UbuntuUpdates.org

Package "linux-lts-vivid"

Name: linux-lts-vivid

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel version specific cloud tools for version 3.19.0-80
  • Linux kernel version specific cloud tools for version 3.19.0-80
  • Header files related to Linux kernel version 3.19.0
  • Linux kernel headers for version 3.19.0 on 32 bit x86 SMP

Latest version: 3.19.0-80.88~14.04.1
Release: trusty (14.04)
Level: updates
Repository: main

Links



Other versions of "linux-lts-vivid" in Trusty

Repository Area Version
security main 3.19.0-80.88~14.04.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.19.0-80.88~14.04.1 2017-02-02 18:06:39 UTC

  linux-lts-vivid (3.19.0-80.88~14.04.1) trusty; urgency=low

  [ John Donnelly ]

  * Release Tracking Bug
    - LP: #1655748

  * CVE-2016-9555
    - sctp: validate chunk len before actually using it

 -- John Donnelly <email address hidden> Thu, 12 Jan 2017 09:37:17 +0000

Source diff to previous version
CVE-2016-9555 The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows r

Version: 3.19.0-79.87~14.04.1 2017-01-10 15:07:04 UTC

  linux-lts-vivid (3.19.0-79.87~14.04.1) trusty; urgency=low

  [ Thadeu Lima de Souza Cascardo ]

  * Release Tracking Bug
    - LP: #1651539

  [ Luis Henriques ]

  * CVE-2016-9756
    - KVM: x86: drop error recovery in em_jmp_far and em_ret_far

  * CVE-2016-9806
    - netlink: Fix dump skb leak/double free

  * CVE-2016-9794
    - ALSA: pcm : Call kill_fasync() in stream lock

  * [Hyper-V] netvsc: fix incorrect receive checksum offloading (LP: #1636656)
    - netvsc: fix incorrect receive checksum offloading

  * CVE-2016-9793
    - net: avoid signed overflows for SO_{SND|RCV}BUFFORCE

  * Ubuntu16.10 - EEH on BELL3 adapter fails to recover (serial/tty)
    (LP: #1646857)
    - serial: 8250_pci: Detach low-level driver during PCI error recovery

 -- Thadeu Lima de Souza Cascardo <email address hidden> Tue, 20 Dec 2016 18:43:23 -0200

Source diff to previous version
1636656 [Hyper-V] netvsc: fix incorrect receive checksum offloading
1646857 Ubuntu16.10 - EEH on BELL3 adapter fails to recover (serial/tty)
CVE-2016-9756 kvm: stack memory information leakage
CVE-2016-9806 double free in netlink_dump
CVE-2016-9794 Linux kernel: ALSA: use-after-free in,kill_fasync
CVE-2016-9793 Linux: signed overflows for SO_{SND|RCV}BUFFORCE

Version: 3.19.0-78.86~14.04.1 2016-12-19 19:07:18 UTC

  linux-lts-vivid (3.19.0-78.86~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
    - LP: #1647788

  * CVE-2016-7916
    - proc: prevent accessing /proc/<PID>/environ until it's ready

  * CVE-2016-6213
    - mnt: Add a per mount namespace limit on the number of mounts

  * [Hyper-V] do not lose pending heartbeat vmbus packets (LP: #1632786)
    - hv: do not lose pending heartbeat vmbus packets

  * ipv6: connected routes are missing after a down/up cycle on the loopback
    (LP: #1634545)
    - ipv6: correctly add local routes when lo goes up

 -- Luis Henriques <email address hidden> Tue, 06 Dec 2016 17:17:21 +0000

Source diff to previous version
1632786 [Hyper-V] do not lose pending heartbeat vmbus packets
1634545 ipv6: connected routes are missing after a down/up cycle on the loopback
CVE-2016-7916 Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information fro

Version: 3.19.0-77.85~14.04.1 2016-12-06 01:07:17 UTC

  linux-lts-vivid (3.19.0-77.85~14.04.1) trusty; urgency=low

  * CVE-2016-8655 (LP: #1646318)
    - packet: fix race condition in packet_set_ring

 -- Luis Henriques <email address hidden> Mon, 05 Dec 2016 10:51:53 +0000

Source diff to previous version
1646318 CVE-2016-8655
CVE-2016-8655 RESERVED

Version: 3.19.0-75.83~14.04.1 2016-11-30 03:07:08 UTC

  linux-lts-vivid (3.19.0-75.83~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
    - LP: #1640621

  * lxc-attach to malicious container allows access to host (LP: #1639345)
    - Revert "UBUNTU: ptrace: being capable wrt a process requires mapped
      uids/gids"
    - (upstream) mm: Add a user_ns owner to mm_struct and fix ptrace permission
      checks

  * CVE-2016-8658
    - brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()

  * CVE-2016-7425
    - scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()

 -- Luis Henriques <email address hidden> Thu, 10 Nov 2016 10:08:33 +0000

CVE-2016-8658 Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kerne
CVE-2016-7425 The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field,



About   -   Send Feedback to @ubuntu_updates