This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---------------
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low
[ Luis Henriques ]
* Merged back Ubuntu-lts-3.5.0-52.79 security release
* Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)"
- LP: #1337339
* Release Tracking Bug
- LP: #1338611
[ Upstream Kernel Changes ]
* ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699
linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1336400
[ Upstream Kernel Changes ]
* skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
* skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
* skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
* media-device: fix infoleak in ioctl media_enum_entities()
- LP: #1333609
- CVE-2014-1739
* auditsc: audit_krule mask accesses need bounds checking
- LP: #1325941
- CVE-2014-3917
* userns: Allow chown and setgid preservation
- LP: #1329103
- CVE-2014-4014
* fs,userns: Change inode_capable to capable_wrt_inode_uidgid
- LP: #1329103
- CVE-2014-4014
* target/rd: Refactor rd_build_device_space + rd_release_device_space
- LP: #1333612
- CVE-2014-4027
* lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
* lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
* lzo: properly check for overruns
- CVE-2014-4608
-- Luis Henriques <[email protected]> Mon, 14 Jul 2014 15:28:36
+0100
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Confirmed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0131
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1739
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3917
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4014
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4027
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4608
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4699
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4943
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1338611
Title:
linux-lts-quantal: 3.5.0-54.81~precise1 -proposed tracker
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1338611/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs