[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-08-12 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1463740 Title: CVE-2015-4004 Status in linux package in Ubuntu:

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-08-12 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-updates/linux-lts-wily -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1463740 Title: CVE-2015-4004 Status in linux package in Ubuntu:

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic - 3.16.0-73.95~14.04.1 --- linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-61.69 --- linux (3.19.0-61.69) vivid; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking filesystems on top - SAUCE: ecryptfs:

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.2.0-38.45 --- linux (4.2.0-38.45) wily; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking filesystems on top - SAUCE: ecryptfs: forbid

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty - 3.13.0-88.135~precise1 --- linux-lts-trusty (3.13.0-88.135~precise1) precise; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.2.0-1031.41 --- linux-raspi2 (4.2.0-1031.41) wily; urgency=low [ Kamal Mostafa ] [ Ubuntu: 4.2.0-38.45 ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-38.45~14.04.1 --- linux-lts-wily (4.2.0-38.45~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking filesystems

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-61.69~14.04.1 --- linux-lts-vivid (3.19.0-61.69~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty - 3.13.0-88.135~precise1 --- linux-lts-trusty (3.13.0-88.135~precise1) precise; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.2.0-1031.41 --- linux-raspi2 (4.2.0-1031.41) wily; urgency=low [ Kamal Mostafa ] [ Ubuntu: 4.2.0-38.45 ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-38.45~14.04.1 --- linux-lts-wily (4.2.0-38.45~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking filesystems

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-05-31 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-87.133 --- linux (3.13.0-87.133) trusty; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1585315 [ Upstream Kernel Changes ] * Revert "usb: hub: do not clear BOS field during reset device" - LP: #1582864

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-05-19 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-raspi2 (Ubuntu Wily)

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily)

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-05-02 Thread Steve Beattie
** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1463740 Title: CVE-2015-4004 Status in linux

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-04-28 Thread Kamal Mostafa
** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed ** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-04-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects:

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-04-24 Thread Rolf Leggewie
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-04-19 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1463740 Title: CVE-2015-4004 Status in linux package in

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily)

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2015-12-12 Thread Steve Beattie
** Changed in: linux (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu.

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2015-12-09 Thread Steve Beattie
** Description changed: The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance:

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance:

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2015-10-28 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial) Importance: Medium Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ec2

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2015-09-15 Thread Steve Beattie
** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu.

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects:

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2015-06-17 Thread John Johansen
** Description changed: - [Multiple out-of-bound reads in ozwpan driver] + The OZWPAN driver in the Linux kernel through 4.0.5 relies on an + untrusted length field during packet parsing, which allows remote + attackers to obtain sensitive information from kernel memory or cause a + denial of

[Kernel-packages] [Bug 1463740] Re: CVE-2015-4004

2015-06-10 Thread John Johansen
CVE-2015-4004 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: