This bug was fixed in the package linux - 3.2.0-67.101 --------------- linux (3.2.0-67.101) precise; urgency=low
[ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.2.0-67.100) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.2.0-65.99 security release * Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)" - LP: #1337339 * Release Tracking Bug - LP: #1338654 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux (3.2.0-66.99) precise; urgency=low * Release Tracking Bug - LP: #1335906 [ Upstream Kernel Changes ] * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 * KVM: x86 emulator: add support for vector alignment - LP: #1330177 * KVM: x86: emulate movdqa - LP: #1330177 -- Luis Henriques <luis.henriq...@canonical.com> Mon, 14 Jul 2014 16:07:35 +0100 ** Changed in: linux (Ubuntu Precise) Status: Confirmed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 ** Changed in: linux (Ubuntu Precise) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1338654 Title: linux: 3.2.0-67.101 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: Fix Released Status in “linux” package in Ubuntu: Invalid Status in “linux” source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-67.100 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 07. July 2014 16:11 UTC kernel-stable-Prepare-package-end:Tuesday, 08. July 2014 04:12 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 08. July 2014 04:12 UTC ppa-package-testing-start:Tuesday, 08. July 2014 04:12 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 09. July 2014 22:01 UTC kernel-stable-Verification-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Certification-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Security-signoff-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Regression-testing-start:Wednesday, 09. July 2014 23:01 UTC kernel-stable-Regression-testing-end:Friday, 11. July 2014 22:03 UTC kernel-stable-phase:Testing kernel-stable-phase-changed:Monday, 14. July 2014 13:04 UTC kernel-stable-Verification-testing-end:Monday, 14. July 2014 13:04 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338654/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp