UbuntuUpdates.org

Package "linux-cloud-tools-4.15.0-213"

Name: linux-cloud-tools-4.15.0-213

Description:

Linux kernel version specific cloud tools for version 4.15.0-213

Latest version: 4.15.0-213.224
Release: bionic (18.04)
Level: updates
Repository: main
Head package: linux

Links


Download "linux-cloud-tools-4.15.0-213"


Other versions of "linux-cloud-tools-4.15.0-213" in Bionic

Repository Area Version
security main 4.15.0-213.224

Changelog

Version: 4.15.0-213.224 2023-06-28 14:07:00 UTC

  linux (4.15.0-213.224) bionic; urgency=medium

  * bionic/linux: 4.15.0-213.224 -proposed tracker (LP: #2024234)

  * Kernel warning after upgrade to 4.15.0.211.194 (LP: #2020279)
    - net: Remove WARN_ON_ONCE(sk->sk_forward_alloc) from sk_stream_kill_queues().

 -- Thadeu Lima de Souza Cascardo <email address hidden> Fri, 16 Jun 2023 14:32:39 -0300

Source diff to previous version
2020279 Kernel warning after upgrade to 4.15.0.211.194

Version: 4.15.0-212.223 2023-05-31 11:07:12 UTC

  linux (4.15.0-212.223) bionic; urgency=medium

  * bionic/linux: 4.15.0-212.223 -proposed tracker (LP: #2019708)

  * Packaging resync (LP: #1786013)
    - [Packaging] update helper scripts

  * CVE-2023-32233
    - netfilter: nf_tables: add nft_set_is_anonymous() helper
    - netfilter: nf_tables: split set destruction in deactivate and destroy phase
    - netfilter: nf_tables: unbind set in rule from commit path
    - netfilter: nf_tables: bogus EBUSY in helper removal from transaction
    - netfilter: nf_tables: fix set double-free in abort path
    - netfilter: nf_tables: bogus EBUSY when deleting set after flush
    - netfilter: nf_tables: use-after-free in failing rule with bound set
    - netfilter: nf_tables: deactivate anonymous set from preparation phase

  * CVE-2023-31436
    - net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg

  * CVE-2023-1380
    - wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()

  * CVE-2023-30456
    - KVM: nVMX: add missing consistency checks for CR0 and CR4

 -- Thadeu Lima de Souza Cascardo <email address hidden> Tue, 23 May 2023 09:17:00 -0300

Source diff to previous version
1786013 Packaging resync
CVE-2023-32233 In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and
CVE-2023-31436 qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.
CVE-2023-1380 A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel.
CVE-2023-30456 An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4.

Version: 4.15.0-211.222 2023-05-15 17:16:26 UTC

  linux (4.15.0-211.222) bionic; urgency=medium

  * bionic/linux: 4.15.0-211.222 -proposed tracker (LP: #2016623)

  * Debian autoreconstruct Fix restoration of execute permissions (LP: #2015498)
    - [Debian] autoreconstruct - fix restoration of execute permissions

  * kernel: fix __clear_user() inline assembly constraints (LP: #2013088)
    - s390/uaccess: add missing earlyclobber annotations to __clear_user()

  * Fix selftests/ftracetests/Meta-selftests (LP: #2006453)
    - selftests/ftrace: Fix bash specific "==" operator

