* CVE-2017-1000364
- Revert "UBUNTU: SAUCE: mm: Only expand stack if guard area is hit"
- Revert "mm: do not collapse stack gap into THP"
- Revert "mm: enlarge stack guard gap"
- mm: vma_adjust: remove superfluous confusing update in remove_next == 1 case
- mm: larger stack guard gap, between vmas
- mm: fix new crash in unmapped_area_topdown()
- Allow stack to grow up to address space limit
This bug was fixed in the package linux - 3.13.0-123.172
---------------
linux (3.13.0-123.172) trusty; urgency=low
* linux: 3.13.0-123.172 -proposed tracker (LP: #1700558)
* CVE-2017-1000364 area_topdown( )
- Revert "UBUNTU: SAUCE: mm: Only expand stack if guard area is hit"
- Revert "mm: do not collapse stack gap into THP"
- Revert "mm: enlarge stack guard gap"
- mm: vma_adjust: remove superfluous confusing update in remove_next == 1 case
- mm: larger stack guard gap, between vmas
- mm: fix new crash in unmapped_
- Allow stack to grow up to address space limit
linux (3.13.0-122.171) trusty; urgency=low
* linux: 3.13.0-122.171 -proposed tracker (LP: #1699047)
* CVE-2017-1000364
- SAUCE: mm: Only expand stack if guard area is hit
* CVE-2014-9940 ena_gpio_ free not to access pin after freeing
- regulator: core: Fix regualtor_
* CVE-2017-100363
- char: lp: fix possible integer overflow in lp_setup()
* CVE-2017-9242
- ipv6: fix out of bound writes in __ip6_append_data()
* CVE-2017-9075 ac|fl}_ list from parent
- sctp: do not inherit ipv6_{mc|
* CVE-2017-9074
- ipv6: Prevent overrun when parsing v6 header options
* CVE-2017-9076
- ipv6/dccp: do not inherit ipv6_mc_list from parent
* CVE-2017-9077
- ipv6/dccp: do not inherit ipv6_mc_list from parent
* CVE-2017-8890
- dccp/tcp: do not inherit mc_list from parent
* CVE-2017-0605 find_cmdline( )
- tracing: Use strlcpy() instead of strcpy() in __trace_
* CVE-2017-7294 define_ ioctl()
- drm/vmwgfx: fix integer overflow in vmw_surface_
-- Stefan Bader <email address hidden> Wed, 21 Jun 2017 11:39:15 +0200