UbuntuUpdates.org

Release natty does not exist.

Latest Changelogs for all releases

All releases Bionic Focal Jammy Lunar Mantic Noble Precise Trusty Xenial
Include all PPAs Exclude daily builds PPAs Exclude all PPAs
Include levels: securityupdatesbackportsproposedbase

Note: Only updates for "head" packages where the changelog is available are shown on this page (view all).

linux-restricted-signatures-aws May 16th 13:07
Release: focal Repo: restricted Level: proposed New version: 5.4.0-1126.136
Packages in group:  linux-modules-nvidia-525-open-5.4.0-1097-aws linux-modules-nvidia-525-open-5.4.0-1098-aws linux-modules-nvidia-525-open-5.4.0-1099-aws linux-modules-nvidia-525-open-5.4.0-1100-aws linux-modules-nvidia-525-open-5.4.0-1102-aws linux-modules-nvidia-525-open-5.4.0-1104-aws linux-modules-nvidia-525-open-5.4.0-1107-aws linux-modules-nvidia-525-open-5.4.0-1109-aws linux-modules-nvidia-525-open-5.4.0-1111-aws linux-modules-nvidia-525-open-5.4.0-1113-aws linux-modules-nvidia-525-open-5.4.0-1115-aws (... see all)

  linux-restricted-signatures-aws (5.4.0-1126.136) focal; urgency=medium

  * Main version: 5.4.0-1126.136

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/tracking-bug -- resync from main package

 -- Philip Cox <email address hidden> Fri, 10 May 2024 10:56:43 -0400

1786013 Packaging resync

linux-restricted-modules-aws May 16th 13:07
Release: focal Repo: restricted Level: proposed New version: 5.4.0-1126.136
Packages in group:  linux-modules-nvidia-390-5.4.0-1010-aws linux-modules-nvidia-390-5.4.0-1011-aws linux-modules-nvidia-390-5.4.0-1012-aws linux-modules-nvidia-390-5.4.0-1015-aws linux-modules-nvidia-390-5.4.0-1016-aws linux-modules-nvidia-390-5.4.0-1017-aws linux-modules-nvidia-390-5.4.0-1018-aws linux-modules-nvidia-390-5.4.0-1019-aws linux-modules-nvidia-390-5.4.0-1020-aws linux-modules-nvidia-390-5.4.0-1021-aws linux-modules-nvidia-390-5.4.0-1022-aws (... see all)

  linux-restricted-modules-aws (5.4.0-1126.136) focal; urgency=medium

  * Main version: 5.4.0-1126.136

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/tracking-bug -- resync from main package

 -- Philip Cox <email address hidden> Fri, 10 May 2024 10:56:43 -0400

1786013 Packaging resync

s390-tools-signed May 16th 08:07
Release: mantic Repo: main Level: proposed New version: 2.29.0-0ubuntu2.2
Packages in group: 

  s390-tools-signed (2.29.0-0ubuntu2.2) mantic; urgency=medium

  * Rebuild against 2.29.0-0ubuntu2.2 (LP: #2059303)

 -- Frank Heimes <email address hidden> Mon, 15 Apr 2024 20:13:31 +0200


linux-restricted-signatures-nvidia-6.8 May 15th 23:06
Release: jammy Repo: restricted Level: proposed New version: 6.8.0-1006.6~22.04.2+1
Packages in group:  linux-modules-nvidia-535-open-6.8.0-1006-nvidia linux-modules-nvidia-535-server-open-6.8.0-1006-nvidia linux-modules-nvidia-550-open-6.8.0-1006-nvidia linux-modules-nvidia-550-server-open-6.8.0-1006-nvidia linux-signatures-nvidia-6.8.0-1006-nvidia

  linux-restricted-signatures-nvidia-6.8 (6.8.0-1006.6~22.04.2+1) jammy; urgency=medium

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/dkms-versions -- update to remove 390 and 450-server

 -- Jacob Martin <email address hidden> Mon, 06 May 2024 16:27:05 -0500

1786013 Packaging resync

linux-signed-nvidia-6.8 May 15th 23:06
Release: jammy Repo: main Level: proposed New version: 6.8.0-1006.6~22.04.2
Packages in group:  linux-image-6.8.0-1006-nvidia linux-image-uc-6.8.0-1006-nvidia

  linux-signed-nvidia-6.8 (6.8.0-1006.6~22.04.2) jammy; urgency=medium

  * Main version: 6.8.0-1006.6~22.04.2

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/tracking-bug -- resync from main package

 -- Ian May <email address hidden> Wed, 01 May 2024 12:34:20 -0500

1786013 Packaging resync

linux-restricted-signatures-lowlatency-hwe-6.5 May 15th 22:07
Release: jammy Repo: restricted Level: security New version: 6.5.0-35.35.1~22.04.1
Packages in group:  linux-modules-nvidia-525-open-6.5.0-14-lowlatency linux-modules-nvidia-525-open-6.5.0-15-lowlatency linux-modules-nvidia-525-open-6.5.0-17-lowlatency linux-modules-nvidia-525-open-6.5.0-21-lowlatency linux-modules-nvidia-525-open-6.5.0-25-lowlatency linux-modules-nvidia-525-open-6.5.0-26-lowlatency linux-modules-nvidia-535-open-6.5.0-14-lowlatency linux-modules-nvidia-535-open-6.5.0-15-lowlatency linux-modules-nvidia-535-open-6.5.0-17-lowlatency linux-modules-nvidia-535-open-6.5.0-21-lowlatency linux-modules-nvidia-535-open-6.5.0-25-lowlatency (... see all)

  linux-restricted-signatures-lowlatency-hwe-6.5 (6.5.0-35.35.1~22.04.1) jammy; urgency=medium

  * Main version: 6.5.0-35.35.1~22.04.1

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/tracking-bug -- resync from main package

 -- Roxana Nicolescu <email address hidden> Tue, 07 May 2024 12:17:27 +0200

1786013 Packaging resync

linux-restricted-modules-lowlatency-hwe-6.5 May 15th 22:07
Release: jammy Repo: restricted Level: security New version: 6.5.0-35.35.1~22.04.1
Packages in group:  linux-modules-nvidia-435-lowlatency-hwe-22.04 linux-modules-nvidia-435-lowlatency-hwe-22.04-edge linux-modules-nvidia-440-lowlatency-hwe-22.04 linux-modules-nvidia-440-lowlatency-hwe-22.04-edge linux-modules-nvidia-450-lowlatency-hwe-22.04 linux-modules-nvidia-450-lowlatency-hwe-22.04-edge linux-modules-nvidia-455-lowlatency-hwe-22.04 linux-modules-nvidia-455-lowlatency-hwe-22.04-edge linux-modules-nvidia-460-lowlatency-hwe-22.04 linux-modules-nvidia-460-lowlatency-hwe-22.04-edge linux-modules-nvidia-460-server-lowlatency-hwe-22.04 (... see all)

  linux-restricted-modules-lowlatency-hwe-6.5 (6.5.0-35.35.1~22.04.1) jammy; urgency=medium

  * Main version: 6.5.0-35.35.1~22.04.1

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/tracking-bug -- resync from main package

1786013 Packaging resync

linux-nvidia-tegra-igx-modules-signed May 15th 22:07
Release: jammy Repo: main Level: security New version: 5.15.0-1012.12+1
Packages in group:  linux-nvidia-tegra-igx-tegra-igpu-igx-defaults

  linux-nvidia-tegra-igx-modules-signed (5.15.0-1012.12+1) jammy; urgency=medium

  * Master version: 5.15.0-1012.12+1

 -- Jacob Martin <email address hidden> Wed, 08 May 2024 09:34:44 -0500


linux-signed-lowlatency-hwe-6.5 May 15th 22:07
Release: jammy Repo: main Level: security New version: 6.5.0-35.35.1~22.04.1
Packages in group:  linux-image-6.5.0-14-lowlatency linux-image-6.5.0-15-lowlatency linux-image-6.5.0-17-lowlatency linux-image-6.5.0-21-lowlatency linux-image-6.5.0-25-lowlatency linux-image-6.5.0-26-lowlatency linux-image-6.5.0-27-lowlatency linux-image-6.5.0-28-lowlatency linux-image-6.5.0-35-lowlatency

  linux-signed-lowlatency-hwe-6.5 (6.5.0-35.35.1~22.04.1) jammy; urgency=medium

  * Main version: 6.5.0-35.35.1~22.04.1

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/tracking-bug -- resync from main package

1786013 Packaging resync


linux-lowlatency-hwe-6.5 May 15th 22:07
Release: jammy Repo: main Level: security New version: 6.5.0-35.35.1~22.04.1
Packages in group:  linux-buildinfo-6.5.0-14-lowlatency linux-buildinfo-6.5.0-15-lowlatency linux-buildinfo-6.5.0-17-lowlatency linux-buildinfo-6.5.0-21-lowlatency linux-buildinfo-6.5.0-25-lowlatency linux-buildinfo-6.5.0-26-lowlatency linux-buildinfo-6.5.0-27-lowlatency linux-buildinfo-6.5.0-28-lowlatency linux-buildinfo-6.5.0-35-lowlatency linux-cloud-tools-6.5.0-14-lowlatency linux-cloud-tools-6.5.0-15-lowlatency (... see all)

  linux-lowlatency-hwe-6.5 (6.5.0-35.35.1~22.04.1) jammy; urgency=medium

  * jammy/linux-lowlatency-hwe-6.5: 6.5.0-35.35.1~22.04.1 -proposed tracker
    (LP: #2063566)

  [ Ubuntu: 6.5.0-35.35.1 ]

  * mantic/linux-lowlatency: 6.5.0-35.35.1 -proposed tracker (LP: #2063567)
  * mantic/linux: 6.5.0-35.35 -proposed tracker (LP: #2063581)
  * cifs: Copying file to same directory results in page fault (LP: #2060919)
    - SAUCE: Revert "cifs: fix flushing folio regression for 6.1 backport"
  * CVE-2024-26805
    - netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
  * CVE-2024-26801
    - Bluetooth: Avoid potential use-after-free in hci_error_reset
  * CVE-2024-26704
    - ext4: fix double-free of blocks due to wrong extents moved_len
  * CVE-2023-52601
    - jfs: fix array-index-out-of-bounds in dbAdjTree
  * CVE-2024-26635
    - llc: Drop support for ETH_P_TR_802_2.
  * CVE-2024-26622
    - tomoyo: fix UAF write bug in tomoyo_write_control()
  * CVE-2024-26614
    - tcp: make sure init the accept_queue's spinlocks once
    - ipv6: init the accept_queue's spinlocks in inet6_create
  * CVE-2024-52615
    - hwrng: core - Fix page fault dead lock on mmap-ed hwrng
  * CVE-2024-52602
    - jfs: fix slab-out-of-bounds Read in dtSearch
  * CVE-2023-47233
    - wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach
  * CVE-2024-2201
    - x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file
    - x86/syscall: Don't force use of indirect calls for system calls
    - x86/bhi: Add support for clearing branch history at syscall entry
    - x86/bhi: Define SPEC_CTRL_BHI_DIS_S
    - x86/bhi: Enumerate Branch History Injection (BHI) bug
    - x86/bhi: Add BHI mitigation knob
    - x86/bhi: Mitigate KVM by default
    - KVM: x86: Add BHI_NO
    - [Config] Set CONFIG_BHI to enabled (auto)

 -- Roxana Nicolescu <email address hidden> Tue, 07 May 2024 12:05:01 +0200

2060919 cifs: Copying file to same directory results in page fault
CVE-2024-26805 In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter syzbot reported
CVE-2024-26801 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Avoid potential use-after-free in hci_error_reset While handling the
CVE-2024-26704 In the Linux kernel, the following vulnerability has been resolved: ext4: fix double-free of blocks due to wrong extents moved_len In ext4_move_ext
CVE-2023-52601 In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in dbAdjTree Currently there is a bound chec
More...

dotnet8 May 15th 16:07
Release: noble Repo: main Level: updates New version: 8.0.105-8.0.5-0ubuntu1~24.04.1
Packages in group:  aspnetcore-runtime-8.0 aspnetcore-targeting-pack-8.0 dotnet-apphost-pack-8.0 dotnet-host-8.0 dotnet-hostfxr-8.0 dotnet-runtime-8.0 dotnet-sdk-8.0 dotnet-targeting-pack-8.0 dotnet-templates-8.0 netstandard-targeting-pack-2.1-8.0

  dotnet8 (8.0.105-8.0.5-0ubuntu1~24.04.1) noble-security; urgency=medium

  * New upstream release
  * SECURITY UPDATE: stack buffer overflow
    - CVE-2024-30045: a stack based buffer overflow in the .NET Double Parse
      routine allows for remote code execution.
  * SECURITY UPDATE: resource dead-lock
    - CVE-2024-30046: a dead-lock in Http2OutputProducer.Stop() results in a
      denial of service.
  * debian/patches/0001-fix-clang18-build.patch: refreshed patch to remove
    new upstream inclusions.

 -- Ian Constantin <email address hidden> Thu, 09 May 2024 17:16:30 +0300

CVE-2024-30045 .NET and Visual Studio Remote Code Execution Vulnerability
CVE-2024-30046 Visual Studio Denial of Service Vulnerability

dotnet7 May 15th 16:07
Release: mantic Repo: universe Level: updates New version: 7.0.119-0ubuntu1~23.10.1
Packages in group:  aspnetcore-runtime-7.0 aspnetcore-targeting-pack-7.0 dotnet-apphost-pack-7.0 dotnet-host-7.0 dotnet-hostfxr-7.0 dotnet-runtime-7.0 dotnet-sdk-7.0 dotnet-sdk-7.0-source-built-artifacts dotnet-targeting-pack-7.0 dotnet-templates-7.0 netstandard-targeting-pack-2.1-7.0 (... see all)

  dotnet7 (7.0.119-0ubuntu1~23.10.1) mantic-security; urgency=medium

  * New upstream release
  * SECURITY UPDATE: stack buffer overflow
    - CVE-2024-30045: a stack based buffer overflow in the .NET Double Parse
      routine allows for remote code execution.
  * SECURITY UPDATE: resource dead-lock
    - CVE-2024-30046: a dead-lock in Http2OutputProducer.Stop() results in a
      denial of service.

 -- Ian Constantin <email address hidden> Thu, 09 May 2024 15:47:33 +0300

CVE-2024-30045 .NET and Visual Studio Remote Code Execution Vulnerability
CVE-2024-30046 Visual Studio Denial of Service Vulnerability

dotnet8 May 15th 16:07
Release: mantic Repo: main Level: updates New version: 8.0.105-8.0.5-0ubuntu1~23.10.1
Packages in group:  aspnetcore-runtime-8.0 aspnetcore-targeting-pack-8.0 dotnet-apphost-pack-8.0 dotnet-host-8.0 dotnet-hostfxr-8.0 dotnet-runtime-8.0 dotnet-sdk-8.0 dotnet-sdk-8.0-source-built-artifacts dotnet-targeting-pack-8.0 dotnet-templates-8.0 netstandard-targeting-pack-2.1-8.0 (... see all)

  dotnet8 (8.0.105-8.0.5-0ubuntu1~23.10.1) mantic-security; urgency=medium

  * New upstream release
  * SECURITY UPDATE: stack buffer overflow
    - CVE-2024-30045: a stack based buffer overflow in the .NET Double Parse
      routine allows for remote code execution.
  * SECURITY UPDATE: resource dead-lock
    - CVE-2024-30046: a dead-lock in Http2OutputProducer.Stop() results in a
      denial of service.

 -- Ian Constantin <email address hidden> Thu, 09 May 2024 17:16:34 +0300

CVE-2024-30045 .NET and Visual Studio Remote Code Execution Vulnerability
CVE-2024-30046 Visual Studio Denial of Service Vulnerability

dotnet7 May 15th 16:07
Release: jammy Repo: universe Level: updates New version: 7.0.119-0ubuntu1~22.04.1
Packages in group:  aspnetcore-runtime-7.0 aspnetcore-targeting-pack-7.0 dotnet-apphost-pack-7.0 dotnet-host-7.0 dotnet-hostfxr-7.0 dotnet-runtime-7.0 dotnet-sdk-7.0 dotnet-sdk-7.0-source-built-artifacts dotnet-targeting-pack-7.0 dotnet-templates-7.0 netstandard-targeting-pack-2.1-7.0 (... see all)

  dotnet7 (7.0.119-0ubuntu1~22.04.1) jammy-security; urgency=medium

  * New upstream release
  * SECURITY UPDATE: stack buffer overflow
    - CVE-2024-30045: a stack based buffer overflow in the .NET Double Parse
      routine allows for remote code execution.
  * SECURITY UPDATE: resource dead-lock
    - CVE-2024-30046: a dead-lock in Http2OutputProducer.Stop() results in a
      denial of service.

 -- Ian Constantin <email address hidden> Thu, 09 May 2024 15:47:29 +0300

CVE-2024-30045 .NET and Visual Studio Remote Code Execution Vulnerability
CVE-2024-30046 Visual Studio Denial of Service Vulnerability



About   -   Send Feedback to @ubuntu_updates