Format: 1.8 Date: Tue, 17 May 2016 13:38:22 -0700 Source: linux-ti-omap4 Binary: linux-headers-3.2.0-1481 linux-ti-omap4-tools-3.2.0-1481 linux-image-3.2.0-1481-omap4 linux-headers-3.2.0-1481-omap4 linux-image-3.2.0-1481-omap4-dbgsym Architecture: source Version: 3.2.0-1481.107 Distribution: precise Urgency: low Maintainer: Ubuntu Kernel Team Changed-By: Kamal Mostafa Description: linux-headers-3.2.0-1481 - Header files related to Linux kernel version 3.2.0 linux-headers-3.2.0-1481-omap4 - Linux kernel headers for version 3.2.0 on TI OMAP4-based systems linux-image-3.2.0-1481-omap4 - Linux kernel image for version 3.2.0 on TI OMAP4-based systems linux-image-3.2.0-1481-omap4-dbgsym - Linux kernel debug image for version 3.2.0 on TI OMAP4-based syst linux-ti-omap4-tools-3.2.0-1481 - Linux kernel tools for version 3.2.0-1481 Launchpad-Bugs-Fixed: 1556877 1556878 1556880 1556888 1558847 1561388 1561409 1561410 1561411 1561414 1568523 1572666 1575706 1578496 1578497 1580815 Changes: linux-ti-omap4 (3.2.0-1481.107) precise; urgency=low . [ Kamal Mostafa ] . * Release Tracking Bug - LP: #1580815 . [ Ubuntu: 3.2.0-103.143 ] . * USB: usbip: fix potential out-of-bounds write - LP: #1572666 - CVE-2016-3955 * x86/mm/32: Enable full randomization on i386 and X86_32 - LP: #1568523 - CVE-2016-3672 * ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk() - LP: #1561409 - CVE-2016-2184 * ALSA: usb-audio: Add sanity checks for endpoint accesses - LP: #1561409 - CVE-2016-2184 * Input: ati_remote2 - fix crashes on detecting device with invalid descriptor - LP: #1561410 - CVE-2016-2185 * Input: powermate - fix oops with malicious USB descriptors - LP: #1561411 - CVE-2016-2186 * USB: iowarrior: fix oops with malicious USB descriptors - LP: #1561414 - CVE-2016-2188 * USB: mct_u232: add sanity checking in probe - LP: #1556877 - CVE-2016-3136 * USB: cypress_m8: add endpoint sanity check - LP: #1556878 - CVE-2016-3137 * USB: cdc-acm: more sanity checking - LP: #1556880 - CVE-2016-3138 * USB: digi_acceleport: do sanity checking for the number of ports - LP: #1556888 - CVE-2016-3140 * ipv4: Don't do expensive useless work during inetdev destroy. - LP: #1558847 - CVE-2016-3156 * x86/iopl/64: Properly context-switch IOPL on Xen PV - LP: #1561388 - CVE-2016-3157 * Input: gtco - fix crash on detecting device without endpoints - LP: #1575706 - CVE-2016-2187 * net: fix infoleak in llc - LP: #1578496 - CVE-2016-4485 * net: fix infoleak in rtnetlink - LP: #1578497 - CVE-2016-4486 Checksums-Sha1: 545860392a288c3a4f811e49f8b1de0e0a5b5528 2286 linux-ti-omap4_3.2.0-1481.107.dsc a7a661fd70d4d2abebdc5830a75dbea7119d34f4 106246903 linux-ti-omap4_3.2.0-1481.107.tar.gz Checksums-Sha256: 25db8276bbbfd7a70ed9ed2315e03e0ca77a7f6e6ebfcff442a5e3b83e048619 2286 linux-ti-omap4_3.2.0-1481.107.dsc 61d2ef58598161af9727fb9157a1483aceed7deb6ca4fdbc81da15d3aa857319 106246903 linux-ti-omap4_3.2.0-1481.107.tar.gz Files: 9d560b1f46241278d740d45baa2af702 2286 devel optional linux-ti-omap4_3.2.0-1481.107.dsc 7a072572758343a577f9bb0c8171025b 106246903 devel optional linux-ti-omap4_3.2.0-1481.107.tar.gz