UbuntuUpdates.org

Package "linux-tools-6.8.0-1018-gcp"

Name: linux-tools-6.8.0-1018-gcp

Description:

Linux kernel version specific tools for version 6.8.0-1018

Latest version: 6.8.0-1018.20~22.04.1
Release: jammy (22.04)
Level: security
Repository: main
Head package: linux-gcp-6.8

Links


Download "linux-tools-6.8.0-1018-gcp"


Other versions of "linux-tools-6.8.0-1018-gcp" in Jammy

Repository Area Version
updates main 6.8.0-1018.20~22.04.1

Changelog

Version: 6.8.0-1013.14~22.04.1 2024-08-21 14:08:40 UTC

  linux-gcp-6.8 (6.8.0-1013.14~22.04.1) jammy; urgency=medium

  * jammy/linux-gcp-6.8: 6.8.0-1013.14~22.04.1 -proposed tracker (LP: #2075586)

  [ Ubuntu: 6.8.0-1013.14 ]

  * noble/linux-gcp: 6.8.0-1013.14 -proposed tracker (LP: #2075587)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.gcp/dkms-versions -- update from kernel-versions
      (main/s2024.07.08)
  [ Ubuntu: 6.8.0-41.41 ]
  * noble/linux: 6.8.0-41.41 -proposed tracker (LP: #2075611)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/s2024.07.08)
  * md: nvme over tcp with a striped underlying md raid device leads to data
    corruption (LP: #2075110)
    - md/md-bitmap: fix writing non bitmap pages
  * Linux 6.8 fails to boot on ARM64 if any param is more than 146 chars
    (LP: #2069534)
    - SAUCE: arm64: v6.8: cmdline param >= 146 chars kills kernel
  * CVE-2024-39484
    - mmc: davinci: Don't strip remove function when driver is builtin
  * CVE-2024-39292
    - um: Add winch to winch_handlers before registering winch IRQ

 -- Kevin Becker <email address hidden> Fri, 09 Aug 2024 08:56:46 -0400

Source diff to previous version
1786013 Packaging resync
2075110 md: nvme over tcp with a striped underlying md raid device leads to data corruption
2069534 Linux 6.8 fails to boot on ARM64 if any param is more than 146 chars
CVE-2024-39484 In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit f
CVE-2024-39292 In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winc

Version: 6.8.0-1012.13~22.04.1 2024-08-08 17:07:15 UTC

  linux-gcp-6.8 (6.8.0-1012.13~22.04.1) jammy; urgency=medium

  * jammy/linux-gcp-6.8: 6.8.0-1012.13~22.04.1 -proposed tracker (LP: #2072176)

  * Packaging resync (LP: #1786013)
    - [Packaging] debian.gcp-6.8/dkms-versions -- update from kernel-versions
      (main/2024.07.08)

  [ Ubuntu: 6.8.0-1012.13 ]

  * noble/linux-gcp: 6.8.0-1012.13 -proposed tracker (LP: #2072177)
  [ Ubuntu: 6.8.0-40.40 ]
  * noble/linux: 6.8.0-40.40 -proposed tracker (LP: #2072201)
  * FPS of glxgear with fullscreen is too low on MTL platform (LP: #2069380)
    - drm/i915: Bypass LMEMBAR/GTTMMADR for MTL stolen memory access
  * a critical typo in the code managing the ASPM settings for PCI Express
    devices (LP: #2071889)
    - PCI/ASPM: Restore parent state to parent, child state to child
  * [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
    throughput degradation for PCI-related network workloads (LP: #2071471)
    - [Config] Set IOMMU_DEFAULT_DMA_STRICT=n and IOMMU_DEFAULT_DMA_LAZY=yes for
      s390x
  * UBSAN: array-index-out-of-bounds in
    /build/linux-D15vQj/linux-6.5.0/drivers/md/bcache/bset.c:1098:3
    (LP: #2039368)
    - bcache: fix variable length array abuse in btree_iter
  * Mute/mic LEDs and speaker no function on EliteBook 645/665 G11
    (LP: #2071296)
    - ALSA: hda/realtek: fix mute/micmute LEDs don't work for EliteBook 645/665
      G11.
  * failed to enable IPU6 camera sensor on kernel >= 6.8: ivsc_ace
    intel_vsc-5db76cf6-0a68-4ed6-9b78-0361635e2447: switch camera to host
    failed: -110 (LP: #2067364)
    - mei: vsc: Don't stop/restart mei device during system suspend/resume
    - SAUCE: media: ivsc: csi: don't count privacy on as error
    - SAUCE: media: ivsc: csi: add separate lock for v4l2 control handler
    - SAUCE: media: ivsc: csi: remove privacy status in struct mei_csi
    - SAUCE: mei: vsc: Enhance IVSC chipset stability during warm reboot
    - SAUCE: mei: vsc: Enhance SPI transfer of IVSC rom
    - SAUCE: mei: vsc: Utilize the appropriate byte order swap function
    - SAUCE: mei: vsc: Prevent timeout error with added delay post-firmware
      download
  * failed to probe camera sensor on Dell XPS 9315: ov01a10 i2c-OVTI01A0:00:
    failed to check hwcfg: -22 (LP: #2070251)
    - ACPI: utils: Make acpi_handle_path() not static
    - ACPI: property: Ignore bad graph port nodes on Dell XPS 9315
    - ACPI: property: Polish ignoring bad data nodes
    - ACPI: scan: Ignore camera graph port nodes on all Dell Tiger, Alder and
      Raptor Lake models
  * Update amd_sfh for AMD strix series (LP: #2058331)
    - HID: amd_sfh: Increase sensor command timeout
    - HID: amd_sfh: Improve boot time when SFH is available
    - HID: amd_sfh: Extend MP2 register access to SFH
    - HID: amd_sfh: Set the AMD SFH driver to depend on x86
  * RFIM and SAGV Linux Support for G10 models (LP: #2070158)
    - drm/i915/display: Add meaningful traces for QGV point info error handling
    - drm/i915/display: Extract code required to calculate max qgv/psf gv point
    - drm/i915/display: extract code to prepare qgv points mask
    - drm/i915/display: Disable SAGV on bw init, to force QGV point recalculation
    - drm/i915/display: handle systems with duplicate psf gv points
    - drm/i915/display: force qgv check after the hw state readout
  * Update amd-pmf for AMD strix series (LP: #2058330)
    - platform/x86/amd/pmf: Differentiate PMF ACPI versions
    - platform/x86/amd/pmf: Disable debugfs support for querying power thermals
    - platform/x86/amd/pmf: Add support to get sbios requests in PMF driver
    - platform/x86/amd/pmf: Add support to notify sbios heart beat event
    - platform/x86/amd/pmf: Add support to get APTS index numbers for static
      slider
    - platform/x86/amd/pmf: Add support to get sps default APTS index values
    - platform/x86/amd/pmf: Update sps power thermals according to the platform-
      profiles
  * noble:linux: ADT ubuntu-regression-suite misses fakeroot dependency
    (LP: #2070042)
    - [DEP-8] Add missing fakeroot dependency
  * Noble update: v6.8.12 upstream stable release (LP: #2071621)
    - sunrpc: use the struct net as the svc proc private
    - x86/tsc: Trust initial offset in architectural TSC-adjust MSRs
    - selftests/ftrace: Fix BTFARG testcase to check fprobe is enabled correctly
    - ftrace: Fix possible use-after-free issue in ftrace_location()
    - Revert "arm64: fpsimd: Implement lazy restore for kernel mode FPSIMD"
    - arm64/fpsimd: Avoid erroneous elide of user state reload
    - Reapply "arm64: fpsimd: Implement lazy restore for kernel mode FPSIMD"
    - tty: n_gsm: fix missing receive state reset after mode switch
    - speakup: Fix sizeof() vs ARRAY_SIZE() bug
    - serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler
    - serial: 8250_bcm7271: use default_mux_rate if possible
    - serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup
    - Input: try trimming too long modalias strings
    - io_uring: fail NOP if non-zero op flags is passed in
    - Revert "r8169: don't try to disable interrupts if NAPI is, scheduled
      already"
    - r8169: Fix possible ring buffer corruption on fragmented Tx packets.
    - ring-buffer: Fix a race between readers and resize checks
    - net: mana: Fix the extra HZ in mana_hwc_send_request
    - tools/latency-collector: Fix -Wformat-security compile warns
    - tools/nolibc/stdlib: fix memory error in realloc()
    - net: ti: icssg_prueth: Fix NULL pointer dereference in prueth_probe()
    - net: lan966x: remove debugfs directory in probe() error path
    - net: smc91x: Fix m68k kernel compilation for ColdFire CPU
    - nilfs2: fix use-after-free of timer for log writer thread
    - nilfs2: fix unexpected freezing of nilfs_segctor_sync()
    - nilfs2: fix potential hang in nilfs_detach_log_writer()
    - fs/ntfs3: Remove max link count info display during driver init
    - fs/ntfs3: Taking DOS names into account during link coun

Source diff to previous version
1786013 Packaging resync
2069380 FPS of glxgear with fullscreen is too low on MTL platform
2071889 a critical typo in the code managing the ASPM settings for PCI Express devices
2071471 [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
2039368 UBSAN: array-index-out-of-bounds in /build/linux-D15vQj/linux-6.5.0/drivers/md/bcache/bset.c:1098:3
2071296 Mute/mic LEDs and speaker no function on EliteBook 645/665 G11
2058331 Update amd_sfh for AMD strix series
2070158 RFIM and SAGV Linux Support for G10 models
2058330 Update amd-pmf for AMD strix series
2070042 noble:linux: ADT ubuntu-regression-suite misses fakeroot dependency
2071621 Noble update: v6.8.12 upstream stable release
2070355 Noble update: v6.8.11 upstream stable release
2070349 Noble update: v6.8.10 upstream stable release
2070337 Noble update: v6.8.9 upstream stable release
2066233 amdgpu hangs on DCN 3.5 at bootup: RIP: 0010:dcn35_clk_mgr_construct+0x183/0x2210 [amdgpu]
2069231 [MTL] ACPI: PM: s2idle: Backport Linux ACPI s2idle patches to fix suspend/resume issue
2067862 Removing legacy virtio-pci devices causes kernel panic
2069664 Mute/mic LEDs no function on ProBook 445/465 G11
2067669 Mute/mic LEDs no function on ProBook 440/460 G11
2065128 rtw89_8852ce - Lost WIFI connection after suspend
CVE-2024-25742 In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This
CVE-2024-35984 In the Linux kernel, the following vulnerability has been resolved: i2c: smbus: fix NULL function pointer dereference Baruch reported an OOPS when
CVE-2024-35990 In the Linux kernel, the following vulnerability has been resolved: dma: xilinx_dpdma: Fix locking There are several places where either chan->lock
CVE-2024-35997 In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up The flag I2C_
CVE-2024-36016 In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following
CVE-2024-36008 In the Linux kernel, the following vulnerability has been resolved: ipv4: check for NULL idev in ip_route_use_hint() syzbot was able to trigger a N
CVE-2024-35992 In the Linux kernel, the following vulnerability has been resolved: phy: marvell: a3700-comphy: Fix out of bounds read There is an out of bounds re

Version: 6.8.0-1011.12~22.04.1 2024-07-29 23:07:07 UTC

  linux-gcp-6.8 (6.8.0-1011.12~22.04.1) jammy; urgency=medium

  * jammy/linux-gcp-6.8: 6.8.0-1011.12~22.04.1 -proposed tracker (LP: #2071957)

  [ Ubuntu: 6.8.0-1011.12 ]

  * noble/linux-gcp: 6.8.0-1011.12 -proposed tracker (LP: #2071958)
  [ Ubuntu: 6.8.0-39.39 ]
  * noble/linux: 6.8.0-39.39 -proposed tracker (LP: #2071983)
  * CVE-2024-25742
    - x86/sev: Harden #VC instruction emulation somewhat
    - x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler
  * Noble update: v6.8.9 upstream stable release (LP: #2070337) //
    CVE-2024-35984
    - i2c: smbus: fix NULL function pointer dereference
  * Noble update: v6.8.9 upstream stable release (LP: #2070337) //
    CVE-2024-35990
    - dma: xilinx_dpdma: Fix locking
  * Noble update: v6.8.9 upstream stable release (LP: #2070337) //
    CVE-2024-35997
    - HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up
  * CVE-2024-36016
    - tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
  * CVE-2024-36008
    - ipv4: check for NULL idev in ip_route_use_hint()
  * CVE-2024-35992
    - phy: marvell: a3700-comphy: Fix out of bounds read

 -- Kevin Becker <email address hidden> Thu, 18 Jul 2024 11:26:21 -0400

Source diff to previous version
2070337 Noble update: v6.8.9 upstream stable release
CVE-2024-25742 In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This
CVE-2024-35984 In the Linux kernel, the following vulnerability has been resolved: i2c: smbus: fix NULL function pointer dereference Baruch reported an OOPS when
CVE-2024-35990 In the Linux kernel, the following vulnerability has been resolved: dma: xilinx_dpdma: Fix locking There are several places where either chan->lock
CVE-2024-35997 In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up The flag I2C_
CVE-2024-36016 In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following
CVE-2024-36008 In the Linux kernel, the following vulnerability has been resolved: ipv4: check for NULL idev in ip_route_use_hint() syzbot was able to trigger a N
CVE-2024-35992 In the Linux kernel, the following vulnerability has been resolved: phy: marvell: a3700-comphy: Fix out of bounds read There is an out of bounds re

Version: 6.8.0-1010.11~22.04.1 2024-07-23 00:07:22 UTC

  linux-gcp-6.8 (6.8.0-1010.11~22.04.1) jammy; urgency=medium

  * jammy/linux-gcp-6.8: 6.8.0-1010.11~22.04.1 -proposed tracker (LP: #2069423)

  * Packaging resync (LP: #1786013)
    - [Packaging] update variants

 -- Kevin Becker <email address hidden> Tue, 09 Jul 2024 10:17:49 -0400

1786013 Packaging resync



About   -   Send Feedback to @ubuntu_updates