** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580379
Title:
CVE-2016-4569
Status in linux package in Ubuntu:
** Branch linked: lp:ubuntu/trusty-updates/linux-lts-wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580379
Title:
CVE-2016-4569
Status in linux package in Ubuntu:
Fix
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93
---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1591436
* Rebase to Ubuntu-3.2.0-105.146
[ Ubuntu: 3.2.0-105.146 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110
---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1591435
[ Ubuntu: 3.2.0-105.146 ]
* Release Tracking Bug
- LP: #1591329
* [debian] getabis:
This bug was fixed in the package linux - 3.2.0-105.146
---
linux (3.2.0-105.146) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1591329
[ Kamal Mostafa ]
* [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
[
This bug was fixed in the package linux-lts-trusty -
3.13.0-91.138~precise1
---
linux-lts-trusty (3.13.0-91.138~precise1) precise; urgency=medium
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1596012
[ Upstream Kernel Changes ]
* netfilter: x_tables: validate
This bug was fixed in the package linux-lts-xenial - 4.4.0-28.47~14.04.1
---
linux-lts-xenial (4.4.0-28.47~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595884
* Linux netfilter local privilege escalation issues (LP: #1595350)
-
This bug was fixed in the package linux-lts-wily - 4.2.0-41.48~14.04.1
---
linux-lts-wily (4.2.0-41.48~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595921
[ Upstream Kernel Changes ]
* netfilter: x_tables: validate e->target_offset
This bug was fixed in the package linux - 3.13.0-91.138
---
linux (3.13.0-91.138) trusty; urgency=medium
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595991
[ Upstream Kernel Changes ]
* netfilter: x_tables: validate e->target_offset early
- LP: #1555338
-
This bug was fixed in the package linux-lts-utopic -
3.16.0-76.98~14.04.1
---
linux-lts-utopic (3.16.0-76.98~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1596019
[ Upstream Kernel Changes ]
* netfilter: x_tables: validate
This bug was fixed in the package linux-lts-vivid - 3.19.0-64.72~14.04.1
---
linux-lts-vivid (3.19.0-64.72~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595990
[ Upstream Kernel Changes ]
* netfilter: x_tables: validate e->target_offset
This bug was fixed in the package linux - 3.19.0-64.72
---
linux (3.19.0-64.72) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595976
[ Upstream Kernel Changes ]
* netfilter: x_tables: validate e->target_offset early
- LP: #1555338
-
This bug was fixed in the package linux-raspi2 - 4.2.0-1033.43
---
linux-raspi2 (4.2.0-1033.43) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595920
* rebased on Ubuntu-4.2.0-41.48
[ Ubuntu: 4.2.0-41.48 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux - 4.2.0-41.48
---
linux (4.2.0-41.48) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595914
[ Upstream Kernel Changes ]
* netfilter: x_tables: validate e->target_offset early
- LP: #1555338
-
This bug was fixed in the package linux-snapdragon - 4.4.0-1019.22
---
linux-snapdragon (4.4.0-1019.22) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1595882
[ Ubuntu: 4.4.0-28.47 ]
* Linux netfilter local privilege escalation issues (LP:
This bug was fixed in the package linux - 4.4.0-28.47
---
linux (4.4.0-28.47) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to
This bug was fixed in the package linux-raspi2 - 4.4.0-1016.22
---
linux-raspi2 (4.4.0-1016.22) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595881
* Rebase against Ubuntu-4.4.0-28.47
[ Ubuntu: 4.4.0-28.47 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux - 4.4.0-25.44
---
linux (4.4.0-25.44) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1591289
* Xenial update to v4.4.13 stable release (LP: #1590455)
- MIPS64: R6: R2 emulation bugfix
- MIPS: math-emu:
This bug was fixed in the package linux-raspi2 - 4.4.0-1013.17
---
linux-raspi2 (4.4.0-1013.17) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1591461
[ Ubuntu: 4.4.0-25.44 ]
* Xenial update to v4.4.13 stable release (LP: #1590455)
- MIPS64:
This bug was fixed in the package linux-snapdragon - 4.4.0-1016.19
---
linux-snapdragon (4.4.0-1016.19) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1591462
[ Ubuntu: 4.4.0-25.44 ]
* Xenial update to v4.4.13 stable release (LP: #1590455)
-
** Description changed:
- information leak
+ The snd_timer_user_params function in sound/core/timer.c in the Linux
+ kernel through 4.6 does not initialize a certain data structure, which
+ allows local users to obtain sensitive information from kernel stack
+ memory via crafted use of the ALSA
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580379
Title:
CVE-2016-4569
Status in linux
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
**
** Description changed:
information leak
+
+ Break-Fix: - cec8f96e49d9be372fdb0c3836dcf31ec71e457e
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1580379
Title:
CVE-2016-4569
** Also affects: linux (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Also affects: linux-raspi2 (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Also
25 matches
Mail list logo