UbuntuUpdates.org

Latest Changelogs for all releases

All releases Bionic Focal Jammy Lunar Mantic Noble Precise Trusty Xenial
Include all PPAs Exclude daily builds PPAs Exclude all PPAs
Include levels: securityupdatesbackportsproposedbase

Note: Only updates for "head" packages where the changelog is available are shown on this page (view all).

s390-tools May 14th 16:06
Release: mantic Repo: main Level: proposed New version: 2.29.0-0ubuntu2.2
Packages in group:  s390-tools-data

  s390-tools (2.29.0-0ubuntu2.2) mantic; urgency=medium

  * Add the following commits as patches:
    - d/p/lp-2059303-rust-pv-test-Code-Certificate-refactoring.patch
      (excluded patching binary files rust/pv/tests/assets/cert/der.crl and
       rust/pv/tests/assets/cert/der.crt, which is not supported by quilt
       - these files are needed for testing only)
    - d/p/lp-2059303-rust-pv-Support-Armonk-in-IBM-signing-key-subject.patch
    - d/p/lp-2059303-genprotimg-support-Armonk-in-IBM-signing-key-subject.patch
    - d/p/lp-2059303-libpv-Support-Armonk-in-IBM-signing-key-subject.patch
    - d/p/lp-2059303-pvattest-Fix-root-ca-parsing.patch
    to fix Secure Execution tooling and accept new IBM host-key
    subject locality. LP: #2059303

 -- Frank Heimes <email address hidden> Wed, 03 Apr 2024 12:40:19 +0200


linux-signed-gkeop-5.15 May 14th 16:06
Release: focal Repo: main Level: proposed New version: 5.15.0-1046.53~20.04.1
Packages in group:  linux-image-5.15.0-1034-gkeop linux-image-5.15.0-1036-gkeop linux-image-5.15.0-1038-gkeop linux-image-5.15.0-1040-gkeop linux-image-5.15.0-1044-gkeop linux-image-5.15.0-1046-gkeop

  linux-signed-gkeop-5.15 (5.15.0-1046.53~20.04.1) focal; urgency=medium

  * Main version: 5.15.0-1046.53~20.04.1

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/tracking-bug -- resync from main package

 -- Kevin Becker <email address hidden> Sun, 12 May 2024 23:19:13 +0200

1786013 Packaging resync

linux-meta-gkeop-5.15 May 14th 16:06
Release: focal Repo: main Level: proposed New version: 5.15.0.1046.53~20.04.1
Packages in group:  linux-cloud-tools-gkeop-5.15 linux-cloud-tools-gkeop-edge linux-gkeop-5.15 linux-gkeop-edge linux-headers-gkeop-5.15 linux-headers-gkeop-edge linux-image-gkeop-5.15 linux-image-gkeop-edge linux-modules-extra-gkeop-5.15 linux-modules-extra-gkeop-edge linux-tools-gkeop-5.15 (... see all)

  linux-meta-gkeop-5.15 (5.15.0.1046.53~20.04.1) focal; urgency=medium

  * Bump ABI 5.15.0-1046.53~20.04

 -- Kevin Becker <email address hidden> Sun, 12 May 2024 23:18:49 +0200


strongswan May 14th 13:07
Release: jammy Repo: universe Level: updates New version: 5.9.5-2ubuntu2.3
Packages in group:  charon-cmd charon-systemd libcharon-extra-plugins libstrongswan-extra-plugins strongswan-nm strongswan-pki strongswan-scepclient strongswan-swanctl

  strongswan (5.9.5-2ubuntu2.3) jammy-security; urgency=medium

  * SECURITY UPDATE: improper certificate validation
    - debian/patches/CVE-2022-4967.patch: enforce client/server identity
      when looking for public key in src/libtls/tls_peer.c,
      src/libtls/tls_server.c.
    - CVE-2022-4967

 -- Marc Deslauriers <email address hidden> Mon, 13 May 2024 16:16:55 +0200

CVE-2022-4967 strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297).

strongswan May 14th 13:07
Release: jammy Repo: universe Level: security New version: 5.9.5-2ubuntu2.3
Packages in group:  charon-cmd charon-systemd libcharon-extra-plugins libstrongswan-extra-plugins strongswan-nm strongswan-pki strongswan-scepclient strongswan-swanctl

  strongswan (5.9.5-2ubuntu2.3) jammy-security; urgency=medium

  * SECURITY UPDATE: improper certificate validation
    - debian/patches/CVE-2022-4967.patch: enforce client/server identity
      when looking for public key in src/libtls/tls_peer.c,
      src/libtls/tls_server.c.
    - CVE-2022-4967

 -- Marc Deslauriers <email address hidden> Mon, 13 May 2024 16:16:55 +0200

CVE-2022-4967 strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297).

strongswan May 14th 13:07
Release: jammy Repo: main Level: updates New version: 5.9.5-2ubuntu2.3
Packages in group:  libcharon-extauth-plugins libstrongswan libstrongswan-standard-plugins strongswan-charon strongswan-libcharon strongswan-starter

  strongswan (5.9.5-2ubuntu2.3) jammy-security; urgency=medium

  * SECURITY UPDATE: improper certificate validation
    - debian/patches/CVE-2022-4967.patch: enforce client/server identity
      when looking for public key in src/libtls/tls_peer.c,
      src/libtls/tls_server.c.
    - CVE-2022-4967

 -- Marc Deslauriers <email address hidden> Mon, 13 May 2024 16:16:55 +0200

CVE-2022-4967 strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297).

strongswan May 14th 13:07
Release: jammy Repo: main Level: security New version: 5.9.5-2ubuntu2.3
Packages in group:  libcharon-extauth-plugins libstrongswan libstrongswan-standard-plugins strongswan-charon strongswan-libcharon strongswan-starter

  strongswan (5.9.5-2ubuntu2.3) jammy-security; urgency=medium

  * SECURITY UPDATE: improper certificate validation
    - debian/patches/CVE-2022-4967.patch: enforce client/server identity
      when looking for public key in src/libtls/tls_peer.c,
      src/libtls/tls_server.c.
    - CVE-2022-4967

 -- Marc Deslauriers <email address hidden> Mon, 13 May 2024 16:16:55 +0200

CVE-2022-4967 strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297).

linux-signed-aws May 14th 13:07
Release: focal Repo: main Level: proposed New version: 5.4.0-1126.136
Packages in group:  linux-image-5.4.0-1061-aws linux-image-5.4.0-1064-aws linux-image-5.4.0-1065-aws linux-image-5.4.0-1066-aws linux-image-5.4.0-1067-aws linux-image-5.4.0-1069-aws linux-image-5.4.0-1070-aws linux-image-5.4.0-1071-aws linux-image-5.4.0-1072-aws linux-image-5.4.0-1073-aws linux-image-5.4.0-1074-aws (... see all)

  linux-signed-aws (5.4.0-1126.136) focal; urgency=medium

  * Main version: 5.4.0-1126.136

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/tracking-bug -- resync from main package

 -- Philip Cox <email address hidden> Fri, 10 May 2024 10:56:38 -0400

1786013 Packaging resync

linux-meta-aws May 14th 13:07
Release: focal Repo: main Level: proposed New version: 5.4.0.1126.123
Packages in group:  linux-aws-lts-20.04 linux-headers-aws-lts-20.04 linux-image-aws-lts-20.04 linux-modules-extra-aws-lts-20.04 linux-tools-aws-lts-20.04

  linux-meta-aws (5.4.0.1126.123) focal; urgency=medium

  * Bump ABI 5.4.0-1126

 -- Philip Cox <email address hidden> Fri, 10 May 2024 10:56:36 -0400


linux-restricted-signatures-hwe-5.15 May 14th 12:07
Release: focal Repo: restricted Level: updates New version: 5.15.0-107.117~20.04.1
Packages in group:  linux-modules-nvidia-525-open-5.15.0-100-generic linux-modules-nvidia-525-open-5.15.0-101-generic linux-modules-nvidia-525-open-5.15.0-67-generic linux-modules-nvidia-525-open-5.15.0-69-generic linux-modules-nvidia-525-open-5.15.0-70-generic linux-modules-nvidia-525-open-5.15.0-71-generic linux-modules-nvidia-525-open-5.15.0-72-generic linux-modules-nvidia-525-open-5.15.0-73-generic linux-modules-nvidia-525-open-5.15.0-75-generic linux-modules-nvidia-525-open-5.15.0-76-generic linux-modules-nvidia-525-open-5.15.0-78-generic (... see all)

  linux-restricted-signatures-hwe-5.15 (5.15.0-107.117~20.04.1) focal; urgency=medium

  * Main version: 5.15.0-107.117~20.04.1

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/tracking-bug -- resync from main package

 -- Stefan Bader <email address hidden> Tue, 30 Apr 2024 12:14:54 +0200

1786013 Packaging resync

linux-restricted-modules-hwe-5.15 May 14th 12:07
Release: focal Repo: restricted Level: updates New version: 5.15.0-107.117~20.04.1
Packages in group:  linux-modules-nvidia-390-5.15.0-100-generic linux-modules-nvidia-390-5.15.0-101-generic linux-modules-nvidia-390-5.15.0-102-generic linux-modules-nvidia-390-5.15.0-105-generic linux-modules-nvidia-390-5.15.0-106-generic linux-modules-nvidia-390-5.15.0-107-generic linux-modules-nvidia-390-5.15.0-46-generic linux-modules-nvidia-390-5.15.0-48-generic linux-modules-nvidia-390-5.15.0-50-generic linux-modules-nvidia-390-5.15.0-52-generic linux-modules-nvidia-390-5.15.0-53-generic (... see all)

  linux-restricted-modules-hwe-5.15 (5.15.0-107.117~20.04.1) focal; urgency=medium

  * Main version: 5.15.0-107.117~20.04.1

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/tracking-bug -- resync from main package

 -- Stefan Bader <email address hidden> Tue, 30 Apr 2024 12:14:54 +0200

1786013 Packaging resync

linux-signed-hwe-5.15 May 14th 12:07
Release: focal Repo: main Level: updates New version: 5.15.0-107.117~20.04.1
Packages in group:  linux-image-5.15.0-100-generic linux-image-5.15.0-101-generic linux-image-5.15.0-102-generic linux-image-5.15.0-105-generic linux-image-5.15.0-106-generic linux-image-5.15.0-107-generic linux-image-5.15.0-33-generic linux-image-5.15.0-41-generic linux-image-5.15.0-43-generic linux-image-5.15.0-46-generic linux-image-5.15.0-48-generic (... see all)

  linux-signed-hwe-5.15 (5.15.0-107.117~20.04.1) focal; urgency=medium

  * Main version: 5.15.0-107.117~20.04.1

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/tracking-bug -- resync from main package

 -- Stefan Bader <email address hidden> Tue, 30 Apr 2024 12:15:18 +0200

1786013 Packaging resync

linux-meta-hwe-5.15 May 14th 12:07
Release: focal Repo: main Level: updates New version: 5.15.0.107.117~20.04.1
Packages in group:  linux-cloud-tools-generic-hwe-20.04 linux-cloud-tools-generic-hwe-20.04-edge linux-cloud-tools-virtual-hwe-20.04 linux-cloud-tools-virtual-hwe-20.04-edge linux-generic-hwe-20.04 linux-generic-hwe-20.04-edge linux-headers-generic-hwe-20.04 linux-headers-generic-hwe-20.04-edge linux-headers-oem-20.04 linux-headers-oem-20.04b linux-headers-oem-20.04c (... see all)

  linux-meta-hwe-5.15 (5.15.0.107.117~20.04.1) focal; urgency=medium

  * Bump ABI 5.15.0-107.117~20.04

 -- Stefan Bader <email address hidden> Tue, 30 Apr 2024 12:16:09 +0200


linux-hwe-5.15 May 14th 12:07
Release: focal Repo: main Level: updates New version: 5.15.0-107.117~20.04.1
Packages in group:  linux-buildinfo-5.15.0-100-generic linux-buildinfo-5.15.0-101-generic linux-buildinfo-5.15.0-102-generic linux-buildinfo-5.15.0-105-generic linux-buildinfo-5.15.0-106-generic linux-buildinfo-5.15.0-107-generic linux-buildinfo-5.15.0-33-generic linux-buildinfo-5.15.0-41-generic linux-buildinfo-5.15.0-43-generic linux-buildinfo-5.15.0-46-generic linux-buildinfo-5.15.0-48-generic (... see all)

  linux-hwe-5.15 (5.15.0-107.117~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.15: 5.15.0-107.117~20.04.1 -proposed tracker
    (LP: #2063633)

  [ Ubuntu: 5.15.0-107.117 ]

  * jammy/linux: 5.15.0-107.117 -proposed tracker (LP: #2063635)
  * CVE-2023-52530
    - wifi: mac80211: fix potential key use-after-free
  * CVE-2024-26622
    - tomoyo: fix UAF write bug in tomoyo_write_control()
  * CVE-2023-47233
    - wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach

 -- Stefan Bader <email address hidden> Tue, 30 Apr 2024 12:11:28 +0200

CVE-2023-52530 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential key use-after-free When ieee80211_key_link() is c
CVE-2024-26622 In the Linux kernel, the following vulnerability has been resolved: tomoyo: fix UAF write bug in tomoyo_write_control() Since tomoyo_write_control(
CVE-2023-47233 The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by

linux-restricted-signatures-lowlatency May 14th 10:19
Release: mantic Repo: restricted Level: security New version: 6.5.0-35.35.1
Packages in group:  linux-modules-nvidia-525-open-6.5.0-10-lowlatency linux-modules-nvidia-525-open-6.5.0-13-lowlatency linux-modules-nvidia-525-open-6.5.0-14-lowlatency linux-modules-nvidia-525-open-6.5.0-15-lowlatency linux-modules-nvidia-525-open-6.5.0-17-lowlatency linux-modules-nvidia-525-open-6.5.0-21-lowlatency linux-modules-nvidia-525-open-6.5.0-25-lowlatency linux-modules-nvidia-525-open-6.5.0-26-lowlatency linux-modules-nvidia-535-open-6.5.0-10-lowlatency linux-modules-nvidia-535-open-6.5.0-13-lowlatency linux-modules-nvidia-535-open-6.5.0-14-lowlatency (... see all)

  linux-restricted-signatures-lowlatency (6.5.0-35.35.1) mantic; urgency=medium

  * Main version: 6.5.0-35.35.1

  * Packaging resync (LP: #1786013)
    - [Packaging] debian/tracking-bug -- resync from main package

 -- Stefan Bader <email address hidden> Mon, 06 May 2024 17:12:37 +0200

1786013 Packaging resync



About   -   Send Feedback to @ubuntu_updates