This bug was fixed in the package linux - 3.13.0-142.191

---------------
linux (3.13.0-142.191) trusty; urgency=medium

  * linux: 3.13.0-142.191 -proposed tracker (LP: #1746900)

  * CVE-2017-17806
    - crypto: hmac - require that the underlying hash algorithm is unkeyed

  * CVE-2017-18017
    - netfilter: xt_TCPMSS: add more sanity tests on tcph->doff

  * CVE-2017-17450
    - netfilter: xt_osf: Add missing permission checks

  * CVE-2018-5344
    - loop: fix concurrent lo_open/lo_release

  * CVE-2017-5715 (Spectre v2 embargoed) // CVE-2017-5753 (Spectre v1 embargoed)
    - x86/asm/msr: Make wrmsrl_safe() a function

  * CVE-2017-1000407
    - KVM: VMX: remove I/O port 0x80 bypass on Intel hosts

  * CVE-2017-0861
    - ALSA: pcm: prevent UAF in snd_pcm_info

  * CVE-2017-14051
    - scsi: qla2xxx: Fix an integer overflow in sysfs code

  * CVE-2017-15868
    - Bluetooth: bnep: bnep_add_connection() should verify that it's dealing 
with
      l2cap socket

  * CVE-2018-5333
    - RDS: null pointer dereference in rds_atomic_free_op

  * powerpc: flush L1D on return to use (LP: #1742772) // CVE-2017-5754
    (Meltdown)
    - SAUCE: powerpc: Prevent Meltdown attack with L1-D$ flush
    - SAUCE: powerpc: Remove dead code in sycall entry
    - SAUCE: rfi-flush: Add barriers to the fallback L1D flushing
    - SAUCE: rfi-flush: Fallback flush add load dependency
    - SAUCE: rfi-flush: Fix the 32-bit KVM build
    - SAUCE: rfi-flush: Fix some RFI conversions in the KVM code
    - SAUCE: rfi-flush: Make the fallback robust against memory corruption
    - SAUCE: powerpc/kernel: Does not use sync
    - SAUCE: rfi-flush: Factor out init_fallback_flush()
    - SAUCE: rfi-flush: Make setup_rfi_flush() not __init
    - SAUCE: rfi-flush: Move the logic to avoid a redo into the sysfs code
    - SAUCE: rfi-flush: Make it possible to call setup_rfi_flush() again
    - SAUCE: rfi-flush: Call setup_rfi_flush() after LPM migration
    - SAUCE: rfi-flush: Fix fallback on distros using bootmem
    - SAUCE: rfi-flush: fix package build error (unused variable limit)
    - SAUCE: rfi-flush: Fix kernel package build using bootmem
    - SAUCE: rfi-flush: Move rfi_flush_fallback_area to end of paca
    - SAUCE: rfi-flush: Fix rename of pseries_setup_rfi_flush()
    - SAUCE: rfi-flush: Mark DEBUG_RFI as BROKEN
    - SAUCE: rfi-flush: Switch to new linear fallback flush
    - SAUCE: powerpc/kernel: Remove unused variable
    - SAUCE: powerpc/kernel: Fix typo on variable
    - SAUCE: powerpc/kernel: Fix instructions usage
    - SAUCE: powerpc/kernel: Define PACA_L1D_FLUSH_SIZE
    - SAUCE: rfi-flush: Fix for kernel crash.

  * upload urgency should be medium by default (LP: #1745338)
    - [Packaging] update urgency to medium by default

  * CVE-2017-12190
    - fix unbalanced page refcounting in bio_map_user_iov
    - more bio_map_user_iov() leak fixes

  * CVE-2017-15274
    - KEYS: fix dereferencing NULL payload with nonzero length

  * CVE-2017-14140
    - Sanitize 'move_pages()' permission checks

  * CVE-2017-15115
    - sctp: do not peel off an assoc from one netns to another one

  * CVE-2017-14489
    - scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse
      nlmsg properly

  * CVE-2017-12153
    - nl80211: check for the required netlink attributes presence

  * CVE-2017-16525
    - USB: serial: console: fix use-after-free after failed setup
    - USB: serial: console: fix use-after-free on disconnect

  * CVE-2017-7542
    - ipv6: avoid overflow of offset in ip6_find_1stfragopt
    - ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt()

  * CVE-2017-15102
    - usb: misc: legousbtower: Fix NULL pointer deference

  * CVE-2017-12192
    - KEYS: prevent KEYCTL_READ on negative key

  * CVE-2017-14156
    - video: fbdev: aty: do not leak uninitialized padding in clk to userspace

  * CVE-2017-5669
    - ipc/shm: Fix shmat mmap nil-page protection

  * CVE-2017-0750
    - f2fs: do more integrity verification for superblock

  * CVE-2017-7889
    - mm: Tighten x86 /dev/mem with zeroing reads

  * CVE-2017-8824
    - dccp: CVE-2017-8824: use-after-free in DCCP code

 -- Stefan Bader <stefan.ba...@canonical.com>  Fri, 02 Feb 2018 13:01:39
+0100

** Changed in: linux (Ubuntu Trusty)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0750

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0861

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000407

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12153

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12192

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14051

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14140

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14156

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14489

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15102

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15274

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15868

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-16525

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17450

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17806

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-18017

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5669

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7542

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7889

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5333

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5344

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1745338

Title:
  upload urgency should be medium by default

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1745338/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to