Package "linux-lts-trusty"
WARNING: the "linux-lts-trusty" package was deleted from this repository
Name: |
linux-lts-trusty
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
|
Latest version: |
*DELETED* |
Release: |
precise (12.04) |
Level: |
base |
Repository: |
main |
Links
Other versions of "linux-lts-trusty" in Precise
Changelog
linux-lts-trusty (3.13.0-116.163~precise1) precise; urgency=low
.
* linux-lts-trusty: 3.13.0-116.163~precise1 -proposed tracker (LP: #1678066)
.
* linux: 3.13.0-116.163 -proposed tracker (LP: #1678065)
.
* Fix CVE-2017-7308 (LP: #1678009)
- net/packet: fix overflow in check for priv area size
- net/packet: fix overflow in check for tp_frame_nr
- net/packet: fix overflow in check for tp_reserve
|
Source diff to previous version |
1678009 |
Fix CVE-2017-7308 |
CVE-2017-7308 |
The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which a |
|
linux-lts-trusty (3.13.0-114.161~precise1) precise; urgency=low
.
* linux-lts-trusty: 3.13.0-114.161~precise1 -proposed tracker (LP: #1673211)
.
* lsattr 32bit does not work on 64bit kernel (Inappropriate ioctl error)
(LP: #1619918)
- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls
|
Source diff to previous version |
1619918 |
lsattr 32bit does not work on 64bit kernel (Inappropriate ioctl error) |
|
linux-lts-trusty (3.13.0-113.160~precise1) precise; urgency=low
.
* linux-lts-trusty: 3.13.0-113.160~precise1 -proposed tracker (LP: #1671459)
.
* Windows guest got 0x5c BSOD when rebooting (LP: #1660519)
- KVM: x86: reset RVI upon system reset
- KVM: x86: Emulator should set DR6 upon GD like real CPU
.
* ipv6: fix a refcnt leak with peer addr (LP: #1662096)
- ipv6: fix a refcnt leak with peer addr
- ipv6: use addrconf_get_prefix_route() to remove peer addr
- ipv6: Avoid double dst_free
.
* Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel (LP: #1660634)
- [Config] CONFIG_NET_DROP_MONITOR=m
|
Source diff to previous version |
1660519 |
Windows guest got 0x5c BSOD when rebooting |
1662096 |
ipv6: fix a refcnt leak with peer addr |
1660634 |
Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel |
|
linux-lts-trusty (3.13.0-111.158~precise1) precise; urgency=low
.
[ Thadeu Lima de Souza Cascardo ]
.
* Release Tracking Bug
- LP: #1666909
.
[ Andy Whitcroft ]
* Windows guest got 0x5c BSOD when rebooting (LP: #1660519)
- KVM: x86: reset RVI upon system reset
- KVM: x86: Emulator should set DR6 upon GD like real CPU
.
* ipv6: fix a refcnt leak with peer addr (LP: #1662096)
- ipv6: fix a refcnt leak with peer addr
- ipv6: use addrconf_get_prefix_route() to remove peer addr
- ipv6: Avoid double dst_free
.
* Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel (LP: #1660634)
- [Config] CONFIG_NET_DROP_MONITOR=m
|
Source diff to previous version |
1660519 |
Windows guest got 0x5c BSOD when rebooting |
1662096 |
ipv6: fix a refcnt leak with peer addr |
1660634 |
Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel |
|
linux-lts-trusty (3.13.0-109.156~precise2) precise; urgency=low
.
[ Thadeu Lima de Souza Cascardo ]
.
* Release Tracking Bug
- LP: #1663636
.
* linux headers packages empty (LP: #1663558)
- Revert "UBUNTU: [debian] derive indep_hdrs_pkg_name from src_pkg_name"
.
linux (3.13.0-109.156) trusty; urgency=low
.
[ Thadeu Lima de Souza Cascardo ]
.
* Release Tracking Bug
- LP: #1662186
.
[ Luis Henriques ]
* Backport Dirty COW patch to prevent wineserver freeze (LP: #1658270)
- ARM: 7985/1: mm: implement pte_accessible for faulting mappings
- ARM: 8108/1: mm: Introduce {pte,pmd}_isset and {pte,pmd}_isclear
- ARM: 8037/1: mm: support big-endian page tables
- ARM: 8109/1: mm: Modify pte_write and pmd_write logic for LPAE
- arm64: mm: Route pmd thp functions through pte equivalents
- mm: fix huge zero page accounting in smaps report
- SAUCE: mm: Respect FOLL_FORCE/FOLL_COW for thp
.
* kernel BUG at skbuff.h:1486 Insufficient linear data in skb
__skb_pull.part.7+0x4/0x6 [openvswitch] (LP: #1655683)
- SAUCE: openvswitch: gre: filter gre packets
.
* CVE-2016-7911
- block: fix use-after-free in sys_ioprio_get()
.
* CVE-2016-7910
- block: fix use-after-free in seq file
.
* Xen MSI setup code incorrectly re-uses cached pirq (LP: #1656381)
- SAUCE: xen: do not re-use pirq number cached in pci device msi msg data
|
1663558 |
linux headers packages empty |
1658270 |
Backport Dirty COW patch to prevent wineserver freeze |
1655683 |
kernel BUG at skbuff.h:1486 Insufficient linear data in skb __skb_pull.part.7+0x4/0x6 [openvswitch] |
1656381 |
Xen MSI setup code incorrectly re-uses cached pirq |
CVE-2016-7911 |
Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a de |
CVE-2016-7910 |
Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges b |
|
About
-
Send Feedback to @ubuntu_updates