← Back to team overview

kernel-packages team mailing list archive

[Bug 1527409] Re: linux-lts-utopic: 3.16.0-57.77~14.04.1 -proposed tracker

 

This bug was fixed in the package linux-lts-utopic -
3.16.0-57.77~14.04.1

---------------
linux-lts-utopic (3.16.0-57.77~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
    - LP: #1527409

  [ Jann Horn ]

  * ptrace: being capable wrt a process requires mapped uids/gids
    - LP: #1527374

linux-lts-utopic (3.16.0-57.76~14.04.1) trusty; urgency=low

  [ Upstream Kernel Changes ]

  * xen: Add RING_COPY_REQUEST()
    - CVE-2015-8550
  * xen-netback: don't use last request to determine minimum Tx credit
    - CVE-2015-8550
  * xen-netback: use RING_COPY_REQUEST() throughout
    - CVE-2015-8550
  * xen-blkback: only read request operation from shared ring once
    - CVE-2015-8550
  * xen-blkback: read from indirect descriptors only once
    - CVE-2015-8550
  * xen/pciback: Save xen_pci_op commands before processing it
    - CVE-2015-8550
  * xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI
    or MSI-X enabled
    - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553
  * xen/pciback: Return error on XEN_PCI_OP_enable_msix when device has MSI
    or MSI-X enabled
    - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553
  * xen/pciback: Do not install an IRQ handler for MSI interrupts.
    - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553
  * xen/pciback: For XEN_PCI_OP_disable_msi[|x] only disable if device has
    MSI(X) enabled.
    - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553
  * xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.
    - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553

 -- Kamal Mostafa <kamal@xxxxxxxxxxxxx>  Thu, 17 Dec 2015 15:01:30 -0800

** Changed in: linux-lts-utopic (Ubuntu Trusty)
       Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8550

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8551

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8552

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8553

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1527409

Title:
  linux-lts-utopic: 3.16.0-57.77~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-utopic package in Ubuntu:
  New
Status in linux-lts-utopic source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.16.0-57.77~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 17. December 2015 23:02 UTC
  kernel-stable-Prepare-package-end:Friday, 18. December 2015 09:51 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 18. December 2015 09:51 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 18. December 2015 16:14 UTC
  kernel-stable-Verification-testing-start:Friday, 18. December 2015 18:03 UTC
  kernel-stable-Certification-testing-start:Friday, 18. December 2015 18:03 UTC
  kernel-stable-Security-signoff-start:Friday, 18. December 2015 18:03 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 18. December 2015 18:03 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 18. December 2015 18:29 UTC
  kernel-stable-Promote-to-updates-start:Friday, 18. December 2015 18:29 UTC
  kernel-stable-Security-signoff-end:Friday, 18. December 2015 18:29 UTC
  kernel-stable-Certification-testing-end:Friday, 18. December 2015 18:29 UTC
  kernel-stable-Regression-testing-end:Friday, 18. December 2015 18:29 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1527409/+subscriptions


References