[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-08-12 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1575706 Title: CVE-2016-2187 Status in linux package in Ubuntu:

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-08-12 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-updates/linux-lts-wily -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1575706 Title: CVE-2016-2187 Status in linux package in Ubuntu: Fix

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-104.145 --- linux (3.2.0-104.145) precise; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix handling of directory opening - ecryptfs: don't

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-xenial - 4.4.0-24.43~14.04.1 --- linux-lts-xenial (4.4.0-24.43~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-snapdragon - 4.4.0-1015.18 --- linux-snapdragon (4.4.0-1015.18) xenial; urgency=low [ Kamal Mostafa ] [ Ubuntu: 4.4.0-24.42 ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-61.69 --- linux (3.19.0-61.69) vivid; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking filesystems on top - SAUCE: ecryptfs:

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.4.0-1012.16 --- linux-raspi2 (4.4.0-1012.16) xenial; urgency=low [ Andy Whitcroft ] * Rebase against Ubuntu-4.4.0-23.41 [ Ubuntu: 4.4.0-24.43 ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-61.69~14.04.1 --- linux-lts-vivid (3.19.0-61.69~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1667.92 --- linux-armadaxp (3.2.0-1667.92) precise; urgency=low [ Andy Whitcroft ] * rebase to 3.2.0-104.145 [ Ubuntu: 3.2.0-104.145 ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-24.43 --- linux (4.4.0-24.43) xenial; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking filesystems on top - SAUCE: ecryptfs:

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.2.0-38.45 --- linux (4.2.0-38.45) wily; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking filesystems on top - SAUCE: ecryptfs: forbid

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.2.0-1031.41 --- linux-raspi2 (4.2.0-1031.41) wily; urgency=low [ Kamal Mostafa ] [ Ubuntu: 4.2.0-38.45 ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic - 3.16.0-73.95~14.04.1 --- linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-38.45~14.04.1 --- linux-lts-wily (4.2.0-38.45~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking filesystems

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1482.109 --- linux-ti-omap4 (3.2.0-1482.109) precise; urgency=low [ Kamal Mostafa ] [ Ubuntu: 3.2.0-104.145 ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty - 3.13.0-88.135~precise1 --- linux-lts-trusty (3.13.0-88.135~precise1) precise; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-05-31 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-87.133 --- linux (3.13.0-87.133) trusty; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1585315 [ Upstream Kernel Changes ] * Revert "usb: hub: do not clear BOS field during reset device" - LP: #1582864

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-05-23 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Yakkety) Status: Fix Released => New ** Changed in: linux-snapdragon (Ubuntu Yakkety) Status: Fix Released => New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu.

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-05-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-23.41 --- linux (4.4.0-23.41) xenial; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1582431 * zfs: disable module checks for zfs when cross-compiling (LP: #1581127) - [Packaging] disable zfs module checks

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-05-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.4.0-1011.14 --- linux-raspi2 (4.4.0-1011.14) xenial; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1582847 * Rebase against Ubuntu-4.4.0-23.41 * zfs: disable module checks for zfs when cross-compiling (LP:

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-05-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-snapdragon - 4.4.0-1014.16 --- linux-snapdragon (4.4.0-1014.16) xenial; urgency=low [ Kamal Mostafa ] * Rebase against Ubuntu-4.4.0-23.41 * Release Tracking Bug - LP: #1582679 * zfs: disable module checks for zfs when

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-05-19 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-05-18 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Medium => Low ** Changed in: linux-lts-trusty (Ubuntu Wily) Importance: Medium => Low ** Changed in: linux-lts-trusty (Ubuntu Xenial) Importance: Medium => Low ** Changed in: linux-lts-trusty (Ubuntu Yakkety) Importance:

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-05-13 Thread Steve Beattie
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1575706 Title: CVE-2016-2187 Status in linux

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily)

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-04-29 Thread Steve Beattie
** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed ** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed **

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-04-27 Thread Steve Beattie
** Changed in: linux (Ubuntu Precise) Status: Fix Committed => New ** Changed in: linux (Ubuntu Wily) Status: Fix Committed => New ** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => New ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => New **

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-04-27 Thread Kamal Mostafa
** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed ** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed **

[Kernel-packages] [Bug 1575706] Re: CVE-2016-2187

2016-04-27 Thread Steve Beattie
CVE-2016-2187 ** Also affects: linux (Ubuntu Yakkety) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Undecided Status: New ** Also