UbuntuUpdates.org

Package "linux-lts-trusty"

This package belongs to a PPA: Canonical Kernel Team




Name: linux-lts-trusty

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: precise (12.04)
Level: base
Repository: main

Links



Other versions of "linux-lts-trusty" in Precise

Repository Area Version
security main 3.13.0-117.164~precise1
updates main 3.13.0-117.164~precise1

Changelog

Version: 3.13.0-109.156~precise1 2017-02-08 22:08:43 UTC

 linux-lts-trusty (3.13.0-109.156~precise1) precise; urgency=low
 .
   [ Thadeu Lima de Souza Cascardo ]
 .
   * Release Tracking Bug
     - LP: #1662722
 .
   [ Luis Henriques ]
   * Backport Dirty COW patch to prevent wineserver freeze (LP: #1658270)
     - ARM: 7985/1: mm: implement pte_accessible for faulting mappings
     - ARM: 8108/1: mm: Introduce {pte,pmd}_isset and {pte,pmd}_isclear
     - ARM: 8037/1: mm: support big-endian page tables
     - ARM: 8109/1: mm: Modify pte_write and pmd_write logic for LPAE
     - arm64: mm: Route pmd thp functions through pte equivalents
     - mm: fix huge zero page accounting in smaps report
     - SAUCE: mm: Respect FOLL_FORCE/FOLL_COW for thp
 .
   * kernel BUG at skbuff.h:1486 Insufficient linear data in skb
     __skb_pull.part.7+0x4/0x6 [openvswitch] (LP: #1655683)
     - SAUCE: openvswitch: gre: filter gre packets
 .
   * CVE-2016-7911
     - block: fix use-after-free in sys_ioprio_get()
 .
   * CVE-2016-7910
     - block: fix use-after-free in seq file
 .
   * Xen MSI setup code incorrectly re-uses cached pirq (LP: #1656381)
     - SAUCE: xen: do not re-use pirq number cached in pci device msi msg data
 .
 linux (3.13.0-108.155) trusty; urgency=low
 .
   [ John Donnelly ]
 .
   * Release Tracking Bug
     - LP: #1655476
 .
   [ John Donnelly ]
 .
   * CVE-2016-9555
     - sctp: validate chunk len before actually using it

Source diff to previous version
1658270 Backport Dirty COW patch to prevent wineserver freeze
1655683 kernel BUG at skbuff.h:1486 Insufficient linear data in skb __skb_pull.part.7+0x4/0x6 [openvswitch]
1656381 Xen MSI setup code incorrectly re-uses cached pirq
CVE-2016-7911 Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a de
CVE-2016-7910 Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges b
CVE-2016-9555 The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows r

Version: 3.13.0-108.155~precise1 2017-01-12 21:09:21 UTC

 linux-lts-trusty (3.13.0-108.155~precise1) precise; urgency=low
 .
   [ John Donnelly ]
 .
   * Release Tracking Bug
     - LP: #1655480
 .
   [ John Donnelly ]
 .
   * CVE-2016-9555
     - sctp: validate chunk len before actually using it

Source diff to previous version
CVE-2016-9555 The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows r

Version: 3.13.0-107.154~precise1 2016-12-20 13:10:44 UTC

 linux-lts-trusty (3.13.0-107.154~precise1) precise; urgency=low
 .
   [ Luis Henriques ]
 .
   * Release Tracking Bug
     - LP: #1651204
 .
   * CVE-2016-9756
     - KVM: x86: drop error recovery in em_jmp_far and em_ret_far
 .
   * CVE-2016-9806
     - netlink: Fix dump skb leak/double free
 .
   * CVE-2016-9794
     - ALSA: pcm : Call kill_fasync() in stream lock
 .
   * export nvme drive model/serial strings via sysfs (trusty) (LP: #1649635)
     - NVMe: Export NVMe attributes to sysfs group
 .
   * CVE-2016-9793
     - net: avoid signed overflows for SO_{SND|RCV}BUFFORCE
 .
   * Ubuntu16.10 - EEH on BELL3 adapter fails to recover (serial/tty)
     (LP: #1646857)
     - serial: 8250_pci: Detach low-level driver during PCI error recovery

1649635 export nvme drive model/serial strings via sysfs (trusty)
1646857 Ubuntu16.10 - EEH on BELL3 adapter fails to recover (serial/tty)
CVE-2016-9756 kvm: stack memory information leakage
CVE-2016-9806 double free in netlink_dump
CVE-2016-9794 Linux kernel: ALSA: use-after-free in,kill_fasync
CVE-2016-9793 Linux: signed overflows for SO_{SND|RCV}BUFFORCE



About   -   Send Feedback to @ubuntu_updates