This bug was fixed in the package linux - 3.13.0-126.175
---------------
linux (3.13.0-126.175) trusty; urgency=low
* linux: 3.13.0-126.175 -proposed tracker (LP: #1704994)
* CVE-2017-1000364
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
- mm/mmap.c: expand_downwards: don't require the gap if !vm_prev
* CVE-2017-7482
- rxrpc: Fix several cases where a padded len isn't checked in ticket decode
* CVE-2017-1000365
- fs/exec.c: account for argv/envp pointers
* CVE-2016-8405
- fbdev: color map copying bounds checking
* CVE-2017-2618
- selinux: fix off-by-one in setprocattr
* update ENA driver to 1.2.0k from net-next (LP: #1701575)
- lib: devres: add a helper function for ioremap_wc
- net: ena: remove superfluous check in ena_remove()
- net: ena: fix rare uncompleted admin command false alarm
- net: ena: add missing return when ena_com_get_io_handlers() fails
- net: ena: fix race condition between submit and completion admin command
- net: ena: add missing unmap bars on device removal
- net: ena: fix theoretical Rx hang on low memory systems
- net: ena: disable admin msix while working in polling mode
- net: ena: bug fix in lost tx packets detection mechanism
- net: ena: update ena driver to version 1.1.7
- net: ena: change return value for unsupported features unsupported return
value
- net: ena: add hardware hints capability to the driver
- net: ena: change sizeof() argument to be the type pointer
- net: ena: add reset reason for each device FLR
- net: ena: add support for out of order rx buffers refill
- net: ena: separate skb allocation to dedicated function
- net: ena: use lower_32_bits()/upper_32_bits() to split dma address
- net: ena: update driver's rx drop statistics
- net: ena: update ena driver to version 1.2.0
-- Kleber Sacilotto de Souza <[email protected]> Thu, 20 Jul
2017 18:13:17 +0200
** Changed in: linux (Ubuntu Trusty)
Status: Confirmed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-8405
** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000364
** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000365
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-2618
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7482
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1704994
Title:
linux: 3.13.0-126.175 -proposed tracker
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1704994/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs