UbuntuUpdates.org

Package "linux"

This package belongs to a PPA: Canonical Kernel Team

Name: linux

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel version specific cloud tools for version 4.4.0
  • Linux kernel specific documentation for version 4.4.0
  • Header files related to Linux kernel version 4.4.0
  • Linux kernel source for version 4.4.0 with Ubuntu patches

Latest version: 4.4.0-28.47
Release: xenial (16.04)
Level: base
Repository: main

Links



Other versions of "linux" in Xenial

Repository Area Version
base main 4.4.0-21.37
security main 4.4.0-210.242
updates main 4.4.0-210.242
proposed main 4.4.0-207.239

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 4.4.0-28.47 2022-12-06 12:08:46 UTC

 linux (4.4.0-28.47) xenial; urgency=low
 .
   [ Luis Henriques ]
 .
   * Release Tracking Bug
     - LP: #1595874
 .
   * Linux netfilter local privilege escalation issues (LP: #1595350)
     - netfilter: x_tables: don't move to non-existent next rule
     - netfilter: x_tables: validate targets of jumps
     - netfilter: x_tables: add and use xt_check_entry_offsets
     - netfilter: x_tables: kill check_entry helper
     - netfilter: x_tables: assert minimum target size
     - netfilter: x_tables: add compat version of xt_check_entry_offsets
     - netfilter: x_tables: check standard target size too
     - netfilter: x_tables: check for bogus target offset
     - netfilter: x_tables: validate all offsets and sizes in a rule
     - netfilter: x_tables: don't reject valid target size on some architectures
     - netfilter: arp_tables: simplify translate_compat_table args
     - netfilter: ip_tables: simplify translate_compat_table args
     - netfilter: ip6_tables: simplify translate_compat_table args
     - netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
     - netfilter: x_tables: do compat validation via translate_table
     - netfilter: x_tables: introduce and use xt_copy_counters_from_user
 .
   * Linux netfilter IPT_SO_SET_REPLACE memory corruption (LP: #1555338)
     - netfilter: x_tables: validate e->target_offset early
     - netfilter: x_tables: make sure e->next_offset covers remaining blob size
     - netfilter: x_tables: fix unconditional helper
 .

Source diff to previous version
1595350 Linux netfilter local privilege escalation issues

Version: 4.4.0-210.242 2021-04-16 14:08:51 UTC

 linux (4.4.0-210.242) xenial; urgency=medium
 .
   * xenial/linux: 4.4.0-210.242 -proposed tracker (LP: #1924644)
 .
   * setting extended attribute may cause memory leak (LP: #1924611)
     - SAUCE: vfs_setxattr: free converted value if xattr_permission returns error

Source diff to previous version

Version: 4.4.0-208.240 2021-04-01 14:08:34 UTC

 linux (4.4.0-208.240) xenial; urgency=medium
 .
   * xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
 .
   * linux ADT test failure with linux/4.4.0-207.239 -
     ubuntu_qrt_kernel_security.test-kernel-security.py (LP: #1922200) //
     CVE-2018-5953 // CVE-2018-5995 // CVE-2018-7754
     - SAUCE: Revert "printk: hash addresses printed with %p"
 .
   * lxd 2.0.11-0ubuntu1~16.04.4 ADT test failure with linux 4.4.0-207.239
     (LP: #1921969)
     - SAUCE: Fix fuse regression in 4.4.0-207.239
 .

Source diff to previous version
1922200 linux ADT test failure with linux/4.4.0-207.239 - ubuntu_qrt_kernel_security.test-kernel-security.py
1921969 lxd 2.0.11-0ubuntu1~16.04.4 ADT test failure with linux 4.4.0-207.239
CVE-2018-5953 The swiotlb_print_info function in lib/swiotlb.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by re
CVE-2018-5995 The pcpu_embed_first_chunk function in mm/percpu.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by
CVE-2018-7754 The aoedisk_debugfs_show function in drivers/block/aoe/aoeblk.c in the Linux kernel through 4.16.4rc4 allows local users to obtain sensitive address

Version: 4.4.0-207.239 2021-03-25 07:08:37 UTC

 linux (4.4.0-207.239) xenial; urgency=medium
 .
   * xenial/linux: 4.4.0-207.239 -proposed tracker (LP: #1919558)
 .
   * Xenial update: v4.4.262 upstream stable release (LP: #1920221)
     - uapi: nfnetlink_cthelper.h: fix userspace compilation error
     - ath9k: fix transmitting to stations in dynamic SMPS mode
     - net: Fix gro aggregation for udp encaps with zero csum
     - can: skb: can_skb_set_owner(): fix ref counting if socket was closed before
       setting skb ownership
     - can: flexcan: assert FRZ bit in flexcan_chip_freeze()
     - can: flexcan: enable RX FIFO after FRZ/HALT valid
     - netfilter: x_tables: gpf inside xt_find_revision()
     - cifs: return proper error code in statfs(2)
     - floppy: fix lock_fdc() signal handling
     - Revert "mm, slub: consider rest of partial list if acquire_slab() fails"
     - futex: Change locking rules
     - futex: Cure exit race
     - futex: fix dead code in attach_to_pi_owner()
     - net/mlx4_en: update moderation when config reset
     - net: lapbether: Remove netif_start_queue / netif_stop_queue
     - net: davicom: Fix regulator not turned off on failed probe
     - net: davicom: Fix regulator not turned off on driver removal
     - media: usbtv: Fix deadlock on suspend
     - mmc: mxs-mmc: Fix a resource leak in an error handling path in
       'mxs_mmc_probe()'
     - mmc: mediatek: fix race condition between msdc_request_timeout and irq
     - powerpc/perf: Record counter overflow always if SAMPLE_IP is unset
     - PCI: xgene-msi: Fix race in installing chained irq handler
     - s390/smp: __smp_rescan_cpus() - move cpumask away from stack
     - scsi: libiscsi: Fix iscsi_prep_scsi_cmd_pdu() error handling
     - ALSA: hda/hdmi: Cancel pending works before suspend
     - ALSA: hda: Avoid spurious unsol event handling during S3/S4
     - ALSA: usb-audio: Fix "cannot get freq eq" errors on Dell AE515 sound bar
     - s390/dasd: fix hanging DASD driver unbind
     - mmc: core: Fix partition switch time for eMMC
     - scripts/recordmcount.{c,pl}: support -ffunction-sections .text.* section
       names
     - Goodix Fingerprint device is not a modem
     - usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio
       slot
     - usb: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM
     - xhci: Improve detection of device initiated wake signal.
     - USB: serial: io_edgeport: fix memory leak in edge_startup
     - USB: serial: ch341: add new Product ID
     - USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter
     - USB: serial: cp210x: add some more GE USB IDs
     - usbip: fix stub_dev to check for stream socket
     - usbip: fix vhci_hcd to check for stream socket
     - usbip: fix stub_dev usbip_sockfd_store() races leading to gpf
     - staging: rtl8192u: fix ->ssid overflow in r8192_wx_set_scan()
     - staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()
     - staging: rtl8712: unterminated string leads to read overflow
     - staging: rtl8188eu: fix potential memory corruption in
       rtw_check_beacon_data()
     - staging: rtl8712: Fix possible buffer overflow in r8712_sitesurvey_cmd
     - staging: rtl8192e: Fix possible buffer overflow in _rtl92e_wx_set_scan
     - staging: comedi: addi_apci_1032: Fix endian problem for COS sample
     - staging: comedi: addi_apci_1500: Fix endian problem for command sample
     - staging: comedi: adv_pci1710: Fix endian problem for AI command data
     - staging: comedi: das6402: Fix endian problem for AI command data
     - staging: comedi: das800: Fix endian problem for AI command data
     - staging: comedi: dmm32at: Fix endian problem for AI command data
     - staging: comedi: me4000: Fix endian problem for AI command data
     - staging: comedi: pcl711: Fix endian problem for AI command data
     - staging: comedi: pcl818: Fix endian problem for AI command data
     - NFSv4.2: fix return value of _nfs4_get_security_label()
     - block: rsxx: fix error return code of rsxx_pci_probe()
     - alpha: add $(src)/ rather than $(obj)/ to make source file path
     - alpha: merge build rules of division routines
     - alpha: make short build log available for division routines
     - alpha: Package string routines together
     - alpha: move exports to actual definitions
     - alpha: get rid of tail-zeroing in __copy_user()
     - alpha: switch __copy_user() and __do_clean_user() to normal calling
       conventions
     - powerpc/64s: Fix instruction encoding for lis in ppc_function_entry()
     - media: hdpvr: Fix an error handling path in hdpvr_probe()
     - KVM: arm64: Fix exclusive limit for IPA size
     - xen/events: reset affinity of 2-level event when tearing it down
     - xen/events: don't unmask an event channel when an eoi is pending
     - xen/events: avoid handling the same event on two cpus at the same time
     - Linux 4.4.262
 .
   * Xenial update: v4.4.261 upstream stable release (LP: #1920218)
     - futex: fix irq self-deadlock and satisfy assertion
     - futex: fix spin_lock() / spin_unlock_irq() imbalance
     - ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits
     - rsxx: Return -EFAULT if copy_to_user() fails
     - dm table: fix iterate_devices based device capability checks
     - platform/x86: acer-wmi: Add new force_caps module parameter
     - PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller
     - Linux 4.4.261
 .
   * CVE-2019-19061
     - iio: imu: adis16400: fix memory leak
 .
   * CVE-2018-5953 // CVE-2018-5995 // CVE-2018-7754
     - printk: hash addresses printed with %p
 .
   * CVE-2017-5967
     - time: Remove CONFIG_TIMER_STATS
     - [Config] Dropped CONFIG_TIMER_STATS
 .
   * CVE-2019-16232
     - libertas: fix a potential NULL pointer dereference
 .
   * CVE-2015-1350
     - xfs: Propagate dentry down to inode_change_ok()
     - fuse: Propagate dentry down to inode_change_ok()
     - fs: Give dentry to inode_change_ok() inste

Source diff to previous version
1920221 Xenial update: v4.4.262 upstream stable release
1920218 Xenial update: v4.4.261 upstream stable release
1772675 i40e PF reset due to incorrect MDD event
1918184 Xenial update: v4.4.260 upstream stable release
1918182 Xenial update: v4.4.259 upstream stable release
1916661 Xenial update: v4.4.258 upstream stable release
1916660 Xenial update: v4.4.257 upstream stable release
1916657 Xenial update: v4.4.256 upstream stable release
1916656 Xenial update: v4.4.255 upstream stable release
CVE-2019-19061 A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cau
CVE-2018-5953 The swiotlb_print_info function in lib/swiotlb.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by re
CVE-2018-5995 The pcpu_embed_first_chunk function in mm/percpu.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by
CVE-2018-7754 The aoedisk_debugfs_show function in drivers/block/aoe/aoeblk.c in the Linux kernel through 4.16.4rc4 allows local users to obtain sensitive address
CVE-2017-5967 The time subsystem in the Linux kernel through 4.9.9, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distingu
CVE-2019-16232 drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer
CVE-2015-1350 The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended pri
CVE-2018-13095 An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occu
CVE-2019-16231 drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.

Version: 4.4.0-206.238 2021-03-16 11:09:05 UTC

 linux (4.4.0-206.238) xenial; urgency=medium
 .
   * xenial/linux: 4.4.0-206.238 -proposed tracker (LP: #1919242)
 .
   * CVE-2021-27365
     - sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output
     - scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
     - scsi: iscsi: Verify lengths on passthrough PDUs
 .
   * CVE-2021-27363 // CVE-2021-27364
     - scsi: iscsi: Restrict sessions and handles to admin capabilities

CVE-2021-27365 An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and c
CVE-2021-27363 An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structu
CVE-2021-27364 An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileg



About   -   Send Feedback to @ubuntu_updates