ubuntu/+source/linux-lts-quantal:applied/ubuntu/precise-proposed

Last commit made on 2014-07-16
Get this branch:
git clone -b applied/ubuntu/precise-proposed https://git.launchpad.net/ubuntu/+source/linux-lts-quantal
Members of Ubuntu Server Dev import team can upload to this branch. Log in for directions.

Branch merges

Branch information

Name:
applied/ubuntu/precise-proposed
Repository:
lp:ubuntu/+source/linux-lts-quantal

Recent commits

939549d... by Luis Henriques on 2014-07-14

Import patches-applied version 3.5.0-54.81~precise1 to applied/ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: 40e11c3bcb0b756d89b1834bc9f2509de1fd282d
Unapplied parent: 395a2e2874dbd14dbefc6689a00c27a0627eef67

New changelog entries:
  [ Upstream Kernel Changes ]
  * l2tp: Privilege escalation in ppp over l2tp sockets
    - LP: #1341472
    - CVE-2014-4943

395a2e2... by Luis Henriques on 2014-07-14

Import patches-unapplied version 3.5.0-54.81~precise1 to ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: ba1d8c3d1420969329288706cf85a009f4f1b647

New changelog entries:
  [ Upstream Kernel Changes ]
  * l2tp: Privilege escalation in ppp over l2tp sockets
    - LP: #1341472
    - CVE-2014-4943

40e11c3... by Luis Henriques on 2014-07-07

Import patches-applied version 3.5.0-54.80~precise1 to applied/ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: f294a1745f89b5db2fff2c191751f76b6549ba2e
Unapplied parent: ba1d8c3d1420969329288706cf85a009f4f1b647

New changelog entries:
  [ Luis Henriques ]
  * Merged back Ubuntu-lts-3.5.0-52.79 security release
  * Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)"
    - LP: #1337339
  * Release Tracking Bug
    - LP: #1338611
  [ Upstream Kernel Changes ]
  * ptrace,x86: force IRET path after a ptrace_stop()
    - LP: #1337339
    - CVE-2014-4699

ba1d8c3... by Luis Henriques on 2014-07-07

Import patches-unapplied version 3.5.0-54.80~precise1 to ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: 3c32fbe162d63fa1a1677aa1a7b17edf0bbf69e1

New changelog entries:
  [ Luis Henriques ]
  * Merged back Ubuntu-lts-3.5.0-52.79 security release
  * Revert "x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)"
    - LP: #1337339
  * Release Tracking Bug
    - LP: #1338611
  [ Upstream Kernel Changes ]
  * ptrace,x86: force IRET path after a ptrace_stop()
    - LP: #1337339
    - CVE-2014-4699

f294a17... by Joseph Salisbury on 2014-07-01

Import patches-applied version 3.5.0-53.79~precise1 to applied/ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: d5b295677ee173710b44c6d5318b83ec512c0c2c
Unapplied parent: 3c32fbe162d63fa1a1677aa1a7b17edf0bbf69e1

New changelog entries:
  [ Joseph Salisbury ]
  * Release Tracking Bug
    - LP: #1336400
  [ Upstream Kernel Changes ]
  * skbuff: export skb_copy_ubufs
    - LP: #1298119
    - CVE-2014-0131
  * skbuff: add an api to orphan frags
    - LP: #1298119
    - CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
    - LP: #1298119
    - CVE-2014-0131
  * media-device: fix infoleak in ioctl media_enum_entities()
    - LP: #1333609
    - CVE-2014-1739
  * auditsc: audit_krule mask accesses need bounds checking
    - LP: #1325941
    - CVE-2014-3917
  * userns: Allow chown and setgid preservation
    - LP: #1329103
    - CVE-2014-4014
  * fs,userns: Change inode_capable to capable_wrt_inode_uidgid
    - LP: #1329103
    - CVE-2014-4014
  * target/rd: Refactor rd_build_device_space + rd_release_device_space
    - LP: #1333612
    - CVE-2014-4027
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
    - CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
    - CVE-2014-4608
  * lzo: properly check for overruns
    - CVE-2014-4608

3c32fbe... by Joseph Salisbury on 2014-07-01

Import patches-unapplied version 3.5.0-53.79~precise1 to ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: 6aec0b8c706219f56bdc8a46bbd92b3d1c32cf6e

New changelog entries:
  [ Joseph Salisbury ]
  * Release Tracking Bug
    - LP: #1336400
  [ Upstream Kernel Changes ]
  * skbuff: export skb_copy_ubufs
    - LP: #1298119
    - CVE-2014-0131
  * skbuff: add an api to orphan frags
    - LP: #1298119
    - CVE-2014-0131
  * skbuff: skb_segment: orphan frags before copying
    - LP: #1298119
    - CVE-2014-0131
  * media-device: fix infoleak in ioctl media_enum_entities()
    - LP: #1333609
    - CVE-2014-1739
  * auditsc: audit_krule mask accesses need bounds checking
    - LP: #1325941
    - CVE-2014-3917
  * userns: Allow chown and setgid preservation
    - LP: #1329103
    - CVE-2014-4014
  * fs,userns: Change inode_capable to capable_wrt_inode_uidgid
    - LP: #1329103
    - CVE-2014-4014
  * target/rd: Refactor rd_build_device_space + rd_release_device_space
    - LP: #1333612
    - CVE-2014-4027
  * lib/lzo: Rename lzo1x_decompress.c to lzo1x_decompress_safe.c
    - CVE-2014-4608
  * lib/lzo: Update LZO compression to current upstream version
    - CVE-2014-4608
  * lzo: properly check for overruns
    - CVE-2014-4608

d5b2956... by Luis Henriques on 2014-06-11

Import patches-applied version 3.5.0-52.78~precise1 to applied/ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: 63aa7816fd81328fec220954e18d4a41542e4611
Unapplied parent: 6aec0b8c706219f56bdc8a46bbd92b3d1c32cf6e

New changelog entries:
  [ Luis Henriques ]
  * Release Tracking Bug
    - LP: #1328969
  [ Andy Whitcroft ]
  * [debian] insertchanges -- fix to work across major version changes
  [ Brad Figg ]
  * Non-rebase branch fixups so startnewrelease will work.
  * debian/rules.d/0-common-vars.mk: drop anything after ~ from the version
  * debian/rules.d/1-maintainer.mk: Add '-lts-' to the tag that being used
    to find the base commit
  [ Kamal Mostafa ]
  * [Config] add debian/gbp.conf
  [ Upstream Kernel Changes ]
  * filter: prevent nla extensions to peek beyond the end of the message
    - LP: #1319561, #1319563
    - CVE-2014-3145

6aec0b8... by Luis Henriques on 2014-06-11

Import patches-unapplied version 3.5.0-52.78~precise1 to ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: be337facb590c61a4f8dbc8726e90cdde389fa58

New changelog entries:
  [ Luis Henriques ]
  * Release Tracking Bug
    - LP: #1328969
  [ Andy Whitcroft ]
  * [debian] insertchanges -- fix to work across major version changes
  [ Brad Figg ]
  * Non-rebase branch fixups so startnewrelease will work.
  * debian/rules.d/0-common-vars.mk: drop anything after ~ from the version
  * debian/rules.d/1-maintainer.mk: Add '-lts-' to the tag that being used
    to find the base commit
  [ Kamal Mostafa ]
  * [Config] add debian/gbp.conf
  [ Upstream Kernel Changes ]
  * filter: prevent nla extensions to peek beyond the end of the message
    - LP: #1319561, #1319563
    - CVE-2014-3145

63aa781... by Brad Figg on 2014-06-04

Import patches-applied version 3.5.0-51.77~precise1 to applied/ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: 6b7c3d1cb26ab31826f1b2cc9f3490285a074124
Unapplied parent: be337facb590c61a4f8dbc8726e90cdde389fa58

New changelog entries:
  [ Upstream Kernel Changes ]
  * futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
    uaddr2 in futex_requeue(..., requeue_pi=1)
    - LP: #1326367
    - CVE-2014-3153
  * futex: Validate atomic acquisition in futex_lock_pi_atomic()
    - LP: #1326367
    - CVE-2014-3153
  * futex: Always cleanup owner tid in unlock_pi
    - LP: #1326367
    - CVE-2014-3153
  * futex: Make lookup_pi_state more robust
    - LP: #1326367
    - CVE-2014-3153

be337fa... by Brad Figg on 2014-06-04

Import patches-unapplied version 3.5.0-51.77~precise1 to ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: c1d03829cffb099f3b57be9a9341635b6313b811

New changelog entries:
  [ Upstream Kernel Changes ]
  * futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
    uaddr2 in futex_requeue(..., requeue_pi=1)
    - LP: #1326367
    - CVE-2014-3153
  * futex: Validate atomic acquisition in futex_lock_pi_atomic()
    - LP: #1326367
    - CVE-2014-3153
  * futex: Always cleanup owner tid in unlock_pi
    - LP: #1326367
    - CVE-2014-3153
  * futex: Make lookup_pi_state more robust
    - LP: #1326367
    - CVE-2014-3153