  * Bionic update: upstream stable patchset 2023-04-05 (LP: #2015399)
    - firewire: fix memory leak for payload of request subaction to IEC 61883-1
      FCP region
    - bus: sunxi-rsb: Fix error handling in sunxi_rsb_init()
    - ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path()
    - netrom: Fix use-after-free caused by accept on already connected socket
    - squashfs: harden sanity check in squashfs_read_xattr_id_table
    - sctp: do not check hb_timer.expires when resetting hb_timer
    - net: openvswitch: fix flow memory leak in ovs_flow_cmd_new
    - scsi: target: core: Fix warning on RT kernels
    - scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
    - net/x25: Fix to not accept on connected socket
    - usb: gadget: f_fs: Fix unbalanced spinlock in __ffs_ep0_queue_wait
    - fbcon: Check font dimension limits
    - watchdog: diag288_wdt: do not use stack buffers for hardware data
    - watchdog: diag288_wdt: fix __diag288() inline assembly
    - efi: Accept version 2 of memory attributes table
    - iio: hid: fix the retval in accel_3d_capture_sample
    - iio: adc: berlin2-adc: Add missing of_node_put() in error path
    - iio:adc:twl6030: Enable measurements of VUSB, VBAT and others
    - parisc: Fix return code of pdc_iodc_print()
    - parisc: Wire up PTRACE_GETREGS/PTRACE_SETREGS for compat case
    - mm: hugetlb: proc: check for hugetlb shared PMD in /proc/PID/smaps
    - mm/swapfile: add cond_resched() in get_swap_pages()
    - Squashfs: fix handling and sanity checking of xattr_ids count
    - serial: 8250_dma: Fix DMA Rx completion race
    - serial: 8250_dma: Fix DMA Rx rearm race
    - btrfs: limit device extents to the device size
    - ALSA: emux: Avoid potential array out-of-bound in snd_emux_xg_control()
    - ALSA: pci: lx6464es: fix a debug loop
    - pinctrl: aspeed: Fix confusing types in return value
    - pinctrl: single: fix potential NULL dereference
    - net: USB: Fix wrong-direction WARNING in plusb.c
    - usb: core: add quirk for Alcor Link AK9563 smartcard reader
    - migrate: hugetlb: check for hugetlb shared PMD in node migration
    - tools/virtio: fix the vringh test for virtio ring changes
    - net/rose: Fix to not accept on connected socket
    - nvme-fc: fix a missing queue put in nvmet_fc_ls_create_association
    - aio: fix mremap after fork null-deref
    - mmc: sdio: fix possible resource leaks in some error paths
    - ALSA: hda/conexant: add a new hda codec SN6180
    - hugetlb: check for undefined shift on 32 bit architectures
    - revert "squashfs: harden sanity check in squashfs_read_xattr_id_table"
    - i40e: add double of VLAN header when computing the max MTU
    - net: bgmac: fix BCM5358 support by setting correct flags
    - dccp/tcp: Avoid negative sk_forward_alloc by ipv6_pinfo.pktoptions.
    - net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
    - net: stmmac: Restrict warning on disabling DMA store and fwd mode
    - ipv6: Fix datagram socket connection with DSCP.
    - ipv6: Fix tcp socket connection with DSCP.
    - i40e: Add checking for null for nlmsg_find_attr()
    - kvm: initialize all of the kvm_debugregs structure before sending it to
      userspace
    - nilfs2: fix underflow in second superblock position calculations
    - ata: libata: Fix sata_down_spd_limit() when no link speed is reported
    - vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
    - thermal: intel: int340x: Protect trip temperature from concurrent updates
    - iio:adc:twl6030: Enable measurement of VAC
    - IB/hfi1: Restore allocated resources on failed copyout
    - net: phy: meson-gxl: use MMD access dummy stubs for GXL, internal PHY
    - riscv: Fixup race condition on PG_dcache_clean in flush_icache_pte
    - arm64: dts: meson-gx: Make mmc host controller interrupts level-sensitive
    - wifi: rtl8xxxu: gen2: Turn on the rate control
    - powerpc: dts: t208x: Mark MAC1 and MAC2 as 10G
    - random: always mix cycle counter in add_latent_entropy()
    - powerpc: dts: t208x: Disable 10G on MAC1 and MAC2
    - alarmtimer: Prevent starvation by small intervals and SIG_IGN
    - uaccess: Add speculation barrier to copy_from_user()
    - wifi: mwifiex: Add missing compatible string for SD8787
    - bpf: add missing header file include
    - vc_screen: don't clobber return value in vcs_read
    - dmaengine: sh: rcar-dmac: Check for error num after dma_set_max_seg_size

  * CVE-2023-1118
    - media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()

 -- Luke Nowakowski-Krijger <email address hidden> Tue, 18 Apr 2023 11:29:54 -0700

Source diff to previous version
2015498 Debian autoreconstruct Fix restoration of execute permissions
2013088 kernel: fix __clear_user() inline assembly constraints
2006453 Fix selftests/ftracetests/Meta-selftests in Focal
2015399 Bionic update: upstream stable patchset 2023-04-05
CVE-2023-1118 A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user

Version: 4.15.0-210.221 2023-04-26 22:07:17 UTC

  linux (4.15.0-210.221) bionic; urgency=medium

  * bionic/linux: 4.15.0-210.221 -proposed tracker (LP: #2016738)

  * CVE-2023-1829
    - net/sched: Retire tcindex classifier
    - [Config]: Make sure CONFIG_NET_CLS_TCINDEX is not available

 -- Thadeu Lima de Souza Cascardo <email address hidden> Mon, 17 Apr 2023 17:55:50 -0300

Source diff to previous version

Version: 4.15.0-209.220 2023-04-18 12:07:32 UTC

  linux (4.15.0-209.220) bionic; urgency=medium

  * bionic/linux: 4.15.0-209.220 -proposed tracker (LP: #2011989)

  * CVE-2023-26545
    - net: mpls: fix stale pointer if allocation fails during device rename

  * CVE-2023-1281
    - rcu: Upgrade rcu_swap_protected() to rcu_replace_pointer()
    - net/sched: tcindex: update imperfect hash filters respecting rcu

  * CVE-2022-3903
    - USB: add usb_control_msg_send() and usb_control_msg_recv()
    - USB: correct API of usb_control_msg_send/recv
    - USB: move snd_usb_pipe_sanity_check into the USB core
    - media: mceusb: Use new usb_control_msg_*() routines

  * Bionic update: upstream stable patchset 2023-03-03 (LP: #2009237)
    - pNFS/filelayout: Fix coalescing test for single DS
    - net/ethtool/ioctl: return -EOPNOTSUPP if we have no phy stats
    - RDMA/srp: Move large values to a new enum for gcc13
    - f2fs: let's avoid panic if extent_tree is not created
    - nilfs2: fix general protection fault in nilfs_btree_insert()
    - xhci-pci: set the dma max_seg_size
    - usb: xhci: Check endpoint is valid before dereferencing it
    - prlimit: do_prlimit needs to have a speculation check
    - USB: serial: option: add Quectel EM05-G (GR) modem
    - USB: serial: option: add Quectel EM05-G (CS) modem
    - USB: serial: option: add Quectel EM05-G (RS) modem
    - USB: serial: option: add Quectel EC200U modem
    - USB: serial: option: add Quectel EM05CN (SG) modem
    - USB: serial: option: add Quectel EM05CN modem
    - USB: misc: iowarrior: fix up header size for USB_DEVICE_ID_CODEMERCS_IOW100
    - usb: core: hub: disable autosuspend for TI TUSB8041
    - USB: serial: cp210x: add SCALANCE LPE-9000 device id
    - usb: host: ehci-fsl: Fix module alias
    - usb: gadget: g_webcam: Send color matching descriptor per frame
    - usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate()
    - usb-storage: apply IGNORE_UAS only for HIKSEMI MD202 on RTL9210
    - serial: pch_uart: Pass correct sg to dma_unmap_sg()
    - serial: atmel: fix incorrect baudrate setup
    - gsmi: fix null-deref in gsmi_get_variable
    - comedi: adv_pci1760: Fix PWM instruction handling
    - ARM: dts: imx6qdl-gw560x: Remove incorrect 'uart-has-rtscts'
    - HID: intel_ish-hid: Add check for ishtp_dma_tx_map
    - EDAC/highbank: Fix memory leak in highbank_mc_probe()
    - tomoyo: fix broken dependency on *.conf.default
    - IB/hfi1: Reject a zero-length user expected buffer
    - IB/hfi1: Reserve user expected TIDs
    - affs: initialize fsdata in affs_truncate()
    - amd-xgbe: TX Flow Ctrl Registers are h/w ver dependent
    - phy: rockchip-inno-usb2: Fix missing clk_disable_unprepare() in
      rockchip_usb2phy_power_on()
    - net: nfc: Fix use-after-free in local_cleanup()
    - net: usb: sr9700: Handle negative len
    - net: mdio: validate parameter addr in mdiobus_get_phy()
    - HID: check empty report_list in hid_validate_values()
    - usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait
    - usb: gadget: f_fs: Ensure ep0req is dequeued before free_request
    - net: mlx5: eliminate anonymous module_init & module_exit
    - dmaengine: Fix double increment of client_count in dma_chan_get()
    - HID: betop: check shape of output reports
    - w1: fix deadloop in __w1_remove_master_device()
    - w1: fix WARNING after calling w1_process()
    - fs: reiserfs: remove useless new_opts in reiserfs_remount
    - Bluetooth: hci_sync: cancel cmd_timer if hci_open failed
    - scsi: hpsa: Fix allocation size for scsi_host_alloc()
    - module: Don't wait for GOING modules
    - tracing: Make sure trace_printk() can output as soon as it can be used
    - ARM: 9280/1: mm: fix warning on phys_addr_t to void pointer assignment
    - EDAC/device: Respect any driver-supplied workqueue polling value
    - netlink: annotate data races around dst_portid and dst_group
    - netlink: annotate data races around sk_state
    - netfilter: conntrack: fix vtag checks for ABORT/SHUTDOWN_COMPLETE
    - netrom: Fix use-after-free of a listening socket.
    - sctp: fail if no bound addresses can be used for a given scope
    - net: ravb: Fix possible hang if RIS2_QFF1 happen
    - net/tg3: resolve deadlock in tg3_reset_task() during EEH
    - Revert "Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to RMI
      mode"
    - x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL
    - xen: Fix up build warning with xen_init_time_ops() reference
    - x86/asm: Fix an assembler warning with current binutils
    - x86/entry/64: Add instruction suffix to SYSRET
    - sysctl: add a new register_sysctl_init() interface
    - panic: unset panic_on_warn inside panic()
    - exit: Add and use make_task_dead.
    - objtool: Add a missing comma to avoid string concatenation
    - hexagon: Fix function name in die()
    - h8300: Fix build errors from do_exit() to make_task_dead() transition
    - ia64: make IA64_MCA_RECOVERY bool instead of tristate
    - exit: Put an upper limit on how often we can oops
    - exit: Expose "oops_count" to sysfs
    - exit: Allow oops_limit to be disabled
    - panic: Consolidate open-coded panic_on_warn checks
    - panic: Introduce warn_limit
    - panic: Expose "warn_count" to sysfs
    - exit: Use READ_ONCE() for all oops/warn limit reads
    - mm: kvmalloc does not fallback to vmalloc for incompatible gfp flags
    - ipv6: ensure sane device mtu in tunnels
    - usb: host: xhci-plat: add wakeup entry at sysfs
    - amd-xgbe: Delay AN timeout during KR training
    - tcp: avoid the lookup process failing to get sk in ehash table
    - net: fix UaF in netns ops registration error path
    - netlink: annotate data races around nlk->portid
    - ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()

  * rtcpie in timers from ubuntu_kernel_selftests randomly failing
    (LP: #1814234)
    - SAUCE: selftest: rtctest: Fix force-passing unreliable subtest

 -- Luke Nowakowski-Krijger <email address hidden>

2009237 Bionic update: upstream stable patchset 2023-03-03
1814234 rtcpie in timers from ubuntu_kernel_selftests randomly failing
CVE-2023-26545 In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a
CVE-2023-1281 RESERVED
CVE-2022-3903 An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicio



About   -   Send Feedback to @ubuntu_updates