linux-euclid (4.4.0-9019.20) xenial; urgency=low * autoreconstruct -- ensure potentially empty directories are rebuild too Fixes FTBS when starting to use an orig tarball.
* CVE-2017-7533 - dentry name snapshots * CVE-2017-7374 - fscrypt: remove broken support for detecting keyring key revocation * CVE-2017-7184 - xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window - xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder * CVE-2017-2636 - TTY: n_hdlc, fix lockdep false positive - tty: n_hdlc: get rid of racy n_hdlc.tbuf * CVE-2017-1000364 - mm: vma_adjust: remove superfluous confusing update in remove_next == 1 case - mm: larger stack guard gap, between vmas - Allow stack to grow up to address space limit - mm: fix new crash in unmapped_area_topdown() - mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack - mm/mmap.c: expand_downwards: don't require the gap if !vm_prev * CVE-2017-1000251 - Bluetooth: Properly check L2CAP config option output buffer length * CVE-2017-1000112 - ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output - ipv6: Don't use ufo handling on later transformed packets - udp: avoid ufo handling on IP payload compression packets - ipv6: Should use consistent conditional judgement for ip6 fragment between __ip6_append_data and ip6_finish_output - net: account for current skb length when deciding about UFO - udp: consistently apply ufo or fragmentation * CVE-2017-1000111 - packet: fix tp_reserve race in packet_set_ring * Fix CVE-2017-7308 (LP: #1678009) - net/packet: fix overflow in check for priv area size - net/packet: fix overflow in check for tp_frame_nr - net/packet: fix overflow in check for tp_reserve Date: Thu, 12 Oct 2017 16:54:00 +0200 Changed-By: Stefan Bader <stefan.ba...@canonical.com> Maintainer: Launchpad Build Daemon <buildd@lgw01-amd64-017.buildd>
Format: 1.8 Date: Thu, 12 Oct 2017 16:54:00 +0200 Source: linux-euclid Binary: linux-euclid-headers-4.4.0-9019 linux-euclid-tools-4.4.0-9019 linux-image-4.4.0-9019-euclid linux-image-extra-4.4.0-9019-euclid linux-headers-4.4.0-9019-euclid linux-image-4.4.0-9019-euclid-dbgsym linux-tools-4.4.0-9019-euclid Architecture: amd64 Version: 4.4.0-9019.20 Distribution: xenial Urgency: low Maintainer: Launchpad Build Daemon <buildd@lgw01-amd64-017.buildd> Changed-By: Stefan Bader <stefan.ba...@canonical.com> Description: linux-euclid-headers-4.4.0-9019 - Header files related to Linux kernel version 4.4.0 linux-euclid-tools-4.4.0-9019 - Linux kernel version specific tools for version 4.4.0-9019 linux-headers-4.4.0-9019-euclid - Linux kernel headers for version 4.4.0 on 64 bit x86 SMP linux-image-4.4.0-9019-euclid - Linux kernel image for version 4.4.0 on 64 bit x86 SMP linux-image-4.4.0-9019-euclid-dbgsym - Linux kernel debug image for version 4.4.0 on 64 bit x86 SMP linux-image-extra-4.4.0-9019-euclid - Linux kernel extra modules for version 4.4.0 on 64 bit x86 SMP linux-tools-4.4.0-9019-euclid - Linux kernel version specific tools for version 4.4.0-9019 Launchpad-Bugs-Fixed: 1678009 Changes: linux-euclid (4.4.0-9019.20) xenial; urgency=low . * autoreconstruct -- ensure potentially empty directories are rebuild too Fixes FTBS when starting to use an orig tarball. . * CVE-2017-7533 - dentry name snapshots . * CVE-2017-7374 - fscrypt: remove broken support for detecting keyring key revocation . * CVE-2017-7184 - xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window - xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder . * CVE-2017-2636 - TTY: n_hdlc, fix lockdep false positive - tty: n_hdlc: get rid of racy n_hdlc.tbuf . * CVE-2017-1000364 - mm: vma_adjust: remove superfluous confusing update in remove_next == 1 case - mm: larger stack guard gap, between vmas - Allow stack to grow up to address space limit - mm: fix new crash in unmapped_area_topdown() - mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack - mm/mmap.c: expand_downwards: don't require the gap if !vm_prev . * CVE-2017-1000251 - Bluetooth: Properly check L2CAP config option output buffer length . * CVE-2017-1000112 - ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output - ipv6: Don't use ufo handling on later transformed packets - udp: avoid ufo handling on IP payload compression packets - ipv6: Should use consistent conditional judgement for ip6 fragment between __ip6_append_data and ip6_finish_output - net: account for current skb length when deciding about UFO - udp: consistently apply ufo or fragmentation . * CVE-2017-1000111 - packet: fix tp_reserve race in packet_set_ring . * Fix CVE-2017-7308 (LP: #1678009) - net/packet: fix overflow in check for priv area size - net/packet: fix overflow in check for tp_frame_nr - net/packet: fix overflow in check for tp_reserve Checksums-Sha1: 44e96028c80485a8790e06dc44b34a8ead823c34 9892592 linux-euclid-headers-4.4.0-9019_4.4.0-9019.20_amd64.deb f82bdebb0288bab595acc732b49e7175cf758a56 870 linux-euclid-tools-4.4.0-9019-dbgsym_4.4.0-9019.20_amd64.ddeb ca9a58939e8495e438f8b4e4b4324535d70a4b2d 673950 linux-euclid-tools-4.4.0-9019_4.4.0-9019.20_amd64.deb 0a7b3c004776fd32617f94d53451d404c1099800 7095069 linux-euclid_4.4.0-9019.20_amd64.tar.gz 67e2c363f0bbefd371c89142015a11f3d9c3bc56 785492 linux-headers-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb d10d1cb4e30f33d3bf42782e4c282271ad70c653 485512182 linux-image-4.4.0-9019-euclid-dbgsym_4.4.0-9019.20_amd64.ddeb 0f7f835dcc62c13c258bec29d73d636c7549aa1c 19200880 linux-image-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb 2309c5387d2a2fc986e9ab195a420cd86a5ce7a7 39590194 linux-image-extra-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb e3faff4556787345bf6ce5c92999755ecfd50c1c 1956 linux-tools-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb Checksums-Sha256: 856e5cb0018c8c830edfcb4e3b2c429cff2338defe0f743a4038197bc09228b6 9892592 linux-euclid-headers-4.4.0-9019_4.4.0-9019.20_amd64.deb 735ac5bfbebb6370abb7b0bb20dd77443d92e588a08d6092dfb92bb6305c99e9 870 linux-euclid-tools-4.4.0-9019-dbgsym_4.4.0-9019.20_amd64.ddeb 419147e805f5532ecb1a9d7983b418c0230b78a4bd1a1f6fd208c1f85f6ff724 673950 linux-euclid-tools-4.4.0-9019_4.4.0-9019.20_amd64.deb 75bd06f1eeba387ac49749ae07fadb89204c0e5b9fc61b1e24cc62966a3f5fce 7095069 linux-euclid_4.4.0-9019.20_amd64.tar.gz 19e00210617cdaa93528722bba02fa341d2d1b6480c6f238a961075b6731b8be 785492 linux-headers-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb 01f722114774e2645fbd841315776851fb56a6b58ee9ccf874446483fb3dfa7a 485512182 linux-image-4.4.0-9019-euclid-dbgsym_4.4.0-9019.20_amd64.ddeb b1a86005faa557f8d4f828126ec9bf73d4163c7136abf7d25eebdeb88df42f19 19200880 linux-image-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb dac0d82aa3db9028d54410678b09990912f33a30fb57a503822b75f45cc18a23 39590194 linux-image-extra-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb 0e8f0f151d6dfe4e2ad580735eeda3c2018b58d95039345117790206084adf77 1956 linux-tools-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb Files: 87d7c34b5b6399134f821bb24851fa3e 9892592 devel optional linux-euclid-headers-4.4.0-9019_4.4.0-9019.20_amd64.deb 6b9252e66c2094614a801e01a4827adf 870 devel extra linux-euclid-tools-4.4.0-9019-dbgsym_4.4.0-9019.20_amd64.ddeb 34c6ea5bb58290028146e43f929afb73 673950 devel optional linux-euclid-tools-4.4.0-9019_4.4.0-9019.20_amd64.deb 21063886d6a0c2f77016e4ef081363e2 7095069 raw-uefi - linux-euclid_4.4.0-9019.20_amd64.tar.gz db3c3637517d7fe9f432ee7422003398 785492 devel optional linux-headers-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb 0213f786800b77bd21c329919ffdb1a3 485512182 devel optional linux-image-4.4.0-9019-euclid-dbgsym_4.4.0-9019.20_amd64.ddeb 976516f1e04df1c0f4bd0b840d9bddda 19200880 kernel optional linux-image-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb 1ccefc4b9df0c8bae2001e43a2e0e17d 39590194 kernel optional linux-image-extra-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb 6c9626c667dbbd7342acdbd0c2f986b4 1956 devel optional linux-tools-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes