UbuntuUpdates.org

Package "linux-lts-trusty"


Moved to precise:main:security


Name: linux-lts-trusty

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: precise (12.04)
Level: proposed
Repository: main

Links



Other versions of "linux-lts-trusty" in Precise

Repository Area Version
security main 3.13.0-185.236~12.04.1
updates main 3.13.0-185.236~12.04.1

Changelog

Version: *DELETED* 2017-04-24 19:06:39 UTC
Moved to precise:main:security
No changelog for deleted or moved packages.

Version: 3.13.0-117.164~precise1 2017-04-13 15:06:38 UTC

  linux-lts-trusty (3.13.0-117.164~precise1) precise; urgency=low

  * linux-lts-trusty: 3.13.0-117.164~precise1 -proposed tracker (LP: #1680735)

  * linux: 3.13.0-117.164 -proposed tracker (LP: #1680733)

  * CVE-2017-6353
    - sctp: deny peeloff operation on asocs with threads sleeping on it

  * CVE-2017-5986
    - sctp: avoid BUG_ON on sctp_wait_for_sndbuf

  * Update ENA driver to 1.1.2 from net-next (LP: #1664312)
    - net: ena: Remove unnecessary pci_set_drvdata()
    - net: ena: Fix error return code in ena_device_init()
    - net: ena: change the return type of ena_set_push_mode() to be void.
    - net: ena: use setup_timer() and mod_timer()
    - net/ena: remove ntuple filter support from device feature list
    - net/ena: fix queues number calculation
    - net/ena: fix ethtool RSS flow configuration
    - net/ena: fix RSS default hash configuration
    - net/ena: fix NULL dereference when removing the driver after device reset
      failed
    - net/ena: refactor ena_get_stats64 to be atomic context safe
    - net/ena: fix potential access to freed memory during device reset
    - net/ena: use READ_ONCE to access completion descriptors
    - net/ena: reduce the severity of ena printouts
    - net/ena: change driver's default timeouts
    - net/ena: change condition for host attribute configuration
    - net/ena: update driver version to 1.1.2

  * [Xenial - 16.04 ]Bonding driver - stack corruption when trying to copy 20
    bytes to a sockaddr (LP: #1668042)
    - net/bonding: Enforce active-backup policy for IPoIB bonds

  * stress_smoke_test passing and exiting rc=9 (linux 4.9.0-12.13 ADT test
    failure with linux 4.9.0-12.13) (LP: #1658633)
    - ext4: lock the xattr block before checksuming it

  * vmxnet3 LRO IPv6 performance issues (stalling TCP) (LP: #1605494)
    - Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets

  * move aufs.ko from -extra to linux-image package (LP: #1673498)
    - [config] aufs.ko moved to linux-image package

  * lsattr 32bit does not work on 64bit kernel (Inappropriate ioctl error)
    (LP: #1619918)
    - btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls

 -- Kleber Sacilotto de Souza <email address hidden> Thu, 06 Apr 2017 17:52:50 +0100

1664312 Update ENA driver to 1.1.2 from net-next
1668042 [Xenial - 16.04 ]Bonding driver - stack corruption when trying to copy 20 bytes to a sockaddr
1658633 stress_smoke_test passing and exiting rc=9 (linux 4.9.0-12.13 ADT test failure with linux 4.9.0-12.13)
1605494 vmxnet3 LRO IPv6 performance issues (stalling TCP)
1619918 lsattr 32bit does not work on 64bit kernel (Inappropriate ioctl error)
CVE-2017-6353 net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which all
CVE-2017-5986 Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of se

Version: *DELETED* 2017-04-12 05:08:30 UTC
Moved to precise:main:security
No changelog for deleted or moved packages.

Version: 3.13.0-116.163~precise1 2017-04-03 13:06:23 UTC

  linux-lts-trusty (3.13.0-116.163~precise1) precise; urgency=low

  * linux-lts-trusty: 3.13.0-116.163~precise1 -proposed tracker (LP: #1678066)

  * linux: 3.13.0-116.163 -proposed tracker (LP: #1678065)

  * Fix CVE-2017-7308 (LP: #1678009)
    - net/packet: fix overflow in check for priv area size
    - net/packet: fix overflow in check for tp_frame_nr
    - net/packet: fix overflow in check for tp_reserve

 -- Stefan Bader <email address hidden> Fri, 31 Mar 2017 09:33:48 +0200

Source diff to previous version
1678009 Fix CVE-2017-7308
CVE-2017-7308 The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which a

Version: 3.13.0-115.162~precise1 2017-03-29 23:06:47 UTC

  linux-lts-trusty (3.13.0-115.162~precise1) precise; urgency=low

  * CVE-2017-7184
    - xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window
    - xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder

 -- Thadeu Lima de Souza Cascardo <email address hidden> Fri, 24 Mar 2017 12:38:34 -0300

CVE-2017-7184 The linux-image-* package 4.8.0.41.52 for the Linux kernel on Ubuntu 16.10 allows local users to obtain root privileges or cause a denial of service



About   -   Send Feedback to @ubuntu_updates