** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1580372
Title:
CVE-2016-4565
To manage notifications about this bug go to:
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93
---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1591436
* Rebase to Ubuntu-3.2.0-105.146
[ Ubuntu: 3.2.0-105.146 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-lts-trusty -
3.13.0-91.138~precise1
---
linux-lts-trusty (3.13.0-91.138~precise1) precise; urgency=medium
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1596012
[ Upstream Kernel Changes ]
* netfilter: x_tables: validate
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110
---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1591435
[ Ubuntu: 3.2.0-105.146 ]
* Release Tracking Bug
- LP: #1591329
* [debian] getabis:
This bug was fixed in the package linux - 3.2.0-105.146
---
linux (3.2.0-105.146) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1591329
[ Kamal Mostafa ]
* [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
[
This bug was fixed in the package linux-lts-utopic -
3.16.0-76.98~14.04.1
---
linux-lts-utopic (3.16.0-76.98~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1596019
[ Upstream Kernel Changes ]
* netfilter: x_tables: validate
This bug was fixed in the package linux - 3.13.0-91.138
---
linux (3.13.0-91.138) trusty; urgency=medium
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595991
[ Upstream Kernel Changes ]
* netfilter: x_tables: validate e->target_offset early
- LP: #1555338
-
** Description changed:
- IB/security: Restrict use of the write() interface
+ The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3
+ incorrectly relies on the write system call, which allows local users to
+ cause a denial of service (kernel memory write operation) or possibly
+ have
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => New
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu Yakkety)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1580372
Title:
CVE-2016-4565
To manage notifications about this bug go to:
** Changed in: linux-lts-wily (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Changed in: linux-lts-xenial (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
CVE-2016-4565
** Also affects: linux (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Also affects: linux-raspi2 (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Also
14 matches
Mail list logo