This bug was fixed in the package linux-ti-omap4 - 3.5.0-220.29
---------------
linux-ti-omap4 (3.5.0-220.29) quantal-proposed; urgency=low
* Release Tracking Bug
- LP: #1132939
[ Brad Figg ]
* rebased on Ubuntu-3.5.0-25.39
[ Ubuntu: 3.5.0-25.39 ]
* sock_diag: Fix out-of-bounds access to sock_diag_handlers[]
- LP: #1132896
- CVE-2013-1763
-- Brad Figg <[email protected]> Tue, 26 Feb 2013 13:42:21 -0800
** Changed in: linux-ti-omap4 (Ubuntu Quantal)
Status: New => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1763
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1132939
Title:
linux-ti-omap4: 3.5.0-220.29 -proposed tracker
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1132939/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs