This bug was fixed in the package linux - 3.13.0-129.178 --------------- linux (3.13.0-129.178) trusty; urgency=low
* linux: 3.13.0-129.178 -proposed tracker (LP: #1709292) * CVE-2017-1000112 - Revert "udp: consistently apply ufo or fragmentation" - udp: consistently apply ufo or fragmentation * CVE-2017-1000111 - Revert "net-packet: fix race in packet_set_ring on PACKET_RESERVE" - packet: fix tp_reserve race in packet_set_ring * Adt tests of src:linux time out often on armhf lxc containers (LP: #1705495) - [Packaging] tests -- reduce rebuild test to one flavour * CVE-2016-7914 - assoc_array: don't call compare_object() on a node * CVE-2017-7616 - mm/mempolicy.c: fix error handling in set_mempolicy and mbind. * CVE-2017-7261 - drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl() * CVE-2017-7273 - HID: hid-cypress: validate length of report * CVE-2017-7487 - ipx: call ipxitf_put() in ioctl error path * CVE-2017-7495 - ext4: fix data exposure after a crash -- Stefan Bader <stefan.ba...@canonical.com> Fri, 11 Aug 2017 14:01:56 +0200 ** Changed in: linux (Ubuntu Trusty) Status: Confirmed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-7914 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000111 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000112 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7261 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7273 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7487 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7495 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7616 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1709292 Title: linux: 3.13.0-129.178 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Committed Status in Kernel SRU Workflow promote-to-updates series: Fix Committed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Bug description: This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: 1709293 derivatives: -- swm properties -- boot-testing-requested: true phase: Promoted to proposed proposed-announcement-sent: true proposed-testing-requested: true To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1709292/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp