[Bug 1508329] Re: CVE-2015-7799
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Invalid ** Changed in: linux (Ubuntu Yakkety) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Wishlist ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Wishlist ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Wishlist ** Changed in: linux-snapdragon (Ubuntu Yakkety) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Yakkety) Importance: Undecided => Wishlist ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Wishlist -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Also affects: linux (Ubuntu Yakkety) Importance: Wishlist Status: Fix Committed ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-ec2 (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Yakkety) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-mako (Ubuntu Yakkety) Importance: Wishlist Status: New ** Also affects: linux-manta (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-goldfish (Ubuntu Yakkety) Importance: Wishlist Status: New ** Also affects: linux-flo (Ubuntu Yakkety) Importance: Wishlist Status: New ** Also affects: linux-lts-trusty (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Yakkety) Importance: Wishlist Status: Invalid ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Wishlist Status: Fix Committed ** Also affects: linux-lts-xenial (Ubuntu Yakkety) Importance: Wishlist Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily /trusty-security ** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily /trusty-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Wishlist ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => Wishlist ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => Wishlist ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => Wishlist -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Vivid) Status: Fix Committed => Fix Released ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
This bug was fixed in the package linux-lts-wily - 4.2.0-21.25~14.04.1 --- linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1522374 [ Upstream Kernel Changes ] * staging/dgnc: fix info leak in ioctl - LP: #1509565 - CVE-2015-7885 * [media] media/vivid-osd: fix info leak in ioctl - LP: #1509564 - CVE-2015-7884 * KEYS: Fix race between key destruction and finding a keyring by name - LP: #1508856 - CVE-2015-7872 * KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring - LP: #1508856 - CVE-2015-7872 * KEYS: Don't permit request_key() to construct a new keyring - LP: #1508856 - CVE-2015-7872 * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() - LP: #1508329 - CVE-2015-7799 * ppp, slip: Validate VJ compression slot parameters completely - LP: #1508329 - CVE-2015-7799 linux (4.2.0-20.24) wily; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1521753 [ Andy Whitcroft ] * [Tests] gcc-multilib does not exist on ppc64el - LP: #1515541 [ Joseph Salisbury ] * SAUCE: scsi_sysfs: protect against double execution of __scsi_remove_device() - LP: #1509029 [ Manoj Kumar ] * SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port 1 - LP: #1513583 [ Matthew R. Ochs ] * SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover failure - LP: #1513583 [ Oren Givon ] * SAUCE: (noup) iwlwifi: Add new PCI IDs for the 8260 series - LP: #1517375 [ Seth Forshee ] * [Config] CONFIG_DRM_AMDGPU_CIK=n - LP: #1510405 [ Upstream Kernel Changes ] * net/mlx5e: Disable VLAN filter in promiscuous mode - LP: #1514861 * drivers: net: xgene: fix RGMII 10/100Mb mode - LP: #1433290 * HID: rmi: Disable scanning if the device is not a wake source - LP: #1515503 * HID: rmi: Set F01 interrupt enable register when not set - LP: #1515503 * net/mlx5e: Ethtool link speed setting fixes - LP: #1517919 * scsi_scan: don't dump trace when scsi_prep_async_scan() is called twice - LP: #1517942 * x86/ioapic: Disable interrupts when re-routing legacy IRQs - LP: #1508593 * xhci: Workaround to get Intel xHCI reset working more reliably * megaraid_sas: Do not use PAGE_SIZE for max_sectors - LP: #1475166 * net: usb: cdc_ether: add Dell DW5580 as a mobile broadband adapter - LP: #1513847 * KVM: svm: unconditionally intercept #DB - LP: #1520184 - CVE-2015-8104 -- Luis HenriquesThu, 03 Dec 2015 11:41:35 + -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
This bug was fixed in the package linux-lts-wily - 4.2.0-21.25~14.04.1 --- linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1522374 [ Upstream Kernel Changes ] * staging/dgnc: fix info leak in ioctl - LP: #1509565 - CVE-2015-7885 * [media] media/vivid-osd: fix info leak in ioctl - LP: #1509564 - CVE-2015-7884 * KEYS: Fix race between key destruction and finding a keyring by name - LP: #1508856 - CVE-2015-7872 * KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring - LP: #1508856 - CVE-2015-7872 * KEYS: Don't permit request_key() to construct a new keyring - LP: #1508856 - CVE-2015-7872 * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() - LP: #1508329 - CVE-2015-7799 * ppp, slip: Validate VJ compression slot parameters completely - LP: #1508329 - CVE-2015-7799 linux (4.2.0-20.24) wily; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1521753 [ Andy Whitcroft ] * [Tests] gcc-multilib does not exist on ppc64el - LP: #1515541 [ Joseph Salisbury ] * SAUCE: scsi_sysfs: protect against double execution of __scsi_remove_device() - LP: #1509029 [ Manoj Kumar ] * SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port 1 - LP: #1513583 [ Matthew R. Ochs ] * SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover failure - LP: #1513583 [ Oren Givon ] * SAUCE: (noup) iwlwifi: Add new PCI IDs for the 8260 series - LP: #1517375 [ Seth Forshee ] * [Config] CONFIG_DRM_AMDGPU_CIK=n - LP: #1510405 [ Upstream Kernel Changes ] * net/mlx5e: Disable VLAN filter in promiscuous mode - LP: #1514861 * drivers: net: xgene: fix RGMII 10/100Mb mode - LP: #1433290 * HID: rmi: Disable scanning if the device is not a wake source - LP: #1515503 * HID: rmi: Set F01 interrupt enable register when not set - LP: #1515503 * net/mlx5e: Ethtool link speed setting fixes - LP: #1517919 * scsi_scan: don't dump trace when scsi_prep_async_scan() is called twice - LP: #1517942 * x86/ioapic: Disable interrupts when re-routing legacy IRQs - LP: #1508593 * xhci: Workaround to get Intel xHCI reset working more reliably * megaraid_sas: Do not use PAGE_SIZE for max_sectors - LP: #1475166 * net: usb: cdc_ether: add Dell DW5580 as a mobile broadband adapter - LP: #1513847 * KVM: svm: unconditionally intercept #DB - LP: #1520184 - CVE-2015-8104 -- Luis HenriquesThu, 03 Dec 2015 11:41:35 + ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
This bug was fixed in the package linux-raspi2 - 4.2.0-1016.23 --- linux-raspi2 (4.2.0-1016.23) wily; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1522372 * rebased on Ubuntu-4.2.0-21.25 [ Ubuntu: 4.2.0-21.25 ] * Release Tracking Bug - LP: #1522108 * staging/dgnc: fix info leak in ioctl - LP: #1509565 - CVE-2015-7885 * [media] media/vivid-osd: fix info leak in ioctl - LP: #1509564 - CVE-2015-7884 * KEYS: Fix race between key destruction and finding a keyring by name - LP: #1508856 - CVE-2015-7872 * KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring - LP: #1508856 - CVE-2015-7872 * KEYS: Don't permit request_key() to construct a new keyring - LP: #1508856 - CVE-2015-7872 * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() - LP: #1508329 - CVE-2015-7799 * ppp, slip: Validate VJ compression slot parameters completely - LP: #1508329 - CVE-2015-7799 [ Ubuntu: 4.2.0-20.24 ] * Release Tracking Bug - LP: #1521753 * [Tests] gcc-multilib does not exist on ppc64el - LP: #1515541 * SAUCE: scsi_sysfs: protect against double execution of __scsi_remove_device() - LP: #1509029 * SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port 1 - LP: #1513583 * SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover failure - LP: #1513583 * SAUCE: (noup) iwlwifi: Add new PCI IDs for the 8260 series - LP: #1517375 * [Config] CONFIG_DRM_AMDGPU_CIK=n - LP: #1510405 * net/mlx5e: Disable VLAN filter in promiscuous mode - LP: #1514861 * drivers: net: xgene: fix RGMII 10/100Mb mode - LP: #1433290 * HID: rmi: Disable scanning if the device is not a wake source - LP: #1515503 * HID: rmi: Set F01 interrupt enable register when not set - LP: #1515503 * net/mlx5e: Ethtool link speed setting fixes - LP: #1517919 * scsi_scan: don't dump trace when scsi_prep_async_scan() is called twice - LP: #1517942 * x86/ioapic: Disable interrupts when re-routing legacy IRQs - LP: #1508593 * xhci: Workaround to get Intel xHCI reset working more reliably * megaraid_sas: Do not use PAGE_SIZE for max_sectors - LP: #1475166 * net: usb: cdc_ether: add Dell DW5580 as a mobile broadband adapter - LP: #1513847 * KVM: svm: unconditionally intercept #DB - LP: #1520184 - CVE-2015-8104 -- Luis HenriquesThu, 03 Dec 2015 13:57:56 + ** Changed in: linux-raspi2 (Ubuntu Wily) Status: Fix Committed => Fix Released ** Changed in: linux-raspi2 (Ubuntu Wily) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
This bug was fixed in the package linux-raspi2 - 4.2.0-1016.23 --- linux-raspi2 (4.2.0-1016.23) wily; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1522372 * rebased on Ubuntu-4.2.0-21.25 [ Ubuntu: 4.2.0-21.25 ] * Release Tracking Bug - LP: #1522108 * staging/dgnc: fix info leak in ioctl - LP: #1509565 - CVE-2015-7885 * [media] media/vivid-osd: fix info leak in ioctl - LP: #1509564 - CVE-2015-7884 * KEYS: Fix race between key destruction and finding a keyring by name - LP: #1508856 - CVE-2015-7872 * KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring - LP: #1508856 - CVE-2015-7872 * KEYS: Don't permit request_key() to construct a new keyring - LP: #1508856 - CVE-2015-7872 * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() - LP: #1508329 - CVE-2015-7799 * ppp, slip: Validate VJ compression slot parameters completely - LP: #1508329 - CVE-2015-7799 [ Ubuntu: 4.2.0-20.24 ] * Release Tracking Bug - LP: #1521753 * [Tests] gcc-multilib does not exist on ppc64el - LP: #1515541 * SAUCE: scsi_sysfs: protect against double execution of __scsi_remove_device() - LP: #1509029 * SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port 1 - LP: #1513583 * SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover failure - LP: #1513583 * SAUCE: (noup) iwlwifi: Add new PCI IDs for the 8260 series - LP: #1517375 * [Config] CONFIG_DRM_AMDGPU_CIK=n - LP: #1510405 * net/mlx5e: Disable VLAN filter in promiscuous mode - LP: #1514861 * drivers: net: xgene: fix RGMII 10/100Mb mode - LP: #1433290 * HID: rmi: Disable scanning if the device is not a wake source - LP: #1515503 * HID: rmi: Set F01 interrupt enable register when not set - LP: #1515503 * net/mlx5e: Ethtool link speed setting fixes - LP: #1517919 * scsi_scan: don't dump trace when scsi_prep_async_scan() is called twice - LP: #1517942 * x86/ioapic: Disable interrupts when re-routing legacy IRQs - LP: #1508593 * xhci: Workaround to get Intel xHCI reset working more reliably * megaraid_sas: Do not use PAGE_SIZE for max_sectors - LP: #1475166 * net: usb: cdc_ether: add Dell DW5580 as a mobile broadband adapter - LP: #1513847 * KVM: svm: unconditionally intercept #DB - LP: #1520184 - CVE-2015-8104 -- Luis HenriquesThu, 03 Dec 2015 13:57:56 + ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
This bug was fixed in the package linux - 4.2.0-21.25 --- linux (4.2.0-21.25) wily; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1522108 [ Upstream Kernel Changes ] * staging/dgnc: fix info leak in ioctl - LP: #1509565 - CVE-2015-7885 * [media] media/vivid-osd: fix info leak in ioctl - LP: #1509564 - CVE-2015-7884 * KEYS: Fix race between key destruction and finding a keyring by name - LP: #1508856 - CVE-2015-7872 * KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring - LP: #1508856 - CVE-2015-7872 * KEYS: Don't permit request_key() to construct a new keyring - LP: #1508856 - CVE-2015-7872 * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() - LP: #1508329 - CVE-2015-7799 * ppp, slip: Validate VJ compression slot parameters completely - LP: #1508329 - CVE-2015-7799 linux (4.2.0-20.24) wily; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1521753 [ Andy Whitcroft ] * [Tests] gcc-multilib does not exist on ppc64el - LP: #1515541 [ Joseph Salisbury ] * SAUCE: scsi_sysfs: protect against double execution of __scsi_remove_device() - LP: #1509029 [ Manoj Kumar ] * SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port 1 - LP: #1513583 [ Matthew R. Ochs ] * SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover failure - LP: #1513583 [ Oren Givon ] * SAUCE: (noup) iwlwifi: Add new PCI IDs for the 8260 series - LP: #1517375 [ Seth Forshee ] * [Config] CONFIG_DRM_AMDGPU_CIK=n - LP: #1510405 [ Upstream Kernel Changes ] * net/mlx5e: Disable VLAN filter in promiscuous mode - LP: #1514861 * drivers: net: xgene: fix RGMII 10/100Mb mode - LP: #1433290 * HID: rmi: Disable scanning if the device is not a wake source - LP: #1515503 * HID: rmi: Set F01 interrupt enable register when not set - LP: #1515503 * net/mlx5e: Ethtool link speed setting fixes - LP: #1517919 * scsi_scan: don't dump trace when scsi_prep_async_scan() is called twice - LP: #1517942 * x86/ioapic: Disable interrupts when re-routing legacy IRQs - LP: #1508593 * xhci: Workaround to get Intel xHCI reset working more reliably * megaraid_sas: Do not use PAGE_SIZE for max_sectors - LP: #1475166 * net: usb: cdc_ether: add Dell DW5580 as a mobile broadband adapter - LP: #1513847 * KVM: svm: unconditionally intercept #DB - LP: #1520184 - CVE-2015-8104 -- Luis HenriquesWed, 02 Dec 2015 17:30:58 + ** Changed in: linux (Ubuntu Wily) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-7872 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-7884 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-7885 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-8104 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Wishlist ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Wishlist ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Wishlist ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => Wishlist ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => Wishlist ** Description changed: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call. - Break-Fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - + Break-Fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 0baa57d8dc32db78369d8b5176ef56c5e2e18ab3 + Break-Fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 4ab42d78e37a294ac7bc56901d563c642e03c4ae -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Wishlist ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Wishlist ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Wishlist ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Wishlist ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => Wishlist -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Also affects: linux (Ubuntu Xenial) Importance: Wishlist Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Wishlist Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Wishlist Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Wishlist Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Wishlist Status: Invalid ** Also affects: linux-mako (Ubuntu Xenial) Importance: Wishlist Status: New ** Also affects: linux-manta (Ubuntu Xenial) Importance: Wishlist Status: New ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Wishlist Status: New ** Also affects: linux-flo (Ubuntu Xenial) Importance: Wishlist Status: New ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Wishlist Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Wishlist Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
** Description changed: - net: slip: crash when using PPP character device driver + The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel + through 4.2.3 does not ensure that certain slot numbers are valid, which + allows local users to cause a denial of service (NULL pointer + dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call. Break-Fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1508329 Title: CVE-2015-7799 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1508329] Re: CVE-2015-7799
CVE-2015-7799 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Changed in: linux-lts-trusty (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Precise) Status: New