UbuntuUpdates.org

Package "linux-azure-5.13-cloud-tools-5.13.0-1031"

Name: linux-azure-5.13-cloud-tools-5.13.0-1031

Description:

Linux kernel version specific cloud tools for version 5.13.0-1031

Latest version: 5.13.0-1031.37~20.04.1
Release: focal (20.04)
Level: security
Repository: main
Head package: linux-azure-5.13

Links


Download "linux-azure-5.13-cloud-tools-5.13.0-1031"


Other versions of "linux-azure-5.13-cloud-tools-5.13.0-1031" in Focal

Repository Area Version
updates main 5.13.0-1031.37~20.04.1

Changelog

Version: 5.13.0-1031.37~20.04.1 2022-06-15 21:06:27 UTC

  linux-azure-5.13 (5.13.0-1031.37~20.04.1) focal; urgency=medium

  [ Ubuntu: 5.13.0-1031.37 ]

  * CVE-2022-21123 // CVE-2022-21125 // CVE-2022-21166
    - Documentation: Add documentation for Processor MMIO Stale Data
    - x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug
    - x86/speculation: Add a common function for MD_CLEAR mitigation update
    - x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
    - x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations
    - x86/speculation/mmio: Enable CPU Fill buffer clearing on idle
    - x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data
    - x86/speculation/srbds: Update SRBDS mitigation selection
    - x86/speculation/mmio: Reuse SRBDS mitigation for SBDS
    - KVM: x86/speculation: Disable Fill buffer clear within guests
    - x86/speculation/mmio: Print SMT warning

 -- Thadeu Lima de Souza Cascardo <email address hidden> Mon, 13 Jun 2022 19:23:02 -0300

Source diff to previous version

Version: 5.13.0-1029.34~20.04.1 2022-06-10 09:06:51 UTC

  linux-azure-5.13 (5.13.0-1029.34~20.04.1) focal; urgency=medium

  * focal/linux-azure-5.13: 5.13.0-1029.34~20.04.1 -proposed tracker
    (LP: #1978001)

  * prevent kernel panic with overlayfs + shiftfs (LP: #1973620)
    - SAUCE: overlayfs: prevent dereferencing struct file in ovl_vm_prfile_set()

  * Bump the ABI to avoid issues with the shared modules patch - rtg.
    Reuse the tracking bug.

 -- Khalid Elmously <email address hidden> Wed, 08 Jun 2022 17:53:33 -0400

Source diff to previous version
1973620 prevent kernel panic with overlayfs + shiftfs

Version: 5.13.0-1028.33~20.04.1 2022-06-08 11:06:25 UTC

  linux-azure-5.13 (5.13.0-1028.33~20.04.1) focal; urgency=medium

  [ Ubuntu: 5.13.0-1028.33 ]

  * CVE-2022-1972
    - netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
  * CVE-2022-1966
    - netfilter: nf_tables: disallow non-stateful expression in sets earlier

 -- Thadeu Lima de Souza Cascardo <email address hidden> Fri, 03 Jun 2022 11:40:19 -0300

Source diff to previous version
CVE-2022-1966 A use-after-free vulnerability was found in the Linux kernel's Netfilt ...

Version: 5.13.0-1025.29~20.04.1 2022-05-24 23:06:24 UTC

  linux-azure-5.13 (5.13.0-1025.29~20.04.1) focal; urgency=medium

  * focal/linux-azure-5.13: 5.13.0-1025.29~20.04.1 -proposed tracker
    (LP: #1973930)

  * Packaging resync (LP: #1786013)
    - [Packaging] update variants

  [ Ubuntu: 5.13.0-1025.29 ]

  * impish/linux-azure: 5.13.0-1025.29 -proposed tracker (LP: #1973931)
  * impish/linux: 5.13.0-44.49 -proposed tracker (LP: #1973941)
  * CVE-2022-29581
    - net/sched: cls_u32: fix netns refcount changes in u32_change()
  * Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP
    option (LP: #1972740)
    - ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE
  * ext4: limit length to bitmap_maxbytes (LP: #1972281)
    - ext4: limit length to bitmap_maxbytes - blocksize in punch_hole

 -- Tim Gardner <email address hidden> Thu, 19 May 2022 08:32:49 -0600

Source diff to previous version
1786013 Packaging resync
1972740 Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option
1972281 ext4: limit length to bitmap_maxbytes
CVE-2022-29581 Improper Update of Reference Count vulnerability in net/sched of Linux ...

Version: 5.13.0-1023.27~20.04.1 2022-05-11 12:06:28 UTC

  linux-azure-5.13 (5.13.0-1023.27~20.04.1) focal; urgency=medium

  * focal/linux-azure-5.13: 5.13.0-1023.27~20.04.1 -proposed tracker
    (LP: #1969003)

  [ Ubuntu: 5.13.0-1023.27 ]

  * impish/linux-azure: 5.13.0-1023.27 -proposed tracker (LP: #1969004)
  * Impish update: upstream stable patchset 2022-03-22 (LP: #1966021)
    - azure: updateconfigs for FRAMEBUFFER_CONSOLE_LEGACY_ACCELERATION
  * linux-azure: Harmonize arm64 config settings with amd64 (LP: #1968900)
    - [Config] azure: Harmonize arm64 config settings with amd64
    - [Config] azure: do_enforce_all=true
    - [Config] azure: Ignore module movements
  * linux-azure: add check to prevent attempting to resize an fs with
    sparse_super2 (LP: #1970223)
    - ext4: add check to prevent attempting to resize an fs with sparse_super2
  * impish/linux: 5.13.0-41.46 -proposed tracker (LP: #1969014)
  * NVMe devices fail to probe due to ACPI power state change (LP: #1942624)
    - ACPI: power: Rework turning off unused power resources
    - ACPI: PM: Do not turn off power resources in unknown state
  * Recent 5.13 kernel has broken KVM support (LP: #1966499)
    - KVM: Add infrastructure and macro to mark VM as bugged
    - KVM: x86: Use KVM_BUG/KVM_BUG_ON to handle bugs that are fatal to the VM
    - KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled
  * LRMv6: add multi-architecture support (LP: #1968774)
    - [Packaging] resync dkms-build{,--nvidia-N}
  * io_uring regression - lost write request (LP: #1952222)
    - io-wq: split bounded and unbounded work into separate lists
  * xfrm interface cannot be changed anymore (LP: #1968591)
    - xfrm: fix the if_id check in changelink
  * Use kernel-testing repo from launchpad for ADT tests (LP: #1968016)
    - [Debian] Use kernel-testing repo from launchpad
  * vmx_ldtr_test in ubuntu_kvm_unit_tests failed (FAIL: Expected 0 for L1 LDTR
    selector (got 50)) (LP: #1956315)
    - KVM: nVMX: Set LDTR to its architecturally defined value on nested VM-Exit
  * audio from external sound card is distorted (LP: #1966066)
    - ALSA: usb-audio: Fix packet size calculation regression
  * Impish update: upstream stable patchset 2022-04-12 (LP: #1968771)
    - cgroup/cpuset: Fix a race between cpuset_attach() and cpu hotplug
    - btrfs: tree-checker: check item_size for inode_item
    - btrfs: tree-checker: check item_size for dev_item
    - clk: jz4725b: fix mmc0 clock gating
    - vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
    - parisc/unaligned: Fix fldd and fstd unaligned handlers on 32-bit kernel
    - parisc/unaligned: Fix ldw() and stw() unalignment handlers
    - KVM: x86/mmu: make apf token non-zero to fix bug
    - drm/amdgpu: disable MMHUB PG for Picasso
    - drm/i915: Correctly populate use_sagv_wm for all pipes
    - sr9700: sanity check for packet length
    - USB: zaurus: support another broken Zaurus
    - CDC-NCM: avoid overflow in sanity checking
    - x86/fpu: Correct pkru/xstate inconsistency
    - tee: export teedev_open() and teedev_close_context()
    - optee: use driver internal tee_context for some rpc
    - ping: remove pr_err from ping_lookup
    - perf data: Fix double free in perf_session__delete()
    - bnx2x: fix driver load from initrd
    - bnxt_en: Fix active FEC reporting to ethtool
    - hwmon: Handle failure to register sensor with thermal zone correctly
    - bpf: Do not try bpf_msg_push_data with len 0
    - selftests: bpf: Check bpf_msg_push_data return value
    - bpf: Add schedule points in batch ops
    - io_uring: add a schedule point in io_add_buffers()
    - net: __pskb_pull_tail() & pskb_carve_frag_list() drop_monitor friends
    - tipc: Fix end of loop tests for list_for_each_entry()
    - gso: do not skip outer ip header in case of ipip and net_failover
    - openvswitch: Fix setting ipv6 fields causing hw csum failure
    - drm/edid: Always set RGB444
    - net/mlx5e: Fix wrong return value on ioctl EEPROM query failure
    - net/sched: act_ct: Fix flow table lookup after ct clear or switching zones
    - net: ll_temac: check the return value of devm_kmalloc()
    - net: Force inlining of checksum functions in net/checksum.h
    - nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()
    - netfilter: nf_tables: fix memory leak during stateful obj update
    - net/smc: Use a mutex for locking "struct smc_pnettable"
    - surface: surface3_power: Fix battery readings on batteries without a serial
      number
    - udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister()
    - net/mlx5: Fix possible deadlock on rule deletion
    - net/mlx5: Fix wrong limitation of metadata match on ecpf
    - net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets
    - spi: spi-zynq-qspi: Fix a NULL pointer dereference in
      zynq_qspi_exec_mem_op()
    - regmap-irq: Update interrupt clear register for proper reset
    - RDMA/rtrs-clt: Fix possible double free in error case
    - RDMA/rtrs-clt: Move free_permit from free_clt to rtrs_clt_close
    - configfs: fix a race in configfs_{,un}register_subsystem()
    - RDMA/ib_srp: Fix a deadlock
    - tracing: Have traceon and traceoff trigger honor the instance
    - iio: adc: men_z188_adc: Fix a resource leak in an error handling path
    - iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits
    - iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot
    - iio: Fix error handling for PM
    - sc16is7xx: Fix for incorrect data being transmitted
    - ata: pata_hpt37x: disable primary channel on HPT371
    - Revert "USB: serial: ch341: add new Product ID for CH341A"
    - usb: gadget: rndis: add spinlock for rndis response list
    - tracefs: Set the group ownership in apply_options() not parse_options()
    - USB: serial: option: add support for DW5829e
    - USB: serial: option: add Telit LE910R1 compositions
    - usb: dwc3: pci: Fix Bay Trail phy GPIO mappings
    - usb: dwc3: gadget: Let t

1966021 Impish update: upstream stable patchset 2022-03-22
1968900 linux-azure: Harmonize arm64 config settings with amd64
1970223 linux-azure: add check to prevent attempting to resize an fs with sparse_super2
1942624 NVMe devices fail to probe due to ACPI power state change
1966499 Recent 5.13 kernel has broken KVM support
1968774 LRMv6: add multi-architecture support
1968591 xfrm interface cannot be changed anymore
1966066 audio from external sound card is distorted
1968771 Impish update: upstream stable patchset 2022-04-12
1968223 Impish update: upstream stable patchset 2022-04-07
1967439 Impish update: upstream stable patchset 2022-03-31
1965589 Impish update: upstream stable patchset 2022-03-18
1968210 USB devices not detected during boot on USB 3.0 hubs
CVE-2022-27223 In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host f
CVE-2022-26490 st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of
CVE-2021-26401 LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.
CVE-2022-0001 Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable



About   -   Send Feedback to @ubuntu_updates