linux: 3.13.0-152.202 -proposed tracker
Bug #1776350 reported by
Khaled El Mously
This bug report is a duplicate of:
Bug #1776819: linux: 3.13.0-153.203 -proposed tracker.
Edit
Remove
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | ||
Automated-testing |
New
|
Medium
|
Canonical Kernel Team | ||
Certification-testing |
New
|
Medium
|
Canonical Hardware Certification | ||
Prepare-package |
Fix Released
|
Medium
|
Khaled El Mously | ||
Prepare-package-meta |
Fix Released
|
Medium
|
Khaled El Mously | ||
Prepare-package-signed |
Fix Released
|
Medium
|
Khaled El Mously | ||
Promote-to-proposed |
New
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Promote-to-security |
New
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Promote-to-updates |
New
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Regression-testing |
New
|
Medium
|
Canonical Kernel Team | ||
Security-signoff |
New
|
Medium
|
Canonical Security Team | ||
Upload-to-ppa |
Invalid
|
Medium
|
Unassigned | ||
Verification-testing |
New
|
Medium
|
Canonical Kernel Team | ||
linux (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Trusty |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see: https:/
backports: bug 1776351 (linux-lts-trusty)
derivatives:
kernel-
kernel-
-- swm properties --
phase: Uploaded
CVE References
tags: | added: kernel-release-tracking-bug |
tags: | added: kernel-release-tracking-bug-live |
tags: | added: trusty |
Changed in linux (Ubuntu): | |
status: | New → Invalid |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
tags: | added: kernel-sru-cycle-2018.06.11-1 |
tags: | added: kernel-sru-master-kernel |
description: | updated |
summary: |
- linux: <version to be filled> -proposed tracker + linux: 3.13.0-152.202 -proposed tracker |
Changed in linux (Ubuntu Trusty): | |
status: | New → Confirmed |
description: | updated |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Released |
To post a comment you must log in.
This bug was fixed in the package linux - 3.13.0-153.203
---------------
linux (3.13.0-153.203) trusty; urgency=medium
* linux: 3.13.0-153.203 -proposed tracker (LP: #1776819)
* CVE-2018-3665 (x86)
- x86/fpu: Print out whether we are doing lazy/eager FPU context switches
- x86/fpu: Default eagerfpu=on on all CPUs
- x86/fpu: Fix math emulation in eager fpu mode
linux (3.13.0-152.202) trusty; urgency=medium
* linux: 3.13.0-152.202 -proposed tracker (LP: #1776350)
* CVE-2017-15265
- ALSA: seq: Fix use-after-free at creating a port
* register on binfmt_misc may overflow and crash the system (LP: #1775856)
- fs/binfmt_misc.c: do not allow offset overflow
* CVE-2018-1130
- dccp: check sk for closed state in dccp_sendmsg()
- ipv6: dccp: add missing bind_conflict to dccp_ipv6_mapped
* add_key04 in LTP syscall test cause kernel oops (NULL pointer dereference)
with T kernel (LP: #1775316) // CVE-2017-12193
- assoc_array: Fix a buggy node-splitting case
* CVE-2017-12154
- kvm: nVMX: Don't allow L2 to access the hardware CR8
* CVE-2018-7757 get_phy_ events( )
- scsi: libsas: fix memory leak in sas_smp_
* CVE-2018-6927
- futex: Prevent overflow by strengthen input validation
* FS-Cache: Assertion failed: FS-Cache: 6 == 5 is false (LP: #1774336) read_copier race
- SAUCE: CacheFiles: fix a read_waiter/
* CVE-2018-5803
- sctp: verify size of a new chunk in _sctp_make_chunk()
* WARNING: CPU: 28 PID: 34085 at /build/linux- linux-3. 13.0/net/ core/dev. c:1433 dev_disable_ lro+0x87/ 0x90() upper_get_ next_dev_ rcu
90Gc2C/
(LP: #1771480)
- net/core: generic support for disabling netdev features down stack
- SAUCE: Backport helper function netdev_
* CVE-2018-7755
- SAUCE: floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl
* CVE-2018-5750
- ACPI: sbshc: remove raw pointer from printk() message
-- Stefan Bader <email address hidden> Thu, 14 Jun 2018 07:00:42 +0200