This bug was fixed in the package linux - 4.1.0-3.3 --------------- linux (4.1.0-3.3) wily; urgency=low
[ Andy Whitcroft ] * Release Tracking Bug - LP: #1478897 [ Colin Ian King ] * SAUCE: KEYS: ensure we free the assoc array edit if edit is valid - CVE-2015-1333 [ Seth Forshee ] * SAUCE: overlayfs: Enable user namespace mounts for the "overlay" fstype - LP: #1478578 [ Upstream Kernel Changes ] * sched/stop_machine: Fix deadlock between multiple stop_two_cpus() - LP: #1461620 * x86/nmi: Enable nested do_nmi() handling for 64-bit kernels * x86/nmi/64: Remove asm code that saves cr2 * x86/nmi/64: Switch stacks on userspace NMI entry * x86/nmi/64: Reorder nested NMI checks * x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI detection -- Andy Whitcroft <a...@canonical.com> Tue, 28 Jul 2015 11:59:03 +0100 ** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-1333 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1478578 Title: "overlay" fs type not mountable in unprivileged containers To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1478578/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs