{ "summary": { "snap": { "added": [], "removed": [], "diff": [] }, "deb": { "added": [ "linux-headers-6.8.0-55-generic", "linux-image-6.8.0-55-generic", "linux-modules-6.8.0-55-generic", "linux-riscv-6.8-headers-6.8.0-55" ], "removed": [ "linux-headers-6.8.0-53-generic", "linux-image-6.8.0-53-generic", "linux-modules-6.8.0-53-generic", "linux-riscv-6.8-headers-6.8.0-53" ], "diff": [ "linux-headers-generic", "linux-headers-virtual", "linux-image-virtual", "linux-virtual" ] } }, "diff": { "deb": [ { "name": "linux-headers-generic", "from_version": { "source_package_name": "linux-meta-riscv-6.8", "source_package_version": "6.8.0.53.55.1~22.04.1", "version": "6.8.0.53.55.1~22.04.1" }, "to_version": { "source_package_name": "linux-meta-riscv-6.8", "source_package_version": "6.8.0.55.57.1~22.04.1", "version": "6.8.0.55.57.1~22.04.1" }, "cves": [], "launchpad_bugs_fixed": [ 1786013 ], "changes": [ { "cves": [], "log": [ "", " * Bump ABI 6.8.0-55.57.1~22.04", "", " * Packaging resync (LP: #1786013)", " - [Packaging] debian/dkms-versions -- resync from main package", "" ], "package": "linux-meta-riscv-6.8", "version": "6.8.0.55.57.1~22.04.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 1786013 ], "author": "Emil Renner Berthing ", "date": "Wed, 19 Feb 2025 12:29:33 +0100" } ], "notes": null }, { "name": "linux-headers-virtual", "from_version": { "source_package_name": "linux-meta-riscv-6.8", "source_package_version": "6.8.0.53.55.1~22.04.1", "version": "6.8.0.53.55.1~22.04.1" }, "to_version": { "source_package_name": "linux-meta-riscv-6.8", "source_package_version": "6.8.0.55.57.1~22.04.1", "version": "6.8.0.55.57.1~22.04.1" }, "cves": [], "launchpad_bugs_fixed": [ 1786013 ], "changes": [ { "cves": [], "log": [ "", " * Bump ABI 6.8.0-55.57.1~22.04", "", " * Packaging resync (LP: #1786013)", " - [Packaging] debian/dkms-versions -- resync from main package", "" ], "package": "linux-meta-riscv-6.8", "version": "6.8.0.55.57.1~22.04.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 1786013 ], "author": "Emil Renner Berthing ", "date": "Wed, 19 Feb 2025 12:29:33 +0100" } ], "notes": null }, { "name": "linux-image-virtual", "from_version": { "source_package_name": "linux-meta-riscv-6.8", "source_package_version": "6.8.0.53.55.1~22.04.1", "version": "6.8.0.53.55.1~22.04.1" }, "to_version": { "source_package_name": "linux-meta-riscv-6.8", "source_package_version": "6.8.0.55.57.1~22.04.1", "version": "6.8.0.55.57.1~22.04.1" }, "cves": [], "launchpad_bugs_fixed": [ 1786013 ], "changes": [ { "cves": [], "log": [ "", " * Bump ABI 6.8.0-55.57.1~22.04", "", " * Packaging resync (LP: #1786013)", " - [Packaging] debian/dkms-versions -- resync from main package", "" ], "package": "linux-meta-riscv-6.8", "version": "6.8.0.55.57.1~22.04.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 1786013 ], "author": "Emil Renner Berthing ", "date": "Wed, 19 Feb 2025 12:29:33 +0100" } ], "notes": null }, { "name": "linux-virtual", "from_version": { "source_package_name": "linux-meta-riscv-6.8", "source_package_version": "6.8.0.53.55.1~22.04.1", "version": "6.8.0.53.55.1~22.04.1" }, "to_version": { "source_package_name": "linux-meta-riscv-6.8", "source_package_version": "6.8.0.55.57.1~22.04.1", "version": "6.8.0.55.57.1~22.04.1" }, "cves": [], "launchpad_bugs_fixed": [ 1786013 ], "changes": [ { "cves": [], "log": [ "", " * Bump ABI 6.8.0-55.57.1~22.04", "", " * Packaging resync (LP: #1786013)", " - [Packaging] debian/dkms-versions -- resync from main package", "" ], "package": "linux-meta-riscv-6.8", "version": "6.8.0.55.57.1~22.04.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 1786013 ], "author": "Emil Renner Berthing ", "date": "Wed, 19 Feb 2025 12:29:33 +0100" } ], "notes": null } ], "snap": [] }, "added": { "deb": [ { "name": "linux-headers-6.8.0-55-generic", "from_version": { "source_package_name": "linux-riscv-6.8", "source_package_version": "6.8.0-53.55.1~22.04.1", "version": null }, "to_version": { "source_package_name": "linux-riscv-6.8", "source_package_version": "6.8.0-55.57.1~22.04.1", "version": "6.8.0-55.57.1~22.04.1" }, "cves": [ { "cve": "CVE-2024-53104", "url": "https://ubuntu.com/security/CVE-2024-53104", "cve_description": "In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.", "cve_priority": "high", "cve_public_date": "2024-12-02 08:15:00 UTC" }, { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "launchpad_bugs_fixed": [ 2097977, 1786013, 2097978, 2097981, 2089411 ], "changes": [ { "cves": [ { "cve": "CVE-2024-53104", "url": "https://ubuntu.com/security/CVE-2024-53104", "cve_description": "In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.", "cve_priority": "high", "cve_public_date": "2024-12-02 08:15:00 UTC" }, { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "log": [ "", " * jammy/linux-riscv-6.8: 6.8.0-55.57.1~22.04.1 -proposed tracker", " (LP: #2097977)", "", " * Packaging resync (LP: #1786013)", " - [Packaging] debian.riscv-6.8/dkms-versions -- update from kernel-versions", " (main/s2025.01.13)", "", " [ Ubuntu: 6.8.0-55.57.1 ]", "", " * noble/linux-riscv: 6.8.0-55.57.1 -proposed tracker (LP: #2097978)", " [ Ubuntu: 6.8.0-55.57 ]", " * noble/linux: 6.8.0-55.57 -proposed tracker (LP: #2097981)", " * python perf module missing in realtime kernel (LP: #2089411)", " - [Packaging] linux-tools: Add missing python perf symlink", " - [Packaging] linux-tools: Fix python perf library packaging", " - [Packaging] linux-tools: Fall back to old python perf path", " * CVE-2024-53104", " - media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in", " uvc_parse_format", " [ Ubuntu: 6.8.0-54.56 ]", " * CVE-2025-0927", " - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key", "" ], "package": "linux-riscv-6.8", "version": "6.8.0-55.57.1~22.04.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2097977, 1786013, 2097978, 2097981, 2089411 ], "author": "Emil Renner Berthing ", "date": "Wed, 19 Feb 2025 12:28:05 +0100" } ], "notes": "linux-headers-6.8.0-55-generic version '6.8.0-55.57.1~22.04.1' (source package linux-riscv-6.8 version '6.8.0-55.57.1~22.04.1') was added. linux-headers-6.8.0-55-generic version '6.8.0-55.57.1~22.04.1' has the same source package name, linux-riscv-6.8, as removed package linux-headers-6.8.0-53-generic. As such we can use the source package version of the removed package, '6.8.0-53.55.1~22.04.1', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-image-6.8.0-55-generic", "from_version": { "source_package_name": "linux-riscv-6.8", "source_package_version": "6.8.0-53.55.1~22.04.1", "version": null }, "to_version": { "source_package_name": "linux-riscv-6.8", "source_package_version": "6.8.0-55.57.1~22.04.1", "version": "6.8.0-55.57.1~22.04.1" }, "cves": [ { "cve": "CVE-2024-53104", "url": "https://ubuntu.com/security/CVE-2024-53104", "cve_description": "In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.", "cve_priority": "high", "cve_public_date": "2024-12-02 08:15:00 UTC" }, { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "launchpad_bugs_fixed": [ 2097977, 1786013, 2097978, 2097981, 2089411 ], "changes": [ { "cves": [ { "cve": "CVE-2024-53104", "url": "https://ubuntu.com/security/CVE-2024-53104", "cve_description": "In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.", "cve_priority": "high", "cve_public_date": "2024-12-02 08:15:00 UTC" }, { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "log": [ "", " * jammy/linux-riscv-6.8: 6.8.0-55.57.1~22.04.1 -proposed tracker", " (LP: #2097977)", "", " * Packaging resync (LP: #1786013)", " - [Packaging] debian.riscv-6.8/dkms-versions -- update from kernel-versions", " (main/s2025.01.13)", "", " [ Ubuntu: 6.8.0-55.57.1 ]", "", " * noble/linux-riscv: 6.8.0-55.57.1 -proposed tracker (LP: #2097978)", " [ Ubuntu: 6.8.0-55.57 ]", " * noble/linux: 6.8.0-55.57 -proposed tracker (LP: #2097981)", " * python perf module missing in realtime kernel (LP: #2089411)", " - [Packaging] linux-tools: Add missing python perf symlink", " - [Packaging] linux-tools: Fix python perf library packaging", " - [Packaging] linux-tools: Fall back to old python perf path", " * CVE-2024-53104", " - media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in", " uvc_parse_format", " [ Ubuntu: 6.8.0-54.56 ]", " * CVE-2025-0927", " - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key", "" ], "package": "linux-riscv-6.8", "version": "6.8.0-55.57.1~22.04.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2097977, 1786013, 2097978, 2097981, 2089411 ], "author": "Emil Renner Berthing ", "date": "Wed, 19 Feb 2025 12:28:05 +0100" } ], "notes": "linux-image-6.8.0-55-generic version '6.8.0-55.57.1~22.04.1' (source package linux-riscv-6.8 version '6.8.0-55.57.1~22.04.1') was added. linux-image-6.8.0-55-generic version '6.8.0-55.57.1~22.04.1' has the same source package name, linux-riscv-6.8, as removed package linux-headers-6.8.0-53-generic. As such we can use the source package version of the removed package, '6.8.0-53.55.1~22.04.1', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-modules-6.8.0-55-generic", "from_version": { "source_package_name": "linux-riscv-6.8", "source_package_version": "6.8.0-53.55.1~22.04.1", "version": null }, "to_version": { "source_package_name": "linux-riscv-6.8", "source_package_version": "6.8.0-55.57.1~22.04.1", "version": "6.8.0-55.57.1~22.04.1" }, "cves": [ { "cve": "CVE-2024-53104", "url": "https://ubuntu.com/security/CVE-2024-53104", "cve_description": "In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.", "cve_priority": "high", "cve_public_date": "2024-12-02 08:15:00 UTC" }, { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "launchpad_bugs_fixed": [ 2097977, 1786013, 2097978, 2097981, 2089411 ], "changes": [ { "cves": [ { "cve": "CVE-2024-53104", "url": "https://ubuntu.com/security/CVE-2024-53104", "cve_description": "In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.", "cve_priority": "high", "cve_public_date": "2024-12-02 08:15:00 UTC" }, { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "log": [ "", " * jammy/linux-riscv-6.8: 6.8.0-55.57.1~22.04.1 -proposed tracker", " (LP: #2097977)", "", " * Packaging resync (LP: #1786013)", " - [Packaging] debian.riscv-6.8/dkms-versions -- update from kernel-versions", " (main/s2025.01.13)", "", " [ Ubuntu: 6.8.0-55.57.1 ]", "", " * noble/linux-riscv: 6.8.0-55.57.1 -proposed tracker (LP: #2097978)", " [ Ubuntu: 6.8.0-55.57 ]", " * noble/linux: 6.8.0-55.57 -proposed tracker (LP: #2097981)", " * python perf module missing in realtime kernel (LP: #2089411)", " - [Packaging] linux-tools: Add missing python perf symlink", " - [Packaging] linux-tools: Fix python perf library packaging", " - [Packaging] linux-tools: Fall back to old python perf path", " * CVE-2024-53104", " - media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in", " uvc_parse_format", " [ Ubuntu: 6.8.0-54.56 ]", " * CVE-2025-0927", " - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key", "" ], "package": "linux-riscv-6.8", "version": "6.8.0-55.57.1~22.04.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2097977, 1786013, 2097978, 2097981, 2089411 ], "author": "Emil Renner Berthing ", "date": "Wed, 19 Feb 2025 12:28:05 +0100" } ], "notes": "linux-modules-6.8.0-55-generic version '6.8.0-55.57.1~22.04.1' (source package linux-riscv-6.8 version '6.8.0-55.57.1~22.04.1') was added. linux-modules-6.8.0-55-generic version '6.8.0-55.57.1~22.04.1' has the same source package name, linux-riscv-6.8, as removed package linux-headers-6.8.0-53-generic. As such we can use the source package version of the removed package, '6.8.0-53.55.1~22.04.1', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-riscv-6.8-headers-6.8.0-55", "from_version": { "source_package_name": "linux-riscv-6.8", "source_package_version": "6.8.0-53.55.1~22.04.1", "version": null }, "to_version": { "source_package_name": "linux-riscv-6.8", "source_package_version": "6.8.0-55.57.1~22.04.1", "version": "6.8.0-55.57.1~22.04.1" }, "cves": [ { "cve": "CVE-2024-53104", "url": "https://ubuntu.com/security/CVE-2024-53104", "cve_description": "In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.", "cve_priority": "high", "cve_public_date": "2024-12-02 08:15:00 UTC" }, { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "launchpad_bugs_fixed": [ 2097977, 1786013, 2097978, 2097981, 2089411 ], "changes": [ { "cves": [ { "cve": "CVE-2024-53104", "url": "https://ubuntu.com/security/CVE-2024-53104", "cve_description": "In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.", "cve_priority": "high", "cve_public_date": "2024-12-02 08:15:00 UTC" }, { "cve": "CVE-2025-0927", "url": "https://ubuntu.com/security/CVE-2025-0927", "cve_description": "[fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key]", "cve_priority": "medium", "cve_public_date": "2025-02-13" } ], "log": [ "", " * jammy/linux-riscv-6.8: 6.8.0-55.57.1~22.04.1 -proposed tracker", " (LP: #2097977)", "", " * Packaging resync (LP: #1786013)", " - [Packaging] debian.riscv-6.8/dkms-versions -- update from kernel-versions", " (main/s2025.01.13)", "", " [ Ubuntu: 6.8.0-55.57.1 ]", "", " * noble/linux-riscv: 6.8.0-55.57.1 -proposed tracker (LP: #2097978)", " [ Ubuntu: 6.8.0-55.57 ]", " * noble/linux: 6.8.0-55.57 -proposed tracker (LP: #2097981)", " * python perf module missing in realtime kernel (LP: #2089411)", " - [Packaging] linux-tools: Add missing python perf symlink", " - [Packaging] linux-tools: Fix python perf library packaging", " - [Packaging] linux-tools: Fall back to old python perf path", " * CVE-2024-53104", " - media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in", " uvc_parse_format", " [ Ubuntu: 6.8.0-54.56 ]", " * CVE-2025-0927", " - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key", "" ], "package": "linux-riscv-6.8", "version": "6.8.0-55.57.1~22.04.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2097977, 1786013, 2097978, 2097981, 2089411 ], "author": "Emil Renner Berthing ", "date": "Wed, 19 Feb 2025 12:28:05 +0100" } ], "notes": "linux-riscv-6.8-headers-6.8.0-55 version '6.8.0-55.57.1~22.04.1' (source package linux-riscv-6.8 version '6.8.0-55.57.1~22.04.1') was added. linux-riscv-6.8-headers-6.8.0-55 version '6.8.0-55.57.1~22.04.1' has the same source package name, linux-riscv-6.8, as removed package linux-headers-6.8.0-53-generic. As such we can use the source package version of the removed package, '6.8.0-53.55.1~22.04.1', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." } ], "snap": [] }, "removed": { "deb": [ { "name": "linux-headers-6.8.0-53-generic", "from_version": { "source_package_name": "linux-riscv-6.8", "source_package_version": "6.8.0-53.55.1~22.04.1", "version": "6.8.0-53.55.1~22.04.1" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-image-6.8.0-53-generic", "from_version": { "source_package_name": "linux-riscv-6.8", "source_package_version": "6.8.0-53.55.1~22.04.1", "version": "6.8.0-53.55.1~22.04.1" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-modules-6.8.0-53-generic", "from_version": { "source_package_name": "linux-riscv-6.8", "source_package_version": "6.8.0-53.55.1~22.04.1", "version": "6.8.0-53.55.1~22.04.1" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-riscv-6.8-headers-6.8.0-53", "from_version": { "source_package_name": "linux-riscv-6.8", "source_package_version": "6.8.0-53.55.1~22.04.1", "version": "6.8.0-53.55.1~22.04.1" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null } ], "snap": [] }, "notes": "Changelog diff for Ubuntu 22.04 jammy image from daily image serial 20250304 to 20250305", "from_series": "jammy", "to_series": "jammy", "from_serial": "20250304", "to_serial": "20250305", "from_manifest_filename": "daily_manifest.previous", "to_manifest_filename": "manifest.current" }