[Bug 1508329] Re: CVE-2015-7799

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1508329] Re: CVE-2015-7799

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1508329] Re: CVE-2015-7799

2016-08-27 Thread Mathew Hodson
** Changed in: linux (Ubuntu Xenial)
   Status: Fix Committed => Invalid

** Changed in: linux (Ubuntu Yakkety)
   Status: Fix Committed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Precise)
   Importance: Undecided => Wishlist

** Changed in: linux-snapdragon (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Wily)
   Importance: Undecided => Wishlist

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Importance: Undecided => Wishlist

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Importance: Undecided => Wishlist

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2016-04-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Fix Committed

** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Yakkety)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-mako (Ubuntu Yakkety)
   Importance: Wishlist
   Status: New

** Also affects: linux-manta (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Yakkety)
   Importance: Wishlist
   Status: New

** Also affects: linux-flo (Ubuntu Yakkety)
   Importance: Wishlist
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-raspi2 (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Fix Committed

** Also affects: linux-lts-xenial (Ubuntu Yakkety)
   Importance: Wishlist
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2016-04-19 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2016-02-24 Thread Launchpad Bug Tracker
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-security

** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-proposed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => Wishlist

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => Wishlist

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => Wishlist

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2016-02-05 Thread Steve Beattie
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2016-02-02 Thread Steve Beattie
** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2016-01-14 Thread Steve Beattie
** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2016-01-04 Thread Steve Beattie
** Changed in: linux (Ubuntu Precise)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-12-17 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Vivid)
   Status: Fix Committed => Fix Released

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-12-17 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-21.25~14.04.1

---
linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1522374

  [ Upstream Kernel Changes ]

  * staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
  * [media] media/vivid-osd: fix info leak in ioctl
- LP: #1509564
- CVE-2015-7884
  * KEYS: Fix race between key destruction and finding a keyring by name
- LP: #1508856
- CVE-2015-7872
  * KEYS: Fix crash when attempt to garbage collect an uninstantiated
keyring
- LP: #1508856
- CVE-2015-7872
  * KEYS: Don't permit request_key() to construct a new keyring
- LP: #1508856
- CVE-2015-7872
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
- LP: #1508329
- CVE-2015-7799
  * ppp, slip: Validate VJ compression slot parameters completely
- LP: #1508329
- CVE-2015-7799

linux (4.2.0-20.24) wily; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1521753

  [ Andy Whitcroft ]

  * [Tests] gcc-multilib does not exist on ppc64el
- LP: #1515541

  [ Joseph Salisbury ]

  * SAUCE: scsi_sysfs: protect against double execution of
__scsi_remove_device()
- LP: #1509029

  [ Manoj Kumar ]

  * SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port 1
- LP: #1513583

  [ Matthew R. Ochs ]

  * SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover failure
- LP: #1513583

  [ Oren Givon ]

  * SAUCE: (noup) iwlwifi: Add new PCI IDs for the 8260 series
- LP: #1517375

  [ Seth Forshee ]

  * [Config] CONFIG_DRM_AMDGPU_CIK=n
- LP: #1510405

  [ Upstream Kernel Changes ]

  * net/mlx5e: Disable VLAN filter in promiscuous mode
- LP: #1514861
  * drivers: net: xgene: fix RGMII 10/100Mb mode
- LP: #1433290
  * HID: rmi: Disable scanning if the device is not a wake source
- LP: #1515503
  * HID: rmi: Set F01 interrupt enable register when not set
- LP: #1515503
  * net/mlx5e: Ethtool link speed setting fixes
- LP: #1517919
  * scsi_scan: don't dump trace when scsi_prep_async_scan() is called twice
- LP: #1517942
  * x86/ioapic: Disable interrupts when re-routing legacy IRQs
- LP: #1508593
  * xhci: Workaround to get Intel xHCI reset working more reliably
  * megaraid_sas: Do not use PAGE_SIZE for max_sectors
- LP: #1475166
  * net: usb: cdc_ether: add Dell DW5580 as a mobile broadband adapter
- LP: #1513847
  * KVM: svm: unconditionally intercept #DB
- LP: #1520184
- CVE-2015-8104

 -- Luis Henriques   Thu, 03 Dec 2015
11:41:35 +

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-12-17 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-21.25~14.04.1

---
linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1522374

  [ Upstream Kernel Changes ]

  * staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
  * [media] media/vivid-osd: fix info leak in ioctl
- LP: #1509564
- CVE-2015-7884
  * KEYS: Fix race between key destruction and finding a keyring by name
- LP: #1508856
- CVE-2015-7872
  * KEYS: Fix crash when attempt to garbage collect an uninstantiated
keyring
- LP: #1508856
- CVE-2015-7872
  * KEYS: Don't permit request_key() to construct a new keyring
- LP: #1508856
- CVE-2015-7872
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
- LP: #1508329
- CVE-2015-7799
  * ppp, slip: Validate VJ compression slot parameters completely
- LP: #1508329
- CVE-2015-7799

linux (4.2.0-20.24) wily; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1521753

  [ Andy Whitcroft ]

  * [Tests] gcc-multilib does not exist on ppc64el
- LP: #1515541

  [ Joseph Salisbury ]

  * SAUCE: scsi_sysfs: protect against double execution of
__scsi_remove_device()
- LP: #1509029

  [ Manoj Kumar ]

  * SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port 1
- LP: #1513583

  [ Matthew R. Ochs ]

  * SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover failure
- LP: #1513583

  [ Oren Givon ]

  * SAUCE: (noup) iwlwifi: Add new PCI IDs for the 8260 series
- LP: #1517375

  [ Seth Forshee ]

  * [Config] CONFIG_DRM_AMDGPU_CIK=n
- LP: #1510405

  [ Upstream Kernel Changes ]

  * net/mlx5e: Disable VLAN filter in promiscuous mode
- LP: #1514861
  * drivers: net: xgene: fix RGMII 10/100Mb mode
- LP: #1433290
  * HID: rmi: Disable scanning if the device is not a wake source
- LP: #1515503
  * HID: rmi: Set F01 interrupt enable register when not set
- LP: #1515503
  * net/mlx5e: Ethtool link speed setting fixes
- LP: #1517919
  * scsi_scan: don't dump trace when scsi_prep_async_scan() is called twice
- LP: #1517942
  * x86/ioapic: Disable interrupts when re-routing legacy IRQs
- LP: #1508593
  * xhci: Workaround to get Intel xHCI reset working more reliably
  * megaraid_sas: Do not use PAGE_SIZE for max_sectors
- LP: #1475166
  * net: usb: cdc_ether: add Dell DW5580 as a mobile broadband adapter
- LP: #1513847
  * KVM: svm: unconditionally intercept #DB
- LP: #1520184
- CVE-2015-8104

 -- Luis Henriques   Thu, 03 Dec 2015
11:41:35 +

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-12-17 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.2.0-1016.23

---
linux-raspi2 (4.2.0-1016.23) wily; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1522372
  * rebased on Ubuntu-4.2.0-21.25

  [ Ubuntu: 4.2.0-21.25 ]

  * Release Tracking Bug
- LP: #1522108
  * staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
  * [media] media/vivid-osd: fix info leak in ioctl
- LP: #1509564
- CVE-2015-7884
  * KEYS: Fix race between key destruction and finding a keyring by name
- LP: #1508856
- CVE-2015-7872
  * KEYS: Fix crash when attempt to garbage collect an uninstantiated
keyring
- LP: #1508856
- CVE-2015-7872
  * KEYS: Don't permit request_key() to construct a new keyring
- LP: #1508856
- CVE-2015-7872
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
- LP: #1508329
- CVE-2015-7799
  * ppp, slip: Validate VJ compression slot parameters completely
- LP: #1508329
- CVE-2015-7799

  [ Ubuntu: 4.2.0-20.24 ]

  * Release Tracking Bug
- LP: #1521753
  * [Tests] gcc-multilib does not exist on ppc64el
- LP: #1515541
  * SAUCE: scsi_sysfs: protect against double execution of
__scsi_remove_device()
- LP: #1509029
  * SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port 1
- LP: #1513583
  * SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover failure
- LP: #1513583
  * SAUCE: (noup) iwlwifi: Add new PCI IDs for the 8260 series
- LP: #1517375
  * [Config] CONFIG_DRM_AMDGPU_CIK=n
- LP: #1510405
  * net/mlx5e: Disable VLAN filter in promiscuous mode
- LP: #1514861
  * drivers: net: xgene: fix RGMII 10/100Mb mode
- LP: #1433290
  * HID: rmi: Disable scanning if the device is not a wake source
- LP: #1515503
  * HID: rmi: Set F01 interrupt enable register when not set
- LP: #1515503
  * net/mlx5e: Ethtool link speed setting fixes
- LP: #1517919
  * scsi_scan: don't dump trace when scsi_prep_async_scan() is called twice
- LP: #1517942
  * x86/ioapic: Disable interrupts when re-routing legacy IRQs
- LP: #1508593
  * xhci: Workaround to get Intel xHCI reset working more reliably
  * megaraid_sas: Do not use PAGE_SIZE for max_sectors
- LP: #1475166
  * net: usb: cdc_ether: add Dell DW5580 as a mobile broadband adapter
- LP: #1513847
  * KVM: svm: unconditionally intercept #DB
- LP: #1520184
- CVE-2015-8104

 -- Luis Henriques   Thu, 03 Dec 2015
13:57:56 +

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: Fix Committed => Fix Released

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-12-17 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.2.0-1016.23

---
linux-raspi2 (4.2.0-1016.23) wily; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1522372
  * rebased on Ubuntu-4.2.0-21.25

  [ Ubuntu: 4.2.0-21.25 ]

  * Release Tracking Bug
- LP: #1522108
  * staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
  * [media] media/vivid-osd: fix info leak in ioctl
- LP: #1509564
- CVE-2015-7884
  * KEYS: Fix race between key destruction and finding a keyring by name
- LP: #1508856
- CVE-2015-7872
  * KEYS: Fix crash when attempt to garbage collect an uninstantiated
keyring
- LP: #1508856
- CVE-2015-7872
  * KEYS: Don't permit request_key() to construct a new keyring
- LP: #1508856
- CVE-2015-7872
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
- LP: #1508329
- CVE-2015-7799
  * ppp, slip: Validate VJ compression slot parameters completely
- LP: #1508329
- CVE-2015-7799

  [ Ubuntu: 4.2.0-20.24 ]

  * Release Tracking Bug
- LP: #1521753
  * [Tests] gcc-multilib does not exist on ppc64el
- LP: #1515541
  * SAUCE: scsi_sysfs: protect against double execution of
__scsi_remove_device()
- LP: #1509029
  * SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port 1
- LP: #1513583
  * SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover failure
- LP: #1513583
  * SAUCE: (noup) iwlwifi: Add new PCI IDs for the 8260 series
- LP: #1517375
  * [Config] CONFIG_DRM_AMDGPU_CIK=n
- LP: #1510405
  * net/mlx5e: Disable VLAN filter in promiscuous mode
- LP: #1514861
  * drivers: net: xgene: fix RGMII 10/100Mb mode
- LP: #1433290
  * HID: rmi: Disable scanning if the device is not a wake source
- LP: #1515503
  * HID: rmi: Set F01 interrupt enable register when not set
- LP: #1515503
  * net/mlx5e: Ethtool link speed setting fixes
- LP: #1517919
  * scsi_scan: don't dump trace when scsi_prep_async_scan() is called twice
- LP: #1517942
  * x86/ioapic: Disable interrupts when re-routing legacy IRQs
- LP: #1508593
  * xhci: Workaround to get Intel xHCI reset working more reliably
  * megaraid_sas: Do not use PAGE_SIZE for max_sectors
- LP: #1475166
  * net: usb: cdc_ether: add Dell DW5580 as a mobile broadband adapter
- LP: #1513847
  * KVM: svm: unconditionally intercept #DB
- LP: #1520184
- CVE-2015-8104

 -- Luis Henriques   Thu, 03 Dec 2015
13:57:56 +

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-12-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.2.0-21.25

---
linux (4.2.0-21.25) wily; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1522108

  [ Upstream Kernel Changes ]

  * staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
  * [media] media/vivid-osd: fix info leak in ioctl
- LP: #1509564
- CVE-2015-7884
  * KEYS: Fix race between key destruction and finding a keyring by name
- LP: #1508856
- CVE-2015-7872
  * KEYS: Fix crash when attempt to garbage collect an uninstantiated
keyring
- LP: #1508856
- CVE-2015-7872
  * KEYS: Don't permit request_key() to construct a new keyring
- LP: #1508856
- CVE-2015-7872
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
- LP: #1508329
- CVE-2015-7799
  * ppp, slip: Validate VJ compression slot parameters completely
- LP: #1508329
- CVE-2015-7799

linux (4.2.0-20.24) wily; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1521753

  [ Andy Whitcroft ]

  * [Tests] gcc-multilib does not exist on ppc64el
- LP: #1515541

  [ Joseph Salisbury ]

  * SAUCE: scsi_sysfs: protect against double execution of
__scsi_remove_device()
- LP: #1509029

  [ Manoj Kumar ]

  * SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port 1
- LP: #1513583

  [ Matthew R. Ochs ]

  * SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover failure
- LP: #1513583

  [ Oren Givon ]

  * SAUCE: (noup) iwlwifi: Add new PCI IDs for the 8260 series
- LP: #1517375

  [ Seth Forshee ]

  * [Config] CONFIG_DRM_AMDGPU_CIK=n
- LP: #1510405

  [ Upstream Kernel Changes ]

  * net/mlx5e: Disable VLAN filter in promiscuous mode
- LP: #1514861
  * drivers: net: xgene: fix RGMII 10/100Mb mode
- LP: #1433290
  * HID: rmi: Disable scanning if the device is not a wake source
- LP: #1515503
  * HID: rmi: Set F01 interrupt enable register when not set
- LP: #1515503
  * net/mlx5e: Ethtool link speed setting fixes
- LP: #1517919
  * scsi_scan: don't dump trace when scsi_prep_async_scan() is called twice
- LP: #1517942
  * x86/ioapic: Disable interrupts when re-routing legacy IRQs
- LP: #1508593
  * xhci: Workaround to get Intel xHCI reset working more reliably
  * megaraid_sas: Do not use PAGE_SIZE for max_sectors
- LP: #1475166
  * net: usb: cdc_ether: add Dell DW5580 as a mobile broadband adapter
- LP: #1513847
  * KVM: svm: unconditionally intercept #DB
- LP: #1520184
- CVE-2015-8104

 -- Luis Henriques   Wed, 02 Dec 2015
17:30:58 +

** Changed in: linux (Ubuntu Wily)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7872

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7884

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7885

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8104

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-12-12 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-12-08 Thread Steve Beattie
** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-12-04 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Fix Committed

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-12-03 Thread Steve Beattie
** Changed in: linux (Ubuntu Xenial)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-12-02 Thread Luis Henriques
** Changed in: linux (Ubuntu Wily)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-12-01 Thread Steve Beattie
** Changed in: linux (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Committed

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => Wishlist

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => Wishlist

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Wishlist

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => Wishlist

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => Wishlist

** Description changed:

  The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel
  through 4.2.3 does not ensure that certain slot numbers are valid, which
  allows local users to cause a denial of service (NULL pointer
  dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
  
- Break-Fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 -
+ Break-Fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 
0baa57d8dc32db78369d8b5176ef56c5e2e18ab3
+ Break-Fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 
4ab42d78e37a294ac7bc56901d563c642e03c4ae

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => Wishlist

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => Wishlist

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Wishlist

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => Wishlist

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-10-28 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Wishlist
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Wishlist
   Status: New

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Wishlist
   Status: New

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Wishlist
   Status: New

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Wishlist
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Wishlist
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Wishlist
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-10-22 Thread Steve Beattie
** Description changed:

- net: slip: crash when using PPP character device driver
+ The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel
+ through 4.2.3 does not ensure that certain slot numbers are valid, which
+ allows local users to cause a denial of service (NULL pointer
+ dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
  
  Break-Fix: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 -

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329

Title:
  CVE-2015-7799

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508329/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1508329] Re: CVE-2015-7799

2015-10-21 Thread Steve Beattie
CVE-2015-7799

** Also affects: linux (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Changed in: linux-lts-trusty (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-mako (Ubuntu Precise)
   Status: New