[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-08-12 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status in linux-lts-utopic source package in Vivid:
  New
Status in linux-lts-vivid source package in Vivid:
  New
Status in linux-lts-wily source package in Vivid:
  New
Status in linux-lts-xenial source package in Vivid:
  New
Status in linux-mako source package in Vivid:
  New
Status in linux-manta source package in Vivid:
  New
Status in linux-raspi2 source package in Vivid:
  New
Status in linux-snapdragon source package in Vivid:
  New
Status in linux-ti-omap4 source package in Vivid:
  New
Status in linux source package in Wily:
  Fix Released
Status in linux-armadaxp source package in Wily:
  Invalid
Status in linux-flo source package in Wily:
  New
Status in linux-goldfish source package in Wily:
  New
Status in linux-lts-quantal source package in Wily:
  Invalid
Status in linux-lts-raring source package in Wily:
  Invalid
Status in linux-lts-saucy source package in Wily:
  Invalid
Status in linux-lts-trusty source package in Wily:
  Invalid
Status in linux-lts-utopic source package in Wily:
  Invalid
Status in linux-lts-vivid source package in Wily:
  Invalid
Status in linux-lts-wily source package in Wily:
  Invalid
Status in linux-lts-xenial source package in Wily:
  Invalid
Status in linux-mako source package in Wily:
  New
Status in linux-manta source packag

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-08-12 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-updates/linux-lts-wily

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status in linux-lts-utopic source package in Vivid:
  New
Status in linux-lts-vivid source package in Vivid:
  New
Status in linux-lts-wily source package in Vivid:
  New
Status in linux-lts-xenial source package in Vivid:
  New
Status in linux-mako source package in Vivid:
  New
Status in linux-manta source package in Vivid:
  New
Status in linux-raspi2 source package in Vivid:
  New
Status in linux-snapdragon source package in Vivid:
  New
Status in linux-ti-omap4 source package in Vivid:
  New
Status in linux source package in Wily:
  Fix Released
Status in linux-armadaxp source package in Wily:
  Invalid
Status in linux-flo source package in Wily:
  New
Status in linux-goldfish source package in Wily:
  New
Status in linux-lts-quantal source package in Wily:
  Invalid
Status in linux-lts-raring source package in Wily:
  Invalid
Status in linux-lts-saucy source package in Wily:
  Invalid
Status in linux-lts-trusty source package in Wily:
  Invalid
Status in linux-lts-utopic source package in Wily:
  Invalid
Status in linux-lts-vivid source package in Wily:
  Invalid
Status in linux-lts-wily source package in Wily:
  Invalid
Status in linux-lts-xenial source package in Wily:
  Invalid
Status in linux-mako source package in Wily:
  New
Status in linux-manta source package 

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty -
3.13.0-91.138~precise1

---
linux-lts-trusty (3.13.0-91.138~precise1) precise; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596012

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Kamal Mostafa   Fri, 24 Jun 2016 11:32:52 -0700

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
St

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93

---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1591436
  * Rebase to Ubuntu-3.2.0-105.146

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Ike Panhc   Mon, 13 Jun 2016 15:18:37 +0800

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
St

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110

---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591435

  [ Ubuntu: 3.2.0-105.146 ]

  * Release Tracking Bug
- LP: #1591329
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Mon, 13 Jun 2016 10:42:12 -0700

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status in linux-lts-utopic so

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-105.146

---
linux (3.2.0-105.146) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591329

  [ Kamal Mostafa ]

  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Upstream Kernel Changes ]

  * ppp: take reference on channels netns
- LP: #1583963
- CVE-2016-4805
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951

 -- Kamal Mostafa   Fri, 10 Jun 2016 12:12:23 -0700

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3951

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4805

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Released
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-41.48~14.04.1

---
linux-lts-wily (4.2.0-41.48~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595921

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (4.2.0-40.47) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595725

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (4.2.0-39.46) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591301

  [ J. R. Okajima ]

  * SAUCE: AUFS: mm/mmap: fix oopsing on remap_file_pages aufs mmap:
bugfix, mainly for linux-4.5-rc5, remap_file_pages(2) emulation
- LP: #1558120

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * Revert "SAUCE: mm/mmap: fix oopsing on remap_file_pages"
- LP: #1558120
  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * hpsa: move lockup_detected attribute to host attr
- LP: #1581169
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * [4.2-stable only] fix backport "IB/security: restrict use of the
write() interface"
- LP: #1586447
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1586447
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1586447
  * ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)
- LP: #1586447
  * atomic_open(): fix the handling of create_error
- LP: #1586447
  * drm/i915/bdw: Add missing delay during L3 SQC credit programming
- LP: #1586447
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1586447
  * drm/radeon: fix DP link training issue with second 4K monitor
- LP: #1586447
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1586447
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1586447
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1586447
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1586447
  * ALSA: hda - Fix broken reconfig
- LP: #1586447
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1586447
  * vfs: add vfs_select_inode() helper
- LP: #1586447
  * vfs: rename: check backing inode being equal
- LP: #1586

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic -
3.16.0-76.98~14.04.1

---
linux-lts-utopic (3.16.0-76.98~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1596019

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux-lts-utopic (3.16.0-75.97~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595703

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux-lts-utopic (3.16.0-74.96~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591324

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565

 -- Luis Henriques   Fri, 24 Jun 2016
17:17:07 +0100

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Committed
Status in linux-armadaxp source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Inv

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-64.72~14.04.1

---
linux-lts-vivid (3.19.0-64.72~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595990

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.19.0-63.71) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595723

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.19.0-62.70) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591307

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * compiler-gcc: integrate the various compiler-gcc[345].h files
- LP: #1587557
  * fix backport "IB/security: restrict use of the write() interface"
- LP: #1587557
  * x86: LLVMLinux: Fix "incomplete type const struct x86cpu_device_id"
- LP: #1587557
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1587557
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1587557
  * atomic_open(): fix the handling of create_error
- LP: #1587557
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1587557
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1587557
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1587557
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1587557
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1587557
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1587557
  * tools lib traceevent: Free filter tokens in process_filter()
- LP: #1587557
  * tools lib traceevent: Do not reassign parg after collapse_tree()
- LP: #1587557
  * workqueue: fix rebind bound workers warning
- LP: #1587557
  * ocfs2: fix posix_acl_create deadlock
- LP: #1587557
  * nf_conntrack: avoid kernel pointer value leak in slab name
- LP: #1587557
  * net: fec: only clear a queue's work bit if the queue was emptied
- LP: #1587557
  * net/mlx4_en: Fix endianness bug in IPV6 csum calculation
- LP: #1587557
  * macvtap: segmented packet is consumed
- LP: #158755

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-91.138

---
linux (3.13.0-91.138) trusty; urgency=medium

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595991

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.13.0-90.137) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595693

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.13.0-89.136) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591315

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Stefan Bader ]

  * SAUCE: powerpc/powernv: Fix incomplete backport of 8117ac6
- LP: #1589910

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * KVM: x86: move steal time initialization to vcpu entry time
- LP: #1494350
  * lpfc: Fix premature release of rpi bit in bitmask
- LP: #1580560
  * lpfc: Correct loss of target discovery after cable swap.
- LP: #1580560
  * mm/balloon_compaction: redesign ballooned pages management
- LP: #1572562
  * mm/balloon_compaction: fix deflation when compaction is disabled
- LP: #1572562
  * bridge: Fix the way to find old local fdb entries in br_fdb_changeaddr
- LP: #1581585
  * bridge: notify user space after fdb update
- LP: #1581585
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * IB/security: Restrict use of the write() interface
- LP: #1580372
- CVE-2016-4565
  * netlink: autosize skb lengthes
- LP: #1568969
  * xfs: allow inode allocations in post-growfs disk space
- LP: #1560142

 -- Luis Henriques   Fri, 24 Jun 2016
16:19:03 +0100

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4565

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-64.72

---
linux (3.19.0-64.72) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595976

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (3.19.0-63.71) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595723

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (3.19.0-62.70) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591307

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * compiler-gcc: integrate the various compiler-gcc[345].h files
- LP: #1587557
  * fix backport "IB/security: restrict use of the write() interface"
- LP: #1587557
  * x86: LLVMLinux: Fix "incomplete type const struct x86cpu_device_id"
- LP: #1587557
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1587557
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1587557
  * atomic_open(): fix the handling of create_error
- LP: #1587557
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1587557
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1587557
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1587557
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1587557
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1587557
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1587557
  * tools lib traceevent: Free filter tokens in process_filter()
- LP: #1587557
  * tools lib traceevent: Do not reassign parg after collapse_tree()
- LP: #1587557
  * workqueue: fix rebind bound workers warning
- LP: #1587557
  * ocfs2: fix posix_acl_create deadlock
- LP: #1587557
  * nf_conntrack: avoid kernel pointer value leak in slab name
- LP: #1587557
  * net: fec: only clear a queue's work bit if the queue was emptied
- LP: #1587557
  * net/mlx4_en: Fix endianness bug in IPV6 csum calculation
- LP: #1587557
  * macvtap: segmented packet is consumed
- LP: #1587557
  * tcp: refresh skb timestamp at r

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.2.0-1033.43

---
linux-raspi2 (4.2.0-1033.43) wily; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595920
  * rebased on Ubuntu-4.2.0-41.48

  [ Ubuntu: 4.2.0-41.48 ]

  * Release Tracking Bug
- LP: #1595914
  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

  [ Ubuntu: 4.2.0-40.47 ]

  * Release Tracking Bug
- LP: #1595725
  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux-raspi2 (4.2.0-1032.42) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591458

  [ Ubuntu: 4.2.0-39.46 ]

  * SAUCE: AUFS: mm/mmap: fix oopsing on remap_file_pages aufs mmap:
bugfix, mainly for linux-4.5-rc5, remap_file_pages(2) emulation
- LP: #1558120
  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
  * Revert "SAUCE: mm/mmap: fix oopsing on remap_file_pages"
- LP: #1558120
  * [Config] Remove arc4 from nic-modules
- LP: #1582991
  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * hpsa: move lockup_detected attribute to host attr
- LP: #1581169
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * [4.2-stable only] fix backport "IB/security: restrict use of the
write() interface"
- LP: #1586447
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1586447
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1586447
  * ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)
- LP: #1586447
  * atomic_open(): fix the handling of create_error
- LP: #1586447
  * drm/i915/bdw: Add missing delay during L3 SQC credit programming
- LP: #1586447
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1586447
  * drm/radeon: fix DP link training issue with second 4K monitor
- LP: #1586447
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1586447
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1586447
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1586447
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1586447
  * ALSA: hda - Fix broken reconfig
- LP: #1586447
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1586447
  * vfs: add vfs_select_inode() helper
- LP: #1586447
  * vfs: rename: check backing inode being equal
- LP: #1586447
  * ALSA: usb-audio: Yet another Phoneix Audio device

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.2.0-41.48

---
linux (4.2.0-41.48) wily; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1595914

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
size
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
- LP: #1555338
- CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
- LP: #1595350
  * netfilter: x_tables: validate targets of jumps
- LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: kill check_entry helper
- LP: #1595350
  * netfilter: x_tables: assert minimum target size
- LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
- LP: #1595350
  * netfilter: x_tables: check standard target size too
- LP: #1595350
  * netfilter: x_tables: check for bogus target offset
- LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
- LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
architectures
- LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
- LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
- LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
- LP: #1595350

linux (4.2.0-40.47) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1595725

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
- LP: #1555338, #1595350

linux (4.2.0-39.46) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1591301

  [ J. R. Okajima ]

  * SAUCE: AUFS: mm/mmap: fix oopsing on remap_file_pages aufs mmap:
bugfix, mainly for linux-4.5-rc5, remap_file_pages(2) emulation
- LP: #1558120

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
- LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890

  [ Tim Gardner ]

  * Revert "SAUCE: mm/mmap: fix oopsing on remap_file_pages"
- LP: #1558120
  * [Config] Remove arc4 from nic-modules
- LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
  * hpsa: move lockup_detected attribute to host attr
- LP: #1581169
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
- LP: #1580379
- CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
- LP: #1581866
- CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
- LP: #1581866
- CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
- LP: #1585366
- CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
- LP: #1583962
- CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
- LP: #1585365
- CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
- LP: #1584953
  * USB: usbfs: fix potential infoleak in devio
- LP: #1578493
- CVE-2016-4482
  * USB: leave LPM alone if possible when binding/unbinding interface
drivers
- LP: #1577024
  * [4.2-stable only] fix backport "IB/security: restrict use of the
write() interface"
- LP: #1586447
  * regulator: s2mps11: Fix invalid selector mask and voltages for buck9
- LP: #1586447
  * regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
- LP: #1586447
  * ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)
- LP: #1586447
  * atomic_open(): fix the handling of create_error
- LP: #1586447
  * drm/i915/bdw: Add missing delay during L3 SQC credit programming
- LP: #1586447
  * crypto: hash - Fix page length clamping in hash walk
- LP: #1586447
  * drm/radeon: fix DP link training issue with second 4K monitor
- LP: #1586447
  * drm/radeon: fix PLL sharing on DCE6.1 (v2)
- LP: #1586447
  * ALSA: hda - Fix white noise on Asus UX501VW headset
- LP: #1586447
  * Input: max8997-haptic - fix NULL pointer dereference
- LP: #1586447
  * drm/i915: Bail out of pipe config compute loop on LPT
- LP: #1586447
  * ALSA: hda - Fix broken reconfig
- LP: #1586447
  * ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
- LP: #1586447
  * vfs: add vfs_select_inode() helper
- LP: #1586447
  * vfs: rename: check backing inode being equal
- LP: #1586447
  * ALSA: usb-audio: Yet another

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-05-31 Thread Steve Beattie
** Description changed:

- [information leak in Rock Ridge Extensions to iso9660]
+ The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux
+ kernel before 4.5.5 mishandles NM (aka alternate name) entries
+ containing \0 characters, which allows local users to obtain sensitive
+ information from kernel memory or possibly have unspecified other impact
+ via a crafted isofs filesystem.
  
  Break-Fix: - 99d825822eade8d827a1817357cbf3f889a552d6

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Committed
Status in linux-armadaxp source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New
Status in linux source package in Trusty:
  Fix Committed
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Committed
Status in linux-lts-vivid source package in Trusty:
  New
Status in linux-lts-wily source package in Trusty:
  New
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Committed
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status in linux-lts-utopic source package in Vivid:
  New
Status in linux-lts-vivid source package in Vivid:
  New
Status in linux-lts-wily source package in Vivid:
  New
Status in linux-lts-xenial source package in Vivid:
  New
Status in linux-mako source package in Vivid:
  New
Status in linux-manta source package in Vivid:
  New
Status in linux-raspi2 source package in Vivid:
  New
Status in linux-snapdragon source package in Vivid:
  New
Status in linux-ti-omap4 source package in Vivid:
  New
Status in linux source package in Wily:
  Fix Committed
Status in linux-armadaxp source package in Wily:
  Invalid
Status in linux-flo source package in Wily:
  New
Status in linux-goldfish source package in Wily:
  New
Status in linux-lts-quantal source package in Wily:
  Invalid
Status in linux-lts-raring source package in Wily:
  Invalid
Status in linux-lts-saucy source package in Wily:
  Invalid
Status in linux-lts-trusty so

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-05-26 Thread Steve Beattie
** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Committed
Status in linux-armadaxp source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New
Status in linux source package in Trusty:
  Fix Committed
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Committed
Status in linux-lts-vivid source package in Trusty:
  New
Status in linux-lts-wily source package in Trusty:
  New
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Committed
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status in linux-lts-utopic source package in Vivid:
  New
Status in linux-lts-vivid source package in Vivid:
  New
Status in linux-lts-wily source package in Vivid:
  New
Status in linux-lts-xenial source package in Vivid:
  New
Status in linux-mako source package in Vivid:
  New
Status in linux-manta source package in Vivid:
  New
Status in linux-raspi2 source package in Vivid:
  New
Status in linux-snapdragon source package in Vivid:
  New
Status in linux-ti-omap4 source package in Vivid:
  New
Status in linux source package in Wily:
  Fix Committed
Status in linux-armadaxp source package in Wily:
  Invalid
Status in linux-flo source package in Wily:
  New
Status in linux-goldfish source package in Wily:
  New
Status in linux-lts-quantal source package in Wily:
  Invalid
Status in linux-lts-raring source package in Wily:
  Invalid
Status in linux-lts-saucy source package in Wily:
  Invalid
Status in linux-lts-trusty source package in Wily:
  Invalid
Status in linux-lts-utopic source package in Wily:
  Invalid
Status in linux-lts-vivid source package in Wily:
  Invalid
Status in linux-lts-wily source package in Wily:
  Invalid
Status in linux-lts-xenial source package in Wily:
  Invalid
Status in linux-mako source package in Wily:
  New
Status in linux-manta source package in Wily:
  New

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-05-25 Thread Kamal Mostafa
** Changed in: linux (Ubuntu Wily)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Precise)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Committed
Status in linux-armadaxp source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New
Status in linux source package in Trusty:
  Fix Committed
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  New
Status in linux-lts-vivid source package in Trusty:
  New
Status in linux-lts-wily source package in Trusty:
  New
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Committed
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status in linux-lts-utopic source package in Vivid:
  New
Status in linux-lts-vivid source package in Vivid:
  New
Status in linux-lts-wily source package in Vivid:
  New
Status in linux-lts-xenial source package in Vivid:
  New
Status in linux-mako source package in Vivid:
  New
Status in linux-manta source package in Vivid:
  New
Status in linux-raspi2 source package in Vivid:
  New
Status in linux-snapdragon source package in Vivid:
  New
Status in linux-ti-omap4 source package in Vivid:
  New
Status in linux source package in Wily:
  Fix Committed
Status in linux-armadaxp source package in Wily:
  Invalid
Status in linux-flo source package in Wily:
  New
Status in linux-goldfish source package in Wily:
  New
Status in linux-lts-quantal source package in Wily:
  Invalid
Status in linux-lts-raring source package in Wily:
  Invalid
Status in linux-lts-saucy source package in Wily:
  Invalid
Status in linux-lts-trusty source package in Wily:
  Invalid
Status in linux-lts-utopic source package in Wily:
  Invalid
Status in linux-lts-vivid source package in Wily:
  Invalid
Status in linux-lts-wil

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-05-24 Thread Steve Beattie
** Changed in: linux (Ubuntu Xenial)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1583962

Title:
  CVE-2016-4913

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-snapdragon package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  New
Status in linux-armadaxp source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-snapdragon source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New
Status in linux source package in Trusty:
  New
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  New
Status in linux-lts-vivid source package in Trusty:
  New
Status in linux-lts-wily source package in Trusty:
  New
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-snapdragon source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  New
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status in linux-lts-utopic source package in Vivid:
  New
Status in linux-lts-vivid source package in Vivid:
  New
Status in linux-lts-wily source package in Vivid:
  New
Status in linux-lts-xenial source package in Vivid:
  New
Status in linux-mako source package in Vivid:
  New
Status in linux-manta source package in Vivid:
  New
Status in linux-raspi2 source package in Vivid:
  New
Status in linux-snapdragon source package in Vivid:
  New
Status in linux-ti-omap4 source package in Vivid:
  New
Status in linux source package in Wily:
  New
Status in linux-armadaxp source package in Wily:
  Invalid
Status in linux-flo source package in Wily:
  New
Status in linux-goldfish source package in Wily:
  New
Status in linux-lts-quantal source package in Wily:
  Invalid
Status in linux-lts-raring source package in Wily:
  Invalid
Status in linux-lts-saucy source package in Wily:
  Invalid
Status in linux-lts-trusty source package in Wily:
  Invalid
Status in linux-lts-utopic source package in Wily:
  Invalid
Status in linux-lts-vivid source package in Wily:
  Invalid
Status in linux-lts-wily source package in Wily:
  Invalid
Status in linux-lts-xenial source package in Wily:
  Invalid
Status in linux-mako source package in Wily:
  New
Status in linux-manta source package in Wily:
  New
Status in linux-raspi2 source package in Wily:
  New
Status 

[Kernel-packages] [Bug 1583962] Re: CVE-2016-4913

2016-05-20 Thread Steve Beattie
CVE-2016-4913

** Also affects: linux (Ubuntu Yakkety)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Yakkety)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Changed in: linux-lts-trusty (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubun