This bug was fixed in the package linux - 3.13.0-126.175 --------------- linux (3.13.0-126.175) trusty; urgency=low
* linux: 3.13.0-126.175 -proposed tracker (LP: #1704994) * CVE-2017-1000364 - mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack - mm/mmap.c: expand_downwards: don't require the gap if !vm_prev * CVE-2017-7482 - rxrpc: Fix several cases where a padded len isn't checked in ticket decode * CVE-2017-1000365 - fs/exec.c: account for argv/envp pointers * CVE-2016-8405 - fbdev: color map copying bounds checking * CVE-2017-2618 - selinux: fix off-by-one in setprocattr * update ENA driver to 1.2.0k from net-next (LP: #1701575) - lib: devres: add a helper function for ioremap_wc - net: ena: remove superfluous check in ena_remove() - net: ena: fix rare uncompleted admin command false alarm - net: ena: add missing return when ena_com_get_io_handlers() fails - net: ena: fix race condition between submit and completion admin command - net: ena: add missing unmap bars on device removal - net: ena: fix theoretical Rx hang on low memory systems - net: ena: disable admin msix while working in polling mode - net: ena: bug fix in lost tx packets detection mechanism - net: ena: update ena driver to version 1.1.7 - net: ena: change return value for unsupported features unsupported return value - net: ena: add hardware hints capability to the driver - net: ena: change sizeof() argument to be the type pointer - net: ena: add reset reason for each device FLR - net: ena: add support for out of order rx buffers refill - net: ena: separate skb allocation to dedicated function - net: ena: use lower_32_bits()/upper_32_bits() to split dma address - net: ena: update driver's rx drop statistics - net: ena: update ena driver to version 1.2.0 -- Kleber Sacilotto de Souza <kleber.so...@canonical.com> Thu, 20 Jul 2017 18:13:17 +0200 ** Changed in: linux (Ubuntu Trusty) Status: Confirmed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-8405 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000364 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000365 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-2618 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7482 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1704994 Title: linux: 3.13.0-126.175 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Bug description: This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: 1704995 derivatives: -- swm properties -- boot-testing-requested: true phase: Promoted to security proposed-announcement-sent: true proposed-testing-requested: true To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1704994/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp