This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71 --------------- linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low
[ Luis Henriques ] * Rebased to 3.2.0-67.101 [ Ubuntu: 3.2.0-67.101 ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 [ Ubuntu: 3.2.0-67.100 ] * Merged back Ubuntu-3.2.0-65.99 security release * Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)" - LP: #1337339 * Release Tracking Bug - LP: #1338654 * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-ti-omap4 (3.2.0-1451.70) precise; urgency=low * Release Tracking Bug - LP: #1336143 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-66.99 [ Ubuntu: 3.2.0-66.99 ] * Release Tracking Bug - LP: #1335906 * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 * KVM: x86 emulator: add support for vector alignment - LP: #1330177 * KVM: x86: emulate movdqa - LP: #1330177 -- Luis Henriques <luis.henriq...@canonical.com> Tue, 15 Jul 2014 10:12:30 +0100 ** Changed in: linux-ti-omap4 (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1337339 Title: x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699) Status in “linux” package in Ubuntu: New Status in “linux-armadaxp” package in Ubuntu: Fix Released Status in “linux-ec2” package in Ubuntu: Fix Released Status in “linux-fsl-imx51” package in Ubuntu: New Status in “linux-lts-quantal” package in Ubuntu: Fix Released Status in “linux-lts-raring” package in Ubuntu: Fix Released Status in “linux-lts-saucy” package in Ubuntu: Fix Released Status in “linux-mvl-dove” package in Ubuntu: New Status in “linux-ti-omap4” package in Ubuntu: Fix Released Status in “linux” source package in Lucid: Fix Released Status in “linux” source package in Precise: Fix Released Status in “linux” source package in Saucy: Fix Released Status in “linux” source package in Trusty: Fix Released Status in “linux” source package in Utopic: New Bug description: The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. Break-Fix: 427abfa28afedffadfca9dd8b067eb6d36bac53f b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1337339/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp