Package "linux-oem-5.14"
WARNING: the "linux-oem-5.14" package was deleted from this repository
Name: |
linux-oem-5.14
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
|
Latest version: |
*DELETED* |
Release: |
focal (20.04) |
Level: |
proposed |
Repository: |
main |
Links
Other versions of "linux-oem-5.14" in Focal
Changelog
linux-oem-5.14 (5.14.0-1057.64) focal; urgency=medium
* focal/linux-oem-5.14: 5.14.0-1057.64 -proposed tracker (LP: #2003500)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (main/2023.01.02)
* CVE-2022-3545
- nfp: fix use-after-free in area_cache_get()
* CVE-2022-42895
- Bluetooth: L2CAP: Fix attempting to access uninitialized memory
* CVE-2022-4139
- drm/i915/gt: Serialize TLB invalidates with GT resets
- drm/i915: fix TLB invalidation for Gen12 video and compute engines
* Revoke & rotate to new signing key (LP: #2002812)
- [Packaging] Revoke and rotate to new signing key
* CVE-2023-0179
- netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits
-- Timo Aaltonen <email address hidden> Mon, 23 Jan 2023 12:34:55 +0200
|
1786013 |
Packaging resync |
2002812 |
Revoke \u0026 rotate to new signing key |
CVE-2022-3545 |
A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file |
CVE-2022-42895 |
There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel |
CVE-2023-0179 |
netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits |
|
No changelog for deleted or moved packages.
|
linux-oem-5.14 (5.14.0-1056.63) focal; urgency=medium
* focal/linux-oem-5.14: 5.14.0-1056.63 -proposed tracker (LP: #1997836)
* CVE-2022-4378
- proc: proc_skip_spaces() shouldn't think it is working on C strings
- proc: avoid integer type confusion in get_proc_long
* CVE-2022-45934
- Bluetooth: L2CAP: Fix u8 overflow
* CVE-2022-42896
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
* Fix AMD-PState driver for Genoa CPU (LP: #1998106)
- Documentation: amd-pstate: add tracer tool introduction
- Documentation: amd-pstate: grammar and sentence structure updates
- Documentation: amd-pstate: Add unit test introduction
- cpufreq: amd-pstate: cpufreq: amd-pstate: reset MSR_AMD_PERF_CTL register at
init
- cpufreq: amd-pstate: change amd-pstate driver to be built-in type
- cpufreq: amd-pstate: add amd-pstate driver parameter for mode selection
- Documentation: amd-pstate: add driver working mode introduction
- Documentation: add amd-pstate kernel command line options
-- Timo Aaltonen <email address hidden> Fri, 16 Dec 2022 16:23:14 +0200
|
CVE-2022-45934 |
An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_R |
CVE-2022-42896 |
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which ma |
|
No changelog for deleted or moved packages.
|
linux-oem-5.14 (5.14.0-1053.60) focal; urgency=medium
* focal/linux-oem-5.14: 5.14.0-1053.60 -proposed tracker (LP: #1989893)
* CVE-2022-40768
- scsi: stex: Properly zero out the passthrough command structure
* Fix resume on AMD platforms when TBT monitor is plugged (LP: #1990920)
- drm/amd/display: Detect dpcd_rev when hotplug mst monitor
- drm/amd/display: Release remote dc_sink under mst scenario
* pcieport 0000:00:1b.0: PCIe Bus Error: severity=Uncorrected (Non-Fatal),
type=Transaction Layer, (Requester ID) (LP: #1988797)
- Revert "PCI: Make pci_enable_ptm() private"
- PCI: Add pcie_ptm_enabled()
- SAUCE: PCI/PTM: Cache PTM Capability offset
- SAUCE: PCI/PTM: Add pci_upstream_ptm() helper
- SAUCE: PCI/PTM: Separate configuration and enable
- SAUCE: PCI/PTM: Add pci_suspend_ptm() and pci_resume_ptm()
- SAUCE: PCI/PTM: Move pci_ptm_info() body into its only caller
- SAUCE: PCI/PTM: Preserve RsvdP bits in PTM Control register
- SAUCE: PCI/PTM: Reorder functions in logical order
- SAUCE: PCI/PTM: Consolidate PTM interface declarations
- SAUCE: PCI/PM: Always disable PTM for all devices during suspend
- SAUCE: PCI/PM: Simplify pci_pm_suspend_noirq()
* AMD Yellow Carp system hang on HDMI plug in/out over HP hook2 docking
(LP: #1991974)
- drm/amd/display: Fix for link encoder access for MST.
- drm/amd/display: Fix MST link encoder availability check.
- drm/amd/display: FEC configuration for dpia links
- drm/amd/display: FEC configuration for dpia links in MST mode
- drm/amd/display: Add work around for tunneled MST.
-- Timo Aaltonen <email address hidden> Fri, 07 Oct 2022 19:44:26 +0300
|
1990920 |
Fix resume on AMD platforms when TBT monitor is plugged |
1991974 |
AMD Yellow Carp system hang on HDMI plug in/out over HP hook2 docking |
CVE-2022-40768 |
drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecomman |
|
About
-
Send Feedback to @ubuntu_updates