This bug was fixed in the package linux - 3.2.0-73.108

---------------
linux (3.2.0-73.108) precise; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
    - LP: #1396072

  [ Upstream Kernel Changes ]

  * tracing/syscalls: Fix perf syscall tracing when syscall_nr == -1
    - LP: #1392008
    - CVE-2014-7826
  * tracing/syscalls: Ignore numbers outside NR_syscalls' range
    - LP: #1392008
    - CVE-2014-7826
  * ttusb-dec: buffer overflow in ioctl
    - LP: #1395187
    - CVE-2014-8884
  * net: sctp: fix NULL pointer dereference in af->from_addr_param on
    malformed packet
    - LP: #1392820
    - CVE-2014-7841
 -- Luis Henriques <[email protected]>   Tue, 25 Nov 2014 10:15:59 
+0000

** Changed in: linux (Ubuntu Precise)
       Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-7826

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-7841

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8884

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1396072

Title:
  linux: 3.2.0-73.108 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1396072/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to