UbuntuUpdates.org

Package "linux-hwe-5.17-tools-common"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-hwe-5.17-tools-common

Description:

Linux kernel version specific tools for version 5.17.0

Latest version: 5.17.0-15.16~22.04.8
Release: jammy (22.04)
Level: base
Repository: main
Head package: linux-hwe-5.17

Links


Download "linux-hwe-5.17-tools-common"


Other versions of "linux-hwe-5.17-tools-common" in Jammy

No other version of this package is available in the Jammy release.

Changelog

Version: 5.17.0-15.16~22.04.8 2023-01-20 20:09:07 UTC

 linux-hwe-5.17 (5.17.0-15.16~22.04.8) jammy; urgency=medium
 .
   * jammy/linux-hwe-5.17: 5.17.0-15.16~22.04.8 -proposed tracker (LP: #2003452)
 .
   * Packaging resync (LP: #1786013)
     - [Packaging] update helper scripts
     - debian/dkms-versions -- update from kernel-versions (main/2023.01.02)
 .
   * Revoke & rotate to new signing key (LP: #2002812)
     - [Packaging] Revoke and rotate to new signing key
 .
   * CVE-2022-45934
     - Bluetooth: L2CAP: Fix u8 overflow
 .
   * CVE-2022-42896
     - Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
     - Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
 .
   * CVE-2022-4378
     - proc: proc_skip_spaces() shouldn't think it is working on C strings
     - proc: avoid integer type confusion in get_proc_long

Source diff to previous version
1786013 Packaging resync
2002812 Revoke \u0026 rotate to new signing key
CVE-2022-45934 An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_R
CVE-2022-42896 There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which ma
CVE-2022-4378 A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem ...

Version: 5.17.0-11.12~22.04.8 2022-10-26 02:09:09 UTC

 linux-hwe-5.17 (5.17.0-11.12~22.04.8) jammy; urgency=medium
 .
   * jammy/linux-hwe-5.17: 5.17.0-11.12~22.04.8 -proposed tracker (LP: #1992022)
 .
   * Packaging resync (LP: #1786013)
     - [Packaging] update variants

Source diff to previous version
1786013 Packaging resync

Version: 5.17.0-11.11~22.04.8 2022-10-20 12:08:59 UTC

 linux-hwe-5.17 (5.17.0-11.11~22.04.8) jammy; urgency=medium
 .
   * jammy/linux-hwe-5.17: 5.17.0-11.11~22.04.8 -proposed tracker (LP: #1992022)

Source diff to previous version

Version: 5.17.0-9.9~22.04.8 2022-08-31 18:08:15 UTC

 linux-hwe-5.17 (5.17.0-9.9~22.04.8) jammy; urgency=medium
 .
   * jammy/linux-hwe-5.17: 5.17.0-9.9~22.04.8 -proposed tracker (LP: #1987779)
 .
   * CVE-2022-36946
     - netfilter: nf_queue: do not allow packet truncation below transport header
       offset
 .
   * CVE-2021-33655
     - fbcon: Disallow setting font bigger than screen size
     - fbcon: Prevent that screen size is smaller than font size
     - fbmem: Check virtual screen sizes in fb_set_var()

CVE-2022-36946 nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) beca
CVE-2021-33655 When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.

Version: *DELETED* 2022-08-26 09:07:59 UTC
No changelog for deleted or moved packages.



About   -   Send Feedback to @ubuntu_updates