Package "linux-oem-5.6"
Name: |
linux-oem-5.6
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Linux kernel buildinfo for version 5.6.0 on 64 bit x86 SMP
- Linux kernel headers for version 5.6.0 on 64 bit x86 SMP
- Linux kernel image for version 5.6.0 on 64 bit x86 SMP
- Linux kernel extra modules for version 5.6.0 on 64 bit x86 SMP
|
Latest version: |
5.6.0-1057.61 |
Release: |
focal (20.04) |
Level: |
base |
Repository: |
main |
Links
Other versions of "linux-oem-5.6" in Focal
Packages in group
Deleted packages are displayed in grey.
Changelog
linux-oem-5.6 (5.6.0-1057.61) focal; urgency=medium
.
* focal/linux-oem-5.6: 5.6.0-1057.61 -proposed tracker (LP: #1927621)
.
* xfrm_policy.sh / pmtu.sh / udpgso_bench.sh from net in
ubuntu_kernel_selftests will fail if running the whole suite (LP: #1856010)
- selftests/net: bump timeout to 5 minutes
|
Source diff to previous version |
1856010 |
xfrm_policy.sh / pmtu.sh / udpgso_bench.sh from net in ubuntu_kernel_selftests will fail if running the whole suite |
|
linux-oem-5.6 (5.6.0-1056.60) focal; urgency=medium
.
* focal/linux-oem-5.6: 5.6.0-1056.60 -proposed tracker (LP: #1923783)
.
* CVE-2021-29646
- tipc: better validate user input in tipc_nl_retrieve_key()
.
* CVE-2021-28375
- misc: fastrpc: restrict user apps from sending kernel RPC messages
.
* CVE-2020-35519
- net/x25: prevent a couple of overflows
.
* CVE-2021-30002
- media: v4l: ioctl: Fix memory leak in video_usercopy
.
* SND_PCI_QUIRK for Clevo NH55RZQ and Intel NUC10 (LP: #1922759)
- ALSA: hda/realtek: Add quirk for Intel NUC 10
- ALSA: hda/realtek: Add quirk for Clevo NH55RZQ
.
* CVE-2021-29650
- netfilter: x_tables: Use correct memory barriers.
.
* Fix implicit declaration warnings for kselftests/memfd test on newer
releases (LP: #1910323)
- selftests/memfd: Fix implicit declaration warnings
|
Source diff to previous version |
1922759 |
SND_PCI_QUIRK for Clevo NH55RZQ and Intel NUC10 |
1910323 |
Fix implicit declaration warnings for kselftests/memfd test on newer releases |
CVE-2021-29646 |
An issue was discovered in the Linux kernel before 5.11.11. tipc_nl_retrieve_key in net/tipc/node.c does not properly validate certain data sizes, ak |
CVE-2021-28375 |
An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from |
CVE-2021-30002 |
An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a m |
CVE-2021-29650 |
An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net |
|
linux-oem-5.6 (5.6.0-1055.59) focal; urgency=medium
.
* focal/linux-oem-5.6: 5.6.0-1055.59 -proposed tracker (LP: #1924646)
.
* setting extended attribute may cause memory leak (LP: #1924611)
- SAUCE: vfs_setxattr: free converted value if xattr_permission returns error
|
Source diff to previous version |
linux-oem-5.6 (5.6.0-1053.57) focal; urgency=medium
.
* focal/linux-oem-5.6: 5.6.0-1053.57 -proposed tracker (LP: #1921042)
.
* Packaging resync (LP: #1786013)
- update dkms package versions
.
* LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key
(LP: #1918134)
- [Packaging] sync dkms-build et al from LRMv4
.
* CVE-2021-29154
- SAUCE: bpf, x86: Validate computation of branch displacements for x86-64
- SAUCE: bpf, x86: Validate computation of branch displacements for x86-32
.
* xfrm_policy.sh in net from ubuntu_kernel_selftests passed with failed sub-
cases (LP: #1909647)
- selftests: xfrm: fix test return value override issue in xfrm_policy.sh
.
* ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255
on F-oem-5.6 (LP: #1919147)
- selftests: net: ip_defrag: modprobe missing nf_defrag_ipv6 support
.
* l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
"unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on
F-OEM-5.6 (LP: #1919277)
- l2tp: remove skb_dst_set() from l2tp_xmit_skb()
.
* CVE-2020-0466
- epoll: Keep a reference on files added to the check list
- do_epoll_ctl(): clean the failure exits up a bit
- fix regression in "epoll: Keep a reference on files added to the check list"
.
* CVE-2021-3178
- nfsd4: readdirplus shouldn't return parent of export
.
* CVE-2020-25285
- mm/hugetlb: fix a race between hugetlb sysctl handlers
.
* CVE-020-10781
- Revert "zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()"
.
* CVE-2020-14351
- perf/core: Fix race in the perf_mmap_close() function
.
* CVE-2020-25669
- Input: sunkbd - avoid use-after-free in teardown paths
.
* CVE-2020-14390
- fbcon: remove soft scrollback code
.
* CVE-2021-3411
- x86/kprobes: Fix optprobe to detect INT3 padding correctly
.
* CVE-2020-0423
- binder: fix UAF when releasing todo list
.
* CVE-2020-27830
- speakup: Reject setting the speakup line discipline outside of speakup
.
* CVE-2020-0465
- HID: core: Correctly handle ReportSize being zero
- HID: core: Sanitize event code and type when mapping input
.
* CVE-2020-25645
- geneve: add transport ports in route lookup for geneve
.
* CVE-2021-20194
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou
- bpf, cgroup: Fix problematic bounds check
.
* CVE-2020-36158
- mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start
|
Source diff to previous version |
1786013 |
Packaging resync |
1918134 |
LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key |
1919147 |
ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255 on F-oem-5.6 |
1919277 |
l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with \ |
CVE-2021-29154 |
BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect c ... |
CVE-2020-0466 |
In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation o |
CVE-2021-3178 |
** DISPUTED ** fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote att |
CVE-2020-25285 |
A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, |
CVE-2020-14351 |
perf: Fix race in perf_mmap_close function |
CVE-2020-14390 |
A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory |
CVE-2021-3411 |
A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linki |
CVE-2020-0423 |
In binder_release_work of binder.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in t |
CVE-2020-27830 |
Linux kernel NULL-ptr deref bug in spk_ttyio_receive_buf2 |
CVE-2020-0465 |
In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of |
CVE-2020-25645 |
A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to |
CVE-2021-20194 |
heap overflow in __cgroup_bpf_run_filter_getsockopt() |
CVE-2020-36158 |
mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to exe |
|
linux-oem-5.6 (5.6.0-1050.54) focal; urgency=medium
.
* focal/linux-oem-5.6: 5.6.0-1050.54 -proposed tracker (LP: #1918665)
.
* Please trust Canonical Livepatch Service kmod signing key (LP: #1898716)
- [Config] enable CONFIG_MODVERSIONS=y
- [Packaging] build canonical-certs.pem from branch/arch certs
- [Config] add Canonical Livepatch Service key to SYSTEM_TRUSTED_KEYS
- [Config] add ubuntu-drivers key to SYSTEM_TRUSTED_KEYS
- [Config] Allow ASM_MODVERSIONS and MODULE_REL_CRCS
|
1898716 |
Please trust Canonical Livepatch Service kmod signing key |
|
About
-
Send Feedback to @ubuntu_updates