This bug was fixed in the package linux - 3.13.0-129.178

---------------
linux (3.13.0-129.178) trusty; urgency=low

  * linux: 3.13.0-129.178 -proposed tracker (LP: #1709292)

  * CVE-2017-1000112
    - Revert "udp: consistently apply ufo or fragmentation"
    - udp: consistently apply ufo or fragmentation

  * CVE-2017-1000111
    - Revert "net-packet: fix race in packet_set_ring on PACKET_RESERVE"
    - packet: fix tp_reserve race in packet_set_ring

  * Adt tests of src:linux time out often on armhf lxc containers (LP: #1705495)
    - [Packaging] tests -- reduce rebuild test to one flavour

  * CVE-2016-7914
    - assoc_array: don't call compare_object() on a node

  * CVE-2017-7616
    - mm/mempolicy.c: fix error handling in set_mempolicy and mbind.

  * CVE-2017-7261
    - drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()

  * CVE-2017-7273
    - HID: hid-cypress: validate length of report

  * CVE-2017-7487
    - ipx: call ipxitf_put() in ioctl error path

  * CVE-2017-7495
    - ext4: fix data exposure after a crash

 -- Stefan Bader <stefan.ba...@canonical.com>  Fri, 11 Aug 2017 14:01:56
+0200

** Changed in: linux (Ubuntu Trusty)
       Status: Confirmed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-7914

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000111

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000112

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7261

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7273

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7487

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7495

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7616

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1709292

Title:
  linux: 3.13.0-129.178 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Committed
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Committed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the <version to be filled> upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  backports: 1709293
  derivatives:
  -- swm properties --
  boot-testing-requested: true
  phase: Promoted to proposed
  proposed-announcement-sent: true
  proposed-testing-requested: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1709292/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to