lp:~ubuntu-kernel/ubuntu/+source/linux/+git/focal
- Get this repository:
-
git clone
https://git.qastaging.paddev.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal
Branches
Name | Last Modified | Last Commit |
---|---|---|
master-next | 2024-08-09 15:26:52 UTC |
rxrpc: Fix delayed ACKs to not set the reference serial number
Author:
David Howells
rxrpc: Fix delayed ACKs to not set the reference serial number Fix the construction of delayed ACKs to not set the reference serial number Fixes: 17926a79320a ("[AF_RXRPC]: Provide secure RxRPC sockets for use by userspace and kernel both") |
hwe-5.15-next | 2024-08-07 12:51:24 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-119.129~20.04.1
Author:
Stefan Bader
UBUNTU: Ubuntu- Signed-off-by: Stefan Bader <stefan. |
master-prep | 2024-08-02 18:11:02 UTC |
UBUNTU: Ubuntu-5.4.0-195.215
Author:
Roxana Nicolescu
UBUNTU: Ubuntu- Signed-off-by: Roxana Nicolescu <roxana. |
master- |
2024-07-30 15:58:57 UTC |
inet: inet_defrag: prevent sk release while still in use
Author:
Florian Westphal
inet: inet_defrag: prevent sk release while still in use ip_local_out() and other functions can pass skb->sk as function argument. If the skb is a fragment and reassembly happens before such function call This affects skb fragments reassembled via netfilter or similar Eric Dumazet made an initial analysis of this bug. Quoting Eric: A relevant old patch about the issue was : [..] net/ipv4/ If we orphan the packet in ipvlan, then downstream things like FQ We need to change ip_defrag() to only use skb_orphan() when really Eric suggested to stash sk in fragment queue and made an initial patch. If skb is refragmented again right after, ip_do_fragment() will copy This change moves the orphan down into the core, to last possible moment. This allows to delay the orphaning long enough to learn if the skb has In the former case, things work as before, skb is orphaned. This is In the latter case, we will steal the skb->sk reference, reattach it to Fixes: 7026b1ddb6b8 ("netfilter: Pass socket pointer down through okfn().") |
hwe-5.15- |
2024-07-11 17:09:13 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-117.127~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-07-05 20:01:14 UTC |
UBUNTU: Ubuntu-5.4.0-191.211
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-07-05 07:48:25 UTC |
UBUNTU: Upstream stable to v5.4.278
Author:
Portia Stephens
UBUNTU: Upstream stable to v5.4.278 BugLink: https:/ Ignore: yes |
master- |
2024-07-04 21:19:53 UTC |
UBUNTU: Ubuntu-5.4.0-190.210
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-07-04 15:22:30 UTC |
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
Author:
Daniel Starke
tty: n_gsm: fix possible out-of-bounds in gsm0_receive() commit 47388e807f85948 Assuming the following: Fix this by changing gsm->count to gsm->len comparison from equal to less All other checks remain as we still need to limit the data according to the Reported-by: j51569436@gmail.com CVE-2024-36016 |
hwe-5.15- |
2024-07-01 17:06:47 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-116.126~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
hwe-5.15- |
2024-06-21 20:46:39 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-113.123~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
hwe-5.15- |
2024-06-21 10:13:51 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-112.122~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-06-21 02:42:25 UTC |
UBUNTU: Ubuntu-5.4.0-187.207
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-06-21 02:10:36 UTC |
UBUNTU: Ubuntu-5.4.0-186.206
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
hwe-5.15- |
2024-06-13 10:30:43 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-115.125~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-06-07 10:30:31 UTC |
netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
Author:
Pablo Neira Ayuso
netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path The commit mutex should not be released during the critical section nf_tables_ Cc: stable@ CVE-2024-26925 |
master- |
2024-06-06 09:53:01 UTC |
UBUNTU: Upstream stable to v5.4.275
Author:
Portia Stephens
UBUNTU: Upstream stable to v5.4.275 BugLink: https:/ Ignore: yes |
hwe-5.15- |
2024-06-03 12:49:52 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-108.118~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
hwe-5.15- |
2024-05-08 17:46:25 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-111.121~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-05-02 07:34:39 UTC |
UBUNTU: Ubuntu-5.4.0-182.202
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-04-25 18:51:36 UTC |
cifs: fix ntlmssp auth when there is no key exchange
Author:
Paulo Alcantara
cifs: fix ntlmssp auth when there is no key exchange BugLink: https:/ Warn on the lack of key exchange during NTLMSSP authentication rather Signed-off-by: Paulo Alcantara (SUSE) <pc@cjr.nz> |
master- |
2024-04-25 17:13:42 UTC |
wifi: mac80211: fix potential key use-after-free
Author:
Johannes Berg
wifi: mac80211: fix potential key use-after-free When ieee80211_ Reported-by: Dan Carpenter <dan.carpenter@ |
master- |
2024-04-24 03:31:15 UTC |
UBUNTU: Ubuntu-5.4.0-181.201
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-04-23 21:01:55 UTC |
UBUNTU: [Packaging] drop getabis data
Author:
Roxana Nicolescu
UBUNTU: [Packaging] drop getabis data BugLink: https:/ |
hwe-5.15- |
2024-04-23 01:55:48 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-106.116~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
hwe-5.15- |
2024-04-22 15:50:53 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-106.116~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-04-03 01:11:35 UTC |
UBUNTU: Ubuntu-5.4.0-177.197
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-03-28 12:59:05 UTC |
UBUNTU: Ubuntu-5.4.0-174.192
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-03-28 12:28:10 UTC |
hvcs: Synchronize hotplug remove with port free
Author:
Brian King
hvcs: Synchronize hotplug remove with port free BugLink: https:/ Synchronizes hotplug remove with the freeing of the port. Signed-off-by: Brian King <brking@ (cherry picked from commit 28d49f8cbe9c796 |
master- |
2024-03-22 15:13:50 UTC |
UBUNTU: Ubuntu-5.4.0-175.194
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
hwe-5.15- |
2024-03-22 10:32:43 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-102.112~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
hwe-5.15- |
2024-03-22 02:40:15 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-101.111~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-03-21 21:03:24 UTC |
UBUNTU: Ubuntu-5.4.0-174.192
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
hwe-5.15- |
2024-03-14 13:33:17 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-97.107~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-03-14 10:58:14 UTC |
UBUNTU: Ubuntu-5.4.0-172.190
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-03-14 03:59:13 UTC |
UBUNTU: Ubuntu-5.4.0-173.191
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
hwe-5.15- |
2024-03-14 00:20:28 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-100.110~20.04.1
Author:
Ubuntu Kernel Bot
UBUNTU: Ubuntu- Signed-off-by: Ubuntu Kernel Bot <ubuntu- |
master- |
2024-03-06 09:35:45 UTC |
UBUNTU: [Packaging] Remove abi-check from final-checks
Author:
Roxana Nicolescu
UBUNTU: [Packaging] Remove abi-check from final-checks BugLink: https:/ Signed-off-by: Roxana Nicolescu <roxana. |
master- |
2024-03-05 17:48:14 UTC |
scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()
Author:
Tuo Li
scsi: lpfc: Fix a possible data race in lpfc_unregister The variable phba->fcf.fcf_flag is often protected by the lock spin_ However, in the same function, phba->fcf.fcf_flag is assigned with 0 phba- To fix this possible data race, a lock and unlock pair is added when Reported-by: BassCheck <bass@buaa.edu.cn> CVE-2024-24855 |
hwe-5.15-prep | 2023-11-16 13:58:44 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-91.101~20.04.1
Author:
Stefan Bader
UBUNTU: Ubuntu- Signed-off-by: Stefan Bader <stefan. |
master | 2022-10-14 16:32:31 UTC |
UBUNTU: Ubuntu-5.4.0-131.147
Author:
Thadeu Lima de Souza Cascardo
UBUNTU: Ubuntu- Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@ |
hwe-5.15 | 2022-10-13 12:47:29 UTC |
UBUNTU: Ubuntu-hwe-5.15-5.15.0-52.58~20.04.1
Author:
Stefan Bader
UBUNTU: Ubuntu- Signed-off-by: Stefan Bader <stefan. |
hwe-5.13-next | 2022-07-08 13:16:31 UTC |
llc: only change llc->dev when bind() succeeds
Author:
Eric Dumazet
llc: only change llc->dev when bind() succeeds commit 2d327a79ee17693 My latest patch, attempting to fix the refcount leak in a minimal Whenever the bind operation fails before we attempt to grab syzbot was not happy about this [1]. Note to stable teams: Make sure commit b37a46683739 ("netdevice: add the case if dev is NULL") [1] Fixes: 764f4eb6846f ("llc: fix netdevice reference leaks in llc_ui_bind()") CVE-2022-28356 |
hwe-5.13 | 2022-06-02 22:48:21 UTC |
UBUNTU: Ubuntu-hwe-5.13-5.13.0-48.54~20.04.1
Author:
Thadeu Lima de Souza Cascardo
UBUNTU: Ubuntu- Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@ |
hwe-5.13-prep | 2022-05-23 13:33:01 UTC |
UBUNTU: Ubuntu-hwe-5.13-5.13.0-46.51~20.04.1
Author:
Stefan Bader
UBUNTU: Ubuntu- Signed-off-by: Stefan Bader <stefan. |
hwe-5.11-next | 2022-03-09 14:54:36 UTC |
UBUNTU: Ubuntu-hwe-5.11-5.11.0-61.61
Author:
Stefan Bader
UBUNTU: Ubuntu- Signed-off-by: Stefan Bader <stefan. |
hwe-5.11-prep | 2022-03-09 14:54:36 UTC |
UBUNTU: Ubuntu-hwe-5.11-5.11.0-61.61
Author:
Stefan Bader
UBUNTU: Ubuntu- Signed-off-by: Stefan Bader <stefan. |
hwe-5.11 | 2022-01-06 23:13:46 UTC |
UBUNTU: Ubuntu-hwe-5.11-5.11.0-46.51~20.04.1
Author:
Thadeu Lima de Souza Cascardo
UBUNTU: Ubuntu- Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@ |
hwe-5.8 | 2021-10-27 08:49:04 UTC |
UBUNTU: Ubuntu-hwe-5.8-5.8.0-67.75
Author:
Stefan Bader
UBUNTU: Ubuntu- Signed-off-by: Stefan Bader <stefan. |
hwe-5.8-prep | 2021-10-27 08:49:04 UTC |
UBUNTU: Ubuntu-hwe-5.8-5.8.0-67.75
Author:
Stefan Bader
UBUNTU: Ubuntu- Signed-off-by: Stefan Bader <stefan. |
1 → 50 of 50 results | First • Previous • Next • Last |