This bug was fixed in the package linux - 3.2.0-67.101
---------------
linux (3.2.0-67.101) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.2.0-67.100) precise; urgency=low
[ Luis Henriques ]
* Merged back Ubuntu-3.2.0-65.99 security release
* Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)"
- LP: #1337339
* Release Tracking Bug
- LP: #1338654
[ Upstream Kernel Changes ]
* ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699
linux (3.2.0-66.99) precise; urgency=low
* Release Tracking Bug
- LP: #1335906
[ Upstream Kernel Changes ]
* skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
* skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
* skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
* lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
* lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
* lzo: properly check for overruns
- CVE-2014-4608
* KVM: x86 emulator: add support for vector alignment
- LP: #1330177
* KVM: x86: emulate movdqa
- LP: #1330177
-- Luis Henriques <[email protected]> Mon, 14 Jul 2014 16:07:35
+0100
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1338654
Title:
linux: 3.2.0-67.101 -proposed tracker
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338654/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs