UbuntuUpdates.org

Package "linux-aws-6.5"

Name: linux-aws-6.5

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Header files related to Linux kernel version 6.5.0
  • Header files related to Linux kernel version 6.5.0
  • Linux kernel version specific tools for version 6.5.0-1013
  • Linux kernel version specific tools for version 6.5.0-1021

Latest version: 6.5.0-1021.21~22.04.1
Release: jammy (22.04)
Level: proposed
Repository: main

Links



Other versions of "linux-aws-6.5" in Jammy

Repository Area Version
security main 6.5.0-1020.20~22.04.1
updates main 6.5.0-1020.20~22.04.1
PPA: Canonical Kernel Team 6.5.0-1021.21~22.04.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: *DELETED* 2023-12-06 08:06:55 UTC
Moved to jammy:main:updates
No changelog for deleted or moved packages.

Version: 6.5.0-1011.11~22.04.1 2023-11-22 02:06:55 UTC

  linux-aws-6.5 (6.5.0-1011.11~22.04.1) jammy; urgency=medium

  * jammy/linux-aws-6.5: 6.5.0-1011.11~22.04.1 -proposed tracker (LP: #2041525)

  [ Ubuntu: 6.5.0-1011.11 ]

  * mantic/linux-aws: 6.5.0-1011.11 -proposed tracker (LP: #2041526)
  * Packaging resync (LP: #1786013)
    - [Packaging] resync update-dkms-versions helper
    - debian/dkms-versions -- update from kernel-versions (main/2023.10.30)
  * mantic/linux: 6.5.0-14.14 -proposed tracker (LP: #2042660)
  * Boot log print hang on screen, no login prompt on Aspeed 2600 rev 52 BMC
    (LP: #2042850)
    - drm/ast: Add BMC virtual connector
  * arm64 atomic issues cause disk corruption (LP: #2042573)
    - locking/atomic: scripts: fix fallback ifdeffery
  * Packaging resync (LP: #1786013)
    - [Packaging] update annotations scripts

1786013 Packaging resync
2042850 Boot log print hang on screen, no login prompt on Aspeed 2600 rev 52 BMC
2042573 arm64 atomic issues cause disk corruption

Version: *DELETED* 2023-10-31 22:12:46 UTC
Moved to jammy:main:updates
No changelog for deleted or moved packages.

Version: 6.5.0-1008.8~22.04.1 2023-10-25 11:13:42 UTC

  linux-aws-6.5 (6.5.0-1008.8~22.04.1) jammy; urgency=medium

  * jammy/linux-aws-6.5: 6.5.0-1008.8~22.04.1 -proposed tracker (LP: #2038955)

  * Packaging resync (LP: #1786013)
    - [Packaging] update variants
    - [Packaging] update Ubuntu.md

  * Miscellaneous Ubuntu changes
    - [Packaging] Initial aws-6.5 packaging
    - [Packaging] Added python3-dev as build dep

  * Miscellaneous upstream changes
    - Revert "UBUNTU: [Packaging] ZSTD compress modules"
    - Revert "UBUNTU: SAUCE: modpost: support arbitrary symbol length in
      modversion"

  [ Ubuntu: 6.5.0-1008.8 ]

  * mantic/linux-aws: 6.5.0-1008.8 -proposed tracker (LP: #2038689)
  * mantic/linux: 6.5.0-9.9 -proposed tracker (LP: #2038687)
  * update apparmor and LSM stacking patch set (LP: #2028253)
    - re-apply apparmor 4.0.0
  * Disable restricting unprivileged change_profile by default, due to LXD
    latest/stable not yet compatible with this new apparmor feature
    (LP: #2038567)
    - SAUCE: apparmor: Make apparmor_restrict_unprivileged_unconfined opt-in
  * mantic/linux: 6.5.0-8.8 -proposed tracker (LP: #2038577)
  * update apparmor and LSM stacking patch set (LP: #2028253)
    - SAUCE: apparmor3.2.0 [02/60]: rename SK_CTX() to aa_sock and make it an
      inline fn
    - SAUCE: apparmor3.2.0 [05/60]: Add sysctls for additional controls of unpriv
      userns restrictions
    - SAUCE: apparmor3.2.0 [08/60]: Stacking v38: LSM: Identify modules by more
      than name
    - SAUCE: apparmor3.2.0 [09/60]: Stacking v38: LSM: Add an LSM identifier for
      external use
    - SAUCE: apparmor3.2.0 [10/60]: Stacking v38: LSM: Identify the process
      attributes for each module
    - SAUCE: apparmor3.2.0 [11/60]: Stacking v38: LSM: Maintain a table of LSM
      attribute data
    - SAUCE: apparmor3.2.0 [12/60]: Stacking v38: proc: Use lsmids instead of lsm
      names for attrs
    - SAUCE: apparmor3.2.0 [13/60]: Stacking v38: integrity: disassociate
      ima_filter_rule from security_audit_rule
    - SAUCE: apparmor3.2.0 [14/60]: Stacking v38: LSM: Infrastructure management
      of the sock security
    - SAUCE: apparmor3.2.0 [15/60]: Stacking v38: LSM: Add the lsmblob data
      structure.
    - SAUCE: apparmor3.2.0 [16/60]: Stacking v38: LSM: provide lsm name and id
      slot mappings
    - SAUCE: apparmor3.2.0 [17/60]: Stacking v38: IMA: avoid label collisions with
      stacked LSMs
    - SAUCE: apparmor3.2.0 [18/60]: Stacking v38: LSM: Use lsmblob in
      security_audit_rule_match
    - SAUCE: apparmor3.2.0 [19/60]: Stacking v38: LSM: Use lsmblob in
      security_kernel_act_as
    - SAUCE: apparmor3.2.0 [20/60]: Stacking v38: LSM: Use lsmblob in
      security_secctx_to_secid
    - SAUCE: apparmor3.2.0 [21/60]: Stacking v38: LSM: Use lsmblob in
      security_secid_to_secctx
    - SAUCE: apparmor3.2.0 [22/60]: Stacking v38: LSM: Use lsmblob in
      security_ipc_getsecid
    - SAUCE: apparmor3.2.0 [23/60]: Stacking v38: LSM: Use lsmblob in
      security_current_getsecid
    - SAUCE: apparmor3.2.0 [24/60]: Stacking v38: LSM: Use lsmblob in
      security_inode_getsecid
    - SAUCE: apparmor3.2.0 [25/60]: Stacking v38: LSM: Use lsmblob in
      security_cred_getsecid
    - SAUCE: apparmor3.2.0 [26/60]: Stacking v38: LSM: Specify which LSM to
      display
    - SAUCE: apparmor3.2.0 [28/60]: Stacking v38: LSM: Ensure the correct LSM
      context releaser
    - SAUCE: apparmor3.2.0 [29/60]: Stacking v38: LSM: Use lsmcontext in
      security_secid_to_secctx
    - SAUCE: apparmor3.2.0 [30/60]: Stacking v38: LSM: Use lsmcontext in
      security_inode_getsecctx
    - SAUCE: apparmor3.2.0 [31/60]: Stacking v38: Use lsmcontext in
      security_dentry_init_security
    - SAUCE: apparmor3.2.0 [32/60]: Stacking v38: LSM: security_secid_to_secctx in
      netlink netfilter
    - SAUCE: apparmor3.2.0 [33/60]: Stacking v38: NET: Store LSM netlabel data in
      a lsmblob
    - SAUCE: apparmor3.2.0 [34/60]: Stacking v38: binder: Pass LSM identifier for
      confirmation
    - SAUCE: apparmor3.2.0 [35/60]: Stacking v38: LSM: security_secid_to_secctx
      module selection
    - SAUCE: apparmor3.2.0 [36/60]: Stacking v38: Audit: Keep multiple LSM data in
      audit_names
    - SAUCE: apparmor3.2.0 [37/60]: Stacking v38: Audit: Create audit_stamp
      structure
    - SAUCE: apparmor3.2.0 [38/60]: Stacking v38: LSM: Add a function to report
      multiple LSMs
    - SAUCE: apparmor3.2.0 [39/60]: Stacking v38: Audit: Allow multiple records in
      an audit_buffer
    - SAUCE: apparmor3.2.0 [40/60]: Stacking v38: Audit: Add record for multiple
      task security contexts
    - SAUCE: apparmor3.2.0 [41/60]: Stacking v38: audit: multiple subject lsm
      values for netlabel
    - SAUCE: apparmor3.2.0 [42/60]: Stacking v38: Audit: Add record for multiple
      object contexts
    - SAUCE: apparmor3.2.0 [43/60]: Stacking v38: netlabel: Use a struct lsmblob
      in audit data
    - SAUCE: apparmor3.2.0 [44/60]: Stacking v38: LSM: Removed scaffolding
      function lsmcontext_init
    - SAUCE: apparmor3.2.0 [45/60]: Stacking v38: AppArmor: Remove the exclusive
      flag
    - SAUCE: apparmor3.2.0 [46/60]: combine common_audit_data and
      apparmor_audit_data
    - SAUCE: apparmor3.2.0 [47/60]: setup slab cache for audit data
    - SAUCE: apparmor3.2.0 [48/60]: rename audit_data->label to
      audit_data->subj_label
    - SAUCE: apparmor3.2.0 [49/60]: pass cred through to audit info.
    - SAUCE: apparmor3.2.0 [50/60]: Improve debug print infrastructure
    - SAUCE: apparmor3.2.0 [51/60]: add the ability for profiles to have a
      learning cache
    - SAUCE: apparmor3.2.0 [52/60]: enable userspace upcall for mediation
    - SAUCE: apparmor3.2.0 [53/60]: cache buffers on percpu list if there is lock
      contention
    - SAUCE: apparmor3.2.0 [55/60]: advertise availability of exended perms
    - SAUCE: apparmor3.2.0 [60/60]: [Config] enable
      CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS
  * LSM stacking and AppA

1786013 Packaging resync
2028253 update apparmor and LSM stacking patch set
2038567 Disable restricting unprivileged change_profile by default, due to LXD latest/stable not yet compatible with this new apparmor feature
2017903 LSM stacking and AppArmor for 6.2: additional fixes
2016908 udev fails to make prctl() syscall with apparmor=0 (as used by maas by default)
1989983 kinetic: apply new apparmor and LSM stacking patch set
2037316 SEV_SNP failure to init
2037398 kexec enable to load/kdump zstd compressed zimg
2036968 Mantic minimized/minimal cloud images do not receive IP address during provisioning; systemd regression with wait-online
2035588 Mantic update: v6.5.3 upstream stable release
2035583 Mantic update: v6.5.2 upstream stable release
2035581 Mantic update: v6.5.1 upstream stable release
2029390 [23.10 FEAT] [SEC2352] pkey: support EP11 API ordinal 6 for secure guests
2028937 [23.10 FEAT] [SEC2341] pkey: support generation of keys of type PKEY_TYPE_EP11_AES
2003674 [23.10 FEAT] KVM: Enable Secure Execution Crypto Passthrough - kernel part
2008882 Remove all other acpi_video backlight interface on Dell AIO platforms
2035163 Avoid address overwrite in kernel_connect
2035306 Include QCA WWAN 5G Qualcomm SDX62/DW5932e support
2029199 NULL pointer dereference on CS35L41 HDA AMP
2021364 Linux 6.2 fails to reboot with current u-boot-nezha
1975592 Enable Nezha board
2013232 Enable StarFive VisionFive 2 board
1967130 rcu_sched detected stalls on CPUs/tasks
1981437 RISC-V kernel config is out of sync with other archs
2034506 Audio device fails to function randomly on Intel MTL platform: No CPC match in the firmware file's manifest
1945989 Check for changes relevant for security certifications
2030525 Installation support for SMARC RZ/G2L platform
2002226 Add support for kernels compiled with CONFIG_EFI_ZBOOT
2034061 Default module signing algo should be accelerated
1993183 NEW SRU rustc linux kernel requirements
2017980 FATAL:credentials.cc(127)] Check failed: . : Permission denied (13)
2032602 [FFe] apparmor-4.0.0-alpha2 for unprivileged user namespace restrictions in mantic
2028568 Ship kernel modules Zstd compressed
2018303 move sev-guest module from linux-modules-extra to linux-modules
2007654 enable Rust support in the kernel
2028746 Fix UBSAN in Intel EDAC driver
2025265 Remove non-LPAE kernel flavor
2022361 Please enable Renesas RZ platform serial installer
2025195 HDMI output with More than one child device for port B in VBT error
2023629 enable multi-gen LRU by default
2012776 Neuter signing tarballs
2018591 Enable Tracing Configs for OSNOISE and TIMERLAT
2020531 support python \u003c 3.9 with annotations
2020356 generate linux-lib-rust only on amd64
2017444 Computer with Intel Atom CPU will not boot with Kernel 6.2.0-20
2011768 Fix NVME storage with RAID ON disappeared under Dell factory WINPE environment
2015867 Kernel 6.1 bumped the disk consumption on default images by 15%
1685291 RFC: virtio and virtio-scsi should be built in
2015498 Debian autoreconstruct Fix restoration of execute permissions
2007745 [SRU][Jammy] CONFIG_PCI_MESON is not enabled
2016877 Lunar update: v6.2.9 upstream stable release
2016876 Lunar update: v6.2.8 upstream stable release
CVE-2023-31248 Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active a
CVE-2023-35001 Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or
CVE-2023-2640 On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overl ...
CVE-2023-32629 Local privilege escalation vulnerability in Ubuntu Kernels overlayfs o ...
CVE-2023-2612 Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ub ...



About   -   Send Feedback to @ubuntu_updates