This bug was fixed in the package linux-ec2 - 2.6.32-369.85 --------------- linux-ec2 (2.6.32-369.85) lucid; urgency=low
[ Stefan Bader ] * Rebased to Ubuntu-2.6.32-65.129 * Rebased to Ubuntu-2.6.32-65.131 * Release Tracking Bug - LP: #1357410 [ Upstream Kernel Changes ] * xen: x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508) - LP: #1334989 - CVE-2014-4508 * xen: x86_32, entry: Store badsys error code in %eax - LP: #1334989 - CVE-2014-4508 [ Ubuntu: 2.6.32-65.131 ] * x86_32, entry: Store badsys error code in %eax - LP: #1334989 - CVE-2014-4508 [ Ubuntu: 2.6.32-65.129 ] * fix autofs/afs/etc. magic mountpoint breakage - CVE-2014-0203 * ALSA: control: Don't access controls outside of protected regions - LP: #1339297 - CVE-2014-4653 * ALSA: control: Fix replacing user controls - LP: #1339303, #1339304 - CVE-2014-4655 * ALSA: control: Handle numid overflow - LP: #1339306 - CVE-2014-4656 * ALSA: control: Make sure that id->index does not overflow - LP: #1339306 - CVE-2014-4656 * sctp: Fix sk_ack_backlog wrap-around problem - CVE-2014-4667 * x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508) - LP: #1334989 - CVE-2014-4508 * ALSA: control: Protect user controls against concurrent access - LP: #1339294 - CVE-2014-4652 * net: sctp: inherit auth_capable on INIT collisions - LP: #1349804 - CVE-2014-5077 -- Stefan Bader <stefan.ba...@canonical.com> Fri, 15 Aug 2014 08:55:05 +0200 ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1349804 Title: CVE-2014-5077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1349804/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs