This bug was fixed in the package linux-lts-utopic - 3.16.0-76.98~14.04.1 --------------- linux-lts-utopic (3.16.0-76.98~14.04.1) trusty; urgency=low
[ Luis Henriques ] * Release Tracking Bug - LP: #1596019 [ Upstream Kernel Changes ] * netfilter: x_tables: validate e->target_offset early - LP: #1555338 - CVE-2016-3134 * netfilter: x_tables: make sure e->next_offset covers remaining blob size - LP: #1555338 - CVE-2016-3134 * netfilter: x_tables: fix unconditional helper - LP: #1555338 - CVE-2016-3134 * netfilter: x_tables: don't move to non-existent next rule - LP: #1595350 * netfilter: x_tables: validate targets of jumps - LP: #1595350 * netfilter: x_tables: add and use xt_check_entry_offsets - LP: #1595350 * netfilter: x_tables: kill check_entry helper - LP: #1595350 * netfilter: x_tables: assert minimum target size - LP: #1595350 * netfilter: x_tables: add compat version of xt_check_entry_offsets - LP: #1595350 * netfilter: x_tables: check standard target size too - LP: #1595350 * netfilter: x_tables: check for bogus target offset - LP: #1595350 * netfilter: x_tables: validate all offsets and sizes in a rule - LP: #1595350 * netfilter: x_tables: don't reject valid target size on some architectures - LP: #1595350 * netfilter: arp_tables: simplify translate_compat_table args - LP: #1595350 * netfilter: ip_tables: simplify translate_compat_table args - LP: #1595350 * netfilter: ip6_tables: simplify translate_compat_table args - LP: #1595350 * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval - LP: #1595350 * netfilter: x_tables: do compat validation via translate_table - LP: #1595350 * netfilter: x_tables: introduce and use xt_copy_counters_from_user - LP: #1595350 linux-lts-utopic (3.16.0-75.97~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1595703 [ Serge Hallyn ] * SAUCE: add a sysctl to disable unprivileged user namespace unsharing - LP: #1555338, #1595350 linux-lts-utopic (3.16.0-74.96~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1591324 [ Kamal Mostafa ] * [debian] getabis: Only git add $abidir if running in local repo - LP: #1584890 * [debian] getabis: Fix inconsistent compiler versions check - LP: #1584890 [ Tim Gardner ] * [Config] Remove arc4 from nic-modules - LP: #1582991 [ Upstream Kernel Changes ] * Revert "usb: hub: do not clear BOS field during reset device" - LP: #1582864 * mm/balloon_compaction: redesign ballooned pages management - LP: #1572562 * mm/balloon_compaction: fix deflation when compaction is disabled - LP: #1572562 * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS - LP: #1580379 - CVE-2016-4569 * ALSA: timer: Fix leak in events via snd_timer_user_ccallback - LP: #1581866 - CVE-2016-4578 * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt - LP: #1581866 - CVE-2016-4578 * net: fix a kernel infoleak in x25 module - LP: #1585366 - CVE-2016-4580 * get_rock_ridge_filename(): handle malformed NM entries - LP: #1583962 - CVE-2016-4913 * netfilter: Set /proc/net entries owner to root in namespace - LP: #1584953 * USB: usbfs: fix potential infoleak in devio - LP: #1578493 - CVE-2016-4482 * IB/security: Restrict use of the write() interface - LP: #1580372 - CVE-2016-4565 -- Luis Henriques <luis.henriq...@canonical.com> Fri, 24 Jun 2016 17:17:07 +0100 ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Confirmed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-3134 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4482 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4565 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4569 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4578 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4580 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4913 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1596019 Title: linux-lts-utopic: 3.16.0-76.98~14.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: In Progress Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.16.0-76.98~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- derivative-trackers-created: true phase: Promoted to proposed proposed-announcement-sent: true To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1596019/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp