← Back to team overview

kernel-packages team mailing list archive

[Bug 1403943] Re: linux: 2.6.32-71.138 -proposed tracker

 

This bug was fixed in the package linux - 2.6.32-71.138

---------------
linux (2.6.32-71.138) lucid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
    - LP: #1403943

  [ Luis Henriques ]

  * [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update

  [ Upstream Kernel Changes ]

  * KVM: x86: Check non-canonical addresses upon WRMSR
    - LP: #1384539
    - CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
    - LP: #1384540
    - CVE-2014-3611
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
    msghdr struct from userland.
    - LP: #1335478
  * x86, 64-bit: Move K8 B step iret fixup to fault entry asm
    - LP: #1403918
  * x86-64: Adjust frame type at paranoid_exit:
    - LP: #1403918
  * x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels
    - LP: #1403918
  * x86-32, espfix: Remove filter for espfix32 due to race
    - LP: #1403918
  * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack
    - LP: #1403918
  * x86, espfix: Move espfix definitions into a separate header file
    - LP: #1403918
  * x86, espfix: Fix broken header guard
    - LP: #1403918
  * x86, espfix: Make espfix64 a Kconfig option, fix UML
    - LP: #1403918
  * x86, espfix: Make it possible to disable 16-bit support
    - LP: #1403918
  * x86_64/entry/xen: Do not invoke espfix64 on Xen
    - LP: #1403918
  * x86/espfix/xen: Fix allocation of pages for paravirt page tables
    - LP: #1403918
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
    - LP: #1403918
  * x86_64, traps: Rework bad_iret
    - LP: #1403918
 -- Luis Henriques <luis.henriques@xxxxxxxxxxxxx>   Thu, 18 Dec 2014 16:22:56 +0000

** Changed in: linux (Ubuntu Lucid)
       Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3610

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3611

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1403943

Title:
  linux: 2.6.32-71.138 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow package-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-71.138 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 18. December 2014 16:18 UTC
  kernel-stable-Prepare-package-end:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 19. December 2014 00:07 UTC
  ppa-package-testing-start:Friday, 19. December 2014 00:07 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 19. December 2014 08:02 UTC
  kernel-stable-Verification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Certification-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Regression-testing-start:Friday, 19. December 2014 10:03 UTC
  kernel-stable-Security-signoff-end:Friday, 19. December 2014 14:02 UTC
  kernel-stable-Certification-testing-end:Wednesday, 07. January 2015 09:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 08. January 2015 16:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Promote-to-updates-start:Friday, 09. January 2015 16:01 UTC
  kernel-stable-Regression-testing-end:Friday, 09. January 2015 16:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1403943/+subscriptions


References