UbuntuUpdates.org

Package "linux-oem-6.0"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-oem-6.0

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel buildinfo for version 6.0.0 on 64 bit x86 SMP
  • Linux kernel headers for version 6.0.0 on 64 bit x86 SMP
  • Linux kernel image for version 6.0.0 on 64 bit x86 SMP
  • Linux kernel extra modules for version 6.0.0 on 64 bit x86 SMP

Latest version: 6.0.0-1018.18
Release: jammy (22.04)
Level: base
Repository: main

Links



Other versions of "linux-oem-6.0" in Jammy

Repository Area Version
security main 6.0.0-1021.21
updates main 6.0.0-1021.21

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 6.0.0-1018.18 2023-05-30 11:09:03 UTC

 linux-oem-6.0 (6.0.0-1018.18) jammy; urgency=medium
 .
   * jammy/linux-oem-6.0: 6.0.0-1018.18 -proposed tracker (LP: #2019422)
 .
   * Packaging resync (LP: #1786013)
     - [Packaging] resync git-ubuntu-log
     - [Packaging] resync getabis
     - [Packaging] update helper scripts
 .
   * No HDMI/DP audio output on dock(Nvidia GPU) (LP: #2020062)
     - SAUCE: ALSA: hda: Add NVIDIA codec IDs a3 through a7 to patch table

Source diff to previous version
1786013 Packaging resync

Version: 6.0.0-1016.16 2023-04-27 17:09:15 UTC

 linux-oem-6.0 (6.0.0-1016.16) jammy; urgency=medium
 .
   * jammy/linux-oem-6.0: 6.0.0-1016.16 -proposed tracker (LP: #2016550)
 .
   * both dell_backlight and nvidia_0 backlight interface appear, and can't
     adjust the display brightness (LP: #2017774)
     - ACPI: video: Add acpi_video_backlight_use_native() helper
     - ACPI: video: Drop backlight_device_get_by_type() call from
       acpi_video_get_backlight_type()
     - ACPI: video: Refactor acpi_video_get_backlight_type() a bit
     - ACPI: video: Make acpi_video_backlight_use_native() always return true
     - ACPI: video: Simplify __acpi_video_get_backlight_type()
     - ACPI: video: Prefer native over vendor
 .
   * CVE-2022-4139
     - drm/i915: fix TLB invalidation for Gen12 video and compute engines

Source diff to previous version
2017774 both dell_backlight and nvidia_0 backlight interface appear, and can't adjust the display brightness
CVE-2022-4139 An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. T

Version: 6.0.0-1015.15 2023-04-18 16:08:48 UTC

 linux-oem-6.0 (6.0.0-1015.15) jammy; urgency=medium
 .
   * jammy/linux-oem-6.0: 6.0.0-1015.15 -proposed tracker (LP: #2016822)
 .
   * CVE-2023-23455
     - net: sched: atm: dont intepret cls results when asked to drop
 .
   * CVE-2023-26545
     - net: mpls: fix stale pointer if allocation fails during device rename
 .
   * CVE-2023-1829
     - net/sched: Retire tcindex classifier
     - [Config]: Make sure CONFIG_NET_CLS_TCINDEX is not available
 .
   * CVE-2023-1859
     - 9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race
       condition
 .
   * CVE-2023-0468
     - io_uring: update res mask in io_poll_check_events
     - io_uring: fix tw losing poll events
     - io_uring: cmpxchg for poll arm refs release
     - io_uring: make poll refs more robust
     - io_uring/poll: fix poll_refs race with cancelation
 .
   * CVE-2023-0386
     - ovl: fail on invalid uid/gid mapping at copy up
 .
   * Miscellaneous Ubuntu changes
     - [Config] Update gcc version

Source diff to previous version
CVE-2023-23455 atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-
CVE-2023-26545 In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a
CVE-2023-0468 A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition o
CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s

Version: 6.0.0-1014.14 2023-04-03 17:08:58 UTC

 linux-oem-6.0 (6.0.0-1014.14) jammy; urgency=medium
 .
   * jammy/linux-oem-6.0: 6.0.0-1014.14 -proposed tracker (LP: #2011920)
 .
   * CVE-2022-4382
     - USB: gadgetfs: Fix race between mounting and unmounting
 .
   * CVE-2023-23559
     - wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
 .
   * CVE-2023-1118
     - media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()
 .
   * CVE-2023-26605
     - fs: do not update freeing inode i_io_list
 .
   * CVE-2023-26607
     - ntfs: fix out-of-bounds read in ntfs_attr_find()
 .
   * CVE-2022-36280
     - drm/vmwgfx: Validate the box size for the snooped cursor
 .
   * CVE-2023-1074
     - sctp: fail if no bound addresses can be used for a given scope
 .
   * Packaging resync (LP: #1786013)
     - [Packaging] update helper scripts
     - [Packaging] update Ubuntu.md
     - [Packaging] update update.conf

Source diff to previous version
1786013 Packaging resync
CVE-2022-4382 A use-after-free flaw caused by a race among the superblock operations in the gadgetfs Linux driver was found. It could be triggered by yanking out a
CVE-2023-23559 In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.
CVE-2023-1118 A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user
CVE-2023-26605 In the Linux kernel 6.0.8, there is a use-after-free in inode_cgwb_move_to_attached in fs/fs-writeback.c, related to __list_del_entry_valid.
CVE-2023-26607 In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.
CVE-2022-36280 An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel
CVE-2023-1074 A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networki

Version: 6.0.0-1013.13 2023-03-16 21:08:36 UTC

 linux-oem-6.0 (6.0.0-1013.13) jammy; urgency=medium
 .
   * jammy/linux-oem-6.0: 6.0.0-1013.13 -proposed tracker (LP: #2008351)
 .
   * CVE-2023-1281
     - net/sched: tcindex: update imperfect hash filters respecting rcu
 .
   * CVE-2023-1032
     - net: avoid double iput when sock_alloc_file fails
 .
   * rtcpie in timers from ubuntu_kernel_selftests randomly failing
     (LP: #1814234)
     - SAUCE: selftest: rtcpie: Force passing unreliable subtest
 .
   * CVE-2022-2196
     - KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
 .
   * Fix HFP mSBC support on Realtek Bluetooth USB controller (LP: #2007331)
     - Bluetooth: btrtl: Add btrealtek data struct
     - Bluetooth: btusb: Ignore zero length of USB packets on ALT 6 for specific
       chip

1814234 rtcpie in timers from ubuntu_kernel_selftests randomly failing
CVE-2023-1281 RESERVED
CVE-2023-1032 RESERVED
CVE-2022-2196 A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 du



About   -   Send Feedback to @ubuntu_updates