UbuntuUpdates.org

Package "linux-image-unsigned-5.19.0-1022-oracle"

Name: linux-image-unsigned-5.19.0-1022-oracle

Description:

Oracle Linux kernel image for version 5.19.0 on 64 bit x86 SMP

Latest version: 5.19.0-1022.25~22.04.1
Release: jammy (22.04)
Level: updates
Repository: universe
Head package: linux-oracle-5.19

Links


Download "linux-image-unsigned-5.19.0-1022-oracle"


Other versions of "linux-image-unsigned-5.19.0-1022-oracle" in Jammy

Repository Area Version
security universe 5.19.0-1022.25~22.04.1

Changelog

Version: 5.19.0-1022.25~22.04.1 2023-05-16 22:07:16 UTC

  linux-oracle-5.19 (5.19.0-1022.25~22.04.1) jammy; urgency=medium

  * jammy/linux-oracle-5.19: 5.19.0-1022.25~22.04.1 -proposed tracker
    (LP: #2016643)

  * CVE-2023-1829
    - [Config]: Make sure CONFIG_NET_CLS_TCINDEX is not available

  [ Ubuntu: 5.19.0-1022.25 ]

  * kinetic/linux-oracle: 5.19.0-1022.25 -proposed tracker (LP: #2016644)
  * CVE-2023-1829
    - [Config]: Make sure CONFIG_NET_CLS_TCINDEX is not available
  * kinetic/linux: 5.19.0-41.42 -proposed tracker (LP: #2016651)
  * CVE-2023-1829
    - net/sched: Retire tcindex classifier
    - [Config]: Make sure CONFIG_NET_CLS_TCINDEX is not available
  * CVE-2023-0386
    - ovl: fail on invalid uid/gid mapping at copy up

 -- Thadeu Lima de Souza Cascardo <email address hidden> Sun, 23 Apr 2023 19:01:55 -0300

CVE-2023-0386 A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s



About   -   Send Feedback to @ubuntu_updates