This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71 --------------- linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low
[ Luis Henriques ] * Rebased to 3.2.0-67.101 [ Ubuntu: 3.2.0-67.101 ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 [ Ubuntu: 3.2.0-67.100 ] * Merged back Ubuntu-3.2.0-65.99 security release * Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)" - LP: #1337339 * Release Tracking Bug - LP: #1338654 * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-ti-omap4 (3.2.0-1451.70) precise; urgency=low * Release Tracking Bug - LP: #1336143 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-66.99 [ Ubuntu: 3.2.0-66.99 ] * Release Tracking Bug - LP: #1335906 * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 * KVM: x86 emulator: add support for vector alignment - LP: #1330177 * KVM: x86: emulate movdqa - LP: #1330177 -- Luis Henriques <luis.henriq...@canonical.com> Tue, 15 Jul 2014 10:12:30 +0100 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1337339 Title: x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1337339/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs