This bug was fixed in the package linux-lts-utopic - 3.16.0-57.77~14.04.1 --------------- linux-lts-utopic (3.16.0-57.77~14.04.1) trusty; urgency=low
[ Kamal Mostafa ] * Release Tracking Bug - LP: #1527409 [ Jann Horn ] * ptrace: being capable wrt a process requires mapped uids/gids - LP: #1527374 linux-lts-utopic (3.16.0-57.76~14.04.1) trusty; urgency=low [ Upstream Kernel Changes ] * xen: Add RING_COPY_REQUEST() - CVE-2015-8550 * xen-netback: don't use last request to determine minimum Tx credit - CVE-2015-8550 * xen-netback: use RING_COPY_REQUEST() throughout - CVE-2015-8550 * xen-blkback: only read request operation from shared ring once - CVE-2015-8550 * xen-blkback: read from indirect descriptors only once - CVE-2015-8550 * xen/pciback: Save xen_pci_op commands before processing it - CVE-2015-8550 * xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553 * xen/pciback: Return error on XEN_PCI_OP_enable_msix when device has MSI or MSI-X enabled - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553 * xen/pciback: Do not install an IRQ handler for MSI interrupts. - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553 * xen/pciback: For XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled. - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553 * xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set. - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553 -- Kamal Mostafa <ka...@canonical.com> Thu, 17 Dec 2015 15:01:30 -0800 ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-8550 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-8551 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-8552 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-8553 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1527409 Title: linux-lts-utopic: 3.16.0-57.77~14.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1527409/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs