This bug was fixed in the package linux - 3.13.0-123.172 --------------- linux (3.13.0-123.172) trusty; urgency=low
* linux: 3.13.0-123.172 -proposed tracker (LP: #1700558) * CVE-2017-1000364 - Revert "UBUNTU: SAUCE: mm: Only expand stack if guard area is hit" - Revert "mm: do not collapse stack gap into THP" - Revert "mm: enlarge stack guard gap" - mm: vma_adjust: remove superfluous confusing update in remove_next == 1 case - mm: larger stack guard gap, between vmas - mm: fix new crash in unmapped_area_topdown() - Allow stack to grow up to address space limit linux (3.13.0-122.171) trusty; urgency=low * linux: 3.13.0-122.171 -proposed tracker (LP: #1699047) * CVE-2017-1000364 - SAUCE: mm: Only expand stack if guard area is hit * CVE-2014-9940 - regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing * CVE-2017-100363 - char: lp: fix possible integer overflow in lp_setup() * CVE-2017-9242 - ipv6: fix out of bound writes in __ip6_append_data() * CVE-2017-9075 - sctp: do not inherit ipv6_{mc|ac|fl}_list from parent * CVE-2017-9074 - ipv6: Prevent overrun when parsing v6 header options * CVE-2017-9076 - ipv6/dccp: do not inherit ipv6_mc_list from parent * CVE-2017-9077 - ipv6/dccp: do not inherit ipv6_mc_list from parent * CVE-2017-8890 - dccp/tcp: do not inherit mc_list from parent * CVE-2017-0605 - tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline() * CVE-2017-7294 - drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() -- Stefan Bader <stefan.ba...@canonical.com> Wed, 21 Jun 2017 11:39:15 +0200 ** Changed in: linux (Ubuntu Trusty) Status: Confirmed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-9940 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0605 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000364 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-100363 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7294 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8890 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9074 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9075 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9076 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9077 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9242 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1700558 Title: linux: 3.13.0-123.172 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Committed Status in Kernel SRU Workflow promote-to-updates series: Fix Committed Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Invalid Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Bug description: This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: 1700559 derivatives: -- swm properties -- boot-testing-requested: true phase: Promoted to proposed proposed-announcement-sent: true proposed-testing-requested: true To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1700558/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp