This bug was fixed in the package linux - 3.13.0-168.218 --------------- linux (3.13.0-168.218) trusty; urgency=medium
* linux: 3.13.0-168.218 -proposed tracker (LP: #1819663) * CVE-2019-9213 - mm: enforce min addr even if capable() in expand_downwards() * CVE-2019-3460 - Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt * CVE-2017-1000410 - Bluetooth: Prevent stack info leak from the EFS element. * ixgbe: Kernel Oops when attempting to disable spoofchk in a non-existing VF (LP: #1815501) - ixgbe: check for vfs outside of sriov_num_vfs before dereference * CVE-2018-19824 - ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c * CVE-2019-3459 - Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer * CVE-2019-7222 - KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222) * CVE-2019-6974 - kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974) * CVE-2017-18360 - USB: serial: io_ti: fix div-by-zero in set_termios -- Stefan Bader <stefan.ba...@canonical.com> Thu, 14 Mar 2019 14:44:53 +0100 ** Changed in: linux (Ubuntu Trusty) Status: New => Fix Released ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000410 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-18360 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-19824 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-3459 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-3460 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-6974 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7222 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-9213 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1819663 Title: linux: 3.13.0-168.218 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Committed Status in Kernel SRU Workflow promote-to-updates series: Fix Committed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: bug 1819662 (precise/linux-lts-trusty) -- swm properties -- boot-testing-requested: true bugs-spammed: true phase: Release phase-changed: Tuesday, 02. April 2019 10:29 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Ongoing -- packages not yet published promote-to-updates: Ongoing -- packages not yet published To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1819663/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp