UbuntuUpdates.org

Package "linux"

This package belongs to a PPA: Canonical Kernel Team

Name: linux

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel version specific cloud tools for version 3.13.0
  • Linux kernel specific documentation for version 3.13.0
  • Header files related to Linux kernel version 3.13.0
  • Linux kernel headers for version 3.13.0 on 32 bit x86 SMP

Latest version: 3.13.0-138.187
Release: trusty (14.04)
Level: base
Repository: main

Links

Save this URL for the latest version of "linux": https://www.ubuntuupdates.org/linux



Other versions of "linux" in Trusty

Repository Area Version
base main 3.13.0-24.46
security main 3.13.0-137.186
updates main 3.13.0-137.186
proposed main 3.13.0-138.187

Packages in group

Deleted packages are displayed in grey.

linux-cloud-tools-common linux-doc linux-headers-3.13.0-135 linux-headers-3.13.0-135-generic linux-headers-3.13.0-135-lowlatency
linux-headers-3.13.0-136 linux-headers-3.13.0-136-generic linux-headers-3.13.0-136-lowlatency linux-headers-3.13.0-137 linux-headers-3.13.0-137-generic
linux-headers-3.13.0-137-lowlatency linux-headers-3.13.0-138 linux-headers-3.13.0-138-generic linux-headers-3.13.0-138-lowlatency linux-image-3.13.0-135-generic
linux-image-3.13.0-135-lowlatency linux-image-3.13.0-136-generic linux-image-3.13.0-136-lowlatency linux-image-3.13.0-137-generic linux-image-3.13.0-137-lowlatency
linux-image-3.13.0-138-generic linux-image-3.13.0-138-lowlatency linux-image-extra-3.13.0-135-generic linux-image-extra-3.13.0-136-generic linux-image-extra-3.13.0-137-generic
linux-image-extra-3.13.0-138-generic linux-libc-dev linux-source-3.13.0 linux-tools-3.13.0-135 linux-tools-3.13.0-135-generic
linux-tools-3.13.0-135-lowlatency linux-tools-3.13.0-136 linux-tools-3.13.0-136-generic linux-tools-3.13.0-136-lowlatency linux-tools-3.13.0-137
linux-tools-3.13.0-137-generic linux-tools-3.13.0-137-lowlatency linux-tools-3.13.0-138 linux-tools-3.13.0-138-generic linux-tools-3.13.0-138-lowlatency
linux-tools-common

Changelog

Version: 3.13.0-138.187 2017-12-13 22:08:09 UTC

 linux (3.13.0-138.187) trusty; urgency=low
 .
   * linux: 3.13.0-138.187 -proposed tracker (LP: #1737911)
 .
   * CVE-2017-12190
     - fix unbalanced page refcounting in bio_map_user_iov
     - more bio_map_user_iov() leak fixes
 .
   * CVE-2017-15274
     - KEYS: fix dereferencing NULL payload with nonzero length
 .
   * CVE-2017-14140
     - Sanitize 'move_pages()' permission checks
 .
   * CVE-2017-15115
     - sctp: do not peel off an assoc from one netns to another one
 .
   * CVE-2017-14489
     - scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse
       nlmsg properly
 .
   * CVE-2017-12153
     - nl80211: check for the required netlink attributes presence
 .
   * CVE-2017-16525
     - USB: serial: console: fix use-after-free after failed setup
     - USB: serial: console: fix use-after-free on disconnect
 .
   * CVE-2017-7542
     - ipv6: avoid overflow of offset in ip6_find_1stfragopt
     - ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt()
 .
   * CVE-2017-15102
     - usb: misc: legousbtower: Fix NULL pointer deference
 .
   * CVE-2017-12192
     - KEYS: prevent KEYCTL_READ on negative key
 .
   * CVE-2017-14156
     - video: fbdev: aty: do not leak uninitialized padding in clk to userspace
 .
   * CVE-2017-5669
     - ipc/shm: Fix shmat mmap nil-page protection
 .
   * CVE-2017-0750
     - f2fs: do more integrity verification for superblock
 .
   * CVE-2017-7889
     - mm: Tighten x86 /dev/mem with zeroing reads
 .
   * CVE-2017-8824
     - dccp: CVE-2017-8824: use-after-free in DCCP code

Source diff to previous version
CVE-2017-12190 The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector h
CVE-2017-15274 security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, whi
CVE-2017-14140 The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local
CVE-2017-15115 The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off act
CVE-2017-14489 The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel through 4.13.2 allows local users to cause a denial of service (p
CVE-2017-12153 A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function d
CVE-2017-16525 The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of
CVE-2017-7542 The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (intege
CVE-2017-15102 The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1 allows local users (who are physically proximate for ins
CVE-2017-12192 The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly conside
CVE-2017-14156 The atyfb_ioctl function in drivers/video/fbdev/aty/atyfb_base.c in the Linux kernel through 4.12.10 does not initialize a certain data structure, wh
CVE-2017-5669 The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which
CVE-2017-0750 A elevation of privilege vulnerability in the Upstream Linux file system. Product: Android. Versions: Android kernel. Android ID: A-36817013.
CVE-2017-7889 The mm subsystem in the Linux kernel through 4.10.10 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local user
CVE-2017-8824 The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of servic

Version: 3.13.0-137.186 2017-12-05 04:08:13 UTC

 linux (3.13.0-137.186) trusty; urgency=low
 .
   * linux: 3.13.0-137.186 -proposed tracker (LP: #1736194)
 .
   * CVE-2017-1000405
     - mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
 .
   * CVE-2017-16939
     - netlink: add a start callback for starting a netlink dump
     - ipsec: Fix aborted xfrm policy dump crash
 .

Source diff to previous version

Version: 3.13.0-136.185 2017-11-28 19:08:14 UTC

 linux (3.13.0-136.185) trusty; urgency=low
 .
   * linux: 3.13.0-136.185 -proposed tracker (LP: #1734733)
 .
   * NVMe timeout is too short (LP: #1729119)
     - NVMe: Make I/O timeout a module parameter
     - nvme: update timeout module parameter type

Source diff to previous version
1729119 NVMe timeout is too short

Version: 3.13.0-135.184 2017-10-18 15:08:20 UTC

 linux (3.13.0-135.184) trusty; urgency=low
 .
   * linux: 3.13.0-135.184 -proposed tracker (LP: #1724500)
 .
   * Trusty NVMe boot fails on some systems (LP: #1720867)
     - NVMe: RCU protected access to io queues
     - NVMe: IOCTL path RCU protect queue access
     - powerpc/mm: fix ".__node_distance" undefined
     - NVMe: per-cpu io queues
     - nvme: Use pci_enable_msi_range() and pci_enable_msix_range()
     - NVMe: make setup work for devices that don't do INTx
     - NVMe: Always use MSI/MSI-x interrupts
 .

Source diff to previous version
1720867 Trusty NVMe boot fails on some systems

Version: 3.13.0-134.183 2017-10-11 00:09:01 UTC

 linux (3.13.0-134.183) trusty; urgency=low
 .
   * linux: 3.13.0-134.183 -proposed tracker (LP: #1722335)
 .
   [ Thadeu Lima de Souza Cascardo ]
   * CVE-2017-10661
     - timerfd: Protect the might cancel mechanism proper
 .
   * CVE-2017-10662
     - f2fs: sanity check segment count
 .
   * CVE-2017-10663
     - f2fs: sanity check checkpoint segno and blkoff
 .
   * CVE-2017-14340
     - xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present
 .
   * CVE-2017-10911
     - xen-blkback: don't leak stack data via response ring
 .
   * CVE-2017-11176
     - mqueue: fix a use-after-free in sys_mq_notify()
 .
   * CVE-2016-8632
     - tipc: check minimum bearer MTU

CVE-2017-1066 RESERVED
CVE-2017-1434 IBM DB2 for Linux, UNIX and Windows 11.1 (includes DB2 Connect Server) under unusual circumstances, could expose highly sensitive information in the
CVE-2017-1091 RESERVED
CVE-2017-1117 IBM WebSphere MQ 8.0 and 9.0 could allow an authenticated user to cause a denial of service to the MQXR channel when trace is enabled. IBM X-Force ID
CVE-2016-8632 The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment leng



About   -   Send Feedback to @ubuntu_updates