** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1567191
Title:
CVE-2016-3951
To manage notifications about this bug go to:
https://bugs.lau
** Branch linked: lp:ubuntu/trusty-updates/linux-lts-wily
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1567191
Title:
CVE-2016-3951
To manage notifications about this bug go to:
https://bugs.launc
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93
---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1591436
* Rebase to Ubuntu-3.2.0-105.146
[ Ubuntu: 3.2.0-105.146 ]
* Release Tracking Bug
- LP: #15
This bug was fixed in the package linux-armadaxp - 3.2.0-1668.93
---
linux-armadaxp (3.2.0-1668.93) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1591436
* Rebase to Ubuntu-3.2.0-105.146
[ Ubuntu: 3.2.0-105.146 ]
* Release Tracking Bug
- LP: #15
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1483.110
---
linux-ti-omap4 (3.2.0-1483.110) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1591435
[ Ubuntu: 3.2.0-105.146 ]
* Release Tracking Bug
- LP: #1591329
* [debian] getabis: F
This bug was fixed in the package linux - 3.2.0-105.146
---
linux (3.2.0-105.146) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1591329
[ Kamal Mostafa ]
* [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
[ Upstream
This bug was fixed in the package linux - 3.2.0-105.146
---
linux (3.2.0-105.146) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1591329
[ Kamal Mostafa ]
* [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
[ Upstream
This bug was fixed in the package linux - 3.2.0-105.146
---
linux (3.2.0-105.146) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1591329
[ Kamal Mostafa ]
* [debian] getabis: Fix inconsistent compiler versions check
- LP: #1584890
[ Upstream
This bug was fixed in the package linux-raspi2 - 4.2.0-1031.41
---
linux-raspi2 (4.2.0-1031.41) wily; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 4.2.0-38.45 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking file
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux - 3.19.0-61.69
---
linux (3.19.0-61.69) vivid; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forb
This bug was fixed in the package linux-lts-utopic -
3.16.0-73.95~14.04.1
---
linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesys
This bug was fixed in the package linux-lts-vivid - 3.19.0-61.69~14.04.1
---
linux-lts-vivid (3.19.0-61.69~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
This bug was fixed in the package linux-lts-wily - 4.2.0-38.45~14.04.1
---
linux-lts-wily (4.2.0-38.45~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems o
This bug was fixed in the package linux-lts-trusty -
3.13.0-88.135~precise1
---
linux-lts-trusty (3.13.0-88.135~precise1) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking fi
** Description changed:
Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux
kernel before 4.5 allows physically proximate attackers to cause a
denial of service (system crash) or possibly have unspecified other
impact by inserting a USB device with an invalid USB descriptor
Oops, that Vivid kernel hasn't actually been released yet.
** Changed in: linux (Ubuntu Vivid)
Status: Fix Released => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1567191
Title
Fix released in Vivid (3.19.0-60.67).
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
This bug was fixed in the package linux - 3.13.0-87.133
---
linux (3.13.0-87.133) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1585315
[ Upstream Kernel Changes ]
* Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-wily (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-raspi2 (Ubuntu Wily)
This bug was fixed in the package linux - 4.4.0-22.39
---
linux (4.4.0-22.39) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1578721
* LP: #1578705
- bpf: fix double-fdput in replace_map_fd_with_map_ptr()
-- Kamal Mostafa Thu, 05 May 2016 09:30
This bug was fixed in the package linux - 4.4.0-22.38
---
linux (4.4.0-22.38) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1573817
* autoreconstruct: need to also generate extend-diff-ignore options for links
(LP: #1574362)
- [Packaging] auto
This bug was fixed in the package linux-raspi2 - 4.4.0-1010.12
---
linux-raspi2 (4.4.0-1010.12) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1578741
* Rebase against Ubuntu-4.4.0-22.39
-- Kamal Mostafa Thu, 05 May 2016 10:19:22 -0700
** Changed i
This bug was fixed in the package linux-snapdragon - 4.4.0-1013.14
---
linux-snapdragon (4.4.0-1013.14) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1578759
* Rebase to Ubuntu-4.4.0-22.39
-- Kamal Mostafa Thu, 05 May 2016 11:17:11 -0700
** Change
This bug was fixed in the package linux-lts-xenial - 4.4.0-22.39~14.04.1
---
linux-lts-xenial (4.4.0-22.39~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1578775
* LP: #1578705
- bpf: fix double-fdput in replace_map_fd_with_map_ptr()
--
This bug was fixed in the package linux-lts-xenial - 4.4.0-22.39~14.04.1
---
linux-lts-xenial (4.4.0-22.39~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1578775
* LP: #1578705
- bpf: fix double-fdput in replace_map_fd_with_map_ptr()
--
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Yakkety)
Importance: Low
Status: Fix Committed
** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-armadaxp (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-lts
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of U
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1567191
Title:
CVE-2016-3951
To manage notifications about this bug go to:
htt
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1567191
Title:
CVE-2016-3951
To manage notifications about this bug go to:
htt
** Description changed:
- Description needed
+ usbnet: memory corruption triggered by invalid USB descriptor
Break-Fix: - 4d06dd537f95683aba3651098ae288b7cbff8274
Break-Fix: - 1666984c8625b3db19a9abc298931d35ab7bc64b
--
You received this bug notification because you are a member of Ubuntu
CVE-2016-3951
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-ti-omap4 (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-raspi2 (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects:
33 matches
Mail list logo