UbuntuUpdates.org

Package "linux-oem-5.17"


Moved to jammy:main:updates


Name: linux-oem-5.17

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: jammy (22.04)
Level: proposed
Repository: main

Links



Other versions of "linux-oem-5.17" in Jammy

Repository Area Version
security main 5.17.0-1035.36
updates main 5.17.0-1035.36
PPA: Canonical Kernel Team 5.17.0-1033.34

Changelog

Version: *DELETED* 2023-06-16 07:07:14 UTC
Moved to jammy:main:updates
No changelog for deleted or moved packages.

Version: 5.17.0-1033.34 2023-06-06 19:07:07 UTC

  linux-oem-5.17 (5.17.0-1033.34) jammy; urgency=medium

  * jammy/linux-oem-5.17: 5.17.0-1033.34 -proposed tracker (LP: #2019421)

  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
    - [Packaging] resync getabis
    - [Packaging] update helper scripts

  * CVE-2023-1073
    - HID: check empty report_list in hid_validate_values()

  * CVE-2023-0459
    - uaccess: Add speculation barrier to copy_from_user()

  * CVE-2023-26606
    - fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs

  * selftest: fib_tests: Always cleanup before exit (LP: #2015956)
    - selftest: fib_tests: Always cleanup before exit

 -- Timo Aaltonen <email address hidden> Fri, 02 Jun 2023 10:25:10 +0300

1786013 Packaging resync
CVE-2023-1073 A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This fl
CVE-2023-0459 Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check a
CVE-2023-26606 In the Linux kernel 6.0.8, there is a use-after-free in ntfs_trim_fs in fs/ntfs3/bitmap.c.

Version: *DELETED* 2023-04-21 21:07:18 UTC
Moved to jammy:main:updates
No changelog for deleted or moved packages.

Version: 5.17.0-1030.31 2023-04-05 19:06:56 UTC

  linux-oem-5.17 (5.17.0-1030.31) jammy; urgency=medium

  * jammy/linux-oem-5.17: 5.17.0-1030.31 -proposed tracker (LP: #2011919)

  * Packaging resync (LP: #1786013)
    - [Packaging] update update.conf
    - debian/dkms-versions -- update from kernel-versions (main/2023.03.20)

  * CVE-2022-4382
    - USB: gadgetfs: Fix race between mounting and unmounting

  * CVE-2023-23559
    - wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid

  * CVE-2022-3903
    - media: mceusb: Use new usb_control_msg_*() routines

  * CVE-2023-1118
    - media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()

  * CVE-2023-26607
    - ntfs: fix use-after-free in ntfs_ucsncmp()
    - ntfs: fix out-of-bounds read in ntfs_attr_find()

  * CVE-2022-21505
    - lockdown: Fix kexec lockdown bypass with ima policy

  * CVE-2023-1095
    - netfilter: nf_tables: fix null deref due to zeroed list head

  * CVE-2023-1074
    - sctp: fail if no bound addresses can be used for a given scope

  * CVE-2022-41849
    - fbdev: smscufx: Fix use-after-free in ufx_ops_open()

  * CVE-2023-1281
    - net/sched: tcindex: update imperfect hash filters respecting rcu

 -- Manuel Diewald <email address hidden> Fri, 31 Mar 2023 15:37:07 +0200

1786013 Packaging resync
CVE-2022-4382 A use-after-free flaw caused by a race among the superblock operations in the gadgetfs Linux driver was found. It could be triggered by yanking out a
CVE-2023-23559 In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.
CVE-2022-3903 An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicio
CVE-2023-1118 A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user
CVE-2023-26607 In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.
CVE-2023-1095 In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() ca
CVE-2023-1074 A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networki
CVE-2022-41849 drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacke
CVE-2023-1281 RESERVED

Version: *DELETED* 2023-03-28 17:06:56 UTC
Moved to jammy:main:updates
No changelog for deleted or moved packages.



About   -   Send Feedback to @ubuntu_updates