This bug was fixed in the package linux - 3.13.0-168.218
---------------
linux (3.13.0-168.218) trusty; urgency=medium
* linux: 3.13.0-168.218 -proposed tracker (LP: #1819663)
* CVE-2019-9213
- mm: enforce min addr even if capable() in expand_downwards()
* CVE-2019-3460
- Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt
* CVE-2017-1000410
- Bluetooth: Prevent stack info leak from the EFS element.
* ixgbe: Kernel Oops when attempting to disable spoofchk in a non-existing VF
(LP: #1815501)
- ixgbe: check for vfs outside of sriov_num_vfs before dereference
* CVE-2018-19824
- ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in
card.c
* CVE-2019-3459
- Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer
* CVE-2019-7222
- KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)
* CVE-2019-6974
- kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)
* CVE-2017-18360
- USB: serial: io_ti: fix div-by-zero in set_termios
-- Stefan Bader <[email protected]> Thu, 14 Mar 2019 14:44:53
+0100
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Released
** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000410
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-18360
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-19824
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-3459
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-3460
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-6974
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7222
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-9213
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1819663
Title:
linux: 3.13.0-168.218 -proposed tracker
Status in Kernel SRU Workflow:
In Progress
Status in Kernel SRU Workflow automated-testing series:
Fix Released
Status in Kernel SRU Workflow certification-testing series:
Fix Released
Status in Kernel SRU Workflow prepare-package series:
Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
Fix Released
Status in Kernel SRU Workflow promote-to-security series:
Fix Committed
Status in Kernel SRU Workflow promote-to-updates series:
Fix Committed
Status in Kernel SRU Workflow regression-testing series:
Fix Released
Status in Kernel SRU Workflow security-signoff series:
Fix Released
Status in Kernel SRU Workflow verification-testing series:
Fix Released
Status in linux package in Ubuntu:
Invalid
Status in linux source package in Trusty:
Fix Released
Bug description:
This bug will contain status and test results related to a kernel
source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1819662 (precise/linux-lts-trusty)
-- swm properties --
boot-testing-requested: true
bugs-spammed: true
phase: Release
phase-changed: Tuesday, 02. April 2019 10:29 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
promote-to-security: Ongoing -- packages not yet published
promote-to-updates: Ongoing -- packages not yet published
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1819663/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp