Package "linux-modules-iwlwifi-6.8.0-85-lowlatency"
Name: |
linux-modules-iwlwifi-6.8.0-85-lowlatency
|
Description: |
Linux kernel iwlwifi modules for version 6.8.0-85
|
Latest version: |
6.8.0-85.85.1~22.04.1 |
Release: |
jammy (22.04) |
Level: |
updates |
Repository: |
main |
Head package: |
linux-lowlatency-hwe-6.8 |
Links
Download "linux-modules-iwlwifi-6.8.0-85-lowlatency"
Other versions of "linux-modules-iwlwifi-6.8.0-85-lowlatency" in Jammy
Changelog
linux-lowlatency-hwe-6.8 (6.8.0-85.85.1~22.04.1) jammy; urgency=medium
* jammy/linux-lowlatency-hwe-6.8: 6.8.0-85.85.1~22.04.1 -proposed tracker (LP: #2125089)
[ Ubuntu-lowlatency: 6.8.0-85.85.1 ]
* noble/linux-lowlatency: 6.8.0-85.85.1 -proposed tracker (LP: #2125090)
[ Ubuntu: 6.8.0-85.85 ]
* noble/linux: 6.8.0-85.85 -proposed tracker (LP: #2125109)
* Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
* CVE-2025-38500
- xfrm: interface: fix use-after-free after changing collect_md xfrm
interface
* TLS socket disconnection causes various issues (LP: #2120516) //
CVE-2025-37756
- net: tls: explicitly disallow disconnect
* CVE-2025-38477
- net/sched: sch_qfq: Fix race condition on qfq_aggregate
- net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
qfq_delete_class
* CVE-2025-38618
- vsock: Do not allow binding to VMADDR_PORT_ANY
* CVE-2025-38617
- net/packet: fix a race in packet_set_ring() and packet_notifier()
* CVE-2025-37785
- ext4: fix OOB read when checking dotdot dir
-- Edoardo Canepa <email address hidden> Mon, 22 Sep 2025 11:45:14 +0200
|
Source diff to previous version |
1786013 |
Packaging resync |
2120516 |
TLS socket disconnection causes various issues |
CVE-2025-38500 |
In the Linux kernel, the following vulnerability has been resolved: xfrm: interface: fix use-after-free after changing collect_md xfrm interface co |
CVE-2025-37756 |
In the Linux kernel, the following vulnerability has been resolved: net: tls: explicitly disallow disconnect syzbot discovered that it can disconne |
CVE-2025-38477 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc |
CVE-2025-38618 |
In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to au |
CVE-2025-38617 |
In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_s |
CVE-2025-37785 |
In the Linux kernel, the following vulnerability has been resolved: ext4: fix OOB read when checking dotdot dir Mounting a corrupted filesystem wit |
|
linux-lowlatency-hwe-6.8 (6.8.0-84.84.1~22.04.1) jammy; urgency=medium
[ Ubuntu-lowlatency: 6.8.0-84.84.1 ]
[ Ubuntu: 6.8.0-84.84 ]
* Linux refcount imbalance in af_unix subsystem (LP: #2121515)
- SAUCE: af_unix: Fix GC compatibility with upstream OOB refcount changes
|
Source diff to previous version |
2121515 |
Linux refcount imbalance in af_unix subsystem |
|
linux-lowlatency-hwe-6.8 (6.8.0-83.83.1~22.04.1) jammy; urgency=medium
[ Ubuntu-lowlatency: 6.8.0-83.83.1 ]
[ Ubuntu: 6.8.0-83.83 ]
* Linux refcount imbalance in af_unix subsystem (LP: #2121515)
- SAUCE: af_unix: Fix GC compatibility with upstream OOB refcount changes
* Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
-- Manuel Diewald <email address hidden> Tue, 09 Sep 2025 22:39:03 +0200
|
Source diff to previous version |
|
linux-lowlatency-hwe-6.8 (6.8.0-79.79.1~22.04.1) jammy; urgency=medium
* jammy/linux-lowlatency-hwe-6.8: 6.8.0-79.79.1~22.04.1 -proposed tracker (LP: #2119902)
[ Ubuntu-lowlatency: 6.8.0-79.79.1 ]
* noble/linux-lowlatency: 6.8.0-79.79.1 -proposed tracker (LP: #2119903)
[ Ubuntu: 6.8.0-79.79 ]
* noble/linux: 6.8.0-79.79 -proposed tracker (LP: #2120415)
* CVE-2024-57996 // CVE-2025-37752
- net_sched: sch_sfq: move the limit validation
* CVE-2025-38350
- net/sched: Always pass notifications when child class becomes empty
* CVE-2025-21887
- ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up
-- Edoardo Canepa <email address hidden> Sat, 16 Aug 2025 09:39:34 +0300
|
Source diff to previous version |
CVE-2024-57996 |
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does |
CVE-2025-37752 |
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly |
CVE-2025-38350 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain cla |
CVE-2025-21887 |
In the Linux kernel, the following vulnerability has been resolved: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up The iss |
|
linux-lowlatency-hwe-6.8 (6.8.0-78.78.1~22.04.1) jammy; urgency=medium
* jammy/linux-lowlatency-hwe-6.8: 6.8.0-78.78.1~22.04.1 -proposed tracker (LP: #2120388)
[ Ubuntu-lowlatency: 6.8.0-78.78.1 ]
* noble/linux-lowlatency: 6.8.0-78.78.1 -proposed tracker (LP: #2120389)
[ Ubuntu: 6.8.0-78.78 ]
* noble/linux: 6.8.0-78.78 -proposed tracker (LP: #2120405)
* Incorrect backport for CVE-2025-21861 causes kernel hangs
(LP: #2120330) // CVE-2025-21861
- mm/migrate_device: don't add folio to be freed to LRU in
migrate_device_finalize()
* Incorrect backport for CVE-2025-21861 causes kernel hangs (LP: #2120330)
- SAUCE: Revert "mm/migrate_device: don't add folio to be freed to LRU in
migrate_device_finalize()"
- mm: migrate_device: use more folio in migrate_device_finalize()
|
2120330 |
Incorrect backport for CVE-2025-21861 causes kernel hangs |
CVE-2025-21861 |
In the Linux kernel, the following vulnerability has been resolved: mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize |
|
About
-
Send Feedback to @ubuntu_updates