This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93 --------------- linux-armadaxp (3.2.0-1668.93) precise; urgency=low
[ Ike Panhc ] * Release Tracking Bug - LP: #1591436 * Rebase to Ubuntu-3.2.0-105.146 [ Ubuntu: 3.2.0-105.146 ] * Release Tracking Bug - LP: #1591329 * [debian] getabis: Fix inconsistent compiler versions check - LP: #1584890 * ppp: take reference on channels netns - LP: #1583963 - CVE-2016-4805 * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS - LP: #1580379 - CVE-2016-4569 * ALSA: timer: Fix leak in events via snd_timer_user_ccallback - LP: #1581866 - CVE-2016-4578 * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt - LP: #1581866 - CVE-2016-4578 * net: fix a kernel infoleak in x25 module - LP: #1585366 - CVE-2016-4580 * get_rock_ridge_filename(): handle malformed NM entries - LP: #1583962 - CVE-2016-4913 * USB: usbfs: fix potential infoleak in devio - LP: #1578493 - CVE-2016-4482 * IB/security: Restrict use of the write() interface - LP: #1580372 - CVE-2016-4565 * usbnet: cleanup after bind() in probe() - LP: #1567191 - CVE-2016-3951 -- Ike Panhc <ike....@canonical.com> Mon, 13 Jun 2016 15:18:37 +0800 ** Changed in: linux-armadaxp (Ubuntu Precise) Status: In Progress => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-3951 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4482 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4565 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4569 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4578 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4580 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4805 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4913 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1591436 Title: linux-armadaxp: 3.2.0-1668.93 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: In Progress Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1668.93 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- derivative-trackers-created: true kernel-stable-master-bug: 1591329 phase: Promoted to proposed proposed-announcement-sent: true To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591436/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp