This bug was fixed in the package linux-lts-trusty -
3.13.0-109.156~precise2
---------------
linux-lts-trusty (3.13.0-109.156~precise2) precise; urgency=low
[ Thadeu Lima de Souza Cascardo ]
* Release Tracking Bug
- LP: #1663636
* linux headers packages empty (LP: #1663558)
- Revert "UBUNTU: [debian] derive indep_hdrs_pkg_name from src_pkg_name"
linux (3.13.0-109.156) trusty; urgency=low
[ Thadeu Lima de Souza Cascardo ]
* Release Tracking Bug
- LP: #1662186
[ Luis Henriques ]
* Backport Dirty COW patch to prevent wineserver freeze (LP: #1658270)
- ARM: 7985/1: mm: implement pte_accessible for faulting mappings
- ARM: 8108/1: mm: Introduce {pte,pmd}_isset and {pte,pmd}_isclear
- ARM: 8037/1: mm: support big-endian page tables
- ARM: 8109/1: mm: Modify pte_write and pmd_write logic for LPAE
- arm64: mm: Route pmd thp functions through pte equivalents
- mm: fix huge zero page accounting in smaps report
- SAUCE: mm: Respect FOLL_FORCE/FOLL_COW for thp
* kernel BUG at skbuff.h:1486 Insufficient linear data in skb
__skb_pull.part.7+0x4/0x6 [openvswitch] (LP: #1655683)
- SAUCE: openvswitch: gre: filter gre packets
* CVE-2016-7911
- block: fix use-after-free in sys_ioprio_get()
* CVE-2016-7910
- block: fix use-after-free in seq file
* Xen MSI setup code incorrectly re-uses cached pirq (LP: #1656381)
- SAUCE: xen: do not re-use pirq number cached in pci device msi msg data
-- Thadeu Lima de Souza Cascardo <[email protected]> Fri, 10 Feb
2017 13:07:26 -0200
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: Confirmed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-7910
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-7911
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1663636
Title:
linux-lts-trusty: 3.13.0-109.156~precise2 -proposed tracker
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1663636/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs