UbuntuUpdates.org

Package "linux-azure-5.19"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-azure-5.19

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel version specific cloud tools for version 5.19.0-1026
  • Header files related to Linux kernel version 5.19.0
  • Header files related to Linux kernel version 5.19.0
  • Header files related to Linux kernel version 5.19.0

Latest version: 5.19.0-1026.29~22.04.1
Release: jammy (22.04)
Level: base
Repository: main

Links



Other versions of "linux-azure-5.19" in Jammy

Repository Area Version
security main 5.19.0-1027.30~22.04.2
updates main 5.19.0-1027.30~22.04.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.19.0-1019.20~22.04.1 2023-01-25 16:08:52 UTC

 linux-azure-5.19 (5.19.0-1019.20~22.04.1) jammy; urgency=medium
 .
   * jammy/linux-azure-5.19: 5.19.0-1019.20~22.04.1 -proposed tracker
     (LP: #2003414)
 .
   [ Ubuntu: 5.19.0-1019.20 ]
 .
   * kinetic/linux-azure: 5.19.0-1019.20 -proposed tracker (LP: #2003415)
   * Azure: TDX enabled hyper-visors cause segfault (LP: #2003714)
     - SAUCE: TDX: Work around the segfault issue in glibc 2.35 in Ubuntu 22.04.
   * kinetic/linux: 5.19.0-31.32 -proposed tracker (LP: #2003423)
   * amdgpu: framebuffer is destroyed and the screen freezes with unsupported IP
     blocks (LP: #2003524)
     - drm/amd: Delay removal of the firmware framebuffer
   * Revoke & rotate to new signing key (LP: #2002812)
     - [Packaging] Revoke and rotate to new signing key
 .

Source diff to previous version
2003714 Azure: TDX enabled hyper-visors cause segfault
2003524 amdgpu: framebuffer is destroyed and the screen freezes with unsupported IP blocks
2002812 Revoke \u0026 rotate to new signing key

Version: 5.19.0-1018.19~22.04.1 2023-01-16 23:09:29 UTC

 linux-azure-5.19 (5.19.0-1018.19~22.04.1) jammy; urgency=medium
 .
   * jammy/linux-azure-5.19: 5.19.0-1018.19~22.04.1 -proposed tracker
     (LP: #2001744)
 .
   [ Ubuntu: 5.19.0-1018.19 ]
 .
   * kinetic/linux-azure: 5.19.0-1018.19 -proposed tracker (LP: #2001745)
   * Kinetic update: upstream stable patchset 2022-11-14 (LP: #1996540)
     - [Config] azure: updateconfigs after rebase
   * Packaging resync (LP: #1786013)
     - debian/dkms-versions -- update from kernel-versions (main/2023.01.02)
   * Kinetic linux-azure - Enable TDX guest driver w/MSFT Hyper-v (LP: #2002658)
     - clocksource/drivers/hyperv: add data structure for reference TSC MSR
     - Revert "UBUNTU: SAUCE: x86/tdx: Add TDX Guest attestation interface driver"
     - Revert "UBUNTU: SAUCE: selftests: tdx: Test GetReport TDX attestation
       feature"
     - Revert "x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()"
     - SAUCE: x86/tdx: Add a wrapper to get TDREPORT0 from the TDX Module
     - SAUCE: virt: Add TDX guest driver
     - SAUCE: selftests/tdx: Test TDX attestation GetReport support
     - SAUCE: tdx: enable DEBUG: tools/testing/selftests/tdx/tdx_guest_test.c
     - SAUCE: tdx: swiotlb: check set_memory_decrypted()'s return value
     - SAUCE: tdx: x86/sev: mem_encrypt_free_decrypted_mem(): encrypt the pages for
       AMD SME only
     - SAUCE: tdx: x86/hyperv: Do not run swiotlb_update_mem_attributes() in
       hyperv_init()
     - SAUCE: tdx: x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
     - SAUCE: tdx: x86/tdx: Support vmalloc() for tdx_enc_status_changed()
     - SAUCE: tdx: x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
     - SAUCE: tdx: x86/tdx: Expand __tdx_hypercall() to handle more arguments
     - SAUCE: tdx: x86/hyperv: Support hypercalls for TDX guests
     - SAUCE: tdx: Drivers: hv: vmbus: Support TDX guests
     - SAUCE: tdx: x86/hyperv: Fix serial console interrupts for TDX guests
     - [Config] azure: Enable TDX guest driver
     - SAUCE: tdx: Drivers: hv: vmbus:: Fix the ARM64 build caused by recent TDX
       patches
   * kinetic/linux: 5.19.0-30.31 -proposed tracker (LP: #2001756)
   * Packaging resync (LP: #1786013)
     - [Packaging] update helper scripts
     - debian/dkms-versions -- update from kernel-versions (main/2023.01.02)
   * Add some ACPI device IDs for Intel HID device (LP: #1995453)
     - platform/x86/intel/hid: Add some ACPI device IDs
   * Fix iosm: WWAN cannot build the connection (DW5823e) (LP: #1998115)
     - net: wwan: iosm: fix driver not working with INTEL_IOMMU disabled
     - [Config] CONFIG_IOSM update annotations on arm64 armhf ppc64el s390x riscv64
   * BPF_[AND|OR|XOR|FETCH|XCHG|CMPXCHG] in net:test_bpf.sh from
     ubuntu_kernel_selftests failed on K-5.19 P9 (LP: #2001618)
     - powerpc/bpf/64: add support for BPF_ATOMIC bitwise operations
     - powerpc/bpf/64: add support for atomic fetch operations
     - powerpc/bpf/64: Add instructions for atomic_[cmp]xchg
   * [DEP-8] Run ADT regression suite for lowlatency kernels Jammy and later
     (LP: #1999528)
     - [DEP-8] Fix regression suite to run on lowlatency
   * Kinetic update: upstream stable patchset 2022-12-15 (LP: #1999828)
     - serial: ar933x: Deassert Transmit Enable on ->rs485_config()
     - KVM: x86: Trace re-injected exceptions
     - RDMA/cma: Use output interface for net_dev check
     - IB/hfi1: Correctly move list in sc_disable()
     - RDMA/hns: Disable local invalidate operation
     - NFSv4: Fix a potential state reclaim deadlock
     - NFSv4.1: Handle RECLAIM_COMPLETE trunking errors
     - NFSv4.1: We must always send RECLAIM_COMPLETE after a reboot
     - SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed
     - NFSv4.2: Fixup CLONE dest file size for zero-length count
     - nfs4: Fix kmemleak when allocate slot failed
     - net: dsa: Fix possible memory leaks in dsa_loop_init()
     - RDMA/core: Fix null-ptr-deref in ib_core_cleanup()
     - RDMA/qedr: clean up work queue on failure in qedr_alloc_resources()
     - net: dsa: fall back to default tagger if we can't load the one from DT
     - nfc: fdp: Fix potential memory leak in fdp_nci_send()
     - nfc: nxp-nci: Fix potential memory leak in nxp_nci_send()
     - nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send()
     - nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send()
     - net: fec: fix improper use of NETDEV_TX_BUSY
     - ata: pata_legacy: fix pdc20230_set_piomode()
     - net: sched: Fix use after free in red_enqueue()
     - net: tun: fix bugs for oversize packet when napi frags enabled
     - netfilter: nf_tables: netlink notifier might race to release objects
     - netfilter: nf_tables: release flow rule object from commit path
     - ipvs: use explicitly signed chars
     - ipvs: fix WARNING in __ip_vs_cleanup_batch()
     - ipvs: fix WARNING in ip_vs_app_net_cleanup()
     - rose: Fix NULL pointer dereference in rose_send_frame()
     - mISDN: fix possible memory leak in mISDN_register_device()
     - isdn: mISDN: netjet: fix wrong check of device registration
     - btrfs: fix inode list leak during backref walking at resolve_indirect_refs()
     - btrfs: fix inode list leak during backref walking at find_parent_nodes()
     - btrfs: fix ulist leaks in error paths of qgroup self tests
     - netfilter: ipset: enforce documented limit to prevent allocating huge memory
     - Bluetooth: virtio_bt: Use skb_put to set length
     - Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()
     - Bluetooth: L2CAP: Fix memory leak in vhci_write
     - net: mdio: fix undefined behavior in bit shift for __mdiobus_register
     - ibmvnic: Free rwi on reset success
     - stmmac: dwmac-loongson: fix invalid mdio_node
     - net/smc: Fix possible leaked pernet namespace in smc_init()
     - net, neigh: Fix null-ptr-deref in neigh_table_clear()
     - ipv6: fix WARNING in ip6_route_net_exit_late()
     - vsock: fix possible infinite sleep in vsock

1996540 Kinetic update: upstream stable patchset 2022-11-14
1786013 Packaging resync
2002658 Kinetic linux-azure - Enable TDX guest driver w/MSFT Hyper-v
1998115 Fix iosm: WWAN cannot build the connection (DW5823e)
2001618 BPF_[AND|OR|XOR|FETCH|XCHG|CMPXCHG] in net:test_bpf.sh from ubuntu_kernel_selftests failed on K-5.19 P9
1999528 [DEP-8] Run ADT regression suite for lowlatency kernels Jammy and later
1999828 Kinetic update: upstream stable patchset 2022-12-15
1999079 Kinetic update: upstream stable patchset 2022-12-07
1996112 Virtual GPU driver packaging regression
1998398 Kinetic update: upstream stable patchset 2022-11-30
1999094 mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux 5.19.0-27.28
1998838 Azure: Jammy fio test hangs, swiotlb buffers exhausted
1998351 Azure: MANA New Feature MANA XDP_Redirect Action
1972017 Jammy/linux-azure: CONFIG_BLK_DEV_FD=n
1989334 remove circular dep between linux-image and modules
1995408 [Azure] [NVMe] cpu soft lockup issue when run fio against nvme disks
1996117 [Azure][Arm64] Unable to detect all VF nics / Failing provisioning
1994068 Kinetic update: v5.19.9 upstream stable release
1994078 Kinetic update: v5.19.15 upstream stable release
1994179 Kinetic update: v5.19.17 upstream stable release
1996536 selftests/.../nat6to4 breaks the selftests build
1996892 Expose built-in trusted and revoked certificates
1993563 support for same series backports versioning numbers
1990700 Fibocom WWAN FM350-GL suspend error (notebook not suspend)
1995573 Screen cannot turn on after screen off with Matrox G200eW3 [102b:0536]
1993715 AMD Cezanne takes 5 minutes to wake up from suspend
1996071 [UBUNTU 20.04] boot: Add s390x secure boot trailer
1996198 Fix rfkill causing soft blocked wifi
1993148 Support Icicle Kit reference design v2022.10
1993120 armhf kernel compiled with gcc-12 fails to boot on pi 3/2
1994164 Kinetic update: v5.19.16 upstream stable release
1994076 Kinetic update: v5.19.14 upstream stable release
1994075 Kinetic update: v5.19.13 upstream stable release
1994074 Kinetic update: v5.19.12 upstream stable release
1994070 Kinetic update: v5.19.11 upstream stable release
1994069 Kinetic update: v5.19.10 upstream stable release
1994061 Kinetic update: v5.19.8 upstream stable release
1993315 md: Replace snprintf with scnprintf
1990985 ACPI: processor idle: Practically limit \
1983656 iavf: SR-IOV VFs error with no traffic flow when MTU greater than 1500
1990920 Fix resume on AMD platforms when TBT monitor is plugged
1978986 [SRU][OEM-5.14/OEM-5.17][PATCH 0/1] Fix oled brightness set above frame-average luminance on AMD
1988711 Update Broadcom Emulex FC HBA lpfc driver to 14.2.0.5 for Ubuntu 22.04
1992266 input/keyboard: the keyboard on some Asus laptops can't work
1986713 azure: Replace hyperv_fb with hyperv_drm
1987294 azure-5.15: Remove circular dependency on linux-modules and linux-image
1980981 [22.10] ARM64 test failures
1980766 Azure: Add the Linux MANA PF driver
1967166 Azure: not enough RAM under 4GB for CVM
CVE-2022-3643 Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux bas
CVE-2022-45934 An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_R
CVE-2022-4378 A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem ...
CVE-2022-42896 There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which ma
CVE-2022-3566 A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the compo
CVE-2022-3567 A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_op
CVE-2022-3621 A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/
CVE-2022-3565 A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drive
CVE-2022-3594 A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the f
CVE-2022-3564 A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net
CVE-2022-3524 A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of
CVE-2022-43945 The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by e
CVE-2022-2602 io_uring/af_unix: defer registered files gc to io_uring release
CVE-2022-41674 An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_i
CVE-2022-42722 In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer
CVE-2022-42721 A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (a
CVE-2022-42720 Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local
CVE-2022-42719 A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by atta



About   -   Send Feedback to @ubuntu_updates