[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2019-10-03 Thread Po-Hsu Lin
** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-goldfish in Ubuntu. https://bugs.launchpad.net/bugs/1561388 Title: CVE-2016-3157 Status in linux package

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-104.145 --- linux (3.2.0-104.145) precise; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix handling of directory opening - ecryptfs: don't

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1667.92 --- linux-armadaxp (3.2.0-1667.92) precise; urgency=low [ Andy Whitcroft ] * rebase to 3.2.0-104.145 [ Ubuntu: 3.2.0-104.145 ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1482.109 --- linux-ti-omap4 (3.2.0-1482.109) precise; urgency=low [ Kamal Mostafa ] [ Ubuntu: 3.2.0-104.145 ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-05-19 Thread Steve Beattie
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1561388 Title: CVE-2016-3157 Status in linux

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-05-13 Thread Steve Beattie
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1561388 Title: CVE-2016-3157 Status in linux

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-05-10 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Wily) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-05-06 Thread Steve Beattie
** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Fix Released ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Fix Committed => Fix Released ** Changed in: linux-snapdragon

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily)

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-04-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety) Importance: Medium Status: Fix Committed ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects:

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-04-27 Thread Kamal Mostafa
** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1561388 Title: CVE-2016-3157 Status in linux package

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-04-22 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1561388 Title: CVE-2016-3157 Status in linux

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-04-21 Thread Steve Beattie
** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1561388 Title: CVE-2016-3157 Status in linux package in

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-04-20 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-04-19 Thread Steve Beattie
** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1561388 Title: CVE-2016-3157 Status in linux

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-04-19 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1561388 Title: CVE-2016-3157 Status in linux package in

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-04-15 Thread Steve Beattie
** Description changed: - [I/O port access privilege escalation in x86-64 Linux] + The __switch_to function in arch/x86/kernel/process_64.c in the Linux + kernel does not properly context-switch IOPL on 64-bit PV Xen guests, + which allows guest local OS users to gain privileges, cause a denial

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-04-13 Thread Steve Beattie
** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed ** Description changed: [I/O port access privilege escalation in x86-64 Linux] - Break-Fix: - - + Break-Fix: -

[Kernel-packages] [Bug 1561388] Re: CVE-2016-3157

2016-03-24 Thread Steve Beattie
CVE-2016-3157 ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Also