This bug was fixed in the package linux-ec2 - 2.6.32-377.94
---------------
linux-ec2 (2.6.32-377.94) lucid; urgency=low
[ Stefan Bader ]
* Release Tracking Bug
- LP: #1449524
* Rebase to Ubuntu-2.6.32-74.142
[ Ubuntu: 2.6.32-74.142 ]
* fs: take i_mutex during prepare_binprm for set[ug]id executables
- LP: #1447373
- CVE-2015-3339
[ Ubuntu: 2.6.32-73.141 ]
* IB/core: Prevent integer overflow in ib_umem_get address arithmetic
- LP: #1413741
- CVE-2015-8159
-- Stefan Bader <[email protected]> Tue, 28 Apr 2015 11:59:29
+0200
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-3339
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8159
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1413741
Title:
CVE-2014-8159
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1413741/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs