This bug was fixed in the package linux-ec2 - 2.6.32-369.85
---------------
linux-ec2 (2.6.32-369.85) lucid; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-65.129
* Rebased to Ubuntu-2.6.32-65.131
* Release Tracking Bug
- LP: #1357410
[ Upstream Kernel Changes ]
* xen: x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)
- LP: #1334989
- CVE-2014-4508
* xen: x86_32, entry: Store badsys error code in %eax
- LP: #1334989
- CVE-2014-4508
[ Ubuntu: 2.6.32-65.131 ]
* x86_32, entry: Store badsys error code in %eax
- LP: #1334989
- CVE-2014-4508
[ Ubuntu: 2.6.32-65.129 ]
* fix autofs/afs/etc. magic mountpoint breakage
- CVE-2014-0203
* ALSA: control: Don't access controls outside of protected regions
- LP: #1339297
- CVE-2014-4653
* ALSA: control: Fix replacing user controls
- LP: #1339303, #1339304
- CVE-2014-4655
* ALSA: control: Handle numid overflow
- LP: #1339306
- CVE-2014-4656
* ALSA: control: Make sure that id->index does not overflow
- LP: #1339306
- CVE-2014-4656
* sctp: Fix sk_ack_backlog wrap-around problem
- CVE-2014-4667
* x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)
- LP: #1334989
- CVE-2014-4508
* ALSA: control: Protect user controls against concurrent access
- LP: #1339294
- CVE-2014-4652
* net: sctp: inherit auth_capable on INIT collisions
- LP: #1349804
- CVE-2014-5077
-- Stefan Bader <[email protected]> Fri, 15 Aug 2014 08:55:05 +0200
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0203
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4508
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4652
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4653
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4655
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4656
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4667
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-5077
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1357410
Title:
linux-ec2: 2.6.32-369.85 -proposed tracker
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1357410/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs