* Include cifs.ko in linux-modules package (LP: #2042546)
- [Packaging] Replace fs/cifs with fs/smb/client in inclusion list
* Kernel oops on 32-0bit kernels due to x86_cache_alignment initialization
(LP: #2039191)
- x86/boot: Move x86_cache_alignment initialization to correct spot
[ Ubuntu: 6.2.0-37.38 ]
* lunar/linux: 6.2.0-37.38 -proposed tracker (LP: #2041899)
* CVE-2023-31085
- ubi: Refuse attaching if mtd's erasesize is 0
* CVE-2023-25775
- RDMA/irdma: Prevent zero-length STAG registration
* CVE-2023-45871
- igb: set max size RX buffer when store bad packet is enabled
* CVE-2023-5345
- fs/smb/client: Reset password pointer to NULL
* CVE-2023-5090
- x86: KVM: SVM: always update the x2avic msr interception
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
-- Tim Gardner <email address hidden> Fri, 03 Nov 2023 01:41:32 -0600
This bug was fixed in the package linux-aws - 6.2.0-1016.16
---------------
linux-aws (6.2.0-1016.16) lunar; urgency=medium
* lunar/linux-aws: 6.2.0-1016.16 -proposed tracker (LP: #2041881)
* Include cifs.ko in linux-modules package (LP: #2042546)
- [Packaging] Replace fs/cifs with fs/smb/client in inclusion list
* Kernel oops on 32-0bit kernels due to x86_cache_alignment initialization
(LP: #2039191)
- x86/boot: Move x86_cache_alignment initialization to correct spot
[ Ubuntu: 6.2.0-37.38 ]
* lunar/linux: 6.2.0-37.38 -proposed tracker (LP: #2041899)
* CVE-2023-31085
- ubi: Refuse attaching if mtd's erasesize is 0
* CVE-2023-25775
- RDMA/irdma: Prevent zero-length STAG registration
* CVE-2023-45871
- igb: set max size RX buffer when store bad packet is enabled
* CVE-2023-5345
- fs/smb/client: Reset password pointer to NULL
* CVE-2023-5090
- x86: KVM: SVM: always update the x2avic msr interception
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
-- Tim Gardner <email address hidden> Fri, 03 Nov 2023 01:41:32 -0600