* proc_keys_show crash when reading /proc/keys (LP: #1634496)
- SAUCE: KEYS: ensure xbuf is large enough to fix buffer overflow in
proc_keys_show (LP: #1634496)
* CVE-2016-7117
- net: Fix use after free in the recvmmsg exit path
* CVE-2015-7833
- usbvision: revert commit 588afcc1
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1493.120
---------------
linux-ti-omap4 (3.2.0-1493.120) precise; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1636539
[ Ubuntu: 3.2.0-115.157 ]
* CVE-2016-5195 _get_user_ pages() "
- Revert "UBUNTU:SAUCE: mm: remove gup_flags FOLL_WRITE games from
_
- mm, gup: close FOLL MAP_PRIVATE race
linux-ti-omap4 (3.2.0-1492.119) precise; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1635439
[ Ubuntu: 3.2.0-114.156 ]
* proc_keys_show crash when reading /proc/keys (LP: #1634496) keys_show (LP: #1634496)
- SAUCE: KEYS: ensure xbuf is large enough to fix buffer overflow in
proc_
* CVE-2016-7117
- net: Fix use after free in the recvmmsg exit path
* CVE-2015-7833
- usbvision: revert commit 588afcc1
-- Seth Forshee <email address hidden> Tue, 25 Oct 2016 10:40:43 -0500