This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110 --------------- linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low
[ Kamal Mostafa ] * Release Tracking Bug - LP: #1591435 [ Ubuntu: 3.2.0-105.146 ] * Release Tracking Bug - LP: #1591329 * [debian] getabis: Fix inconsistent compiler versions check - LP: #1584890 * ppp: take reference on channels netns - LP: #1583963 - CVE-2016-4805 * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS - LP: #1580379 - CVE-2016-4569 * ALSA: timer: Fix leak in events via snd_timer_user_ccallback - LP: #1581866 - CVE-2016-4578 * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt - LP: #1581866 - CVE-2016-4578 * net: fix a kernel infoleak in x25 module - LP: #1585366 - CVE-2016-4580 * get_rock_ridge_filename(): handle malformed NM entries - LP: #1583962 - CVE-2016-4913 * USB: usbfs: fix potential infoleak in devio - LP: #1578493 - CVE-2016-4482 * IB/security: Restrict use of the write() interface - LP: #1580372 - CVE-2016-4565 * usbnet: cleanup after bind() in probe() - LP: #1567191 - CVE-2016-3951 -- Kamal Mostafa <ka...@canonical.com> Mon, 13 Jun 2016 10:42:12 -0700 ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-3951 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4482 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4565 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4569 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4578 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4580 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4805 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4913 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1591435 Title: linux-ti-omap4: 3.2.0-1483.110 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Confirmed Status in Kernel SRU Workflow promote-to-updates series: Confirmed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: New Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1483.110 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- derivative-trackers-created: true kernel-stable-master-bug: 1591329 phase: Promoted to proposed proposed-announcement-sent: true To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591435/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp