This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.32

---------------
linux-ti-omap4 (2.6.35-903.32) maverick-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
    - LP: #942766

  [ Paolo Pisati ]

  * [Config] Move to a 3G/1G memory split
    - LP: #861296

linux-ti-omap4 (2.6.35-903.31) maverick-proposed; urgency=low

  * Release Tracking Bug
    - LP: #932237

  [ Upstream Kernel Changes ]

  * net: ip_expire() must revalidate route
    - LP: #922051
    - CVE-2011-1927
  * inotify: stop kernel memory leak on file creation failure
    - LP: #917797
    - CVE-2010-4250
  * inotify: fix double free/corruption of stuct user
    - LP: #869203
    - CVE-2011-1479
  * fuse: verify ioctl retries
    - LP: #917804
    - CVE-2010-4650
  * ima: fix add LSM rule bug
    - LP: #917808
    - CVE-2011-0006
  * bridge: Fix mglist corruption that leads to memory corruption
    - LP: #917813
    - CVE-2011-0716
  * sound/oss: remove offset from load_patch callbacks
    - LP: #925337
    - CVE-2011-1476
  * ARM: 6891/1: prevent heap corruption in OABI semtimedop
    - LP: #925373
    - CVE-2011-1759
  * sound/oss/opl3: validate voice and channel indexes
    - LP: #925335
    - CVE-2011-1477
  * Fix for buffer overflow in ldm_frag_add not sufficient
    - LP: #922371
    - CVE-2011-2182
  * AppArmor: fix oops in apparmor_setprocattr
    - LP: #789409
    - CVE-2011-3619
 -- Herton Ronaldo Krzesinski <herton.krzesin...@canonical.com>   Tue, 28 Feb 
2012 14:33:28 -0300

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
       Status: Confirmed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4250

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4650

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-0006

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-0716

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1476

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1477

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1479

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1759

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1927

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2182

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3619

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/942766

Title:
  linux-ti-omap4: 2.6.35-903.32 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/942766/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to