UbuntuUpdates.org

Package "linux"

Name: linux

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel buildinfo for version 4.4.0 on 32 bit x86 SMP
  • Linux kernel buildinfo for version 4.4.0 on 32 bit x86 SMP
  • Linux kernel buildinfo for version 4.4.0 on 32 bit x86 SMP
  • Linux kernel buildinfo for version 4.4.0 on 32 bit x86 SMP

Latest version: 4.4.0-164.192
Release: xenial (16.04)
Level: security
Repository: main

Links

Save this URL for the latest version of "linux": https://www.ubuntuupdates.org/linux



Other versions of "linux" in Xenial

Repository Area Version
base main 4.4.0-21.37
updates main 4.4.0-164.192
proposed main 4.4.0-165.193
PPA: Canonical Kernel Team 4.4.0-165.193

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 4.4.0-164.192 2019-09-18 09:06:24 UTC

  linux (4.4.0-164.192) xenial; urgency=medium

  * CVE-2019-14835
    - SAUCE: vhost: make sure log_num < in_num

 -- Juerg Haefliger <email address hidden> Fri, 13 Sep 2019 12:55:05 +0200

Source diff to previous version
CVE-2019-14835 A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in ...

Version: 4.4.0-161.189 2019-09-03 16:07:04 UTC

  linux (4.4.0-161.189) xenial; urgency=medium

  * xenial/linux: 4.4.0-161.189 -proposed tracker (LP: #1841544)

  * flock not mediated by 'k' (LP: 1658219)
    - Revert "UBUNTU: SAUCE: apparmor: flock mediation is not being, enforced on
      cache check"

  * Packaging resync (LP: #1786013)
    - [Packaging] resync getabis

Source diff to previous version
1786013 Packaging resync

Version: 4.4.0-159.187 2019-08-14 11:09:56 UTC

  linux (4.4.0-159.187) xenial; urgency=medium

  * CVE-2019-1125
    - x86/cpufeatures: Carve out CQM features retrieval
    - x86/cpufeatures: Combine word 11 and 12 into a new scattered features word
    - x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations
    - x86/speculation: Enable Spectre v1 swapgs mitigations
    - x86/entry/64: Use JMP instead of JMPQ
    - x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS

Source diff to previous version
CVE-2019-1125 RESERVED

Version: 4.4.0-157.185 2019-07-25 17:07:25 UTC

  linux (4.4.0-157.185) xenial; urgency=medium

  * linux: 4.4.0-157.185 -proposed tracker (LP: #1837476)

  * systemd 229-4ubuntu21.22 ADT test failure with linux 4.4.0-156.183 (storage)
    (LP: #1837235)
    - Revert "block/bio: Do not zero user pages"
    - Revert "block: Clear kernel memory before copying to user"
    - Revert "bio_copy_from_iter(): get rid of copying iov_iter"

Source diff to previous version
1837235 systemd 229-4ubuntu21.22 ADT test failure with linux 4.4.0-156.183 (storage)

Version: 4.4.0-154.181 2019-06-28 22:07:01 UTC

  linux (4.4.0-154.181) xenial; urgency=medium

  * linux: 4.4.0-154.181 -proposed tracker (LP: #1834030)

  * CVE-2019-11478
    - tcp: refine memory limit test in tcp_fragment()

  * CVE-2019-11479
    - SAUCE: tcp: add tcp_min_snd_mss sysctl
    - SAUCE: tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()

 -- Khalid Elmously <email address hidden> Tue, 25 Jun 2019 00:36:38 -0400

CVE-2019-11478 Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling cer
CVE-2019-11479 Jonathan Looney discovered that the Linux kernel default MSS is hard-c ...



About   -   Send Feedback to @ubuntu_updates