UbuntuUpdates.org

Package "linux-starfive"

Name: linux-starfive

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Header files related to Linux kernel version 6.5.0
  • Header files related to Linux kernel version 6.5.0
  • Header files related to Linux kernel version 6.5.0
  • Header files related to Linux kernel version 6.5.0

Latest version: 6.5.0-1012.13
Release: mantic (23.10)
Level: updates
Repository: main

Links



Other versions of "linux-starfive" in Mantic

Repository Area Version
base main 6.5.0-1002.3
security main 6.5.0-1012.13
proposed main 6.5.0-1013.14
PPA: Canonical Kernel Team 6.5.0-1013.14

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 6.5.0-1007.8 2024-02-07 14:07:01 UTC

  linux-starfive (6.5.0-1007.8) mantic; urgency=medium

  * mantic/linux-starfive: 6.5.0-1007.8 -proposed tracker (LP: #2048368)

  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/2024.01.08)

  [ Ubuntu: 6.5.0-17.17 ]

  * mantic/linux: 6.5.0-17.17 -proposed tracker (LP: #2049026)
  * [UBUNTU 23.04] Regression: Ubuntu 23.04/23.10 do not include uvdevice
    anymore (LP: #2048919)
    - [Config] Enable S390_UV_UAPI (built-in)

  [ Ubuntu: 6.5.0-16.16 ]

  * mantic/linux: 6.5.0-16.16 -proposed tracker (LP: #2048372)
  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
    - [Packaging] resync update-dkms-versions helper
    - [Packaging] remove helper scripts
    - [Packaging] update annotations scripts
    - debian/dkms-versions -- update from kernel-versions (main/2024.01.08)
  * Add missing RPL P/U CPU IDs (LP: #2047398)
    - drm/i915/rpl: Update pci ids for RPL P/U
  * Fix BCM57416 lost after resume (LP: #2047518)
    - bnxt_en: Clear resource reservation during resume
  * Hotplugging SCSI disk in QEMU VM fails (LP: #2047382)
    - Revert "PCI: acpiphp: Reassign resources on bridge if necessary"
  * Update bnxt_en with bug fixes and support for Broadcom 5760X network
    adapters (LP: #2045796)
    - bnxt_en: use dev_consume_skb_any() in bnxt_tx_int
    - eth: bnxt: move and rename reset helpers
    - eth: bnxt: take the bit to set as argument of bnxt_queue_sp_work()
    - eth: bnxt: handle invalid Tx completions more gracefully
    - eth: bnxt: fix one of the W=1 warnings about fortified memcpy()
    - eth: bnxt: fix warning for define in struct_group
    - bnxt_en: Fix W=1 warning in bnxt_dcb.c from fortify memcpy()
    - bnxt_en: Fix W=stringop-overflow warning in bnxt_dcb.c
    - bnxt_en: Use the unified RX page pool buffers for XDP and non-XDP
    - bnxt_en: Let the page pool manage the DMA mapping
    - bnxt_en: Increment rx_resets counter in bnxt_disable_napi()
    - bnxt_en: Save ring error counters across reset
    - bnxt_en: Display the ring error counters under ethtool -S
    - bnxt_en: Add tx_resets ring counter
    - bnxt: use the NAPI skb allocation cache
    - bnxt_en: Update firmware interface to 1.10.2.171
    - bnxt_en: Enhance hwmon temperature reporting
    - bnxt_en: Move hwmon functions into a dedicated file
    - bnxt_en: Modify the driver to use hwmon_device_register_with_info
    - bnxt_en: Expose threshold temperatures through hwmon
    - bnxt_en: Use non-standard attribute to expose shutdown temperature
    - bnxt_en: Event handler for Thermal event
    - bnxt_en: Support QOS and TPID settings for the SRIOV VLAN
    - bnxt_en: Update VNIC resource calculation for VFs
    - Revert "bnxt_en: Support QOS and TPID settings for the SRIOV VLAN"
    - eth: bnxt: fix backward compatibility with older devices
    - bnxt_en: Do not call sleeping hwmon_notify_event() from NAPI
    - bnxt_en: Fix invoking hwmon_notify_event
    - bnxt_en: add infrastructure to lookup ethtool link mode
    - bnxt_en: support lane configuration via ethtool
    - bnxt_en: refactor speed independent ethtool modes
    - bnxt_en: Refactor NRZ/PAM4 link speed related logic
    - bnxt_en: convert to linkmode_set_bit() API
    - bnxt_en: extend media types to supported and autoneg modes
    - bnxt_en: Fix 2 stray ethtool -S counters
    - bnxt_en: Put the TX producer information in the TX BD opaque field
    - bnxt_en: Add completion ring pointer in TX and RX ring structures
    - bnxt_en: Restructure cp_ring_arr in struct bnxt_cp_ring_info
    - bnxt_en: Add completion ring pointer in TX and RX ring structures
    - bnxt_en: Remove BNXT_RX_HDL and BNXT_TX_HDL
    - bnxt_en: Refactor bnxt_tx_int()
    - bnxt_en: New encoding for the TX opaque field
    - bnxt_en: Refactor bnxt_hwrm_set_coal()
    - bnxt_en: Support up to 8 TX rings per MSIX
    - bnxt_en: Add helper to get the number of CP rings required for TX rings
    - bnxt_en: Add macros related to TC and TX rings
    - bnxt_en: Use existing MSIX vectors for all mqprio TX rings
    - bnxt_en: Optimize xmit_more TX path
    - bnxt_en: The caller of bnxt_alloc_ctx_mem() should always free bp->ctx
    - bnxt_en: Free bp->ctx inside bnxt_free_ctx_mem()
    - bnxt_en: Restructure context memory data structures
    - bnxt_en: Add page info to struct bnxt_ctx_mem_type
    - bnxt_en: Use the pg_info field in bnxt_ctx_mem_type struct
    - bnxt_en: Add bnxt_setup_ctxm_pg_tbls() helper function
    - bnxt_en: Add support for new backing store query firmware API
    - bnxt_en: Add support for HWRM_FUNC_BACKING_STORE_CFG_V2 firmware calls
    - bnxt_en: Add db_ring_mask and related macro to bnxt_db_info struct.
    - bnxt_en: Modify TX ring indexing logic.
    - bnxt_en: Modify RX ring indexing logic.
    - bnxt_en: Modify the NAPI logic for the new P7 chips
    - bnxt_en: Rename some macros for the P5 chips
    - bnxt_en: Fix backing store V2 logic
    - bnxt_en: Update firmware interface to 1.10.3.15
    - bnxt_en: Define basic P7 macros
    - bnxt_en: Consolidate DB offset calculation
    - bnxt_en: Implement the new toggle bit doorbell mechanism on P7 chips
    - bnxt_en: Refactor RSS capability fields
    - bnxt_en: Add new P7 hardware interface definitions
    - bnxt_en: Refactor RX VLAN acceleration logic.
    - bnxt_en: Refactor and refine bnxt_tpa_start() and bnxt_tpa_end().
    - bnxt_en: Add support for new RX and TPA_START completion types for P7
    - bnxt_en: Refactor ethtool speeds logic
    - bnxt_en: Support new firmware link parameters
    - bnxt_en: Support force speed using the new HWRM fields
    - bnxt_en: Report the new ethtool link modes in the new firmware interface
    - bnxt_en: Add 5760X (P7) PCI IDs
    - net: bnxt: fix a potential use-after-free in bnxt_init_tc
  * drm: Update file owner during use (LP: #2047461)
    - drm: Update file owner during use
  * CVE-2023-6622
    - netfilter: nf_tables: bail out on mismatching dynset and set expressi

Source diff to previous version
1786013 Packaging resync
2048919 [UBUNTU 23.04] Regression: Ubuntu 23.04/23.10 do not include uvdevice anymore
2047398 Add missing RPL P/U CPU IDs
2047518 Fix BCM57416 lost after resume
2047382 Hotplugging SCSI disk in QEMU VM fails
2045796 Update bnxt_en with bug fixes and support for Broadcom 5760X network adapters
2047461 drm: Update file owner during use
2044096 Support Cirrus CS35L41 codec on Dell Oasis 13/14/16 laptops
2048078 Add support of MTL audio of Lenovo
2047389 Fix AMDGPU crash on 6.5 kernel
2035971 linux tools packages for derived kernels refuse to install simultaneously due to libcpupower name collision
2045562 [Debian] autoreconstruct - Do not generate chmod -x for deleted files
2046269 Mantic update: v6.5.8 upstream stable release
2045806 Mantic update: v6.5.7 upstream stable release
2044512 Build failure if run in a console
2039151 Support speaker mute hotkey for Cirrus CS35L41 HDA codec
2043730 Update io_uring to 6.6
2041613 correct cephfs pull request for uidmap support
2043841 kernel BUG: io_uring openat triggers audit reference count underflow
2042853 [UBUNTU 23.04] Kernel config option missing for s390x PCI passthrough
2036600 Azure: Fix Azure vendor ID
2044174 Mantic update: v6.5.6 upstream stable release
2043416 Mantic update: v6.5.5 upstream stable release
2041999 Mantic update: v6.5.4 upstream stable release
CVE-2023-6622 A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue ma
CVE-2024-0193 A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is r
CVE-2023-6931 A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escala
CVE-2023-34324 linux/xen: Possible deadlock in Linux kernel event handling
CVE-2023-6932 A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition c
CVE-2023-6531 A use-after-free flaw was found in the Linux Kernel due to a race prob ...
CVE-2023-6606 An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker
CVE-2023-6817 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func
CVE-2023-46813 An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checki
CVE-2023-6111 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func
CVE-2023-5972 A null pointer dereference flaw was found in the nft_inner.c functionality of netfilter in the Linux kernel. This issue could allow a local user to c
CVE-2023-6176 A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a

Version: 6.5.0-1006.7 2024-01-24 23:07:00 UTC

  linux-starfive (6.5.0-1006.7) mantic; urgency=medium

  * mantic/linux-starfive: 6.5.0-1006.7 -proposed tracker (LP: #2048547)

  * Packaging resync (LP: #1786013)
    - [Packaging] remove helper scripts

  [ Ubuntu: 6.5.0-15.15 ]

  * mantic/linux: 6.5.0-15.15 -proposed tracker (LP: #2048549)
  * CVE-2024-0193
    - netfilter: nf_tables: skip set commit for deleted/destroyed sets
  * CVE-2023-6606
    - smb: client: fix OOB in smbCalcSize()
  * CVE-2023-6817
    - netfilter: nft_set_pipapo: skip inactive elements during set walk
  * CVE-2023-6932
    - ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
  * CVE-2023-6931
    - perf: Fix perf_event_validate_size()
    - perf: Fix perf_event_validate_size() lockdep splat

 -- Emil Renner Berthing <email address hidden> Mon, 15 Jan 2024 21:35:08 +0100

Source diff to previous version
1786013 Packaging resync
CVE-2024-0193 A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is r
CVE-2023-6606 An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker
CVE-2023-6817 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func
CVE-2023-6932 A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition c
CVE-2023-6931 A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escala

Version: 6.5.0-1005.6 2023-12-05 11:07:08 UTC

  linux-starfive (6.5.0-1005.6) mantic; urgency=medium

  * mantic/linux-starfive: 6.5.0-1005.6 -proposed tracker (LP: #2041535)

  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
    - [Packaging] resync update-dkms-versions helper
    - debian/dkms-versions -- update from kernel-versions (main/2023.10.30)

  * disable shiftfs (LP: #2038522)
    - [Config] starfive: disable shiftfs

  * context test in ubuntu_stress_smoke_test failed with M-6.5 riscv / starfive
    instances (LP: #2042388)
    - riscv: signal: fix sigaltstack frame size checking

  [ Ubuntu: 6.5.0-14.14 ]

  * mantic/linux: 6.5.0-14.14 -proposed tracker (LP: #2042660)
  * Boot log print hang on screen, no login prompt on Aspeed 2600 rev 52 BMC
    (LP: #2042850)
    - drm/ast: Add BMC virtual connector
  * arm64 atomic issues cause disk corruption (LP: #2042573)
    - locking/atomic: scripts: fix fallback ifdeffery
  * Packaging resync (LP: #1786013)
    - [Packaging] update annotations scripts

  [ Ubuntu: 6.5.0-12.12 ]

  * mantic/linux: 6.5.0-12.12 -proposed tracker (LP: #2041536)
  * Packaging resync (LP: #1786013)
    - [Packaging] update annotations scripts
    - [Packaging] update helper scripts
    - debian/dkms-versions -- update from kernel-versions (main/2023.10.30)
  * CVE-2023-5633
    - drm/vmwgfx: Keep a gem reference to user bos in surfaces
  * CVE-2023-5345
    - fs/smb/client: Reset password pointer to NULL
  * CVE-2023-39189
    - netfilter: nfnetlink_osf: avoid OOB read
  * CVE-2023-4244
    - netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
  * apparmor restricts read access of user namespace mediation sysctls to root
    (LP: #2040194)
    - SAUCE: apparmor: open userns related sysctl so lxc can check if restriction
      are in place
  * AppArmor spams kernel log with assert when auditing (LP: #2040192)
    - SAUCE: apparmor: fix request field from a prompt reply that denies all
      access
  * apparmor notification files verification (LP: #2040250)
    - SAUCE: apparmor: fix notification header size
  * apparmor oops when racing to retrieve a notification (LP: #2040245)
    - SAUCE: apparmor: fix oops when racing to retrieve notification
  * SMC stats: Wrong bucket calculation for payload of exactly 4096 bytes
    (LP: #2039575)
    - net/smc: Fix pos miscalculation in statistics
  * Support mipi camera on Intel Meteor Lake platform (LP: #2031412)
    - SAUCE: iommu: intel-ipu: use IOMMU passthrough mode for Intel IPUs on Meteor
      Lake
    - SAUCE: platform/x86: int3472: Add handshake GPIO function
  * CVE-2023-45898
    - ext4: fix slab-use-after-free in ext4_es_insert_extent()
  * CVE-2023-31085
    - ubi: Refuse attaching if mtd's erasesize is 0
  * CVE-2023-5717
    - perf: Disallow mis-matched inherited group reads
  * CVE-2023-5178
    - nvmet-tcp: Fix a possible UAF in queue intialization setup
  * CVE-2023-5158
    - vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()
  * CVE-2023-5090
    - x86: KVM: SVM: always update the x2avic msr interception
  * [SRU][J/L/M] UBUNTU: [Packaging] Make WWAN driver a loadable module
    (LP: #2033406)
    - [Packaging] Make WWAN driver loadable modules
  * Unable to power off the system with MTL CPU (LP: #2039405)
    - Revert "x86/smp: Put CPUs into INIT on shutdown if possible"
  * usbip: error: failed to open /usr/share/hwdata//usb.ids (LP: #2039439)
    - [Packaging] Make linux-tools-common depend on hwdata
  * drop all references to is_rust_module.sh in kernels >= 6.5 (LP: #2038611)
    - [Packaging] drop references to is_rust_module.sh
  * disable shiftfs (LP: #2038522)
    - SAUCE: ceph: enable unsafe idmapped mounts by default
    - [Config] disable shiftfs
  * Infinite systemd loop when power off the machine with multiple MD RAIDs
    (LP: #2036184)
    - md: Put the right device in md_seq_next
  * [Mediatek] mt8195-demo: enable CONFIG_MTK_IOMMU as module for multimedia and
    PCIE peripherals (LP: #2036587)
    - [Config] Enable CONFIG_MTK_IOMMU on arm64
  * Realtek 8852CE WiFi 6E country code udpates (LP: #2037273)
    - wifi: rtw89: regd: update regulatory map to R64-R43
  * Unable to use nvme drive to install Ubuntu 23.10 (LP: #2040157)
    - misc: rtsx: Fix some platforms can not boot and move the l1ss judgment to
      probe
  * CVE-2023-42754
    - ipv4: fix null-deref in ipv4_link_failure
  * linux-*: please enable dm-verity kconfigs to allow MoK/db verified root
    images (LP: #2019040)
    - [Config] CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG_SECONDARY_KEYRING=y
  * Fix RCU warning on AMD laptops (LP: #2036377)
    - power: supply: core: Use blocking_notifier_call_chain to avoid RCU complaint
  * allow io_uring to be disabled in runtime (LP: #2035116)
    - io_uring: add a sysctl to disable io_uring system-wide
  * Fix unstable audio at low levels on Thinkpad P1G4 (LP: #2037077)
    - ALSA: hda/realtek - ALC287 I2S speaker platform support

 -- Emil Renner Berthing <email address hidden> Thu, 23 Nov 2023 14:58:08 +0100

Source diff to previous version
1786013 Packaging resync
2038522 disable shiftfs
2042388 context test in ubuntu_stress_smoke_test failed with M-6.5 riscv / starfive instances
2042850 Boot log print hang on screen, no login prompt on Aspeed 2600 rev 52 BMC
2042573 arm64 atomic issues cause disk corruption
2040194 apparmor restricts read access of user namespace mediation sysctls to root
2040192 AppArmor spams kernel log with assert when auditing
2040250 apparmor notification files verification
2040245 apparmor oops when racing to retrieve a notification
2039575 SMC stats: Wrong bucket calculation for payload of exactly 4096 bytes
2033406 [SRU][J/L/M] UBUNTU: [Packaging] Make WWAN driver a loadable module
2039405 Unable to power off the system with MTL CPU
2039439 usbip: error: failed to open /usr/share/hwdata//usb.ids
2038611 drop all references to is_rust_module.sh in kernels \u003e= 6.5
2036184 Infiniate systemd loop when power off the machine with multiple MD RAIDs
2036587 [Mediatek] mt8195-demo: enable CONFIG_MTK_IOMMU as module for multimedia and PCIE peripherals
2037273 Realtek 8852CE WiFi 6E country code udpates
2040157 Unable to use nvme drive to install Ubuntu 23.10
2037077 Fix unstable audio at low levels on Thinkpad P1G4
CVE-2023-5633 The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were
CVE-2023-39189 A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num
CVE-2023-45898 The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.
CVE-2023-31085 An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirec
CVE-2023-5178 A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` ...
CVE-2023-5158 A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a d
CVE-2023-5090 x86: KVM: SVM: always update the x2avic msr interception
CVE-2023-42754 A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before c

Version: 6.5.0-1004.5 2023-11-21 02:07:28 UTC

  linux-starfive (6.5.0-1004.5) mantic; urgency=medium

  * mantic/linux-starfive: 6.5.0-1004.5 -proposed tracker (LP: #2041876)

  [ Ubuntu: 6.5.0-13.13 ]

  * mantic/linux: 6.5.0-13.13 -proposed tracker (LP: #2042652)
  * arm64 atomic issues cause disk corruption (LP: #2042573)
    - locking/atomic: scripts: fix fallback ifdeffery

  [ Ubuntu: 6.5.0-11.11 ]

  * mantic/linux: 6.5.0-11.11 -proposed tracker (LP: #2041879)
  * CVE-2023-31085
    - ubi: Refuse attaching if mtd's erasesize is 0
  * CVE-2023-4244
    - netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
  * CVE-2023-5633
    - drm/vmwgfx: Keep a gem reference to user bos in surfaces
  * CVE-2023-5345
    - fs/smb/client: Reset password pointer to NULL
  * CVE-2023-5090
    - x86: KVM: SVM: always update the x2avic msr interception
  * Packaging resync (LP: #1786013)
    - [Packaging] update helper scripts

 -- Roxana Nicolescu <email address hidden> Tue, 07 Nov 2023 23:05:24 +0100

Source diff to previous version
2042573 arm64 atomic issues cause disk corruption
1786013 Packaging resync
CVE-2023-31085 An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirec
CVE-2023-5633 The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were
CVE-2023-5090 x86: KVM: SVM: always update the x2avic msr interception

Version: 6.5.0-1003.4 2023-11-01 15:06:56 UTC

  linux-starfive (6.5.0-1003.4) mantic; urgency=medium

  * mantic/linux-starfive: 6.5.0-1003.4 -proposed tracker (LP: #2039203)

  [ Ubuntu: 6.5.0-10.10 ]

  * mantic/linux: 6.5.0-10.10 -proposed tracker (LP: #2039204)
  * CVE-2023-4921
    - net: sched: sch_qfq: Fix UAF in qfq_dequeue()
  * CVE-2023-42756
    - netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP
  * CVE-2023-4881
    - netfilter: nftables: exthdr: fix 4-byte stack OOB write
  * CVE-2023-5197
    - netfilter: nf_tables: disallow rule removal from chain binding

 -- Thadeu Lima de Souza Cascardo <email address hidden> Fri, 20 Oct 2023 15:14:39 -0300

CVE-2023-42756 A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic
CVE-2023-4881 ** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.



About   -   Send Feedback to @ubuntu_updates