This bug was fixed in the package linux-ec2 - 2.6.32-375.92 --------------- linux-ec2 (2.6.32-375.92) lucid; urgency=low
[ Stefan Bader ] * Rebased to Ubuntu-2.6.32-71.138 * Xen: x86, 64-bit: Move K8 B step iret fixup to fault entry asm - LP: #1403918 * Xen: x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels - LP: #1403918 * Xen: x86-32, espfix: Remove filter for espfix32 due to race - LP: #1403918 * Xen: x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack - LP: #1403918 * Xen: x86, espfix: Make espfix64 a Kconfig option, fix UML - LP: #1403918 * Xen: x86, espfix: Make it possible to disable 16-bit support - LP: #1403918 * Xen: x86_64/entry/xen: Do not invoke espfix64 on Xen - LP: #1403918 * Xen: [Config] Enable CONFIG_X86_16BIT * Rebased to Ubuntu-2.6.32-72.139 * Release Tracking Bug - LP: #1411354 [ Ubuntu: 2.6.32-72.139 ] * isofs: Fix infinite looping over CE entries - LP: #1407947 - CVE-2014-9420 * x86/tls: Validate TLS entries to protect espfix - LP: #1403852 - CVE-2014-8133 [ Ubuntu: 2.6.32-71.138 ] * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update * KVM: x86: Check non-canonical addresses upon WRMSR - LP: #1384539 - CVE-2014-3610 * KVM: x86: Improve thread safety in pit - LP: #1384540 - CVE-2014-3611 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 * x86, 64-bit: Move K8 B step iret fixup to fault entry asm - LP: #1403918 * x86-64: Adjust frame type at paranoid_exit: - LP: #1403918 * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels - LP: #1403918 * x86-32, espfix: Remove filter for espfix32 due to race - LP: #1403918 * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack - LP: #1403918 * x86, espfix: Move espfix definitions into a separate header file - LP: #1403918 * x86, espfix: Fix broken header guard - LP: #1403918 * x86, espfix: Make espfix64 a Kconfig option, fix UML - LP: #1403918 * x86, espfix: Make it possible to disable 16-bit support - LP: #1403918 * x86_64/entry/xen: Do not invoke espfix64 on Xen - LP: #1403918 * x86/espfix/xen: Fix allocation of pages for paravirt page tables - LP: #1403918 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1403918 * x86_64, traps: Rework bad_iret - LP: #1403918 -- Stefan Bader <stefan.ba...@canonical.com> Thu, 18 Dec 2014 18:20:27 +0100 ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3610 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3611 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8133 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-9420 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ec2 in Ubuntu. https://bugs.launchpad.net/bugs/1411354 Title: linux-ec2: 2.6.32-375.92 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ec2 package in Ubuntu: Invalid Status in linux-ec2 source package in Lucid: Fix Released Bug description: This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 15. January 2015 18:02 UTC kernel-stable-master-bug:1410907 kernel-stable-Certification-testing-end:Friday, 16. January 2015 13:02 UTC kernel-stable-Prepare-package-end:Friday, 16. January 2015 15:02 UTC kernel-stable-Promote-to-proposed-start:Friday, 16. January 2015 15:02 UTC ppa-package-testing-start:Friday, 16. January 2015 15:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 16. January 2015 21:02 UTC kernel-stable-Security-signoff-start:Friday, 16. January 2015 22:02 UTC kernel-stable-Verification-testing-start:Friday, 16. January 2015 22:02 UTC kernel-stable-Regression-testing-start:Friday, 16. January 2015 22:02 UTC kernel-stable-Verification-testing-end:Tuesday, 27. January 2015 04:02 UTC kernel-stable-Security-signoff-end:Wednesday, 28. January 2015 10:03 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Tuesday, 03. February 2015 09:39 UTC kernel-stable-Promote-to-updates-start:Tuesday, 03. February 2015 09:39 UTC kernel-stable-Regression-testing-end:Tuesday, 03. February 2015 09:39 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1411354/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp