This bug was fixed in the package linux-lts-trusty - 3.13.0-103.150~precise1
--------------- linux-lts-trusty (3.13.0-103.150~precise1) precise; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1644509 * Possible regression on 3.13.0-102.149~precise1 x86_64 (gce) (LP: #1644302) - SAUCE: apparmor: delete extra variable dev_path linux (3.13.0-102.149) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1640581 * lxc-attach to malicious container allows access to host (LP: #1639345) - Revert "UBUNTU: ptrace: being capable wrt a process requires mapped uids/gids" - (upstream) mm: Add a user_ns owner to mm_struct and fix ptrace permission checks * Syntax error extra parenthesis linux-headers-3.13.0-100/Makefile (LP: #1636625) - Makefile: fix extra parenthesis typo when CC_STACKPROTECTOR_REGULAR is enabled * Add a driver for Amazon Elastic Network Adapters (ENA) (LP: #1635721) - lib/bitmap.c: conversion routines to/from u32 array - kernel.h: define u8, s8, u32, etc. limits - net: ethtool: add new ETHTOOL_xLINKSETTINGS API - PCI/MSI: Add pci_msix_vec_count() - etherdevice: Use ether_addr_copy to copy an Ethernet address - net: ena: Add a driver for Amazon Elastic Network Adapters (ENA) - [config] enable CONFIG_ENA_ETHERNET=m (Amazon ENA driver) * CVE-2016-8658 - brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap() * CVE-2016-7425 - scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer() * srcname from mount rule corrupted under load (LP: #1634753) - SAUCE: apparmor: fix sleep in critical section * ghash-clmulni-intel module fails to load (LP: #1633058) - crypto: ghash-clmulni - Fix load failure - crypto: cryptd - Assign statesize properly -- Luis Henriques <luis.henriq...@canonical.com> Thu, 24 Nov 2016 10:46:49 +0000 ** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Confirmed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-7425 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-8658 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1644509 Title: linux-lts-trusty: 3.13.0-103.150~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Committed Status in Kernel SRU Workflow promote-to-updates series: Fix Committed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: Fix Released Bug description: This bug is for tracking the 3.13.0-103.150~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true derivative-trackers-created: true kernel-stable-master-bug: 1644489 phase: Promoted to proposed proposed-announcement-sent: true proposed-testing-requested: true To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1644509/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp