Package "linux-allwinner-5.17"
Name: |
linux-allwinner-5.17
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Header files related to Linux kernel version 5.17.0
- Header files related to Linux kernel version 5.17.0
- Header files related to Linux kernel version 5.17.0
- Header files related to Linux kernel version 5.17.0
|
Latest version: |
5.17.0-1010.10 |
Release: |
jammy (22.04) |
Level: |
updates |
Repository: |
main |
Links
Other versions of "linux-allwinner-5.17" in Jammy
Packages in group
Deleted packages are displayed in grey.
Changelog
linux-allwinner-5.17 (5.17.0-1010.10) jammy; urgency=medium
* jammy/linux-allwinner-5.17: 5.17.0-1008.8 -proposed tracker (LP: #1997080)
[ Ubuntu: 5.17.0-14.15~22.04.8 ]
* jammy/linux-hwe-5.17: 5.17.0-14.15~22.04.8 -proposed tracker (LP: #1997084)
* CVE-2022-42703
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse
* CVE-2022-3566
- tcp: Fix data races around icsk->icsk_af_ops.
* CVE-2022-3567
- ipv6: Fix data races around sk->sk_prot.
* CVE-2022-3564
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
* CVE-2022-3524
- tcp/udp: Fix memory leak in ipv6_renew_options().
* CVE-2022-3621
- nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
* CVE-2022-3594
- r8152: Rate limit overflow messages
* CVE-2022-43945
- SUNRPC: Fix svcxdr_init_decode's end-of-buffer calculation
- SUNRPC: Fix svcxdr_init_encode's buflen calculation
- NFSD: Protect against send buffer overflow in NFSv2 READDIR
- NFSD: Protect against send buffer overflow in NFSv3 READDIR
- NFSD: Protect against send buffer overflow in NFSv2 READ
- NFSD: Protect against send buffer overflow in NFSv3 READ
- NFSD: Remove "inline" directives on op_rsize_bop helpers
- NFSD: Cap rsize_bop result based on send buffer size
* CVE-2022-26365
- xen/blkfront: fix leaking data in shared pages
* CVE-2022-33743
- xen-netfront: restore __skb_queue_tail() positioning in
xennet_get_responses()
[ Ubuntu: 5.17.0-11.12~22.04.8 ]
* jammy/linux-hwe-5.17: 5.17.0-11.12~22.04.8 -proposed tracker (LP: #1992022)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
-- Thadeu Lima de Souza Cascardo <email address hidden> Fri, 25 Nov 2022 18:08:40 -0300
|
Source diff to previous version |
1786013 |
Packaging resync |
CVE-2022-42703 |
mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse. |
CVE-2022-3566 |
A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the compo |
CVE-2022-3567 |
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_op |
CVE-2022-3564 |
A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net |
CVE-2022-3524 |
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of |
CVE-2022-3621 |
A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/ |
CVE-2022-3594 |
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the f |
CVE-2022-43945 |
The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by e |
CVE-2022-26365 |
Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond |
CVE-2022-33743 |
network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way all |
|
linux-allwinner-5.17 (5.17.0-1007.7) jammy; urgency=medium
[ Ubuntu: 5.17.0-10.10~22.04.8 ]
* CVE-2022-2602
- SAUCE: io_uring/af_unix: defer registered files gc to io_uring release
- SAUCE: io_uring/af_unix: fix memleak during unix GC
* CVE-2022-41674
- SAUCE: wifi: cfg80211: fix u8 overflow in
cfg80211_update_notlisted_nontrans()
- SAUCE: wifi: cfg80211/mac80211: reject bad MBSSID elements
- SAUCE: wifi: cfg80211: ensure length byte is present before access
- SAUCE: wifi: mac80211_hwsim: avoid mac80211 warning on bad rate
- SAUCE: wifi: cfg80211: update hidden BSSes to avoid WARN_ON
* CVE-2022-42722
- SAUCE: wifi: mac80211: fix crash in beacon protection for P2P-device
* CVE-2022-42721
- SAUCE: wifi: cfg80211: avoid nontransmitted BSS list corruption
* CVE-2022-42720
- SAUCE: wifi: cfg80211: fix BSS refcounting bugs
* CVE-2022-42719
- SAUCE: wifi: mac80211: fix MBSSID parsing use-after-free
* CVE-2022-2318
- net: rose: fix UAF bugs caused by timer handler
* CVE-2022-3028
- af_key: Do not call xfrm_probe_algs in parallel
* CVE-2022-40768
- scsi: stex: Properly zero out the passthrough command structure
* CVE-2022-2978
- SAUCE: fs: fix UAF/GPF bug in nilfs_mdt_destroy
-- Stefan Bader <email address hidden> Fri, 14 Oct 2022 15:44:01 +0200
|
Source diff to previous version |
CVE-2022-2602 |
io_uring/af_unix: defer registered files gc to io_uring release |
CVE-2022-41674 |
An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_i |
CVE-2022-42722 |
In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer |
CVE-2022-42721 |
A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (a |
CVE-2022-42720 |
Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local |
CVE-2022-42719 |
A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by atta |
CVE-2022-2318 |
There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without |
CVE-2022-3028 |
A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurr |
CVE-2022-40768 |
drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecomman |
CVE-2022-2978 |
A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following c |
|
linux-allwinner-5.17 (5.17.0-1006.6) jammy; urgency=medium
* jammy/linux-allwinner-5.17: 5.17.0-1006.6 -proposed tracker (LP: #1987776)
[ Ubuntu: 5.17.0-9.9~22.04.8 ]
* jammy/linux-hwe-5.17: 5.17.0-9.9~22.04.8 -proposed tracker (LP: #1987779)
* CVE-2022-36946
- netfilter: nf_queue: do not allow packet truncation below transport header
offset
* CVE-2021-33655
- fbcon: Disallow setting font bigger than screen size
- fbcon: Prevent that screen size is smaller than font size
- fbmem: Check virtual screen sizes in fb_set_var()
-- Emil Renner Berthing <email address hidden> Tue, 13 Sep 2022 11:01:29 +0200
|
Source diff to previous version |
CVE-2022-36946 |
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) beca |
CVE-2021-33655 |
When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds. |
|
linux-allwinner-5.17 (5.17.0-1005.5) jammy; urgency=medium
* jammy/linux-allwinner-5.17: 5.17.0-1005.5 -proposed tracker (LP: #1983904)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (main/2022.08.08)
* GPIO character device v1 API not enabled in kernel (LP: #1953613)
- [Config] Enable CONFIG_GPIO_CDEV_V1
* /usr/lib/u-boot/qemu-riscv64_smode/uboot.elf cannot be booted with KVM
(LP: #1980594)
- RISC-V: KVM: Fix SRCU deadlock caused by kvm_riscv_check_vcpu_requests()
[ Ubuntu: 5.17.0-8.8~22.04.8 ]
* jammy/linux-hwe-5.17: 5.17.0-8.8~22.04.8 -proposed tracker (LP: #1983907)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (main/2022.08.08)
* GPIO character device v1 API not enabled in kernel (LP: #1953613)
- [Config] Enable CONFIG_GPIO_CDEV_V1
* refactoring of overlayfs fix to properly support shiftfs (LP: #1983640)
- SAUCE: for aufs mmap: print the virtual file path
- SAUCE: overlayfs: fix incorrect mnt_id of files opened from map_files
* Audio mute key (f5) LED and Mic mute key (f8) LED are no function on HP
440/450/640/650 G9 (LP: #1982716)
- ALSA: hda/realtek: fix mute/micmute LEDs for HP machines
-- Emil Renner Berthing <email address hidden> Fri, 19 Aug 2022 13:26:23 +0200
|
Source diff to previous version |
1786013 |
Packaging resync |
1953613 |
GPIO character device v1 API not enabled in kernel |
1980594 |
/usr/lib/u-boot/qemu-riscv64_smode/uboot.elf cannot be booted with KVM |
1983640 |
refactoring of overlayfs fix to properly support shiftfs |
|
linux-allwinner-5.17 (5.17.0-1004.4) jammy; urgency=medium
[ Ubuntu: 5.17.0-8.8~22.04.7 ]
* Packaging resync (LP: #1786013)
- [Packaging] Update etc/getabis
- [Config]: annotate CONFIG_NET_DSA_REALTEK_SMI as '-' on amd64
- [Config]: Remove CONFIG_IMA_TEMPLATE from annotations
- [Packaging] update update.conf
* CVE-2022-2585
- SAUCE: posix-cpu-timers: Cleanup CPU timers before freeing them during exec
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow CHAIN_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another chain
* CVE-2022-2588
- SAUCE: net_sched: cls_route: remove from list when handle is 0
* CVE-2022-1679
- SAUCE: ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
* CVE-2022-34918
- netfilter: nf_tables: stricter validation of element data
-- Luke Nowakowski-Krijger <email address hidden> Mon, 08 Aug 2022 11:58:59 -0700
|
1786013 |
Packaging resync |
CVE-2022-1679 |
A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function |
CVE-2022-34918 |
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by |
|
About
-
Send Feedback to @ubuntu_updates