UbuntuUpdates.org

Package "linux-gcp-5.19-tools-5.19.0-1030"

Name: linux-gcp-5.19-tools-5.19.0-1030

Description:

Linux kernel version specific tools for version 5.19.0-1030

Latest version: 5.19.0-1030.32~22.04.1
Release: jammy (22.04)
Level: updates
Repository: main
Head package: linux-gcp-5.19

Links


Download "linux-gcp-5.19-tools-5.19.0-1030"


Other versions of "linux-gcp-5.19-tools-5.19.0-1030" in Jammy

Repository Area Version
security main 5.19.0-1030.32~22.04.1
PPA: Canonical Kernel Team 5.19.0-1030.32~22.04.1

Changelog

Version: 5.19.0-1022.24~22.04.1 2023-04-25 15:07:05 UTC

  linux-gcp-5.19 (5.19.0-1022.24~22.04.1) jammy; urgency=medium

  * jammy/linux-gcp-5.19: 5.19.0-1022.24~22.04.1 -proposed tracker
    (LP: #2016637)

  * CVE-2023-1829
    - [Config]: Make sure CONFIG_NET_CLS_TCINDEX is not available

  [ Ubuntu: 5.19.0-1022.24 ]

  * kinetic/linux-gcp: 5.19.0-1022.24 -proposed tracker (LP: #2016638)
  * CVE-2023-1829
    - [Config]: Make sure CONFIG_NET_CLS_TCINDEX is not available
  * kinetic/linux: 5.19.0-41.42 -proposed tracker (LP: #2016651)
  * CVE-2023-1829
    - net/sched: Retire tcindex classifier
    - [Config]: Make sure CONFIG_NET_CLS_TCINDEX is not available
  * CVE-2023-0386
    - ovl: fail on invalid uid/gid mapping at copy up

 -- Thadeu Lima de Souza Cascardo <email address hidden> Sun, 23 Apr 2023 06:17:40 -0300

Source diff to previous version
CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s

Version: 5.19.0-1021.23~22.04.1 2023-04-24 18:07:05 UTC

  linux-gcp-5.19 (5.19.0-1021.23~22.04.1) jammy; urgency=medium

  * jammy/linux-gcp-5.19: 5.19.0-1021.23~22.04.1 -proposed tracker
    (LP: #2011862)

  * Packaging resync (LP: #1786013)
    - [Packaging] update variants

  * Miscellaneous Ubuntu changes
    - [packaging] Add helper scripts
    - [packaging] Add sev-guest to default module list

  [ Ubuntu: 5.19.0-1021.23 ]

  * Miscellaneous Ubuntu changes
    - [packaging] Add sev-guest to default module list

  [ Ubuntu: 5.19.0-1020.22 ]

  * kinetic/linux-gcp: 5.19.0-1020.22 -proposed tracker (LP: #2011863)
  * Miscellaneous Ubuntu changes
    - [config] Enable CONFIG_TDX_GUEST_DRIVER=m
    - [packaging] update annotations
  * kinetic/linux: 5.19.0-40.41 -proposed tracker (LP: #2012668)
  * CVE-2023-0468
    - io_uring: fix tw losing poll events
    - io_uring: make poll refs more robust
  * Regression in ext4 during online resize (LP: #2003816)
    - ext4: fix bad checksum after online resize
    - ext4: fix corruption when online resizing a 1K bigalloc fs
    - ext4: fix corrupt backup group descriptors after online resize
  * kinetic/linux: 5.19.0-39.40 -proposed tracker (LP: #2011876)
  * CVE-2023-26545
    - net: mpls: fix stale pointer if allocation fails during device rename
  * CVE-2023-1032
    - net: avoid double iput when sock_alloc_file fails
  * CVE-2022-41218 // CVE-2022-41218 is assigned to those bugs above.
    - media: dvb-core: Fix UAF due to refcount races at releasing
  * CVE-2023-1281
    - net/sched: tcindex: update imperfect hash filters respecting rcu
  * linux: CONFIG_SERIAL_8250_MID=y (LP: #2009283)
    - [Config] enable CONFIG_SERIAL_8250_MID=y
  * apply the latest TDX attestation driver from Intel (LP: #2009437)
    - Revert "UBUNTU: SAUCE: selftests: tdx: Test GetReport TDX attestation
      feature"
    - Revert "UBUNTU: SAUCE: x86/tdx: Add TDX Guest attestation interface driver"
    - x86/tdx: Add a wrapper to get TDREPORT0 from the TDX Module
    - virt: Add TDX guest driver
    - selftests/tdx: Test TDX attestation GetReport support
    - [Config] enable TDX attestation driver as module by default
  * cpufreq: intel_pstate: Update Balance performance EPP for Sapphire Rapids
    (LP: #2008519)
    - cpufreq: intel_pstate: Adjust balance_performance EPP for Sapphire Rapids
  * Fail to output sound to external monitor which connects via docking station
    (LP: #2009024)
    - [Config] Enable CONFIG_SND_HDA_INTEL_HDMI_SILENT_STREAM
  * Fix mediatek wifi driver crash when loading wrong SAR table (LP: #2009118)
    - wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read
  * CVE-2022-47929
    - net: sched: disallow noqueue for qdisc classes
  * Intel graphic driver is not probing[8086:468b] (LP: #1990242)
    - drm/i915: Add new ADL-S pci id
  * Some QHD panels fail to refresh when PSR2 enabled (LP: #2009014)
    - drm/i915/psr: Use full update In case of area calculation fails
    - drm/i915: Ensure damage clip area is within pipe area
    - SAUCE: drm/i915/psr: Use calculated io and fast wake lines
  * overlayfs mounts as R/O over idmapped mount (LP: #2009065)
    - SAUCE: overlayfs: handle idmapped mounts in ovl_do_(set|remove)xattr
  * Kinetic update: upstream stable patchset 2023-02-28 (LP: #2008832)
    - usb: musb: remove extra check in musb_gadget_vbus_draw
    - arm64: dts: qcom: ipq6018-cp01-c1: use BLSPI1 pins
    - arm64: dts: qcom: sm8250-sony-xperia-edo: fix touchscreen bias-disable
    - arm64: dts: qcom: msm8996: Add MSM8996 Pro support
    - arm64: dts: qcom: msm8996: fix supported-hw in cpufreq OPP tables
    - arm64: dts: qcom: msm8996: fix GPU OPP table
    - ARM: dts: qcom: apq8064: fix coresight compatible
    - arm64: dts: qcom: sdm630: fix UART1 pin bias
    - arm64: dts: qcom: sdm845-cheza: fix AP suspend pin bias
    - arm64: dts: qcom: msm8916: Drop MSS fallback compatible
    - objtool, kcsan: Add volatile read/write instrumentation to whitelist
    - ARM: dts: stm32: Drop stm32mp15xc.dtsi from Avenger96
    - ARM: dts: stm32: Fix AV96 WLAN regulator gpio property
    - drivers: soc: ti: knav_qmss_queue: Mark knav_acc_firmwares as static
    - arm64: dts: qcom: pm660: Use unique ADC5_VCOIN address in node name
    - arm64: dts: qcom: sm8250: correct LPASS pin pull down
    - soc: qcom: llcc: make irq truly optional
    - arm64: dts: qcom: sm8150: fix UFS PHY registers
    - arm64: dts: qcom: sm8250: fix UFS PHY registers
    - arm64: dts: qcom: sm8350: fix UFS PHY registers
    - arm64: dts: qcom: sm8250: drop bogus DP PHY clock
    - soc: qcom: apr: Add check for idr_alloc and of_property_read_string_index
    - arm64: dts: qcom: sm6125: fix SDHCI CQE reg names
    - arm: dts: spear600: Fix clcd interrupt
    - soc: ti: knav_qmss_queue: Fix PM disable depth imbalance in knav_queue_probe
    - soc: ti: smartreflex: Fix PM disable depth imbalance in omap_sr_probe
    - arm64: mm: kfence: only handle translation faults
    - perf: arm_dsu: Fix hotplug callback leak in dsu_pmu_init()
    - perf/arm_dmc620: Fix hotplug callback leak in dmc620_pmu_init()
    - perf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()
    - arm64: dts: ti: k3-am65-main: Drop dma-coherent in crypto node
    - arm64: dts: ti: k3-j721e-main: Drop dma-coherent in crypto node
    - ARM: dts: nuvoton: Remove bogus unit addresses from fixed-partition nodes
    - arm64: dts: mt6779: Fix devicetree build warnings
    - arm64: dts: mt2712e: Fix unit_address_vs_reg warning for oscillators
    - arm64: dts: mt2712e: Fix unit address for pinctrl node
    - arm64: dts: mt2712-evb: Fix vproc fixed regulators unit names
    - arm64: dts: mt2712-evb: Fix usb vbus regulators unit names
    - arm64: dts: mediatek: pumpkin-common: Fix devicetree warnings
    - arm64: dts: mediatek: mt6797: Fix 26M oscillator unit name
    - ARM: dts: dove: Fix assigned-addresses for every PCIe Root Port
    - ARM: dts: armada-370: Fix assigned-addresses for every PCIe Root Port
    - ARM: dts: armada-xp: Fix assigned-addr

Source diff to previous version
1786013 Packaging resync
2003816 Regression in ext4 during online resize
2009283 linux: CONFIG_SERIAL_8250_MID=y
2009437 apply the latest TDX attestation driver from Intel
2008519 cpufreq: intel_pstate: Update Balance performance EPP for Sapphire Rapids
2009024 Fail to output sound to external monitor which connects via docking station
2009118 Fix mediatek wifi driver crash when loading wrong SAR table
2009014 Some QHD panels fail to refresh when PSR2 enabled
2009065 overlayfs mounts as R/O over idmapped mount
2008832 Kinetic update: upstream stable patchset 2023-02-28
CVE-2023-0468 A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition o
CVE-2023-26545 In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a
CVE-2023-1032 RESERVED
CVE-2022-41218 In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open
CVE-2023-1281 RESERVED
CVE-2022-47929 In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of

Version: 5.19.0-1020.22~22.04.2 2023-03-29 15:06:53 UTC

  linux-gcp-5.19 (5.19.0-1020.22~22.04.2) jammy; urgency=medium

  * jammy/linux-gcp-5.19: 5.19.0-1020.22~22.04.2 -proposed tracker
    (LP: #2008292)

  * Packaging resync (LP: #1786013)
    - [Packaging] update variants
    - [Packaging] update update.conf
    - [Packaging] update Ubuntu.md
    - [packaging] Initial bringup of j/gcp-5.19
    - [config] Update configs after bring-up

  [ Ubuntu: 5.19.0-1019.21 ]

  * kinetic/linux-gcp: 5.19.0-1019.21 -proposed tracker (LP: #2008293)
  * kinetic/linux: 5.19.0-37.38 -proposed tracker (LP: #2008305)
  * XPS 9320 screen flicker on UHD panel 3840x2400 (LP: #2007516)
    - SAUCE: drm/i915/display/psr: Disable PSR2 sel fetch on panel SHP 5457
  * Fix speaker mute hotkey doesn't work on Dell G16 series (LP: #2003161)
    - platform/x86: dell-wmi: Add a keymap for KEY_MUTE in type 0x0010 table
  * net:cmsg_ipv6.sh from ubuntu_kernel_selftests failed with K-5.19
    (LP: #2000709)
    - selftest: net: Improve IPV6_TCLASS/IPV6_HOPLIMIT tests apparmor
      compatibility
  * rtcpie in timers from ubuntu_kernel_selftests randomly failing
    (LP: #1814234)
    - SAUCE: selftest: rtcpie: Force passing unreliable subtest
  * CVE-2023-0469
    - io_uring/filetable: fix file reference underflow
  * Improve arp_ndisc_evict_nocarrier.sh test result processing (LP: #2006546)
    - selftests: net: return non-zero for failures reported in
      arp_ndisc_evict_nocarrier
  * Make cm32181 sensor work after system suspend (LP: #1981773)
    - iio: light: cm32181: Add PM support
  * Fix Thunderbolt device hotplug fail when connect via thunderbolt dock
    (LP: #1991366)
    - PCI: Fix used_buses calculation in pci_scan_child_bus_extend()
    - PCI: Pass available buses even if the bridge is already configured
    - PCI: Move pci_assign_unassigned_root_bus_resources()
    - PCI: Fix whitespace and indentation
    - PCI: Fix typo in pci_scan_child_bus_extend()
  * arp_ndisc_evict_nocarrier.sh in net from ubuntu_kernel_selftests failed on
    J-oem-5.17 / K (LP: #1968310)
    - selftests: net: fix cleanup_v6() for arp_ndisc_evict_nocarrier
  * Screen freeze after resuming from suspend (nvme0: I/O timeout)
    (LP: #1996048)
    - PCI: vmd: Disable MSI remapping after suspend
  * RaptorLake: Fix the Screen is shaking by onboard HDMI port in mirror mode
    (LP: #1993561)
    - drm/i915/display: Drop check for doublescan mode in modevalid
    - drm/i915/display: Prune Interlace modes for Display >=12
  * udpgro_frglist.sh in net from ubuntu_kernel_selftests failed with K-5.19
    (Missing nat6to4 helper) (LP: #2000708)
    - selftests/net: mv bpf/nat6to4.c to net folder
  * selftests/.../nat6to4 breaks the selftests build (LP: #1996536)
    - selftests: net: Add cross-compilation support for BPF programs
    - selftests: net: Fix O=dir builds
  * CVE-2023-0266 // CVE-2023-0266 was assigned for this issue.
    - ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
  * CVE-2022-4382
    - USB: gadgetfs: Fix race between mounting and unmounting
  * CVE-2022-2196
    - KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
  * ubuntu_kernel_selftests: net:udpgso_bench.sh failed (LP: #1951447)
    - selftests: net: udpgso_bench: Fix racing bug between the rx/tx programs
  * Kinetic update: upstream stable patchset 2023-02-02 (LP: #2004602)
    - clk: generalize devm_clk_get() a bit
    - clk: Provide new devm_clk helpers for prepared and enabled clocks
    - mmc: mtk-sd: Fix missing clk_disable_unprepare in msdc_of_clock_parse()
    - arm64: dts: rockchip: keep I2S1 disabled for GPIO function on ROCK Pi 4
      series
    - arm: dts: rockchip: fix node name for hym8563 rtc
    - arm: dts: rockchip: remove clock-frequency from rtc
    - ARM: dts: rockchip: fix ir-receiver node names
    - arm64: dts: rockchip: fix ir-receiver node names
    - ARM: dts: rockchip: rk3188: fix lcdc1-rgb24 node name
    - fs: use acquire ordering in __fget_light()
    - ARM: 9251/1: perf: Fix stacktraces for tracepoint events in THUMB2 kernels
    - ARM: 9266/1: mm: fix no-MMU ZERO_PAGE() implementation
    - ASoC: wm8962: Wait for updated value of WM8962_CLOCKING1 register
    - spi: mediatek: Fix DEVAPC Violation at KO Remove
    - ARM: dts: rockchip: disable arm_global_timer on rk3066 and rk3188
    - ASoC: rt711-sdca: fix the latency time of clock stop prepare state machine
      transitions
    - 9p/fd: Use P9_HDRSZ for header size
    - regulator: slg51000: Wait after asserting CS pin
    - ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event
    - btrfs: send: avoid unaligned encoded writes when attempting to clone range
    - ASoC: soc-pcm: Add NULL check in BE reparenting
    - regulator: twl6030: fix get status of twl6032 regulators
    - fbcon: Use kzalloc() in fbcon_prepare_logo()
    - usb: dwc3: gadget: Disable GUSB2PHYCFG.SUSPHY for End Transfer
    - 9p/xen: check logical size for buffer size
    - net: usb: qmi_wwan: add u-blox 0x1342 composition
    - mm/khugepaged: take the right locks for page table retraction
    - mm/khugepaged: fix GUP-fast interaction by sending IPI
    - mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths
    - cifs: fix use-after-free caused by invalid pointer `hostname`
    - xen/netback: do some code cleanup
    - xen/netback: don't call kfree_skb() with interrupts disabled
    - media: videobuf2-core: take mmap_lock in vb2_get_unmapped_area()
    - soundwire: intel: Initialize clock stop timeout
    - media: v4l2-dv-timings.c: fix too strict blanking sanity checks
    - memcg: fix possible use-after-free in memcg_write_event_control()
    - mm/gup: fix gup_pud_range() for dax
    - Bluetooth: btusb: Add debug message for CSR controllers
    - Bluetooth: Fix crash when replugging CSR fake controllers
    - net: mana: Fix race on per-CQ variable napi work_done
    - KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
    - drm/vmwgfx: Don't use screen objects when SEV is

1786013 Packaging resync
2003161 Fix speaker mute hotkey doesn't work on Dell G16 series
2000709 net:cmsg_ipv6.sh from ubuntu_kernel_selftests failed with K-5.19
1814234 rtcpie in timers from ubuntu_kernel_selftests randomly failing
2006546 Improve arp_ndisc_evict_nocarrier.sh test result processing
1991366 Fix Thunderbolt device hotplug fail when connect via thunderbolt dock
2000708 udpgro_frglist.sh in net from ubuntu_kernel_selftests failed with K-5.19 (Missing nat6to4 helper)
1996536 selftests/.../nat6to4 breaks the selftests build
1951447 ubuntu_kernel_selftests: net:udpgso_bench.sh failed
2004602 Kinetic update: upstream stable patchset 2023-02-02
2006391 net:fcnal-test.sh 'nettest' command not found on F/K
2004051 Kinetic update: upstream stable patchset 2023-01-27
1990849 LXD containers using shiftfs on ZFS or TMPFS broken on 5.15.0-48.54
2002889 5.15.0-58.64 breaks xen bridge networking (pvh domU)
2003053 NFS: client permission error after adding user to permissible group
2000667 cmsg_so_mark.sh / cmsg_time.sh / cmsg_ipv6.sh in net from ubuntu_kernel_selftests hang with non-amd64
1999750 Set explicit CC in the headers package
2000772 powerpc-build in ubuntu_kernel_selftests failed on P9 with K-5.19
1992714 [SRU] SoF for RPL platform support
1999556 commit cf58599cded35cf4affed1e659c0e2c742d3fda7 seems to be missing in kinetic master to remove \
1998885 Add additional Mediatek MT7922 BT device ID
1998882 Mute/mic LEDs no function on a HP platfrom
2003753 Kinetic update: upstream stable patchset 2023-01-23
2001726 Kinetic update: upstream stable patchset 2023-01-04
2003524 amdgpu: framebuffer is destroyed and the screen freezes with unsupported IP blocks
2002812 Revoke \u0026 rotate to new signing key
1996540 Kinetic update: upstream stable patchset 2022-11-14
1998115 Fix iosm: WWAN cannot build the connection (DW5823e)
2001618 BPF_[AND|OR|XOR|FETCH|XCHG|CMPXCHG] in net:test_bpf.sh from ubuntu_kernel_selftests failed on K-5.19 P9
1999528 [DEP-8] Run ADT regression suite for lowlatency kernels Jammy and later
1999828 Kinetic update: upstream stable patchset 2022-12-15
1999079 Kinetic update: upstream stable patchset 2022-12-07
1996112 Virtual GPU driver packaging regression
1998398 Kinetic update: upstream stable patchset 2022-11-30
1994068 Kinetic update: v5.19.9 upstream stable release
1994078 Kinetic update: v5.19.15 upstream stable release
1994179 Kinetic update: v5.19.17 upstream stable release
1989334 remove circular dep between linux-image and modules
1999094 mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux 5.19.0-27.28
1996892 Expose built-in trusted and revoked certificates
1993563 support for same series backports versioning numbers
1990700 Fibocom WWAN FM350-GL suspend error (notebook not suspend)
1995573 Screen cannot turn on after screen off with Matrox G200eW3 [102b:0536]
1993715 AMD Cezanne takes 5 minutes to wake up from suspend
1996071 [UBUNTU 20.04] boot: Add s390x secure boot trailer
1996198 Fix rfkill causing soft blocked wifi
1993148 Support Icicle Kit reference design v2022.10
1993120 armhf kernel compiled with gcc-12 fails to boot on pi 3/2
1994164 Kinetic update: v5.19.16 upstream stable release
1994076 Kinetic update: v5.19.14 upstream stable release
1994075 Kinetic update: v5.19.13 upstream stable release
1994074 Kinetic update: v5.19.12 upstream stable release
1994070 Kinetic update: v5.19.11 upstream stable release
1994069 Kinetic update: v5.19.10 upstream stable release
1994061 Kinetic update: v5.19.8 upstream stable release
1993315 md: Replace snprintf with scnprintf
1990985 ACPI: processor idle: Practically limit \
1983656 iavf: SR-IOV VFs error with no traffic flow when MTU greater than 1500
1990920 Fix resume on AMD platforms when TBT monitor is plugged
1978986 [SRU][OEM-5.14/OEM-5.17][PATCH 0/1] Fix oled brightness set above frame-average luminance on AMD
1988711 Update Broadcom Emulex FC HBA lpfc driver to 14.2.0.5 for Ubuntu 22.04
1992266 input/keyboard: the keyboard on some Asus laptops can't work
1953613 GPIO character device v1 API not enabled in kernel
1972802 enable config for fixing 5.17 kernel won't load mok
1981437 RISC-V kernel config is out of sync with other archs
1965241 Ubuntu 22.04 and 20.04 DPC Fixes for Failure Cases of DownPort Containment events
1956086 config CONFIG_HISI_PMU for kunpeng920
1980484 temporarily disable CONFIG_X86_KERNEL_IBT
1980061 RISC-V enables CONFIG_COMPAT in the unstable branch
1979647 No RISC-V configuration in the unstable tree
1642368 linux: Staging modules should be unsigned
1974442 enable CONFIG_DEVTMPFS_SAFE
1973620 prevent kernel panic with overlayfs + shiftfs
1857257 linux-image-5.0.0-35-generic breaks checkpointing of container
1967924 re-apply missing overlayfs SAUCE patch
1967702 Enable speakup kernel modules to allow the speakup screen reader to function
1971699 disable Intel DMA remapping by default
1965766 zfcpdump-kernel update to v5.15
1958004 intel_iommu breaks Intel IPU6 camera: isys port open ready failed -16
1968986 Jammy update: v5.17.3 upstream stable release
1968984 Jammy update: v5.17.2 upstream stable release Edit
1968982 Jammy update: v5.17.1 upstream stable release
1956780 5.15 stuck at boot on c4.large
1933179 [22.04 FEAT] KVM: Enable storage key checking for intercepted instruction handled by userspace
1960516 Jammy update: v5.15.22 upstream stable release
1960509 Jammy update: v5.15.20 upstream stable release
1959879 Jammy update: v5.15.19 upstream stable release
1959376 Jammy update: v5.15.17 upstream stable release
1958418 Jammy update: v5.15.15 upstream stable release
1953008 Support USB4 DP alt mode for AMD Yellow Carp graphics card
1951563 alsa/sdw: add sdw audio machine driver for several ADL machines
1941893 Improve performance and idle power consumption
1956443 Fix spurious wakeup caused by Intel 7560 WWAN
1956926 Jammy update: v5.15.13 upstream stable release
CVE-2023-0469 A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup
CVE-2023-0266 A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be u
CVE-2022-4382 A use-after-free flaw caused by a race among the superblock operations in the gadgetfs Linux driver was found. It could be triggered by yanking out a
CVE-2022-2196 A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 du
CVE-2023-23559 In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.
CVE-2023-0461 RESERVED
CVE-2023-0179 netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits
CVE-2022-20369 In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation
CVE-2022-47520 An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000
CVE-2022-3545 A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file
CVE-2022-3643 Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux bas
CVE-2022-45934 An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_R
CVE-2022-4378 A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem ...
CVE-2022-42896 There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which ma
CVE-2022-3566 A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the compo
CVE-2022-3567 A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_op
CVE-2022-3621 A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/
CVE-2022-3565 A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drive
CVE-2022-3594 A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the f
CVE-2022-3564 A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net
CVE-2022-3524 A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of
CVE-2022-43945 The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by e
CVE-2022-2602 io_uring/af_unix: defer registered files gc to io_uring release
CVE-2022-41674 An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_i
CVE-2022-42722 In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer
CVE-2022-42721 A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (a
CVE-2022-42720 Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local
CVE-2022-42719 A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by atta
CVE-2022-25636 net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 a ...



About   -   Send Feedback to @ubuntu_updates