kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #77645
[Bug 1355445] Re: linux: 2.6.32-65.129 -proposed tracker
*** This bug is a duplicate of bug 1357394 ***
https://bugs.launchpad.net/bugs/1357394
This bug was fixed in the package linux - 2.6.32-65.131
---------------
linux (2.6.32-65.131) lucid; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1357394
[ Upstream Kernel Changes ]
* x86_32, entry: Store badsys error code in %eax
- LP: #1334989
- CVE-2014-4508
linux (2.6.32-65.129) lucid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1355445
[ Upstream Kernel Changes ]
* fix autofs/afs/etc. magic mountpoint breakage
- CVE-2014-0203
* ALSA: control: Don't access controls outside of protected regions
- LP: #1339297
- CVE-2014-4653
* ALSA: control: Fix replacing user controls
- LP: #1339303, #1339304
- CVE-2014-4655
* ALSA: control: Handle numid overflow
- LP: #1339306
- CVE-2014-4656
* ALSA: control: Make sure that id->index does not overflow
- LP: #1339306
- CVE-2014-4656
* sctp: Fix sk_ack_backlog wrap-around problem
- LP: #1336135
- CVE-2014-4667
* x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)
- LP: #1334989
- CVE-2014-4508
* ALSA: control: Protect user controls against concurrent access
- LP: #1339294
- CVE-2014-4652
* net: sctp: inherit auth_capable on INIT collisions
- LP: #1349804
- CVE-2014-5077
-- Kamal Mostafa <kamal@xxxxxxxxxxxxx> Fri, 15 Aug 2014 11:22:44 -0700
** Changed in: linux (Ubuntu Lucid)
Status: New => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0203
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4508
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4652
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4653
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4655
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4656
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-4667
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-5077
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1355445
Title:
linux: 2.6.32-65.129 -proposed tracker
Status in Kernel SRU Workflow:
In Progress
Status in Kernel SRU Workflow certification-testing series:
New
Status in Kernel SRU Workflow package-testing series:
Confirmed
Status in Kernel SRU Workflow prepare-package series:
Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
Confirmed
Status in Kernel SRU Workflow promote-to-security series:
New
Status in Kernel SRU Workflow promote-to-updates series:
New
Status in Kernel SRU Workflow regression-testing series:
New
Status in Kernel SRU Workflow security-signoff series:
New
Status in Kernel SRU Workflow verification-testing series:
New
Status in “linux” package in Ubuntu:
Invalid
Status in “linux” source package in Lucid:
Fix Released
Bug description:
This bug is for tracking the 2.6.32-65.129 upload package. This bug
will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Monday, 11. August 2014 21:00 UTC
kernel-stable-phase:PPA Testing
kernel-stable-phase-changed:Thursday, 14. August 2014 16:03 UTC
kernel-stable-Prepare-package-end:Thursday, 14. August 2014 16:03 UTC
kernel-stable-Promote-to-proposed-start:Thursday, 14. August 2014 16:03 UTC
ppa-package-testing-start:Thursday, 14. August 2014 16:03 UTC
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1355445/+subscriptions
References