** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1477026
Title:
CVE-2015-3290
To manage notifications about this bug go to:
CVE-2015-3290
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a security vulnerability ***
Private security bug reported:
Placeholder
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-ec2 (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-fsl-imx51 (Ubuntu)
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1472034
Title:
linux-ti-omap4: 3.2.0-1468.89
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1472030
Title:
linux: 3.16.0-44.59 -proposed
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1472469
Title:
linux-lts-vivid:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1472346
Title:
linux: 3.19.0-23.24 -proposed
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1472223
Title:
linux-lts-utopic:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1472453
Title:
linux: 3.13.0-58.97 -proposed
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1472545
Title:
linux-lts-trusty:
looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1471889
Title:
linux: 3.2.0-88.126 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
Yep, thanks. I think I've got it now. I am working on a fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1448912
Title:
BUG: unable to handle kernel NULL pointer dereference (aa_label_merge)
To
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Description changed:
[SCTP race condition allows list corruption and panic from userlevel]
- Break-Fix: 9f7d653b67aed2d92540fbb0a8adaf32fcf352ae -
+ Break-Fix: 9f7d653b67aed2d92540fbb0a8adaf32fcf352ae
+
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1442080
Title:
CVE-2014-9715
To manage notifications about
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1462170
Title:
CVE-2015-1805
To manage notifications about this bug
*** This bug is a security vulnerability ***
Public security bug reported:
[Linux UDP checksum DoS]
Break-Fix: - beb39db59d14990e401e235faf66a6b9b31240b0
** Affects: linux (Ubuntu)
Importance: Medium
Status: Fix Committed
** Affects: linux-armadaxp (Ubuntu)
Importance:
CVE-2015-5364
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1462170
** Changed in: linux (Ubuntu Vivid)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1469320
*** This bug is a security vulnerability ***
Public security bug reported:
[Linux UDP checksum DoS EGAIN part]
Break-Fix: - beb39db59d14990e401e235faf66a6b9b31240b0
** Affects: linux (Ubuntu)
Importance: Medium
Status: Fix Committed
** Affects: linux-armadaxp (Ubuntu)
CVE-2015-5366
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
** Changed in: linux (Ubuntu Vivid)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1469315
Title:
CVE-2015-4692
To manage notifications about this
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1472160
Title:
CVE-2015-5364
To manage notifications about this
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: Fix Committed = Fix Released
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1472165
Title:
CVE-2015-5366
To manage notifications about this
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1466575
Title:
linux: 3.2.0-87.125 -proposed
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1466592
Title:
linux: 3.13.0-57.95 -proposed
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1466792
Title:
linux: 3.16.0-43.58 -proposed
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1466855
Title:
linux-ti-omap4: 3.2.0-1467.88
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1466938
Title:
linux-lts-trusty:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1466983
Title:
linux-lts-utopic:
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
CVE-2015-3212
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a security vulnerability ***
Public security bug reported:
[SCTP race condition allows list corruption and panic from userlevel]
Break-Fix: 9f7d653b67aed2d92540fbb0a8adaf32fcf352ae -
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects:
** Changed in: linux (Ubuntu Wily)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1438501
Title:
CVE-2014-9710
To manage notifications about this
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux (Ubuntu Wily)
Status: New = Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New =
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1447367
Title:
CVE-2015-3331
To manage notifications about
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1430952
Title:
CVE-2015-2150
To manage notifications about
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1440234
Title:
CVE-2015-2830
To manage notifications about
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1453256
Title:
CVE-2015-3636
To manage notifications about
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New =
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug
*** This bug is a security vulnerability ***
Public security bug reported:
Crafted BPF filters may crash kernel during JIT optimisation
Break-Fix: 0a14842f5a3c0e88a1e59fac5c3025db39721f74
3f7352bf21f8fd7ba3e2fcef9488756f188e12be
** Affects: linux (Ubuntu)
Importance: Low
Status:
CVE-2015-4700
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
CVE-2015-4692
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a security vulnerability ***
Public security bug reported:
kvm: x86: NULL pointer dereference in kvm_apic_has_events function
Break-Fix: 66450a21f99636af4fafac2afd33f1a40631bc3a -
** Affects: linux (Ubuntu)
Importance: Low
Status: New
** Affects: linux-armadaxp
What is the return code for the failure, and is there a message logged
in dmesg?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1381713
Title:
Support policy query interface for file
To manage
It is analogous to access, however the set of races is smaller. Only the
privileged MAC admin user can change the policy, where with access a
user may change a files permissions. If you are using this to test
whether you can open a file, in hopes that open() won't deny it, then
yes this is similar
So it is possible that network, and other ipc types will show up under
the file_perm operation. Operation is just a hint for which kernel
code paths the permission request came from. Sockets certainly can be
used with regular filesystem operations.
With that said, something is very wrong here.
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1465907
Title:
linux-lts-vivid:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1465755
Title:
linux: 3.19.0-22.22 -proposed
Re: your symlink question. AppArmor is returning permissions regarding
reading the symlink it self, which is a precursor to traversing the
symlink to the file it is pointing at.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Description changed:
- [Multiple out-of-bound reads in ozwpan driver]
+ The OZWPAN driver in the Linux kernel through 4.0.5 relies on an
+ untrusted length field during packet parsing, which allows remote
+ attackers to obtain sensitive information from kernel memory or cause a
+ denial of
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Released
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Released
** Changed in: linux (Ubuntu Vivid)
Status: New = Fix Released
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1453256
Title:
CVE-2015-3636
To manage notifications about
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Description changed:
- [signed to unsigned data type change]
+ Integer signedness error in the oz_hcd_get_desc_cnf function in
+ drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel
+ through 4.0.5 allows remote attackers to cause a denial of service
+ (system crash) or
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Description changed:
- [Missing length checks in packet processing]
+ drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux
+ kernel through 4.0.5 does not ensure that certain length values are
+ sufficiently large, which allows remote attackers to cause a denial of
+ service
** Description changed:
- [Divide by zero in softirq]
+ The oz_usb_handle_ep_data function in drivers/staging/ozwpan/ozusbsvc1.c
+ in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote
+ attackers to cause a denial of service (divide-by-zero error and system
+ crash) via a crafted
Tentative backport of patch for 2.9 (note it only needs a single patch)
** Patch added: foo.diff
https://bugs.launchpad.net/snappy/+bug/1460152/+attachment/4415266/+files/foo.diff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
CVE-2015-1328
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a security vulnerability ***
Public security bug reported:
overlayfs privilege escalation
** Affects: linux (Ubuntu)
Importance: High
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-ec2 (Ubuntu)
sorry, yes. I have been poking at what is the best/minimum backport of
this
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1460152
Title:
apparmor cache not updated when apparmor.d rules change
not really, comm= added by the audit subsystem and is set by the thread
the check is being done in, in kernel context. Both the send and
receive check are being done in the same place so comm= will not change.
We are not in control of this so there is little we can do about it.
--
You received
The commits that fix these issues are in apparmor 2.10
r2867 - wrong handling of \x00 by the compiler
r2866 - wrong handling of the * and ** globs for abstract socket names
In adddition
in 2.9 contains r2248 - which allows a fixed alternation depth by setting the
define MAX_ALT_DEPTH, this
901 - 1000 of 8078 matches
Mail list logo