This bug was fixed in the package linux - 3.13.0-168.218

---------------
linux (3.13.0-168.218) trusty; urgency=medium

  * linux: 3.13.0-168.218 -proposed tracker (LP: #1819663)

  * CVE-2019-9213
    - mm: enforce min addr even if capable() in expand_downwards()

  * CVE-2019-3460
    - Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt

  * CVE-2017-1000410
    - Bluetooth: Prevent stack info leak from the EFS element.

  * ixgbe: Kernel Oops when attempting to disable spoofchk in a non-existing VF
    (LP: #1815501)
    - ixgbe: check for vfs outside of sriov_num_vfs before dereference

  * CVE-2018-19824
    - ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in 
card.c

  * CVE-2019-3459
    - Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer

  * CVE-2019-7222
    - KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)

  * CVE-2019-6974
    - kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)

  * CVE-2017-18360
    - USB: serial: io_ti: fix div-by-zero in set_termios

 -- Stefan Bader <stefan.ba...@canonical.com>  Thu, 14 Mar 2019 14:44:53
+0100

** Changed in: linux (Ubuntu Trusty)
       Status: New => Fix Released

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000410

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-18360

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-19824

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-3459

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-3460

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-6974

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7222

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-9213

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1819663

Title:
  linux: 3.13.0-168.218 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Committed
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Committed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
    https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  backports: bug 1819662 (precise/linux-lts-trusty)

  -- swm properties --
  boot-testing-requested: true
  bugs-spammed: true
  phase: Release
  phase-changed: Tuesday, 02. April 2019 10:29 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
    promote-to-security: Ongoing -- packages not yet published
    promote-to-updates: Ongoing -- packages not yet published

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1819663/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to