UbuntuUpdates.org

Package "linux-headers-6.8.0-51"

Name: linux-headers-6.8.0-51

Description:

Header files related to Linux kernel version 6.8.0

Latest version: 6.8.0-51.52
Release: noble (24.04)
Level: updates
Repository: main
Head package: linux

Links


Download "linux-headers-6.8.0-51"


Other versions of "linux-headers-6.8.0-51" in Noble

Repository Area Version
security main 6.8.0-51.52

Changelog

Version: 6.8.0-45.45 2024-09-16 23:07:28 UTC

  linux (6.8.0-45.45) noble; urgency=medium

  * noble/linux: 6.8.0-45.45 -proposed tracker (LP: #2078100)

  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/s2024.08.05)

  * Noble update: upstream stable patchset 2024-08-09 (LP: #2076435) //
    CVE-2024-41009
    - bpf: Fix overrunning reservations in ringbuf

  * CVE-2024-42160
    - f2fs: check validation of fault attrs in f2fs_build_fault_attr()
    - f2fs: Add inline to f2fs_build_fault_attr() stub

  * Noble update: upstream stable patchset 2024-08-22 (LP: #2077600) //
    CVE-2024-42224
    - net: dsa: mv88e6xxx: Correct check for empty list

  * Noble update: upstream stable patchset 2024-08-22 (LP: #2077600) //
    CVE-2024-42154
    - tcp_metrics: validate source addr length

  * CVE-2024-42228
    - drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc

  * CVE-2024-42159
    - scsi: mpi3mr: Sanitise num_phys

 -- Manuel Diewald <email address hidden> Fri, 30 Aug 2024 10:32:37 +0200

Source diff to previous version
1786013 Packaging resync
2076435 Noble update: upstream stable patchset 2024-08-09
2077600 Noble update: upstream stable patchset 2024-08-22
CVE-2024-41009 In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overrunning reservations in ringbuf The BPF ring buffer internally is
CVE-2024-42160 In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to
CVE-2024-42224 In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Correct check for empty list Since commit a3c53be55c95 ("n
CVE-2024-42154 In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don't see anything checking that TCP
CVE-2024-42228 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc In
CVE-2024-42159 In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Sanitise num_phys Information is stored in mr_sas_port->phy_mask,

Version: 6.8.0-44.44 2024-09-10 13:07:13 UTC

  linux (6.8.0-44.44) noble; urgency=medium

  * noble/linux: 6.8.0-44.44 -proposed tracker (LP: #2076647)

  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/2024.08.05)

  * Disable PCI_DYNAMIC_OF_NODES in Ubuntu (LP: #2074376)
    - [Config] Disable PCI_DYNAMIC_OF_NODES

  * [SRU] Turbostat support for Arrow Lake H (LP: #2074372)
    - tools/power turbostat: Enhance ARL/LNL support
    - x86/cpu: Add model number for another Intel Arrow Lake mobile processor
    - tools/power turbostat: Add ARL-H support

  * Noble update: upstream stable patchset 2024-07-30 (LP: #2075154)
    - fs/writeback: bail out if there is no more inodes for IO and queued once
    - padata: Disable BH when taking works lock on MT path
    - crypto: hisilicon/sec - Fix memory leak for sec resource release
    - crypto: hisilicon/qm - Add the err memory release process to qm uninit
    - io_uring/sqpoll: work around a potential audit memory leak
    - rcutorture: Fix rcu_torture_one_read() pipe_count overflow comment
    - rcutorture: Make stall-tasks directly exit when rcutorture tests end
    - rcutorture: Fix invalid context warning when enable srcu barrier testing
    - block/ioctl: prefer different overflow check
    - ssb: Fix potential NULL pointer dereference in ssb_device_uevent()
    - selftests/bpf: Prevent client connect before server bind in
      test_tc_tunnel.sh
    - selftests/bpf: Fix flaky test btf_map_in_map/lookup_update
    - batman-adv: bypass empty buckets in batadv_purge_orig_ref()
    - wifi: ath9k: work around memset overflow warning
    - af_packet: avoid a false positive warning in packet_setsockopt()
    - ACPI: x86: Add PNP_UART1_SKIP quirk for Lenovo Blade2 tablets
    - drop_monitor: replace spin_lock by raw_spin_lock
    - scsi: qedi: Fix crash while reading debugfs attribute
    - net: sfp: add quirk for ATS SFP-GE-T 1000Base-TX module
    - net/sched: fix false lockdep warning on qdisc root lock
    - kselftest: arm64: Add a null pointer check
    - net: dsa: realtek: keep default LED state in rtl8366rb
    - netpoll: Fix race condition in netpoll_owner_active
    - wifi: mt76: mt7921s: fix potential hung tasks during chip recovery
    - HID: Add quirk for Logitech Casa touchpad
    - HID: asus: fix more n-key report descriptors if n-key quirked
    - ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7
    - Bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl
    - drm/amd/display: Exit idle optimizations before HDCP execution
    - platform/x86: toshiba_acpi: Add quirk for buttons on Z830
    - ASoC: Intel: sof_sdw: add JD2 quirk for HP Omen 14
    - ASoC: Intel: sof_sdw: add quirk for Dell SKU 0C0F
    - drm/lima: add mask irq callback to gp and pp
    - drm/lima: mask irqs in timeout path before hard reset
    - ALSA: hda/realtek: Add quirks for Lenovo 13X
    - powerpc/pseries: Enforce hcall result buffer validity and size
    - media: intel/ipu6: Fix build with !ACPI
    - media: mtk-vcodec: potential null pointer deference in SCP
    - powerpc/io: Avoid clang null pointer arithmetic warnings
    - platform/x86: p2sb: Don't init until unassigned resources have been assigned
    - power: supply: cros_usbpd: provide ID table for avoiding fallback match
    - iommu/arm-smmu-v3: Free MSIs in case of ENOMEM
    - ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
    - kprobe/ftrace: bail out if ftrace was killed
    - usb: gadget: uvc: configfs: ensure guid to be valid before set
    - f2fs: remove clear SB_INLINECRYPT flag in default_options
    - usb: misc: uss720: check for incompatible versions of the Belkin F5U002
    - Avoid hw_desc array overrun in dw-axi-dmac
    - usb: dwc3: pci: Don't set "linux,phy_charger_detect" property on Lenovo Yoga
      Tab2 1380
    - usb: typec: ucsi_glink: drop special handling for CCI_BUSY
    - udf: udftime: prevent overflow in udf_disk_stamp_to_time()
    - PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports
    - f2fs: don't set RO when shutting down f2fs
    - MIPS: Octeon: Add PCIe link status check
    - serial: imx: Introduce timeout when waiting on transmitter empty
    - serial: exar: adding missing CTI and Exar PCI ids
    - usb: gadget: function: Remove usage of the deprecated ida_simple_xx() API
    - tty: add the option to have a tty reject a new ldisc
    - vfio/pci: Collect hot-reset devices to local buffer
    - cpufreq: amd-pstate: fix memory leak on CPU EPP exit
    - ACPI: EC: Install address space handler at the namespace root
    - PCI: Do not wait for disconnected devices when resuming
    - ALSA: hda: cs35l41: Possible null pointer dereference in
      cs35l41_hda_unbind()
    - ALSA: seq: ump: Fix missing System Reset message handling
    - MIPS: Routerboard 532: Fix vendor retry check code
    - mips: bmips: BCM6358: make sure CBR is correctly set
    - tracing: Build event generation tests only as modules
    - ALSA: hda/realtek: Remove Framework Laptop 16 from quirks
    - ALSA/hda: intel-dsp-config: Document AVS as dsp_driver option
    - ice: avoid IRQ collision to fix init failure on ACPI S3 resume
    - btrfs: zoned: allocate dummy checksums for zoned NODATASUM writes
    - net: mvpp2: use slab_build_skb for oversized frames
    - cipso: fix total option length computation
    - ALSA: hda: cs35l56: Component should be unbound before deconstruction
    - ALSA: hda: tas2781: Component should be unbound before deconstruction
    - bpf: Avoid splat in pskb_pull_reason
    - ALSA: hda/realtek: Enable headset mic on IdeaPad 330-17IKB 81DM
    - netrom: Fix a memory leak in nr_heartbeat_expiry()
    - ipv6: prevent possible NULL deref in fib6_nh_init()
    - ipv6: prevent possible NULL dereference in rt6_probe()
    - xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
    - netns: Make get_net_ns() handle zero refcount net
    - qca_spi: Make interrupt remembering atomic
 

Source diff to previous version
1786013 Packaging resync
2074376 Disable PCI_DYNAMIC_OF_NODES in Ubuntu
2074372 [SRU] Turbostat support for Arrow Lake H
2075154 Noble update: upstream stable patchset 2024-07-30
2073961 [SRU] Add Dynamic Tuning Technology (DTT) support for Lunar Lake
2073358 Kubuntu 24.04 freezes after plugging in ethernet cable
2074091 Noble update: upstream stable patchset 2024-07-25
2073926 [SRU] Add support for intel trace hub for last platforms
2072858 Fix L2CAP/LE/CPU/BI-02-C bluetooth certification failure
2073788 Noble update: upstream stable patchset 2024-07-22
2073603 Noble update: upstream stable patchset 2024-07-19
2076650 Reenable CONFIG_UBSAN for noble
2072592 Dangling symlink to linux-lib-rust when Rust is disabled
2033007 kdump doesn't work with UEFI secure boot and kernel lockdown enabled on ARM64
2073092 net/sched: Fix conntrack use-after-free
2073049 No sound on Huawei Matebook D14 AMD since Linux 6.8.0-38 [regression]
2072755 i915: Fixup regressions introduced with enabling single CCS engine
2070358 [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash
2072428 6.8 generic \u0026 amdpgu / polaris
2075110 md: nvme over tcp with a striped underlying md raid device leads to data corruption
2069534 Linux 6.8 fails to boot on ARM64 if any param is more than 146 chars
CVE-2024-39484 In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit f
CVE-2024-39292 In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winc

Version: 6.8.0-41.41 2024-08-21 02:07:43 UTC

  linux (6.8.0-41.41) noble; urgency=medium

  * noble/linux: 6.8.0-41.41 -proposed tracker (LP: #2075611)

  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/s2024.07.08)

  * md: nvme over tcp with a striped underlying md raid device leads to data
    corruption (LP: #2075110)
    - md/md-bitmap: fix writing non bitmap pages

  * Linux 6.8 fails to boot on ARM64 if any param is more than 146 chars
    (LP: #2069534)
    - SAUCE: arm64: v6.8: cmdline param >= 146 chars kills kernel

  * CVE-2024-39484
    - mmc: davinci: Don't strip remove function when driver is builtin

  * CVE-2024-39292
    - um: Add winch to winch_handlers before registering winch IRQ

 -- Manuel Diewald <email address hidden> Fri, 02 Aug 2024 16:15:19 +0200

Source diff to previous version
1786013 Packaging resync
2075110 md: nvme over tcp with a striped underlying md raid device leads to data corruption
2069534 Linux 6.8 fails to boot on ARM64 if any param is more than 146 chars
CVE-2024-39484 In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit f
CVE-2024-39292 In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winc

Version: 6.8.0-40.40 2024-08-08 12:07:34 UTC

  linux (6.8.0-40.40) noble; urgency=medium

  * noble/linux: 6.8.0-40.40 -proposed tracker (LP: #2072201)

  * FPS of glxgear with fullscreen is too low on MTL platform (LP: #2069380)
    - drm/i915: Bypass LMEMBAR/GTTMMADR for MTL stolen memory access

  * a critical typo in the code managing the ASPM settings for PCI Express
    devices (LP: #2071889)
    - PCI/ASPM: Restore parent state to parent, child state to child

  * [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
    throughput degradation for PCI-related network workloads (LP: #2071471)
    - [Config] Set IOMMU_DEFAULT_DMA_STRICT=n and IOMMU_DEFAULT_DMA_LAZY=yes for
      s390x

  * UBSAN: array-index-out-of-bounds in
    /build/linux-D15vQj/linux-6.5.0/drivers/md/bcache/bset.c:1098:3
    (LP: #2039368)
    - bcache: fix variable length array abuse in btree_iter

  * Mute/mic LEDs and speaker no function on EliteBook 645/665 G11
    (LP: #2071296)
    - ALSA: hda/realtek: fix mute/micmute LEDs don't work for EliteBook 645/665
      G11.

  * failed to enable IPU6 camera sensor on kernel >= 6.8: ivsc_ace
    intel_vsc-5db76cf6-0a68-4ed6-9b78-0361635e2447: switch camera to host
    failed: -110 (LP: #2067364)
    - mei: vsc: Don't stop/restart mei device during system suspend/resume
    - SAUCE: media: ivsc: csi: don't count privacy on as error
    - SAUCE: media: ivsc: csi: add separate lock for v4l2 control handler
    - SAUCE: media: ivsc: csi: remove privacy status in struct mei_csi
    - SAUCE: mei: vsc: Enhance IVSC chipset stability during warm reboot
    - SAUCE: mei: vsc: Enhance SPI transfer of IVSC rom
    - SAUCE: mei: vsc: Utilize the appropriate byte order swap function
    - SAUCE: mei: vsc: Prevent timeout error with added delay post-firmware
      download

  * failed to probe camera sensor on Dell XPS 9315: ov01a10 i2c-OVTI01A0:00:
    failed to check hwcfg: -22 (LP: #2070251)
    - ACPI: utils: Make acpi_handle_path() not static
    - ACPI: property: Ignore bad graph port nodes on Dell XPS 9315
    - ACPI: property: Polish ignoring bad data nodes
    - ACPI: scan: Ignore camera graph port nodes on all Dell Tiger, Alder and
      Raptor Lake models

  * Update amd_sfh for AMD strix series (LP: #2058331)
    - HID: amd_sfh: Increase sensor command timeout
    - HID: amd_sfh: Improve boot time when SFH is available
    - HID: amd_sfh: Extend MP2 register access to SFH
    - HID: amd_sfh: Set the AMD SFH driver to depend on x86

  * RFIM and SAGV Linux Support for G10 models (LP: #2070158)
    - drm/i915/display: Add meaningful traces for QGV point info error handling
    - drm/i915/display: Extract code required to calculate max qgv/psf gv point
    - drm/i915/display: extract code to prepare qgv points mask
    - drm/i915/display: Disable SAGV on bw init, to force QGV point recalculation
    - drm/i915/display: handle systems with duplicate psf gv points
    - drm/i915/display: force qgv check after the hw state readout

  * Update amd-pmf for AMD strix series (LP: #2058330)
    - platform/x86/amd/pmf: Differentiate PMF ACPI versions
    - platform/x86/amd/pmf: Disable debugfs support for querying power thermals
    - platform/x86/amd/pmf: Add support to get sbios requests in PMF driver
    - platform/x86/amd/pmf: Add support to notify sbios heart beat event
    - platform/x86/amd/pmf: Add support to get APTS index numbers for static
      slider
    - platform/x86/amd/pmf: Add support to get sps default APTS index values
    - platform/x86/amd/pmf: Update sps power thermals according to the platform-
      profiles

  * noble:linux: ADT ubuntu-regression-suite misses fakeroot dependency
    (LP: #2070042)
    - [DEP-8] Add missing fakeroot dependency

  * Noble update: v6.8.12 upstream stable release (LP: #2071621)
    - sunrpc: use the struct net as the svc proc private
    - x86/tsc: Trust initial offset in architectural TSC-adjust MSRs
    - selftests/ftrace: Fix BTFARG testcase to check fprobe is enabled correctly
    - ftrace: Fix possible use-after-free issue in ftrace_location()
    - Revert "arm64: fpsimd: Implement lazy restore for kernel mode FPSIMD"
    - arm64/fpsimd: Avoid erroneous elide of user state reload
    - Reapply "arm64: fpsimd: Implement lazy restore for kernel mode FPSIMD"
    - tty: n_gsm: fix missing receive state reset after mode switch
    - speakup: Fix sizeof() vs ARRAY_SIZE() bug
    - serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler
    - serial: 8250_bcm7271: use default_mux_rate if possible
    - serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup
    - Input: try trimming too long modalias strings
    - io_uring: fail NOP if non-zero op flags is passed in
    - Revert "r8169: don't try to disable interrupts if NAPI is, scheduled
      already"
    - r8169: Fix possible ring buffer corruption on fragmented Tx packets.
    - ring-buffer: Fix a race between readers and resize checks
    - net: mana: Fix the extra HZ in mana_hwc_send_request
    - tools/latency-collector: Fix -Wformat-security compile warns
    - tools/nolibc/stdlib: fix memory error in realloc()
    - net: ti: icssg_prueth: Fix NULL pointer dereference in prueth_probe()
    - net: lan966x: remove debugfs directory in probe() error path
    - net: smc91x: Fix m68k kernel compilation for ColdFire CPU
    - nilfs2: fix use-after-free of timer for log writer thread
    - nilfs2: fix unexpected freezing of nilfs_segctor_sync()
    - nilfs2: fix potential hang in nilfs_detach_log_writer()
    - fs/ntfs3: Remove max link count info display during driver init
    - fs/ntfs3: Taking DOS names into account during link counting
    - fs/ntfs3: Fix case when index is reused during tree transformation
    - fs/ntfs3: Break dir enumeration if directory contents error
    - ksmbd: avoid to send duplicate oplock break notifications
    - ksmbd: ignore trailing slashes in share paths
    - ALSA: core: Fix NULL module pointer assignment at card init
    - ALSA: Fix deadloc

Source diff to previous version
2069380 FPS of glxgear with fullscreen is too low on MTL platform
2071889 a critical typo in the code managing the ASPM settings for PCI Express devices
2071471 [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
2039368 UBSAN: array-index-out-of-bounds in /build/linux-D15vQj/linux-6.5.0/drivers/md/bcache/bset.c:1098:3
2071296 Mute/mic LEDs and speaker no function on EliteBook 645/665 G11
2058331 Update amd_sfh for AMD strix series
2070158 RFIM and SAGV Linux Support for G10 models
2058330 Update amd-pmf for AMD strix series
2070042 noble:linux: ADT ubuntu-regression-suite misses fakeroot dependency
2071621 Noble update: v6.8.12 upstream stable release
2070355 Noble update: v6.8.11 upstream stable release
2070349 Noble update: v6.8.10 upstream stable release
2070337 Noble update: v6.8.9 upstream stable release
2066233 amdgpu hangs on DCN 3.5 at bootup: RIP: 0010:dcn35_clk_mgr_construct+0x183/0x2210 [amdgpu]
2069231 [MTL] ACPI: PM: s2idle: Backport Linux ACPI s2idle patches to fix suspend/resume issue
2067862 Removing legacy virtio-pci devices causes kernel panic
2069664 Mute/mic LEDs no function on ProBook 445/465 G11
2067669 Mute/mic LEDs no function on ProBook 440/460 G11
2065128 rtw89_8852ce - Lost WIFI connection after suspend
CVE-2024-25742 In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This
CVE-2024-35984 In the Linux kernel, the following vulnerability has been resolved: i2c: smbus: fix NULL function pointer dereference Baruch reported an OOPS when
CVE-2024-35990 In the Linux kernel, the following vulnerability has been resolved: dma: xilinx_dpdma: Fix locking There are several places where either chan->lock
CVE-2024-35997 In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up The flag I2C_
CVE-2024-36016 In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following
CVE-2024-36008 In the Linux kernel, the following vulnerability has been resolved: ipv4: check for NULL idev in ip_route_use_hint() syzbot was able to trigger a N
CVE-2024-35992 In the Linux kernel, the following vulnerability has been resolved: phy: marvell: a3700-comphy: Fix out of bounds read There is an out of bounds re

Version: 6.8.0-39.39 2024-07-25 00:07:42 UTC

  linux (6.8.0-39.39) noble; urgency=medium

  * noble/linux: 6.8.0-39.39 -proposed tracker (LP: #2071983)

  * CVE-2024-25742
    - x86/sev: Harden #VC instruction emulation somewhat
    - x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler

  * Noble update: v6.8.9 upstream stable release (LP: #2070337) //
    CVE-2024-35984
    - i2c: smbus: fix NULL function pointer dereference

  * Noble update: v6.8.9 upstream stable release (LP: #2070337) //
    CVE-2024-35990
    - dma: xilinx_dpdma: Fix locking

  * Noble update: v6.8.9 upstream stable release (LP: #2070337) //
    CVE-2024-35997
    - HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up

  * CVE-2024-36016
    - tty: n_gsm: fix possible out-of-bounds in gsm0_receive()

  * CVE-2024-36008
    - ipv4: check for NULL idev in ip_route_use_hint()

  * CVE-2024-35992
    - phy: marvell: a3700-comphy: Fix out of bounds read

 -- Manuel Diewald <email address hidden> Fri, 05 Jul 2024 17:04:37 +0200

2070337 Noble update: v6.8.9 upstream stable release
CVE-2024-25742 In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This
CVE-2024-35984 In the Linux kernel, the following vulnerability has been resolved: i2c: smbus: fix NULL function pointer dereference Baruch reported an OOPS when
CVE-2024-35990 In the Linux kernel, the following vulnerability has been resolved: dma: xilinx_dpdma: Fix locking There are several places where either chan->lock
CVE-2024-35997 In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up The flag I2C_
CVE-2024-36016 In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following
CVE-2024-36008 In the Linux kernel, the following vulnerability has been resolved: ipv4: check for NULL idev in ip_route_use_hint() syzbot was able to trigger a N
CVE-2024-35992 In the Linux kernel, the following vulnerability has been resolved: phy: marvell: a3700-comphy: Fix out of bounds read There is an out of bounds re



About   -   Send Feedback to @ubuntu_updates