Package "linux-libc-dev"
Name: |
linux-libc-dev
|
Description: |
Linux Kernel Headers for development
|
Latest version: |
6.14.0-23.23 |
Release: |
plucky (25.04) |
Level: |
security |
Repository: |
main |
Head package: |
linux |
Links
Download "linux-libc-dev"
Other versions of "linux-libc-dev" in Plucky
Changelog
linux (6.14.0-23.23) plucky; urgency=medium
* plucky/linux: 6.14.0-23.23 -proposed tracker (LP: #2114279)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- [Packaging] update annotations scripts
* CVE-2025-37798
- sch_htb: make htb_qlen_notify() idempotent
- sch_htb: make htb_deactivate() idempotent
- sch_drr: make drr_qlen_notify() idempotent
- sch_hfsc: make hfsc_qlen_notify() idempotent
- sch_qfq: make qfq_qlen_notify() idempotent
- sch_ets: make est_qlen_notify() idempotent
- selftests/tc-testing: Add a test case for FQ_CODEL with HTB parent
- selftests/tc-testing: Add a test case for FQ_CODEL with QFQ parent
- selftests/tc-testing: Add a test case for FQ_CODEL with HFSC parent
- selftests/tc-testing: Add a test case for FQ_CODEL with DRR parent
- selftests/tc-testing: Add a test case for FQ_CODEL with ETS parent
* CVE-2025-37997
- netfilter: ipset: fix region locking in hash types
* CVE-2025-37890
- net_sched: hfsc: Fix a UAF vulnerability in class with netem as child
qdisc
- sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
-- Manuel Diewald <email address hidden> Fri, 13 Jun 2025 20:24:35 +0200
|
Source diff to previous version |
1786013 |
Packaging resync |
CVE-2025-37798 |
In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making |
CVE-2025-37997 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: fix region locking in hash types Region locking introduced in |
CVE-2025-37890 |
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc As |
|
linux (6.14.0-22.22) plucky; urgency=medium
* plucky/linux: 6.14.0-22.22 -proposed tracker (LP: #2111404)
* snapd has high CPU usage for exactly 150 seconds every 5, 7.5 or 10 minutes
(LP: #2110289)
- fs/eventpoll: fix endless busy loop after timeout has expired
|
2110289 |
snapd has high CPU usage for exactly 150 seconds every 5, 7.5 or 10 minutes |
|
About
-
Send Feedback to @ubuntu_updates