[Bug 1409808] Re: CVE-2014-9584

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects:

[Bug 1415632] Re: CVE-2014-9644

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects:

[Bug 1409048] Re: CVE-2014-9529

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects:

[Bug 1415636] Re: CVE-2015-1350

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects:

[Bug 1414651] Re: CVE-2015-0239

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects:

[Bug 1462169] Re: CVE-2014-9731

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects:

[Bug 1477026] Re: CVE-2015-3290

2015-07-24 Thread John Johansen
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1477026 Title: CVE-2015-3290 To manage notifications about this bug go to:

[Bug 1477026] Re: CVE-2015-3290

2015-07-22 Thread John Johansen
CVE-2015-3290 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Bug 1477026] [NEW] CVE-2015-3290

2015-07-22 Thread John Johansen
*** This bug is a security vulnerability *** Private security bug reported: Placeholder ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Affects: linux-ec2 (Ubuntu) Importance: Undecided Status: New ** Affects: linux-fsl-imx51 (Ubuntu)

[Bug 1472034] Re: linux-ti-omap4: 3.2.0-1468.89 -proposed tracker

2015-07-21 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1472034 Title: linux-ti-omap4: 3.2.0-1468.89

[Bug 1472030] Re: linux: 3.16.0-44.59 -proposed tracker

2015-07-21 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1472030 Title: linux: 3.16.0-44.59 -proposed

[Bug 1472469] Re: linux-lts-vivid: 3.19.0-23.24~14.04.1 -proposed tracker

2015-07-21 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1472469 Title: linux-lts-vivid:

[Bug 1472346] Re: linux: 3.19.0-23.24 -proposed tracker

2015-07-21 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1472346 Title: linux: 3.19.0-23.24 -proposed

[Bug 1472223] Re: linux-lts-utopic: 3.16.0-44.59~14.04.1 -proposed tracker

2015-07-21 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1472223 Title: linux-lts-utopic:

[Bug 1472453] Re: linux: 3.13.0-58.97 -proposed tracker

2015-07-21 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1472453 Title: linux: 3.13.0-58.97 -proposed

[Bug 1472545] Re: linux-lts-trusty: 3.13.0-58.97~precise1 -proposed tracker

2015-07-21 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1472545 Title: linux-lts-trusty:

[Bug 1471889] Re: linux: 3.2.0-88.126 -proposed tracker

2015-07-20 Thread John Johansen
looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1471889 Title: linux: 3.2.0-88.126 -proposed

[Bug 1472034] Re: linux-ti-omap4: 3.2.0-1468.89 -proposed tracker

2015-07-20 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1448912] Re: BUG: unable to handle kernel NULL pointer dereference (aa_label_merge)

2015-07-17 Thread John Johansen
Yep, thanks. I think I've got it now. I am working on a fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1448912 Title: BUG: unable to handle kernel NULL pointer dereference (aa_label_merge) To

[Bug 1471096] Re: CVE-2015-3212

2015-07-16 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Description changed: [SCTP race condition allows list corruption and panic from userlevel] - Break-Fix: 9f7d653b67aed2d92540fbb0a8adaf32fcf352ae - + Break-Fix: 9f7d653b67aed2d92540fbb0a8adaf32fcf352ae +

[Bug 1442080] Re: CVE-2014-9715

2015-07-13 Thread John Johansen
** Changed in: linux-lts-saucy (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1442080 Title: CVE-2014-9715 To manage notifications about

[Bug 1472223] Re: linux-lts-utopic: 3.16.0-44.59~14.04.1 -proposed tracker

2015-07-13 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1472346] Re: linux: 3.19.0-23.24 -proposed tracker

2015-07-13 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1471889] Re: linux: 3.2.0-88.126 -proposed tracker

2015-07-13 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1472545] Re: linux-lts-trusty: 3.13.0-58.97~precise1 -proposed tracker

2015-07-13 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1472453] Re: linux: 3.13.0-58.97 -proposed tracker

2015-07-13 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1472030] Re: linux: 3.16.0-44.59 -proposed tracker

2015-07-13 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1472469] Re: linux-lts-vivid: 3.19.0-23.24~14.04.1 -proposed tracker

2015-07-13 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1469320] Re: CVE-2015-4700

2015-07-10 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1469315] Re: CVE-2015-4692

2015-07-10 Thread John Johansen
** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1472160] Re: CVE-2015-5364

2015-07-10 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a

[Bug 1472165] Re: CVE-2015-5366

2015-07-10 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a

[Bug 1462170] Re: CVE-2015-1805

2015-07-10 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1462170 Title: CVE-2015-1805 To manage notifications about this bug

[Bug 1472160] [NEW] CVE-2015-5364

2015-07-07 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: [Linux UDP checksum DoS] Break-Fix: - beb39db59d14990e401e235faf66a6b9b31240b0 ** Affects: linux (Ubuntu) Importance: Medium Status: Fix Committed ** Affects: linux-armadaxp (Ubuntu) Importance:

[Bug 1472160] Re: CVE-2015-5364

2015-07-07 Thread John Johansen
CVE-2015-5364 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Bug 1462170] Re: CVE-2015-1805

2015-07-07 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1462170

[Bug 1469320] Re: CVE-2015-4700

2015-07-07 Thread John Johansen
** Changed in: linux (Ubuntu Vivid) Status: New = Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1469320

[Bug 1472165] [NEW] CVE-2015-5366

2015-07-07 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: [Linux UDP checksum DoS EGAIN part] Break-Fix: - beb39db59d14990e401e235faf66a6b9b31240b0 ** Affects: linux (Ubuntu) Importance: Medium Status: Fix Committed ** Affects: linux-armadaxp (Ubuntu)

[Bug 1472165] Re: CVE-2015-5366

2015-07-07 Thread John Johansen
CVE-2015-5366 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Bug 1469315] Re: CVE-2015-4692

2015-07-07 Thread John Johansen
** Changed in: linux (Ubuntu Vivid) Status: New = Fix Committed ** Changed in: linux (Ubuntu Utopic) Status: New = Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs,

[Bug 1469315] Re: CVE-2015-4692

2015-07-07 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1469315 Title: CVE-2015-4692 To manage notifications about this

[Bug 1462170] Re: CVE-2015-1805

2015-07-07 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1472160] Re: CVE-2015-5364

2015-07-07 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1472160 Title: CVE-2015-5364 To manage notifications about this

[Bug 1469320] Re: CVE-2015-4700

2015-07-07 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Utopic) Status: Fix Committed = Fix Released ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty)

[Bug 1472165] Re: CVE-2015-5366

2015-07-07 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1472165 Title: CVE-2015-5366 To manage notifications about this

[Bug 1466938] Re: linux-lts-trusty: 3.13.0-57.95~precise1 -proposed tracker

2015-07-03 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1466575] Re: linux: 3.2.0-87.125 -proposed tracker

2015-07-03 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1466575 Title: linux: 3.2.0-87.125 -proposed

[Bug 1466592] Re: linux: 3.13.0-57.95 -proposed tracker

2015-07-03 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1466592 Title: linux: 3.13.0-57.95 -proposed

[Bug 1466792] Re: linux: 3.16.0-43.58 -proposed tracker

2015-07-03 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1466792 Title: linux: 3.16.0-43.58 -proposed

[Bug 1466855] Re: linux-ti-omap4: 3.2.0-1467.88 -proposed tracker

2015-07-03 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1466855 Title: linux-ti-omap4: 3.2.0-1467.88

[Bug 1466938] Re: linux-lts-trusty: 3.13.0-57.95~precise1 -proposed tracker

2015-07-03 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1466938 Title: linux-lts-trusty:

[Bug 1466983] Re: linux-lts-utopic: 3.16.0-43.58~14.04.1 -proposed tracker

2015-07-03 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1466983 Title: linux-lts-utopic:

[Bug 1466983] Re: linux-lts-utopic: 3.16.0-43.58~14.04.1 -proposed tracker

2015-07-03 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1466855] Re: linux-ti-omap4: 3.2.0-1467.88 -proposed tracker

2015-07-03 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1466792] Re: linux: 3.16.0-43.58 -proposed tracker

2015-07-03 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1466592] Re: linux: 3.13.0-57.95 -proposed tracker

2015-07-03 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1466575] Re: linux: 3.2.0-87.125 -proposed tracker

2015-07-03 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1471096] Re: CVE-2015-3212

2015-07-02 Thread John Johansen
CVE-2015-3212 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Bug 1471096] [NEW] CVE-2015-3212

2015-07-02 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: [SCTP race condition allows list corruption and panic from userlevel] Break-Fix: 9f7d653b67aed2d92540fbb0a8adaf32fcf352ae - ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects:

[Bug 1469320] Re: CVE-2015-4700

2015-07-02 Thread John Johansen
** Changed in: linux (Ubuntu Wily) Status: New = Fix Committed ** Changed in: linux (Ubuntu Utopic) Status: New = Fix Committed ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix

[Bug 1438501] Re: CVE-2014-9710

2015-07-02 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1438501 Title: CVE-2014-9710 To manage notifications about this

[Bug 1465400] Re: CVE-2015-1328

2015-07-02 Thread John Johansen
** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New = Invalid ** Changed in: linux (Ubuntu Wily) Status: New = Fix Committed ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New =

[Bug 1447367] Re: CVE-2015-3331

2015-07-02 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1447367 Title: CVE-2015-3331 To manage notifications about

[Bug 1463444] Re: CVE-2015-4002

2015-07-02 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because

[Bug 1463445] Re: CVE-2015-4003

2015-07-02 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because

[Bug 1430952] Re: CVE-2015-2150

2015-07-02 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1430952 Title: CVE-2015-2150 To manage notifications about

[Bug 1416503] Re: CVE-2015-1420

2015-07-02 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty)

[Bug 1440234] Re: CVE-2015-2830

2015-07-02 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1440234 Title: CVE-2015-2830 To manage notifications about

[Bug 1463442] Re: CVE-2015-4001

2015-07-02 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because

[Bug 1453256] Re: CVE-2015-3636

2015-07-02 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1453256 Title: CVE-2015-3636 To manage notifications about

[Bug 1469315] Re: CVE-2015-4692

2015-07-02 Thread John Johansen
** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New = Invalid ** Changed in: linux (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New =

[Bug 1462173] Re: CVE-2015-4167

2015-07-02 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug

[Bug 1469320] [NEW] CVE-2015-4700

2015-06-26 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: Crafted BPF filters may crash kernel during JIT optimisation Break-Fix: 0a14842f5a3c0e88a1e59fac5c3025db39721f74 3f7352bf21f8fd7ba3e2fcef9488756f188e12be ** Affects: linux (Ubuntu) Importance: Low Status:

[Bug 1469320] Re: CVE-2015-4700

2015-06-26 Thread John Johansen
CVE-2015-4700 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Bug 1469315] Re: CVE-2015-4692

2015-06-26 Thread John Johansen
CVE-2015-4692 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Bug 1469315] [NEW] CVE-2015-4692

2015-06-26 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: kvm: x86: NULL pointer dereference in kvm_apic_has_events function Break-Fix: 66450a21f99636af4fafac2afd33f1a40631bc3a - ** Affects: linux (Ubuntu) Importance: Low Status: New ** Affects: linux-armadaxp

[Bug 1381713] Re: Support policy query interface for file

2015-06-23 Thread John Johansen
What is the return code for the failure, and is there a message logged in dmesg? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1381713 Title: Support policy query interface for file To manage

[Bug 1381713] Re: Support policy query interface for file

2015-06-21 Thread John Johansen
It is analogous to access, however the set of races is smaller. Only the privileged MAC admin user can change the policy, where with access a user may change a files permissions. If you are using this to test whether you can open a file, in hopes that open() won't deny it, then yes this is similar

[Bug 1466812] Re: aa-logprof crash

2015-06-20 Thread John Johansen
So it is possible that network, and other ipc types will show up under the file_perm operation. Operation is just a hint for which kernel code paths the permission request came from. Sockets certainly can be used with regular filesystem operations. With that said, something is very wrong here.

[Bug 1465907] Re: linux-lts-vivid: 3.19.0-22.22~14.04.1 -proposed tracker

2015-06-18 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1465755] Re: linux: 3.19.0-22.22 -proposed tracker

2015-06-18 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Bug 1465907] Re: linux-lts-vivid: 3.19.0-22.22~14.04.1 -proposed tracker

2015-06-18 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1465907 Title: linux-lts-vivid:

[Bug 1465755] Re: linux: 3.19.0-22.22 -proposed tracker

2015-06-18 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1465755 Title: linux: 3.19.0-22.22 -proposed

[Bug 1381713] Re: Support policy query interface for file

2015-06-17 Thread John Johansen
Re: your symlink question. AppArmor is returning permissions regarding reading the symlink it self, which is a precursor to traversing the symlink to the file it is pointing at. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1463740] Re: CVE-2015-4004

2015-06-17 Thread John Johansen
** Description changed: - [Multiple out-of-bound reads in ozwpan driver] + The OZWPAN driver in the Linux kernel through 4.0.5 relies on an + untrusted length field during packet parsing, which allows remote + attackers to obtain sensitive information from kernel memory or cause a + denial of

[Bug 1465400] Re: CVE-2015-1328

2015-06-17 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Released ** Changed in: linux (Ubuntu Precise) Status: New = Fix Released ** Changed in: linux (Ubuntu Vivid) Status: New = Fix Released ** Changed in: linux (Ubuntu Utopic) Status: New = Fix Released

[Bug 1462173] Re: CVE-2015-4167

2015-06-17 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1447367] Re: CVE-2015-3331

2015-06-17 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1453256] Re: CVE-2015-3636

2015-06-17 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1453256 Title: CVE-2015-3636 To manage notifications about

[Bug 1430952] Re: CVE-2015-2150

2015-06-17 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1463442] Re: CVE-2015-4001

2015-06-17 Thread John Johansen
** Description changed: - [signed to unsigned data type change] + Integer signedness error in the oz_hcd_get_desc_cnf function in + drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel + through 4.0.5 allows remote attackers to cause a denial of service + (system crash) or

[Bug 1440234] Re: CVE-2015-2830

2015-06-17 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1463444] Re: CVE-2015-4002

2015-06-17 Thread John Johansen
** Description changed: - [Missing length checks in packet processing] + drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux + kernel through 4.0.5 does not ensure that certain length values are + sufficiently large, which allows remote attackers to cause a denial of + service

[Bug 1463445] Re: CVE-2015-4003

2015-06-17 Thread John Johansen
** Description changed: - [Divide by zero in softirq] + The oz_usb_handle_ep_data function in drivers/staging/ozwpan/ozusbsvc1.c + in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote + attackers to cause a denial of service (divide-by-zero error and system + crash) via a crafted

[Bug 1460152] Re: apparmor cache not updated when apparmor.d rules change (breaks 15.04/stable - 15.04/edge updates)

2015-06-15 Thread John Johansen
Tentative backport of patch for 2.9 (note it only needs a single patch) ** Patch added: foo.diff https://bugs.launchpad.net/snappy/+bug/1460152/+attachment/4415266/+files/foo.diff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1465400] Re: CVE-2015-1328

2015-06-15 Thread John Johansen
CVE-2015-1328 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Bug 1465400] [NEW] CVE-2015-1328

2015-06-15 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: overlayfs privilege escalation ** Affects: linux (Ubuntu) Importance: High Status: New ** Affects: linux-armadaxp (Ubuntu) Importance: High Status: Invalid ** Affects: linux-ec2 (Ubuntu)

[Bug 1460152] Re: apparmor cache not updated when apparmor.d rules change (breaks 15.04/stable - 15.04/edge updates)

2015-06-15 Thread John Johansen
sorry, yes. I have been poking at what is the best/minimum backport of this -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1460152 Title: apparmor cache not updated when apparmor.d rules change

[Bug 1317555] Re: 'signal peer=@{profile_name}, ' does not work as expected when in a profile using a regex match as a name

2015-06-13 Thread John Johansen
not really, comm= added by the audit subsystem and is set by the thread the check is being done in, in kernel context. Both the send and receive check are being done in the same place so comm= will not change. We are not in control of this so there is little we can do about it. -- You received

[Bug 1413410] Re: Unable to match embedded NULLs in unix bind rule for abstract sockets

2015-06-12 Thread John Johansen
The commits that fix these issues are in apparmor 2.10 r2867 - wrong handling of \x00 by the compiler r2866 - wrong handling of the * and ** globs for abstract socket names In adddition in 2.9 contains r2248 - which allows a fixed alternation depth by setting the define MAX_ALT_DEPTH, this

<    5   6   7   8   9   10   11   12   13   14   >