This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71
---------------
linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low
[ Luis Henriques ]
* Rebased to 3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
[ Ubuntu: 3.2.0-67.100 ]
* Merged back Ubuntu-3.2.0-65.99 security release
* Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)"
- LP: #1337339
* Release Tracking Bug
- LP: #1338654
* ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699
linux-ti-omap4 (3.2.0-1451.70) precise; urgency=low
* Release Tracking Bug
- LP: #1336143
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-66.99
[ Ubuntu: 3.2.0-66.99 ]
* Release Tracking Bug
- LP: #1335906
* skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
* skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
* skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
* lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
* lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
* lzo: properly check for overruns
- CVE-2014-4608
* KVM: x86 emulator: add support for vector alignment
- LP: #1330177
* KVM: x86: emulate movdqa
- LP: #1330177
-- Luis Henriques <[email protected]> Tue, 15 Jul 2014 10:12:30
+0100
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1337339/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs