[Bug 1502032] Re: CVE-2015-7613

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1502032] Re: CVE-2015-7613

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1502032] Re: CVE-2015-7613

2019-10-03 Thread Po-Hsu Lin
** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1502032 Title: CVE-2015-7613 To manage notifications about this bug go to:

[Bug 1502032] Re: CVE-2015-7613

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily)

[Bug 1502032] Re: CVE-2015-7613

2016-04-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety) Importance: High Status: Fix Committed ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects:

[Bug 1502032] Re: CVE-2015-7613

2016-04-19 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1502032 Title: CVE-2015-7613 To manage notifications about this bug go to:

[Bug 1502032] Re: CVE-2015-7613

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily)

[Bug 1502032] Re: CVE-2015-7613

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1502032 Title: CVE-2015-7613 To manage notifications about this

[Bug 1502032] Re: CVE-2015-7613

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided =>

[Bug 1502032] Re: CVE-2015-7613

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance:

[Bug 1502032] Re: CVE-2015-7613

2015-11-05 Thread Steve Beattie
** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug

[Bug 1502032] Re: CVE-2015-7613

2015-10-28 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial) Importance: High Status: Fix Committed ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects:

[Bug 1502032] Re: CVE-2015-7613

2015-10-23 Thread Steve Beattie
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1502032 Title: CVE-2015-7613 To manage notifications about this bug

[Bug 1502032] Re: CVE-2015-7613

2015-10-22 Thread Steve Beattie
** Description changed: - While working on KernelThreadSanitizer (KTSAN), a data race detector for - kernels, Dmitry Vyukov found a data race that can trick the kernel into - using unitialized memory. - This can at least give access to arbitrary - SysV shared memory and Dmitry developed a proof

[Bug 1502032] Re: CVE-2015-7613

2015-10-21 Thread Steve Beattie
** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1502032 Title: CVE-2015-7613 To manage notifications about this bug go to:

[Bug 1502032] Re: CVE-2015-7613

2015-10-05 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic - 3.16.0-50.67~14.04.1 --- linux-lts-utopic (3.16.0-50.67~14.04.1) trusty; urgency=low [ Upstream Kernel Changes ] * Initialize msg/shm IPC objects before doing ipc_addid() - LP: #1502032 - CVE-2015-7613 -- Luis

[Bug 1502032] Re: CVE-2015-7613

2015-10-05 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty - 3.13.0-65.106~precise1 --- linux-lts-trusty (3.13.0-65.106~precise1) precise; urgency=low [ Upstream Kernel Changes ] * Initialize msg/shm IPC objects before doing ipc_addid() - LP: #1502032 - CVE-2015-7613 -- Luis

[Bug 1502032] Re: CVE-2015-7613

2015-10-05 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-30.34~14.04.1 --- linux-lts-vivid (3.19.0-30.34~14.04.1) trusty; urgency=low [ Upstream Kernel Changes ] * Initialize msg/shm IPC objects before doing ipc_addid() - LP: #1502032 - CVE-2015-7613 -- Luis

[Bug 1502032] Re: CVE-2015-7613

2015-10-05 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-30.34 --- linux (3.19.0-30.34) vivid; urgency=low [ Upstream Kernel Changes ] * Initialize msg/shm IPC objects before doing ipc_addid() - LP: #1502032 - CVE-2015-7613 -- Luis Henriques

[Bug 1502032] Re: CVE-2015-7613

2015-10-05 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-30.34 --- linux (3.19.0-30.34) vivid; urgency=low [ Upstream Kernel Changes ] * Initialize msg/shm IPC objects before doing ipc_addid() - LP: #1502032 - CVE-2015-7613 -- Luis Henriques

[Bug 1502032] Re: CVE-2015-7613

2015-10-05 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-30.34~14.04.1 --- linux-lts-vivid (3.19.0-30.34~14.04.1) trusty; urgency=low [ Upstream Kernel Changes ] * Initialize msg/shm IPC objects before doing ipc_addid() - LP: #1502032 - CVE-2015-7613 -- Luis

[Bug 1502032] Re: CVE-2015-7613

2015-10-05 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic - 3.16.0-50.67~14.04.1 --- linux-lts-utopic (3.16.0-50.67~14.04.1) trusty; urgency=low [ Upstream Kernel Changes ] * Initialize msg/shm IPC objects before doing ipc_addid() - LP: #1502032 - CVE-2015-7613 -- Luis

[Bug 1502032] Re: CVE-2015-7613

2015-10-05 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-65.106 --- linux (3.13.0-65.106) trusty; urgency=low [ Upstream Kernel Changes ] * Initialize msg/shm IPC objects before doing ipc_addid() - LP: #1502032 - CVE-2015-7613 -- Luis Henriques

[Bug 1502032] Re: CVE-2015-7613

2015-10-05 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty - 3.13.0-65.106~precise1 --- linux-lts-trusty (3.13.0-65.106~precise1) precise; urgency=low [ Upstream Kernel Changes ] * Initialize msg/shm IPC objects before doing ipc_addid() - LP: #1502032 - CVE-2015-7613 -- Luis

[Bug 1502032] Re: CVE-2015-7613

2015-10-05 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-65.106 --- linux (3.13.0-65.106) trusty; urgency=low [ Upstream Kernel Changes ] * Initialize msg/shm IPC objects before doing ipc_addid() - LP: #1502032 - CVE-2015-7613 -- Luis Henriques

[Bug 1502032] Re: CVE-2015-7613

2015-10-05 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1502032 Title: CVE-2015-7613 To manage notifications about this bug go to:

[Bug 1502032] Re: CVE-2015-7613

2015-10-02 Thread John Johansen
CVE-2015-7613 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Bug 1502032] Re: CVE-2015-7613

2015-10-02 Thread Steve Beattie
** Description changed: - Description needed + While working on KernelThreadSanitizer (KTSAN), a data race detector for + kernels, Dmitry Vyukov found a data race that can trick the kernel into + using unitialized memory. - This can at least give access to arbitrary + SysV shared memory and

[Bug 1502032] Re: CVE-2015-7613

2015-10-02 Thread Steve Beattie
** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Invalid ** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Status:

[Bug 1502032] Re: CVE-2015-7613

2015-10-02 Thread Mathew Hodson
** Description changed: - While working on KernelThreadSanitizer (KTSAN), a data race detector for - kernels, Dmitry Vyukov found a data race that can trick the kernel into - using unitialized memory. - This can at least give access to arbitrary - SysV shared memory and Dmitry developed a proof

[Bug 1502032] Re: CVE-2015-7613

2015-10-02 Thread Steve Beattie
** Description changed: - While working on KernelThreadSanitizer (KTSAN), a data race detector - for kernels, Dmitry Vyukov found a data race that can trick the kernel - into using uninitialized memory. - - This can at least give access to arbitrary SysV shared memory and - Dmitry developed a