UbuntuUpdates.org

Package "linux-lts-trusty"

Name: linux-lts-trusty

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel buildinfo for version 3.13.0 on 32 bit x86 SMP
  • Header files related to Linux kernel version 3.13.0
  • Linux kernel headers for version 3.13.0 on 32 bit x86 SMP
  • Header files related to Linux kernel version 3.13.0

Latest version: 3.13.0-185.236~12.04.1
Release: precise (12.04)
Level: security
Repository: main

Links



Other versions of "linux-lts-trusty" in Precise

Repository Area Version
updates main 3.13.0-185.236~12.04.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.13.0-185.236~12.04.1 2021-05-03 14:07:21 UTC

  linux-lts-trusty (3.13.0-185.236~12.04.1) precise; urgency=medium

  * precise/linux-lts-trusty: 3.13.0-185.236~12.04.1 -proposed tracker
    (LP: #1919170)

  * Packaging resync (LP: #1786013)
    - [Packaging] update update.conf

  [ Ubuntu: 3.13.0-185.236 ]

  * trusty/linux: 3.13.0-185.236 -proposed tracker (LP: #1919171)
  * CVE-2021-27365
    - scsi: iscsi: Verify lengths on passthrough PDUs
    - sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output
    - scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
  * CVE-2021-27363 // CVE-2021-27364
    - scsi: iscsi: Restrict sessions and handles to admin capabilities
  * CVE-2021-27364
    - scsi: iscsi: respond to netlink with unicast when appropriate

  [ Ubuntu: 3.13.0-184.235 ]

  * trusty/linux: 3.13.0-184.235 -proposed tracker (LP: #1914232)
  * CVE-2020-28374
    - SAUCE: target: cleanup some boolean tests
    - target: simplify XCOPY wwn->se_dev lookup helper
    - xcopy: loop over devices using idr helper
    - scsi: target: Fix XCOPY NAA identifier lookup
  * Update kernel packaging to support forward porting kernels (LP: #1902957)
    - [Debian] Update for leader included in BACKPORT_SUFFIX

 -- Stefan Bader <email address hidden> Thu, 18 Mar 2021 16:30:04 +0100

Source diff to previous version
1786013 Packaging resync
1902957 Update kernel packaging to support forward porting kernels
CVE-2021-27365 An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and c
CVE-2021-27363 An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structu
CVE-2021-27364 An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileg
CVE-2020-28374 In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10. ...

Version: 3.13.0-117.164~precise1 2017-04-24 15:06:29 UTC

  linux-lts-trusty (3.13.0-117.164~precise1) precise; urgency=low

  * linux-lts-trusty: 3.13.0-117.164~precise1 -proposed tracker (LP: #1680735)

  * linux: 3.13.0-117.164 -proposed tracker (LP: #1680733)

  * CVE-2017-6353
    - sctp: deny peeloff operation on asocs with threads sleeping on it

  * CVE-2017-5986
    - sctp: avoid BUG_ON on sctp_wait_for_sndbuf

  * Update ENA driver to 1.1.2 from net-next (LP: #1664312)
    - net: ena: Remove unnecessary pci_set_drvdata()
    - net: ena: Fix error return code in ena_device_init()
    - net: ena: change the return type of ena_set_push_mode() to be void.
    - net: ena: use setup_timer() and mod_timer()
    - net/ena: remove ntuple filter support from device feature list
    - net/ena: fix queues number calculation
    - net/ena: fix ethtool RSS flow configuration
    - net/ena: fix RSS default hash configuration
    - net/ena: fix NULL dereference when removing the driver after device reset
      failed
    - net/ena: refactor ena_get_stats64 to be atomic context safe
    - net/ena: fix potential access to freed memory during device reset
    - net/ena: use READ_ONCE to access completion descriptors
    - net/ena: reduce the severity of ena printouts
    - net/ena: change driver's default timeouts
    - net/ena: change condition for host attribute configuration
    - net/ena: update driver version to 1.1.2

  * [Xenial - 16.04 ]Bonding driver - stack corruption when trying to copy 20
    bytes to a sockaddr (LP: #1668042)
    - net/bonding: Enforce active-backup policy for IPoIB bonds

  * stress_smoke_test passing and exiting rc=9 (linux 4.9.0-12.13 ADT test
    failure with linux 4.9.0-12.13) (LP: #1658633)
    - ext4: lock the xattr block before checksuming it

  * vmxnet3 LRO IPv6 performance issues (stalling TCP) (LP: #1605494)
    - Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets

  * move aufs.ko from -extra to linux-image package (LP: #1673498)
    - [config] aufs.ko moved to linux-image package

  * lsattr 32bit does not work on 64bit kernel (Inappropriate ioctl error)
    (LP: #1619918)
    - btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls

 -- Kleber Sacilotto de Souza <email address hidden> Thu, 06 Apr 2017 17:52:50 +0100

Source diff to previous version
1664312 Update ENA driver to 1.1.2 from net-next
1668042 [Xenial - 16.04 ]Bonding driver - stack corruption when trying to copy 20 bytes to a sockaddr
1658633 stress_smoke_test passing and exiting rc=9 (linux 4.9.0-12.13 ADT test failure with linux 4.9.0-12.13)
1605494 vmxnet3 LRO IPv6 performance issues (stalling TCP)
1619918 lsattr 32bit does not work on 64bit kernel (Inappropriate ioctl error)
CVE-2017-6353 net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which all
CVE-2017-5986 Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of se

Version: 3.13.0-116.163~precise1 2017-04-04 14:07:02 UTC

  linux-lts-trusty (3.13.0-116.163~precise1) precise; urgency=low

  * linux-lts-trusty: 3.13.0-116.163~precise1 -proposed tracker (LP: #1678066)

  * linux: 3.13.0-116.163 -proposed tracker (LP: #1678065)

  * Fix CVE-2017-7308 (LP: #1678009)
    - net/packet: fix overflow in check for priv area size
    - net/packet: fix overflow in check for tp_frame_nr
    - net/packet: fix overflow in check for tp_reserve

 -- Stefan Bader <email address hidden> Fri, 31 Mar 2017 09:33:48 +0200

Source diff to previous version
1678009 Fix CVE-2017-7308
CVE-2017-7308 The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which a

Version: 3.13.0-115.162~precise1 2017-03-30 00:06:53 UTC

  linux-lts-trusty (3.13.0-115.162~precise1) precise; urgency=low

  * CVE-2017-7184
    - xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window
    - xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder

 -- Thadeu Lima de Souza Cascardo <email address hidden> Fri, 24 Mar 2017 12:38:34 -0300

Source diff to previous version
CVE-2017-7184 The linux-image-* package 4.8.0.41.52 for the Linux kernel on Ubuntu 16.10 allows local users to obtain root privileges or cause a denial of service

Version: 3.13.0-112.159~precise1 2017-03-07 23:06:57 UTC

  linux-lts-trusty (3.13.0-112.159~precise1) precise; urgency=low

  * CVE-2017-2636
    - TTY: n_hdlc, fix lockdep false positive
    - tty: n_hdlc: get rid of racy n_hdlc.tbuf

 -- Stefan Bader <email address hidden> Fri, 03 Mar 2017 12:27:44 +0100

CVE-2017-2636 local privilege escalation flaw in n_hdlc



About   -   Send Feedback to @ubuntu_updates