*** This bug is a duplicate of bug 1338611 *** https://bugs.launchpad.net/bugs/1338611
This bug was fixed in the package linux-lts-quantal - 3.5.0-54.81~precise1 --------------- linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low [ Luis Henriques ] * Merged back Ubuntu-lts-3.5.0-52.79 security release * Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)" - LP: #1337339 * Release Tracking Bug - LP: #1338611 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low [ Joseph Salisbury ] * Release Tracking Bug - LP: #1336400 [ Upstream Kernel Changes ] * skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * media-device: fix infoleak in ioctl media_enum_entities() - LP: #1333609 - CVE-2014-1739 * auditsc: audit_krule mask accesses need bounds checking - LP: #1325941 - CVE-2014-3917 * userns: Allow chown and setgid preservation - LP: #1329103 - CVE-2014-4014 * fs,userns: Change inode_capable to capable_wrt_inode_uidgid - LP: #1329103 - CVE-2014-4014 * target/rd: Refactor rd_build_device_space + rd_release_device_space - LP: #1333612 - CVE-2014-4027 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 -- Luis Henriques <luis.henriq...@canonical.com> Mon, 14 Jul 2014 15:28:36 +0100 ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1739 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3917 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4014 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4027 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4608 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4699 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4943 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1336400 Title: linux-lts-quantal: 3.5.0-53.79~precise1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1336400/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs