This bug was fixed in the package linux - 4.8.0-59.64

---------------
linux (4.8.0-59.64) yakkety; urgency=low

  * linux: 4.8.0-59.64 -proposed tracker (LP: #1701019)

  * KILLER1435-S[0489:e0a2] BT cannot search BT 4.0 device (LP: #1699651)
    - Bluetooth: btusb: Add support for 0489:e0a2 QCA_ROME device

  * CVE-2017-7895
    - nfsd4: minor NFSv2/v3 write decoding cleanup
    - nfsd: stricter decoding of write-like NFSv2/v3 ops

  * CVE-2017-5551
    - tmpfs: clear S_ISGID when setting posix ACLs

  * CVE-2017-9605
    - drm/vmwgfx: Make sure backup_handle is always valid

  * CVE-2017-1000380
    - ALSA: timer: Fix race between read and ioctl
    - ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT

  * CVE-2017-9150
    - bpf: don't let ldimm64 leak map addresses on unprivileged

  * CVE-2017-5576
    - drm/vc4: Fix an integer overflow in temporary allocation layout.

  * Processes in "D" state due to zap_pid_ns_processes kernel call with Ubuntu +
    Docker (LP: #1698264)
    - pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes

  * CVE-2016-9755
    - netfilter: ipv6: nf_defrag: drop mangled skb on ream error

  * CVE-2017-7346
    - drm/vmwgfx: limit the number of mip levels in 
vmw_gb_surface_define_ioctl()

  * CVE-2017-8924
    - USB: serial: io_ti: fix information leak in completion handler

  * CVE-2017-8925
    - USB: serial: omninet: fix reference leaks at open

  * CVE-2017-9074
    - ipv6: Check ip6_find_1stfragopt() return value properly.

  * CVE-2014-9900
    - net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()

  * OpenPower: Some multipaths temporarily have only a single path
    (LP: #1696445)
    - scsi: ses: don't get power status of SES device slot on probe

 -- Thadeu Lima de Souza Cascardo <casca...@canonical.com>  Thu, 29 Jun
2017 14:34:32 -0300

** Changed in: linux (Ubuntu Yakkety)
       Status: Confirmed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-9900

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-9755

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000380

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5551

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5576

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7346

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7895

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8924

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8925

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9074

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9150

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9605

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1701019

Title:
  linux: 4.8.0-59.64 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1701019/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to