Latest Changelogs for all releases
Note: Only updates for "head" packages where the changelog is available are shown on this page (view all).
s390-tools | May 14th 16:06 | ||
---|---|---|---|
Release: mantic | Repo: main | Level: proposed | New version: 2.29.0-0ubuntu2.2 |
Packages in group: | s390-tools-data | ||
s390-tools (2.29.0-0ubuntu2.2) mantic; urgency=medium * Add the following commits as patches:
-- Frank Heimes <email address hidden> Wed, 03 Apr 2024 12:40:19 +0200 |
linux-signed-gkeop-5.15 | May 14th 16:06 | ||
---|---|---|---|
Release: focal | Repo: main | Level: proposed | New version: 5.15.0-1046.53~20.04.1 |
Packages in group: | linux-image-5.15.0-1034-gkeop linux-image-5.15.0-1036-gkeop linux-image-5.15.0-1038-gkeop linux-image-5.15.0-1040-gkeop linux-image-5.15.0-1044-gkeop linux-image-5.15.0-1046-gkeop | ||
linux-signed-gkeop-5.15 (5.15.0-1046.53~20.04.1) focal; urgency=medium * Main version: 5.15.0-1046.53~20.04.1 * Packaging resync (LP: #1786013)
-- Kevin Becker <email address hidden> Sun, 12 May 2024 23:19:13 +0200 |
|||
1786013 | Packaging resync |
linux-meta-gkeop-5.15 | May 14th 16:06 | ||
---|---|---|---|
Release: focal | Repo: main | Level: proposed | New version: 5.15.0.1046.53~20.04.1 |
Packages in group: | linux-cloud-tools-gkeop-5.15 linux-cloud-tools-gkeop-edge linux-gkeop-5.15 linux-gkeop-edge linux-headers-gkeop-5.15 linux-headers-gkeop-edge linux-image-gkeop-5.15 linux-image-gkeop-edge linux-modules-extra-gkeop-5.15 linux-modules-extra-gkeop-edge linux-tools-gkeop-5.15 (... see all) | ||
linux-meta-gkeop-5.15 (5.15.0.1046.53~20.04.1) focal; urgency=medium * Bump ABI 5.15.0-1046.53~20.04 -- Kevin Becker <email address hidden> Sun, 12 May 2024 23:18:49 +0200 |
strongswan | May 14th 13:07 | ||
---|---|---|---|
Release: jammy | Repo: universe | Level: updates | New version: 5.9.5-2ubuntu2.3 |
Packages in group: | charon-cmd charon-systemd libcharon-extra-plugins libstrongswan-extra-plugins strongswan-nm strongswan-pki strongswan-scepclient strongswan-swanctl | ||
strongswan (5.9.5-2ubuntu2.3) jammy-security; urgency=medium * SECURITY UPDATE: improper certificate validation
-- Marc Deslauriers <email address hidden> Mon, 13 May 2024 16:16:55 +0200 |
|||
CVE-2022-4967 | strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). |
strongswan | May 14th 13:07 | ||
---|---|---|---|
Release: jammy | Repo: universe | Level: security | New version: 5.9.5-2ubuntu2.3 |
Packages in group: | charon-cmd charon-systemd libcharon-extra-plugins libstrongswan-extra-plugins strongswan-nm strongswan-pki strongswan-scepclient strongswan-swanctl | ||
strongswan (5.9.5-2ubuntu2.3) jammy-security; urgency=medium * SECURITY UPDATE: improper certificate validation
-- Marc Deslauriers <email address hidden> Mon, 13 May 2024 16:16:55 +0200 |
|||
CVE-2022-4967 | strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). |
strongswan | May 14th 13:07 | ||
---|---|---|---|
Release: jammy | Repo: main | Level: updates | New version: 5.9.5-2ubuntu2.3 |
Packages in group: | libcharon-extauth-plugins libstrongswan libstrongswan-standard-plugins strongswan-charon strongswan-libcharon strongswan-starter | ||
strongswan (5.9.5-2ubuntu2.3) jammy-security; urgency=medium * SECURITY UPDATE: improper certificate validation
-- Marc Deslauriers <email address hidden> Mon, 13 May 2024 16:16:55 +0200 |
|||
CVE-2022-4967 | strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). |
strongswan | May 14th 13:07 | ||
---|---|---|---|
Release: jammy | Repo: main | Level: security | New version: 5.9.5-2ubuntu2.3 |
Packages in group: | libcharon-extauth-plugins libstrongswan libstrongswan-standard-plugins strongswan-charon strongswan-libcharon strongswan-starter | ||
strongswan (5.9.5-2ubuntu2.3) jammy-security; urgency=medium * SECURITY UPDATE: improper certificate validation
-- Marc Deslauriers <email address hidden> Mon, 13 May 2024 16:16:55 +0200 |
|||
CVE-2022-4967 | strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). |
linux-signed-aws | May 14th 13:07 | ||
---|---|---|---|
Release: focal | Repo: main | Level: proposed | New version: 5.4.0-1126.136 |
Packages in group: | linux-image-5.4.0-1061-aws linux-image-5.4.0-1064-aws linux-image-5.4.0-1065-aws linux-image-5.4.0-1066-aws linux-image-5.4.0-1067-aws linux-image-5.4.0-1069-aws linux-image-5.4.0-1070-aws linux-image-5.4.0-1071-aws linux-image-5.4.0-1072-aws linux-image-5.4.0-1073-aws linux-image-5.4.0-1074-aws (... see all) | ||
linux-signed-aws (5.4.0-1126.136) focal; urgency=medium * Main version: 5.4.0-1126.136 * Packaging resync (LP: #1786013)
-- Philip Cox <email address hidden> Fri, 10 May 2024 10:56:38 -0400 |
|||
1786013 | Packaging resync |
linux-meta-aws | May 14th 13:07 | ||
---|---|---|---|
Release: focal | Repo: main | Level: proposed | New version: 5.4.0.1126.123 |
Packages in group: | linux-aws-lts-20.04 linux-headers-aws-lts-20.04 linux-image-aws-lts-20.04 linux-modules-extra-aws-lts-20.04 linux-tools-aws-lts-20.04 | ||
linux-meta-aws (5.4.0.1126.123) focal; urgency=medium * Bump ABI 5.4.0-1126 -- Philip Cox <email address hidden> Fri, 10 May 2024 10:56:36 -0400 |
linux-restricted-modules-hwe-5.15 | May 14th 12:07 | ||
---|---|---|---|
Release: focal | Repo: restricted | Level: updates | New version: 5.15.0-107.117~20.04.1 |
Packages in group: | linux-modules-nvidia-390-5.15.0-100-generic linux-modules-nvidia-390-5.15.0-101-generic linux-modules-nvidia-390-5.15.0-102-generic linux-modules-nvidia-390-5.15.0-105-generic linux-modules-nvidia-390-5.15.0-106-generic linux-modules-nvidia-390-5.15.0-107-generic linux-modules-nvidia-390-5.15.0-46-generic linux-modules-nvidia-390-5.15.0-48-generic linux-modules-nvidia-390-5.15.0-50-generic linux-modules-nvidia-390-5.15.0-52-generic linux-modules-nvidia-390-5.15.0-53-generic (... see all) | ||
linux-restricted-modules-hwe-5.15 (5.15.0-107.117~20.04.1) focal; urgency=medium * Main version: 5.15.0-107.117~20.04.1 * Packaging resync (LP: #1786013)
-- Stefan Bader <email address hidden> Tue, 30 Apr 2024 12:14:54 +0200 |
|||
1786013 | Packaging resync |
linux-signed-hwe-5.15 | May 14th 12:07 | ||
---|---|---|---|
Release: focal | Repo: main | Level: updates | New version: 5.15.0-107.117~20.04.1 |
Packages in group: | linux-image-5.15.0-100-generic linux-image-5.15.0-101-generic linux-image-5.15.0-102-generic linux-image-5.15.0-105-generic linux-image-5.15.0-106-generic linux-image-5.15.0-107-generic linux-image-5.15.0-33-generic linux-image-5.15.0-41-generic linux-image-5.15.0-43-generic linux-image-5.15.0-46-generic linux-image-5.15.0-48-generic (... see all) | ||
linux-signed-hwe-5.15 (5.15.0-107.117~20.04.1) focal; urgency=medium * Main version: 5.15.0-107.117~20.04.1 * Packaging resync (LP: #1786013)
-- Stefan Bader <email address hidden> Tue, 30 Apr 2024 12:15:18 +0200 |
|||
1786013 | Packaging resync |
linux-meta-hwe-5.15 | May 14th 12:07 | ||
---|---|---|---|
Release: focal | Repo: main | Level: updates | New version: 5.15.0.107.117~20.04.1 |
Packages in group: | linux-cloud-tools-generic-hwe-20.04 linux-cloud-tools-generic-hwe-20.04-edge linux-cloud-tools-virtual-hwe-20.04 linux-cloud-tools-virtual-hwe-20.04-edge linux-generic-hwe-20.04 linux-generic-hwe-20.04-edge linux-headers-generic-hwe-20.04 linux-headers-generic-hwe-20.04-edge linux-headers-oem-20.04 linux-headers-oem-20.04b linux-headers-oem-20.04c (... see all) | ||
linux-meta-hwe-5.15 (5.15.0.107.117~20.04.1) focal; urgency=medium * Bump ABI 5.15.0-107.117~20.04 -- Stefan Bader <email address hidden> Tue, 30 Apr 2024 12:16:09 +0200 |
linux-hwe-5.15 | May 14th 12:07 | ||
---|---|---|---|
Release: focal | Repo: main | Level: updates | New version: 5.15.0-107.117~20.04.1 |
Packages in group: | linux-buildinfo-5.15.0-100-generic linux-buildinfo-5.15.0-101-generic linux-buildinfo-5.15.0-102-generic linux-buildinfo-5.15.0-105-generic linux-buildinfo-5.15.0-106-generic linux-buildinfo-5.15.0-107-generic linux-buildinfo-5.15.0-33-generic linux-buildinfo-5.15.0-41-generic linux-buildinfo-5.15.0-43-generic linux-buildinfo-5.15.0-46-generic linux-buildinfo-5.15.0-48-generic (... see all) | ||
linux-hwe-5.15 (5.15.0-107.117~20.04.1) focal; urgency=medium * focal/linux-hwe-5.15: 5.15.0-107.117~20.04.1 -proposed tracker
[ Ubuntu: 5.15.0-107.117 ] * jammy/linux: 5.15.0-107.117 -proposed tracker (LP: #2063635)
-- Stefan Bader <email address hidden> Tue, 30 Apr 2024 12:11:28 +0200 |
|||
CVE-2023-52530 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix potential key use-after-free When ieee80211_key_link() is c | ||
CVE-2024-26622 | In the Linux kernel, the following vulnerability has been resolved: tomoyo: fix UAF write bug in tomoyo_write_control() Since tomoyo_write_control( | ||
CVE-2023-47233 | The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by |