kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #75574
[Bug 1356318] Re: CVE-2014-5206
This bug was fixed in the package linux - 3.16.0-8.13
---------------
linux (3.16.0-8.13) utopic; urgency=low
[ Tim Gardner ]
* Release Tracking Bug
- LP: #1356403
[ dann frazier ]
* [debian] Allow for package revisions condusive for branching
[ Upstream Kernel Changes ]
* ahci_xgene: Fix the watermark threshold for the APM X-Gene SATA host controller driver.
- LP: #1350087
* ahci_xgene: Use correct OOB tunning parameters for APM X-Gene SoC AHCI SATA Host controller driver.
- LP: #1350087
* powerpc/powernv: Enable M64 aperatus for PHB3
- LP: #1355469
* powerpc: Fail remap_4k_pfn() if PFN doesn't fit inside PTE
- LP: #1352994
* powerpc: Add machine_early_initcall()
- LP: #1352640
* powerpc/powernv: Switch powernv drivers to use machine_xxx_initcall()
- LP: #1352640
* powerpc/eeh: Avoid event on passed PE
- LP: #1352640
* powerpc/eeh: EEH support for VFIO PCI device
- LP: #1352640
* powerpc/eeh: sysfs entries lost
- LP: #1352640
* powerpc/powernv: Fix IOMMU table for VFIO dev
- LP: #1352640
* powerpc/eeh: Fetch IOMMU table in reliable way
- LP: #1352640
* powerpc/eeh: Refactor EEH flag accessors
- LP: #1352640
* powerpc/eeh: Selectively enable IO for error log
- LP: #1352640
* powerpc/eeh: Reduce lines of log dump
- LP: #1352640
* powerpc/eeh: Replace pr_warning() with pr_warn()
- LP: #1352640
* powerpc/eeh: Make diag-data not endian dependent
- LP: #1352640
* powerpc/eeh: Aux PE data for error log
- LP: #1352640
* PCI: Support BAR sizes up to 128GB
- LP: #1352640
* powerpc/powernv: Allow to freeze PE
- LP: #1352640
* powerpc/powernv: Split ioda_eeh_get_state()
- LP: #1352640
* powerpc/powernv: Handle compound PE
- LP: #1352640
* powerpc/powernv: Handle compound PE for EEH
- LP: #1352640
* powerpc/powernv: Handle compound PE in config accessors
- LP: #1352640
* mnt: Only change user settable mount flags in remount
- LP: #1356318
- CVE-2014-5206
* mnt: Move the test for MNT_LOCK_READONLY from change_mount_flags into do_remount
- LP: #1356318
- CVE-2014-5206
* mnt: Correct permission checks in do_remount
- LP: #1356323
- CVE-2014-5207
* mnt: Change the default remount atime from relatime to the existing value
- LP: #1356323
- CVE-2014-5207
-- Tim Gardner <tim.gardner@xxxxxxxxxxxxx> Sun, 10 Aug 2014 09:10:51 -0600
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-5207
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1356318
Title:
CVE-2014-5206
Status in “linux” package in Ubuntu:
Fix Released
Status in “linux-armadaxp” package in Ubuntu:
Invalid
Status in “linux-ec2” package in Ubuntu:
Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
New
Status in “linux-lts-backport-natty” package in Ubuntu:
New
Status in “linux-lts-quantal” package in Ubuntu:
Invalid
Status in “linux-lts-raring” package in Ubuntu:
Invalid
Status in “linux-lts-saucy” package in Ubuntu:
Invalid
Status in “linux-mvl-dove” package in Ubuntu:
Invalid
Status in “linux-ti-omap4” package in Ubuntu:
Invalid
Status in “linux” source package in Lucid:
New
Status in “linux-armadaxp” source package in Lucid:
Invalid
Status in “linux-ec2” source package in Lucid:
New
Status in “linux-fsl-imx51” source package in Lucid:
Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
New
Status in “linux-lts-backport-natty” source package in Lucid:
New
Status in “linux-lts-quantal” source package in Lucid:
Invalid
Status in “linux-lts-raring” source package in Lucid:
Invalid
Status in “linux-lts-saucy” source package in Lucid:
Invalid
Status in “linux-mvl-dove” source package in Lucid:
Invalid
Status in “linux-ti-omap4” source package in Lucid:
Invalid
Status in “linux” source package in Precise:
New
Status in “linux-armadaxp” source package in Precise:
New
Status in “linux-ec2” source package in Precise:
Invalid
Status in “linux-fsl-imx51” source package in Precise:
Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
New
Status in “linux-lts-backport-natty” source package in Precise:
New
Status in “linux-lts-quantal” source package in Precise:
Invalid
Status in “linux-lts-raring” source package in Precise:
Invalid
Status in “linux-lts-saucy” source package in Precise:
Invalid
Status in “linux-mvl-dove” source package in Precise:
Invalid
Status in “linux-ti-omap4” source package in Precise:
New
Status in “linux” source package in Trusty:
New
Status in “linux-armadaxp” source package in Trusty:
Invalid
Status in “linux-ec2” source package in Trusty:
Invalid
Status in “linux-fsl-imx51” source package in Trusty:
Invalid
Status in “linux-lts-backport-maverick” source package in Trusty:
New
Status in “linux-lts-backport-natty” source package in Trusty:
New
Status in “linux-lts-quantal” source package in Trusty:
Invalid
Status in “linux-lts-raring” source package in Trusty:
Invalid
Status in “linux-lts-saucy” source package in Trusty:
Invalid
Status in “linux-mvl-dove” source package in Trusty:
Invalid
Status in “linux-ti-omap4” source package in Trusty:
Invalid
Status in “linux” source package in Utopic:
Fix Released
Status in “linux-armadaxp” source package in Utopic:
Invalid
Status in “linux-ec2” source package in Utopic:
Invalid
Status in “linux-fsl-imx51” source package in Utopic:
Invalid
Status in “linux-lts-backport-maverick” source package in Utopic:
New
Status in “linux-lts-backport-natty” source package in Utopic:
New
Status in “linux-lts-quantal” source package in Utopic:
Invalid
Status in “linux-lts-raring” source package in Utopic:
Invalid
Status in “linux-lts-saucy” source package in Utopic:
Invalid
Status in “linux-mvl-dove” source package in Utopic:
Invalid
Status in “linux-ti-omap4” source package in Utopic:
Invalid
Bug description:
Remounting a read-only bind mount read-only in a user namespace the
MNT_LOCK_READONLY bit would be cleared, allowing an unprivileged user
to the remount a read-only mount read-write.
Break-Fix: 0c55cfc4166d9a0f38de779bd4d75a90afbe7734
a6138db815df5ee542d848318e5dae681590fccd
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1356318/+subscriptions
References