UbuntuUpdates.org

Package "linux-azure-5.4"

This package belongs to a PPA: Canonical Kernel Team




Name: linux-azure-5.4

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: bionic (18.04)
Level: base
Repository: main

Links



Other versions of "linux-azure-5.4" in Bionic

Repository Area Version
security main 5.4.0-1109.115~18.04.1
updates main 5.4.0-1109.115~18.04.1
proposed main 5.4.0-1110.116~18.04.1

Changelog

Version: 5.4.0-1095.101~18.04.1 2022-10-26 22:09:15 UTC

 linux-azure-5.4 (5.4.0-1095.101~18.04.1) bionic; urgency=medium
 .
   * bionic/linux-azure-5.4: 5.4.0-1095.101~18.04.1 -proposed tracker
     (LP: #1992036)
 .
   [ Ubuntu: 5.4.0-1095.101 ]
 .
   * focal/linux-azure: 5.4.0-1095.101 -proposed tracker (LP: #1992037)
   * ubuntu_bpf failed to build on F-azure-5.4 / B-azure-5.4 ( error:
     ‘bpf_object_open_opts’ undeclared) (LP: #1990794)
     - Revert "bpf, testing: Add selftest to read/write sockaddr from user space"
   * CVE-2022-42719
     - mac80211: mlme: find auth challenge directly
     - wifi: mac80211: don't parse mbssid in assoc response
     - wifi: mac80211: fix MBSSID parsing use-after-free
   * iavf: SR-IOV VFs error with no traffic flow when MTU greater than 1500
     (LP: #1983656)
     - iavf: Fix set max MTU size with port VLAN and jumbo frames
     - i40e: Fix VF set max MTU size
   * fib_nexthop_nongw.sh from ubuntu_kernel_selftests failed on B-5.4
     (LP: #1990800)
     - SAUCE: selftests/net: skipping tests for older ip command releases
   * CVE-2022-29901
     - Revert "x86/speculation: Add RSB VM Exit protections"
     - Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
     - x86/devicetable: Move x86 specific macro out of generic code
     - x86/cpu: Add consistent CPU match macros
     - x86/cpu: Add a steppings field to struct x86_cpu_id
     - x86/kvm/vmx: Make noinstr clean
     - x86/cpufeatures: Move RETPOLINE flags to word 11
     - x86/bugs: Report AMD retbleed vulnerability
     - x86/bugs: Add AMD retbleed= boot parameter
     - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
     - x86/entry: Remove skip_r11rcx
     - x86/entry: Add kernel IBRS implementation
     - x86/bugs: Optimize SPEC_CTRL MSR writes
     - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
     - x86/bugs: Split spectre_v2_select_mitigation() and
       spectre_v2_user_select_mitigation()
     - x86/bugs: Report Intel retbleed vulnerability
     - intel_idle: Disable IBRS during long idle
     - x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
     - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
     - x86/speculation: Fix firmware entry SPEC_CTRL handling
     - x86/speculation: Fix SPEC_CTRL write on SMT state change
     - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
     - x86/speculation: Remove x86_spec_ctrl_mask
     - KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S
     - KVM/nVMX: Use __vmx_vcpu_run in nested_vmx_check_vmentry_hw
     - KVM: VMX: Flatten __vmx_vcpu_run()
     - KVM: VMX: Convert launched argument to flags
     - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
     - KVM: VMX: Fix IBRS handling after vmexit
     - x86/speculation: Fill RSB on vmexit for IBRS
     - x86/common: Stamp out the stepping madness
     - x86/cpu/amd: Enumerate BTC_NO
     - x86/bugs: Add Cannon lake to RETBleed affected CPU list
     - x86/speculation: Disable RRSBA behavior
     - x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
     - x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
     - x86/speculation: Add RSB VM Exit protections
   * ACPI: processor idle: Practically limit "Dummy wait" workaround to old Intel
     systems (LP: #1990985)
     - ACPI: processor_idle: Skip dummy wait if kernel is in guest
     - ACPI: processor idle: Practically limit "Dummy wait" workaround to old Intel
       systems
   * cgroup: all controllers mounted when using 'cgroup_no_v1=' (LP: #1988584)
     - cgroup-v1: add disabled controller check in cgroup1_parse_param()
   * Focal update: v5.4.212 upstream stable release (LP: #1991156)
     - audit: fix potential double free on error path from fsnotify_add_inode_mark
     - parisc: Fix exception handler for fldw and fstw instructions
     - kernel/sys_ni: add compat entry for fadvise64_64
     - usb: cdns3: Fix issue for clear halt endpoint
     - pinctrl: amd: Don't save/restore interrupt status and wake status bits
     - sched/deadline: Unthrottle PI boosted threads while enqueuing
     - sched/deadline: Fix stale throttling on de-/boosted tasks
     - sched/deadline: Fix priority inheritance with multiple scheduling classes
     - kernel/sched: Remove dl_boosted flag comment
     - xfrm: fix refcount leak in __xfrm_policy_check()
     - SUNRPC: RPC level errors should set task->tk_rpc_status
     - rose: check NULL rose_loopback_neigh->loopback
     - net/mlx5e: Properly disable vlan strip on non-UL reps
     - net: moxa: get rid of asymmetry in DMA mapping/unmapping
     - bonding: 802.3ad: fix no transmission of LACPDUs
     - net: ipvtap - add __init/__exit annotations to module init/exit funcs
     - netfilter: ebtables: reject blobs that don't provide all entry points
     - bnxt_en: fix NQ resource accounting during vf creation on 57500 chips
     - netfilter: nft_payload: report ERANGE for too long offset and length
     - netfilter: nft_payload: do not truncate csum_offset and csum_type
     - netfilter: nft_osf: restrict osf to ipv4, ipv6 and inet families
     - netfilter: nft_tunnel: restrict it to netdev family
     - net: Fix data-races around weight_p and dev_weight_[rt]x_bias.
     - net: Fix data-races around netdev_tstamp_prequeue.
     - ratelimit: Fix data-races in ___ratelimit().
     - net: Fix a data-race around sysctl_tstamp_allow_data.
     - net: Fix a data-race around sysctl_net_busy_poll.
     - net: Fix a data-race around sysctl_net_busy_read.
     - net: Fix a data-race around netdev_budget.
     - net: Fix a data-race around netdev_budget_usecs.
     - net: Fix a data-race around sysctl_somaxconn.
     - ixgbe: stop resetting SYSTIME in ixgbe_ptp_start_cyclecounter
     - btrfs: fix silent failure when deleting root reference
     - btrfs: replace: drop assert for suspended replace
     - btrfs: add info when mount fails due to stale replace target
     - btrfs: check if root is readonly while setting security xatt

1990794 ubuntu_bpf failed to build on F-azure-5.4 / B-azure-5.4 ( error: \u2018bpf_object_open_opts\u2019 undeclared)
1983656 iavf: SR-IOV VFs error with no traffic flow when MTU greater than 1500
1990800 fib_nexthop_nongw.sh from ubuntu_kernel_selftests failed on B-5.4
1990985 ACPI: processor idle: Practically limit \
1988584 cgroup: all controllers mounted when using 'cgroup_no_v1='
1991156 Focal update: v5.4.212 upstream stable release
1990190 Focal update: v5.4.211 upstream stable release
CVE-2022-42719 A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by atta
CVE-2022-29901 Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak
CVE-2022-3028 A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurr
CVE-2022-2978 A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following c
CVE-2022-40768 drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecomman



About   -   Send Feedback to @ubuntu_updates