linux-lowlatency-hwe-6.5 6.5.0-14.14.1~22.04.1 source package in Ubuntu
Changelog
linux-lowlatency-hwe-6.5 (6.5.0-14.14.1~22.04.1) jammy; urgency=medium * jammy/linux-lowlatency-hwe-6.5: 6.5.0-14.14.1~22.04.1 -proposed tracker (LP: #2043484) * disable shiftfs (LP: #2038522) - [Config] lowlatency-hwe-6.5: disable shiftfs * Packaging resync (LP: #1786013) - [Packaging] update variants [ Ubuntu: 6.5.0-14.14.1 ] * mantic/linux-lowlatency: 6.5.0-14.14.1 -proposed tracker (LP: #2041531) * Packaging resync (LP: #1786013) - [Packaging] resync git-ubuntu-log - [Packaging] resync update-dkms-versions helper - debian/dkms-versions -- update from kernel-versions (main/2023.10.30) * disable shiftfs (LP: #2038522) - [Config] lowlatency: disable shiftfs * usbip: error: failed to open /usr/share/hwdata//usb.ids (LP: #2039439) - [Packaging] lowlatency: Make linux-tools-common depend on hwdata * mantic/linux: 6.5.0-14.14 -proposed tracker (LP: #2042660) * Boot log print hang on screen, no login prompt on Aspeed 2600 rev 52 BMC (LP: #2042850) - drm/ast: Add BMC virtual connector * arm64 atomic issues cause disk corruption (LP: #2042573) - locking/atomic: scripts: fix fallback ifdeffery * Packaging resync (LP: #1786013) - [Packaging] update annotations scripts * mantic/linux: 6.5.0-12.12 -proposed tracker (LP: #2041536) * Packaging resync (LP: #1786013) - [Packaging] update annotations scripts - [Packaging] update helper scripts - debian/dkms-versions -- update from kernel-versions (main/2023.10.30) * CVE-2023-5633 - drm/vmwgfx: Keep a gem reference to user bos in surfaces * CVE-2023-5345 - fs/smb/client: Reset password pointer to NULL * CVE-2023-39189 - netfilter: nfnetlink_osf: avoid OOB read * CVE-2023-4244 - netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction * apparmor restricts read access of user namespace mediation sysctls to root (LP: #2040194) - SAUCE: apparmor: open userns related sysctl so lxc can check if restriction are in place * AppArmor spams kernel log with assert when auditing (LP: #2040192) - SAUCE: apparmor: fix request field from a prompt reply that denies all access * apparmor notification files verification (LP: #2040250) - SAUCE: apparmor: fix notification header size * apparmor oops when racing to retrieve a notification (LP: #2040245) - SAUCE: apparmor: fix oops when racing to retrieve notification * SMC stats: Wrong bucket calculation for payload of exactly 4096 bytes (LP: #2039575) - net/smc: Fix pos miscalculation in statistics * Support mipi camera on Intel Meteor Lake platform (LP: #2031412) - SAUCE: iommu: intel-ipu: use IOMMU passthrough mode for Intel IPUs on Meteor Lake - SAUCE: platform/x86: int3472: Add handshake GPIO function * CVE-2023-45898 - ext4: fix slab-use-after-free in ext4_es_insert_extent() * CVE-2023-31085 - ubi: Refuse attaching if mtd's erasesize is 0 * CVE-2023-5717 - perf: Disallow mis-matched inherited group reads * CVE-2023-5178 - nvmet-tcp: Fix a possible UAF in queue intialization setup * CVE-2023-5158 - vringh: don't use vringh_kiov_advance() in vringh_iov_xfer() * CVE-2023-5090 - x86: KVM: SVM: always update the x2avic msr interception * [SRU][J/L/M] UBUNTU: [Packaging] Make WWAN driver a loadable module (LP: #2033406) - [Packaging] Make WWAN driver loadable modules * Unable to power off the system with MTL CPU (LP: #2039405) - Revert "x86/smp: Put CPUs into INIT on shutdown if possible" * usbip: error: failed to open /usr/share/hwdata//usb.ids (LP: #2039439) - [Packaging] Make linux-tools-common depend on hwdata * drop all references to is_rust_module.sh in kernels >= 6.5 (LP: #2038611) - [Packaging] drop references to is_rust_module.sh * disable shiftfs (LP: #2038522) - SAUCE: ceph: enable unsafe idmapped mounts by default - [Config] disable shiftfs * Infinite systemd loop when power off the machine with multiple MD RAIDs (LP: #2036184) - md: Put the right device in md_seq_next * [Mediatek] mt8195-demo: enable CONFIG_MTK_IOMMU as module for multimedia and PCIE peripherals (LP: #2036587) - [Config] Enable CONFIG_MTK_IOMMU on arm64 * Realtek 8852CE WiFi 6E country code udpates (LP: #2037273) - wifi: rtw89: regd: update regulatory map to R64-R43 * Unable to use nvme drive to install Ubuntu 23.10 (LP: #2040157) - misc: rtsx: Fix some platforms can not boot and move the l1ss judgment to probe * CVE-2023-42754 - ipv4: fix null-deref in ipv4_link_failure * linux-*: please enable dm-verity kconfigs to allow MoK/db verified root images (LP: #2019040) - [Config] CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG_SECONDARY_KEYRING=y * Fix RCU warning on AMD laptops (LP: #2036377) - power: supply: core: Use blocking_notifier_call_chain to avoid RCU complaint * allow io_uring to be disabled in runtime (LP: #2035116) - io_uring: add a sysctl to disable io_uring system-wide * Fix unstable audio at low levels on Thinkpad P1G4 (LP: #2037077) - ALSA: hda/realtek - ALC287 I2S speaker platform support [ Ubuntu: 6.5.0-13.13.1 ] * mantic/linux-lowlatency: 6.5.0-13.13.1 -proposed tracker (LP: #2041872) * mantic/linux: 6.5.0-13.13 -proposed tracker (LP: #2042652) * arm64 atomic issues cause disk corruption (LP: #2042573) - locking/atomic: scripts: fix fallback ifdeffery * mantic/linux: 6.5.0-11.11 -proposed tracker (LP: #2041879) * CVE-2023-31085 - ubi: Refuse attaching if mtd's erasesize is 0 * CVE-2023-4244 - netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction * CVE-2023-5633 - drm/vmwgfx: Keep a gem reference to user bos in surfaces * CVE-2023-5345 - fs/smb/client: Reset password pointer to NULL * CVE-2023-5090 - x86: KVM: SVM: always update the x2avic msr interception * Packaging resync (LP: #1786013) - [Packaging] update helper scripts [ Ubuntu: 6.5.0-10.10.1 ] * mantic/linux-lowlatency: 6.5.0-10.10.1 -proposed tracker (LP: #2039199) * Packaging resync (LP: #1786013) - [Packaging] update Ubuntu.md - [Packaging] update update.conf * mantic/linux: 6.5.0-10.10 -proposed tracker (LP: #2039204) * CVE-2023-4921 - net: sched: sch_qfq: Fix UAF in qfq_dequeue() * CVE-2023-42756 - netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP * CVE-2023-4881 - netfilter: nftables: exthdr: fix 4-byte stack OOB write * CVE-2023-5197 - netfilter: nf_tables: disallow rule removal from chain binding [ Ubuntu: 6.5.0-9.9.1 ] * mantic/linux-lowlatency: 6.5.0-9.9.1 -proposed tracker (LP: #2038688) * mantic/linux: 6.5.0-9.9 -proposed tracker (LP: #2038687) * update apparmor and LSM stacking patch set (LP: #2028253) - re-apply apparmor 4.0.0 * Disable restricting unprivileged change_profile by default, due to LXD latest/stable not yet compatible with this new apparmor feature (LP: #2038567) - SAUCE: apparmor: Make apparmor_restrict_unprivileged_unconfined opt-in * mantic/linux: 6.5.0-8.8 -proposed tracker (LP: #2038577) * update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [02/60]: rename SK_CTX() to aa_sock and make it an inline fn - SAUCE: apparmor3.2.0 [05/60]: Add sysctls for additional controls of unpriv userns restrictions - SAUCE: apparmor3.2.0 [08/60]: Stacking v38: LSM: Identify modules by more than name - SAUCE: apparmor3.2.0 [09/60]: Stacking v38: LSM: Add an LSM identifier for external use - SAUCE: apparmor3.2.0 [10/60]: Stacking v38: LSM: Identify the process attributes for each module - SAUCE: apparmor3.2.0 [11/60]: Stacking v38: LSM: Maintain a table of LSM attribute data - SAUCE: apparmor3.2.0 [12/60]: Stacking v38: proc: Use lsmids instead of lsm names for attrs - SAUCE: apparmor3.2.0 [13/60]: Stacking v38: integrity: disassociate ima_filter_rule from security_audit_rule - SAUCE: apparmor3.2.0 [14/60]: Stacking v38: LSM: Infrastructure management of the sock security - SAUCE: apparmor3.2.0 [15/60]: Stacking v38: LSM: Add the lsmblob data structure. - SAUCE: apparmor3.2.0 [16/60]: Stacking v38: LSM: provide lsm name and id slot mappings - SAUCE: apparmor3.2.0 [17/60]: Stacking v38: IMA: avoid label collisions with stacked LSMs - SAUCE: apparmor3.2.0 [18/60]: Stacking v38: LSM: Use lsmblob in security_audit_rule_match - SAUCE: apparmor3.2.0 [19/60]: Stacking v38: LSM: Use lsmblob in security_kernel_act_as - SAUCE: apparmor3.2.0 [20/60]: Stacking v38: LSM: Use lsmblob in security_secctx_to_secid - SAUCE: apparmor3.2.0 [21/60]: Stacking v38: LSM: Use lsmblob in security_secid_to_secctx - SAUCE: apparmor3.2.0 [22/60]: Stacking v38: LSM: Use lsmblob in security_ipc_getsecid - SAUCE: apparmor3.2.0 [23/60]: Stacking v38: LSM: Use lsmblob in security_current_getsecid - SAUCE: apparmor3.2.0 [24/60]: Stacking v38: LSM: Use lsmblob in security_inode_getsecid - SAUCE: apparmor3.2.0 [25/60]: Stacking v38: LSM: Use lsmblob in security_cred_getsecid - SAUCE: apparmor3.2.0 [26/60]: Stacking v38: LSM: Specify which LSM to display - SAUCE: apparmor3.2.0 [28/60]: Stacking v38: LSM: Ensure the correct LSM context releaser - SAUCE: apparmor3.2.0 [29/60]: Stacking v38: LSM: Use lsmcontext in security_secid_to_secctx - SAUCE: apparmor3.2.0 [30/60]: Stacking v38: LSM: Use lsmcontext in security_inode_getsecctx - SAUCE: apparmor3.2.0 [31/60]: Stacking v38: Use lsmcontext in security_dentry_init_security - SAUCE: apparmor3.2.0 [32/60]: Stacking v38: LSM: security_secid_to_secctx in netlink netfilter - SAUCE: apparmor3.2.0 [33/60]: Stacking v38: NET: Store LSM netlabel data in a lsmblob - SAUCE: apparmor3.2.0 [34/60]: Stacking v38: binder: Pass LSM identifier for confirmation - SAUCE: apparmor3.2.0 [35/60]: Stacking v38: LSM: security_secid_to_secctx module selection - SAUCE: apparmor3.2.0 [36/60]: Stacking v38: Audit: Keep multiple LSM data in audit_names - SAUCE: apparmor3.2.0 [37/60]: Stacking v38: Audit: Create audit_stamp structure - SAUCE: apparmor3.2.0 [38/60]: Stacking v38: LSM: Add a function to report multiple LSMs - SAUCE: apparmor3.2.0 [39/60]: Stacking v38: Audit: Allow multiple records in an audit_buffer - SAUCE: apparmor3.2.0 [40/60]: Stacking v38: Audit: Add record for multiple task security contexts - SAUCE: apparmor3.2.0 [41/60]: Stacking v38: audit: multiple subject lsm values for netlabel - SAUCE: apparmor3.2.0 [42/60]: Stacking v38: Audit: Add record for multiple object contexts - SAUCE: apparmor3.2.0 [43/60]: Stacking v38: netlabel: Use a struct lsmblob in audit data - SAUCE: apparmor3.2.0 [44/60]: Stacking v38: LSM: Removed scaffolding function lsmcontext_init - SAUCE: apparmor3.2.0 [45/60]: Stacking v38: AppArmor: Remove the exclusive flag - SAUCE: apparmor3.2.0 [46/60]: combine common_audit_data and apparmor_audit_data - SAUCE: apparmor3.2.0 [47/60]: setup slab cache for audit data - SAUCE: apparmor3.2.0 [48/60]: rename audit_data->label to audit_data->subj_label - SAUCE: apparmor3.2.0 [49/60]: pass cred through to audit info. - SAUCE: apparmor3.2.0 [50/60]: Improve debug print infrastructure - SAUCE: apparmor3.2.0 [51/60]: add the ability for profiles to have a learning cache - SAUCE: apparmor3.2.0 [52/60]: enable userspace upcall for mediation - SAUCE: apparmor3.2.0 [53/60]: cache buffers on percpu list if there is lock contention - SAUCE: apparmor3.2.0 [55/60]: advertise availability of exended perms - SAUCE: apparmor3.2.0 [60/60]: [Config] enable CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS * LSM stacking and AppArmor for 6.2: additional fixes (LP: #2017903) // update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [57/60]: fix profile verification and enable it * udev fails to make prctl() syscall with apparmor=0 (as used by maas by default) (LP: #2016908) // update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [27/60]: Stacking v38: Fix prctl() syscall with apparmor=0 * kinetic: apply new apparmor and LSM stacking patch set (LP: #1989983) // update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [01/60]: add/use fns to print hash string hex value - SAUCE: apparmor3.2.0 [03/60]: patch to provide compatibility with v2.x net rules - SAUCE: apparmor3.2.0 [04/60]: add user namespace creation mediation - SAUCE: apparmor3.2.0 [06/60]: af_unix mediation - SAUCE: apparmor3.2.0 [07/60]: Add fine grained mediation of posix mqueues -- Roxana Nicolescu <email address hidden> Wed, 22 Nov 2023 15:12:54 +0100
Upload details
- Uploaded by:
- Roxana Nicolescu
- Uploaded to:
- Jammy
- Original maintainer:
- Ubuntu Kernel Team
- Architectures:
- all amd64 arm64
- Section:
- devel
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
linux-lowlatency-hwe-6.5_6.5.0.orig.tar.gz | 213.2 MiB | 2a2e58f77ba57f0660d3cb51fcbf25058dce092aaf2cd09e662d730301b96064 |
linux-lowlatency-hwe-6.5_6.5.0-14.14.1~22.04.1.diff.gz | 7.3 MiB | d1a4197b576bfd4f6980feee62ecefe0455f1e525bc113b91cf0f0c24bb927fd |
linux-lowlatency-hwe-6.5_6.5.0-14.14.1~22.04.1.dsc | 7.0 KiB | e47165213e463b9257fe2accf0dfdb5c2b6627e4d239d24df75bd5b8c135b852 |
Available diffs
Binary packages built by this source
- linux-buildinfo-6.5.0-14-lowlatency: Linux kernel buildinfo for version 6.5.0 on ARMv8 SMP
This package contains the Linux kernel buildinfo for version 6.5.0 on
ARMv8 SMP.
.
You likely do not want to install this package.
- linux-buildinfo-6.5.0-14-lowlatency-64k: Linux kernel buildinfo for version 6.5.0 on ARMv8 SMP
This package contains the Linux kernel buildinfo for version 6.5.0 on
ARMv8 SMP.
.
You likely do not want to install this package.
- linux-cloud-tools-6.5.0-14-lowlatency: Linux kernel version specific cloud tools for version 6.5.0-14
This package provides the architecture dependant parts for kernel
version locked tools for cloud for version 6.5.0-14 on
64 bit x86.
- linux-headers-6.5.0-14-lowlatency: Linux kernel headers for version 6.5.0 on ARMv8 SMP
This package provides kernel header files for version 6.5.0 on
ARMv8 SMP.
.
This is for sites that want the latest kernel headers. Please read
/usr/share/doc/linux- headers- 6.5.0-14/ debian. README. gz for details.
- linux-headers-6.5.0-14-lowlatency-64k: Linux kernel headers for version 6.5.0 on ARMv8 SMP
This package provides kernel header files for version 6.5.0 on
ARMv8 SMP.
.
This is for sites that want the latest kernel headers. Please read
/usr/share/doc/linux- headers- 6.5.0-14/ debian. README. gz for details.
- linux-image-unsigned-6.5.0-14-lowlatency: Linux kernel image for version 6.5.0 on ARMv8 SMP
This package contains the unsigned Linux kernel image for version 6.5.0 on
ARMv8 SMP.
.
Supports Lowlatency processors.
.
Geared toward desktop and server systems.
.
You likely do not want to install this package directly. Instead, install
the linux-lowlatency meta-package, which will ensure that upgrades work
correctly, and that supporting packages are also installed.
- linux-image-unsigned-6.5.0-14-lowlatency-64k: Linux kernel image for version 6.5.0 on ARMv8 SMP
This package contains the unsigned Linux kernel image for version 6.5.0 on
ARMv8 SMP.
.
Supports Lowlatency 64K pages processors.
.
Geared toward desktop and server systems.
.
You likely do not want to install this package directly. Instead, install
the linux-lowlatency-64k meta-package, which will ensure that upgrades work
correctly, and that supporting packages are also installed.
- linux-image-unsigned-6.5.0-14-lowlatency-64k-dbgsym: Linux kernel debug image for version 6.5.0 on ARMv8 SMP
This package provides the unsigned kernel debug image for version 6.5.0 on
ARMv8 SMP.
.
This is for sites that wish to debug the kernel.
.
The kernel image contained in this package is NOT meant to boot from. It
is uncompressed, and unstripped. This package also includes the
unstripped modules.
- linux-image-unsigned-6.5.0-14-lowlatency-dbgsym: Linux kernel debug image for version 6.5.0 on ARMv8 SMP
This package provides the unsigned kernel debug image for version 6.5.0 on
ARMv8 SMP.
.
This is for sites that wish to debug the kernel.
.
The kernel image contained in this package is NOT meant to boot from. It
is uncompressed, and unstripped. This package also includes the
unstripped modules.
- linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-14: Linux kernel version specific cloud tools for version 6.5.0-14
This package provides the architecture dependant parts for kernel
version locked tools for cloud tools for version 6.5.0-14 on
64 bit x86.
You probably want to install linux-cloud-tools-6. 5.0-14- <flavour> .
- linux-lowlatency-hwe-6.5-cloud-tools-common: Linux kernel version specific cloud tools for version 6.5.0
This package provides the architecture independent parts for kernel
version locked tools for cloud tools for version 6.5.0.
- linux-lowlatency-hwe-6.5-headers-6.5.0-14: Header files related to Linux kernel version 6.5.0
This package provides kernel header files for version 6.5.0, for sites
that want the latest kernel headers. Please read
/usr/share/doc/linux- lowlatency- hwe-6.5- headers- 6.5.0-14/ debian. README. gz for details
- linux-lowlatency-hwe-6.5-lib-rust-6.5.0-14-lowlatency: Rust library files related to Linux kernel version 6.5.0
This package provides kernel library files for version 6.5.0, that allow to
compile out-of-tree kernel modules written in Rust.
- linux-lowlatency-hwe-6.5-tools-6.5.0-14: Linux kernel version specific tools for version 6.5.0-14
This package provides the architecture dependant parts for kernel
version locked tools (such as perf and x86_energy_perf_policy) for
version 6.5.0-14 on
ARMv8.
You probably want to install linux-tools-6.5.0-14- <flavour> .
- linux-lowlatency-hwe-6.5-tools-common: Linux kernel version specific tools for version 6.5.0
This package provides the architecture independent parts for kernel
version locked tools (such as perf and x86_energy_perf_policy) for
version 6.5.0.
- linux-lowlatency-hwe-6.5-tools-host: Linux kernel VM host tools
This package provides kernel tools useful for VM hosts.
- linux-modules-6.5.0-14-lowlatency: Linux kernel extra modules for version 6.5.0 on ARMv8 SMP
Contains the corresponding System.map file, the modules built by the
packager, and scripts that try to ensure that the system is not left in an
unbootable state after an update.
.
Supports Lowlatency processors.
.
Geared toward desktop and server systems.
.
You likely do not want to install this package directly. Instead, install
the linux-lowlatency meta-package, which will ensure that upgrades work
correctly, and that supporting packages are also installed.
- linux-modules-6.5.0-14-lowlatency-64k: Linux kernel extra modules for version 6.5.0 on ARMv8 SMP
Contains the corresponding System.map file, the modules built by the
packager, and scripts that try to ensure that the system is not left in an
unbootable state after an update.
.
Supports Lowlatency 64K pages processors.
.
Geared toward desktop and server systems.
.
You likely do not want to install this package directly. Instead, install
the linux-lowlatency-64k meta-package, which will ensure that upgrades work
correctly, and that supporting packages are also installed.
- linux-modules-iwlwifi-6.5.0-14-lowlatency: Linux kernel iwlwifi modules for version 6.5.0-14
This package provides the Linux kernel iwlwifi modules for version
6.5.0-14.
.
You likely do not want to install this package directly. Instead, install the
one of the linux-modules-iwlwifi- lowlatency* meta-packages,
which will ensure that upgrades work correctly, and that supporting packages are
also installed.
- linux-tools-6.5.0-14-lowlatency: Linux kernel version specific tools for version 6.5.0-14
This package provides the architecture dependant parts for kernel
version locked tools (such as perf and x86_energy_perf_policy) for
version 6.5.0-14 on
ARMv8.
- linux-tools-6.5.0-14-lowlatency-64k: Linux kernel version specific tools for version 6.5.0-14
This package provides the architecture dependant parts for kernel
version locked tools (such as perf and x86_energy_perf_policy) for
version 6.5.0-14 on
ARMv8.