[ubuntu/trusty-proposed] linux 3.13.0-122.171 (Accepted)
Łukasz Zemczak
lukasz.zemczak at canonical.com
Thu Jun 22 09:57:09 UTC 2017
linux (3.13.0-122.171) trusty; urgency=low
* linux: 3.13.0-122.171 -proposed tracker (LP: #1699047)
* CVE-2017-1000364
- SAUCE: mm: Only expand stack if guard area is hit
* CVE-2014-9940
- regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing
* CVE-2017-100363
- char: lp: fix possible integer overflow in lp_setup()
* CVE-2017-9242
- ipv6: fix out of bound writes in __ip6_append_data()
* CVE-2017-9075
- sctp: do not inherit ipv6_{mc|ac|fl}_list from parent
* CVE-2017-9074
- ipv6: Prevent overrun when parsing v6 header options
* CVE-2017-9076
- ipv6/dccp: do not inherit ipv6_mc_list from parent
* CVE-2017-9077
- ipv6/dccp: do not inherit ipv6_mc_list from parent
* CVE-2017-8890
- dccp/tcp: do not inherit mc_list from parent
* CVE-2017-0605
- tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()
* CVE-2017-7294
- drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()
Date: 2017-06-20 16:39:14.097105+00:00
Changed-By: Thadeu Lima de Souza Cascardo <thadeu.cascardo at canonical.com>
Signed-By: Łukasz Zemczak <lukasz.zemczak at canonical.com>
https://launchpad.net/ubuntu/+source/linux/3.13.0-122.171
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list