*** This bug is a duplicate of bug 1386864 ***
    https://bugs.launchpad.net/bugs/1386864

This bug was fixed in the package linux-keystone - 3.13.0-17.27

---------------
linux-keystone (3.13.0-17.27) trusty; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
    - LP: #1386864
  * Rebase to Ubuntu-3.13.0-39.66

  [ Upstream Kernel Changes ]

  * rapidio: keystone: fix lock-up condition with DIO and packet forwarding
    - LP: #1387056
  * rapidio: Remove duplicate entry from Makefile
    - LP: #1387056
  * rapidio: keystone: move SerDes functions in a separate file and rework
    port init sequence
    - LP: #1387056

  [ Ubuntu: 3.13.0-39.66 ]

  * Release Tracking Bug
    - LP: #1386629
  * KVM: x86: Check non-canonical addresses upon WRMSR
    - LP: #1384539
    - CVE-2014-3610
  * KVM: x86: Prevent host from panicking on shared MSR writes.
    - LP: #1384539
    - CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
    - LP: #1384540
    - CVE-2014-3611
  * KVM: x86: Fix wrong masking on relative jump/call
    - LP: #1384545
    - CVE-2014-3647
  * KVM: x86: Warn if guest virtual address space is not 48-bits
    - LP: #1384545
    - CVE-2014-3647
  * KVM: x86: Emulator fixes for eip canonical checks on near branches
    - LP: #1384545
    - CVE-2014-3647
  * KVM: x86: emulating descriptor load misses long-mode case
    - LP: #1384545
    - CVE-2014-3647
  * KVM: x86: Handle errors when RIP is set during far jumps
    - LP: #1384545
    - CVE-2014-3647
  * kvm: vmx: handle invvpid vm exit gracefully
    - LP: #1384544
    - CVE-2014-3646
  * Input: synaptics - gate forcepad support by DMI check
    - LP: #1381815
 -- Ike Panhc <ike....@canonical.com>   Wed, 29 Oct 2014 14:48:28 +0800

** Changed in: linux-keystone (Ubuntu Trusty)
       Status: In Progress => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3610

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3611

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3646

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3647

** Changed in: linux-keystone (Ubuntu Trusty)
       Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379457

Title:
  linux-keystone: 3.13.0-16.26 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1379457/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to