This bug was fixed in the package linux-ec2 - 2.6.32-362.75
---------------
linux-ec2 (2.6.32-362.75) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-57.119
* Release Tracking Bug
- LP: #1281942
[ Ubuntu: 2.6.32-57.119 ]
* ubuntu: AUFS: fsnotify_open() now receives a file
- LP: #1097680
- CVE-2013-0160
* KVM: Improve create VCPU parameter (CVE-2013-4587)
- LP: #1261564
- CVE-2013-4587
* KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367)
- LP: #1261566
- CVE-2013-6367
* xfs: underflow bug in xfs_attrlist_by_handle()
- LP: #1256091
- CVE-2013-6382
* aacraid: prevent invalid pointer dereference
- LP: #1256083
- CVE-2013-6380
* wireless: radiotap: fix parsing buffer overrun
- LP: #1260622
- CVE-2013-7027
* net: rework recvmsg handler msg_name and msg_namelen logic
- LP: #1267081
- CVE-2013-7266
* net: rose: restore old recvmsg behavior
- LP: #1267081
- CVE-2013-7266
* fsnotify: pass a file instead of an inode to open, read, and write
- LP: #1097680
- CVE-2013-0160
* vfs: introduce FMODE_NONOTIFY
- LP: #1097680
- CVE-2013-0160
* fanotify: FMODE_NONOTIFY and __O_SYNC in sparc conflict
- LP: #1097680
- CVE-2013-0160
* TTY: do not update atime/mtime on read/write
- LP: #1097680
- CVE-2013-0160
* TTY: fix atime/mtime regression
- LP: #1097680
- CVE-2013-0160
* tty: fix up atime/mtime mess, take three
- LP: #1097680
- CVE-2013-0160
* farsync: fix info leak in ioctl
- LP: #1271442
- CVE-2014-1444
* wanxl: fix info leak in ioctl
- LP: #1271444
- CVE-2014-1445
* hamradio/yam: fix info leak in ioctl
- LP: #1271445
- CVE-2014-1446
* SELinux: Fix kernel BUG on empty security contexts.
- CVE-2014-1874
* exec/ptrace: fix get_dumpable() incorrect tests
- LP: #1260610
- CVE-2013-2929
-- Stefan Bader <[email protected]> Wed, 19 Feb 2014 16:51:53 +0100
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0160
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2929
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-4587
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-6367
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-6382
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-7027
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-7266
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1444
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1445
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1446
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1874
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1256083
Title:
CVE-2013-6380
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1256083/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs