[ubuntu/xenial-updates] linux-euclid_4.4.0-9019.20_amd64.tar.gz - (Accepted)
Stefan Bader
stefan.bader at canonical.com
Mon Nov 27 18:03:09 UTC 2017
linux-euclid (4.4.0-9019.20) xenial; urgency=low
* autoreconstruct -- ensure potentially empty directories are rebuild too
Fixes FTBS when starting to use an orig tarball.
* CVE-2017-7533
- dentry name snapshots
* CVE-2017-7374
- fscrypt: remove broken support for detecting keyring key revocation
* CVE-2017-7184
- xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window
- xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder
* CVE-2017-2636
- TTY: n_hdlc, fix lockdep false positive
- tty: n_hdlc: get rid of racy n_hdlc.tbuf
* CVE-2017-1000364
- mm: vma_adjust: remove superfluous confusing update in remove_next == 1 case
- mm: larger stack guard gap, between vmas
- Allow stack to grow up to address space limit
- mm: fix new crash in unmapped_area_topdown()
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
- mm/mmap.c: expand_downwards: don't require the gap if !vm_prev
* CVE-2017-1000251
- Bluetooth: Properly check L2CAP config option output buffer length
* CVE-2017-1000112
- ipv4: Should use consistent conditional judgement for ip fragment in
__ip_append_data and ip_finish_output
- ipv6: Don't use ufo handling on later transformed packets
- udp: avoid ufo handling on IP payload compression packets
- ipv6: Should use consistent conditional judgement for ip6 fragment between
__ip6_append_data and ip6_finish_output
- net: account for current skb length when deciding about UFO
- udp: consistently apply ufo or fragmentation
* CVE-2017-1000111
- packet: fix tp_reserve race in packet_set_ring
* Fix CVE-2017-7308 (LP: #1678009)
- net/packet: fix overflow in check for priv area size
- net/packet: fix overflow in check for tp_frame_nr
- net/packet: fix overflow in check for tp_reserve
Date: Thu, 12 Oct 2017 16:54:00 +0200
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Launchpad Build Daemon <buildd at lgw01-amd64-017.buildd>
-------------- next part --------------
Format: 1.8
Date: Thu, 12 Oct 2017 16:54:00 +0200
Source: linux-euclid
Binary: linux-euclid-headers-4.4.0-9019 linux-euclid-tools-4.4.0-9019 linux-image-4.4.0-9019-euclid linux-image-extra-4.4.0-9019-euclid linux-headers-4.4.0-9019-euclid linux-image-4.4.0-9019-euclid-dbgsym linux-tools-4.4.0-9019-euclid
Architecture: amd64
Version: 4.4.0-9019.20
Distribution: xenial
Urgency: low
Maintainer: Launchpad Build Daemon <buildd at lgw01-amd64-017.buildd>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
linux-euclid-headers-4.4.0-9019 - Header files related to Linux kernel version 4.4.0
linux-euclid-tools-4.4.0-9019 - Linux kernel version specific tools for version 4.4.0-9019
linux-headers-4.4.0-9019-euclid - Linux kernel headers for version 4.4.0 on 64 bit x86 SMP
linux-image-4.4.0-9019-euclid - Linux kernel image for version 4.4.0 on 64 bit x86 SMP
linux-image-4.4.0-9019-euclid-dbgsym - Linux kernel debug image for version 4.4.0 on 64 bit x86 SMP
linux-image-extra-4.4.0-9019-euclid - Linux kernel extra modules for version 4.4.0 on 64 bit x86 SMP
linux-tools-4.4.0-9019-euclid - Linux kernel version specific tools for version 4.4.0-9019
Launchpad-Bugs-Fixed: 1678009
Changes:
linux-euclid (4.4.0-9019.20) xenial; urgency=low
.
* autoreconstruct -- ensure potentially empty directories are rebuild too
Fixes FTBS when starting to use an orig tarball.
.
* CVE-2017-7533
- dentry name snapshots
.
* CVE-2017-7374
- fscrypt: remove broken support for detecting keyring key revocation
.
* CVE-2017-7184
- xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window
- xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder
.
* CVE-2017-2636
- TTY: n_hdlc, fix lockdep false positive
- tty: n_hdlc: get rid of racy n_hdlc.tbuf
.
* CVE-2017-1000364
- mm: vma_adjust: remove superfluous confusing update in remove_next == 1 case
- mm: larger stack guard gap, between vmas
- Allow stack to grow up to address space limit
- mm: fix new crash in unmapped_area_topdown()
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
- mm/mmap.c: expand_downwards: don't require the gap if !vm_prev
.
* CVE-2017-1000251
- Bluetooth: Properly check L2CAP config option output buffer length
.
* CVE-2017-1000112
- ipv4: Should use consistent conditional judgement for ip fragment in
__ip_append_data and ip_finish_output
- ipv6: Don't use ufo handling on later transformed packets
- udp: avoid ufo handling on IP payload compression packets
- ipv6: Should use consistent conditional judgement for ip6 fragment between
__ip6_append_data and ip6_finish_output
- net: account for current skb length when deciding about UFO
- udp: consistently apply ufo or fragmentation
.
* CVE-2017-1000111
- packet: fix tp_reserve race in packet_set_ring
.
* Fix CVE-2017-7308 (LP: #1678009)
- net/packet: fix overflow in check for priv area size
- net/packet: fix overflow in check for tp_frame_nr
- net/packet: fix overflow in check for tp_reserve
Checksums-Sha1:
44e96028c80485a8790e06dc44b34a8ead823c34 9892592 linux-euclid-headers-4.4.0-9019_4.4.0-9019.20_amd64.deb
f82bdebb0288bab595acc732b49e7175cf758a56 870 linux-euclid-tools-4.4.0-9019-dbgsym_4.4.0-9019.20_amd64.ddeb
ca9a58939e8495e438f8b4e4b4324535d70a4b2d 673950 linux-euclid-tools-4.4.0-9019_4.4.0-9019.20_amd64.deb
0a7b3c004776fd32617f94d53451d404c1099800 7095069 linux-euclid_4.4.0-9019.20_amd64.tar.gz
67e2c363f0bbefd371c89142015a11f3d9c3bc56 785492 linux-headers-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
d10d1cb4e30f33d3bf42782e4c282271ad70c653 485512182 linux-image-4.4.0-9019-euclid-dbgsym_4.4.0-9019.20_amd64.ddeb
0f7f835dcc62c13c258bec29d73d636c7549aa1c 19200880 linux-image-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
2309c5387d2a2fc986e9ab195a420cd86a5ce7a7 39590194 linux-image-extra-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
e3faff4556787345bf6ce5c92999755ecfd50c1c 1956 linux-tools-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
Checksums-Sha256:
856e5cb0018c8c830edfcb4e3b2c429cff2338defe0f743a4038197bc09228b6 9892592 linux-euclid-headers-4.4.0-9019_4.4.0-9019.20_amd64.deb
735ac5bfbebb6370abb7b0bb20dd77443d92e588a08d6092dfb92bb6305c99e9 870 linux-euclid-tools-4.4.0-9019-dbgsym_4.4.0-9019.20_amd64.ddeb
419147e805f5532ecb1a9d7983b418c0230b78a4bd1a1f6fd208c1f85f6ff724 673950 linux-euclid-tools-4.4.0-9019_4.4.0-9019.20_amd64.deb
75bd06f1eeba387ac49749ae07fadb89204c0e5b9fc61b1e24cc62966a3f5fce 7095069 linux-euclid_4.4.0-9019.20_amd64.tar.gz
19e00210617cdaa93528722bba02fa341d2d1b6480c6f238a961075b6731b8be 785492 linux-headers-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
01f722114774e2645fbd841315776851fb56a6b58ee9ccf874446483fb3dfa7a 485512182 linux-image-4.4.0-9019-euclid-dbgsym_4.4.0-9019.20_amd64.ddeb
b1a86005faa557f8d4f828126ec9bf73d4163c7136abf7d25eebdeb88df42f19 19200880 linux-image-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
dac0d82aa3db9028d54410678b09990912f33a30fb57a503822b75f45cc18a23 39590194 linux-image-extra-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
0e8f0f151d6dfe4e2ad580735eeda3c2018b58d95039345117790206084adf77 1956 linux-tools-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
Files:
87d7c34b5b6399134f821bb24851fa3e 9892592 devel optional linux-euclid-headers-4.4.0-9019_4.4.0-9019.20_amd64.deb
6b9252e66c2094614a801e01a4827adf 870 devel extra linux-euclid-tools-4.4.0-9019-dbgsym_4.4.0-9019.20_amd64.ddeb
34c6ea5bb58290028146e43f929afb73 673950 devel optional linux-euclid-tools-4.4.0-9019_4.4.0-9019.20_amd64.deb
21063886d6a0c2f77016e4ef081363e2 7095069 raw-uefi - linux-euclid_4.4.0-9019.20_amd64.tar.gz
db3c3637517d7fe9f432ee7422003398 785492 devel optional linux-headers-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
0213f786800b77bd21c329919ffdb1a3 485512182 devel optional linux-image-4.4.0-9019-euclid-dbgsym_4.4.0-9019.20_amd64.ddeb
976516f1e04df1c0f4bd0b840d9bddda 19200880 kernel optional linux-image-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
1ccefc4b9df0c8bae2001e43a2e0e17d 39590194 kernel optional linux-image-extra-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
6c9626c667dbbd7342acdbd0c2f986b4 1956 devel optional linux-tools-4.4.0-9019-euclid_4.4.0-9019.20_amd64.deb
More information about the Xenial-changes
mailing list