This bug was fixed in the package linux-aws - 6.8.0-1030.32 --------------- linux-aws (6.8.0-1030.32) noble; urgency=medium
* noble/linux-aws: 6.8.0-1030.32 -proposed tracker (LP: #2110701) * Create 64K page size AWS kernel for ARM (LP: #2083557) - [Packaging]: aws: Add 64k page flavor [ Ubuntu: 6.8.0-62.65 ] * noble/linux: 6.8.0-62.65 -proposed tracker (LP: #2110737) * Rotate the Canonical Livepatch key (LP: #2111244) - [Config] Prepare for Canonical Livepatch key rotation * KVM bug causes Firecracker crash when it runs the vCPU for the first time (LP: #2109859) - vhost: return task creation error instead of NULL - kvm: retry nx_huge_page_recovery_thread creation * CVE-2025-2312 cifs.upcall could access incorrect kerberos credentials cache (LP: #2099914) // CVE-2025-2312 - CIFS: New mount option for cifs.upcall namespace resolution * Noble update: upstream stable patchset 2025-04-29 (LP: #2109640) - ASoC: wm8994: Add depends on MFD core - ASoC: samsung: Add missing selects for MFD_WM8994 - seccomp: Stub for !CONFIG_SECCOMP - scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request - of/unittest: Add test that of_address_to_resource() fails on non- translatable address - irqchip/sunxi-nmi: Add missing SKIP_WAKE flag - hwmon: (drivetemp) Set scsi command timeout to 10s - ASoC: samsung: Add missing depends on I2C - ata: libata-core: Set ATA_QCFLAG_RTF_FILLED in fill_result_tf() - Revert "libfs: fix infinite directory reads for offset dir" - libfs: Replace simple_offset end-of-directory detection - Revert "HID: multitouch: Add support for lenovo Y9000P Touchpad" - ALSA: usb-audio: Add delay quirk for USB Audio Device - Input: xpad - add support for Nacon Pro Compact - Input: atkbd - map F23 key to support default copilot shortcut - Input: xpad - add unofficial Xbox 360 wireless receiver clone - Input: xpad - add QH Electronics VID/PID - Input: xpad - improve name of 8BitDo controller 2dc8:3106 - Input: xpad - add support for Nacon Evol-X Xbox One Controller - Input: xpad - add support for wooting two he (arm) - ASoC: codecs: es8316: Fix HW rate calculation for 48Mhz MCLK - ASoC: cs42l43: Add codec force suspend/resume ops - ALSA: hda/realtek: Fix volume adjustment issue on Lenovo ThinkBook 16P Gen5 - libfs: Return ENOSPC when the directory offset range is exhausted - Revert "libfs: Add simple_offset_empty()" - libfs: Use d_children list to iterate simple_offset directories - wifi: rtl8xxxu: add more missing rtl8192cu USB IDs - HID: wacom: Initialize brightness of LED trigger - Upstream stable to v6.6.75, v6.12.12 * Noble update: upstream stable patchset 2025-04-29 (LP: #2109640) // CVE-2025-21689 - USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() * Noble update: upstream stable patchset 2025-04-29 (LP: #2109640) // CVE-2025-21690 - scsi: storvsc: Ratelimit warning logs to prevent VM denial of service * Noble update: upstream stable patchset 2025-04-29 (LP: #2109640) // CVE-2025-21691 - cachestat: fix page cache statistics permission checking * Noble update: upstream stable patchset 2025-04-29 (LP: #2109640) // CVE-2025-21692 - net: sched: fix ets qdisc OOB Indexing * Noble update: upstream stable patchset 2025-04-29 (LP: #2109640) // CVE-2025-21699 - gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag * Noble update: upstream stable patchset 2025-04-29 (LP: #2109640) // CVE-2024-50157 - RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop * rtw89: Support hardware rfkill (LP: #2077384) - wifi: rtw89: add support for hardware rfkill * Introduce configfs-based interface for gpio-aggregator (LP: #2103496) - gpio: introduce utilities for synchronous fake device creation - bitmap: Define a cleanup function for bitmaps - gpio: aggregator: simplify aggr_parse() with scoped bitmap - gpio: aggregator: protect driver attr handlers against module unload - gpio: aggregator: reorder functions to prepare for configfs introduction - gpio: aggregator: unify function naming - gpio: aggregator: add gpio_aggregator_{alloc, free}() - gpio: aggregator: introduce basic configfs interface - [Config] Enable DEV_SYNC_PROBE as module - SAUCE: gpio: aggregator: Fix error code in gpio_aggregator_activate() - gpio: aggregator: rename 'name' to 'key' in gpio_aggregator_parse() - gpio: aggregator: expose aggregator created via legacy sysfs to configfs - SAUCE: gpio: aggregator: fix "_sysfs" prefix check in gpio_aggregator_make_group() - SAUCE: gpio: aggregator: Fix gpio_aggregator_line_alloc() checking - SAUCE: gpio: aggregator: Return an error if there are no GPIOs in gpio_aggregator_parse() - SAUCE: gpio: aggregator: Fix leak in gpio_aggregator_parse() - gpio: aggregator: cancel deferred probe for devices created via configfs - Documentation: gpio: document configfs interface for gpio-aggregator - selftests: gpio: add test cases for gpio-aggregator - SAUCE: selftests: gpio: gpio-aggregator: add a test case for _sysfs prefix reservation * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) - net: ethernet: ti: cpsw_ale: Fix cpsw_ale_get_field() - net: add exit_batch_rtnl() method - gtp: use exit_batch_rtnl() method - gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp(). - gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). - nfp: bpf: prevent integer overflow in nfp_bpf_event_output() - net: xilinx: axienet: Fix IRQ coalescing packet count overflow - net/mlx5: Fix RDMA TX steering prio - net/mlx5e: Rely on reqid in IPsec tunnel mode - net/mlx5e: Always start IPsec sequence number from 1 - drm/vmwgfx: Add new keep_resv BO param - drm/v3d: Assign job pointer to NULL before signaling the fence - soc: ti: pruss: Fix pruss APIs - hwmon: (tmp513) Fix division of negative numbers - i2c: mux: demux-pinctrl: check initial mux selection, too - i2c: rcar: fix NACK handling when being a target - hfs: Sanity check the root record - fs: fix missing declaration of init_files - kheaders: Ignore silly-rename files - cachefiles: Parse the "secctx" immediately - scsi: ufs: core: Honor runtime/system PM levels if set by host controller drivers - selftests: tc-testing: reduce rshift value - ACPI: resource: acpi_dev_irq_override(): Check DMI match last - poll_wait: add mb() to fix theoretical race between waitqueue_active() and .poll() - RDMA/bnxt_re: Fix to export port num to ib_query_qp - nvmet: propagate npwg topology - ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA - i2c: atr: Fix client detach - mptcp: be sure to send ack when mptcp-level window re-opens - mptcp: fix spurious wake-up on under memory pressure - selftests: mptcp: avoid spurious errors on disconnect - net: ethernet: xgbe: re-add aneg to supported features in PHY quirks - vsock/virtio: cancel close work in the destructor - vsock: reset socket state when de-assigning the transport - nouveau/fence: handle cross device fences properly - irqchip: Plug a OF node reference leak in platform_irqchip_probe() - irqchip/gic-v3: Handle CPU_PM_ENTER_FAILED correctly - drm/i915/fb: Relax clear color alignment to 64 bytes - drm/amdgpu: always sync the GFX pipe on ctx switch - ocfs2: fix deadlock in ocfs2_get_system_file_inode - nfsd: add list_head nf_gc to struct nfsd_file - x86/xen: fix SLS mitigation in xen_hypercall_iret() - efi/zboot: Limit compression options to GZIP and ZSTD - [Config] updateconfigs for HAVE_KERNEL_(LZ4|LZMA|LZO|XZ) - net: ravb: Fix max TX frame size for RZ/V2M - net/mlx5: SF, Fix add port error handling - drm/vmwgfx: Unreserve BO on error - i2c: testunit: on errors, repeat NACK until STOP - hwmon: (ltc2991) Fix mixed signed/unsigned in DIV_ROUND_CLOSEST - fs/qnx6: Fix building with GCC 15 - gpio: sim: lock up configfs that an instantiated device depends on - gpio: sim: lock hog configfs items if present - platform/x86: ISST: Add Clearwater Forest to support list - drm/nouveau/disp: Fix missing backlight control on Macbook 5,1 - net/ncsi: fix locking in Get MAC Address handling - drm/amd/display: Do not elevate mem_type change to full update - drm/xe: Mark ComputeCS read mode as UC on iGPU - drm/amdgpu/smu13: update powersave optimizations - drm/amdgpu: fix fw attestation for MP0_14_0_{2/3} - drm/amdgpu: disable gfxoff with the compute workload on gfx12 - drm/amd/display: Fix PSR-SU not support but still call the amdgpu_dm_psr_enable - Upstream stable to v6.6.73, v6.6.74, v6.12.11 * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21672 - afs: Fix merge preference rule failure condition * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21682 - eth: bnxt: always recalculate features after XDP clearing, fix null-deref * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2024-53124 - net: fix data-races around sk->sk_forward_alloc * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2024-57924 - fs: relax assertions on failure to encode file handles * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2024-57951 - hrtimers: Handle CPU state correctly on hotplug * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2024-57949 - irqchip/gic-v3-its: Don't enable interrupts in its_irq_set_vcpu_affinity() * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21668 - pmdomain: imx8mp-blk-ctrl: add missing loop break condition * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21684 - gpio: xilinx: Convert gpio_lock to raw spinlock * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21694 - fs/proc: fix softlockup in __read_vmcore (part 2) * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21665 - filemap: avoid truncating 64-bit offset to 32 bits * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21666 - vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21669 - vsock/virtio: discard packets if the transport changes * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21670 - vsock/bpf: return early if transport is not assigned * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21667 - iomap: avoid avoid truncating 64-bit offset to 32 bits * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2024-57948 - mac802154: check local interfaces before deleting sdata list * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21673 - smb: client: fix double free of TCP_Server_Info::hostname * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21697 - drm/v3d: Ensure job pointer is set to NULL after job completion * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21674 - net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21675 - net/mlx5: Clear port select structure when fail to create * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21676 - net: fec: handle page_pool_dev_alloc_pages error * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21678 - gtp: Destroy device along with udp socket's netns dismantle. * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21680 - pktgen: Avoid out-of-bounds access in get_imix_entries * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21681 - openvswitch: fix lockup on tx to unregistering netdev with carrier * Noble update: upstream stable patchset 2025-04-16 (LP: #2107449) // CVE-2025-21683 - bpf: Fix bpf_sk_select_reuseport() memory leak * Packaging resync (LP: #1786013) - [Packaging] update annotations scripts -- Philip Cox <philip....@canonical.com> Wed, 28 May 2025 12:34:22 -0400 ** Changed in: linux-aws (Ubuntu Noble) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50157 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53124 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57924 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57948 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57949 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57951 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21665 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21666 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21667 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21668 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21669 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21670 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21672 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21673 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21674 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21675 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21676 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21678 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21680 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21681 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21682 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21683 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21684 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21689 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21690 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21691 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21692 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21694 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21697 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21699 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-2312 ** Changed in: linux-aws (Ubuntu Jammy) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-49636 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-49728 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-53034 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-36945 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-46753 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-46812 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-46821 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53144 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53168 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56551 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56608 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56664 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-58093 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-8805 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21941 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21956 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21957 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21959 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21962 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21963 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21964 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21968 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21970 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21975 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21981 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21991 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21992 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21994 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21996 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21999 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22004 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22005 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22007 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22008 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22010 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22014 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22018 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22020 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22021 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22025 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22035 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22044 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22045 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22050 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22054 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22055 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22056 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22060 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22063 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22066 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22071 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22073 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22075 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22079 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22081 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22086 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22089 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-22097 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23136 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-23138 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37785 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-38152 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-38575 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-38637 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-39728 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-39735 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/2083557 Title: Create 64K page size AWS kernel for ARM Status in linux-aws package in Ubuntu: Invalid Status in linux-aws-6.8 package in Ubuntu: Invalid Status in linux-aws source package in Jammy: Fix Released Status in linux-aws-6.8 source package in Jammy: Fix Released Status in linux-aws source package in Noble: Fix Released Status in linux-aws source package in Plucky: Fix Committed Bug description: [Impact] A 64k page size flavor was requested by AWS. [Fix] Add new flavor and configs for 64k page size on arm64. [Test Case] Compile and boot tested. `getconf PAGE_SIZE` evaluates to 65536. [Where things could go wrong] This is a packaging change which introduces a new flavor, so there is very low chance of regression. The new flavor can be verified to be 64k page size through the `getconf` command. [Other Info] SF #00392971 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2083557/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp