[Kernel-packages] [Bug 1573062] Re: memory_stress_ng failing for IBM Power S812LC(TN71-BP012) for 16.04

2016-06-27 Thread Michael Ellerman
Thanks.

I see very little left between good and bad which could explain the bug
going away. So I'm wondering if the bisect has gone off the rails.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1573062

Title:
  memory_stress_ng failing for IBM Power S812LC(TN71-BP012) for 16.04

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Wily:
  In Progress
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Yakkety:
  In Progress

Bug description:
  memory_stress_ng, as part of server certification is failing for IBM
  Power S812LC(TN71-BP012) in bare metal mode. Failing in this case is
  defined by the test locking up the server in an unrecoverable state
  which only a reboot will fix.

  I will be attaching screen and kern logs for the failures and a
  successful run on 14.04 on the same server.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1573062/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1596791] [NEW] /usr/lib/bluetooth/bluetoothd:*** Error in `/usr/lib/bluetooth/bluetoothd': double free or corruption (out): ADDR ***

2016-06-27 Thread errors.ubuntu.com bug bridge
Public bug reported:

The Ubuntu Error Tracker has been receiving reports about a problem
regarding bluez.  This problem was most recently seen with version
5.37-0ubuntu5, the problem page at
https://errors.ubuntu.com/problem/2f3495bc3150aeabb5e60969cd2b856f8627b35f
contains more details.

** Affects: bluez (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: wily xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1596791

Title:
  /usr/lib/bluetooth/bluetoothd:*** Error in
  `/usr/lib/bluetooth/bluetoothd': double free or corruption (out): ADDR
  ***

Status in bluez package in Ubuntu:
  New

Bug description:
  The Ubuntu Error Tracker has been receiving reports about a problem
  regarding bluez.  This problem was most recently seen with version
  5.37-0ubuntu5, the problem page at
  https://errors.ubuntu.com/problem/2f3495bc3150aeabb5e60969cd2b856f8627b35f
  contains more details.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1596791/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1589886] Re: Wireless hotkey fails on Dell XPS 15 9550

2016-06-27 Thread Alex Hung
New kernel includes a new driver intel-hid that handles wireless hotkey;
however this is not yet available in xenial kernel.

** Changed in: linux (Ubuntu)
 Assignee: (unassigned) => Alex Hung (alexhung)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1589886

Title:
  Wireless hotkey fails on Dell XPS 15 9550

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Title: Wireless hotkey fails on Dell XPS 15 9550

  Summary:
  Wireless key does nothing on Dell XPS 15 9550.

  Observing "watch -n1 rfkill list", nothing changes when pressing wireless 
hotkey (Fn + PrtScr)
  Only message in /var/log/kern.log:
  kernel: [10909.979019] dell_wmi: Unknown key 153 pressed

  Steps: 1. Pressing wireless hotkey (Fn + PrtScr)

  Expected results: Wireless hotkey could disable/enable wireless
  devices

  Actual results: Wireless hotkey does nothing

  Additional information:
  Wifi card:
  Device:   02:00.0
  Class:Network controller [0280]
  Vendor:   Broadcom Corporation [14e4]
  Device:   BCM43602 802.11ac Wireless LAN SoC [43ba]
  SVendor:  Dell [1028]
  SDevice:  BCM43602 802.11ac Wireless LAN SoC [0020]
  Rev:  01

  CPU: Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz (8x)

  GPU: 00:02.0 VGA compatible controller: Intel Corporation HD Graphics
  530 (rev 06)

  Manufacturer: Dell

  ProductName: XPS 15 9550

  BiosVersion: 01.02.00

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1589886/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1573062] Re: memory_stress_ng failing for IBM Power S812LC(TN71-BP012) for 16.04

2016-06-27 Thread Joseph Salisbury
Commit failed:
89f081730c49a1d3b46359aa0054e6b3b80f47e4

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1573062

Title:
  memory_stress_ng failing for IBM Power S812LC(TN71-BP012) for 16.04

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Wily:
  In Progress
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Yakkety:
  In Progress

Bug description:
  memory_stress_ng, as part of server certification is failing for IBM
  Power S812LC(TN71-BP012) in bare metal mode. Failing in this case is
  defined by the test locking up the server in an unrecoverable state
  which only a reboot will fix.

  I will be attaching screen and kern logs for the failures and a
  successful run on 14.04 on the same server.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1573062/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1573062] Re: memory_stress_ng failing for IBM Power S812LC(TN71-BP012) for 16.04

2016-06-27 Thread Joseph Salisbury
Current "REVERSE" bisect log:

git bisect start
# good: [b562e44f507e863c6792946e4e1b1449fbbac85d] Linux 4.5
git bisect good b562e44f507e863c6792946e4e1b1449fbbac85d
# bad: [f55532a0c0b8bb6148f4e07853b876ef73bc69ca] Linux 4.6-rc1
git bisect bad f55532a0c0b8bb6148f4e07853b876ef73bc69ca
# good: [6b5f04b6cf8ebab9a65d9c0026c650bb2538fd0f] Merge branch 'for-4.6' of 
git://git.kernel.org/pub/scm/linux/kernel/git/tj/cgroup
git bisect good 6b5f04b6cf8ebab9a65d9c0026c650bb2538fd0f
# good: [53d2e6976bd4042672ed7b90dfbf4b31635b7dcf] Merge tag 
'xfs-for-linus-4.6-rc1' of 
git://git.kernel.org/pub/scm/linux/kernel/git/dgc/linux-xfs
git bisect good 53d2e6976bd4042672ed7b90dfbf4b31635b7dcf
# good: [2e11590171683c6b12193fe4b0ede1e6201b7f45] staging: fsl-mc: fix 
incorrect type passed to dev_err macros
git bisect good 2e11590171683c6b12193fe4b0ede1e6201b7f45
# good: [5a010c73cdb760c9bdf37b28824b6566789cc005] Merge tag 
'platform-drivers-x86-v4.6-1' of 
git://git.infradead.org/users/dvhart/linux-platform-drivers-x86
git bisect good 5a010c73cdb760c9bdf37b28824b6566789cc005
# good: [8f40842e4260f73792c156aded004197a19135ee] Merge tag 
'for-linus-20160324' of git://git.infradead.org/linux-mtd
git bisect good 8f40842e4260f73792c156aded004197a19135ee
# good: [45996492e5c85aa0ac93a95d1b2d1ed56851c865] orangefs: fix 
orangefs_superblock locking
git bisect good 45996492e5c85aa0ac93a95d1b2d1ed56851c865
# good: [d9dddbf556674bf125ecd925b24e43a5cf2a568a] mm/page_alloc: prevent 
merging between isolated and other pageblocks
git bisect good d9dddbf556674bf125ecd925b24e43a5cf2a568a
# good: [895a1067d5b83065afbad3bb02c3c464b71f1b3f] Merge tag 'scsi-misc' of 
git://git.kernel.org/pub/scm/linux/kernel/git/jejb/scsi
git bisect good 895a1067d5b83065afbad3bb02c3c464b71f1b3f
# good: [89f081730c49a1d3b46359aa0054e6b3b80f47e4] libceph: use sizeof_footer() 
more
git bisect good 89f081730c49a1d3b46359aa0054e6b3b80f47e4

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1573062

Title:
  memory_stress_ng failing for IBM Power S812LC(TN71-BP012) for 16.04

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Wily:
  In Progress
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Yakkety:
  In Progress

Bug description:
  memory_stress_ng, as part of server certification is failing for IBM
  Power S812LC(TN71-BP012) in bare metal mode. Failing in this case is
  defined by the test locking up the server in an unrecoverable state
  which only a reboot will fix.

  I will be attaching screen and kern logs for the failures and a
  successful run on 14.04 on the same server.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1573062/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1580444] Re: Can't plug in USB audio device "TEAC AI-101 Audio"

2016-06-27 Thread rob
I have the same problem on Ubuntu 16.04

My ChromeOS device running itss own flavor of Linux has not problem
using the device.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to alsa-lib in Ubuntu.
https://bugs.launchpad.net/bugs/1580444

Title:
  Can't plug in USB audio device "TEAC AI-101 Audio"

Status in alsa-lib package in Ubuntu:
  New

Bug description:
  I can't use this device; it shows up in dmesg, but it seems that
  systemd hangs when trying to use udev to configure it. The important
  message (I think) is:

  usb 3-1: 13:0: cannot get min/max values for control 2 (id 13)

  AND, here is from syslog:
  May 10 23:46:59 dude systemd-udevd[302]: worker [5911] terminated by signal 9 
(Killed)
  May 10 23:46:59 dude systemd-udevd[302]: worker [5911] failed while handling 
'/devices/pci:00/:00:1a.0/usb3/3-1/3-1:1.0/sound/card3/controlC3'
  May 10 23:47:19 dude kernel: [114738.341243] usb 3-1: 13:0: cannot get 
min/max values for control 2 (id 13)

  ...

  I tried to use alsactl to force an init of this card; the very long
  log is attached.

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: libasound2 1.1.0-0ubuntu1
  ProcVersionSignature: Ubuntu 4.4.0-22.39-generic 4.4.8
  Uname: Linux 4.4.0-22-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2
  Architecture: amd64
  Date: Wed May 11 00:11:40 2016
  Dependencies:
   gcc-6-base 6.0.1-0ubuntu1
   libasound2-data 1.1.0-0ubuntu1
   libc6 2.23-0ubuntu3
   libgcc1 1:6.0.1-0ubuntu1
  InstallationDate: Installed on 2015-05-28 (348 days ago)
  InstallationMedia: Ubuntu-Server 15.04 "Vivid Vervet" - Release amd64 
(20150422)
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  SourcePackage: alsa-lib
  UpgradeStatus: Upgraded to xenial on 2016-05-09 (1 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/alsa-lib/+bug/1580444/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1589139] Re: [HP Pavilion dv6-6b52sl Entertainment Notebook PC] No suspend on Ubuntu 16.04

2016-06-27 Thread cascagrossa
Finally after upgrading today to Ubuntu Kernel 4.4.0-28.47, equivalent
to Mainline Kernel 4.4.13, suspend/resume works out of the box, no
special kernel parameters nor rc.local commands needed.

ATI discrete graphics starts DinOff but can be used when desired.

DRI_PRIME=1 glxinfo | grep "OpenGL renderer"
OpenGL renderer string: Gallium 0.4 on AMD HAINAN (DRM 2.43.0, LLVM 3.8.0)

glxinfo | grep "OpenGL renderer"
OpenGL renderer string: Mesa DRI Intel(R) Haswell Mobile

Dell Inspiron 15R 5537.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1589139

Title:
  [HP Pavilion dv6-6b52sl Entertainment Notebook PC] No suspend on
  Ubuntu 16.04

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When i try to suspend the system the screen turns off, the PC becomes
  really hot(the fan won't stop working) and i'm not able to do anything
  after this. The only option is to hard-press the power button to turn
  it off.

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-22-generic 4.4.0-22.40
  ProcVersionSignature: Ubuntu 4.4.0-22.40-generic 4.4.8
  Uname: Linux 4.4.0-22-generic x86_64
  NonfreeKernelModules: wl
  ApportVersion: 2.20.1-0ubuntu2.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  isgjevori   1922 F pulseaudio
  CurrentDesktop: Unity
  Date: Sat Jun  4 21:16:29 2016
  HibernationDevice: RESUME=UUID=adbe72f6-5838-4cbc-90fa-8976d46f10af
  InstallationDate: Installed on 2016-04-21 (43 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  MachineType: Hewlett-Packard HP Pavilion dv6 Notebook PC
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-22-generic 
root=UUID=03a1d74a-7657-4df3-a6cc-b1adc563b16f ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-4.4.0-22-generic N/A
   linux-backports-modules-4.4.0-22-generic  N/A
   linux-firmware1.157
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 08/10/2011
  dmi.bios.vendor: Hewlett-Packard
  dmi.bios.version: F.01
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: 17FD
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: 10.31
  dmi.chassis.asset.tag: Chassis Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnHewlett-Packard:bvrF.01:bd08/10/2011:svnHewlett-Packard:pnHPPaviliondv6NotebookPC:pvr05931120461620100:rvnHewlett-Packard:rn17FD:rvr10.31:cvnHewlett-Packard:ct10:cvrChassisVersion:
  dmi.product.name: HP Pavilion dv6 Notebook PC
  dmi.product.version: 05931120461620100
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1589139/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1566302] Re: Ubuntu 16.04: Suspend freezes the system after upgrade to linux image 4.4.0-16

2016-06-27 Thread cascagrossa
Finally after upgrading today to Ubuntu Kernel 4.4.0-28.47, equivalent
to Mainline Kernel 4.4.13, suspend/resume works out of the box, no
special kernel parameters nor rc.local commands needed.

ATI discrete graphics starts DinOff but can be used when desired.

DRI_PRIME=1 glxinfo | grep "OpenGL renderer"
OpenGL renderer string: Gallium 0.4 on AMD HAINAN (DRM 2.43.0, LLVM 3.8.0)

glxinfo | grep "OpenGL renderer"
OpenGL renderer string: Mesa DRI Intel(R) Haswell Mobile

Dell Inspiron 15R 5537.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1566302

Title:
  Ubuntu 16.04: Suspend freezes the system after upgrade to linux image
  4.4.0-16

Status in linux package in Ubuntu:
  Won't Fix

Bug description:
  I'm using ubuntu 16.04 on a XPS 15 9550.

  Suspend/resume worked flawlessly with linux image 4.4.0-15, and after
  standard upgrade yesterday (5/04/2016) which installed image 4.4.0-16,
  the system freezes when attempting a suspend. I get  no response from
  the system (nor keyboard, nor screen, nor touchpad), but it gets very
  hot, so that it must be running something.

  Booting with 4.4.0-15 makes the suspend to work perfectly.

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-extra-4.4.0-16-generic 4.4.0-16.32
  ProcVersionSignature: Ubuntu 4.4.0-15.31-generic 4.4.6
  Uname: Linux 4.4.0-15-generic x86_64
  ApportVersion: 2.20.1-0ubuntu1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  macias 1770 F pulseaudio
  CurrentDesktop: X-Cinnamon
  Date: Tue Apr  5 14:56:17 2016
  HibernationDevice: RESUME=UUID=4180adfa-3852-4a96-86b4-f3696448c743
  InstallationDate: Installed on 2016-03-07 (28 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Alpha amd64 (20160304)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 003: ID 04f3:21d5 Elan Microelectronics Corp. 
   Bus 001 Device 002: ID 0a5c:6410 Broadcom Corp. 
   Bus 001 Device 004: ID 1bcf:2b95 Sunplus Innovation Technology Inc. 
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Dell Inc. XPS 15 9550
  ProcEnviron:
   LANGUAGE=es_ES
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=es_ES.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-15-generic.efi.signed 
root=UUID=673f4658-75f8-4c01-bcd8-0af860269699 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-4.4.0-15-generic N/A
   linux-backports-modules-4.4.0-15-generic  N/A
   linux-firmware1.157
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 01/25/2016
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: 01.01.19
  dmi.board.name: 0N7TVV
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvr01.01.19:bd01/25/2016:svnDellInc.:pnXPS159550:pvr:rvnDellInc.:rn0N7TVV:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: XPS 15 9550
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1566302/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1596635] Re: KVM system crashes after starting guest

2016-06-27 Thread Tim Gardner
https://lists.ubuntu.com/archives/kernel-team/2016-June/078637.html

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Tim Gardner (timg-tpi)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1596635

Title:
  KVM system crashes after starting guest

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Xenial:
  In Progress

Bug description:
  == Comment: #0 - Chanh H. Nguyen - 2016-06-25 00:24:28 ==
  We have Ubuntun 16.04.1 version on our SuperMicro system and some of the 
virtual packages installed. Define a guest with a pci passthrough is fine but 
then system crashes at xhci_irq+0x1bc/0xf50 after we start the guest

  7c:mon> e
  cpu 0x7c: Vector: 300 (Data Access) at [c01e1b80f760]
  pc: c088217c: xhci_irq+0x1bc/0xf50
  lr: c0882050: xhci_irq+0x90/0xf50
  sp: c01e1b80f9e0
 msr: 900102009033
 dar: 28
   dsisr: 4000
current = 0xc01e1bc82a20
paca= 0xc7b89a00 softe: 0irq_happened: 0x01
  pid   = 4026, comm = libvirtd
  7c:mon> t
  [c01e1b80fb00] c080ebb0 usb_hcd_irq+0x50/0xa0
  [c01e1b80fb30] c082af58 usb_hcd_pci_remove+0x68/0x1c0
  [c01e1b80fb70] c088a118 xhci_pci_remove+0x78/0xb0
  [c01e1b80fba0] c05e54b0 pci_device_remove+0x70/0x110
  [c01e1b80fbe0] c06d1550 __device_release_driver+0xc0/0x190
  [c01e1b80fc10] c06d1660 device_release_driver+0x40/0x70
  [c01e1b80fc40] c06cf860 unbind_store+0x170/0x1b0
  [c01e1b80fc80] c06ce1d4 drv_attr_store+0x64/0xa0
  [c01e1b80fcc0] c03978d0 sysfs_kf_write+0x80/0xb0
  [c01e1b80fd00] c03967e8 kernfs_fop_write+0x188/0x200
  [c01e1b80fd50] c02e126c __vfs_write+0x6c/0xe0
  [c01e1b80fd90] c02e1fa0 vfs_write+0xc0/0x230
  [c01e1b80fde0] c02e2fdc SyS_write+0x6c/0x110
  [c01e1b80fe30] c0009204 system_call+0x38/0xb4
  --- Exception: c01 (System Call) at 3fff7f6e6708
  SP (3fff7abfd520) is in userspace
  7c:mon> r
  R00 = c0882050   R16 = 3fff7a40
  R01 = c01e1b80f9e0   R17 = c0df4200
  R02 = c15b4200   R18 = c0b84200
  R03 = d80081560024   R19 = c0de4200
  R04 = c488   R20 = 0001
  R05 = c4884000   R21 = 3fff5400565d
  R06 = c4884000   R22 = 3fff5875aa80
  R07 = 003e   R23 = 3fff7fa914e0
  R08 =    R24 = 3fff7fa90b90
  R09 = 0006   R25 = c0df4200
  R10 =    R26 = c01e1b80fe00
  R11 = 0006   R27 = c01e3a2d1698
  R12 = c0881fc0   R28 = c1550f98
  R13 = c7b89a00   R29 = c4880260
  R14 =    R30 = c48802ac
  R15 =    R31 = c488
  pc  = c088217c xhci_irq+0x1bc/0xf50
  cfar= c0008468 slb_miss_realmode+0x50/0x78
  lr  = c0882050 xhci_irq+0x90/0xf50
  msr = 900102009033   cr  = 28028882
  ctr = c0881fc0   xer =    trap =  300
  dar = 0028   dsisr = 4000
  7c:mon> d c0b000f0
  c0b000f0 4c696e7578207665 7273696f6e20342e  |Linux version 4.|
  c0b00100 342e302d32342d67 656e657269632028  |4.0-24-generic (|
  c0b00110 6275696c64644062 6f7330312d707063  |buildd@bos01-ppc|
  c0b00120 3634656c2d303233 2920286763632076  |64el-023) (gcc v|

  == Comment: #9 - Gabriel Krisman Bertazi  - 2016-06-27 08:43:33 ==

  (In reply to comment #0)
  > We have Ubuntun 16.04.1 version on our SuperMicro system and some of the
  > virtual packages installed. Define a guest with a pci passthrough is fine
  > but then system crashes at xhci_irq+0x1bc/0xf50 after we start the guest
  > 
  > 7c:mon> e
  > cpu 0x7c: Vector: 300 (Data Access) at [c01e1b80f760]
  > pc: c088217c: xhci_irq+0x1bc/0xf50
  > lr: c0882050: xhci_irq+0x90/0xf50
  > sp: c01e1b80f9e0
  >msr: 900102009033
  >dar: 28
  >  dsisr: 4000
  >   current = 0xc01e1bc82a20
  >   paca= 0xc7b89a00   softe: 0irq_happened: 0x01
  > pid   = 4026, comm = libvirtd

  Hi,

  From a quick look, it seems you are missing this commit:

  commit 27a41a83ec54d0edfcaf079310244e7f013a7701
  Author: Gabriel Krisman Bertazi 
  Date:   Wed Jun 1 18:09:07 2016 +0300

  xhci: Cleanup only when releasing primary hcd

  ==

  Canonical,

  Please backport to 16.04.01

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1596635/+subscriptions

-- 
Mailing list: 

[Kernel-packages] [Bug 1591329] Re: linux: 3.2.0-105.146 -proposed tracker

2016-06-27 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.2.0-105.146 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  derivative-trackers-created: true
  phase: Promoted to proposed
  proposed-announcement-sent: true
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Monday, 27. June 2016 22:01 UTC

** Description changed:

  This bug is for tracking the 3.2.0-105.146 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  derivative-trackers-created: true
- phase: Promoted to proposed
+ phase: Released
  proposed-announcement-sent: true
- kernel-stable-phase:Released
- kernel-stable-phase-changed:Monday, 27. June 2016 22:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1591329

Title:
  linux: 3.2.0-105.146 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-105.146 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  derivative-trackers-created: true
  phase: Released
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591329/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1594754] Re: Memory corruption detected in low memory

2016-06-27 Thread Edu
Just to clarify, It keeps happening with latest kernel and it doesn't
seem related to suspending the screen as I previously tought. Normally
I'm using chromium browser intensively with some 3D acceleration
settings enabled.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1594754

Title:
  Memory corruption detected in low memory

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  This is the same bug as #1440419 (expired). I ran 
  ubuntu-bug linux
  as asked in the original bug. 
  The laptop is a similar model: HP Stream Notebook - 11-d015ns.

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-24-generic 4.4.0-24.43
  ProcVersionSignature: Ubuntu 4.4.0-24.43-generic 4.4.10
  Uname: Linux 4.4.0-24-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  edu 848 F lxpanel
  CurrentDesktop: LXDE
  Date: Tue Jun 21 12:12:30 2016
  HibernationDevice: RESUME=UUID=d2ff8775-73e1-44de-bcda-65af85c2aef3
  InstallationDate: Installed on 2016-05-07 (44 days ago)
  InstallationMedia: Lubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  MachineType: Hewlett-Packard HP Stream Notebook PC 11
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-24-generic.efi.signed 
root=UUID=1d855260-912a-4c9d-89d2-fd17abbaf321 ro quiet splash zswap.enabled=1 
vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-4.4.0-24-generic N/A
   linux-backports-modules-4.4.0-24-generic  N/A
   linux-firmware1.157
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 12/26/2014
  dmi.bios.vendor: Insyde
  dmi.bios.version: F.08
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: 8023
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: 54.12
  dmi.chassis.asset.tag: Chassis Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnInsyde:bvrF.08:bd12/26/2014:svnHewlett-Packard:pnHPStreamNotebookPC11:pvrType1-ProductConfigId:rvnHewlett-Packard:rn8023:rvr54.12:cvnHewlett-Packard:ct10:cvrChassisVersion:
  dmi.product.name: HP Stream Notebook PC 11
  dmi.product.version: Type1 - ProductConfigId
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1594754/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1555338] Re: Linux netfilter IPT_SO_SET_REPLACE memory corruption

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.4.0-1016.22

---
linux-raspi2 (4.4.0-1016.22) xenial; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595881

  * Rebase against Ubuntu-4.4.0-28.47

  [ Ubuntu: 4.4.0-28.47 ]

  * Release Tracking Bug
- LP: #1595874
  * Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to non-existent next rule
- netfilter: x_tables: validate targets of jumps
- netfilter: x_tables: add and use xt_check_entry_offsets
- netfilter: x_tables: kill check_entry helper
- netfilter: x_tables: assert minimum target size
- netfilter: x_tables: add compat version of xt_check_entry_offsets
- netfilter: x_tables: check standard target size too
- netfilter: x_tables: check for bogus target offset
- netfilter: x_tables: validate all offsets and sizes in a rule
- netfilter: x_tables: don't reject valid target size on some architectures
- netfilter: arp_tables: simplify translate_compat_table args
- netfilter: ip_tables: simplify translate_compat_table args
- netfilter: ip6_tables: simplify translate_compat_table args
- netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- netfilter: x_tables: do compat validation via translate_table
- netfilter: x_tables: introduce and use xt_copy_counters_from_user
  * Linux netfilter IPT_SO_SET_REPLACE memory corruption (LP: #1555338)
- netfilter: x_tables: validate e->target_offset early
- netfilter: x_tables: make sure e->next_offset covers remaining blob size
- netfilter: x_tables: fix unconditional helper

linux-raspi2 (4.4.0-1015.19) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1594928

  [ Ubuntu: 4.4.0-27.46 ]

  * Support Edge Gateway's Bluetooth LED (LP: #1512999)
- Revert "UBUNTU: SAUCE: Bluetooth: Support for LED on Marvell modules"

linux-raspi2 (4.4.0-1014.18) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1594478

  [ Ubuntu: 4.4.0-26.45 ]

  * linux: Implement secure boot state variables (LP: #1593075)
- SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
  * failures building userspace packages that include ethtool.h (LP: #1592930)
- ethtool.h: define INT_MAX for userland

linux-raspi2 (4.4.0-1013.17) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591461

  [ Ubuntu: 4.4.0-25.44 ]

  * Xenial update to v4.4.13 stable release (LP: #1590455)
- MIPS64: R6: R2 emulation bugfix
- MIPS: math-emu: Fix jalr emulation when rd == $0
- MIPS: MSA: Fix a link error on `_init_msa_upper' with older GCC
- MIPS: Don't unwind to user mode with EVA
- MIPS: Avoid using unwind_stack() with usermode
- MIPS: Fix siginfo.h to use strict posix types
- MIPS: Fix uapi include in exported asm/siginfo.h
- MIPS: Fix watchpoint restoration
- MIPS: Flush highmem pages in __flush_dcache_page
- MIPS: Handle highmem pages in __update_cache
- MIPS: Sync icache & dcache in set_pte_at
- MIPS: ath79: make bootconsole wait for both THRE and TEMT
- MIPS: Reserve nosave data for hibernation
- MIPS: Loongson-3: Reserve 32MB for RS780E integrated GPU
- MIPS: Use copy_s.fmt rather than copy_u.fmt
- MIPS: Fix MSA ld_*/st_* asm macros to use PTR_ADDU
- MIPS: Prevent "restoration" of MSA context in non-MSA kernels
- MIPS: Disable preemption during prctl(PR_SET_FP_MODE, ...)
- MIPS: ptrace: Fix FP context restoration FCSR regression
- MIPS: ptrace: Prevent writes to read-only FCSR bits
- MIPS: Fix sigreturn via VDSO on microMIPS kernel
- MIPS: Build microMIPS VDSO for microMIPS kernels
- MIPS: lib: Mark intrinsics notrace
- MIPS: VDSO: Build with `-fno-strict-aliasing'
- affs: fix remount failure when there are no options changed
- ASoC: ak4642: Enable cache usage to fix crashes on resume
- Input: uinput - handle compat ioctl for UI_SET_PHYS
- ARM: mvebu: fix GPIO config on the Linksys boards
- ARM: dts: at91: fix typo in sama5d2 PIN_PD24 description
- ARM: dts: exynos: Add interrupt line to MAX8997 PMIC on exynos4210-trats
- ARM: dts: imx35: restore existing used clock enumeration
- ath9k: Add a module parameter to invert LED polarity.
- ath9k: Fix LED polarity for some Mini PCI AR9220 MB92 cards.
- ath10k: fix debugfs pktlog_filter write
- ath10k: fix firmware assert in monitor mode
- ath10k: fix rx_channel during hw reconfigure
- ath10k: fix kernel panic, move arvifs list head init before htt init
- ath5k: Change led pin configuration for compaq c700 laptop
- hwrng: exynos - Fix unbalanced PM runtime put on timeout error path
- rtlwifi: rtl8723be: Add antenna select module parameter
- rtlwifi: btcoexist: Implement antenna selection
- rtlwifi: Fix logic error in enter/exit power-save mode
- rtlwifi: pci: use 

[Kernel-packages] [Bug 1583357] Re: [Hyper-V] Rebase Hyper-V to 4.6 kernel

2016-06-27 Thread Joshua R. Poulson
Despite my escalation, this does not appear to be in 4.4.0-28.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1583357

Title:
  [Hyper-V] Rebase Hyper-V to 4.6 kernel

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  In Progress

Bug description:
  Please rebase Hyper-V support to the final v4.6 upstream kernel.

  The following files comprise Hyper-V support in the upstream kernel:
  arch/x86/kernel/cpu/mshyperv.c
  arch/x86/include/asm/mshyperv.h
  arch/x86/include/uapi/asm/hyperv.h
  include/linux/hyperv.h
  drivers/hv/channel.c
  drivers/hv/channel_mgmt.c
  drivers/hv/connection.c
  drivers/hv/hv_balloon.c
  drivers/hv/hv.c
  drivers/hv/hv_fcopy.c
  drivers/hv/hv_kvp.c
  drivers/hv/hv_snapshot.c
  drivers/hv/hv_util.c
  drivers/hv/hv_utils_transport.c
  drivers/hv/hv_utils_transport.h
  drivers/hv/hyperv_vmbus.h
  drivers/hv/ring_buffer.c
  drivers/hv/vmbus_drv.c
  tools/hv/hv_fcopy_daemon.c
  tools/hv/hv_get_dhcp_info.sh
  tools/hv/hv_get_dns_info.sh
  tools/hv/hv_kvp_daemon.c
  tools/hv/hv_set_ifconfig.sh
  tools/hv/hv_vss_daemon.c
  tools/hv/lsvmbus
  drivers/input/serio/hyperv-keyboard.c
  drivers/net/hyperv/hyperv_net.h
  drivers/net/hyperv/netvsc.c
  drivers/net/hyperv/netvsc_drv.c
  drivers/net/hyperv/rndis_filter.c
  drivers/scsi/storvsc_drv.c
  drivers/hid/hid-hyperv.c
  drivers/pci/host/pci-hyperv.c
  drivers/video/fbdev/hyperv_fb.c

  While I know a number of post-4.4 commits are already committed, I am
  including all of the commits from 4.4 to 4.6 for reference:

  mshyperv.c : commit 1e2ae9ec072f3b7887f456426bc2cf23b80f661a : 
x86/hyperv: Avoid reporting bogus NMI status for Gen2 instances
  mshyperv.c : commit 1b74dde7c47c19a73ea3e9fac95ac27b5d3d50c5 : x86/cpu: 
Convert printk(KERN_ ...) to pr_(...)
  hyperv.h : commit 45870a441361d1c05a5f767c4ece2f6e30e0da9c : Drivers: hv: 
ring_buffer: remove stray smp_read_barrier_depends()
  hyperv.h : commit e8d6ca023efce3bd80050dcd9e708ee3cf8babd4 : Drivers: hv: 
vmbus: define the new offer type for Hyper-V socket (hvsock)
  hyperv.h : commit 5c23a1a5c60b0f472cfa61cd7d8279f8aaeb5b64 : Drivers: hv: 
vmbus: define a new VMBus message type for hvsock
  hyperv.h : commit 499e8401a515d04daa986b995da710d2b9737764 : Drivers: hv: 
vmbus: add a per-channel rescind callback
  hyperv.h : commit 3c75354d043ad546148d6992e40033ecaefc5ea5 : Drivers: hv: 
vmbus: add a helper function to set a channel's pending send size
  hyperv.h : commit 8981da320a11217589aa3c50f9e891bcdef07ece : Drivers: hv: 
vmbus: add a hvsock flag in struct hv_driver
  hyperv.h : commit b9830d120cbe155863399f25eaef6aa8353e767f : Drivers: hv: 
util: Pass the channel information during the init call
  channel.c : commit 63d55b2aeb5e4faa170316fee73c3c47ea9268c7 : Drivers: 
hv: vmbus: serialize process_chn_event() and vmbus_close_internal()
  channel.c : commit 5c23a1a5c60b0f472cfa61cd7d8279f8aaeb5b64 : Drivers: 
hv: vmbus: define a new VMBus message type for hvsock
  channel.c : commit fe760e4d64fe5c17c39e86c410d41f6587ee88bc : Drivers: 
hv: vmbus: Give control over how the ring access is serialized
  channel.c : commit 8599846d73997cdbccf63f23394d871cfad1e5e6 : Drivers: 
hv: vmbus: Fix a Host signaling bug
  channel_mgmt.c : commit fe760e4d64fe5c17c39e86c410d41f6587ee88bc : 
Drivers: hv: vmbus: Give control over how the ring access is serialized
  channel_mgmt.c : commit 79fd8e706637a5c7c41f9498fe0fbfb437abfdc8 : 
Drivers: hv: vmbus: avoid infinite loop in init_vp_index()
  channel_mgmt.c : commit 75ff3a8a9168df750b5bd0589e897a6c0517a9f1 : 
Drivers: hv: vmbus: avoid wait_for_completion() on crash
  channel_mgmt.c : commit 5c23a1a5c60b0f472cfa61cd7d8279f8aaeb5b64 : 
Drivers: hv: vmbus: define a new VMBus message type for hvsock
  connection.c : commit d6f591e339d23f434efda11917da511870891472 : Drivers: 
hv: vmbus: channge vmbus_connection.channel_lock to mutex
  connection.c : commit 75ff3a8a9168df750b5bd0589e897a6c0517a9f1 : Drivers: 
hv: vmbus: avoid wait_for_completion() on crash
  connection.c : commit 1b807e1011af46a595ba46c75ad5e20ad7177af7 : Drivers: 
hv: vmbus: Cleanup vmbus_set_event()
  hv.c : commit a108393dbf764efb2405f21ca759806c65b8bc16 : drivers:hv: 
Export the API to invoke a hypercall on Hyper-V
  hv.c : commit c35b82ef0294ae5052120615f5cfcef17c5a6bf7 : drivers/hv: 
correct tsc page sequence invalid value
  hv.c : commit 9220e39b5c900c67ddcb517d52fe52d90fb5e3c8 : Drivers: hv: 
vmbus: fix build warning
  hv.c : commit d81274aae61c0a045cd0f34191c51fa64ba58bc4 : Drivers: hv: 
vmbus: Support handling messages on multiple CPUs
  hv.c : commit 3ccb4fd8f492f99aece21acc1bd6142275f26236 : Drivers: hv: 
vmbus: don't manipulate with clocksources on crash
  hv_fcopy.c : commit 3cace4a616108539e2730f8dc21a636474395e0f : Drivers: 
hv: 

[Kernel-packages] [Bug 1408963] Re: [Xbuntu 14.04, 14.10 and 15.04] Network manager stops working: iwl3945 0000:03:00.0: BSM uCode verification failed at addr ...; wlan0: deauthenticating from... by l

2016-06-27 Thread Gena
Problem again with 16.04

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1408963

Title:
  [Xbuntu 14.04, 14.10 and 15.04] Network manager stops working: iwl3945
  :03:00.0: BSM uCode verification failed at addr ...; wlan0:
  deauthenticating from... by local choice (Reason: 3=DEAUTH_LEAVING),

Status in linux-firmware package in Ubuntu:
  Confirmed
Status in network-manager package in Ubuntu:
  Confirmed

Bug description:
  From time to time, the system loses all wireles networks and kubuntu
  network manager applet goes blank - not even one network is shown. All
  wifi connections are broken. Rebooting fixes the issue, switching to
  WICD on-the-fly enables to continue browsing without rebooting, so it
  seems to be no hardware issue or iwl3945 issue.

  What to expect: stable connections and flawless network managing.
  What happens: so above.

  Further informations about the system, the network configuration, the
  package version can be found in the attachment, also parts of rsyslog
  and dmesg.

  Interesting, according to some helpers, are the following lines:
  dmesg:   wlan0: deauthenticating from 02:26:4d:ac:8f:45 by local choice 
(Reason: 3=DEAUTH_LEAVING)

  lsb_release -a
  No LSB modules are available.
  Distributor ID: Ubuntu
  Description:Ubuntu 14.10
  Release:14.10
  Codename:   utopic

  apt-cache policy network-manager
  network-manager:
    Installiert:   0.9.8.8-0ubuntu28
    Installationskandidat: 0.9.8.8-0ubuntu28
    Versionstabelle:
   *** 0.9.8.8-0ubuntu28 0
  500 http://de.archive.ubuntu.com/ubuntu/ utopic/main amd64 Packages
  100 /var/lib/dpkg/status

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1408963/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1596012] Re: linux-lts-trusty: 3.13.0-91.138~precise1 -proposed tracker

2016-06-27 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.13.0-91.138~precise1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1595991
  phase: Promoted to proposed
  proposed-announcement-sent: true
+ kernel-stable-phase-changed:Monday, 27. June 2016 20:51 UTC
+ kernel-stable-phase:Released

** Description changed:

  This bug is for tracking the 3.13.0-91.138~precise1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1595991
- phase: Promoted to proposed
+ phase: Released
  proposed-announcement-sent: true
- kernel-stable-phase-changed:Monday, 27. June 2016 20:51 UTC
- kernel-stable-phase:Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1596012

Title:
  linux-lts-trusty: 3.13.0-91.138~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-91.138~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1595991
  phase: Released
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1596012/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1591436] Re: linux-armadaxp: 3.2.0-1668.93 -proposed tracker

2016-06-27 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.2.0-1668.93 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1591329
  phase: Promoted to proposed
  proposed-announcement-sent: true
+ kernel-stable-phase-changed:Monday, 27. June 2016 20:52 UTC
+ kernel-stable-phase:Released

** Description changed:

  This bug is for tracking the 3.2.0-1668.93 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1591329
- phase: Promoted to proposed
+ phase: Released
  proposed-announcement-sent: true
- kernel-stable-phase-changed:Monday, 27. June 2016 20:52 UTC
- kernel-stable-phase:Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1591436

Title:
  linux-armadaxp: 3.2.0-1668.93 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1668.93 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1591329
  phase: Released
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591436/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1591435] Re: linux-ti-omap4: 3.2.0-1483.110 -proposed tracker

2016-06-27 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.2.0-1483.110 upload package. This bug
  will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1591329
  phase: Promoted to proposed
  proposed-announcement-sent: true
+ kernel-stable-phase-changed:Monday, 27. June 2016 20:49 UTC
+ kernel-stable-phase:Released

** Description changed:

  This bug is for tracking the 3.2.0-1483.110 upload package. This bug
  will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1591329
- phase: Promoted to proposed
+ phase: Released
  proposed-announcement-sent: true
- kernel-stable-phase-changed:Monday, 27. June 2016 20:49 UTC
- kernel-stable-phase:Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1591435

Title:
  linux-ti-omap4: 3.2.0-1483.110 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1483.110 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1591329
  phase: Released
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591435/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1591435] Re: linux-ti-omap4: 3.2.0-1483.110 -proposed tracker

2016-06-27 Thread Adam Conrad
** Changed in: kernel-sru-workflow/upload-to-ppa
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1591435

Title:
  linux-ti-omap4: 3.2.0-1483.110 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1483.110 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1591329
  phase: Promoted to proposed
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591435/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1591435] Re: linux-ti-omap4: 3.2.0-1483.110 -proposed tracker

2016-06-27 Thread Andy Whitcroft
** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1591435

Title:
  linux-ti-omap4: 3.2.0-1483.110 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  New
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1483.110 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1591329
  phase: Promoted to proposed
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591435/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1595990] Re: linux-lts-vivid: 3.19.0-64.72~14.04.1 -proposed tracker

2016-06-27 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.19.0-64.72~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1595991
  phase: Promoted to proposed
  proposed-announcement-sent: true
+ kernel-stable-phase-changed:Monday, 27. June 2016 20:10 UTC
+ kernel-stable-phase:Released

** Description changed:

  This bug is for tracking the 3.19.0-64.72~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1595991
- phase: Promoted to proposed
+ phase: Released
  proposed-announcement-sent: true
- kernel-stable-phase-changed:Monday, 27. June 2016 20:10 UTC
- kernel-stable-phase:Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1595990

Title:
  linux-lts-vivid: 3.19.0-64.72~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Invalid
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-vivid source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.19.0-64.72~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1595991
  phase: Released
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1595990/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1595991] Re: linux: 3.13.0-91.138 -proposed tracker

2016-06-27 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.13.0-91.138 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  derivative-trackers-created: true
  phase: Promoted to proposed
  proposed-announcement-sent: true
+ kernel-stable-phase-changed:Monday, 27. June 2016 20:12 UTC
+ kernel-stable-phase:Released

** Description changed:

  This bug is for tracking the 3.13.0-91.138 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  derivative-trackers-created: true
- phase: Promoted to proposed
+ phase: Released
  proposed-announcement-sent: true
- kernel-stable-phase-changed:Monday, 27. June 2016 20:12 UTC
- kernel-stable-phase:Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1595991

Title:
  linux: 3.13.0-91.138 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-91.138 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  derivative-trackers-created: true
  phase: Released
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1595991/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1595976] Re: linux: 3.19.0-64.72 -proposed tracker

2016-06-27 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.19.0-64.72 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  derivative-trackers-created: true
  phase: Promoted to proposed
  proposed-announcement-sent: true
+ kernel-stable-phase-changed:Monday, 27. June 2016 20:14 UTC
+ kernel-stable-phase:Released

** Description changed:

  This bug is for tracking the 3.19.0-64.72 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  derivative-trackers-created: true
- phase: Promoted to proposed
+ phase: Released
  proposed-announcement-sent: true
- kernel-stable-phase-changed:Monday, 27. June 2016 20:14 UTC
- kernel-stable-phase:Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1595976

Title:
  linux: 3.19.0-64.72 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  Fix Released

Bug description:
  This bug is for tracking the 3.19.0-64.72 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  derivative-trackers-created: true
  phase: Released
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1595976/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1596019] Re: linux-lts-utopic: 3.16.0-76.98~14.04.1 -proposed tracker

2016-06-27 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.16.0-76.98~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  derivative-trackers-created: true
  phase: Promoted to proposed
  proposed-announcement-sent: true
+ kernel-stable-phase-changed:Monday, 27. June 2016 20:09 UTC
+ kernel-stable-phase:Released

** Description changed:

  This bug is for tracking the 3.16.0-76.98~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  derivative-trackers-created: true
- phase: Promoted to proposed
+ phase: Released
  proposed-announcement-sent: true
- kernel-stable-phase-changed:Monday, 27. June 2016 20:09 UTC
- kernel-stable-phase:Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1596019

Title:
  linux-lts-utopic: 3.16.0-76.98~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.16.0-76.98~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  derivative-trackers-created: true
  phase: Released
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1596019/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1595914] Re: linux: 4.2.0-41.48 -proposed tracker

2016-06-27 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 4.2.0-41.48 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  derivative-trackers-created: true
  phase: Promoted to proposed
  proposed-announcement-sent: true
+ kernel-stable-phase-changed:Monday, 27. June 2016 20:06 UTC
+ kernel-stable-phase:Released

** Description changed:

  This bug is for tracking the 4.2.0-41.48 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  derivative-trackers-created: true
- phase: Promoted to proposed
+ phase: Released
  proposed-announcement-sent: true
- kernel-stable-phase-changed:Monday, 27. June 2016 20:06 UTC
- kernel-stable-phase:Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1595914

Title:
  linux: 4.2.0-41.48 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Wily:
  Fix Released

Bug description:
  This bug is for tracking the 4.2.0-41.48 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  derivative-trackers-created: true
  phase: Released
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1595914/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1595874] Re: linux: 4.4.0-28.47 -proposed tracker

2016-06-27 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 4.4.0-28.47 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  derivative-trackers-created: true
  phase: Promoted to proposed
  proposed-announcement-sent: true
+ kernel-stable-phase-changed:Monday, 27. June 2016 20:03 UTC
+ kernel-stable-phase:Released

** Description changed:

  This bug is for tracking the 4.4.0-28.47 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  derivative-trackers-created: true
- phase: Promoted to proposed
+ phase: Released
  proposed-announcement-sent: true
- kernel-stable-phase-changed:Monday, 27. June 2016 20:03 UTC
- kernel-stable-phase:Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1595874

Title:
  linux: 4.4.0-28.47 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released

Bug description:
  This bug is for tracking the 4.4.0-28.47 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  derivative-trackers-created: true
  phase: Released
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1595874/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1581866] Re: CVE-2016-4578

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110

---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591435

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Mon, 13 Jun 2016 10:42:12 -0700

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1581866

Title:
  CVE-2016-4578

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Released
Status in linux-snapdragon package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty 

[Kernel-packages] [Bug 1567191] Re: CVE-2016-3951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110

---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591435

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Mon, 13 Jun 2016 10:42:12 -0700

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1567191

Title:
  CVE-2016-3951

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in 

[Kernel-packages] [Bug 1567191] Re: CVE-2016-3951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93

---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1591436
  * Rebase to Ubuntu-3.2.0-105.146

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Ike Panhc   Mon, 13 Jun 2016 15:18:37 +0800

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1567191

Title:
  CVE-2016-3951

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status in linux-lts-utopic source package in 

[Kernel-packages] [Bug 1581866] Re: CVE-2016-4578

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93

---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1591436
  * Rebase to Ubuntu-3.2.0-105.146

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Ike Panhc   Mon, 13 Jun 2016 15:18:37 +0800

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1581866

Title:
  CVE-2016-4578

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Released
Status in linux-snapdragon package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New

[Kernel-packages] [Bug 1580379] Re: CVE-2016-4569

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93

---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1591436
  * Rebase to Ubuntu-3.2.0-105.146

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Ike Panhc   Mon, 13 Jun 2016 15:18:37 +0800

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580379

Title:
  CVE-2016-4569

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Released
Status in linux-snapdragon package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New

[Kernel-packages] [Bug 1567191] Re: CVE-2016-3951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1567191

Title:
  CVE-2016-3951

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status in linux-lts-utopic 

[Kernel-packages] [Bug 1581866] Re: CVE-2016-4578

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1581866

Title:
  CVE-2016-4578

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Released
Status in linux-snapdragon package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status 

[Kernel-packages] [Bug 1567191] Re: CVE-2016-3951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93

---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1591436
  * Rebase to Ubuntu-3.2.0-105.146

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Ike Panhc   Mon, 13 Jun 2016 15:18:37 +0800

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1567191

Title:
  CVE-2016-3951

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in 

[Kernel-packages] [Bug 1581866] Re: CVE-2016-4578

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty -
3.13.0-91.138~precise1

---
linux-lts-trusty (3.13.0-91.138~precise1) precise; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596012

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Kamal Mostafa   Fri, 24 Jun 2016 11:32:52 -0700

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1581866

Title:
  CVE-2016-4578

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in 

[Kernel-packages] [Bug 1580379] Re: CVE-2016-4569

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110

---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591435

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Mon, 13 Jun 2016 10:42:12 -0700

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580379

Title:
  CVE-2016-4569

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Released
Status in linux-snapdragon package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty 

[Kernel-packages] [Bug 1567191] Re: CVE-2016-3951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1567191

Title:
  CVE-2016-3951

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status in linux-lts-utopic 

[Kernel-packages] [Bug 1580379] Re: CVE-2016-4569

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580379

Title:
  CVE-2016-4569

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Released
Status in linux-snapdragon package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status 

[Kernel-packages] [Bug 1578493] Re: CVE-2016-4482

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty -
3.13.0-91.138~precise1

---
linux-lts-trusty (3.13.0-91.138~precise1) precise; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596012

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Kamal Mostafa   Fri, 24 Jun 2016 11:32:52 -0700

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1578493

Title:
  CVE-2016-4482

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in 

[Kernel-packages] [Bug 1580372] Re: CVE-2016-4565

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580372

Title:
  CVE-2016-4565

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Committed
Status in linux-lts-wily source package in Trusty:
  Fix Committed
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  New
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal 

[Kernel-packages] [Bug 1578493] Re: CVE-2016-4482

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110

---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591435

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Mon, 13 Jun 2016 10:42:12 -0700

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1578493

Title:
  CVE-2016-4482

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Released
Status in linux-snapdragon package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty 

[Kernel-packages] [Bug 1578493] Re: CVE-2016-4482

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty -
3.13.0-91.138~precise1

---
linux-lts-trusty (3.13.0-91.138~precise1) precise; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596012

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Kamal Mostafa   Fri, 24 Jun 2016 11:32:52 -0700

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1578493

Title:
  CVE-2016-4482

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in 

[Kernel-packages] [Bug 1567191] Re: CVE-2016-3951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4482

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4569

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4578

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4580

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4913

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1567191

Title:
  CVE-2016-3951

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in 

[Kernel-packages] [Bug 1580379] Re: CVE-2016-4569

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty -
3.13.0-91.138~precise1

---
linux-lts-trusty (3.13.0-91.138~precise1) precise; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596012

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Kamal Mostafa   Fri, 24 Jun 2016 11:32:52 -0700

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580379

Title:
  CVE-2016-4569

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in 

[Kernel-packages] [Bug 1580372] Re: CVE-2016-4565

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty -
3.13.0-91.138~precise1

---
linux-lts-trusty (3.13.0-91.138~precise1) precise; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596012

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Kamal Mostafa   Fri, 24 Jun 2016 11:32:52 -0700

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580372

Title:
  CVE-2016-4565

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in 

[Kernel-packages] [Bug 1578493] Re: CVE-2016-4482

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93

---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1591436
  * Rebase to Ubuntu-3.2.0-105.146

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Ike Panhc   Mon, 13 Jun 2016 15:18:37 +0800

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1578493

Title:
  CVE-2016-4482

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Released
Status in linux-snapdragon package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New

[Kernel-packages] [Bug 1580372] Re: CVE-2016-4565

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110

---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591435

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Mon, 13 Jun 2016 10:42:12 -0700

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580372

Title:
  CVE-2016-4565

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Committed
Status in linux-lts-wily source package in Trusty:
  Fix Committed
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  New
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
 

[Kernel-packages] [Bug 1580372] Re: CVE-2016-4565

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93

---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1591436
  * Rebase to Ubuntu-3.2.0-105.146

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Ike Panhc   Mon, 13 Jun 2016 15:18:37 +0800

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580372

Title:
  CVE-2016-4565

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Committed
Status in linux-lts-wily source package in Trusty:
  Fix Committed
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  New
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in 

[Kernel-packages] [Bug 1578493] Re: CVE-2016-4482

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1578493

Title:
  CVE-2016-4482

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Released
Status in linux-snapdragon package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Released
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status 

[Kernel-packages] [Bug 1583963] Re: CVE-2016-4805

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4482

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4569

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4578

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4580

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4913

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583963

Title:
  CVE-2016-4805

Status in linux package in Ubuntu:
  Invalid
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Committed
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  New
Status in linux-lts-vivid source package in Trusty:
  Fix Committed
Status in linux-lts-wily source package in Trusty:
  Fix Committed
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty -
3.13.0-91.138~precise1

---
linux-lts-trusty (3.13.0-91.138~precise1) precise; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596012

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Kamal Mostafa   Fri, 24 Jun 2016 11:32:52 -0700

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako 

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93

---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1591436
  * Rebase to Ubuntu-3.2.0-105.146

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Ike Panhc   Mon, 13 Jun 2016 15:18:37 +0800

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source 

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110

---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591435

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Mon, 13 Jun 2016 10:42:12 -0700

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status 

[Kernel-packages] [Bug 1585366] Re: CVE-2016-4580

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty -
3.13.0-91.138~precise1

---
linux-lts-trusty (3.13.0-91.138~precise1) precise; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596012

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Kamal Mostafa   Fri, 24 Jun 2016 11:32:52 -0700

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1585366

Title:
  CVE-2016-4580

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako 

[Kernel-packages] [Bug 1584890] Re: debian.master/.../getabis bogus warnings "inconsistant compiler versions" and "not a git repository"

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1584890

Title:
  debian.master/.../getabis bogus warnings "inconsistant compiler
  versions" and "not a git repository"

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Vivid:
  Fix Released
Status in linux source package in Wily:
  Fix Released
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  The debian.master/scripts/misc/getabis script always emits these false
  warnings/errors under normal use:

  WARNING: inconsistant compiler versions detected
  ... because the compiler version check code is wrong.

  fatal: Not a git repository (or any of the parent directories): .git
  ... because the script is normally run on a remote host via 
maint-startnewrelease.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1584890/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1583963] Re: CVE-2016-4805

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93

---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1591436
  * Rebase to Ubuntu-3.2.0-105.146

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Ike Panhc   Mon, 13 Jun 2016 15:18:37 +0800

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583963

Title:
  CVE-2016-4805

Status in linux package in Ubuntu:
  Invalid
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Committed
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  New
Status in linux-lts-vivid source package in Trusty:
  Fix Committed
Status in linux-lts-wily source package in Trusty:
  Fix Committed
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  New
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status in linux-lts-utopic source package in Vivid:
  New

[Kernel-packages] [Bug 1585366] Re: CVE-2016-4580

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1585366

Title:
  CVE-2016-4580

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package 

[Kernel-packages] [Bug 1585366] Re: CVE-2016-4580

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110

---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591435

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Mon, 13 Jun 2016 10:42:12 -0700

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1585366

Title:
  CVE-2016-4580

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status 

[Kernel-packages] [Bug 1585366] Re: CVE-2016-4580

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93

---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1591436
  * Rebase to Ubuntu-3.2.0-105.146

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Ike Panhc   Mon, 13 Jun 2016 15:18:37 +0800

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1585366

Title:
  CVE-2016-4580

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source 

[Kernel-packages] [Bug 1583963] Re: CVE-2016-4805

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110

---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591435

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Mon, 13 Jun 2016 10:42:12 -0700

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583963

Title:
  CVE-2016-4805

Status in linux package in Ubuntu:
  Invalid
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Committed
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  New
Status in linux-lts-vivid source package in Trusty:
  Fix Committed
Status in linux-lts-wily source package in Trusty:
  Fix Committed
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  New
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status 

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package 

[Kernel-packages] [Bug 1591329] Re: linux: 3.2.0-105.146 -proposed tracker

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux (Ubuntu Precise)
   Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4482

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4569

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4578

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4580

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4913

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1591329

Title:
  linux: 3.2.0-105.146 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-105.146 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  derivative-trackers-created: true
  phase: Promoted to proposed
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591329/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1596012] Re: linux-lts-trusty: 3.13.0-91.138~precise1 -proposed tracker

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty -
3.13.0-91.138~precise1

---
linux-lts-trusty (3.13.0-91.138~precise1) precise; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596012

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Kamal Mostafa   Fri, 24 Jun 2016 11:32:52 -0700

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3134

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4482

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4569

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4578

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4580

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4913

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1596012

Title:
  linux-lts-trusty: 3.13.0-91.138~precise1 -proposed 

[Kernel-packages] [Bug 1591436] Re: linux-armadaxp: 3.2.0-1668.93 -proposed tracker

2016-06-27 Thread Andy Whitcroft
** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

** Changed in: kernel-sru-workflow/promote-to-security
   Status: Invalid => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1591436

Title:
  linux-armadaxp: 3.2.0-1668.93 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1668.93 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1591329
  phase: Promoted to proposed
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591436/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1591329] Re: linux: 3.2.0-105.146 -proposed tracker

2016-06-27 Thread Andy Whitcroft
** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1591329

Title:
  linux: 3.2.0-105.146 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-105.146 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  derivative-trackers-created: true
  phase: Promoted to proposed
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591329/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1591435] Re: linux-ti-omap4: 3.2.0-1483.110 -proposed tracker

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110

---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591435

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Mon, 13 Jun 2016 10:42:12 -0700

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4482

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4569

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4578

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4580

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4913

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1591435

Title:
  linux-ti-omap4: 3.2.0-1483.110 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Confirmed
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  New
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1483.110 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1591329
  phase: Promoted to proposed
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591435/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1596012] Re: linux-lts-trusty: 3.13.0-91.138~precise1 -proposed tracker

2016-06-27 Thread Andy Whitcroft
** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy 
Whitcroft (apw)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1596012

Title:
  linux-lts-trusty: 3.13.0-91.138~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-91.138~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1595991
  phase: Promoted to proposed
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1596012/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1591436] Re: linux-armadaxp: 3.2.0-1668.93 -proposed tracker

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93

---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1591436
  * Rebase to Ubuntu-3.2.0-105.146

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Ike Panhc   Mon, 13 Jun 2016 15:18:37 +0800

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: In Progress => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4482

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4569

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4578

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4580

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4913

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1591436

Title:
  linux-armadaxp: 3.2.0-1668.93 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1668.93 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  derivative-trackers-created: true
  kernel-stable-master-bug: 1591329
  phase: Promoted to proposed
  proposed-announcement-sent: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1591436/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1574727] [shim-signed/wily] possible regression found

2016-06-27 Thread Ubuntu Foundations Team Bug Bot
As a part of the Stable Release Updates quality process a search for
Launchpad bug reports using the version of shim-signed from wily-
proposed was performed and bug 1596230 was found.  Please investigate
this bug report to ensure that a regression will not be created by this
SRU. In the event that this is not a regression remove the
"verification-failed" tag from this bug report and add the tag "bot-
stop-nagging" to bug 1596230 (not this bug). Thanks!

** Tags added: verification-failed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/1574727

Title:
  [SRU] Enforce using signed kernels and modules on UEFI

Status in dkms package in Ubuntu:
  Fix Released
Status in efibootmgr package in Ubuntu:
  Fix Released
Status in efivar package in Ubuntu:
  Fix Released
Status in grub2 package in Ubuntu:
  New
Status in grub2-signed package in Ubuntu:
  New
Status in mokutil package in Ubuntu:
  Fix Released
Status in shim package in Ubuntu:
  New
Status in shim-signed package in Ubuntu:
  Fix Released
Status in dkms source package in Precise:
  New
Status in efibootmgr source package in Precise:
  Invalid
Status in efivar source package in Precise:
  Fix Committed
Status in grub2 source package in Precise:
  New
Status in grub2-signed source package in Precise:
  New
Status in mokutil source package in Precise:
  Fix Committed
Status in shim source package in Precise:
  New
Status in shim-signed source package in Precise:
  Fix Committed
Status in dkms source package in Trusty:
  Fix Committed
Status in efibootmgr source package in Trusty:
  Invalid
Status in efivar source package in Trusty:
  Fix Committed
Status in grub2 source package in Trusty:
  Fix Committed
Status in grub2-signed source package in Trusty:
  Fix Committed
Status in mokutil source package in Trusty:
  Fix Committed
Status in shim source package in Trusty:
  New
Status in shim-signed source package in Trusty:
  Fix Committed
Status in dkms source package in Wily:
  Fix Committed
Status in efibootmgr source package in Wily:
  Fix Released
Status in efivar source package in Wily:
  Fix Released
Status in grub2 source package in Wily:
  New
Status in grub2-signed source package in Wily:
  New
Status in mokutil source package in Wily:
  Fix Committed
Status in shim source package in Wily:
  New
Status in shim-signed source package in Wily:
  Fix Committed
Status in dkms source package in Xenial:
  Fix Released
Status in efibootmgr source package in Xenial:
  Fix Released
Status in efivar source package in Xenial:
  Fix Released
Status in grub2 source package in Xenial:
  Fix Committed
Status in grub2-signed source package in Xenial:
  Fix Committed
Status in mokutil source package in Xenial:
  Fix Released
Status in shim source package in Xenial:
  New
Status in shim-signed source package in Xenial:
  Fix Committed

Bug description:
  [Rationale]
  Secure Boot is good. We want to be able to validate that as much as possible 
of the boot process happens with signed binaries; from our shim (the part that 
is loaded by the EFI firmware itself), down to grub2, the kernel, and even 
loaded modules.

  [Impact]
  All our users booting in UEFI; on all supported releases.

  [Test cases]
  
https://docs.google.com/spreadsheets/d/1GbyQDb4-sRv7OlIpbISiwVJ2ARHP3AkG2HbPTRk7p-E/edit#gid=0

  Test cases here are separated by the components that need to be
  changed:

  = mokutil =

  Adding a MOK key:
  1) Install system
  2) Run 'mokutil --import ' to import a signing certificate.
  3) On reboot; validate MOK prompts for new MOK key to add.

  Toggling Secure Boot state:
  1) Install system
  2) mokutil --enable-validationormokutil --disable-validation
  3) Validate that on reboot MOK prompts to change Secure Boot state.

  Listing keys:
  1) mokutil --list-enrolled
  -- should list keys previously enrolled, and Microsoft keys on systems that 
are configured with them for factory Secure Boot.

  
  = efivar =

  libefivar0 gets tested via the use of mokutil. Since it is a library
  with no directly usable binaries; we rely on mokutil / sbsigntool /
  efibootmgr to do testing.

  1) Run efibootmgr -v ; verify it lists BootEntries.
  2) Run efibootmgr -c -L ubuntu2 -l \\EFI\\ubuntu\\shimx64.efi ; verify that 
on reboot; you can get into a boot menu that will list 'ubuntu2', and that 
picking that boot entry boots into Ubuntu.

  
  = shim-signed =

  1) Install system; upgrade to new packages
  1b) Verify /proc/sys/kernel/secure_boot shows 1.
  1c) Verify /proc/sys/kernel/moksbstate_disabled shows 0.
  2) Run 'sudo update-secureboot-policy'; validate that it prompts to disable 
Secure Boot if it's not already disabled.
  3) Run 'sudo update-secureboot-policy'; validate you are not prompted again 
to disable Secure Boot.
  4) Reboot; follow MOK steps to disable Secure Boot.
  4b) Verify /proc/sys/kernel/secure_boot shows 1.
  4c) Verify 

[Kernel-packages] [Bug 1581866] Re: CVE-2016-4578

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-91.138

---
linux (3.13.0-91.138) trusty; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595991

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Luis Henriques   Fri, 24 Jun 2016
16:19:03 +0100

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1581866

Title:
  CVE-2016-4578

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in 

[Kernel-packages] [Bug 1585366] Re: CVE-2016-4580

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-64.72~14.04.1

---
linux-lts-vivid (3.19.0-64.72~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595990

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.19.0-63.71) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595723

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.19.0-62.70) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591307

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * compiler-gcc: integrate the various compiler-gcc[345].h files
- LP: #1587557
  * fix backport "IB/security: restrict use of the write() interface"
- LP: #1587557
  * x86: LLVMLinux: Fix "incomplete type const struct x86cpu_device_id"
- LP: #1587557
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1587557
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1587557
  * atomic_open(): fix the handling of create_error
- LP: #1587557
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1587557
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1587557
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1587557
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1587557
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1587557
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1587557
  * tools lib traceevent: Free filter tokens in process_filter()
- LP: #1587557
  * tools lib traceevent: Do not reassign parg after collapse_tree()
- LP: #1587557
  * workqueue: fix rebind bound workers warning
- LP: #1587557
  * ocfs2: fix posix_acl_create deadlock
- LP: #1587557
  * nf_conntrack: avoid kernel pointer value leak in slab name
- LP: #1587557
  * net: fec: only clear a queue's work bit if the queue was emptied
- LP: #1587557
  * net/mlx4_en: Fix endianness bug in IPV6 csum calculation
- LP: #1587557
  * macvtap: segmented packet is consumed
- LP: 

[Kernel-packages] [Bug 1585366] Re: CVE-2016-4580

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-41.48~14.04.1

---
linux-lts-wily (4.2.0-41.48~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595921

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (4.2.0-40.47) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595725

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (4.2.0-39.46) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591301

  [ J. R. Okajima ]

  * SAUCE: AUFS: mm/mmap: fix oopsing on remap_file_pages aufs mmap:
bugfix, mainly for linux-4.5-rc5, remap_file_pages(2) emulation
- LP: #1558120

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * Revert "SAUCE: mm/mmap: fix oopsing on remap_file_pages"
- LP: #1558120
  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * hpsa: move lockup_detected attribute to host attr
- LP: #1581169
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * [4.2-stable only] fix backport "IB/security: restrict use of the
write() interface"
- LP: #1586447
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1586447
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1586447
  * ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)
- LP: #1586447
  * atomic_open(): fix the handling of create_error
- LP: #1586447
  * drm/i915/bdw: Add missing delay during L3 SQC credit programming
- LP: #1586447
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1586447
  * drm/radeon: fix DP link training issue with second 4K monitor
- LP: #1586447
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1586447
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1586447
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1586447
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1586447
  * ALSA: hda - Fix broken reconfig
- LP: #1586447
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1586447
  * vfs: add vfs_select_inode() helper
- LP: #1586447
  * vfs: rename: check backing inode being equal
- LP: 

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-64.72~14.04.1

---
linux-lts-vivid (3.19.0-64.72~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595990

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.19.0-63.71) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595723

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.19.0-62.70) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591307

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * compiler-gcc: integrate the various compiler-gcc[345].h files
- LP: #1587557
  * fix backport "IB/security: restrict use of the write() interface"
- LP: #1587557
  * x86: LLVMLinux: Fix "incomplete type const struct x86cpu_device_id"
- LP: #1587557
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1587557
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1587557
  * atomic_open(): fix the handling of create_error
- LP: #1587557
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1587557
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1587557
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1587557
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1587557
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1587557
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1587557
  * tools lib traceevent: Free filter tokens in process_filter()
- LP: #1587557
  * tools lib traceevent: Do not reassign parg after collapse_tree()
- LP: #1587557
  * workqueue: fix rebind bound workers warning
- LP: #1587557
  * ocfs2: fix posix_acl_create deadlock
- LP: #1587557
  * nf_conntrack: avoid kernel pointer value leak in slab name
- LP: #1587557
  * net: fec: only clear a queue's work bit if the queue was emptied
- LP: #1587557
  * net/mlx4_en: Fix endianness bug in IPV6 csum calculation
- LP: #1587557
  * macvtap: segmented packet is consumed
- LP: 

[Kernel-packages] [Bug 1578493] Re: CVE-2016-4482

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-91.138

---
linux (3.13.0-91.138) trusty; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595991

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Luis Henriques   Fri, 24 Jun 2016
16:19:03 +0100

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1578493

Title:
  CVE-2016-4482

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in 

[Kernel-packages] [Bug 1595990] Re: linux-lts-vivid: 3.19.0-64.72~14.04.1 -proposed tracker

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-64.72~14.04.1

---
linux-lts-vivid (3.19.0-64.72~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595990

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.19.0-63.71) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595723

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.19.0-62.70) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591307

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * compiler-gcc: integrate the various compiler-gcc[345].h files
- LP: #1587557
  * fix backport "IB/security: restrict use of the write() interface"
- LP: #1587557
  * x86: LLVMLinux: Fix "incomplete type const struct x86cpu_device_id"
- LP: #1587557
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1587557
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1587557
  * atomic_open(): fix the handling of create_error
- LP: #1587557
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1587557
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1587557
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1587557
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1587557
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1587557
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1587557
  * tools lib traceevent: Free filter tokens in process_filter()
- LP: #1587557
  * tools lib traceevent: Do not reassign parg after collapse_tree()
- LP: #1587557
  * workqueue: fix rebind bound workers warning
- LP: #1587557
  * ocfs2: fix posix_acl_create deadlock
- LP: #1587557
  * nf_conntrack: avoid kernel pointer value leak in slab name
- LP: #1587557
  * net: fec: only clear a queue's work bit if the queue was emptied
- LP: #1587557
  * net/mlx4_en: Fix endianness bug in IPV6 csum calculation
- LP: #1587557
  * macvtap: segmented packet is consumed
- LP: 

[Kernel-packages] [Bug 1580379] Re: CVE-2016-4569

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-xenial - 4.4.0-28.47~14.04.1

---
linux-lts-xenial (4.4.0-28.47~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595884

  * Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to non-existent next rule
- netfilter: x_tables: validate targets of jumps
- netfilter: x_tables: add and use xt_check_entry_offsets
- netfilter: x_tables: kill check_entry helper
- netfilter: x_tables: assert minimum target size
- netfilter: x_tables: add compat version of xt_check_entry_offsets
- netfilter: x_tables: check standard target size too
- netfilter: x_tables: check for bogus target offset
- netfilter: x_tables: validate all offsets and sizes in a rule
- netfilter: x_tables: don't reject valid target size on some architectures
- netfilter: arp_tables: simplify translate_compat_table args
- netfilter: ip_tables: simplify translate_compat_table args
- netfilter: ip6_tables: simplify translate_compat_table args
- netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- netfilter: x_tables: do compat validation via translate_table
- netfilter: x_tables: introduce and use xt_copy_counters_from_user

  * Linux netfilter IPT_SO_SET_REPLACE memory corruption (LP: #1555338)
- netfilter: x_tables: validate e->target_offset early
- netfilter: x_tables: make sure e->next_offset covers remaining blob size
- netfilter: x_tables: fix unconditional helper

linux (4.4.0-27.46) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1594906

  * Support Edge Gateway's Bluetooth LED (LP: #1512999)
- Revert "UBUNTU: SAUCE: Bluetooth: Support for LED on Marvell modules"

linux (4.4.0-26.45) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1594442

  * linux: Implement secure boot state variables (LP: #1593075)
- SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl

  * failures building userspace packages that include ethtool.h (LP: #1592930)
- ethtool.h: define INT_MAX for userland

linux (4.4.0-25.44) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591289

  * Xenial update to v4.4.13 stable release (LP: #1590455)
- MIPS64: R6: R2 emulation bugfix
- MIPS: math-emu: Fix jalr emulation when rd == $0
- MIPS: MSA: Fix a link error on `_init_msa_upper' with older GCC
- MIPS: Don't unwind to user mode with EVA
- MIPS: Avoid using unwind_stack() with usermode
- MIPS: Fix siginfo.h to use strict posix types
- MIPS: Fix uapi include in exported asm/siginfo.h
- MIPS: Fix watchpoint restoration
- MIPS: Flush highmem pages in __flush_dcache_page
- MIPS: Handle highmem pages in __update_cache
- MIPS: Sync icache & dcache in set_pte_at
- MIPS: ath79: make bootconsole wait for both THRE and TEMT
- MIPS: Reserve nosave data for hibernation
- MIPS: Loongson-3: Reserve 32MB for RS780E integrated GPU
- MIPS: Use copy_s.fmt rather than copy_u.fmt
- MIPS: Fix MSA ld_*/st_* asm macros to use PTR_ADDU
- MIPS: Prevent "restoration" of MSA context in non-MSA kernels
- MIPS: Disable preemption during prctl(PR_SET_FP_MODE, ...)
- MIPS: ptrace: Fix FP context restoration FCSR regression
- MIPS: ptrace: Prevent writes to read-only FCSR bits
- MIPS: Fix sigreturn via VDSO on microMIPS kernel
- MIPS: Build microMIPS VDSO for microMIPS kernels
- MIPS: lib: Mark intrinsics notrace
- MIPS: VDSO: Build with `-fno-strict-aliasing'
- affs: fix remount failure when there are no options changed
- ASoC: ak4642: Enable cache usage to fix crashes on resume
- Input: uinput - handle compat ioctl for UI_SET_PHYS
- ARM: mvebu: fix GPIO config on the Linksys boards
- ARM: dts: at91: fix typo in sama5d2 PIN_PD24 description
- ARM: dts: exynos: Add interrupt line to MAX8997 PMIC on exynos4210-trats
- ARM: dts: imx35: restore existing used clock enumeration
- ath9k: Add a module parameter to invert LED polarity.
- ath9k: Fix LED polarity for some Mini PCI AR9220 MB92 cards.
- ath10k: fix debugfs pktlog_filter write
- ath10k: fix firmware assert in monitor mode
- ath10k: fix rx_channel during hw reconfigure
- ath10k: fix kernel panic, move arvifs list head init before htt init
- ath5k: Change led pin configuration for compaq c700 laptop
- hwrng: exynos - Fix unbalanced PM runtime put on timeout error path
- rtlwifi: rtl8723be: Add antenna select module parameter
- rtlwifi: btcoexist: Implement antenna selection
- rtlwifi: Fix logic error in enter/exit power-save mode
- rtlwifi: pci: use dev_kfree_skb_irq instead of kfree_skb in
  rtl_pci_reset_trx_ring
- aacraid: Relinquish CPU during timeout wait
- aacraid: Fix for aac_command_thread hang
- aacraid: Fix for KDUMP driver 

[Kernel-packages] [Bug 1581866] Re: CVE-2016-4578

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-xenial - 4.4.0-28.47~14.04.1

---
linux-lts-xenial (4.4.0-28.47~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595884

  * Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to non-existent next rule
- netfilter: x_tables: validate targets of jumps
- netfilter: x_tables: add and use xt_check_entry_offsets
- netfilter: x_tables: kill check_entry helper
- netfilter: x_tables: assert minimum target size
- netfilter: x_tables: add compat version of xt_check_entry_offsets
- netfilter: x_tables: check standard target size too
- netfilter: x_tables: check for bogus target offset
- netfilter: x_tables: validate all offsets and sizes in a rule
- netfilter: x_tables: don't reject valid target size on some architectures
- netfilter: arp_tables: simplify translate_compat_table args
- netfilter: ip_tables: simplify translate_compat_table args
- netfilter: ip6_tables: simplify translate_compat_table args
- netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- netfilter: x_tables: do compat validation via translate_table
- netfilter: x_tables: introduce and use xt_copy_counters_from_user

  * Linux netfilter IPT_SO_SET_REPLACE memory corruption (LP: #1555338)
- netfilter: x_tables: validate e->target_offset early
- netfilter: x_tables: make sure e->next_offset covers remaining blob size
- netfilter: x_tables: fix unconditional helper

linux (4.4.0-27.46) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1594906

  * Support Edge Gateway's Bluetooth LED (LP: #1512999)
- Revert "UBUNTU: SAUCE: Bluetooth: Support for LED on Marvell modules"

linux (4.4.0-26.45) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1594442

  * linux: Implement secure boot state variables (LP: #1593075)
- SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl

  * failures building userspace packages that include ethtool.h (LP: #1592930)
- ethtool.h: define INT_MAX for userland

linux (4.4.0-25.44) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591289

  * Xenial update to v4.4.13 stable release (LP: #1590455)
- MIPS64: R6: R2 emulation bugfix
- MIPS: math-emu: Fix jalr emulation when rd == $0
- MIPS: MSA: Fix a link error on `_init_msa_upper' with older GCC
- MIPS: Don't unwind to user mode with EVA
- MIPS: Avoid using unwind_stack() with usermode
- MIPS: Fix siginfo.h to use strict posix types
- MIPS: Fix uapi include in exported asm/siginfo.h
- MIPS: Fix watchpoint restoration
- MIPS: Flush highmem pages in __flush_dcache_page
- MIPS: Handle highmem pages in __update_cache
- MIPS: Sync icache & dcache in set_pte_at
- MIPS: ath79: make bootconsole wait for both THRE and TEMT
- MIPS: Reserve nosave data for hibernation
- MIPS: Loongson-3: Reserve 32MB for RS780E integrated GPU
- MIPS: Use copy_s.fmt rather than copy_u.fmt
- MIPS: Fix MSA ld_*/st_* asm macros to use PTR_ADDU
- MIPS: Prevent "restoration" of MSA context in non-MSA kernels
- MIPS: Disable preemption during prctl(PR_SET_FP_MODE, ...)
- MIPS: ptrace: Fix FP context restoration FCSR regression
- MIPS: ptrace: Prevent writes to read-only FCSR bits
- MIPS: Fix sigreturn via VDSO on microMIPS kernel
- MIPS: Build microMIPS VDSO for microMIPS kernels
- MIPS: lib: Mark intrinsics notrace
- MIPS: VDSO: Build with `-fno-strict-aliasing'
- affs: fix remount failure when there are no options changed
- ASoC: ak4642: Enable cache usage to fix crashes on resume
- Input: uinput - handle compat ioctl for UI_SET_PHYS
- ARM: mvebu: fix GPIO config on the Linksys boards
- ARM: dts: at91: fix typo in sama5d2 PIN_PD24 description
- ARM: dts: exynos: Add interrupt line to MAX8997 PMIC on exynos4210-trats
- ARM: dts: imx35: restore existing used clock enumeration
- ath9k: Add a module parameter to invert LED polarity.
- ath9k: Fix LED polarity for some Mini PCI AR9220 MB92 cards.
- ath10k: fix debugfs pktlog_filter write
- ath10k: fix firmware assert in monitor mode
- ath10k: fix rx_channel during hw reconfigure
- ath10k: fix kernel panic, move arvifs list head init before htt init
- ath5k: Change led pin configuration for compaq c700 laptop
- hwrng: exynos - Fix unbalanced PM runtime put on timeout error path
- rtlwifi: rtl8723be: Add antenna select module parameter
- rtlwifi: btcoexist: Implement antenna selection
- rtlwifi: Fix logic error in enter/exit power-save mode
- rtlwifi: pci: use dev_kfree_skb_irq instead of kfree_skb in
  rtl_pci_reset_trx_ring
- aacraid: Relinquish CPU during timeout wait
- aacraid: Fix for aac_command_thread hang
- aacraid: Fix for KDUMP driver 

[Kernel-packages] [Bug 1578493] Re: CVE-2016-4482

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-xenial - 4.4.0-28.47~14.04.1

---
linux-lts-xenial (4.4.0-28.47~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595884

  * Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to non-existent next rule
- netfilter: x_tables: validate targets of jumps
- netfilter: x_tables: add and use xt_check_entry_offsets
- netfilter: x_tables: kill check_entry helper
- netfilter: x_tables: assert minimum target size
- netfilter: x_tables: add compat version of xt_check_entry_offsets
- netfilter: x_tables: check standard target size too
- netfilter: x_tables: check for bogus target offset
- netfilter: x_tables: validate all offsets and sizes in a rule
- netfilter: x_tables: don't reject valid target size on some architectures
- netfilter: arp_tables: simplify translate_compat_table args
- netfilter: ip_tables: simplify translate_compat_table args
- netfilter: ip6_tables: simplify translate_compat_table args
- netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- netfilter: x_tables: do compat validation via translate_table
- netfilter: x_tables: introduce and use xt_copy_counters_from_user

  * Linux netfilter IPT_SO_SET_REPLACE memory corruption (LP: #1555338)
- netfilter: x_tables: validate e->target_offset early
- netfilter: x_tables: make sure e->next_offset covers remaining blob size
- netfilter: x_tables: fix unconditional helper

linux (4.4.0-27.46) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1594906

  * Support Edge Gateway's Bluetooth LED (LP: #1512999)
- Revert "UBUNTU: SAUCE: Bluetooth: Support for LED on Marvell modules"

linux (4.4.0-26.45) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1594442

  * linux: Implement secure boot state variables (LP: #1593075)
- SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl

  * failures building userspace packages that include ethtool.h (LP: #1592930)
- ethtool.h: define INT_MAX for userland

linux (4.4.0-25.44) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591289

  * Xenial update to v4.4.13 stable release (LP: #1590455)
- MIPS64: R6: R2 emulation bugfix
- MIPS: math-emu: Fix jalr emulation when rd == $0
- MIPS: MSA: Fix a link error on `_init_msa_upper' with older GCC
- MIPS: Don't unwind to user mode with EVA
- MIPS: Avoid using unwind_stack() with usermode
- MIPS: Fix siginfo.h to use strict posix types
- MIPS: Fix uapi include in exported asm/siginfo.h
- MIPS: Fix watchpoint restoration
- MIPS: Flush highmem pages in __flush_dcache_page
- MIPS: Handle highmem pages in __update_cache
- MIPS: Sync icache & dcache in set_pte_at
- MIPS: ath79: make bootconsole wait for both THRE and TEMT
- MIPS: Reserve nosave data for hibernation
- MIPS: Loongson-3: Reserve 32MB for RS780E integrated GPU
- MIPS: Use copy_s.fmt rather than copy_u.fmt
- MIPS: Fix MSA ld_*/st_* asm macros to use PTR_ADDU
- MIPS: Prevent "restoration" of MSA context in non-MSA kernels
- MIPS: Disable preemption during prctl(PR_SET_FP_MODE, ...)
- MIPS: ptrace: Fix FP context restoration FCSR regression
- MIPS: ptrace: Prevent writes to read-only FCSR bits
- MIPS: Fix sigreturn via VDSO on microMIPS kernel
- MIPS: Build microMIPS VDSO for microMIPS kernels
- MIPS: lib: Mark intrinsics notrace
- MIPS: VDSO: Build with `-fno-strict-aliasing'
- affs: fix remount failure when there are no options changed
- ASoC: ak4642: Enable cache usage to fix crashes on resume
- Input: uinput - handle compat ioctl for UI_SET_PHYS
- ARM: mvebu: fix GPIO config on the Linksys boards
- ARM: dts: at91: fix typo in sama5d2 PIN_PD24 description
- ARM: dts: exynos: Add interrupt line to MAX8997 PMIC on exynos4210-trats
- ARM: dts: imx35: restore existing used clock enumeration
- ath9k: Add a module parameter to invert LED polarity.
- ath9k: Fix LED polarity for some Mini PCI AR9220 MB92 cards.
- ath10k: fix debugfs pktlog_filter write
- ath10k: fix firmware assert in monitor mode
- ath10k: fix rx_channel during hw reconfigure
- ath10k: fix kernel panic, move arvifs list head init before htt init
- ath5k: Change led pin configuration for compaq c700 laptop
- hwrng: exynos - Fix unbalanced PM runtime put on timeout error path
- rtlwifi: rtl8723be: Add antenna select module parameter
- rtlwifi: btcoexist: Implement antenna selection
- rtlwifi: Fix logic error in enter/exit power-save mode
- rtlwifi: pci: use dev_kfree_skb_irq instead of kfree_skb in
  rtl_pci_reset_trx_ring
- aacraid: Relinquish CPU during timeout wait
- aacraid: Fix for aac_command_thread hang
- aacraid: Fix for KDUMP driver 

[Kernel-packages] [Bug 1580379] Re: CVE-2016-4569

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-41.48~14.04.1

---
linux-lts-wily (4.2.0-41.48~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595921

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (4.2.0-40.47) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595725

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (4.2.0-39.46) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591301

  [ J. R. Okajima ]

  * SAUCE: AUFS: mm/mmap: fix oopsing on remap_file_pages aufs mmap:
bugfix, mainly for linux-4.5-rc5, remap_file_pages(2) emulation
- LP: #1558120

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * Revert "SAUCE: mm/mmap: fix oopsing on remap_file_pages"
- LP: #1558120
  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * hpsa: move lockup_detected attribute to host attr
- LP: #1581169
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * [4.2-stable only] fix backport "IB/security: restrict use of the
write() interface"
- LP: #1586447
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1586447
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1586447
  * ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)
- LP: #1586447
  * atomic_open(): fix the handling of create_error
- LP: #1586447
  * drm/i915/bdw: Add missing delay during L3 SQC credit programming
- LP: #1586447
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1586447
  * drm/radeon: fix DP link training issue with second 4K monitor
- LP: #1586447
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1586447
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1586447
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1586447
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1586447
  * ALSA: hda - Fix broken reconfig
- LP: #1586447
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1586447
  * vfs: add vfs_select_inode() helper
- LP: #1586447
  * vfs: rename: check backing inode being equal
- LP: 

[Kernel-packages] [Bug 1580372] Re: CVE-2016-4565

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic -
3.16.0-76.98~14.04.1

---
linux-lts-utopic (3.16.0-76.98~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596019

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux-lts-utopic (3.16.0-75.97~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595703

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux-lts-utopic (3.16.0-74.96~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591324

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565

 -- Luis Henriques   Fri, 24 Jun 2016
17:17:07 +0100

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580372

Title:
  CVE-2016-4565

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Committed
Status in linux-armadaxp source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source 

[Kernel-packages] [Bug 1580372] Re: CVE-2016-4565

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-91.138

---
linux (3.13.0-91.138) trusty; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595991

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Luis Henriques   Fri, 24 Jun 2016
16:19:03 +0100

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3134

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4482

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4569

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4578

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4580

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4913

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580372

Title:
  CVE-2016-4565

Status in linux package in Ubuntu:
  Fix Committed
Status 

[Kernel-packages] [Bug 1581866] Re: CVE-2016-4578

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-41.48~14.04.1

---
linux-lts-wily (4.2.0-41.48~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595921

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (4.2.0-40.47) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595725

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (4.2.0-39.46) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591301

  [ J. R. Okajima ]

  * SAUCE: AUFS: mm/mmap: fix oopsing on remap_file_pages aufs mmap:
bugfix, mainly for linux-4.5-rc5, remap_file_pages(2) emulation
- LP: #1558120

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * Revert "SAUCE: mm/mmap: fix oopsing on remap_file_pages"
- LP: #1558120
  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * hpsa: move lockup_detected attribute to host attr
- LP: #1581169
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * [4.2-stable only] fix backport "IB/security: restrict use of the
write() interface"
- LP: #1586447
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1586447
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1586447
  * ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)
- LP: #1586447
  * atomic_open(): fix the handling of create_error
- LP: #1586447
  * drm/i915/bdw: Add missing delay during L3 SQC credit programming
- LP: #1586447
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1586447
  * drm/radeon: fix DP link training issue with second 4K monitor
- LP: #1586447
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1586447
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1586447
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1586447
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1586447
  * ALSA: hda - Fix broken reconfig
- LP: #1586447
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1586447
  * vfs: add vfs_select_inode() helper
- LP: #1586447
  * vfs: rename: check backing inode being equal
- LP: 

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-41.48~14.04.1

---
linux-lts-wily (4.2.0-41.48~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595921

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (4.2.0-40.47) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595725

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (4.2.0-39.46) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591301

  [ J. R. Okajima ]

  * SAUCE: AUFS: mm/mmap: fix oopsing on remap_file_pages aufs mmap:
bugfix, mainly for linux-4.5-rc5, remap_file_pages(2) emulation
- LP: #1558120

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * Revert "SAUCE: mm/mmap: fix oopsing on remap_file_pages"
- LP: #1558120
  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * hpsa: move lockup_detected attribute to host attr
- LP: #1581169
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * [4.2-stable only] fix backport "IB/security: restrict use of the
write() interface"
- LP: #1586447
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1586447
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1586447
  * ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)
- LP: #1586447
  * atomic_open(): fix the handling of create_error
- LP: #1586447
  * drm/i915/bdw: Add missing delay during L3 SQC credit programming
- LP: #1586447
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1586447
  * drm/radeon: fix DP link training issue with second 4K monitor
- LP: #1586447
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1586447
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1586447
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1586447
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1586447
  * ALSA: hda - Fix broken reconfig
- LP: #1586447
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1586447
  * vfs: add vfs_select_inode() helper
- LP: #1586447
  * vfs: rename: check backing inode being equal
- LP: 

[Kernel-packages] [Bug 1585366] Re: CVE-2016-4580

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-91.138

---
linux (3.13.0-91.138) trusty; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595991

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Luis Henriques   Fri, 24 Jun 2016
16:19:03 +0100

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1585366

Title:
  CVE-2016-4580

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in 

[Kernel-packages] [Bug 1581866] Re: CVE-2016-4578

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic -
3.16.0-76.98~14.04.1

---
linux-lts-utopic (3.16.0-76.98~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596019

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux-lts-utopic (3.16.0-75.97~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595703

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux-lts-utopic (3.16.0-74.96~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591324

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565

 -- Luis Henriques   Fri, 24 Jun 2016
17:17:07 +0100

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1581866

Title:
  CVE-2016-4578

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Released
Status in linux-snapdragon package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Committed
Status in linux-armadaxp source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid

[Kernel-packages] [Bug 1578493] Re: CVE-2016-4482

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-64.72~14.04.1

---
linux-lts-vivid (3.19.0-64.72~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595990

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.19.0-63.71) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595723

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.19.0-62.70) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591307

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * compiler-gcc: integrate the various compiler-gcc[345].h files
- LP: #1587557
  * fix backport "IB/security: restrict use of the write() interface"
- LP: #1587557
  * x86: LLVMLinux: Fix "incomplete type const struct x86cpu_device_id"
- LP: #1587557
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1587557
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1587557
  * atomic_open(): fix the handling of create_error
- LP: #1587557
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1587557
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1587557
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1587557
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1587557
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1587557
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1587557
  * tools lib traceevent: Free filter tokens in process_filter()
- LP: #1587557
  * tools lib traceevent: Do not reassign parg after collapse_tree()
- LP: #1587557
  * workqueue: fix rebind bound workers warning
- LP: #1587557
  * ocfs2: fix posix_acl_create deadlock
- LP: #1587557
  * nf_conntrack: avoid kernel pointer value leak in slab name
- LP: #1587557
  * net: fec: only clear a queue's work bit if the queue was emptied
- LP: #1587557
  * net/mlx4_en: Fix endianness bug in IPV6 csum calculation
- LP: #1587557
  * macvtap: segmented packet is consumed
- LP: 

[Kernel-packages] [Bug 1595703] Re: linux-lts-utopic: 3.16.0-75.97~14.04.1 -proposed tracker

2016-06-27 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1596019 ***
https://bugs.launchpad.net/bugs/1596019

This bug was fixed in the package linux-lts-utopic -
3.16.0-76.98~14.04.1

---
linux-lts-utopic (3.16.0-76.98~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596019

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux-lts-utopic (3.16.0-75.97~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595703

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux-lts-utopic (3.16.0-74.96~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591324

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565

 -- Luis Henriques   Fri, 24 Jun 2016
17:17:07 +0100

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3134

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4482

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4569

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4578

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4580

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4913

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1595703

Title:
  linux-lts-utopic: 3.16.0-75.97~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU 

[Kernel-packages] [Bug 1591324] Re: linux-lts-utopic: 3.16.0-74.96~14.04.1 -proposed tracker

2016-06-27 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1596019 ***
https://bugs.launchpad.net/bugs/1596019

This bug was fixed in the package linux-lts-utopic -
3.16.0-76.98~14.04.1

---
linux-lts-utopic (3.16.0-76.98~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596019

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux-lts-utopic (3.16.0-75.97~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595703

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux-lts-utopic (3.16.0-74.96~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591324

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565

 -- Luis Henriques   Fri, 24 Jun 2016
17:17:07 +0100

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3134

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4482

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4569

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4578

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4580

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4913

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1591324

Title:
  linux-lts-utopic: 3.16.0-74.96~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status 

[Kernel-packages] [Bug 1578493] Re: CVE-2016-4482

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic -
3.16.0-76.98~14.04.1

---
linux-lts-utopic (3.16.0-76.98~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596019

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux-lts-utopic (3.16.0-75.97~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595703

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux-lts-utopic (3.16.0-74.96~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591324

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565

 -- Luis Henriques   Fri, 24 Jun 2016
17:17:07 +0100

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1578493

Title:
  CVE-2016-4482

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Released
Status in linux-snapdragon package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Committed
Status in linux-armadaxp source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-xenial - 4.4.0-28.47~14.04.1

---
linux-lts-xenial (4.4.0-28.47~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595884

  * Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to non-existent next rule
- netfilter: x_tables: validate targets of jumps
- netfilter: x_tables: add and use xt_check_entry_offsets
- netfilter: x_tables: kill check_entry helper
- netfilter: x_tables: assert minimum target size
- netfilter: x_tables: add compat version of xt_check_entry_offsets
- netfilter: x_tables: check standard target size too
- netfilter: x_tables: check for bogus target offset
- netfilter: x_tables: validate all offsets and sizes in a rule
- netfilter: x_tables: don't reject valid target size on some architectures
- netfilter: arp_tables: simplify translate_compat_table args
- netfilter: ip_tables: simplify translate_compat_table args
- netfilter: ip6_tables: simplify translate_compat_table args
- netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- netfilter: x_tables: do compat validation via translate_table
- netfilter: x_tables: introduce and use xt_copy_counters_from_user

  * Linux netfilter IPT_SO_SET_REPLACE memory corruption (LP: #1555338)
- netfilter: x_tables: validate e->target_offset early
- netfilter: x_tables: make sure e->next_offset covers remaining blob size
- netfilter: x_tables: fix unconditional helper

linux (4.4.0-27.46) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1594906

  * Support Edge Gateway's Bluetooth LED (LP: #1512999)
- Revert "UBUNTU: SAUCE: Bluetooth: Support for LED on Marvell modules"

linux (4.4.0-26.45) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1594442

  * linux: Implement secure boot state variables (LP: #1593075)
- SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl

  * failures building userspace packages that include ethtool.h (LP: #1592930)
- ethtool.h: define INT_MAX for userland

linux (4.4.0-25.44) xenial; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591289

  * Xenial update to v4.4.13 stable release (LP: #1590455)
- MIPS64: R6: R2 emulation bugfix
- MIPS: math-emu: Fix jalr emulation when rd == $0
- MIPS: MSA: Fix a link error on `_init_msa_upper' with older GCC
- MIPS: Don't unwind to user mode with EVA
- MIPS: Avoid using unwind_stack() with usermode
- MIPS: Fix siginfo.h to use strict posix types
- MIPS: Fix uapi include in exported asm/siginfo.h
- MIPS: Fix watchpoint restoration
- MIPS: Flush highmem pages in __flush_dcache_page
- MIPS: Handle highmem pages in __update_cache
- MIPS: Sync icache & dcache in set_pte_at
- MIPS: ath79: make bootconsole wait for both THRE and TEMT
- MIPS: Reserve nosave data for hibernation
- MIPS: Loongson-3: Reserve 32MB for RS780E integrated GPU
- MIPS: Use copy_s.fmt rather than copy_u.fmt
- MIPS: Fix MSA ld_*/st_* asm macros to use PTR_ADDU
- MIPS: Prevent "restoration" of MSA context in non-MSA kernels
- MIPS: Disable preemption during prctl(PR_SET_FP_MODE, ...)
- MIPS: ptrace: Fix FP context restoration FCSR regression
- MIPS: ptrace: Prevent writes to read-only FCSR bits
- MIPS: Fix sigreturn via VDSO on microMIPS kernel
- MIPS: Build microMIPS VDSO for microMIPS kernels
- MIPS: lib: Mark intrinsics notrace
- MIPS: VDSO: Build with `-fno-strict-aliasing'
- affs: fix remount failure when there are no options changed
- ASoC: ak4642: Enable cache usage to fix crashes on resume
- Input: uinput - handle compat ioctl for UI_SET_PHYS
- ARM: mvebu: fix GPIO config on the Linksys boards
- ARM: dts: at91: fix typo in sama5d2 PIN_PD24 description
- ARM: dts: exynos: Add interrupt line to MAX8997 PMIC on exynos4210-trats
- ARM: dts: imx35: restore existing used clock enumeration
- ath9k: Add a module parameter to invert LED polarity.
- ath9k: Fix LED polarity for some Mini PCI AR9220 MB92 cards.
- ath10k: fix debugfs pktlog_filter write
- ath10k: fix firmware assert in monitor mode
- ath10k: fix rx_channel during hw reconfigure
- ath10k: fix kernel panic, move arvifs list head init before htt init
- ath5k: Change led pin configuration for compaq c700 laptop
- hwrng: exynos - Fix unbalanced PM runtime put on timeout error path
- rtlwifi: rtl8723be: Add antenna select module parameter
- rtlwifi: btcoexist: Implement antenna selection
- rtlwifi: Fix logic error in enter/exit power-save mode
- rtlwifi: pci: use dev_kfree_skb_irq instead of kfree_skb in
  rtl_pci_reset_trx_ring
- aacraid: Relinquish CPU during timeout wait
- aacraid: Fix for aac_command_thread hang
- aacraid: Fix for KDUMP driver 

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-41.48~14.04.1

---
linux-lts-wily (4.2.0-41.48~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595921

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (4.2.0-40.47) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595725

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (4.2.0-39.46) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591301

  [ J. R. Okajima ]

  * SAUCE: AUFS: mm/mmap: fix oopsing on remap_file_pages aufs mmap:
bugfix, mainly for linux-4.5-rc5, remap_file_pages(2) emulation
- LP: #1558120

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * Revert "SAUCE: mm/mmap: fix oopsing on remap_file_pages"
- LP: #1558120
  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * hpsa: move lockup_detected attribute to host attr
- LP: #1581169
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * [4.2-stable only] fix backport "IB/security: restrict use of the
write() interface"
- LP: #1586447
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1586447
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1586447
  * ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)
- LP: #1586447
  * atomic_open(): fix the handling of create_error
- LP: #1586447
  * drm/i915/bdw: Add missing delay during L3 SQC credit programming
- LP: #1586447
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1586447
  * drm/radeon: fix DP link training issue with second 4K monitor
- LP: #1586447
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1586447
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1586447
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1586447
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1586447
  * ALSA: hda - Fix broken reconfig
- LP: #1586447
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1586447
  * vfs: add vfs_select_inode() helper
- LP: #1586447
  * vfs: rename: check backing inode being equal
- LP: 

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic -
3.16.0-76.98~14.04.1

---
linux-lts-utopic (3.16.0-76.98~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596019

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux-lts-utopic (3.16.0-75.97~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595703

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux-lts-utopic (3.16.0-74.96~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591324

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565

 -- Luis Henriques   Fri, 24 Jun 2016
17:17:07 +0100

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Committed
Status in linux-armadaxp source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish 

[Kernel-packages] [Bug 1584953] Re: backport fix for /proc/net issues with containers

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-91.138

---
linux (3.13.0-91.138) trusty; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595991

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Luis Henriques   Fri, 24 Jun 2016
16:19:03 +0100

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1584953

Title:
  backport fix for /proc/net issues with containers

Status in linux package in Ubuntu:
  Fix Released
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux source package in Vivid:
  Fix Released
Status in linux-lts-utopic source package in Vivid:
  Invalid
Status in linux source package in Wily:
  Fix 

[Kernel-packages] [Bug 1580379] Re: CVE-2016-4569

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-91.138

---
linux (3.13.0-91.138) trusty; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595991

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Luis Henriques   Fri, 24 Jun 2016
16:19:03 +0100

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580379

Title:
  CVE-2016-4569

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in 

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-91.138

---
linux (3.13.0-91.138) trusty; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595991

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Luis Henriques   Fri, 24 Jun 2016
16:19:03 +0100

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in 

[Kernel-packages] [Bug 1580379] Re: CVE-2016-4569

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic -
3.16.0-76.98~14.04.1

---
linux-lts-utopic (3.16.0-76.98~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596019

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux-lts-utopic (3.16.0-75.97~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595703

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux-lts-utopic (3.16.0-74.96~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591324

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565

 -- Luis Henriques   Fri, 24 Jun 2016
17:17:07 +0100

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580379

Title:
  CVE-2016-4569

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Released
Status in linux-snapdragon package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Committed
Status in linux-armadaxp source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid

[Kernel-packages] [Bug 1578493] Re: CVE-2016-4482

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-41.48~14.04.1

---
linux-lts-wily (4.2.0-41.48~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595921

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (4.2.0-40.47) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595725

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (4.2.0-39.46) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591301

  [ J. R. Okajima ]

  * SAUCE: AUFS: mm/mmap: fix oopsing on remap_file_pages aufs mmap:
bugfix, mainly for linux-4.5-rc5, remap_file_pages(2) emulation
- LP: #1558120

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * Revert "SAUCE: mm/mmap: fix oopsing on remap_file_pages"
- LP: #1558120
  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * hpsa: move lockup_detected attribute to host attr
- LP: #1581169
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * [4.2-stable only] fix backport "IB/security: restrict use of the
write() interface"
- LP: #1586447
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1586447
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1586447
  * ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)
- LP: #1586447
  * atomic_open(): fix the handling of create_error
- LP: #1586447
  * drm/i915/bdw: Add missing delay during L3 SQC credit programming
- LP: #1586447
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1586447
  * drm/radeon: fix DP link training issue with second 4K monitor
- LP: #1586447
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1586447
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1586447
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1586447
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1586447
  * ALSA: hda - Fix broken reconfig
- LP: #1586447
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1586447
  * vfs: add vfs_select_inode() helper
- LP: #1586447
  * vfs: rename: check backing inode being equal
- LP: 

[Kernel-packages] [Bug 1580379] Re: CVE-2016-4569

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-64.72~14.04.1

---
linux-lts-vivid (3.19.0-64.72~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595990

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.19.0-63.71) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595723

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.19.0-62.70) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591307

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * compiler-gcc: integrate the various compiler-gcc[345].h files
- LP: #1587557
  * fix backport "IB/security: restrict use of the write() interface"
- LP: #1587557
  * x86: LLVMLinux: Fix "incomplete type const struct x86cpu_device_id"
- LP: #1587557
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1587557
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1587557
  * atomic_open(): fix the handling of create_error
- LP: #1587557
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1587557
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1587557
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1587557
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1587557
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1587557
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1587557
  * tools lib traceevent: Free filter tokens in process_filter()
- LP: #1587557
  * tools lib traceevent: Do not reassign parg after collapse_tree()
- LP: #1587557
  * workqueue: fix rebind bound workers warning
- LP: #1587557
  * ocfs2: fix posix_acl_create deadlock
- LP: #1587557
  * nf_conntrack: avoid kernel pointer value leak in slab name
- LP: #1587557
  * net: fec: only clear a queue's work bit if the queue was emptied
- LP: #1587557
  * net/mlx4_en: Fix endianness bug in IPV6 csum calculation
- LP: #1587557
  * macvtap: segmented packet is consumed
- LP: 

[Kernel-packages] [Bug 1581866] Re: CVE-2016-4578

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-64.72~14.04.1

---
linux-lts-vivid (3.19.0-64.72~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595990

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.19.0-63.71) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595723

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.19.0-62.70) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591307

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * compiler-gcc: integrate the various compiler-gcc[345].h files
- LP: #1587557
  * fix backport "IB/security: restrict use of the write() interface"
- LP: #1587557
  * x86: LLVMLinux: Fix "incomplete type const struct x86cpu_device_id"
- LP: #1587557
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1587557
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1587557
  * atomic_open(): fix the handling of create_error
- LP: #1587557
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1587557
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1587557
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1587557
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1587557
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1587557
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1587557
  * tools lib traceevent: Free filter tokens in process_filter()
- LP: #1587557
  * tools lib traceevent: Do not reassign parg after collapse_tree()
- LP: #1587557
  * workqueue: fix rebind bound workers warning
- LP: #1587557
  * ocfs2: fix posix_acl_create deadlock
- LP: #1587557
  * nf_conntrack: avoid kernel pointer value leak in slab name
- LP: #1587557
  * net: fec: only clear a queue's work bit if the queue was emptied
- LP: #1587557
  * net/mlx4_en: Fix endianness bug in IPV6 csum calculation
- LP: #1587557
  * macvtap: segmented packet is consumed
- LP: 

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-64.72~14.04.1

---
linux-lts-vivid (3.19.0-64.72~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595990

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.19.0-63.71) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595723

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.19.0-62.70) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591307

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * compiler-gcc: integrate the various compiler-gcc[345].h files
- LP: #1587557
  * fix backport "IB/security: restrict use of the write() interface"
- LP: #1587557
  * x86: LLVMLinux: Fix "incomplete type const struct x86cpu_device_id"
- LP: #1587557
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1587557
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1587557
  * atomic_open(): fix the handling of create_error
- LP: #1587557
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1587557
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1587557
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1587557
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1587557
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1587557
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1587557
  * tools lib traceevent: Free filter tokens in process_filter()
- LP: #1587557
  * tools lib traceevent: Do not reassign parg after collapse_tree()
- LP: #1587557
  * workqueue: fix rebind bound workers warning
- LP: #1587557
  * ocfs2: fix posix_acl_create deadlock
- LP: #1587557
  * nf_conntrack: avoid kernel pointer value leak in slab name
- LP: #1587557
  * net: fec: only clear a queue's work bit if the queue was emptied
- LP: #1587557
  * net/mlx4_en: Fix endianness bug in IPV6 csum calculation
- LP: #1587557
  * macvtap: segmented packet is consumed
- LP: 

[Kernel-packages] [Bug 1584953] Re: backport fix for /proc/net issues with containers

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic -
3.16.0-76.98~14.04.1

---
linux-lts-utopic (3.16.0-76.98~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596019

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux-lts-utopic (3.16.0-75.97~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595703

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux-lts-utopic (3.16.0-74.96~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591324

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565

 -- Luis Henriques   Fri, 24 Jun 2016
17:17:07 +0100

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1584953

Title:
  backport fix for /proc/net issues with containers

Status in linux package in Ubuntu:
  Fix Released
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux source package in Vivid:
  Fix Released
Status in linux-lts-utopic source package in Vivid:
  Invalid
Status in linux source package in Wily:
  Fix Released
Status in linux-lts-utopic source package in Wily:
  Invalid
Status in linux source package in Xenial:
  Fix Released
Status in linux-lts-utopic source package in Xenial:
  Invalid

Bug description:
  SRU Justification

  Impact: iptables-save fails in lxd containers due to the ownership of
  /proc/net/ip_tables_names. This command is needed to manage firewalls
  in containers using Puppet.

  Fix: Upstream commit f13f2aeed154da8e48f90b85e720f8ba39b1e881
  ("netfilter: Set /proc/net entries owner to root in namespace") which
  sets ownership for /proc/net files to root in the user ns which owns
  the net ns.

  Test Case: Script attached to this bug report. Before the fix no
  output will be seen from iptables-save; 

  1   2   3   4   5   >