UbuntuUpdates.org

Package "linux-oem-5.17"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-oem-5.17

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Header files related to Linux kernel version 5.17.0
  • Header files related to Linux kernel version 5.17.0
  • Header files related to Linux kernel version 5.17.0
  • Header files related to Linux kernel version 5.17.0

Latest version: 5.17.0-1029.30
Release: jammy (22.04)
Level: base
Repository: main

Links



Other versions of "linux-oem-5.17" in Jammy

Repository Area Version
security main 5.17.0-1028.29
updates main 5.17.0-1028.29
proposed main 5.17.0-1029.30

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.17.0-1029.30 2023-03-13 21:08:40 UTC

 linux-oem-5.17 (5.17.0-1029.30) jammy; urgency=medium
 .
   * jammy/linux-oem-5.17: 5.17.0-1029.30 -proposed tracker (LP: #2008350)
 .
   * CVE-2023-0461
     - SAUCE: Fix inet_csk_listen_start after CVE-2023-0461
 .
   * CVE-2023-0394
     - ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
 .
   * CVE-2022-36280
     - drm/vmwgfx: Validate the box size for the snooped cursor
 .
   * CVE-2022-41850
     - HID: roccat: Fix use-after-free in roccat_read()
 .
   * CVE-2022-3061
     - video: fbdev: i740fb: Error out if 'pixclock' equals zero
 .
   * CVE-2022-3628
     - wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()
 .
   * CVE-2022-3646
     - nilfs2: fix leak of nilfs_root in case of writer thread creation failure
 .
   * CVE-2022-3649
     - nilfs2: fix use-after-free bug of struct nilfs_root
 .
   * rtcpie in timers from ubuntu_kernel_selftests randomly failing
     (LP: #1814234)
     - SAUCE: selftest: rtcpie: Force passing unreliable subtest
 .
   * CVE-2022-2196
     - KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS

Source diff to previous version
1814234 rtcpie in timers from ubuntu_kernel_selftests randomly failing
CVE-2023-0461 RESERVED
CVE-2023-0394 A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw c
CVE-2022-36280 An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel
CVE-2022-41850 roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situ
CVE-2022-3061 Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn't c
CVE-2022-3628 A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device
CVE-2022-3646 A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the
CVE-2022-3649 A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inod
CVE-2022-2196 A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 du

Version: 5.17.0-1028.29 2023-02-10 12:08:50 UTC

 linux-oem-5.17 (5.17.0-1028.29) jammy; urgency=medium
 .
   * jammy/linux-oem-5.17: 5.17.0-1028.29 -proposed tracker (LP: #2004346)
 .
   * CVE-2023-0045
     - x86/bugs: Flush IBP in ib_prctl_set()
 .
   * Packaging resync (LP: #1786013)
     - debian/dkms-versions -- update from kernel-versions (main/2023.01.30)
 .
   * Keeps rebooting with AMD W6400, W6600, and W6800 graphic cards
     (LP: #2000110)
     - drm/amdgpu: move nbio ih_doorbell_range() into ih code for vega
     - drm/amdgpu: move nbio sdma_doorbell_range() into sdma code for vega
     - drm/amdgpu: make sure to init common IP before gmc
     - drm/amdgpu: fix sdma doorbell init ordering on APUs
 .
   * CVE-2022-47520
     - wifi: wilc1000: validate pairwise and authentication suite offsets
 .
   * Improve arp_ndisc_evict_nocarrier.sh test result processing (LP: #2006546)
     - selftests: net: return non-zero for failures reported in
       arp_ndisc_evict_nocarrier
 .
   * CVE-2022-43750
     - usb: mon: make mmapped memory read only
 .
   * CVE-2023-0461
     - net/ulp: prevent ULP without clone op from entering the LISTEN status
     - net/ulp: use consistent error code when blocking ULP
 .
   * CVE-2022-3565
     - mISDN: fix use-after-free bugs in l1oip timer handlers
 .
   * CVE-2022-36879
     - xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in
       xfrm_bundle_lookup()
 .
   * CVE-2022-20369
     - NFSD: fix use-after-free in __nfs42_ssc_open()
 .
   * arp_ndisc_evict_nocarrier.sh in net from ubuntu_kernel_selftests failed on
     J-oem-5.17 / K (LP: #1968310)
     - selftests: net: fix cleanup_v6() for arp_ndisc_evict_nocarrier
 .
   * CVE-2022-20566
     - Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put
 .
   * Expose built-in trusted and revoked certificates (LP: #1996892)
     - [Packaging] Expose built-in trusted and revoked certificates

Source diff to previous version
1786013 Packaging resync
2006546 Improve arp_ndisc_evict_nocarrier.sh test result processing
1996892 Expose built-in trusted and revoked certificates
CVE-2022-47520 An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000
CVE-2022-43750 drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's inter
CVE-2023-0461 RESERVED
CVE-2022-3565 A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drive
CVE-2022-36879 An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.
CVE-2022-20369 In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation
CVE-2022-20566 In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no

Version: 5.17.0-1027.28 2023-01-23 19:08:58 UTC

 linux-oem-5.17 (5.17.0-1027.28) jammy; urgency=medium
 .
   * jammy/linux-oem-5.17: 5.17.0-1027.28 -proposed tracker (LP: #2003451)
 .
   * CVE-2022-3545
     - nfp: fix use-after-free in area_cache_get()
 .
   * CVE-2022-42895
     - Bluetooth: L2CAP: Fix attempting to access uninitialized memory
 .
   * ThinkPad L14 Gen 3 blank laptop screen on bootup (LP: #2002467)
     - Revert "drm/amdgpu: make sure to init common IP before gmc"
 .
   * CVE-2023-0179
     - netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits
 .
   [ Ubuntu: 5.17.0-15.16~22.04.8 ]
 .
   * jammy/linux-hwe-5.17: 5.17.0-15.16~22.04.8 -proposed tracker (LP: #2003452)
   * Packaging resync (LP: #1786013)
     - [Packaging] update helper scripts
     - debian/dkms-versions -- update from kernel-versions (main/2023.01.02)
   * Revoke & rotate to new signing key (LP: #2002812)
     - [Packaging] Revoke and rotate to new signing key
   * CVE-2022-45934
     - Bluetooth: L2CAP: Fix u8 overflow
   * CVE-2022-42896
     - Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
     - Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
   * CVE-2022-4378
     - proc: proc_skip_spaces() shouldn't think it is working on C strings
     - proc: avoid integer type confusion in get_proc_long

Source diff to previous version
2002467 ThinkPad L14 Gen 3 blank laptop screen on bootup
1786013 Packaging resync
2002812 Revoke \u0026 rotate to new signing key
CVE-2022-3545 A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file
CVE-2022-42895 There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel
CVE-2023-0179 netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits
CVE-2022-45934 An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_R
CVE-2022-42896 There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which ma
CVE-2022-4378 A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem ...

Version: 5.17.0-1026.27 2023-01-04 12:08:21 UTC

 linux-oem-5.17 (5.17.0-1026.27) jammy; urgency=medium
 .
   * jammy/linux-oem-5.17: 5.17.0-1026.27 -proposed tracker (LP: #2001046)
 .
   * Keeps rebooting with AMD W6400, W6600, and W6800 graphic cards
     (LP: #2000110)
     - drm/amdgpu: Remove ATC L2 access for MMHUB 2.1.x
     - drm/amd/pm: disable BACO entry/exit completely on several sienna cichlid
       cards
     - drm/amdgpu: disable BACO on special BEIGE_GOBY card
     - drm/amdgpu: disable BACO support on more cards
     - drm/amdgpu: make sure to init common IP before gmc
 .
   * Fix SUT can't displayed after resume from WB/CB with dGFX
     installed(FR:6/10)[RX6300][RX6500] (LP: #1999836)
     - drm/amd/display: No display after resume from WB/CB
 .
   * CVE-2022-4378
     - proc: proc_skip_spaces() shouldn't think it is working on C strings
     - proc: avoid integer type confusion in get_proc_long

Source diff to previous version

Version: 5.17.0-1025.26 2022-12-07 15:08:22 UTC

 linux-oem-5.17 (5.17.0-1025.26) jammy; urgency=medium
 .
   * jammy/linux-oem-5.17: 5.17.0-1025.26 -proposed tracker (LP: #1997739)
 .
   * Packaging resync (LP: #1786013)
     - debian/dkms-versions -- update from kernel-versions (main/2022.11.14)
 .
   * Rear Audio port sometimes has no audio output after reboot(Cirrus Logic)
     (LP: #1998905)
     - SAUCE: ALSA: hda/cirrus: Add extra 10 ms delay to allow PLL settle and lock.
 .
   * Micron NVME storage failure [1344,5407] (LP: #1998883)
     - nvme: add a bogus subsystem NQN quirk for Micron MTFDKBA2T0TFH
 .
   * CVE-2022-42896
     - Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
 .
   * Fix AMD-PState driver for Genoa CPU (LP: #1998106)
     - Documentation: amd-pstate: add tracer tool introduction
     - Documentation: amd-pstate: grammar and sentence structure updates
     - Documentation: amd-pstate: Add unit test introduction
     - cpufreq: amd-pstate: cpufreq: amd-pstate: reset MSR_AMD_PERF_CTL register at
       init
     - cpufreq: amd-pstate: change amd-pstate driver to be built-in type
     - cpufreq: amd-pstate: add amd-pstate driver parameter for mode selection
     - Documentation: amd-pstate: add driver working mode introduction
     - Documentation: add amd-pstate kernel command line options
 .
   * Mediatek WLAN RZ616(MT7922) SAR table control (LP: #1997200)
     - mt76: add 6 GHz band support in mt76_sar_freq_ranges
     - mt76: mt7921: introduce ACPI SAR support
     - mt76: mt7921: introduce ACPI SAR config in tx power
     - wifi: mt76: mt7921: fix use after free in mt7921_acpi_read()
 .
   * Add cs35l41 firmware loading support (LP: #1995957)
     - ASoC: cs35l41: Remove unnecessary param
     - ALSA: cs35l41: Unify hardware configuration
     - ALSA: cs35l41: Check hw_config before using it
     - ALSA: cs35l41: Move cs35l41_gpio_config to shared lib
     - ALSA: hda: cs35l41: Fix I2S params comments
     - ALSA: hda: cs35l41: Always configure the DAI
     - ALSA: hda: cs35l41: Add Boost type flag
     - ALSA: hda: cs35l41: Put the device into safe mode for external boost
     - ALSA: hda: cs35l41: Mute the device before shutdown
     - ALSA: cs35l41: Enable Internal Boost in shared lib
     - ALSA: hda: cs35l41: Move boost config to initialization code
     - ALSA: hda: cs35l41: Remove cs35l41_hda_reg_sequence struct
     - ALSA: hda: cs35l41: Reorganize log for playback actions
     - ALSA: hda: cs35l41: Handle all external boost setups the same way
     - ALSA: hda: cs35l41: Move external boost handling to lib for ASoC use
     - ASoC: cs35l41: Document CS35l41 External Boost
     - ASoC: cs35l41: Support external boost
     - ALSA: hda: cs35l41: Fix error in spi cs35l41 hda driver name
     - ALSA: hda: cs35l41: Set Speaker Position for CLSA0100 Laptop
     - ALSA: hda: cs35l41: Remove Set Channel Map api from binding
     - ALSA: hda: cs35l41: Add Support for Interrupts
     - ALSA: hda: cs35l41: Enable GPIO2 Interrupt for CLSA0100 laptops
     - ASoC: cs35l41: Move cs35l41_set_cspl_mbox_cmd to shared code
     - ASoC: cs35l41: Move cs35l41 fs errata into shared code
     - ASoC: cs35l41: Move cs_dsp config struct into shared code
     - ALSA: hda: cs35l41: Add Amp Name based on channel and index
     - ASoC: cs35l41: Move cs35l41 exit hibernate function into shared code
     - ASoC: cs35l41: Add common cs35l41 enter hibernate function
     - ASoC: cs35l41: Do not print error when waking from hibernation
     - ALSA: hda: cs35l41: Don't dereference fwnode handle
     - ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations
     - ALSA: hda: cs35l41: Drop wrong use of ACPI_PTR()
     - ALSA: hda: cs35l41: Consolidate selections under SND_HDA_SCODEC_CS35L41
     - ALSA: hda: hda_cs_dsp_ctl: Add Library to support CS_DSP ALSA controls
     - ALSA: hda: hda_cs_dsp_ctl: Add apis to write the controls directly
     - ALSA: hda: cs35l41: Save codec object inside component struct
     - ALSA: hda: cs35l41: Add initial DSP support and firmware loading
     - ALSA: hda: cs35l41: Save Subsystem ID inside CS35L41 Driver
     - ALSA: hda: cs35l41: Support reading subsystem id from ACPI
     - ALSA: hda: cs35l41: Support multiple load paths for firmware
     - ALSA: hda: cs35l41: Support Speaker ID for laptops
     - ALSA: hda: cs35l41: Support Hibernation during Suspend
     - ALSA: hda: cs35l41: Read Speaker Calibration data from UEFI variables
     - ALSA: hda: hda_cs_dsp_ctl: Add fw id strings
     - ALSA: hda: cs35l41: Add defaulted values into dsp bypass config sequence
     - ALSA: hda: cs35l41: Support Firmware switching and reloading
     - ALSA: hda: cs35l41: Add module parameter to control firmware load
     - Revert "ALSA: hda: cs35l41: Allow compilation test on non-ACPI
       configurations"
     - [Config] updateconfigs for SND_HDA_CS_DSP_CONTROLS
 .
   * Screen freeze after resuming from suspend (nvme0: I/O timeout)
     (LP: #1996048)
     - SAUCE: PCI: vmd: Disable MSI remapping after suspend
 .
   * Screen cannot turn on after screen off with Matrox G200eW3 [102b:0536]
     (LP: #1995573)
     - drm: Add DRM-managed mutex_init()
     - drm/mgag200: Protect concurrent access to I/O registers with lock
     - drm/mgag200: Acquire I/O lock while reading EDID
     - drm/mgag200: Optimize damage clips
     - drm/mgag200: Add FB_DAMAGE_CLIPS support
     - drm/mgag200: Enable atomic gamma lut update
 .
   * Fix ath11k deadlock on WCN6855 (LP: #1995041)
     - SAUCE: wifi: ath11k: avoid deadlock during regulatory update in
       ath11k_regd_update()
 .
   * TEE Support for CCP driver (LP: #1991608)
     - SAUCE: crypto: ccp: Add support for TEE for PCI ID 0x14CA
 .
   * [SRU][J/OEM-5.17][PATCH 0/1] Fix oled brightness set above frame-average
     luminance (LP: #1978986)
     - drm: New function to get luminance range based on static hdr metadata
     - drm/amdgpu_dm: Rely on split out luminance calculation function
     - drm/i915: Use luminance range calculated during edid parsing
 .
   

1786013 Packaging resync
1998883 Micron NVME storage failure [1344,5407]
1995573 Screen cannot turn on after screen off with Matrox G200eW3 [102b:0536]
1978986 [SRU][OEM-5.14/OEM-5.17][PATCH 0/1] Fix oled brightness set above frame-average luminance on AMD
1991366 Fix Thunderbolt device hotplug fail when connect via thunderbolt dock
1993563 support for same series backports versioning numbers
CVE-2022-42896 There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which ma



About   -   Send Feedback to @ubuntu_updates