UbuntuUpdates.org

Package "linux-lts-trusty"

Name: linux-lts-trusty

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Header files related to Linux kernel version 3.13.0
  • Linux kernel headers for version 3.13.0 on 32 bit x86 SMP
  • Header files related to Linux kernel version 3.13.0
  • Linux kernel headers for version 3.13.0 on 32 bit x86 SMP

Latest version: 3.13.0-117.164~precise1
Release: precise (12.04)
Level: updates
Repository: main

Links



Other versions of "linux-lts-trusty" in Precise

Repository Area Version
security main 3.13.0-117.164~precise1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.13.0-117.164~precise1 2017-04-24 15:06:31 UTC

  linux-lts-trusty (3.13.0-117.164~precise1) precise; urgency=low

  * linux-lts-trusty: 3.13.0-117.164~precise1 -proposed tracker (LP: #1680735)

  * linux: 3.13.0-117.164 -proposed tracker (LP: #1680733)

  * CVE-2017-6353
    - sctp: deny peeloff operation on asocs with threads sleeping on it

  * CVE-2017-5986
    - sctp: avoid BUG_ON on sctp_wait_for_sndbuf

  * Update ENA driver to 1.1.2 from net-next (LP: #1664312)
    - net: ena: Remove unnecessary pci_set_drvdata()
    - net: ena: Fix error return code in ena_device_init()
    - net: ena: change the return type of ena_set_push_mode() to be void.
    - net: ena: use setup_timer() and mod_timer()
    - net/ena: remove ntuple filter support from device feature list
    - net/ena: fix queues number calculation
    - net/ena: fix ethtool RSS flow configuration
    - net/ena: fix RSS default hash configuration
    - net/ena: fix NULL dereference when removing the driver after device reset
      failed
    - net/ena: refactor ena_get_stats64 to be atomic context safe
    - net/ena: fix potential access to freed memory during device reset
    - net/ena: use READ_ONCE to access completion descriptors
    - net/ena: reduce the severity of ena printouts
    - net/ena: change driver's default timeouts
    - net/ena: change condition for host attribute configuration
    - net/ena: update driver version to 1.1.2

  * [Xenial - 16.04 ]Bonding driver - stack corruption when trying to copy 20
    bytes to a sockaddr (LP: #1668042)
    - net/bonding: Enforce active-backup policy for IPoIB bonds

  * stress_smoke_test passing and exiting rc=9 (linux 4.9.0-12.13 ADT test
    failure with linux 4.9.0-12.13) (LP: #1658633)
    - ext4: lock the xattr block before checksuming it

  * vmxnet3 LRO IPv6 performance issues (stalling TCP) (LP: #1605494)
    - Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets

  * move aufs.ko from -extra to linux-image package (LP: #1673498)
    - [config] aufs.ko moved to linux-image package

  * lsattr 32bit does not work on 64bit kernel (Inappropriate ioctl error)
    (LP: #1619918)
    - btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls

 -- Kleber Sacilotto de Souza <email address hidden> Thu, 06 Apr 2017 17:52:50 +0100

Source diff to previous version
1664312 Update ENA driver to 1.1.2 from net-next
1668042 [Xenial - 16.04 ]Bonding driver - stack corruption when trying to copy 20 bytes to a sockaddr
1658633 stress_smoke_test passing and exiting rc=9 (linux 4.9.0-12.13 ADT test failure with linux 4.9.0-12.13)
1605494 vmxnet3 LRO IPv6 performance issues (stalling TCP)
1619918 lsattr 32bit does not work on 64bit kernel (Inappropriate ioctl error)
CVE-2017-6353 net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which all
CVE-2017-5986 Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of se

Version: 3.13.0-116.163~precise1 2017-04-04 15:06:59 UTC

  linux-lts-trusty (3.13.0-116.163~precise1) precise; urgency=low

  * linux-lts-trusty: 3.13.0-116.163~precise1 -proposed tracker (LP: #1678066)

  * linux: 3.13.0-116.163 -proposed tracker (LP: #1678065)

  * Fix CVE-2017-7308 (LP: #1678009)
    - net/packet: fix overflow in check for priv area size
    - net/packet: fix overflow in check for tp_frame_nr
    - net/packet: fix overflow in check for tp_reserve

 -- Stefan Bader <email address hidden> Fri, 31 Mar 2017 09:33:48 +0200

Source diff to previous version
1678009 Fix CVE-2017-7308
CVE-2017-7308 The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which a

Version: 3.13.0-115.162~precise1 2017-03-30 01:06:55 UTC

  linux-lts-trusty (3.13.0-115.162~precise1) precise; urgency=low

  * CVE-2017-7184
    - xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window
    - xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder

 -- Thadeu Lima de Souza Cascardo <email address hidden> Fri, 24 Mar 2017 12:38:34 -0300

Source diff to previous version
CVE-2017-7184 The linux-image-* package 4.8.0.41.52 for the Linux kernel on Ubuntu 16.10 allows local users to obtain root privileges or cause a denial of service

Version: 3.13.0-113.160~precise1 2017-03-15 12:07:05 UTC

  linux-lts-trusty (3.13.0-113.160~precise1) precise; urgency=low

  * linux-lts-trusty: 3.13.0-113.160~precise1 -proposed tracker (LP: #1671459)

  * Windows guest got 0x5c BSOD when rebooting (LP: #1660519)
    - KVM: x86: reset RVI upon system reset
    - KVM: x86: Emulator should set DR6 upon GD like real CPU

  * ipv6: fix a refcnt leak with peer addr (LP: #1662096)
    - ipv6: fix a refcnt leak with peer addr
    - ipv6: use addrconf_get_prefix_route() to remove peer addr
    - ipv6: Avoid double dst_free

  * Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel (LP: #1660634)
    - [Config] CONFIG_NET_DROP_MONITOR=m

 -- Thadeu Lima de Souza Cascardo <email address hidden> Wed, 08 Mar 2017 17:03:18 -0300

Source diff to previous version
1660519 Windows guest got 0x5c BSOD when rebooting
1662096 ipv6: fix a refcnt leak with peer addr
1660634 Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel

Version: 3.13.0-112.159~precise1 2017-03-08 00:06:50 UTC

  linux-lts-trusty (3.13.0-112.159~precise1) precise; urgency=low

  * CVE-2017-2636
    - TTY: n_hdlc, fix lockdep false positive
    - tty: n_hdlc: get rid of racy n_hdlc.tbuf

 -- Stefan Bader <email address hidden> Fri, 03 Mar 2017 12:27:44 +0100

CVE-2017-2636 local privilege escalation flaw in n_hdlc



About   -   Send Feedback to @ubuntu_updates