Change log for linux-hammerhead package in Ubuntu
1 → 5 of 5 results | First • Previous • Next • Last |
Deleted in zesty-release (Reason: Unmaintained; no longer required) |
Obsolete in yakkety-release |
Published in xenial-release |
Deleted in xenial-proposed (Reason: moved to release) |
linux-hammerhead (3.4.0-1.12) xenial; urgency=low [ Andy Whitcroft ] * SAUCE: timeconst.pl -- fix use of defined on arrays - LP: #1549677
Available diffs
- diff from 3.4.0-1.9 to 3.4.0-1.12 (85.4 KiB)
- diff from 3.4.0-1.11 to 3.4.0-1.12 (83.9 KiB)
Superseded in xenial-proposed |
linux-hammerhead (3.4.0-1.11) xenial; urgency=low [ Andy Whitcroft ] * [Config] depend on kmod in preference to module-init-tools -- part 2 - LP: #1541917 -- Andy Whitcroft <email address hidden> Wed, 24 Feb 2016 18:41:29 +0000
Available diffs
- diff from 3.4.0-1.10 to 3.4.0-1.11 (84.4 KiB)
Superseded in xenial-proposed |
linux-hammerhead (3.4.0-1.10) xenial; urgency=low [ Andy Whitcroft ] * [Config] depend on kmod in preference to module-init-tools - LP: #1541917 -- Andy Whitcroft <email address hidden> Wed, 24 Feb 2016 18:09:45 +0000
Available diffs
- diff from 3.4.0-1.9 to 3.4.0-1.10 (84.6 KiB)
Superseded in xenial-release |
Obsolete in wily-release |
Obsolete in vivid-release |
Obsolete in utopic-release |
Deleted in utopic-proposed (Reason: moved to release) |
linux-hammerhead (3.4.0-1.9) utopic; urgency=low [ Upstream Kernel Changes ] * epoll: Add a flag, EPOLLWAKEUP, to prevent suspend while epoll events are ready * epoll: Fix user space breakage related to EPOLLWAKEUP -- Ricardo Salveti de Araujo <email address hidden> Sun, 20 Jul 2014 04:30:38 -0300
Available diffs
- diff from 3.4.0-1.8 to 3.4.0-1.9 (85.9 KiB)
linux-hammerhead (3.4.0-1.8) utopic; urgency=low [ Javier Martinez Canillas ] * SAUCE: (no-up) apparmor: fix bug that constantly spam the console - LP: #1323526 [ John Johansen ] * Revert "SAUCE: apparmor: fix bad lock balance when introspecting policy" * Revert "SAUCE: apparmor: fix memleak of replacedby struct" * Revert "SAUCE: apparmor: fix memleak of the profile hash" * Revert "SAUCE: apparmor: allocate path lookup buffers during init" * Revert "SAUCE: apparmor: fix unix domain sockets to be mediated on connection" * Revert "SAUCE: (no-up) apparmor: Sync to apparmor 3 - alpha 4 snapshot" * SAUCE: (no-up) apparmor: Sync to apparmor 3 - alpha 6 snapshot * SAUCE: (no-ip) apparmor: update configs for apparmor 3 alpha 6 * SAUCE: (no-up) apparmor: fix apparmor spams log with warning message - LP: #1308761 * SAUCE: (no-up) apparmor: fix refcount bug in apparmor pivotroot - LP: #1308765 * SAUCE: (no-up) apparmor: fix apparmor refcount bug in apparmor_kill - LP: #1308764 * SAUCE: (no-up) apparmor: use custom write_is_locked macro - LP: #1323530 * SAUCE: (no-up) apparmor fix: remove unused cxt var for unix_sendmsg * SAUCE: (no-up) apparmor: fix disconnected bind mnts reconnection - LP: #1319984 [ Tyler Hicks ] * [Config] CONFIG_ECRYPT_FS=y * [Config] Sync LSM config options * [Config] Sync crypto config options * [Config] Sync IPsec config options [ Upstream Kernel Changes ] * Revert "kernel/sys.c: fix stack memory content leak via UNAME26" * Revert "ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL" * Revert "ptrace: introduce signal_wake_up_state() and ptrace_signal_wake_up()" * Revert "perf: Treat attr.config as u64 in perf_swevent_init()" * Revert "ARM: 7809/1: perf: fix event validation for software group leaders" - CVE-2013-4254 * kernel/sys.c: fix stack memory content leak via UNAME26 - CVE-2012-0957 * use clamp_t in UNAME26 fix - CVE-2012-0957 * ptrace: introduce signal_wake_up_state() and ptrace_signal_wake_up() - CVE-2013-0871 * ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL - CVE-2013-0871 * wake_up_process() should be never used to wakeup a TASK_STOPPED/TRACED task - CVE-2013-0871 * net: fix incorrect credentials passing - CVE-2013-1979 * perf: Treat attr.config as u64 in perf_swevent_init() - CVE-2013-2094 * iscsi-target: fix heap buffer overflow on error - CVE-2013-2850 * ARM: 7809/1: perf: fix event validation for software group leaders - CVE-2013-4254 * n_tty: Fix n_tty_write crash when echoing in raw mode - CVE-2014-0196 * floppy: ignore kernel-only members in FDRAWCMD ioctl input - CVE-2014-1737 * floppy: don't write kernel-only members to FDRAWCMD ioctl output - CVE-2014-1738 * futex: Test for pi_mutex on fault in futex_wait_requeue_pi() - CVE-2014-3153 * futex: Fix bug in WARN_ON for NULL q.pi_state - CVE-2014-3153 * futex: Forbid uaddr == uaddr2 in futex_wait_requeue_pi() - CVE-2014-3153 * futex: Handle futex_pi OWNER_DIED take over correctly - CVE-2014-3153 * futex: avoid wake_futex() for a PI futex_q - CVE-2014-3153 * futex: Revert "futex: Mark get_robust_list as deprecated" - CVE-2014-3153 * futex: fix handling of read-only-mapped hugepages - CVE-2014-3153 * futex: Add another early deadlock detection check - CVE-2014-3153 * futex: Prevent attaching to kernel threads - CVE-2014-3153 * futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr == uaddr2 in futex_requeue(..., requeue_pi=1) - CVE-2014-3153 * futex: Validate atomic acquisition in futex_lock_pi_atomic() - CVE-2014-3153 * futex: Always cleanup owner tid in unlock_pi - CVE-2014-3153 * futex: Make lookup_pi_state more robust - CVE-2014-3153 -- Ricardo Salveti de Araujo <email address hidden> Fri, 11 Jul 2014 17:01:29 -0300
1 → 5 of 5 results | First • Previous • Next • Last |