** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/1477026
Title:
CVE-2015-3290
Status in linux
CVE-2015-3290
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a security vulnerability ***
Private security bug reported:
Placeholder
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-ec2 (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-fsl-imx51 (Ubuntu)
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1472030
Title:
linux:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1472034
Title:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1472545
Title:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1472346
Title:
linux:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1472223
Title:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1472453
Title:
linux:
looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1471889
Title:
linux:
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
Yep, thanks. I think I've got it now. I am working on a fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1448912
Title:
BUG: unable to handle kernel NULL pointer dereference
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Description changed:
[SCTP race condition allows list corruption and panic from userlevel]
- Break-Fix: 9f7d653b67aed2d92540fbb0a8adaf32fcf352ae -
+ Break-Fix: 9f7d653b67aed2d92540fbb0a8adaf32fcf352ae
+
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1442080
Title:
CVE-2014-9715
Status
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1462170
Title:
CVE-2015-1805
Status in linux
*** This bug is a security vulnerability ***
Public security bug reported:
[Linux UDP checksum DoS]
Break-Fix: - beb39db59d14990e401e235faf66a6b9b31240b0
** Affects: linux (Ubuntu)
Importance: Medium
Status: Fix Committed
** Affects: linux-armadaxp (Ubuntu)
Importance:
CVE-2015-5364
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a security vulnerability ***
Public security bug reported:
[Linux UDP checksum DoS EGAIN part]
Break-Fix: - beb39db59d14990e401e235faf66a6b9b31240b0
** Affects: linux (Ubuntu)
Importance: Medium
Status: Fix Committed
** Affects: linux-armadaxp (Ubuntu)
CVE-2015-5366
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
** Changed in: linux (Ubuntu Vivid)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
** Changed in: linux (Ubuntu Vivid)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1469315
Title:
CVE-2015-4692
Status in linux
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1472160
Title:
CVE-2015-5364
Status in linux
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: Fix Committed = Fix Released
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1472165
Title:
CVE-2015-5366
Status in linux
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466575
Title:
linux:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466792
Title:
linux:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1466855
Title:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466592
Title:
linux:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1466938
Title:
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1466983
Title:
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
CVE-2015-3212
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
** Changed in: linux (Ubuntu Wily)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix
*** This bug is a security vulnerability ***
Public security bug reported:
[SCTP race condition allows list corruption and panic from userlevel]
Break-Fix: 9f7d653b67aed2d92540fbb0a8adaf32fcf352ae -
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects:
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1438501
Title:
CVE-2014-9710
Status in linux
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1430952
Title:
CVE-2015-2150
Status
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1453256
Title:
CVE-2015-3636
Status
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux (Ubuntu Wily)
Status: New = Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New =
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1447367
Title:
CVE-2015-3331
Status
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1440234
Title:
CVE-2015-2830
Status
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New =
CVE-2015-4700
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
CVE-2015-4692
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a security vulnerability ***
Public security bug reported:
Crafted BPF filters may crash kernel during JIT optimisation
Break-Fix: 0a14842f5a3c0e88a1e59fac5c3025db39721f74
3f7352bf21f8fd7ba3e2fcef9488756f188e12be
** Affects: linux (Ubuntu)
Importance: Low
Status:
*** This bug is a security vulnerability ***
Public security bug reported:
kvm: x86: NULL pointer dereference in kvm_apic_has_events function
Break-Fix: 66450a21f99636af4fafac2afd33f1a40631bc3a -
** Affects: linux (Ubuntu)
Importance: Low
Status: New
** Affects: linux-armadaxp
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465755
Title:
linux:
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Released
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Released
** Changed in: linux (Ubuntu Vivid)
Status: New = Fix Released
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
** Description changed:
- [signed to unsigned data type change]
+ Integer signedness error in the oz_hcd_get_desc_cnf function in
+ drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel
+ through 4.0.5 allows remote attackers to cause a denial of service
+ (system crash) or
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1453256
Title:
CVE-2015-3636
Status
** Description changed:
- [Missing length checks in packet processing]
+ drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux
+ kernel through 4.0.5 does not ensure that certain length values are
+ sufficiently large, which allows remote attackers to cause a denial of
+ service
** Description changed:
- [Multiple out-of-bound reads in ozwpan driver]
+ The OZWPAN driver in the Linux kernel through 4.0.5 relies on an
+ untrusted length field during packet parsing, which allows remote
+ attackers to obtain sensitive information from kernel memory or cause a
+ denial of
** Description changed:
- [Divide by zero in softirq]
+ The oz_usb_handle_ep_data function in drivers/staging/ozwpan/ozusbsvc1.c
+ in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote
+ attackers to cause a denial of service (divide-by-zero error and system
+ crash) via a crafted
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
*** This bug is a security vulnerability ***
Public security bug reported:
overlayfs privilege escalation
** Affects: linux (Ubuntu)
Importance: High
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-ec2 (Ubuntu)
CVE-2015-1328
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux (Ubuntu Vivid)
Status: New = Invalid
**
** Changed in: linux-lts-trusty (Ubuntu Vivid)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Wily)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Utopic)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New
*** This bug is a security vulnerability ***
Public security bug reported:
[Multiple out-of-bound reads in ozwpan driver]
Break-Fix: ae926051d7eb8f80dba9513db70d2e2fc8385d3a -
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
CVE-2015-4004
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects:
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New =
** Changed in: linux-lts-trusty (Ubuntu Vivid)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Wily)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Utopic)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux (Ubuntu Vivid)
Status: New = Invalid
**
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux (Ubuntu Vivid)
Status: New = Invalid
**
** Changed in: linux-lts-trusty (Ubuntu Vivid)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Wily)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Utopic)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1458901
Title:
linux:
** Changed in: linux (Ubuntu Wily)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1416503
Title:
CVE-2015-1420
Status in linux package in
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New = Invalid
** Changed in: linux (Ubuntu Wily)
Status: New = Invalid
**
** Changed in: linux (Ubuntu Wily)
Status: New = Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New = Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New = Invalid
** Changed in: linux (Ubuntu Wily)
Status: New = Invalid
**
** Changed in: linux (Ubuntu Vivid)
Status: New = Invalid
** Changed in: linux (Ubuntu Wily)
Status: New = Invalid
** Changed in: linux (Ubuntu Utopic)
Status: New = Invalid
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New = Invalid
** Changed in:
601 - 700 of 4100 matches
Mail list logo