This bug was fixed in the package linux-ti-omap4 - 3.2.0-1457.77

---------------
linux-ti-omap4 (3.2.0-1457.77) precise; urgency=low

  * Release Tracking Bug
    - LP: #1396188

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.2.0-73.108

  [ Ubuntu: 3.2.0-73.108 ]

  * Release Tracking Bug
    - LP: #1396072
  * tracing/syscalls: Fix perf syscall tracing when syscall_nr == -1
    - LP: #1392008
    - CVE-2014-7826
  * tracing/syscalls: Ignore numbers outside NR_syscalls' range
    - LP: #1392008
    - CVE-2014-7826
  * ttusb-dec: buffer overflow in ioctl
    - LP: #1395187
    - CVE-2014-8884
  * net: sctp: fix NULL pointer dereference in af->from_addr_param on
    malformed packet
    - LP: #1392820
    - CVE-2014-7841
 -- Paolo Pisati <paolo.pis...@canonical.com>   Wed, 26 Nov 2014 16:54:41 +0100

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1392820

Title:
  CVE-2014-7841

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1392820/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to