UbuntuUpdates.org

Package "linux-oem-5.6"




Name: linux-oem-5.6

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: focal (20.04)
Level: proposed
Repository: main

Links



Other versions of "linux-oem-5.6" in Focal

Repository Area Version
base main 5.6.0-1007.7
security main 5.6.0-1056.60
updates main 5.6.0-1056.60
PPA: Canonical Kernel Team 5.6.0-1057.61

Changelog

Version: 5.6.0-1055.59 2021-04-18 11:06:20 UTC

  linux-oem-5.6 (5.6.0-1055.59) focal; urgency=medium

  * focal/linux-oem-5.6: 5.6.0-1055.59 -proposed tracker (LP: #1924646)

  * setting extended attribute may cause memory leak (LP: #1924611)
    - SAUCE: vfs_setxattr: free converted value if xattr_permission returns error

 -- Stefan Bader <email address hidden> Fri, 16 Apr 2021 10:28:23 +0200


Version: *DELETED* 2021-04-16 22:06:36 UTC
No changelog for deleted or moved packages.

Version: 5.6.0-1053.57 2021-04-10 00:06:26 UTC

  linux-oem-5.6 (5.6.0-1053.57) focal; urgency=medium

  * focal/linux-oem-5.6: 5.6.0-1053.57 -proposed tracker (LP: #1921042)

  * Packaging resync (LP: #1786013)
    - update dkms package versions

  * LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key
    (LP: #1918134)
    - [Packaging] sync dkms-build et al from LRMv4

  * CVE-2021-29154
    - SAUCE: bpf, x86: Validate computation of branch displacements for x86-64
    - SAUCE: bpf, x86: Validate computation of branch displacements for x86-32

  * xfrm_policy.sh in net from ubuntu_kernel_selftests passed with failed sub-
    cases (LP: #1909647)
    - selftests: xfrm: fix test return value override issue in xfrm_policy.sh

  * ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255
    on F-oem-5.6 (LP: #1919147)
    - selftests: net: ip_defrag: modprobe missing nf_defrag_ipv6 support

  * l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
    "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on
    F-OEM-5.6 (LP: #1919277)
    - l2tp: remove skb_dst_set() from l2tp_xmit_skb()

  * CVE-2020-0466
    - epoll: Keep a reference on files added to the check list
    - do_epoll_ctl(): clean the failure exits up a bit
    - fix regression in "epoll: Keep a reference on files added to the check list"

  * CVE-2021-3178
    - nfsd4: readdirplus shouldn't return parent of export

  * CVE-2020-25285
    - mm/hugetlb: fix a race between hugetlb sysctl handlers

  * CVE-020-10781
    - Revert "zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()"

  * CVE-2020-14351
    - perf/core: Fix race in the perf_mmap_close() function

  * CVE-2020-25669
    - Input: sunkbd - avoid use-after-free in teardown paths

  * CVE-2020-14390
    - fbcon: remove soft scrollback code

  * CVE-2021-3411
    - x86/kprobes: Fix optprobe to detect INT3 padding correctly

  * CVE-2020-0423
    - binder: fix UAF when releasing todo list

  * CVE-2020-27830
    - speakup: Reject setting the speakup line discipline outside of speakup

  * CVE-2020-0465
    - HID: core: Correctly handle ReportSize being zero
    - HID: core: Sanitize event code and type when mapping input

  * CVE-2020-25645
    - geneve: add transport ports in route lookup for geneve

  * CVE-2021-20194
    - bpf, cgroup: Fix optlen WARN_ON_ONCE toctou
    - bpf, cgroup: Fix problematic bounds check

  * CVE-2020-36158
    - mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start

 -- Stefan Bader <email address hidden> Fri, 09 Apr 2021 16:43:44 +0200

1786013 Packaging resync
1918134 LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key
1919147 ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255 on F-oem-5.6
1919277 l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with \
CVE-2021-29154 BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect c ...
CVE-2020-0466 In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation o
CVE-2021-3178 ** DISPUTED ** fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote att
CVE-2020-25285 A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory,
CVE-2020-14351 perf: Fix race in perf_mmap_close function
CVE-2020-14390 A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory
CVE-2021-3411 A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linki
CVE-2020-0423 In binder_release_work of binder.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in t
CVE-2020-27830 Linux kernel NULL-ptr deref bug in spk_ttyio_receive_buf2
CVE-2020-0465 In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of
CVE-2020-25645 A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to
CVE-2021-20194 heap overflow in __cgroup_bpf_run_filter_getsockopt()
CVE-2020-36158 mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to exe

Version: *DELETED* 2021-03-25 16:07:17 UTC
No changelog for deleted or moved packages.

Version: 5.6.0-1050.54 2021-03-12 18:07:00 UTC

  linux-oem-5.6 (5.6.0-1050.54) focal; urgency=medium

  * focal/linux-oem-5.6: 5.6.0-1050.54 -proposed tracker (LP: #1918665)

  * Please trust Canonical Livepatch Service kmod signing key (LP: #1898716)
    - [Config] enable CONFIG_MODVERSIONS=y
    - [Packaging] build canonical-certs.pem from branch/arch certs
    - [Config] add Canonical Livepatch Service key to SYSTEM_TRUSTED_KEYS
    - [Config] add ubuntu-drivers key to SYSTEM_TRUSTED_KEYS
    - [Config] Allow ASM_MODVERSIONS and MODULE_REL_CRCS

 -- Timo Aaltonen <email address hidden> Thu, 11 Mar 2021 20:32:01 +0200

1898716 Please trust Canonical Livepatch Service kmod signing key



About   -   Send Feedback to @ubuntu_updates