[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily)

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2016-04-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-ec2

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2016-04-24 Thread Rolf Leggewie
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2016-04-18 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1413741 Title: CVE-2014-8159 Status in linux package in

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily)

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1413741 Title: CVE-2014-8159 Status in linux

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided =>

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance:

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-10-28 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-ec2

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects:

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any updates. Marking the lucid task for this ticket as Won't Fix. ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix -- You received this bug notification because you are a member of Kernel

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any updates. Marking the lucid task for this ticket as Won't Fix. ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix -- You received this bug notification because you are a member of Kernel

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-06-12 Thread Mathew Hodson
** Changed in: linux (Ubuntu Vivid) Status: Fix Committed = Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: Fix Committed = Invalid ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed = Invalid -- You received this bug notification because

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-06-02 Thread Mathew Hodson
Vivid and Wily are not affected according to http://people.canonical.com /~ubuntu-security/cve/2014/CVE-2014-8159.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1413741

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-05-26 Thread John Johansen
** Description changed: The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-05-22 Thread Mathew Hodson
** Description changed: The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-05-22 Thread John Johansen
** Description changed: The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-05-21 Thread Andy Whitcroft
** Changed in: linux (Ubuntu Vivid) Status: Invalid = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1413741 Title: CVE-2014-8159 Status in linux package

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-ec2 (Ubuntu

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-05-07 Thread Andy Whitcroft
** Changed in: linux-lts-saucy (Ubuntu Precise) Status: Invalid = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1413741 Title: CVE-2014-8159 Status in

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects:

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-377.94 --- linux-ec2 (2.6.32-377.94) lucid; urgency=low [ Stefan Bader ] * Release Tracking Bug - LP: #1449524 * Rebase to Ubuntu-2.6.32-74.142 [ Ubuntu: 2.6.32-74.142 ] * fs: take i_mutex during prepare_binprm for

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-377.94 --- linux-ec2 (2.6.32-377.94) lucid; urgency=low [ Stefan Bader ] * Release Tracking Bug - LP: #1449524 * Rebase to Ubuntu-2.6.32-74.142 [ Ubuntu: 2.6.32-74.142 ] * fs: take i_mutex during prepare_binprm for

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-03-30 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1413741 Title: CVE-2014-8159 Status in linux

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-03-29 Thread Mathew Hodson
** Changed in: linux (Ubuntu Vivid) Status: New = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1413741 Title: CVE-2014-8159 Status in linux package in Ubuntu:

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-03-25 Thread Mathew Hodson
** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu.

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-03-24 Thread John Johansen
** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Released ** Description changed: The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-03-18 Thread John Johansen
** Description changed: - It was found that the Linux kernel's Infiniband subsystem did not - properly sanitize input parameters while registering memory regions from - the userspace via the (u)verbs API. As a result, an unrestricted - physical memory access could be achieved. A local user with

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-03-16 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Released ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid)

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-03-12 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-8159 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/1413741 Title: CVE-2014-8159 Status in

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-03-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-9.9 --- linux (3.19.0-9.9) vivid; urgency=low [ Leann Ogasawara ] * Release Tracking Bug - LP: #1430930 [ Shachar Raindel ] * SAUCE: IB/core: Prevent integer overflow in ib_umem_get address arithmetic - LP:

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-03-11 Thread John Johansen
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/1413741 Title: CVE-2014-8159 Status in linux