UbuntuUpdates.org

Package "linux-starfive"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-starfive

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Header files related to Linux kernel version 6.2.0
  • Header files related to Linux kernel version 6.2.0
  • Header files related to Linux kernel version 6.2.0
  • Header files related to Linux kernel version 6.2.0

Latest version: 6.2.0-1012.13
Release: lunar (23.04)
Level: base
Repository: main

Links



Other versions of "linux-starfive" in Lunar

Repository Area Version
base main 5.19.0-1014.16
security main 6.2.0-1010.11
updates main 6.2.0-1010.11

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 6.2.0-1004.4 2023-08-28 16:08:41 UTC

 linux-starfive (6.2.0-1004.4) lunar; urgency=medium
 .
   * lunar/linux-starfive: 6.2.0-1004.4 -proposed tracker (LP: #2030379)
 .
   [ Ubuntu: 6.2.0-32.32 ]
 .
   * lunar/linux: 6.2.0-32.32 -proposed tracker (LP: #2031134)
   * libgnutls report "trap invalid opcode" when trying to install packages over
     https (LP: #2031093)
     - [Config]: disable CONFIG_GDS_FORCE_MITIGATION

Source diff to previous version
2031093 libgnutls report \

Version: 6.2.0-1002.2 2023-07-15 03:09:17 UTC

 linux-starfive (6.2.0-1002.2) lunar; urgency=medium
 .
   * lunar/linux-starfive: 6.2.0-1002.2 -proposed tracker (LP: #2026486)
 .
   [ Ubuntu: 6.2.0-27.28 ]
 .
   * lunar/linux: 6.2.0-27.28 -proposed tracker (LP: #2026488)
   * Packaging resync (LP: #1786013)
     - [Packaging] resync update-dkms-versions helper
     - [Packaging] update annotations scripts
   * CVE-2023-2640 // CVE-2023-32629
     - Revert "UBUNTU: SAUCE: overlayfs: handle idmapped mounts in
       ovl_do_(set|remove)xattr"
     - Revert "UBUNTU: SAUCE: overlayfs: Skip permission checking for
       trusted.overlayfs.* xattrs"
     - SAUCE: overlayfs: default to userxattr when mounted from non initial user
       namespace
   * UNII-4 5.9G Band support request on 8852BE (LP: #2023952)
     - wifi: rtw89: 8851b: add 8851B basic chip_info
     - wifi: rtw89: introduce realtek ACPI DSM method
     - wifi: rtw89: regd: judge UNII-4 according to BIOS and chip
     - wifi: rtw89: support U-NII-4 channels on 5GHz band
   * Disable hv-kvp-daemon if /dev/vmbus/hv_kvp is not present (LP: #2024900)
     - [Packaging] disable hv-kvp-daemon if needed
   * A deadlock issue in scsi rescan task while resuming from S3 (LP: #2018566)
     - ata: libata-scsi: Avoid deadlock on rescan after device resume
   * [SRU] Intel Sapphire Rapids HBM support needs CONFIG_NUMA_EMU (LP: #2008745)
     - [Config] Intel Sapphire Rapids HBM support needs CONFIG_NUMA_EMU
   * Lunar update: v6.2.15 upstream stable release (LP: #2025067)
     - ASOC: Intel: sof_sdw: add quirk for Intel 'Rooks County' NUC M15
     - ASoC: Intel: soc-acpi: add table for Intel 'Rooks County' NUC M15
     - ASoC: soc-pcm: fix hw->formats cleared by soc_pcm_hw_init() for dpcm
     - x86/hyperv: Block root partition functionality in a Confidential VM
     - ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx
       (8A22)
     - iio: adc: palmas_gpadc: fix NULL dereference on rmmod
     - ASoC: Intel: bytcr_rt5640: Add quirk for the Acer Iconia One 7 B1-750
     - ASoC: da7213.c: add missing pm_runtime_disable()
     - net: wwan: t7xx: do not compile with -Werror
     - wifi: mt76: mt7921: Fix use-after-free in fw features query.
     - selftests mount: Fix mount_setattr_test builds failed
     - scsi: mpi3mr: Handle soft reset in progress fault code (0xF002)
     - net: sfp: add quirk enabling 2500Base-x for HG MXPD-483II
     - platform/x86: thinkpad_acpi: Add missing T14s Gen1 type to s2idle quirk list
     - wifi: ath11k: reduce the MHI timeout to 20s
     - tracing: Error if a trace event has an array for a __field()
     - asm-generic/io.h: suppress endianness warnings for readq() and writeq()
     - asm-generic/io.h: suppress endianness warnings for relaxed accessors
     - x86/cpu: Add model number for Intel Arrow Lake processor
     - wifi: mt76: mt7921e: Set memory space enable in PCI_COMMAND if unset
     - ASoC: amd: ps: update the acp clock source.
     - arm64: Always load shadow stack pointer directly from the task struct
     - arm64: Stash shadow stack pointer in the task struct on interrupt
     - powerpc/boot: Fix boot wrapper code generation with CONFIG_POWER10_CPU
     - PCI: kirin: Select REGMAP_MMIO
     - PCI: pciehp: Fix AB-BA deadlock between reset_lock and device_lock
     - PCI: qcom: Fix the incorrect register usage in v2.7.0 config
     - bus: mhi: host: pci_generic: Revert "Add a secondary AT port to Telit FN990"
     - phy: qcom-qmp-pcie: sc8180x PCIe PHY has 2 lanes
     - IMA: allow/fix UML builds
     - wifi: rtw88: usb: fix priority queue to endpoint mapping
     - usb: gadget: udc: core: Invoke usb_gadget_connect only when started
     - usb: gadget: udc: core: Prevent redundant calls to pullup
     - usb: dwc3: gadget: Stall and restart EP0 if host is unresponsive
     - USB: dwc3: fix runtime pm imbalance on probe errors
     - USB: dwc3: fix runtime pm imbalance on unbind
     - hwmon: (k10temp) Check range scale when CUR_TEMP register is read-write
     - hwmon: (adt7475) Use device_property APIs when configuring polarity
     - tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site
     - posix-cpu-timers: Implement the missing timer_wait_running callback
     - media: ov8856: Do not check for for module version
     - drm/vmwgfx: Fix Legacy Display Unit atomic drm support
     - blk-stat: fix QUEUE_FLAG_STATS clear
     - blk-mq: release crypto keyslot before reporting I/O complete
     - blk-crypto: make blk_crypto_evict_key() return void
     - blk-crypto: make blk_crypto_evict_key() more robust
     - staging: iio: resolver: ads1210: fix config mode
     - tty: Prevent writing chars during tcsetattr TCSADRAIN/FLUSH
     - xhci: fix debugfs register accesses while suspended
     - serial: fix TIOCSRS485 locking
     - serial: 8250: Fix serial8250_tx_empty() race with DMA Tx
     - serial: max310x: fix IO data corruption in batched operations
     - tick/nohz: Fix cpu_is_hotpluggable() by checking with nohz subsystem
     - fs: fix sysctls.c built
     - MIPS: fw: Allow firmware to pass a empty env
     - ipmi:ssif: Add send_retries increment
     - ipmi: fix SSIF not responding under certain cond.
     - iio: addac: stx104: Fix race condition when converting analog-to-digital
     - iio: addac: stx104: Fix race condition for stx104_write_raw()
     - kheaders: Use array declaration instead of char
     - wifi: mt76: add missing locking to protect against concurrent rx/status
       calls
     - wifi: rtw89: correct 5 MHz mask setting
     - pwm: meson: Fix axg ao mux parents
     - pwm: meson: Fix g12a ao clk81 name
     - soundwire: qcom: correct setting ignore bit on v1.5.1
     - pinctrl: qcom: lpass-lpi: set output value before enabling output
     - ring-buffer: Ensure proper resetting of atomic variables in
       ring_buffer_reset_online_cpus
     - ring-buffer: Sync IRQ works before buffer destruction
     - crypto: api - Demote BUG_ON() in crypto_unregister_alg() to a WARN_ON()
     -

1786013 Packaging resync
2023952 UNII-4 5.9G Band support request on 8852BE
2024900 Disable hv-kvp-daemon if /dev/vmbus/hv_kvp is not present
2008745 [SRU] Intel Sapphire Rapids HBM support needs CONFIG_NUMA_EMU
2025067 Lunar update: v6.2.15 upstream stable release
2025066 Lunar update: v6.2.14 upstream stable release
CVE-2023-35001 Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or
CVE-2023-31248 Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active a
CVE-2023-3269 A vulnerability exists in the memory management subsystem of the Linux ...
CVE-2023-3141 A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker



About   -   Send Feedback to @ubuntu_updates