[ubuntu/zesty-proposed] linux 4.10.0-43.47 (Accepted)
Łukasz Zemczak
lukasz.zemczak at canonical.com
Thu Dec 14 10:42:29 UTC 2017
linux (4.10.0-43.47) zesty; urgency=low
* linux: 4.10.0-43.47 -proposed tracker (LP: #1737942)
* CVE-2017-15306
- KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM
* CVE-2017-12192
- KEYS: prevent KEYCTL_READ on negative key
* CVE-2017-1000370
- binfmt_elf: use ELF_ET_DYN_BASE only for PIE
- arm64: move ELF_ET_DYN_BASE to 4GB / 4MB
- mm: revert x86_64 and arm64 ELF_ET_DYN_BASE base changes
* CVE-2017-1000371
- binfmt_elf: use ELF_ET_DYN_BASE only for PIE
- arm64: move ELF_ET_DYN_BASE to 4GB / 4MB
- mm: revert x86_64 and arm64 ELF_ET_DYN_BASE base changes
* CVE-2017-12190
- fix unbalanced page refcounting in bio_map_user_iov
- more bio_map_user_iov() leak fixes
* CVE-2017-15274
- KEYS: fix dereferencing NULL payload with nonzero length
* CVE-2017-14156
- video: fbdev: aty: do not leak uninitialized padding in clk to userspace
* CVE-2017-14140
- Sanitize 'move_pages()' permission checks
* CVE-2017-15115
- sctp: do not peel off an assoc from one netns to another one
* CVE-2017-14489
- scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse
nlmsg properly
* CVE-2017-12153
- nl80211: check for the required netlink attributes presence
* CVE-2017-16525
- USB: serial: console: fix use-after-free after failed setup
- USB: serial: console: fix use-after-free on disconnect
* CVE-2017-7542
- ipv6: avoid overflow of offset in ip6_find_1stfragopt
- ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt()
* CVE-2017-8824
- dccp: CVE-2017-8824: use-after-free in DCCP code
Date: 2017-12-13 18:36:22.593353+00:00
Changed-By: Thadeu Lima de Souza Cascardo <thadeu.cascardo at canonical.com>
Signed-By: Łukasz Zemczak <lukasz.zemczak at canonical.com>
https://launchpad.net/ubuntu/+source/linux/4.10.0-43.47
-------------- next part --------------
Sorry, changesfile not available.
More information about the Zesty-changes
mailing list