UbuntuUpdates.org

Package "linux-lts-quantal"


Moved to precise:main:updates


Name: linux-lts-quantal

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: precise (12.04)
Level: proposed
Repository: main

Links



Other versions of "linux-lts-quantal" in Precise

Repository Area Version
security main 3.5.0-54.81~precise1
updates main 3.5.0-54.81~precise1

Changelog

Version: *DELETED* 2017-04-28 22:07:32 UTC
Moved to precise:main:updates
No changelog for deleted or moved packages.

Version: 3.5.0-54.81~precise1 2014-07-16 21:06:37 UTC

  linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
    - LP: #1341472
    - CVE-2014-4943

Source diff to previous version
CVE-2014-4943 RESERVED

Version: 3.5.0-54.80~precise1 2014-07-09 18:06:48 UTC

  linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-lts-3.5.0-52.79 security release
  * Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)"
    - LP: #1337339
  * Release Tracking Bug
    - LP: #1338611

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
    - LP: #1337339
    - CVE-2014-4699

Source diff to previous version
CVE-2014-4699 ptrace bug

Version: 3.5.0-52.79~precise1 2014-07-05 17:06:38 UTC

  linux-lts-quantal (3.5.0-52.79~precise1) precise; urgency=low

  [ Upstream Kernel Changes ]

  * x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
    - LP: #1337339
    - CVE-2014-4699
 -- Luis Henriques <email address hidden> Fri, 04 Jul 2014 10:52:15 +0100

Source diff to previous version
CVE-2014-4699 ptrace bug

Version: 3.5.0-53.79~precise1 2014-07-03 20:06:23 UTC

  linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low

  [ Joseph Salisbury ]

  * Release Tracking Bug
    - LP: #1336400

  [ Upstream Kernel Changes ]

  * skbuff: export skb_copy_ubufs
    - LP: #1298119
    - CVE-2014-0131
  * skbuff: add an api to orphan frags
    - LP: #1298119
    - CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
    - LP: #1298119
    - CVE-2014-0131
  * media-device: fix infoleak in ioctl media_enum_entities()
    - LP: #1333609
    - CVE-2014-1739
  * auditsc: audit_krule mask accesses need bounds checking
    - LP: #1325941
    - CVE-2014-3917
  * userns: Allow chown and setgid preservation
    - LP: #1329103
    - CVE-2014-4014
  * fs,userns: Change inode_capable to capable_wrt_inode_uidgid
    - LP: #1329103
    - CVE-2014-4014
  * target/rd: Refactor rd_build_device_space + rd_release_device_space
    - LP: #1333612
    - CVE-2014-4027
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
    - CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
    - CVE-2014-4608
  * lzo: properly check for overruns
    - CVE-2014-4608
 -- Joseph Salisbury <email address hidden> Tue, 01 Jul 2014 12:37:46 -0400

CVE-2014-0131 Use-after-free vulnerability in the skb_segment function in ...
CVE-2014-1739 The media_device_enum_entities function in ...
CVE-2014-3917 kernel/auditsc.c in the Linux kernel through 3.14.5, when ...
CVE-2014-4014 The capabilities implementation in the Linux kernel before 3.14.8 does ...
CVE-2014-4027 The rd_build_device_space function in drivers/target/target_core_rd.c ...



About   -   Send Feedback to @ubuntu_updates