** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.l
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux (Ubuntu Utopic)
Status: New => Invalid
** Changed in: lin
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Chan
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux (Ubuntu Utopic)
Status: New => Invalid
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
** Changed in: lin
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux (Ubuntu Wily)
Status: New => Invalid
** Ch
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux (Ubuntu Wily)
Status: New => Invalid
** Ch
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux (Ubuntu Wily)
Status: New => Invalid
** Ch
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1458901
Title:
linux: 3.2.0-85.122 -proposed tr
CVE-2015-4178
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[ns: user namespaces panic -- lack of internal consistency of a data
structure]
Break-Fix: - 820f9f147dcce2602eefd9b575bbbd9ea14f0953
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: l
*** This bug is a security vulnerability ***
Public security bug reported:
[ns: user namespaces panic -- lack of state identification]
Break-Fix: - cd4a40174b71acd021877341684d8bb1dc8ea4ae
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubunt
CVE-2015-4177
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
CVE-2015-4176
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
Deletion of a file or directory could trigger an unmount and reveal data
under a mount point.
Break-Fix: - e0c9c0afd2fc958ffa34b697972721d81df8a56f
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
CVE-2015-4170
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[vulnerability in the kernel tty subsystem]
Break-Fix: - 4898e640caf03fdbaf2122d5a33949bf3e4a5b34
Break-Fix: - cf872776fc84128bb779ce2b83a37c884c3203ae
** Affects: linux (Ubuntu)
Importance: Medium
Status:
CVE-2015-4167
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[fs: udf kernel oops]
Break-Fix: - 23b133bdc452aa441fcb9b82cbf6dd05cfd342d0
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: Medium
St
CVE-2015-1805
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
A flaw was found in the way pipe_iov_copy_from_user() and
pipe_iov_copy_to_user() functions handled iovecs remaining len
accounting on failed atomic access. An unprivileged local user could
this flaw to crash the system or
CVE-2014-9731
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[udf: information leakage when reading symlink]
Break-Fix: - 0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
Impo
CVE-2014-9730
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[properly ignore component length for component types that do not use
it]
Break-Fix: - e237ec37ec154564f8690c5bd1795339955eeef9
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-a
CVE-2014-9729
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[iinfo->i_lenAlloc != inode->i_size]
Break-Fix: - e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: Med
CVE-2014-9728
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
A UDF filesystem image with malicious lengths specified in multiple
datastructures could cause crashes or other undesired behaviours.
Break-Fix: - e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
Break-Fix: - e237ec37ec154564f869
** Description changed:
- [chown() was racy relative to execve()]
+ Race condition in the prepare_binprm function in fs/exec.c in the Linux
+ kernel before 3.19.6 allows local users to gain privileges by executing
+ a setuid program at a time instant when a chown to root is in progress,
+ and the
** Description changed:
- [IPv6 Hop limit lowering via RA messages]
+ The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor
+ Discovery (ND) protocol implementation in the IPv6 stack in the Linux
+ kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit
+ setting
** Description changed:
- Linux mishandles int80 fork from 64-bit tasks
+ arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not
+ prevent the TS_COMPAT flag from reaching a user-mode task, which might
+ allow local users to bypass the seccomp or audit protection mechanism
+ via a c
** Description changed:
- [DoS -- OOPS NULL pointer dereference in nf_nat_setup_info+0x471]
+ include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem
+ in the Linux kernel before 3.14.5 uses an insufficiently large data type
+ for certain extension data, which allows local users to
** Description changed:
- [btrfs: non-atomic xattr replace operation]
+ The Btrfs implementation in the Linux kernel before 3.19 does not ensure
+ that the visible xattr state is consistent with a requested replacement,
+ which allows local users to bypass intended ACL settings and gain
+ privileg
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: N
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu
** Description changed:
Race condition in the handle_to_path function in fs/fhandle.c in the
Linux kernel through 3.19.1 allows local users to bypass intended size
restrictions and trigger read operations on additional memory locations
by changing the handle_bytes value of a file handle du
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1457807
Title:
CVE-2015-4036
Status in linux p
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubunt
CVE-2015-0275
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-0275
** Changed in: kernel-sru-workflow/security-signoff
Status: Invalid => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts
CVE-2015-0275
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-0275
** Changed in: kernel-sru-workflow/security-signoff
Status: Invalid => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1459957
Title:
linux: 3.19.0-20.
No CVEs
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1458999
Title:
linux-ti-omap4:
No CVEs
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1458977
Title:
linux-lts-utop
No CVEs
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1459068
Title:
linux-lts-trus
No CVEs
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1458778
Title:
linux: 3.16.0-39.53 -prop
No CVEs
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1458618
Title:
linux: 3.13.0-54.91 -prop
No CVEs
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1458901
Title:
linux: 3.2.0-85.122 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1441108
Title:
CVE-2015-2925
Status in linux packa
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1447367
Title:
CVE-2015-3331
Status in linux package in
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
** Ch
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1440234
Title:
CVE-2015-2830
Status in linux package in
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1430952
Title:
CVE-2015-2150
Status in linux package in
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1416503
Title:
CVE-2015-1420
Status in linux packa
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1425270
Title:
CVE-2015-0275
Status in linux package in
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux (Ubuntu Utopic)
Status: New => Invalid
** Changed in: lin
** Description changed:
The InfiniBand (IB) implementation in the Linux kernel package before
2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly
restrict use of User Verbs for registration of memory regions, which
allows local users to access arbitrary physical memory l
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1403851
Title:
CVE-2014-4323
Status in linux package
CVE-2015-4036
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[drivers/vhost/scsi.c: potential memory corruption]
Break-Fix: 057cbf49a1f08297877e46c82f707b1bfea806a8
59c816c1f24df0204e01851431d3bab3eb76719c
** Affects: linux (Ubuntu)
Importance: Medium
Status: Fix Com
** Description changed:
The InfiniBand (IB) implementation in the Linux kernel package before
2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly
restrict use of User Verbs for registration of memory regions, which
allows local users to access arbitrary physical memory l
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Utopic)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-utopic (Ubunt
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
** Changed in: linux (Ubuntu Utopic)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
** Description changed:
[TCP Fast Open local DoS]
- Break-Fix: - local-2015-3332
+ Break-Fix: 355a901e6cf1b2b763ec85caa2a9f04fbcc4ab4a local-2015-3332
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://
No CVEs
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
** Changed in: kernel-sru-workflow/security-s
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1454785
Title:
linux: 3.13.0-53.
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1452900
Title:
linux-
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1452882
Title:
linux-
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1452623
Title:
linux: 3.16.0-38.
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1452432
Title:
linux-ti
No CVEs
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1452000
Title:
linux: 3.19.0-17.17 -prop
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1451968
Title:
linux: 3.2.0-84.1
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1447373
Title:
CVE-2015-3339
Status in linux p
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1447371
Title:
CVE-2015-3332
Status in linux
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1440234
Title:
CVE-2015-2830
Status in linux
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubu
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1430952
Title:
CVE-2015-2150
Status in linux
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1438501
Title:
CVE-2014-9710
Status in linux
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precis
** Description changed:
[kernel: memcg: OOM handling DoS]
+
+ Break-Fix: - 3812c8c8f3953921ef18544110dafc3505c1ac62
+ Break-Fix: - 4942642080ea82d99ab5b653abb9a12b7ba31f4a
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
** Also affects: linux (Ubuntu Wily)
Importance: High
Assignee: Luis Henriques (henrix)
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: High
Status: In
CVE-2015-3636
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
701 - 800 of 4213 matches
Mail list logo