This bug was fixed in the package linux - 4.8.0-59.64
---------------
linux (4.8.0-59.64) yakkety; urgency=low
* linux: 4.8.0-59.64 -proposed tracker (LP: #1701019)
* KILLER1435-S[0489:e0a2] BT cannot search BT 4.0 device (LP: #1699651)
- Bluetooth: btusb: Add support for 0489:e0a2 QCA_ROME device
* CVE-2017-7895
- nfsd4: minor NFSv2/v3 write decoding cleanup
- nfsd: stricter decoding of write-like NFSv2/v3 ops
* CVE-2017-5551
- tmpfs: clear S_ISGID when setting posix ACLs
* CVE-2017-9605
- drm/vmwgfx: Make sure backup_handle is always valid
* CVE-2017-1000380
- ALSA: timer: Fix race between read and ioctl
- ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT
* CVE-2017-9150
- bpf: don't let ldimm64 leak map addresses on unprivileged
* CVE-2017-5576
- drm/vc4: Fix an integer overflow in temporary allocation layout.
* Processes in "D" state due to zap_pid_ns_processes kernel call with Ubuntu +
Docker (LP: #1698264)
- pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes
* CVE-2016-9755
- netfilter: ipv6: nf_defrag: drop mangled skb on ream error
* CVE-2017-7346
- drm/vmwgfx: limit the number of mip levels in
vmw_gb_surface_define_ioctl()
* CVE-2017-8924
- USB: serial: io_ti: fix information leak in completion handler
* CVE-2017-8925
- USB: serial: omninet: fix reference leaks at open
* CVE-2017-9074
- ipv6: Check ip6_find_1stfragopt() return value properly.
* CVE-2014-9900
- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()
* OpenPower: Some multipaths temporarily have only a single path
(LP: #1696445)
- scsi: ses: don't get power status of SES device slot on probe
-- Thadeu Lima de Souza Cascardo <[email protected]> Thu, 29 Jun
2017 14:34:32 -0300
** Changed in: linux (Ubuntu Yakkety)
Status: Fix Committed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-9900
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-9755
** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000380
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5551
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5576
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7346
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7895
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8924
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8925
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9074
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9150
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9605
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1699651
Title:
KILLER1435-S[0489:e0a2] BT cannot search BT 4.0 device
To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1699651/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs