kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #71438
[Bug 1337339] Re: x86_64, ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71
---------------
linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low
[ Luis Henriques ]
* Rebased to 3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
[ Ubuntu: 3.2.0-67.100 ]
* Merged back Ubuntu-3.2.0-65.99 security release
* Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)"
- LP: #1337339
* Release Tracking Bug
- LP: #1338654
* ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699
linux-ti-omap4 (3.2.0-1451.70) precise; urgency=low
* Release Tracking Bug
- LP: #1336143
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-66.99
[ Ubuntu: 3.2.0-66.99 ]
* Release Tracking Bug
- LP: #1335906
* skbuff: export skb_copy_ubufs
- LP: #1298119
- CVE-2014-0131
* skbuff: add an api to orphan frags
- LP: #1298119
- CVE-2014-0131
* skbuff: skb_segment: orphan frags before copying
- LP: #1298119
- CVE-2014-0131
* lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
- CVE-2014-4608
* lib/lzo: Update LZO compression to current upstream version
- CVE-2014-4608
* lzo: properly check for overruns
- CVE-2014-4608
* KVM: x86 emulator: add support for vector alignment
- LP: #1330177
* KVM: x86: emulate movdqa
- LP: #1330177
-- Luis Henriques <luis.henriques@xxxxxxxxxxxxx> Tue, 15 Jul 2014 10:12:30 +0100
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
Status in “linux” package in Ubuntu:
New
Status in “linux-armadaxp” package in Ubuntu:
Fix Released
Status in “linux-ec2” package in Ubuntu:
Fix Released
Status in “linux-fsl-imx51” package in Ubuntu:
New
Status in “linux-lts-quantal” package in Ubuntu:
Fix Released
Status in “linux-lts-raring” package in Ubuntu:
Fix Released
Status in “linux-lts-saucy” package in Ubuntu:
Fix Released
Status in “linux-mvl-dove” package in Ubuntu:
New
Status in “linux-ti-omap4” package in Ubuntu:
Fix Released
Status in “linux” source package in Lucid:
Fix Released
Status in “linux” source package in Precise:
Fix Released
Status in “linux” source package in Saucy:
Fix Released
Status in “linux” source package in Trusty:
Fix Released
Status in “linux” source package in Utopic:
New
Bug description:
The Linux kernel before 3.15.4 on Intel processors does not properly
restrict use of a non-canonical value for the saved RIP address in the
case of a system call that does not use IRET, which allows local users
to leverage a race condition and gain privileges, or cause a denial of
service (double fault), via a crafted application that makes ptrace
and fork system calls.
Break-Fix: 427abfa28afedffadfca9dd8b067eb6d36bac53f
b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1337339/+subscriptions