Package "linux-hwe-5.17"
Name: |
linux-hwe-5.17
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Linux kernel buildinfo for version 5.17.0 on 64 bit x86 SMP
- Linux kernel version specific cloud tools for version 5.17.0-15
- Linux kernel headers for version 5.17.0 on 64 bit x86 SMP
- Linux kernel version specific cloud tools for version 5.17.0-15
|
Latest version: |
5.17.0-15.16~22.04.8 |
Release: |
jammy (22.04) |
Level: |
base |
Repository: |
main |
Links
Other versions of "linux-hwe-5.17" in Jammy
No other version of this package is available
in the Jammy release.
Packages in group
Deleted packages are displayed in grey.
Changelog
linux-hwe-5.17 (5.17.0-15.16~22.04.8) jammy; urgency=medium
.
* jammy/linux-hwe-5.17: 5.17.0-15.16~22.04.8 -proposed tracker (LP: #2003452)
.
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
- debian/dkms-versions -- update from kernel-versions (main/2023.01.02)
.
* Revoke & rotate to new signing key (LP: #2002812)
- [Packaging] Revoke and rotate to new signing key
.
* CVE-2022-45934
- Bluetooth: L2CAP: Fix u8 overflow
.
* CVE-2022-42896
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
.
* CVE-2022-4378
- proc: proc_skip_spaces() shouldn't think it is working on C strings
- proc: avoid integer type confusion in get_proc_long
|
Source diff to previous version |
1786013 |
Packaging resync |
2002812 |
Revoke \u0026 rotate to new signing key |
CVE-2022-45934 |
An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_R |
CVE-2022-42896 |
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which ma |
CVE-2022-4378 |
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem ... |
|
linux-hwe-5.17 (5.17.0-11.12~22.04.8) jammy; urgency=medium
.
* jammy/linux-hwe-5.17: 5.17.0-11.12~22.04.8 -proposed tracker (LP: #1992022)
.
* Packaging resync (LP: #1786013)
- [Packaging] update variants
|
Source diff to previous version |
|
linux-hwe-5.17 (5.17.0-11.11~22.04.8) jammy; urgency=medium
.
* jammy/linux-hwe-5.17: 5.17.0-11.11~22.04.8 -proposed tracker (LP: #1992022)
|
Source diff to previous version |
linux-hwe-5.17 (5.17.0-9.9~22.04.8) jammy; urgency=medium
.
* jammy/linux-hwe-5.17: 5.17.0-9.9~22.04.8 -proposed tracker (LP: #1987779)
.
* CVE-2022-36946
- netfilter: nf_queue: do not allow packet truncation below transport header
offset
.
* CVE-2021-33655
- fbcon: Disallow setting font bigger than screen size
- fbcon: Prevent that screen size is smaller than font size
- fbmem: Check virtual screen sizes in fb_set_var()
|
CVE-2022-36946 |
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) beca |
CVE-2021-33655 |
When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds. |
|
No changelog for deleted or moved packages.
|
About
-
Send Feedback to @ubuntu_updates