This bug was fixed in the package linux - 3.13.0-129.178
---------------
linux (3.13.0-129.178) trusty; urgency=low
* linux: 3.13.0-129.178 -proposed tracker (LP: #1709292)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentation
* CVE-2017-1000111
- Revert "net-packet: fix race in packet_set_ring on PACKET_RESERVE"
- packet: fix tp_reserve race in packet_set_ring
* Adt tests of src:linux time out often on armhf lxc containers (LP: #1705495)
- [Packaging] tests -- reduce rebuild test to one flavour
* CVE-2016-7914
- assoc_array: don't call compare_object() on a node
* CVE-2017-7616
- mm/mempolicy.c: fix error handling in set_mempolicy and mbind.
* CVE-2017-7261
- drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()
* CVE-2017-7273
- HID: hid-cypress: validate length of report
* CVE-2017-7487
- ipx: call ipxitf_put() in ioctl error path
* CVE-2017-7495
- ext4: fix data exposure after a crash
-- Stefan Bader <[email protected]> Fri, 11 Aug 2017 14:01:56
+0200
** Changed in: linux (Ubuntu Trusty)
Status: Confirmed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-7914
** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000111
** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000112
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7261
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7273
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7487
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7495
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7616
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1709292
Title:
linux: 3.13.0-129.178 -proposed tracker
Status in Kernel SRU Workflow:
In Progress
Status in Kernel SRU Workflow automated-testing series:
Fix Released
Status in Kernel SRU Workflow certification-testing series:
Fix Released
Status in Kernel SRU Workflow prepare-package series:
Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
Fix Released
Status in Kernel SRU Workflow promote-to-security series:
Fix Committed
Status in Kernel SRU Workflow promote-to-updates series:
Fix Committed
Status in Kernel SRU Workflow regression-testing series:
Fix Released
Status in Kernel SRU Workflow security-signoff series:
Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
Invalid
Status in Kernel SRU Workflow verification-testing series:
Fix Released
Status in linux package in Ubuntu:
Invalid
Status in linux source package in Trusty:
Fix Released
Bug description:
This bug is for tracking the <version to be filled> upload package.
This bug will contain status and testing results related to that
upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: 1709293
derivatives:
-- swm properties --
boot-testing-requested: true
phase: Promoted to proposed
proposed-announcement-sent: true
proposed-testing-requested: true
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1709292/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp