The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1502032
Title:
CVE-2015-7613
To manage notifications about this bug go to:
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
** Also affects: linux (Ubuntu Yakkety)
Importance: High
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects:
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1502032
Title:
CVE-2015-7613
To manage notifications about this bug go to:
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1502032
Title:
CVE-2015-7613
To manage notifications about this
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided =>
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance:
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug
** Also affects: linux (Ubuntu Xenial)
Importance: High
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects:
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1502032
Title:
CVE-2015-7613
To manage notifications about this bug
** Description changed:
- While working on KernelThreadSanitizer (KTSAN), a data race detector for
- kernels, Dmitry Vyukov found a data race that can trick the kernel into
- using unitialized memory. - This can at least give access to arbitrary
- SysV shared memory and Dmitry developed a proof
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1502032
Title:
CVE-2015-7613
To manage notifications about this bug go to:
This bug was fixed in the package linux-lts-utopic -
3.16.0-50.67~14.04.1
---
linux-lts-utopic (3.16.0-50.67~14.04.1) trusty; urgency=low
[ Upstream Kernel Changes ]
* Initialize msg/shm IPC objects before doing ipc_addid()
- LP: #1502032
- CVE-2015-7613
-- Luis
This bug was fixed in the package linux-lts-trusty -
3.13.0-65.106~precise1
---
linux-lts-trusty (3.13.0-65.106~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* Initialize msg/shm IPC objects before doing ipc_addid()
- LP: #1502032
- CVE-2015-7613
-- Luis
This bug was fixed in the package linux-lts-vivid - 3.19.0-30.34~14.04.1
---
linux-lts-vivid (3.19.0-30.34~14.04.1) trusty; urgency=low
[ Upstream Kernel Changes ]
* Initialize msg/shm IPC objects before doing ipc_addid()
- LP: #1502032
- CVE-2015-7613
-- Luis
This bug was fixed in the package linux - 3.19.0-30.34
---
linux (3.19.0-30.34) vivid; urgency=low
[ Upstream Kernel Changes ]
* Initialize msg/shm IPC objects before doing ipc_addid()
- LP: #1502032
- CVE-2015-7613
-- Luis Henriques
This bug was fixed in the package linux - 3.19.0-30.34
---
linux (3.19.0-30.34) vivid; urgency=low
[ Upstream Kernel Changes ]
* Initialize msg/shm IPC objects before doing ipc_addid()
- LP: #1502032
- CVE-2015-7613
-- Luis Henriques
This bug was fixed in the package linux-lts-vivid - 3.19.0-30.34~14.04.1
---
linux-lts-vivid (3.19.0-30.34~14.04.1) trusty; urgency=low
[ Upstream Kernel Changes ]
* Initialize msg/shm IPC objects before doing ipc_addid()
- LP: #1502032
- CVE-2015-7613
-- Luis
This bug was fixed in the package linux-lts-utopic -
3.16.0-50.67~14.04.1
---
linux-lts-utopic (3.16.0-50.67~14.04.1) trusty; urgency=low
[ Upstream Kernel Changes ]
* Initialize msg/shm IPC objects before doing ipc_addid()
- LP: #1502032
- CVE-2015-7613
-- Luis
This bug was fixed in the package linux - 3.13.0-65.106
---
linux (3.13.0-65.106) trusty; urgency=low
[ Upstream Kernel Changes ]
* Initialize msg/shm IPC objects before doing ipc_addid()
- LP: #1502032
- CVE-2015-7613
-- Luis Henriques
This bug was fixed in the package linux-lts-trusty -
3.13.0-65.106~precise1
---
linux-lts-trusty (3.13.0-65.106~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* Initialize msg/shm IPC objects before doing ipc_addid()
- LP: #1502032
- CVE-2015-7613
-- Luis
This bug was fixed in the package linux - 3.13.0-65.106
---
linux (3.13.0-65.106) trusty; urgency=low
[ Upstream Kernel Changes ]
* Initialize msg/shm IPC objects before doing ipc_addid()
- LP: #1502032
- CVE-2015-7613
-- Luis Henriques
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1502032
Title:
CVE-2015-7613
To manage notifications about this bug go to:
CVE-2015-7613
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
** Description changed:
- Description needed
+ While working on KernelThreadSanitizer (KTSAN), a data race detector for
+ kernels, Dmitry Vyukov found a data race that can trick the kernel into
+ using unitialized memory. - This can at least give access to arbitrary
+ SysV shared memory and
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status:
** Description changed:
- While working on KernelThreadSanitizer (KTSAN), a data race detector for
- kernels, Dmitry Vyukov found a data race that can trick the kernel into
- using unitialized memory. - This can at least give access to arbitrary
- SysV shared memory and Dmitry developed a proof
** Description changed:
- While working on KernelThreadSanitizer (KTSAN), a data race detector
- for kernels, Dmitry Vyukov found a data race that can trick the kernel
- into using uninitialized memory.
- - This can at least give access to arbitrary SysV shared memory and
- Dmitry developed a
31 matches
Mail list logo