UbuntuUpdates.org

Package "linux-lts-quantal"

This package belongs to a PPA: Canonical Kernel Team




Name: linux-lts-quantal

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: precise (12.04)
Level: base
Repository: main

Links



Other versions of "linux-lts-quantal" in Precise

Repository Area Version
security main 3.5.0-54.81~precise1
updates main 3.5.0-54.81~precise1

Changelog

Version: *DELETED* 2014-07-17 22:08:25 UTC
No changelog for deleted or moved packages.

Version: 3.5.0-54.80~precise1 2014-07-07 17:08:17 UTC

 linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low
 .
   [ Luis Henriques ]
 .
   * Merged back Ubuntu-lts-3.5.0-52.79 security release
   * Revert "x86_64,ptrace: Enforce RIP
     - LP: #1337339
   * Release Tracking Bug
     - LP: #1338611
 .
   [ Upstream Kernel Changes ]
 .
   * ptrace,x86: force IRET path after a ptrace_stop()
     - LP: #1337339
     - CVE-2014-4699
 .

Source diff to previous version
CVE-2014-4699 ptrace bug

Version: 3.5.0-53.79~precise1 2014-07-02 00:09:33 UTC

 linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low
 .
   [ Joseph Salisbury ]
 .
   * Release Tracking Bug
     - LP: #1336400
 .
   [ Upstream Kernel Changes ]
 .
   * skbuff: export skb_copy_ubufs
     - LP: #1298119
     - CVE-2014-0131
   * skbuff: add an api to orphan frags
     - LP: #1298119
     - CVE-2014-0131
   * skbuff: skb_segment: orphan frags before copying
     - LP: #1298119
     - CVE-2014-0131
   * media-device: fix infoleak in ioctl media_enum_entities()
     - LP: #1333609
     - CVE-2014-1739
   * auditsc: audit_krule mask accesses need bounds checking
     - LP: #1325941
     - CVE-2014-3917
   * userns: Allow chown and setgid preservation
     - LP: #1329103
     - CVE-2014-4014
   * fs,userns: Change inode_capable to capable_wrt_inode_uidgid
     - LP: #1329103
     - CVE-2014-4014
   * target/rd: Refactor rd_build_device_space + rd_release_device_space
     - LP: #1333612
     - CVE-2014-4027
   * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
     - CVE-2014-4608
   * lib/lzo: Update LZO compression to current upstream version
     - CVE-2014-4608
   * lzo: properly check for overruns
     - CVE-2014-4608

Source diff to previous version
CVE-2014-0131 Use-after-free vulnerability in the skb_segment function in ...
CVE-2014-1739 The media_device_enum_entities function in ...
CVE-2014-3917 kernel/auditsc.c in the Linux kernel through 3.14.5, when ...
CVE-2014-4014 The capabilities implementation in the Linux kernel before 3.14.8 does ...
CVE-2014-4027 The rd_build_device_space function in drivers/target/target_core_rd.c ...

Version: 3.5.0-52.78~precise1 2014-06-11 19:08:44 UTC

 linux-lts-quantal (3.5.0-52.78~precise1) precise; urgency=low
 .
   [ Luis Henriques ]
 .
   * Release Tracking Bug
     - LP: #1328969
 .
   [ Andy Whitcroft ]
 .
   * [debian] insertchanges -- fix to work across major version changes
 .
   [ Brad Figg ]
 .
   * Non-rebase branch fixups so startnewrelease will work.
   * debian/rules.d/0-common-vars.mk: drop anything after ~ from the version
   * debian/rules.d/1-maintainer.mk: Add '-lts-' to the tag that being used
     to find the base commit
 .
   [ Kamal Mostafa ]
 .
   * [Config] add debian/gbp.conf
 .
   [ Upstream Kernel Changes ]
 .
   * filter: prevent nla extensions to peek beyond the end of the message
     - LP: #1319561, #1319563
     - CVE-2014-3145

Source diff to previous version
CVE-2014-3145 The BPF_S_ANC_NLATTR_NEST extension implementation in the ...

Version: 3.5.0-51.77~precise1 2014-06-05 02:08:29 UTC

 linux-lts-quantal (3.5.0-51.77~precise1) precise; urgency=low
 .
   [ Upstream Kernel Changes ]
 .
   * futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
     uaddr2 in futex_requeue(..., requeue_pi=1)
     - LP: #1326367
     - CVE-2014-3153
   * futex: Validate atomic acquisition in futex_lock_pi_atomic()
     - LP: #1326367
     - CVE-2014-3153
   * futex: Always cleanup owner tid in unlock_pi
     - LP: #1326367
     - CVE-2014-3153
   * futex: Make lookup_pi_state more robust
     - LP: #1326367
     - CVE-2014-3153




About   -   Send Feedback to @ubuntu_updates