kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #186331
[Bug 1591436] Re: linux-armadaxp: 3.2.0-1668.93 -proposed tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93
---------------
linux-armadaxp (3.2.0-1668.93) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1591436
* Rebase to Ubuntu-3.2.0-105.146
[ Ubuntu: 3.2.0-105.146 ]
* Release Tracking Bug
- LP: #1591329
* [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
* ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
* ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
* ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
* ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
* net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
* get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
* USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
* IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
* usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951
-- Ike Panhc <ike.pan@xxxxxxxxxxxxx> Mon, 13 Jun 2016 15:18:37 +0800
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: In Progress => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4482
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4569
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4578
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4580
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4913
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1591436
Title:
linux-armadaxp: 3.2.0-1668.93 -proposed tracker
Status in Kernel SRU Workflow:
In Progress
Status in Kernel SRU Workflow automated-testing series:
Fix Released
Status in Kernel SRU Workflow certification-testing series:
Invalid
Status in Kernel SRU Workflow prepare-package series:
Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
Fix Released
Status in Kernel SRU Workflow promote-to-security series:
In Progress
Status in Kernel SRU Workflow promote-to-updates series:
In Progress
Status in Kernel SRU Workflow regression-testing series:
Fix Released
Status in Kernel SRU Workflow security-signoff series:
Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
Invalid
Status in Kernel SRU Workflow verification-testing series:
Fix Released
Status in linux-armadaxp package in Ubuntu:
Invalid
Status in linux-armadaxp source package in Precise:
Fix Released
Bug description:
This bug is for tracking the 3.2.0-1668.93 upload package. This bug
will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
derivative-trackers-created: true
kernel-stable-master-bug: 1591329
phase: Promoted to proposed
proposed-announcement-sent: true
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591436/+subscriptions
References