UbuntuUpdates.org

Package "linux-source-4.15.0"

Name: linux-source-4.15.0

Description:

Linux kernel source for version 4.15.0 with Ubuntu patches

Latest version: 4.15.0-101.102~16.04.1
Release: xenial (16.04)
Level: updates
Repository: main
Head package: linux-hwe

Links

Save this URL for the latest version of "linux-source-4.15.0": https://www.ubuntuupdates.org/linux-source-4.15.0


Download "linux-source-4.15.0"


Other versions of "linux-source-4.15.0" in Xenial

Repository Area Version
security main 4.15.0-101.102~16.04.1
proposed main 4.15.0-102.103~16.04.1
PPA: Canonical Kernel Team 4.15.0-102.103~16.04.1

Changelog

Version: 4.15.0-101.102~16.04.1 2020-05-18 14:07:07 UTC

  linux-hwe (4.15.0-101.102~16.04.1) xenial; urgency=medium

  * xenial/linux-hwe: 4.15.0-101.102~16.04.1 -proposed tracker (LP: #1877981)

  [ Ubuntu: 4.15.0-101.102 ]

  * bionic/linux: 4.15.0-101.102 -proposed tracker (LP: #1877262)
  * 4.15.0-100.101 breaks userspace builds due to a bug in the headers
    /usr/include/linux/swab.h of linux-libc-dev (LP: #1877123)
    - include/uapi/linux/swab.h: fix userspace breakage, use __BITS_PER_LONG for
      swap
  * bionic snapdragon 4.15 snap failed Certification testing (LP: #1877657)
    - Revert "drm/msm: Use the correct dma_sync calls in msm_gem"
    - Revert "drm/msm: stop abusing dma_map/unmap for cache"

Source diff to previous version
1877123 4.15.0-100.101 breaks userspace builds due to a bug in the headers /usr/include/linux/swab.h of linux-libc-dev
1877657 bionic snapdragon 4.15 snap failed Certification testing

Version: 4.15.0-99.100~16.04.1 2020-04-28 21:07:02 UTC

  linux-hwe (4.15.0-99.100~16.04.1) xenial; urgency=medium

  [ Ubuntu: 4.15.0-99.100 ]

  * CVE-2020-11884
    - SAUCE: s390/mm: fix page table upgrade vs 2ndary address mode accesses

 -- Marcelo Henrique Cerri <email address hidden> Wed, 22 Apr 2020 18:37:38 -0300

Source diff to previous version
CVE-2020-11884 s390/mm: fix page table upgrade vs 2ndary address mode accesses

Version: 4.15.0-96.97~16.04.1 2020-04-06 18:06:18 UTC

  linux-hwe (4.15.0-96.97~16.04.1) xenial; urgency=medium

  [ Ubuntu: 4.15.0-96.97 ]

  * CVE-2020-8834
    - KVM: PPC: Book3S HV: Factor fake-suspend handling out of
      kvmppc_save/restore_tm
    - KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file
    - KVM: PPC: Book3S PR: Add guest MSR parameter for
      kvmppc_save_tm()/kvmppc_restore_tm()

Source diff to previous version
CVE-2020-8834 RESERVED

Version: 4.15.0-91.92~16.04.1 2020-03-16 17:06:57 UTC

  linux-hwe (4.15.0-91.92~16.04.1) xenial; urgency=medium

  * xenial/linux-hwe: 4.15.0-91.92~16.04.1 -proposed tracker (LP: #1865142)

  [ Ubuntu: 4.15.0-91.92 ]

  * bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
  * CVE-2020-2732
    - KVM: x86: emulate RDPID
    - KVM: nVMX: Don't emulate instructions in guest mode
    - KVM: nVMX: Refactor IO bitmap checks into helper function
    - KVM: nVMX: Check IO instruction VM-exit conditions

Source diff to previous version
CVE-2020-2732 kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources

Version: 4.15.0-88.88~16.04.1 2020-02-17 16:07:01 UTC

  linux-hwe (4.15.0-88.88~16.04.1) xenial; urgency=medium

  * xenial/linux-hwe: 4.15.0-88.88~16.04.1 -proposed tracker (LP: #1862823)

  [ Ubuntu: 4.15.0-88.88 ]

  * bionic/linux: 4.15.0-88.88 -proposed tracker (LP: #1862824)
  * Segmentation fault (kernel oops) with memory-hotplug in
    ubuntu_kernel_selftests on Bionic kernel (LP: #1862312)
    - Revert "mm/memory_hotplug: fix online/offline_pages called w.o.
      mem_hotplug_lock"
    - mm/memory_hotplug: fix online/offline_pages called w.o. mem_hotplug_lock

1862312 Segmentation fault (kernel oops) with memory-hotplug in ubuntu_kernel_selftests on Bionic kernel



About   -   Send Feedback to @ubuntu_updates