UbuntuUpdates.org

Package "linux-lts-trusty"

Name: linux-lts-trusty

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel buildinfo for version 3.13.0 on 32 bit x86 SMP
  • Header files related to Linux kernel version 3.13.0
  • Linux kernel headers for version 3.13.0 on 32 bit x86 SMP
  • Header files related to Linux kernel version 3.13.0

Latest version: 3.13.0-185.236~12.04.1
Release: precise (12.04)
Level: updates
Repository: main

Links



Other versions of "linux-lts-trusty" in Precise

Repository Area Version
security main 3.13.0-185.236~12.04.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.13.0-112.159~precise1 2017-03-08 00:06:50 UTC

  linux-lts-trusty (3.13.0-112.159~precise1) precise; urgency=low

  * CVE-2017-2636
    - TTY: n_hdlc, fix lockdep false positive
    - tty: n_hdlc: get rid of racy n_hdlc.tbuf

 -- Stefan Bader <email address hidden> Fri, 03 Mar 2017 12:27:44 +0100

Source diff to previous version
CVE-2017-2636 local privilege escalation flaw in n_hdlc

Version: 3.13.0-110.157~precise1 2017-02-22 00:06:59 UTC

  linux-lts-trusty (3.13.0-110.157~precise1) precise; urgency=low

  * CVE-2017-6074 (LP: #1665935)
    - dccp: fix freeing skb too early for IPV6_RECVPKTINFO

 -- Stefan Bader <email address hidden> Mon, 20 Feb 2017 11:15:49 +0100

Source diff to previous version
CVE-2017-6074 The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the

Version: 3.13.0-109.156~precise2 2017-02-20 09:06:48 UTC

  linux-lts-trusty (3.13.0-109.156~precise2) precise; urgency=low

  [ Thadeu Lima de Souza Cascardo ]

  * Release Tracking Bug
    - LP: #1663636

  * linux headers packages empty (LP: #1663558)
    - Revert "UBUNTU: [debian] derive indep_hdrs_pkg_name from src_pkg_name"

linux (3.13.0-109.156) trusty; urgency=low

  [ Thadeu Lima de Souza Cascardo ]

  * Release Tracking Bug
    - LP: #1662186

  [ Luis Henriques ]
  * Backport Dirty COW patch to prevent wineserver freeze (LP: #1658270)
    - ARM: 7985/1: mm: implement pte_accessible for faulting mappings
    - ARM: 8108/1: mm: Introduce {pte,pmd}_isset and {pte,pmd}_isclear
    - ARM: 8037/1: mm: support big-endian page tables
    - ARM: 8109/1: mm: Modify pte_write and pmd_write logic for LPAE
    - arm64: mm: Route pmd thp functions through pte equivalents
    - mm: fix huge zero page accounting in smaps report
    - SAUCE: mm: Respect FOLL_FORCE/FOLL_COW for thp

  * kernel BUG at skbuff.h:1486 Insufficient linear data in skb
    __skb_pull.part.7+0x4/0x6 [openvswitch] (LP: #1655683)
    - SAUCE: openvswitch: gre: filter gre packets

  * CVE-2016-7911
    - block: fix use-after-free in sys_ioprio_get()

  * CVE-2016-7910
    - block: fix use-after-free in seq file

  * Xen MSI setup code incorrectly re-uses cached pirq (LP: #1656381)
    - SAUCE: xen: do not re-use pirq number cached in pci device msi msg data

 -- Thadeu Lima de Souza Cascardo <email address hidden> Fri, 10 Feb 2017 13:07:26 -0200

Source diff to previous version
1663558 linux headers packages empty
1658270 Backport Dirty COW patch to prevent wineserver freeze
1655683 kernel BUG at skbuff.h:1486 Insufficient linear data in skb __skb_pull.part.7+0x4/0x6 [openvswitch]
1656381 Xen MSI setup code incorrectly re-uses cached pirq
CVE-2016-7911 Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a de
CVE-2016-7910 Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges b

Version: 3.13.0-108.155~precise1 2017-02-02 17:06:41 UTC

  linux-lts-trusty (3.13.0-108.155~precise1) precise; urgency=low

  [ John Donnelly ]

  * Release Tracking Bug
    - LP: #1655480

  [ John Donnelly ]

  * CVE-2016-9555
    - sctp: validate chunk len before actually using it

 -- John Donnelly <email address hidden> Thu, 12 Jan 2017 08:22:42 +0000

Source diff to previous version
CVE-2016-9555 The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows r

Version: 3.13.0-107.154~precise1 2017-01-10 14:07:15 UTC

  linux-lts-trusty (3.13.0-107.154~precise1) precise; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
    - LP: #1651204

  * CVE-2016-9756
    - KVM: x86: drop error recovery in em_jmp_far and em_ret_far

  * CVE-2016-9806
    - netlink: Fix dump skb leak/double free

  * CVE-2016-9794
    - ALSA: pcm : Call kill_fasync() in stream lock

  * export nvme drive model/serial strings via sysfs (trusty) (LP: #1649635)
    - NVMe: Export NVMe attributes to sysfs group

  * CVE-2016-9793
    - net: avoid signed overflows for SO_{SND|RCV}BUFFORCE

  * Ubuntu16.10 - EEH on BELL3 adapter fails to recover (serial/tty)
    (LP: #1646857)
    - serial: 8250_pci: Detach low-level driver during PCI error recovery

 -- Luis Henriques <email address hidden> Tue, 20 Dec 2016 10:04:58 +0000

1649635 export nvme drive model/serial strings via sysfs (trusty)
1646857 Ubuntu16.10 - EEH on BELL3 adapter fails to recover (serial/tty)
CVE-2016-9756 kvm: stack memory information leakage
CVE-2016-9806 double free in netlink_dump
CVE-2016-9794 Linux kernel: ALSA: use-after-free in,kill_fasync
CVE-2016-9793 Linux: signed overflows for SO_{SND|RCV}BUFFORCE



About   -   Send Feedback to @ubuntu_updates