UbuntuUpdates.org

Package "linux-azure-6.5-tools-6.5.0-1024"

Name: linux-azure-6.5-tools-6.5.0-1024

Description:

Linux kernel version specific tools for version 6.5.0-1024

Latest version: 6.5.0-1024.25~22.04.1
Release: jammy (22.04)
Level: security
Repository: main
Head package: linux-azure-6.5

Links


Download "linux-azure-6.5-tools-6.5.0-1024"


Other versions of "linux-azure-6.5-tools-6.5.0-1024" in Jammy

Repository Area Version
updates main 6.5.0-1024.25~22.04.1
PPA: Canonical Kernel Team 6.5.0-1024.25~22.04.1

Changelog

Version: 6.5.0-1018.19~22.04.2 2024-04-08 22:07:14 UTC

  linux-azure-6.5 (6.5.0-1018.19~22.04.2) jammy; urgency=medium

  * jammy/linux-azure-6.5: 6.5.0-1018.19~22.04.2 -proposed tracker
    (LP: #2055565)

  * Packaging resync (LP: #1786013)
    - debian.azure-6.5/dkms-versions -- update from kernel-versions
      (main/2024.03.04)

Source diff to previous version
1786013 Packaging resync

Version: 6.5.0-1017.17~22.04.1 2024-03-28 17:06:55 UTC

  linux-azure-6.5 (6.5.0-1017.17~22.04.1) jammy; urgency=medium

  * jammy/linux-azure-6.5: 6.5.0-1017.17~22.04.1 -proposed tracker
    (LP: #2056031)

  [ Ubuntu: 6.5.0-1017.17 ]

  * mantic/linux-azure: 6.5.0-1017.17 -proposed tracker (LP: #2056032)
  * mantic/linux: 6.5.0-26.26 -proposed tracker (LP: #2056049)
  * Packaging resync (LP: #1786013)
    - [Packaging] update annotations scripts
    - debian/dkms-versions -- update from kernel-versions (main/s2024.02.05)
  * CVE-2024-26599
    - pwm: Fix out-of-bounds access in of_pwm_single_xlate()
  * CVE-2024-26597
    - net: qualcomm: rmnet: fix global oob in rmnet_policy
  * CVE-2024-1086
    - netfilter: nf_tables: reject QUEUE/DROP verdict parameters
  * CVE-2024-1085
    - netfilter: nf_tables: check if catch-all set element is active in next
      generation

 -- Tim Gardner <email address hidden> Fri, 08 Mar 2024 20:35:08 -0700

Source diff to previous version
1786013 Packaging resync
CVE-2024-26599 In the Linux kernel, the following vulnerability has been resolved: pwm: Fix out-of-bounds access in of_pwm_single_xlate() With args->args_count ==
CVE-2024-26597 In the Linux kernel, the following vulnerability has been resolved: net: qualcomm: rmnet: fix global oob in rmnet_policy The variable rmnet_link_op
CVE-2024-1086 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_
CVE-2024-1085 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_

Version: 6.5.0-1016.16~22.04.1 2024-03-07 22:07:09 UTC

  linux-azure-6.5 (6.5.0-1016.16~22.04.1) jammy; urgency=medium

  * jammy/linux-azure-6.5: 6.5.0-1016.16~22.04.1 -proposed tracker
    (LP: #2052022)

  * Packaging resync (LP: #1786013)
    - [Packaging] update Ubuntu.md

  [ Ubuntu: 6.5.0-1016.16 ]

  * mantic/linux-azure: 6.5.0-1016.16 -proposed tracker (LP: #2052023)
  * Packaging resync (LP: #1786013)
    - [Packaging] update Ubuntu.md
  * Azure: Enable CONFIG_TEST_LOCKUP (LP: #2052723)
    - [Config] CONFIG_TEST_LOCKUP=m
  * mantic/linux: 6.5.0-25.25 -proposed tracker (LP: #2052615)
  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/2024.02.05)
  * [SRU][22.04.04]: mpi3mr driver update (LP: #2045233)
    - scsi: mpi3mr: Invoke soft reset upon TSU or event ack time out
    - scsi: mpi3mr: Update MPI Headers to version 3.00.28
    - scsi: mpi3mr: Add support for more than 1MB I/O
    - scsi: mpi3mr: WRITE SAME implementation
    - scsi: mpi3mr: Enhance handling of devices removed after controller reset
    - scsi: mpi3mr: Update driver version to 8.5.0.0.0
    - scsi: mpi3mr: Split off bus_reset function from host_reset
    - scsi: mpi3mr: Add support for SAS5116 PCI IDs
    - scsi: mpi3mr: Add PCI checks where SAS5116 diverges from SAS4116
    - scsi: mpi3mr: Increase maximum number of PHYs to 64 from 32
    - scsi: mpi3mr: Add support for status reply descriptor
    - scsi: mpi3mr: driver version upgrade to 8.5.0.0.50
    - scsi: mpi3mr: Refresh sdev queue depth after controller reset
    - scsi: mpi3mr: Clean up block devices post controller reset
    - scsi: mpi3mr: Block PEL Enable Command on Controller Reset and Unrecoverable
      State
    - scsi: mpi3mr: Fetch correct device dev handle for status reply descriptor
    - scsi: mpi3mr: Support for preallocation of SGL BSG data buffers part-1
    - scsi: mpi3mr: Support for preallocation of SGL BSG data buffers part-2
    - scsi: mpi3mr: Support for preallocation of SGL BSG data buffers part-3
    - scsi: mpi3mr: Update driver version to 8.5.1.0.0
  * The display becomes frozen after some time when a HDMI device is connected.
    (LP: #2049027)
    - drm/i915/dmc: Don't enable any pipe DMC events
  * Audio balancing setting doesn't work with the cirrus codec (LP: #2051050)
    - ALSA: hda/cs8409: Suppress vmaster control for Dolphin models
  * partproke is broken on empty loopback device (LP: #2049689)
    - block: Move checking GENHD_FL_NO_PART to bdev_add_partition()
  * CVE-2023-51780
    - atm: Fix Use-After-Free in do_vcc_ioctl
  * CVE-2023-6915
    - ida: Fix crash in ida_free when the bitmap is empty
  * Update Ubuntu.md (LP: #2051176)
    - [Packaging] update Ubuntu.md
  * test_021_aslr_dapper_libs from ubuntu_qrt_kernel_security failed on K-5.19 /
    J-OEM-6.1 / J-6.2 AMD64 (LP: #1983357)
    - [Config]: set ARCH_MMAP_RND_{COMPAT_, }BITS to the maximum
  * Intel E810-XXV - NETDEV WATCHDOG: (ice): transmit queue timed out
    (LP: #2036239)
    - ice: Add driver support for firmware changes for LAG
    - ice: alter feature support check for SRIOV and LAG
  * Mantic update: upstream stable patchset 2024-01-29 (LP: #2051584)
    - Upstream stable to v6.1.67, v6.6.6
    - vdpa/mlx5: preserve CVQ vringh index
    - hrtimers: Push pending hrtimers away from outgoing CPU earlier
    - i2c: designware: Fix corrupted memory seen in the ISR
    - netfilter: ipset: fix race condition between swap/destroy and kernel side
      add/del/test
    - zstd: Fix array-index-out-of-bounds UBSAN warning
    - tg3: Move the [rt]x_dropped counters to tg3_napi
    - tg3: Increment tx_dropped in tg3_tso_bug()
    - kconfig: fix memory leak from range properties
    - drm/amdgpu: correct chunk_ptr to a pointer to chunk.
    - x86: Introduce ia32_enabled()
    - x86/coco: Disable 32-bit emulation by default on TDX and SEV
    - x86/entry: Convert INT 0x80 emulation to IDTENTRY
    - x86/entry: Do not allow external 0x80 interrupts
    - x86/tdx: Allow 32-bit emulation by default
    - dt: dt-extract-compatibles: Handle cfile arguments in generator function
    - dt: dt-extract-compatibles: Don't follow symlinks when walking tree
    - platform/x86: asus-wmi: Move i8042 filter install to shared asus-wmi code
    - of: dynamic: Fix of_reconfig_get_state_change() return value documentation
    - platform/x86: wmi: Skip blocks with zero instances
    - ipv6: fix potential NULL deref in fib6_add()
    - octeontx2-pf: Add missing mutex lock in otx2_get_pauseparam
    - octeontx2-af: Check return value of nix_get_nixlf before using nixlf
    - hv_netvsc: rndis_filter needs to select NLS
    - r8152: Rename RTL8152_UNPLUG to RTL8152_INACCESSIBLE
    - r8152: Add RTL8152_INACCESSIBLE checks to more loops
    - r8152: Add RTL8152_INACCESSIBLE to r8156b_wait_loading_flash()
    - r8152: Add RTL8152_INACCESSIBLE to r8153_pre_firmware_1()
    - r8152: Add RTL8152_INACCESSIBLE to r8153_aldps_en()
    - mlxbf-bootctl: correctly identify secure boot with development keys
    - platform/mellanox: Add null pointer checks for devm_kasprintf()
    - platform/mellanox: Check devm_hwmon_device_register_with_groups() return
      value
    - arcnet: restoring support for multiple Sohard Arcnet cards
    - octeontx2-pf: consider both Rx and Tx packet stats for adaptive interrupt
      coalescing
    - net: stmmac: fix FPE events losing
    - xsk: Skip polling event check for unbound socket
    - octeontx2-af: fix a use-after-free in rvu_npa_register_reporters
    - i40e: Fix unexpected MFS warning message
    - iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero
    - tcp: fix mid stream window clamp.
    - ionic: fix snprintf format length warning
    - ionic: Fix dim work handling in split interrupt mode
    - ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit()
    - net: atlantic: Fix NULL dereference of skb pointer in
    - net: hns: fix wrong head when modify the tx feature when sending packets
    - net: hns: fix fake link up on xge port
    - oc

Source diff to previous version
1786013 Packaging resync
2052723 Azure: Enable CONFIG_TEST_LOCKUP
2045233 [SRU][22.04.04]: mpi3mr driver update
2049027 The display becomes frozen after some time when a HDMI device is connected.
2049689 partproke is broken on empty loopback device
2051176 Update Ubuntu.md
2036239 Intel E810-XXV - NETDEV WATCHDOG: (ice): transmit queue timed out
2051584 Mantic update: upstream stable patchset 2024-01-29
2051366 Mantic update: upstream stable patchset 2024-01-26
2051231 Mantic update: upstream stable patchset 2024-01-25
2051142 Mantic update: v6.5.13 upstream stable release
2051129 Mantic update: v6.5.12 upstream stable release
2051117 Mantic update: v6.5.11 upstream stable release
2051341 black screen when wake up from s3 with AMD W7600 gfx
2047634 Reject connection when malformed L2CAP signal packet is received
2049412 Mantic update: v6.5.10 upstream stable release
2049202 Mantic update: v6.5.9 upstream stable release
CVE-2023-51780 An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race conditio
CVE-2023-6915 A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cau
CVE-2024-0646 An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with
CVE-2024-0582 A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap(
CVE-2024-0565 An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Ker
CVE-2023-51781 An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race co
CVE-2023-6560 An out-of-bounds memory access flaw was found in the io_uring SQ/CQ rings functionality in the Linux kernel. This issue could allow a local user to c
CVE-2023-51782 An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race conditi
CVE-2023-51779 bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.

Version: 6.5.0-1015.15~22.04.1 2024-02-25 01:07:06 UTC

  linux-azure-6.5 (6.5.0-1015.15~22.04.1) jammy; urgency=medium

  * jammy/linux-azure-6.5: 6.5.0-1015.15~22.04.1 -proposed tracker
    (LP: #2052983)

  * Azure: cifs modules missing from the linux-modules package (LP: #2052980)
    - [Config] Move cifs.ko to linux-modules package

  [ Ubuntu: 6.5.0-1015.15 ]

  * mantic/linux-azure: 6.5.0-1015.15 -proposed tracker (LP: #2052984)
  * Azure: cifs modules missing from the linux-modules package (LP: #2052980)
    - [Config] Move cifs.ko to linux-modules package

Source diff to previous version
2052980 Azure: cifs modules missing from the linux-modules package

Version: 6.5.0-1011.11~22.04.1 2024-01-25 16:12:28 UTC

  linux-azure-6.5 (6.5.0-1011.11~22.04.1) jammy; urgency=medium

  * jammy/linux-azure-6.5: 6.5.0-1011.11~22.04.1 -proposed tracker
    (LP: #2048534)

  [ Ubuntu: 6.5.0-1011.11 ]

  * mantic/linux-azure: 6.5.0-1011.11 -proposed tracker (LP: #2048535)
  * Packaging resync (LP: #1786013)
    - [Packaging] remove helper scripts
  * mantic/linux: 6.5.0-15.15 -proposed tracker (LP: #2048549)
  * CVE-2024-0193
    - netfilter: nf_tables: skip set commit for deleted/destroyed sets
  * CVE-2023-6606
    - smb: client: fix OOB in smbCalcSize()
  * CVE-2023-6817
    - netfilter: nft_set_pipapo: skip inactive elements during set walk
  * CVE-2023-6932
    - ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
  * CVE-2023-6931
    - perf: Fix perf_event_validate_size()
    - perf: Fix perf_event_validate_size() lockdep splat

 -- Tim Gardner <email address hidden> Mon, 15 Jan 2024 08:58:55 -0700

1786013 Packaging resync
CVE-2024-0193 A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is r
CVE-2023-6606 An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker
CVE-2023-6817 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func
CVE-2023-6932 A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition c
CVE-2023-6931 A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escala



About   -   Send Feedback to @ubuntu_updates