*** This bug is a duplicate of bug 1704982 *** https://bugs.launchpad.net/bugs/1704982
This bug was fixed in the package linux - 4.4.0-87.110 --------------- linux (4.4.0-87.110) xenial; urgency=low * linux: 4.4.0-87.110 -proposed tracker (LP: #1704982) * CVE-2017-1000364 - mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack - mm/mmap.c: expand_downwards: don't require the gap if !vm_prev * CIFS causes oops (LP: #1704857) - CIFS: Fix null pointer deref during read resp processing - CIFS: Fix some return values in case of error in 'crypt_message' -- Kleber Sacilotto de Souza <kleber.so...@canonical.com> Tue, 18 Jul 2017 13:58:43 +0200 ** Changed in: linux (Ubuntu Xenial) Status: New => Fix Released ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000364 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1701024 Title: linux: 4.4.0-84.107 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1701024/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs