** Also affects: linux (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-ec2
** No longer affects: linux (Ubuntu Utopic)
** Changed in: linux-raspi2 (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Vivid)
Importance: Undecided => High
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided => High
--
You received this bug
** Also affects: linux (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-ec2
** No longer affects: linux (Ubuntu Saucy)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
To manage notifications about
** Changed in: linux (Ubuntu Utopic)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
To manage
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53
---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71
---
linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low
[ Luis Henriques ]
* Rebased to 3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
-
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71
---
linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low
[ Luis Henriques ]
* Rebased to 3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
-
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
To manage
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
To manage
** Description changed:
- Don't allow ptrace to set RIP to a value that couldn't happen by
- ordinary control flow. There are CPU bugs^Wfeatures that can have
- interesting effects if RIP is non-canonical. I didn't make the
- corresponding x86_32 change, since x86_32 has no concept of canonical
-
** Information type changed from Private Security to Public Security
** No longer affects: linux-armadaxp (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
x86_64,ptrace:
** No longer affects: linux-armadaxp (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
To manage notifications about
** Tags added: kernel-cve-tracking-bug
** No longer affects: linux-armadaxp (Ubuntu)
** No longer affects: linux-ec2 (Ubuntu)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-lowlatency (Ubuntu Precise)
** No longer affects: linux-lowlatency (Ubuntu Saucy)
** No
This bug was fixed in the package linux - 3.11.0-24.42
---
linux (3.11.0-24.42) saucy; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis Henriques luis.henriq...@canonical.com
This bug was fixed in the package linux - 2.6.32-62.126
---
linux (2.6.32-62.126) lucid; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis Henriques luis.henriq...@canonical.com
** Changed in: linux (Ubuntu Precise)
Status: Fix Released = New
** Changed in: linux (Ubuntu Saucy)
Status: Fix Released = New
** Changed in: linux (Ubuntu Trusty)
Status: Fix Released = New
** Changed in: linux (Ubuntu Lucid)
Status: Fix Released = New
--
You
This bug was fixed in the package linux-lts-quantal -
3.5.0-52.79~precise1
---
linux-lts-quantal (3.5.0-52.79~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis
This bug was fixed in the package linux-lts-raring -
3.8.0-42.63~precise1
---
linux-lts-raring (3.8.0-42.63~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis
This bug was fixed in the package linux - 3.11.0-24.42
---
linux (3.11.0-24.42) saucy; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis Henriques luis.henriq...@canonical.com
This bug was fixed in the package linux-lts-saucy -
3.11.0-24.42~precise1
---
linux-lts-saucy (3.11.0-24.42~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis
This bug was fixed in the package linux - 3.2.0-65.99
---
linux (3.2.0-65.99) precise; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis Henriques luis.henriq...@canonical.com
This bug was fixed in the package linux - 3.13.0-30.55
---
linux (3.13.0-30.55) trusty; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis Henriques luis.henriq...@canonical.com
This bug was fixed in the package linux-ec2 - 2.6.32-366.81
---
linux-ec2 (2.6.32-366.81) lucid; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-2.6.32-62.126
[ Ubuntu: 2.6.32-62.126 ]
* x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
-
This bug was fixed in the package linux - 2.6.32-62.126
---
linux (2.6.32-62.126) lucid; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis Henriques luis.henriq...@canonical.com
This bug was fixed in the package linux-lts-saucy -
3.11.0-24.42~precise1
---
linux-lts-saucy (3.11.0-24.42~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis
This bug was fixed in the package linux - 3.2.0-65.99
---
linux (3.2.0-65.99) precise; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis Henriques luis.henriq...@canonical.com
** Changed in: linux (Ubuntu Lucid)
Status: New = Fix Released
** Changed in: linux (Ubuntu Saucy)
Status: New = Fix Released
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
To manage
29 matches
Mail list logo