UbuntuUpdates.org

Package "linux-allwinner-5.17"

Name: linux-allwinner-5.17

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Header files related to Linux kernel version 5.17.0
  • Header files related to Linux kernel version 5.17.0
  • Header files related to Linux kernel version 5.17.0
  • Header files related to Linux kernel version 5.17.0

Latest version: 5.17.0-1010.10
Release: jammy (22.04)
Level: updates
Repository: main

Links



Other versions of "linux-allwinner-5.17" in Jammy

Repository Area Version
security main 5.17.0-1010.10
PPA: Canonical Kernel Team 5.17.0-1006.6

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.17.0-1010.10 2022-12-01 02:07:32 UTC

  linux-allwinner-5.17 (5.17.0-1010.10) jammy; urgency=medium

  * jammy/linux-allwinner-5.17: 5.17.0-1008.8 -proposed tracker (LP: #1997080)

  [ Ubuntu: 5.17.0-14.15~22.04.8 ]

  * jammy/linux-hwe-5.17: 5.17.0-14.15~22.04.8 -proposed tracker (LP: #1997084)
  * CVE-2022-42703
    - mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse
  * CVE-2022-3566
    - tcp: Fix data races around icsk->icsk_af_ops.
  * CVE-2022-3567
    - ipv6: Fix data races around sk->sk_prot.
  * CVE-2022-3564
    - Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
  * CVE-2022-3524
    - tcp/udp: Fix memory leak in ipv6_renew_options().
  * CVE-2022-3621
    - nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
  * CVE-2022-3594
    - r8152: Rate limit overflow messages
  * CVE-2022-43945
    - SUNRPC: Fix svcxdr_init_decode's end-of-buffer calculation
    - SUNRPC: Fix svcxdr_init_encode's buflen calculation
    - NFSD: Protect against send buffer overflow in NFSv2 READDIR
    - NFSD: Protect against send buffer overflow in NFSv3 READDIR
    - NFSD: Protect against send buffer overflow in NFSv2 READ
    - NFSD: Protect against send buffer overflow in NFSv3 READ
    - NFSD: Remove "inline" directives on op_rsize_bop helpers
    - NFSD: Cap rsize_bop result based on send buffer size
  * CVE-2022-26365
    - xen/blkfront: fix leaking data in shared pages
  * CVE-2022-33743
    - xen-netfront: restore __skb_queue_tail() positioning in
      xennet_get_responses()

  [ Ubuntu: 5.17.0-11.12~22.04.8 ]

  * jammy/linux-hwe-5.17: 5.17.0-11.12~22.04.8 -proposed tracker (LP: #1992022)
  * Packaging resync (LP: #1786013)
    - [Packaging] update variants

 -- Thadeu Lima de Souza Cascardo <email address hidden> Fri, 25 Nov 2022 18:08:40 -0300

Source diff to previous version
1786013 Packaging resync
CVE-2022-42703 mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
CVE-2022-3566 A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the compo
CVE-2022-3567 A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_op
CVE-2022-3564 A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net
CVE-2022-3524 A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of
CVE-2022-3621 A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/
CVE-2022-3594 A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the f
CVE-2022-43945 The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by e
CVE-2022-26365 Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond
CVE-2022-33743 network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way all

Version: 5.17.0-1007.7 2022-10-18 20:07:53 UTC

  linux-allwinner-5.17 (5.17.0-1007.7) jammy; urgency=medium

  [ Ubuntu: 5.17.0-10.10~22.04.8 ]

  * CVE-2022-2602
    - SAUCE: io_uring/af_unix: defer registered files gc to io_uring release
    - SAUCE: io_uring/af_unix: fix memleak during unix GC
  * CVE-2022-41674
    - SAUCE: wifi: cfg80211: fix u8 overflow in
      cfg80211_update_notlisted_nontrans()
    - SAUCE: wifi: cfg80211/mac80211: reject bad MBSSID elements
    - SAUCE: wifi: cfg80211: ensure length byte is present before access
    - SAUCE: wifi: mac80211_hwsim: avoid mac80211 warning on bad rate
    - SAUCE: wifi: cfg80211: update hidden BSSes to avoid WARN_ON
  * CVE-2022-42722
    - SAUCE: wifi: mac80211: fix crash in beacon protection for P2P-device
  * CVE-2022-42721
    - SAUCE: wifi: cfg80211: avoid nontransmitted BSS list corruption
  * CVE-2022-42720
    - SAUCE: wifi: cfg80211: fix BSS refcounting bugs
  * CVE-2022-42719
    - SAUCE: wifi: mac80211: fix MBSSID parsing use-after-free
  * CVE-2022-2318
    - net: rose: fix UAF bugs caused by timer handler
  * CVE-2022-3028
    - af_key: Do not call xfrm_probe_algs in parallel
  * CVE-2022-40768
    - scsi: stex: Properly zero out the passthrough command structure
  * CVE-2022-2978
    - SAUCE: fs: fix UAF/GPF bug in nilfs_mdt_destroy

 -- Stefan Bader <email address hidden> Fri, 14 Oct 2022 15:44:01 +0200

Source diff to previous version
CVE-2022-2602 io_uring/af_unix: defer registered files gc to io_uring release
CVE-2022-41674 An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_i
CVE-2022-42722 In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer
CVE-2022-42721 A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (a
CVE-2022-42720 Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local
CVE-2022-42719 A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by atta
CVE-2022-2318 There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without
CVE-2022-3028 A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurr
CVE-2022-40768 drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecomman
CVE-2022-2978 A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following c

Version: 5.17.0-1006.6 2022-09-22 14:07:04 UTC

  linux-allwinner-5.17 (5.17.0-1006.6) jammy; urgency=medium

  * jammy/linux-allwinner-5.17: 5.17.0-1006.6 -proposed tracker (LP: #1987776)

  [ Ubuntu: 5.17.0-9.9~22.04.8 ]

  * jammy/linux-hwe-5.17: 5.17.0-9.9~22.04.8 -proposed tracker (LP: #1987779)
  * CVE-2022-36946
    - netfilter: nf_queue: do not allow packet truncation below transport header
      offset
  * CVE-2021-33655
    - fbcon: Disallow setting font bigger than screen size
    - fbcon: Prevent that screen size is smaller than font size
    - fbmem: Check virtual screen sizes in fb_set_var()

 -- Emil Renner Berthing <email address hidden> Tue, 13 Sep 2022 11:01:29 +0200

Source diff to previous version
CVE-2022-36946 nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) beca
CVE-2021-33655 When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.

Version: 5.17.0-1005.5 2022-08-31 11:07:25 UTC

  linux-allwinner-5.17 (5.17.0-1005.5) jammy; urgency=medium

  * jammy/linux-allwinner-5.17: 5.17.0-1005.5 -proposed tracker (LP: #1983904)

  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/2022.08.08)

  * GPIO character device v1 API not enabled in kernel (LP: #1953613)
    - [Config] Enable CONFIG_GPIO_CDEV_V1

  * /usr/lib/u-boot/qemu-riscv64_smode/uboot.elf cannot be booted with KVM
    (LP: #1980594)
    - RISC-V: KVM: Fix SRCU deadlock caused by kvm_riscv_check_vcpu_requests()

  [ Ubuntu: 5.17.0-8.8~22.04.8 ]

  * jammy/linux-hwe-5.17: 5.17.0-8.8~22.04.8 -proposed tracker (LP: #1983907)
  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/2022.08.08)
  * GPIO character device v1 API not enabled in kernel (LP: #1953613)
    - [Config] Enable CONFIG_GPIO_CDEV_V1
  * refactoring of overlayfs fix to properly support shiftfs (LP: #1983640)
    - SAUCE: for aufs mmap: print the virtual file path
    - SAUCE: overlayfs: fix incorrect mnt_id of files opened from map_files
  * Audio mute key (f5) LED and Mic mute key (f8) LED are no function on HP
    440/450/640/650 G9 (LP: #1982716)
    - ALSA: hda/realtek: fix mute/micmute LEDs for HP machines

 -- Emil Renner Berthing <email address hidden> Fri, 19 Aug 2022 13:26:23 +0200

Source diff to previous version
1786013 Packaging resync
1953613 GPIO character device v1 API not enabled in kernel
1980594 /usr/lib/u-boot/qemu-riscv64_smode/uboot.elf cannot be booted with KVM
1983640 refactoring of overlayfs fix to properly support shiftfs

Version: 5.17.0-1004.4 2022-08-09 23:07:47 UTC

  linux-allwinner-5.17 (5.17.0-1004.4) jammy; urgency=medium

  [ Ubuntu: 5.17.0-8.8~22.04.7 ]

  * Packaging resync (LP: #1786013)
    - [Packaging] Update etc/getabis
    - [Config]: annotate CONFIG_NET_DSA_REALTEK_SMI as '-' on amd64
    - [Config]: Remove CONFIG_IMA_TEMPLATE from annotations
    - [Packaging] update update.conf
  * CVE-2022-2585
    - SAUCE: posix-cpu-timers: Cleanup CPU timers before freeing them during exec
  * CVE-2022-2586
    - SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
    - SAUCE: netfilter: nf_tables: do not allow CHAIN_ID to refer to another table
    - SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another chain
  * CVE-2022-2588
    - SAUCE: net_sched: cls_route: remove from list when handle is 0
  * CVE-2022-1679
    - SAUCE: ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
  * CVE-2022-34918
    - netfilter: nf_tables: stricter validation of element data

 -- Luke Nowakowski-Krijger <email address hidden> Mon, 08 Aug 2022 11:58:59 -0700

1786013 Packaging resync
CVE-2022-1679 A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function
CVE-2022-34918 An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by



About   -   Send Feedback to @ubuntu_updates