*** This bug is a duplicate of bug 1776819 ***
https://bugs.launchpad.net/bugs/1776819
This bug was fixed in the package linux - 3.13.0-153.203
---------------
linux (3.13.0-153.203) trusty; urgency=medium
* linux: 3.13.0-153.203 -proposed tracker (LP: #1776819)
* CVE-2018-3665 (x86)
- x86/fpu: Print out whether we are doing lazy/eager FPU context switches
- x86/fpu: Default eagerfpu=on on all CPUs
- x86/fpu: Fix math emulation in eager fpu mode
linux (3.13.0-152.202) trusty; urgency=medium
* linux: 3.13.0-152.202 -proposed tracker (LP: #1776350)
* CVE-2017-15265
- ALSA: seq: Fix use-after-free at creating a port
* register on binfmt_misc may overflow and crash the system (LP: #1775856)
- fs/binfmt_misc.c: do not allow offset overflow
* CVE-2018-1130
- dccp: check sk for closed state in dccp_sendmsg()
- ipv6: dccp: add missing bind_conflict to dccp_ipv6_mapped
* add_key04 in LTP syscall test cause kernel oops (NULL pointer dereference)
with T kernel (LP: #1775316) // CVE-2017-12193
- assoc_array: Fix a buggy node-splitting case
* CVE-2017-12154
- kvm: nVMX: Don't allow L2 to access the hardware CR8
* CVE-2018-7757
- scsi: libsas: fix memory leak in sas_smp_get_phy_events()
* CVE-2018-6927
- futex: Prevent overflow by strengthen input validation
* FS-Cache: Assertion failed: FS-Cache: 6 == 5 is false (LP: #1774336)
- SAUCE: CacheFiles: fix a read_waiter/read_copier race
* CVE-2018-5803
- sctp: verify size of a new chunk in _sctp_make_chunk()
* WARNING: CPU: 28 PID: 34085 at /build/linux-
90Gc2C/linux-3.13.0/net/core/dev.c:1433 dev_disable_lro+0x87/0x90()
(LP: #1771480)
- net/core: generic support for disabling netdev features down stack
- SAUCE: Backport helper function netdev_upper_get_next_dev_rcu
* CVE-2018-7755
- SAUCE: floppy: Do not copy a kernel pointer to user memory in FDGETPRM
ioctl
* CVE-2018-5750
- ACPI: sbshc: remove raw pointer from printk() message
-- Stefan Bader <[email protected]> Thu, 14 Jun 2018 07:00:42
+0200
** Changed in: linux (Ubuntu Trusty)
Status: Confirmed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12154
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12193
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15265
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-1130
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3665
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5750
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5803
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6927
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7755
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7757
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1776350
Title:
linux: 3.13.0-152.202 -proposed tracker
Status in Kernel SRU Workflow:
In Progress
Status in Kernel SRU Workflow automated-testing series:
New
Status in Kernel SRU Workflow certification-testing series:
New
Status in Kernel SRU Workflow prepare-package series:
Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
New
Status in Kernel SRU Workflow promote-to-security series:
New
Status in Kernel SRU Workflow promote-to-updates series:
New
Status in Kernel SRU Workflow regression-testing series:
New
Status in Kernel SRU Workflow security-signoff series:
New
Status in Kernel SRU Workflow upload-to-ppa series:
Invalid
Status in Kernel SRU Workflow verification-testing series:
New
Status in linux package in Ubuntu:
Invalid
Status in linux source package in Trusty:
Fix Released
Bug description:
This bug is for tracking the <version to be filled> upload package.
This bug will contain status and testing results related to that
upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1776351 (linux-lts-trusty)
derivatives:
kernel-stable-phase:Uploaded
kernel-stable-phase-changed:Tuesday, 12. June 2018 11:02 UTC
-- swm properties --
phase: Uploaded
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1776350/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp