This bug was fixed in the package linux-lts-quantal - 3.5.0-54.81~precise1
--------------- linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943
linux-lts-quantal (3.5.0-54.80~precise1) precise; urgency=low
[ Luis Henriques ]
* Merged back Ubuntu-lts-3.5.0-52.79 security release * Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)" - LP: #1337339 * Release Tracking Bug - LP: #1338611
* ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699
linux-lts-quantal (3.5.0-53.79~precise1) precise; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug - LP: #1336400
* skbuff: export skb_copy_ubufs - LP: #1298119 - CVE-2014-0131 * skbuff: add an api to orphan frags - LP: #1298119 - CVE-2014-0131 * skbuff: skb_segment: orphan frags before copying - LP: #1298119 - CVE-2014-0131 * media-device: fix infoleak in ioctl media_enum_entities() - LP: #1333609 - CVE-2014-1739 * auditsc: audit_krule mask accesses need bounds checking - LP: #1325941 - CVE-2014-3917 * userns: Allow chown and setgid preservation - LP: #1329103 - CVE-2014-4014 * fs,userns: Change inode_capable to capable_wrt_inode_uidgid - LP: #1329103 - CVE-2014-4014 * target/rd: Refactor rd_build_device_space + rd_release_device_space - LP: #1333612 - CVE-2014-4027 * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c - CVE-2014-4608 * lib/lzo: Update LZO compression to current upstream version - CVE-2014-4608 * lzo: properly check for overruns - CVE-2014-4608 -- Luis Henriques <email address hidden> Mon, 14 Jul 2014 15:28:36 +0100
This bug was fixed in the package linux-lts-quantal - 3.5.0-54. 81~precise1
--------------- 54.81~precise1) precise; urgency=low
linux-lts-quantal (3.5.0-
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-quantal (3.5.0- 54.80~precise1) precise; urgency=low
[ Luis Henriques ]
* Merged back Ubuntu- lts-3.5. 0-52.79 security release
* Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)"
- LP: #1337339
* Release Tracking Bug
- LP: #1338611
[ Upstream Kernel Changes ]
* ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699
linux-lts-quantal (3.5.0- 53.79~precise1) precise; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1336400
[ Upstream Kernel Changes ]
* skbuff: export skb_copy_ubufs entities( ) wrt_inode_ uidgid device_ space + rd_release_ device_ space s_safe. c
- LP: #1298119
- CVE-2014-0131
* skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
* skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
* media-device: fix infoleak in ioctl media_enum_
- LP: #1333609
- CVE-2014-1739
* auditsc: audit_krule mask accesses need bounds checking
- LP: #1325941
- CVE-2014-3917
* userns: Allow chown and setgid preservation
- LP: #1329103
- CVE-2014-4014
* fs,userns: Change inode_capable to capable_
- LP: #1329103
- CVE-2014-4014
* target/rd: Refactor rd_build_
- LP: #1333612
- CVE-2014-4027
* lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompres
- CVE-2014-4608
* lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
* lzo: properly check for overruns
- CVE-2014-4608
-- Luis Henriques <email address hidden> Mon, 14 Jul 2014 15:28:36 +0100