Re-add UNWIND_HINT_{SAVE_RESTORE}
- KVM: VMX: Flatten __vmx_vcpu_run()
- KVM: VMX: Convert launched argument to flags
- KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
- KVM: VMX: Fix IBRS handling after vmexit
- x86/speculation: Fill RSB on vmexit for IBRS
- KVM: VMX: Prevent RSB underflow before vmenter
- x86/common: Stamp out the stepping madness
- x86/cpu/amd: Enumerate BTC_NO
- x86/retbleed: Add fine grained Kconfig knobs
- x86/bugs: Add Cannon lake to RETBleed affected CPU list
- x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry
- x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported
- x86/kexec: Disable RET on kexec
- x86/speculation: Disable RRSBA behavior
- [Config]: Enable speculation mitigations
- x86/static_call: Serialize __static_call_fixup() properly
- x86/asm/32: Fix ANNOTATE_UNRET_SAFE use on 32-bit
- x86/bugs: Mark retbleed_strings static
- x86/entry: Remove UNTRAIN_RET from native_irq_return_ldt
- x86/kvm: fix FASTOP_SIZE when return thunks are enabled
- x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
- KVM: emulate: do not adjust size of fastop and setcc subroutines
- x86/bugs: Remove apostrophe typo
- efi/x86: use naked RET on mixed mode call wrapper
[ Ubuntu: 5.15.0-1016.18 ]
* jammy/linux-riscv: 5.15.0-1016.18 -proposed tracker (LP: #1981239)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (main/2022.07.11)
* jammy/linux: 5.15.0-43.46 -proposed tracker (LP: #1981243)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (main/2022.07.11)
* nbd: requests can become stuck when disconnecting from server with qemu-nbd
(LP: #1896350)
- nbd: don't handle response without a corresponding request message
- nbd: make sure request completion won't concurrent
- nbd: don't clear 'NBD_CMD_INFLIGHT' flag if request is not completed
- nbd: fix io hung while disconnecting device
* Ubuntu 22.04 and 20.04 DPC Fixes for Failure Cases of DownPort Containment
events (LP: #1965241)
- PCI/portdrv: Rename pm_iter() to pcie_port_device_iter()
|
Source diff to previous version |
1786013 |
Packaging resync |
1896350 |
nbd: requests can become stuck when disconnecting from server with qemu-nbd |
1965241 |
Ubuntu 22.04 and 20.04 DPC Fixes for Failure Cases of DownPort Containment events |
1948626 |
[SRU] Ubuntu 22.04 Feature Request-Add support for a NVMe-oF-TCP CDC Client - TP 8010 |
1980951 |
[UBUNTU 22.04] Kernel oops while removing device from cio_ignore list |
1978820 |
Jammy Charmed OpenStack deployment fails over connectivity issues when using converged OVS bridge for control and data planes |
1949245 |
AMD ACP 6.x DMIC Supports |
1979296 |
[UBUNTU 20.04] Include patches to avoid self-detected stall with Secure Execution |
1959973 |
[22.04 FEAT] KVM: Attestation support for Secure Execution (crypto) |
CVE-2022-29900 |
AMD microprocessor families 15h to 18h are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak |
CVE-2022-29901 |
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak |
CVE-2022-1679 |
A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function |
CVE-2022-28893 |
The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state. |
CVE-2022-34918 |
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by |
CVE-2022-1652 |
Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr fu |
|
linux-riscv-5.15 (5.15.0-1015.17~20.04.1) focal; urgency=medium
* focal/linux-riscv-5.15: 5.15.0-1015.17~20.04.1 -proposed tracker
(LP: #1982473)
* Miscellaneous Ubuntu changes
- [Packaging] kernelconfig: use consistent toolchain
- [Packaging] Elect gcc-10 toolchain
-- Dimitri John Ledkov <email address hidden> Thu, 21 Jul 2022 12:41:12 +0100
|
About
-
Send Feedback to @ubuntu_updates