Package "linux-lts-trusty"
WARNING: the "linux-lts-trusty" package was deleted from this repository
Name: |
linux-lts-trusty
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
|
Latest version: |
*DELETED* |
Release: |
precise (12.04) |
Level: |
base |
Repository: |
main |
Links
Other versions of "linux-lts-trusty" in Precise
Changelog
linux-lts-trusty (3.13.0-109.156~precise1) precise; urgency=low
.
[ Thadeu Lima de Souza Cascardo ]
.
* Release Tracking Bug
- LP: #1662722
.
[ Luis Henriques ]
* Backport Dirty COW patch to prevent wineserver freeze (LP: #1658270)
- ARM: 7985/1: mm: implement pte_accessible for faulting mappings
- ARM: 8108/1: mm: Introduce {pte,pmd}_isset and {pte,pmd}_isclear
- ARM: 8037/1: mm: support big-endian page tables
- ARM: 8109/1: mm: Modify pte_write and pmd_write logic for LPAE
- arm64: mm: Route pmd thp functions through pte equivalents
- mm: fix huge zero page accounting in smaps report
- SAUCE: mm: Respect FOLL_FORCE/FOLL_COW for thp
.
* kernel BUG at skbuff.h:1486 Insufficient linear data in skb
__skb_pull.part.7+0x4/0x6 [openvswitch] (LP: #1655683)
- SAUCE: openvswitch: gre: filter gre packets
.
* CVE-2016-7911
- block: fix use-after-free in sys_ioprio_get()
.
* CVE-2016-7910
- block: fix use-after-free in seq file
.
* Xen MSI setup code incorrectly re-uses cached pirq (LP: #1656381)
- SAUCE: xen: do not re-use pirq number cached in pci device msi msg data
.
linux (3.13.0-108.155) trusty; urgency=low
.
[ John Donnelly ]
.
* Release Tracking Bug
- LP: #1655476
.
[ John Donnelly ]
.
* CVE-2016-9555
- sctp: validate chunk len before actually using it
|
Source diff to previous version |
1658270 |
Backport Dirty COW patch to prevent wineserver freeze |
1655683 |
kernel BUG at skbuff.h:1486 Insufficient linear data in skb __skb_pull.part.7+0x4/0x6 [openvswitch] |
1656381 |
Xen MSI setup code incorrectly re-uses cached pirq |
CVE-2016-7911 |
Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a de |
CVE-2016-7910 |
Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges b |
CVE-2016-9555 |
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows r |
|
linux-lts-trusty (3.13.0-108.155~precise1) precise; urgency=low
.
[ John Donnelly ]
.
* Release Tracking Bug
- LP: #1655480
.
[ John Donnelly ]
.
* CVE-2016-9555
- sctp: validate chunk len before actually using it
|
Source diff to previous version |
CVE-2016-9555 |
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows r |
|
linux-lts-trusty (3.13.0-107.154~precise1) precise; urgency=low
.
[ Luis Henriques ]
.
* Release Tracking Bug
- LP: #1651204
.
* CVE-2016-9756
- KVM: x86: drop error recovery in em_jmp_far and em_ret_far
.
* CVE-2016-9806
- netlink: Fix dump skb leak/double free
.
* CVE-2016-9794
- ALSA: pcm : Call kill_fasync() in stream lock
.
* export nvme drive model/serial strings via sysfs (trusty) (LP: #1649635)
- NVMe: Export NVMe attributes to sysfs group
.
* CVE-2016-9793
- net: avoid signed overflows for SO_{SND|RCV}BUFFORCE
.
* Ubuntu16.10 - EEH on BELL3 adapter fails to recover (serial/tty)
(LP: #1646857)
- serial: 8250_pci: Detach low-level driver during PCI error recovery
|
1649635 |
export nvme drive model/serial strings via sysfs (trusty) |
1646857 |
Ubuntu16.10 - EEH on BELL3 adapter fails to recover (serial/tty) |
CVE-2016-9756 |
kvm: stack memory information leakage |
CVE-2016-9806 |
double free in netlink_dump |
CVE-2016-9794 |
Linux kernel: ALSA: use-after-free in,kill_fasync |
CVE-2016-9793 |
Linux: signed overflows for SO_{SND|RCV}BUFFORCE |
|
About
-
Send Feedback to @ubuntu_updates