UbuntuUpdates.org

Package "linux-lts-trusty"

This package belongs to a PPA: Canonical Kernel Team




Name: linux-lts-trusty

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: precise (12.04)
Level: base
Repository: main

Links



Other versions of "linux-lts-trusty" in Precise

Repository Area Version
security main 3.13.0-117.164~precise1
updates main 3.13.0-117.164~precise1

Changelog

Version: 3.13.0-116.163~precise1 2017-03-31 17:08:24 UTC

 linux-lts-trusty (3.13.0-116.163~precise1) precise; urgency=low
 .
   * linux-lts-trusty: 3.13.0-116.163~precise1 -proposed tracker (LP: #1678066)
 .
   * linux: 3.13.0-116.163 -proposed tracker (LP: #1678065)
 .
   * Fix CVE-2017-7308 (LP: #1678009)
     - net/packet: fix overflow in check for priv area size
     - net/packet: fix overflow in check for tp_frame_nr
     - net/packet: fix overflow in check for tp_reserve

Source diff to previous version
1678009 Fix CVE-2017-7308
CVE-2017-7308 The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which a

Version: 3.13.0-114.161~precise1 2017-03-16 18:08:35 UTC

 linux-lts-trusty (3.13.0-114.161~precise1) precise; urgency=low
 .
   * linux-lts-trusty: 3.13.0-114.161~precise1 -proposed tracker (LP: #1673211)
 .
   * lsattr 32bit does not work on 64bit kernel (Inappropriate ioctl error)
     (LP: #1619918)
     - btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls

Source diff to previous version
1619918 lsattr 32bit does not work on 64bit kernel (Inappropriate ioctl error)

Version: 3.13.0-113.160~precise1 2017-03-09 19:08:55 UTC

 linux-lts-trusty (3.13.0-113.160~precise1) precise; urgency=low
 .
   * linux-lts-trusty: 3.13.0-113.160~precise1 -proposed tracker (LP: #1671459)
 .
   * Windows guest got 0x5c BSOD when rebooting (LP: #1660519)
     - KVM: x86: reset RVI upon system reset
     - KVM: x86: Emulator should set DR6 upon GD like real CPU
 .
   * ipv6: fix a refcnt leak with peer addr (LP: #1662096)
     - ipv6: fix a refcnt leak with peer addr
     - ipv6: use addrconf_get_prefix_route() to remove peer addr
     - ipv6: Avoid double dst_free
 .
   * Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel (LP: #1660634)
     - [Config] CONFIG_NET_DROP_MONITOR=m

Source diff to previous version
1660519 Windows guest got 0x5c BSOD when rebooting
1662096 ipv6: fix a refcnt leak with peer addr
1660634 Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel

Version: 3.13.0-111.158~precise1 2017-02-23 14:09:06 UTC

 linux-lts-trusty (3.13.0-111.158~precise1) precise; urgency=low
 .
   [ Thadeu Lima de Souza Cascardo ]
 .
   * Release Tracking Bug
     - LP: #1666909
 .
   [ Andy Whitcroft ]
   * Windows guest got 0x5c BSOD when rebooting (LP: #1660519)
     - KVM: x86: reset RVI upon system reset
     - KVM: x86: Emulator should set DR6 upon GD like real CPU
 .
   * ipv6: fix a refcnt leak with peer addr (LP: #1662096)
     - ipv6: fix a refcnt leak with peer addr
     - ipv6: use addrconf_get_prefix_route() to remove peer addr
     - ipv6: Avoid double dst_free
 .
   * Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel (LP: #1660634)
     - [Config] CONFIG_NET_DROP_MONITOR=m

Source diff to previous version
1660519 Windows guest got 0x5c BSOD when rebooting
1662096 ipv6: fix a refcnt leak with peer addr
1660634 Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel

Version: 3.13.0-109.156~precise2 2017-02-13 13:08:14 UTC

 linux-lts-trusty (3.13.0-109.156~precise2) precise; urgency=low
 .
   [ Thadeu Lima de Souza Cascardo ]
 .
   * Release Tracking Bug
     - LP: #1663636
 .
   * linux headers packages empty (LP: #1663558)
     - Revert "UBUNTU: [debian] derive indep_hdrs_pkg_name from src_pkg_name"
 .
 linux (3.13.0-109.156) trusty; urgency=low
 .
   [ Thadeu Lima de Souza Cascardo ]
 .
   * Release Tracking Bug
     - LP: #1662186
 .
   [ Luis Henriques ]
   * Backport Dirty COW patch to prevent wineserver freeze (LP: #1658270)
     - ARM: 7985/1: mm: implement pte_accessible for faulting mappings
     - ARM: 8108/1: mm: Introduce {pte,pmd}_isset and {pte,pmd}_isclear
     - ARM: 8037/1: mm: support big-endian page tables
     - ARM: 8109/1: mm: Modify pte_write and pmd_write logic for LPAE
     - arm64: mm: Route pmd thp functions through pte equivalents
     - mm: fix huge zero page accounting in smaps report
     - SAUCE: mm: Respect FOLL_FORCE/FOLL_COW for thp
 .
   * kernel BUG at skbuff.h:1486 Insufficient linear data in skb
     __skb_pull.part.7+0x4/0x6 [openvswitch] (LP: #1655683)
     - SAUCE: openvswitch: gre: filter gre packets
 .
   * CVE-2016-7911
     - block: fix use-after-free in sys_ioprio_get()
 .
   * CVE-2016-7910
     - block: fix use-after-free in seq file
 .
   * Xen MSI setup code incorrectly re-uses cached pirq (LP: #1656381)
     - SAUCE: xen: do not re-use pirq number cached in pci device msi msg data

1663558 linux headers packages empty
1658270 Backport Dirty COW patch to prevent wineserver freeze
1655683 kernel BUG at skbuff.h:1486 Insufficient linear data in skb __skb_pull.part.7+0x4/0x6 [openvswitch]
1656381 Xen MSI setup code incorrectly re-uses cached pirq
CVE-2016-7911 Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a de
CVE-2016-7910 Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges b



About   -   Send Feedback to @ubuntu_updates