Package "linux-buildinfo-5.15.0-161-generic"
| Name: |
linux-buildinfo-5.15.0-161-generic
|
Description: |
Linux kernel buildinfo for version 5.15.0 on 64 bit x86 SMP
|
| Latest version: |
5.15.0-161.171 |
| Release: |
jammy (22.04) |
| Level: |
security |
| Repository: |
main |
| Head package: |
linux |
Links
Download "linux-buildinfo-5.15.0-161-generic"
Other versions of "linux-buildinfo-5.15.0-161-generic" in Jammy
Changelog
|
linux (5.15.0-161.171) jammy; urgency=medium
* jammy/linux: 5.15.0-161.171 -proposed tracker (LP: #2127389)
* VMSCAPE CVE-2025-40300 (LP: #2124105) // CVE-2025-40300
- Documentation/hw-vuln: Add VMSCAPE documentation
- x86/vmscape: Enumerate VMSCAPE bug
- x86/vmscape: Add conditional IBPB mitigation
- x86/vmscape: Enable the mitigation
- x86/bugs: Move cpu_bugs_smt_update() down
- x86/vmscape: Warn when STIBP is disabled with SMT
- x86/vmscape: Add old Intel CPUs to affected list
* VMSCAPE CVE-2025-40300 (LP: #2124105)
- [Config] Enable MITIGATION_VMSCAPE config
-- Manuel Diewald <email address hidden> Fri, 10 Oct 2025 20:13:58 +0200
|
| Source diff to previous version |
| 2124105 |
VMSCAPE CVE-2025-40300 |
| CVE-2025-40300 |
In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that ex |
|
|
linux (5.15.0-160.170) jammy; urgency=medium
* jammy/linux: 5.15.0-160.170 -proposed tracker (LP: #2126548)
* [Regression Updates] System hangs when loading audit rules
(5.15.0-156.166) (LP: #2126434)
- netlink: avoid infinite retry looping in netlink_unicast()
|
| Source diff to previous version |
| 2126434 |
[Regression Updates] System hangs when loading audit rules (5.15.0-156.166) |
|
|
linux (5.15.0-157.167) jammy; urgency=medium
* jammy/linux: 5.15.0-157.167 -proposed tracker (LP: #2124010)
* Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
* CVE-2025-38477
- net/sched: sch_qfq: Fix race condition on qfq_aggregate
- net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
qfq_delete_class
* CVE-2025-38617
- net/packet: fix a race in packet_set_ring() and packet_notifier()
* CVE-2025-38618
- vsock: Do not allow binding to VMADDR_PORT_ANY
-- Manuel Diewald <email address hidden> Wed, 17 Sep 2025 21:47:09 +0200
|
| Source diff to previous version |
| 1786013 |
Packaging resync |
| CVE-2025-38477 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc |
| CVE-2025-38617 |
In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_s |
| CVE-2025-38618 |
In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to au |
|
|
linux (5.15.0-156.166) jammy; urgency=medium
* jammy/linux: 5.15.0-156.166 -proposed tracker (LP: #2120207)
* minimal kernel lacks modules for blk disk in arm64 openstack environments
where config_drive is required (LP: #2118499)
- [Config] Enable SYM53C8XX_2 on arm64
|
| Source diff to previous version |
| 2118499 |
minimal kernel lacks modules for blk disk in arm64 openstack environments where config_drive is required |
|
|
linux (5.15.0-153.163) jammy; urgency=medium
* jammy/linux: 5.15.0-153.163 -proposed tracker (LP: #2119877)
* CVE-2024-57996 // CVE-2025-37752
- net_sched: sch_sfq: annotate data-races around q->perturb_period
- net_sched: sch_sfq: handle bigger packets
- net_sched: sch_sfq: don't allow 1 packet limit
- net_sched: sch_sfq: use a temporary work area for validating
configuration
- net_sched: sch_sfq: move the limit validation
* CVE-2025-38350
- net/sched: Always pass notifications when child class becomes empty
* CVE-2024-27407
- fs/ntfs3: Fixed overflow check in mi_enum_attr()
* watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with
5.15.0-144-generic (LP: #2118407)
- fs/proc: do_task_stat: use __for_each_thread()
-- Manuel Diewald <email address hidden> Thu, 07 Aug 2025 16:45:02 +0200
|
| 2118407 |
watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with 5.15.0-144-generic |
| CVE-2024-57996 |
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does |
| CVE-2025-37752 |
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly |
| CVE-2025-38350 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain cla |
| CVE-2024-27407 |
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fixed overflow check in mi_enum_attr() |
|
About
-
Send Feedback to @ubuntu_updates