This bug was fixed in the package linux-ti-omap4 - 3.2.0-1485.112 --------------- linux-ti-omap4 (3.2.0-1485.112) precise; urgency=low
[ Seth Forshee ] * Release Tracking Bug - LP: #1604100 [ Kamal Mostafa ] * [Debian] embed derivative target name in release tag (LP: #1599924) [ Ubuntu: 3.2.0-107.148 ] * Release Tracking Bug - LP: #1604099 * CVE-2016-5243 (LP: #1589036) - tipc: fix an infoleak in tipc_nl_compat_link_dump * qeth: delete napi struct when removing a qeth device (LP: #1601831) - qeth: delete napi struct when removing a qeth device * linux: Homogenize changelog format across releases (LP: #1599562) - Revert "UBUNTU: [debian] BugLink: close LP: bugs only for Launchpad urls" - [Debian] git-ubuntu-log -- switch to bug order - [Debian] git-ubuntu-log -- fix empty section formatting - [Debian] git-ubuntu-log -- output should be utf-8 - [Debian] git-ubuntu-log -- handle invalid or private bugs - [Debian] git-ubuntu-log -- wrap long bug and commit titles - [Debian] git-ubuntu-log -- ensure we get the last commit - [Debian] git-ubuntu-log -- prevent bug references being split - [Debian] git-ubuntu-log -- git log output is UTF-8 * CVE-2016-3961 (LP: #1571020) - hugetlb: ensure hugepage access is denied if hugepages are not supported - mm: hugetlb: allow hugepages_supported to be architecture specific - s390/hugetlb: add hugepages_supported define - x86/mm/xen: Suppress hugetlbfs in PV guests * Linux netfilter IPT_SO_SET_REPLACE memory corruption (LP: #1555338) - netfilter: x_tables: validate e->target_offset early - netfilter: x_tables: make sure e->next_offset covers remaining blob size - netfilter: x_tables: fix unconditional helper * Miscellaneous upstream changes - KEYS: potential uninitialized variable -- Seth Forshee <seth.fors...@canonical.com> Wed, 20 Jul 2016 08:01:20 -0500 ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-3961 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-5243 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1604100 Title: linux-ti-omap4: 3.2.0-1485.112 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: In Progress Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1485.112 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- derivative-trackers-created: true kernel-stable-master-bug: 1604099 phase: Promoted to proposed proposed-announcement-sent: true proposed-testing-requested: true To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1604100/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp