UbuntuUpdates.org

Package "linux-libc-dev"

Name: linux-libc-dev

Description:

Linux Kernel Headers for development

Latest version: 4.4.0-159.187
Release: xenial (16.04)
Level: security
Repository: main
Head package: linux

Links

Save this URL for the latest version of "linux-libc-dev": https://www.ubuntuupdates.org/linux-libc-dev


Download "linux-libc-dev"


Other versions of "linux-libc-dev" in Xenial

Repository Area Version
base main 4.4.0-21.37
updates main 4.4.0-159.187
proposed main 4.4.0-160.188
PPA: Canonical Kernel Team 4.4.0-160.188

Changelog

Version: 4.4.0-159.187 2019-08-14 11:09:56 UTC

  linux (4.4.0-159.187) xenial; urgency=medium

  * CVE-2019-1125
    - x86/cpufeatures: Carve out CQM features retrieval
    - x86/cpufeatures: Combine word 11 and 12 into a new scattered features word
    - x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations
    - x86/speculation: Enable Spectre v1 swapgs mitigations
    - x86/entry/64: Use JMP instead of JMPQ
    - x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS

Source diff to previous version
CVE-2019-1125 RESERVED

Version: 4.4.0-157.185 2019-07-25 17:07:25 UTC

  linux (4.4.0-157.185) xenial; urgency=medium

  * linux: 4.4.0-157.185 -proposed tracker (LP: #1837476)

  * systemd 229-4ubuntu21.22 ADT test failure with linux 4.4.0-156.183 (storage)
    (LP: #1837235)
    - Revert "block/bio: Do not zero user pages"
    - Revert "block: Clear kernel memory before copying to user"
    - Revert "bio_copy_from_iter(): get rid of copying iov_iter"

Source diff to previous version
1837235 systemd 229-4ubuntu21.22 ADT test failure with linux 4.4.0-156.183 (storage)

Version: 4.4.0-154.181 2019-06-28 22:07:01 UTC

  linux (4.4.0-154.181) xenial; urgency=medium

  * linux: 4.4.0-154.181 -proposed tracker (LP: #1834030)

  * CVE-2019-11478
    - tcp: refine memory limit test in tcp_fragment()

  * CVE-2019-11479
    - SAUCE: tcp: add tcp_min_snd_mss sysctl
    - SAUCE: tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()

 -- Khalid Elmously <email address hidden> Tue, 25 Jun 2019 00:36:38 -0400

Source diff to previous version
CVE-2019-11478 Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling cer
CVE-2019-11479 Jonathan Looney discovered that the Linux kernel default MSS is hard-c ...

Version: 4.4.0-151.178 2019-06-19 13:11:04 UTC

  linux (4.4.0-151.178) xenial; urgency=medium

  * Remote denial of service (system crash) caused by integer overflow in TCP
    SACK handling (LP: #1831637)
    - SAUCE: tcp: limit payload size of sacked skbs
    - SAUCE: tcp: fix fack_count accounting on tcp_shift_skb_data()

  * Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
    manipulation (LP: #1831638)
    - SAUCE: tcp: tcp_fragment() should apply sane memory limits

 -- Stefan Bader <email address hidden> Tue, 11 Jun 2019 09:36:19 +0200

Source diff to previous version
1831637 Remote denial of service (system crash) caused by integer overflow in TCP SACK handling
1831638 Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard manipulation

Version: 4.4.0-150.176 2019-06-05 14:07:09 UTC

  linux (4.4.0-150.176) xenial; urgency=medium

  * linux: 4.4.0-150.176 -proposed tracker (LP: #1830941)

  * glibc 2.23-0ubuntu11 ADT test failure with linux 4.4.0-149.175
    (LP: #1830890)
    - x86/vdso: Pass --eh-frame-hdr to the linker

1830890 glibc 2.23-0ubuntu11 ADT test failure with linux 4.4.0-149.175



About   -   Send Feedback to @ubuntu_updates