UbuntuUpdates.org

Package "linux-hwe-5.15"

Name: linux-hwe-5.15

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel buildinfo for version 5.15.0 on 64 bit x86 SMP
  • Linux kernel buildinfo for version 5.15.0 on 64 bit x86 SMP
  • Linux kernel buildinfo for version 5.15.0 on 64 bit x86 SMP
  • Linux kernel buildinfo for version 5.15.0 on 64 bit x86 SMP

Latest version: 5.15.0-139.149~20.04.1
Release: focal (20.04)
Level: updates
Repository: main

Links



Other versions of "linux-hwe-5.15" in Focal

Repository Area Version
security main 5.15.0-138.148~20.04.1
proposed main 5.15.0-138.148~20.04.1
PPA: Canonical Kernel Team 5.15.0-140.150~20.04.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.15.0-139.149~20.04.1 2025-05-01 23:07:37 UTC

  linux-hwe-5.15 (5.15.0-139.149~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.15: 5.15.0-139.149~20.04.1 -proposed tracker
    (LP: #2107036)

  [ Ubuntu: 5.15.0-139.149 ]

  * jammy/linux: 5.15.0-139.149 -proposed tracker (LP: #2107038)
  * Packaging resync (LP: #1786013)
    - [Packaging] update annotations scripts
  * CVE-2023-52664
    - net: atlantic: eliminate double free in error handling logic
  * CVE-2023-52927
    - netfilter: allow exp not to be removed in nf_ct_find_expectation

 -- Stefan Bader <email address hidden> Wed, 16 Apr 2025 09:48:19 +0200

Source diff to previous version
1786013 Packaging resync
CVE-2023-52664 In the Linux kernel, the following vulnerability has been resolved: net: atlantic: eliminate double free in error handling logic Driver has a logic
CVE-2023-52927 In the Linux kernel, the following vulnerability has been resolved: netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_c

Version: 5.15.0-138.148~20.04.1 2025-04-22 19:07:04 UTC

  linux-hwe-5.15 (5.15.0-138.148~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.15: 5.15.0-138.148~20.04.1 -proposed tracker
    (LP: #2102585)

  [ Ubuntu: 5.15.0-138.148 ]

  * jammy/linux: 5.15.0-138.148 -proposed tracker (LP: #2102587)
  * ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J
    (LP: #2096976)
    - SAUCE: selftest: netfilter: fix null IP field in kci_test_ipsec_offload
  * CVE-2025-21756
    - vsock: Keep the binding until socket destruction
    - vsock: Orphan socket after transport release
  * CVE-2024-50256
    - netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
  * CVE-2025-21702
    - pfifo_tail_enqueue: Drop new packet when sch->limit == 0
  * CVE-2025-21703
    - netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
  * CVE-2025-21700
    - net: sched: Disallow replacing of child qdisc from one parent to another
  * CVE-2024-46826
    - ELF: fix kernel.randomize_va_space double read
  * CVE-2024-56651
    - can: hi311x: hi3110_can_ist(): fix potential use-after-free
  * iBFT iSCSI out-of-bounds shift UBSAN warning (LP: #2097824)
    - iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
  * CVE-2024-50248
    - ntfs3: Add bounds checking to mi_enum_attr()
    - fs/ntfs3: Sequential field availability check in mi_enum_attr()
  * CVE-2022-0995
    - watch_queue: Use the bitmap API when applicable
  * CVE-2024-26837
    - net: bridge: switchdev: Skip MDB replays of deferred events on offload
  * CVE-2025-21701
    - net: avoid race between device unregistration and ethnl ops
  * CVE-2024-57798
    - drm/dp_mst: Skip CSN if topology probing is not done yet
    - drm/dp_mst: Ensure mst_primary pointer is valid in
      drm_dp_mst_handle_up_req()
  * CVE-2024-56658
    - net: defer final 'struct net' free in netns dismantle
  * CVE-2024-35864
    - smb: client: fix potential UAF in smb2_is_valid_lease_break()
  * CVE-2024-35864/CVE-2024-26928
    - smb: client: fix potential UAF in cifs_debug_files_proc_show()

 -- Stefan Bader <email address hidden> Fri, 28 Mar 2025 15:04:23 +0100

Source diff to previous version
2096976 ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J
2097824 iBFT iSCSI out-of-bounds shift UBSAN warning
CVE-2025-21756 In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; thi
CVE-2024-50256 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() I got a syzb
CVE-2025-21702 In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 Expected behaviour: In
CVE-2025-21703 In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_
CVE-2025-21700 In the Linux kernel, the following vulnerability has been resolved: net: sched: Disallow replacing of child qdisc from one parent to another Lion A
CVE-2024-46826 In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses "randomize_va_sp
CVE-2024-56651 In the Linux kernel, the following vulnerability has been resolved: can: hi311x: hi3110_can_ist(): fix potential use-after-free The commit a22bd630
CVE-2024-50248 In the Linux kernel, the following vulnerability has been resolved: ntfs3: Add bounds checking to mi_enum_attr() Added bounds checking to make sure
CVE-2022-0995 An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of t
CVE-2024-26837 In the Linux kernel, the following vulnerability has been resolved: net: bridge: switchdev: Skip MDB replays of deferred events on offload Before t
CVE-2025-21701 In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace
CVE-2024-57798 In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() W
CVE-2024-56658 In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-
CVE-2024-35864 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions tha
CVE-2024-26928 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions th

Version: 5.15.0-136.147~20.04.1 2025-03-31 19:07:10 UTC

  linux-hwe-5.15 (5.15.0-136.147~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.15: 5.15.0-136.147~20.04.1 -proposed tracker
    (LP: #2102427)

  [ Ubuntu: 5.15.0-136.147 ]

  * jammy/linux: 5.15.0-136.147 -proposed tracker (LP: #2102429)
  * CVE-2024-57798
    - drm/dp_mst: Skip CSN if topology probing is not done yet
    - drm/dp_mst: Ensure mst_primary pointer is valid in
      drm_dp_mst_handle_up_req()
  * CVE-2024-56658
    - net: defer final 'struct net' free in netns dismantle
  * CVE-2024-35864
    - smb: client: fix potential UAF in smb2_is_valid_lease_break()
  * CVE-2024-35864/CVE-2024-26928
    - smb: client: fix potential UAF in cifs_debug_files_proc_show()

 -- Stefan Bader <email address hidden> Wed, 19 Mar 2025 16:37:07 +0100

Source diff to previous version
CVE-2024-57798 In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() W
CVE-2024-56658 In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-
CVE-2024-35864 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions tha
CVE-2024-26928 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions th

Version: 5.15.0-134.145~20.04.1 2025-03-04 20:06:53 UTC

  linux-hwe-5.15 (5.15.0-134.145~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.15: 5.15.0-134.145~20.04.1 -proposed tracker
    (LP: #2097942)

  * Packaging resync (LP: #1786013)
    - [Packaging] debian.hwe-5.15/dkms-versions -- update from kernel-versions
      (main/s2025.01.13)

  [ Ubuntu: 5.15.0-134.145 ]

  * jammy/linux: 5.15.0-134.145 -proposed tracker (LP: #2097944)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/s2025.01.13)
  * CVE-2024-56672
    - blk-cgroup: Fix UAF in blkcg_unpin_online()

 -- Stefan Bader <email address hidden> Mon, 17 Feb 2025 14:07:56 +0100

Source diff to previous version
1786013 Packaging resync
CVE-2024-56672 In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the b

Version: 5.15.0-131.141~20.04.1 2025-01-28 00:06:58 UTC

  linux-hwe-5.15 (5.15.0-131.141~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.15: 5.15.0-131.141~20.04.1 -proposed tracker
    (LP: #2093571)

  [ Ubuntu: 5.15.0-131.141 ]

  * jammy/linux: 5.15.0-131.141 -proposed tracker (LP: #2093573)
  * CVE-2024-53164
    - net: sched: fix ordering of qlen adjustment
  * CVE-2024-53141
    - netfilter: ipset: add missing range check in bitmap_ip_uadt
  * CVE-2024-53103
    - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer

 -- Stefan Bader <email address hidden> Thu, 16 Jan 2025 15:37:39 +0100

CVE-2024-53164 In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch->q.qlen around qdisc
CVE-2024-53141 In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_
CVE-2024-53103 In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs



About   -   Send Feedback to @ubuntu_updates