UbuntuUpdates.org

Package "linux-tools-common"

Name: linux-tools-common

Description:

Linux kernel version specific tools for version 5.15.0

Latest version: 5.15.0-161.171
Release: jammy (22.04)
Level: updates
Repository: main
Head package: linux

Links


Download "linux-tools-common"


Other versions of "linux-tools-common" in Jammy

Repository Area Version
base main 5.15.0-25.25
security main 5.15.0-161.171
proposed main 5.15.0-163.173
PPA: Canonical Kernel Team 5.15.0-163.173

Changelog

Version: 5.15.0-161.171 2025-10-29 20:07:26 UTC

  linux (5.15.0-161.171) jammy; urgency=medium

  * jammy/linux: 5.15.0-161.171 -proposed tracker (LP: #2127389)

  * VMSCAPE CVE-2025-40300 (LP: #2124105) // CVE-2025-40300
    - Documentation/hw-vuln: Add VMSCAPE documentation
    - x86/vmscape: Enumerate VMSCAPE bug
    - x86/vmscape: Add conditional IBPB mitigation
    - x86/vmscape: Enable the mitigation
    - x86/bugs: Move cpu_bugs_smt_update() down
    - x86/vmscape: Warn when STIBP is disabled with SMT
    - x86/vmscape: Add old Intel CPUs to affected list

  * VMSCAPE CVE-2025-40300 (LP: #2124105)
    - [Config] Enable MITIGATION_VMSCAPE config

 -- Manuel Diewald <email address hidden> Fri, 10 Oct 2025 20:13:58 +0200

Source diff to previous version
2124105 VMSCAPE CVE-2025-40300
CVE-2025-40300 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that ex

Version: 5.15.0-160.170 2025-10-17 03:07:14 UTC

  linux (5.15.0-160.170) jammy; urgency=medium

  * jammy/linux: 5.15.0-160.170 -proposed tracker (LP: #2126548)

  * [Regression Updates] System hangs when loading audit rules
    (5.15.0-156.166) (LP: #2126434)
    - netlink: avoid infinite retry looping in netlink_unicast()

Source diff to previous version
2126434 [Regression Updates] System hangs when loading audit rules (5.15.0-156.166)

Version: 5.15.0-157.167 2025-10-01 03:07:03 UTC

  linux (5.15.0-157.167) jammy; urgency=medium

  * jammy/linux: 5.15.0-157.167 -proposed tracker (LP: #2124010)

  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log

  * CVE-2025-38477
    - net/sched: sch_qfq: Fix race condition on qfq_aggregate
    - net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
      qfq_delete_class

  * CVE-2025-38617
    - net/packet: fix a race in packet_set_ring() and packet_notifier()

  * CVE-2025-38618
    - vsock: Do not allow binding to VMADDR_PORT_ANY

 -- Manuel Diewald <email address hidden> Wed, 17 Sep 2025 21:47:09 +0200

Source diff to previous version
1786013 Packaging resync
CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc
CVE-2025-38617 In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_s
CVE-2025-38618 In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to au

Version: 5.15.0-156.166 2025-09-23 17:06:58 UTC

  linux (5.15.0-156.166) jammy; urgency=medium

  * jammy/linux: 5.15.0-156.166 -proposed tracker (LP: #2120207)

  * minimal kernel lacks modules for blk disk in arm64 openstack environments
    where config_drive is required (LP: #2118499)
    - [Config] Enable SYM53C8XX_2 on arm64

Source diff to previous version
2118499 minimal kernel lacks modules for blk disk in arm64 openstack environments where config_drive is required

Version: 5.15.0-153.163 2025-08-27 04:07:20 UTC

  linux (5.15.0-153.163) jammy; urgency=medium

  * jammy/linux: 5.15.0-153.163 -proposed tracker (LP: #2119877)

  * CVE-2024-57996 // CVE-2025-37752
    - net_sched: sch_sfq: annotate data-races around q->perturb_period
    - net_sched: sch_sfq: handle bigger packets
    - net_sched: sch_sfq: don't allow 1 packet limit
    - net_sched: sch_sfq: use a temporary work area for validating
      configuration
    - net_sched: sch_sfq: move the limit validation

  * CVE-2025-38350
    - net/sched: Always pass notifications when child class becomes empty

  * CVE-2024-27407
    - fs/ntfs3: Fixed overflow check in mi_enum_attr()

  * watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with
    5.15.0-144-generic (LP: #2118407)
    - fs/proc: do_task_stat: use __for_each_thread()

 -- Manuel Diewald <email address hidden> Thu, 07 Aug 2025 16:45:02 +0200

2118407 watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with 5.15.0-144-generic
CVE-2024-57996 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does
CVE-2025-37752 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly
CVE-2025-38350 In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain cla
CVE-2024-27407 In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fixed overflow check in mi_enum_attr()



About   -   Send Feedback to @ubuntu_updates