The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
http
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
h
** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508856
Title:
CVE-2015-7872
To manage notifications about this bug go to:
h
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importan
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects:
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508856
Title:
CVE-2015-7872
To manage notifications about this bug go to:
htt
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-security
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-proposed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launc
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importan
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508856
Title:
CVE-2015-7872
To manage notifications about this bug g
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508856
Title:
CVE-2015-7872
To manage notifications about
This bug was fixed in the package linux-lts-wily - 4.2.0-21.25~14.04.1
---
linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522374
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #150
This bug was fixed in the package linux-raspi2 - 4.2.0-1016.23
---
linux-raspi2 (4.2.0-1016.23) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522372
* rebased on Ubuntu-4.2.0-21.25
[ Ubuntu: 4.2.0-21.25 ]
* Release Tracking Bug
- LP: #1522108
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508856
Title:
CVE-2015-7872
To manage notifications about this bug
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
* [media]
** Description changed:
The key_gc_unused_keys function in security/keys/gc.c in the Linux
kernel through 4.2.6 allows local users to cause a denial of service
(OOPS) via crafted keyctl commands.
Break-Fix: - f05819df10d7b09f6d1eb6f8534a8f68e5a4fe61
- Break-Fix: - 911b79cde95c7da0ec02f4
** Changed in: linux-lts-wily (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Statu
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs
** Changed in: linux (Ubuntu Wily)
Status: New => In Progress
** Changed in: linux (Ubuntu Wily)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/150885
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bug
** Description changed:
- Keyrings crash triggerable by unprivileged user
+ The key_gc_unused_keys function in security/keys/gc.c in the Linux
+ kernel through 4.2.6 allows local users to cause a denial of service
+ (OOPS) via crafted keyctl commands.
Break-Fix: - f05819df10d7b09f6d1eb6f8534a
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-raspi2 (Ubuntu Precise)
Stat
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Unde
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2 (U
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Description changed:
Keyrings crash triggerable by unprivileged user
- Break-Fix: - ce1fad2740c648a4340f6f6c391a8a83769d2e8c
+ Bre
CVE-2015-7872
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
25 matches
Mail list logo