This bug was fixed in the package linux - 3.2.0-115.157
--------------- linux (3.2.0-115.157) precise; urgency=low
[ Seth Forshee ]
* Release Tracking Bug - LP: #1636537
* CVE-2016-5195 - Revert "UBUNTU:SAUCE: mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" - mm, gup: close FOLL MAP_PRIVATE race
linux (3.2.0-114.156) precise; urgency=low
* Release Tracking Bug - LP: #1635436
* proc_keys_show crash when reading /proc/keys (LP: #1634496) - SAUCE: KEYS: ensure xbuf is large enough to fix buffer overflow in proc_keys_show (LP: #1634496)
* CVE-2016-7117 - net: Fix use after free in the recvmmsg exit path
* CVE-2015-7833 - usbvision: revert commit 588afcc1
-- Seth Forshee <email address hidden> Tue, 25 Oct 2016 09:58:32 -0500
This bug was fixed in the package linux - 3.2.0-115.157
---------------
linux (3.2.0-115.157) precise; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1636537
* CVE-2016-5195 _get_user_ pages() "
- Revert "UBUNTU:SAUCE: mm: remove gup_flags FOLL_WRITE games from
_
- mm, gup: close FOLL MAP_PRIVATE race
linux (3.2.0-114.156) precise; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1635436
* proc_keys_show crash when reading /proc/keys (LP: #1634496) keys_show (LP: #1634496)
- SAUCE: KEYS: ensure xbuf is large enough to fix buffer overflow in
proc_
* CVE-2016-7117
- net: Fix use after free in the recvmmsg exit path
* CVE-2015-7833
- usbvision: revert commit 588afcc1
-- Seth Forshee <email address hidden> Tue, 25 Oct 2016 09:58:32 -0500