UbuntuUpdates.org

Package "linux-modules-extra-6.5.0-1026-oracle"

Name: linux-modules-extra-6.5.0-1026-oracle

Description:

Oracle Linux kernel extra modules for version 6.5.0 on 64 bit x86 SMP

Latest version: 6.5.0-1026.26~22.04.1
Release: jammy (22.04)
Level: security
Repository: main
Head package: linux-oracle-6.5

Links


Download "linux-modules-extra-6.5.0-1026-oracle"


Other versions of "linux-modules-extra-6.5.0-1026-oracle" in Jammy

Repository Area Version
updates main 6.5.0-1026.26~22.04.1
PPA: Canonical Kernel Team 6.5.0-1026.26~22.04.1

Changelog

Version: 6.5.0-1020.20~22.04.1 2024-04-08 22:07:14 UTC

  linux-oracle-6.5 (6.5.0-1020.20~22.04.1) jammy; urgency=medium

  * jammy/linux-oracle-6.5: 6.5.0-1020.20~22.04.1 -proposed tracker
    (LP: #2055572)

  * Packaging resync (LP: #1786013)
    - [Packaging] drop ABI data
    - debian.oracle-6.5/dkms-versions -- update from kernel-versions
      (main/2024.03.04)

  [ Ubuntu: 6.5.0-1020.20 ]

  * mantic/linux-oracle: 6.5.0-1020.20 -proposed tracker (LP: #2055573)
  * Packaging resync (LP: #1786013)
    - [Packaging] drop ABI data
    - [Packaging] update Ubuntu.md
    - debian.oracle/dkms-versions -- update from kernel-versions (main/2024.03.04)
  * linux: please move dmi-sysfs.ko (CONFIG_DMI_SYSFS for SMBIOS support) from
    linux-modules-extra to linux-modules (LP: #2045561)
    - [Packaging] oracle: Move dmi-sysfs.ko into linux-modules
  * linux: please move erofs.ko (CONFIG_EROFS for EROFS support) from linux-
    modules-extra to linux-modules (LP: #2054809)
    - UBUNTU [Packaging]: oracle: Include erofs in linux-modules instead of linux-
      modules-extra
  * mantic/linux: 6.5.0-27.28 -proposed tracker (LP: #2055584)
  * Packaging resync (LP: #1786013)
    - [Packaging] drop ABI data
    - [Packaging] update annotations scripts
    - debian.master/dkms-versions -- update from kernel-versions (main/2024.03.04)
  * CVE-2024-26597
    - net: qualcomm: rmnet: fix global oob in rmnet_policy
  * CVE-2024-26599
    - pwm: Fix out-of-bounds access in of_pwm_single_xlate()
  * Drop ABI checks from kernel build (LP: #2055686)
    - [Packaging] Remove in-tree abi checks
  * Cranky update-dkms-versions rollout (LP: #2055685)
    - [Packaging] remove update-dkms-versions
    - Move debian/dkms-versions to debian.master/dkms-versions
    - [Packaging] Replace debian/dkms-versions with $(DEBIAN)/dkms-versions
  * linux: please move erofs.ko (CONFIG_EROFS for EROFS support) from linux-
    modules-extra to linux-modules (LP: #2054809)
    - UBUNTU [Packaging]: Include erofs in linux-modules instead of linux-modules-
      extra
  * performance: Scheduler: ratelimit updating of load_avg (LP: #2053251)
    - sched/fair: Ratelimit update to tg->load_avg
  * IB peer memory feature regressed in 6.5 (LP: #2055082)
    - SAUCE: RDMA/core: Introduce peer memory interface
  * linux-tools-common: man page of usbip[d] is misplaced (LP: #2054094)
    - [Packaging] rules: Put usbip manpages in the correct directory
  * CVE-2024-23851
    - dm: limit the number of targets and parameter size area
  * CVE-2024-23850
    - btrfs: do not ASSERT() if the newly created subvolume already got read
  * x86: performance: tsc: Extend watchdog check exemption to 4-Sockets platform
    (LP: #2054699)
    - x86/tsc: Extend watchdog check exemption to 4-Sockets platform
  * linux: please move dmi-sysfs.ko (CONFIG_DMI_SYSFS for SMBIOS support) from
    linux-modules-extra to linux-modules (LP: #2045561)
    - [Packaging] Move dmi-sysfs.ko into linux-modules
  * Fix AMD brightness issue on AUO panel (LP: #2054773)
    - drm/amdgpu: make damage clips support configurable
  * Mantic update: upstream stable patchset 2024-02-28 (LP: #2055199)
    - f2fs: explicitly null-terminate the xattr list
    - pinctrl: lochnagar: Don't build on MIPS
    - ALSA: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro
    - mptcp: fix uninit-value in mptcp_incoming_options
    - wifi: cfg80211: lock wiphy mutex for rfkill poll
    - wifi: avoid offset calculation on NULL pointer
    - wifi: mac80211: handle 320 MHz in ieee80211_ht_cap_ie_to_sta_ht_cap
    - debugfs: fix automount d_fsdata usage
    - nvme-core: fix a memory leak in nvme_ns_info_from_identify()
    - drm/amd/display: update dcn315 lpddr pstate latency
    - drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer
    - smb: client, common: fix fortify warnings
    - blk-mq: don't count completed flush data request as inflight in case of
      quiesce
    - nvme-core: check for too small lba shift
    - hwtracing: hisi_ptt: Handle the interrupt in hardirq context
    - hwtracing: hisi_ptt: Don't try to attach a task
    - ASoC: wm8974: Correct boost mixer inputs
    - arm64: dts: rockchip: fix rk356x pcie msg interrupt name
    - ASoC: Intel: Skylake: Fix mem leak in few functions
    - ASoC: nau8822: Fix incorrect type in assignment and cast to restricted
      __be16
    - ASoC: Intel: Skylake: mem leak in skl register function
    - ASoC: cs43130: Fix the position of const qualifier
    - ASoC: cs43130: Fix incorrect frame delay configuration
    - ASoC: rt5650: add mutex to avoid the jack detection failure
    - ASoC: Intel: skl_hda_dsp_generic: Drop HDMI routes when HDMI is not
      available
    - nouveau/tu102: flush all pdbs on vmm flush
    - ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13
    - ASoC: hdac_hda: Conditionally register dais for HDMI and Analog
    - net/tg3: fix race condition in tg3_reset_task()
    - ASoC: da7219: Support low DC impedance headset
    - nvme: introduce helper function to get ctrl state
    - nvme: prevent potential spectre v1 gadget
    - arm64: dts: rockchip: Fix PCI node addresses on rk3399-gru
    - drm/amdgpu: Add NULL checks for function pointers
    - drm/exynos: fix a potential error pointer dereference
    - drm/exynos: fix a wrong error checking
    - hwmon: (corsair-psu) Fix probe when built-in
    - LoongArch: Preserve syscall nr across execve()
    - clk: rockchip: rk3568: Add PLL rate for 292.5MHz
    - clk: rockchip: rk3128: Fix HCLK_OTG gate register
    - jbd2: correct the printing of write_flags in jbd2_write_superblock()
    - jbd2: increase the journal IO's priority
    - drm/crtc: Fix uninit-value bug in drm_mode_setcrtc
    - neighbour: Don't let neigh_forced_gc() disable preemption for long
    - platform/x86: intel-vbtn: Fix missing tablet-mode-switch events
    - jbd2: fix soft lockup in journal_finish_inode_data_buffers()
    - tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing
    - tracing:

Source diff to previous version
1786013 Packaging resync
2045561 linux: please move dmi-sysfs.ko (CONFIG_DMI_SYSFS for SMBIOS support) from linux-modules-extra to linux-modules
2054809 linux: please move erofs.ko (CONFIG_EROFS for EROFS support) from linux-modules-extra to linux-modules
2055686 Drop ABI checks from kernel build
2055685 Cranky update-dkms-versions rollout
2053251 performance: Scheduler: ratelimit updating of load_avg
2055082 IB peer memory feature regressed in 6.5
2054094 linux-tools-common: man page of usbip[d] is misplaced
2054699 x86: performance: tsc: Extend watchdog check exemption to 4-Sockets platform
2054773 Fix AMD brightness issue on AUO panel
2055199 Mantic update: upstream stable patchset 2024-02-28
2055002 Mantic update: upstream stable patchset 2024-02-27
2054779 Mantic update: upstream stable patchset 2024-02-26
2054218 kvm: Running perf against qemu processes results in page fault inside guest
2049634 smb: wsize blocks of bytes followed with binary zeros on copy, destroying data
2052662 move_mount mediation does not detect if source is detached
2052005 Validate connection interval to pass Bluetooth Test Suite
2051947 Sound: Add rtl quirk of M70-Gen5
2051896 Fix spurious wakeup caused by Cirque touchpad
2052792 Mantic update: upstream stable patchset 2024-02-09
2052499 Mantic update: upstream stable patchset 2024-02-06
2051924 Mantic update: upstream stable patchset 2024-02-01
CVE-2024-26597 In the Linux kernel, the following vulnerability has been resolved: net: qualcomm: rmnet: fix global oob in rmnet_policy The variable rmnet_link_op
CVE-2024-26599 In the Linux kernel, the following vulnerability has been resolved: pwm: Fix out-of-bounds access in of_pwm_single_xlate() With args->args_count ==
CVE-2024-23851 copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missi
CVE-2024-23850 In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be
CVE-2024-1085 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_
CVE-2023-46838 Transmit requests in Xen's virtual network protocol can consist of multiple parts. While not really useful, except for the initial part any of them
CVE-2024-1086 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_
CVE-2023-50431 sec_attest_info in drivers/accel/habanalabs/common/habanalabs_ioctl.c in the Linux kernel through 6.6.5 allows an information leak to user space beca
CVE-2024-22705 An issue was discovered in ksmbd in the Linux kernel before 6.6.10. smb2_get_data_area_len in fs/smb/server/smb2misc.c can cause an smb_strndup_from_

Version: 6.5.0-1019.19~22.04.1 2024-03-19 09:07:43 UTC

  linux-oracle-6.5 (6.5.0-1019.19~22.04.1) jammy; urgency=medium

  * jammy/linux-oracle-6.5: 6.5.0-1019.19~22.04.1 -proposed tracker
    (LP: #2056038)

  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/s2024.02.05)

  [ Ubuntu: 6.5.0-1019.19 ]

  * mantic/linux-oracle: 6.5.0-1019.19 -proposed tracker (LP: #2056039)
  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/s2024.02.05)
  * mantic/linux: 6.5.0-26.26 -proposed tracker (LP: #2056049)
  * Packaging resync (LP: #1786013)
    - [Packaging] update annotations scripts
    - debian/dkms-versions -- update from kernel-versions (main/s2024.02.05)
  * CVE-2024-26599
    - pwm: Fix out-of-bounds access in of_pwm_single_xlate()
  * CVE-2024-26597
    - net: qualcomm: rmnet: fix global oob in rmnet_policy
  * CVE-2024-1086
    - netfilter: nf_tables: reject QUEUE/DROP verdict parameters
  * CVE-2024-1085
    - netfilter: nf_tables: check if catch-all set element is active in next
      generation

 -- Stefan Bader <email address hidden> Mon, 11 Mar 2024 14:47:02 +0100

Source diff to previous version
1786013 Packaging resync
CVE-2024-26599 In the Linux kernel, the following vulnerability has been resolved: pwm: Fix out-of-bounds access in of_pwm_single_xlate() With args->args_count ==
CVE-2024-26597 In the Linux kernel, the following vulnerability has been resolved: net: qualcomm: rmnet: fix global oob in rmnet_policy The variable rmnet_link_op
CVE-2024-1086 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_
CVE-2024-1085 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_

Version: 6.5.0-1018.18~22.04.1 2024-03-06 21:06:58 UTC

  linux-oracle-6.5 (6.5.0-1018.18~22.04.1) jammy; urgency=medium

  * jammy/linux-oracle-6.5: 6.5.0-1018.18~22.04.1 -proposed tracker
    (LP: #2054122)

  [ Ubuntu: 6.5.0-1018.18 ]

  * mantic/linux-oracle: 6.5.0-1018.18 -proposed tracker (LP: #2054120)
  * Provide an arm64 linux-oracle 64k kernel variant (LP: #2052469)
    - [Packaging] oracle: Remove amd64 from 64k flavour

 -- John Cabaj <email address hidden> Fri, 16 Feb 2024 14:56:27 -0600

Source diff to previous version
2052469 Provide an arm64 linux-oracle 64k kernel variant

Version: 6.5.0-1016.16~22.04.1 2024-02-25 01:07:06 UTC

  linux-oracle-6.5 (6.5.0-1016.16~22.04.1) jammy; urgency=medium

  * jammy/linux-oracle-6.5: 6.5.0-1016.16~22.04.1 -proposed tracker
    (LP: #2052279)

  [ Ubuntu: 6.5.0-1016.16 ]

  * mantic/linux-oracle: 6.5.0-1016.16 -proposed tracker (LP: #2052280)
  * mantic/linux: 6.5.0-21.21 -proposed tracker (LP: #2052603)
  * The display becomes frozen after some time when a HDMI device is connected.
    (LP: #2049027)
    - drm/i915/dmc: Don't enable any pipe DMC events
  * partproke is broken on empty loopback device (LP: #2049689)
    - block: Move checking GENHD_FL_NO_PART to bdev_add_partition()
  * CVE-2023-51781
    - appletalk: Fix Use-After-Free in atalk_ioctl
  * CVE-2023-51780
    - atm: Fix Use-After-Free in do_vcc_ioctl
  * CVE-2023-6915
    - ida: Fix crash in ida_free when the bitmap is empty
  * CVE-2024-0565
    - smb: client: fix OOB in receive_encrypted_standard()
  * CVE-2024-0582
    - io_uring: enable io_mem_alloc/free to be used in other parts
    - io_uring/kbuf: defer release of mapped buffer rings
  * CVE-2024-0646
    - net: tls, update curr on splice as well

 -- Stefan Bader <email address hidden> Mon, 12 Feb 2024 11:22:31 +0100

Source diff to previous version
2049027 The display becomes frozen after some time when a HDMI device is connected.
2049689 partproke is broken on empty loopback device
CVE-2023-51781 An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race co
CVE-2023-51780 An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race conditio
CVE-2023-6915 A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cau
CVE-2024-0565 An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Ker
CVE-2024-0582 A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap(
CVE-2024-0646 An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with

Version: 6.5.0-1015.15~22.04.1 2024-02-07 18:06:53 UTC

  linux-oracle-6.5 (6.5.0-1015.15~22.04.1) jammy; urgency=medium

  * jammy/linux-oracle-6.5: 6.5.0-1015.15~22.04.1 -proposed tracker
    (LP: #2048362)

  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/2024.01.08)

  [ Ubuntu: 6.5.0-1015.15 ]

  * mantic/linux-oracle: 6.5.0-1015.15 -proposed tracker (LP: #2048363)
  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/2024.01.08)
  * mantic/linux: 6.5.0-17.17 -proposed tracker (LP: #2049026)
  * [UBUNTU 23.04] Regression: Ubuntu 23.04/23.10 do not include uvdevice
    anymore (LP: #2048919)
    - [Config] Enable S390_UV_UAPI (built-in)
  * mantic/linux: 6.5.0-16.16 -proposed tracker (LP: #2048372)
  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
    - [Packaging] resync update-dkms-versions helper
    - [Packaging] remove helper scripts
    - [Packaging] update annotations scripts
    - debian/dkms-versions -- update from kernel-versions (main/2024.01.08)
  * Add missing RPL P/U CPU IDs (LP: #2047398)
    - drm/i915/rpl: Update pci ids for RPL P/U
  * Fix BCM57416 lost after resume (LP: #2047518)
    - bnxt_en: Clear resource reservation during resume
  * Hotplugging SCSI disk in QEMU VM fails (LP: #2047382)
    - Revert "PCI: acpiphp: Reassign resources on bridge if necessary"
  * Update bnxt_en with bug fixes and support for Broadcom 5760X network
    adapters (LP: #2045796)
    - bnxt_en: use dev_consume_skb_any() in bnxt_tx_int
    - eth: bnxt: move and rename reset helpers
    - eth: bnxt: take the bit to set as argument of bnxt_queue_sp_work()
    - eth: bnxt: handle invalid Tx completions more gracefully
    - eth: bnxt: fix one of the W=1 warnings about fortified memcpy()
    - eth: bnxt: fix warning for define in struct_group
    - bnxt_en: Fix W=1 warning in bnxt_dcb.c from fortify memcpy()
    - bnxt_en: Fix W=stringop-overflow warning in bnxt_dcb.c
    - bnxt_en: Use the unified RX page pool buffers for XDP and non-XDP
    - bnxt_en: Let the page pool manage the DMA mapping
    - bnxt_en: Increment rx_resets counter in bnxt_disable_napi()
    - bnxt_en: Save ring error counters across reset
    - bnxt_en: Display the ring error counters under ethtool -S
    - bnxt_en: Add tx_resets ring counter
    - bnxt: use the NAPI skb allocation cache
    - bnxt_en: Update firmware interface to 1.10.2.171
    - bnxt_en: Enhance hwmon temperature reporting
    - bnxt_en: Move hwmon functions into a dedicated file
    - bnxt_en: Modify the driver to use hwmon_device_register_with_info
    - bnxt_en: Expose threshold temperatures through hwmon
    - bnxt_en: Use non-standard attribute to expose shutdown temperature
    - bnxt_en: Event handler for Thermal event
    - bnxt_en: Support QOS and TPID settings for the SRIOV VLAN
    - bnxt_en: Update VNIC resource calculation for VFs
    - Revert "bnxt_en: Support QOS and TPID settings for the SRIOV VLAN"
    - eth: bnxt: fix backward compatibility with older devices
    - bnxt_en: Do not call sleeping hwmon_notify_event() from NAPI
    - bnxt_en: Fix invoking hwmon_notify_event
    - bnxt_en: add infrastructure to lookup ethtool link mode
    - bnxt_en: support lane configuration via ethtool
    - bnxt_en: refactor speed independent ethtool modes
    - bnxt_en: Refactor NRZ/PAM4 link speed related logic
    - bnxt_en: convert to linkmode_set_bit() API
    - bnxt_en: extend media types to supported and autoneg modes
    - bnxt_en: Fix 2 stray ethtool -S counters
    - bnxt_en: Put the TX producer information in the TX BD opaque field
    - bnxt_en: Add completion ring pointer in TX and RX ring structures
    - bnxt_en: Restructure cp_ring_arr in struct bnxt_cp_ring_info
    - bnxt_en: Add completion ring pointer in TX and RX ring structures
    - bnxt_en: Remove BNXT_RX_HDL and BNXT_TX_HDL
    - bnxt_en: Refactor bnxt_tx_int()
    - bnxt_en: New encoding for the TX opaque field
    - bnxt_en: Refactor bnxt_hwrm_set_coal()
    - bnxt_en: Support up to 8 TX rings per MSIX
    - bnxt_en: Add helper to get the number of CP rings required for TX rings
    - bnxt_en: Add macros related to TC and TX rings
    - bnxt_en: Use existing MSIX vectors for all mqprio TX rings
    - bnxt_en: Optimize xmit_more TX path
    - bnxt_en: The caller of bnxt_alloc_ctx_mem() should always free bp->ctx
    - bnxt_en: Free bp->ctx inside bnxt_free_ctx_mem()
    - bnxt_en: Restructure context memory data structures
    - bnxt_en: Add page info to struct bnxt_ctx_mem_type
    - bnxt_en: Use the pg_info field in bnxt_ctx_mem_type struct
    - bnxt_en: Add bnxt_setup_ctxm_pg_tbls() helper function
    - bnxt_en: Add support for new backing store query firmware API
    - bnxt_en: Add support for HWRM_FUNC_BACKING_STORE_CFG_V2 firmware calls
    - bnxt_en: Add db_ring_mask and related macro to bnxt_db_info struct.
    - bnxt_en: Modify TX ring indexing logic.
    - bnxt_en: Modify RX ring indexing logic.
    - bnxt_en: Modify the NAPI logic for the new P7 chips
    - bnxt_en: Rename some macros for the P5 chips
    - bnxt_en: Fix backing store V2 logic
    - bnxt_en: Update firmware interface to 1.10.3.15
    - bnxt_en: Define basic P7 macros
    - bnxt_en: Consolidate DB offset calculation
    - bnxt_en: Implement the new toggle bit doorbell mechanism on P7 chips
    - bnxt_en: Refactor RSS capability fields
    - bnxt_en: Add new P7 hardware interface definitions
    - bnxt_en: Refactor RX VLAN acceleration logic.
    - bnxt_en: Refactor and refine bnxt_tpa_start() and bnxt_tpa_end().
    - bnxt_en: Add support for new RX and TPA_START completion types for P7
    - bnxt_en: Refactor ethtool speeds logic
    - bnxt_en: Support new firmware link parameters
    - bnxt_en: Support force speed using the new HWRM fields
    - bnxt_en: Report the new ethtool link modes in the new firmware interface
    - bnxt_en: Add 5760X (P7) PCI IDs
    - net: bnxt: fix a potential use-after-free in bnxt_init_tc
  *

1786013 Packaging resync
2048919 [UBUNTU 23.04] Regression: Ubuntu 23.04/23.10 do not include uvdevice anymore
2047398 Add missing RPL P/U CPU IDs
2047518 Fix BCM57416 lost after resume
2047382 Hotplugging SCSI disk in QEMU VM fails
2045796 Update bnxt_en with bug fixes and support for Broadcom 5760X network adapters
2047461 drm: Update file owner during use
2044096 Support Cirrus CS35L41 codec on Dell Oasis 13/14/16 laptops
2048078 Add support of MTL audio of Lenovo
2047389 Fix AMDGPU crash on 6.5 kernel
2035971 linux tools packages for derived kernels refuse to install simultaneously due to libcpupower name collision
2045562 [Debian] autoreconstruct - Do not generate chmod -x for deleted files
2046269 Mantic update: v6.5.8 upstream stable release
2045806 Mantic update: v6.5.7 upstream stable release
2044512 Build failure if run in a console
2039151 Support speaker mute hotkey for Cirrus CS35L41 HDA codec
2043730 Update io_uring to 6.6
2041613 correct cephfs pull request for uidmap support
2043841 kernel BUG: io_uring openat triggers audit reference count underflow
2042853 [UBUNTU 23.04] Kernel config option missing for s390x PCI passthrough
2036600 Azure: Fix Azure vendor ID
2044174 Mantic update: v6.5.6 upstream stable release
2043416 Mantic update: v6.5.5 upstream stable release
2041999 Mantic update: v6.5.4 upstream stable release
CVE-2023-6622 A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue ma
CVE-2024-0193 A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is r
CVE-2023-6931 A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escala
CVE-2023-34324 linux/xen: Possible deadlock in Linux kernel event handling
CVE-2023-6932 A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition c
CVE-2023-6531 A use-after-free flaw was found in the Linux Kernel due to a race prob ...
CVE-2023-6606 An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker
CVE-2023-6817 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func
CVE-2023-46813 An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checki
CVE-2023-6111 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func
CVE-2023-5972 A null pointer dereference flaw was found in the nft_inner.c functionality of netfilter in the Linux kernel. This issue could allow a local user to c
CVE-2023-6176 A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a



About   -   Send Feedback to @ubuntu_updates