[Kernel-packages] [Bug 1462165] Re: CVE-2014-9729

2015-06-06 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux (Ubuntu Wily) Status: New = Invalid **

[Kernel-packages] [Bug 1462169] Re: CVE-2014-9731

2015-06-06 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux (Ubuntu Wily) Status: New = Invalid **

[Kernel-packages] [Bug 1462173] Re: CVE-2015-4167

2015-06-06 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux (Ubuntu Wily) Status: New = Invalid ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed

[Kernel-packages] [Bug 1462249] Re: CVE-2015-4177

2015-06-06 Thread John Johansen
** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1462249 Title: CVE-2015-4177 Status in linux

[Kernel-packages] [Bug 1462255] Re: CVE-2015-4178

2015-06-06 Thread John Johansen
** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1462255 Title: CVE-2015-4178 Status in linux

[Kernel-packages] [Bug 1462175] Re: CVE-2015-4170

2015-06-06 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Invalid ** Changed in: linux (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux (Ubuntu Wily) Status: New = Invalid ** Changed in: linux (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux

[Kernel-packages] [Bug 1462244] Re: CVE-2015-4176

2015-06-05 Thread John Johansen
CVE-2015-4176 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Kernel-packages] [Bug 1462244] [NEW] CVE-2015-4176

2015-06-05 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: Deletion of a file or directory could trigger an unmount and reveal data under a mount point. Break-Fix: - e0c9c0afd2fc958ffa34b697972721d81df8a56f ** Affects: linux (Ubuntu) Importance: Medium Status: New

[Kernel-packages] [Bug 1462249] [NEW] CVE-2015-4177

2015-06-05 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: [ns: user namespaces panic -- lack of state identification] Break-Fix: - cd4a40174b71acd021877341684d8bb1dc8ea4ae ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects: linux-armadaxp

[Kernel-packages] [Bug 1462249] Re: CVE-2015-4177

2015-06-05 Thread John Johansen
CVE-2015-4177 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Kernel-packages] [Bug 1462255] [NEW] CVE-2015-4178

2015-06-05 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: [ns: user namespaces panic -- lack of internal consistency of a data structure] Break-Fix: - 820f9f147dcce2602eefd9b575bbbd9ea14f0953 ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects:

[Kernel-packages] [Bug 1462255] Re: CVE-2015-4178

2015-06-05 Thread John Johansen
CVE-2015-4178 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Kernel-packages] [Bug 1458901] Re: linux: 3.2.0-85.122 -proposed tracker

2015-06-05 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1458901 Title: linux: 3.2.0-85.122 -proposed

[Kernel-packages] [Bug 1462170] Re: CVE-2015-1805

2015-06-04 Thread John Johansen
CVE-2015-1805 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Kernel-packages] [Bug 1462165] [NEW] CVE-2014-9729

2015-06-04 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: [iinfo-i_lenAlloc != inode-i_size] Break-Fix: - e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu) Importance:

[Kernel-packages] [Bug 1462165] Re: CVE-2014-9729

2015-06-04 Thread John Johansen
CVE-2014-9729 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Kernel-packages] [Bug 1462170] [NEW] CVE-2015-1805

2015-06-04 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: A flaw was found in the way pipe_iov_copy_from_user() and pipe_iov_copy_to_user() functions handled iovecs remaining len accounting on failed atomic access. An unprivileged local user could this flaw to crash the system

[Kernel-packages] [Bug 1462169] [NEW] CVE-2014-9731

2015-06-04 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: [udf: information leakage when reading symlink] Break-Fix: - 0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14 ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu)

[Kernel-packages] [Bug 1462169] Re: CVE-2014-9731

2015-06-04 Thread John Johansen
CVE-2014-9731 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Kernel-packages] [Bug 1447373] Re: CVE-2015-3339

2015-06-04 Thread John Johansen
** Description changed: - [chown() was racy relative to execve()] + Race condition in the prepare_binprm function in fs/exec.c in the Linux + kernel before 3.19.6 allows local users to gain privileges by executing + a setuid program at a time instant when a chown to root is in progress, + and the

[Kernel-packages] [Bug 1462167] [NEW] CVE-2014-9730

2015-06-04 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: [properly ignore component length for component types that do not use it] Break-Fix: - e237ec37ec154564f8690c5bd1795339955eeef9 ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects:

[Kernel-packages] [Bug 1462173] [NEW] CVE-2015-4167

2015-06-04 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: [fs: udf kernel oops] Break-Fix: - 23b133bdc452aa441fcb9b82cbf6dd05cfd342d0 ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu) Importance: Medium

[Kernel-packages] [Bug 1462173] Re: CVE-2015-4167

2015-06-04 Thread John Johansen
CVE-2015-4167 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Kernel-packages] [Bug 1462164] [NEW] CVE-2014-9728

2015-06-04 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: A UDF filesystem image with malicious lengths specified in multiple datastructures could cause crashes or other undesired behaviours. Break-Fix: - e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 Break-Fix: -

[Kernel-packages] [Bug 1462164] Re: CVE-2014-9728

2015-06-04 Thread John Johansen
CVE-2014-9728 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Kernel-packages] [Bug 1462167] Re: CVE-2014-9730

2015-06-04 Thread John Johansen
CVE-2014-9730 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Kernel-packages] [Bug 1462175] Re: CVE-2015-4170

2015-06-04 Thread John Johansen
CVE-2015-4170 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Kernel-packages] [Bug 1462175] [NEW] CVE-2015-4170

2015-06-04 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: [vulnerability in the kernel tty subsystem] Break-Fix: - 4898e640caf03fdbaf2122d5a33949bf3e4a5b34 Break-Fix: - cf872776fc84128bb779ce2b83a37c884c3203ae ** Affects: linux (Ubuntu) Importance: Medium Status:

[Kernel-packages] [Bug 1438501] Re: CVE-2014-9710

2015-06-04 Thread John Johansen
** Description changed: - [btrfs: non-atomic xattr replace operation] + The Btrfs implementation in the Linux kernel before 3.19 does not ensure + that the visible xattr state is consistent with a requested replacement, + which allows local users to bypass intended ACL settings and gain +

[Kernel-packages] [Bug 1442080] Re: CVE-2014-9715

2015-06-04 Thread John Johansen
** Description changed: - [DoS -- OOPS NULL pointer dereference in nf_nat_setup_info+0x471] + include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem + in the Linux kernel before 3.14.5 uses an insufficiently large data type + for certain extension data, which allows local users to

[Kernel-packages] [Bug 1440234] Re: CVE-2015-2830

2015-06-04 Thread John Johansen
** Description changed: - Linux mishandles int80 fork from 64-bit tasks + arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not + prevent the TS_COMPAT flag from reaching a user-mode task, which might + allow local users to bypass the seccomp or audit protection mechanism + via a

[Kernel-packages] [Bug 1441103] Re: CVE-2015-2922

2015-06-04 Thread John Johansen
** Description changed: - [IPv6 Hop limit lowering via RA messages] + The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor + Discovery (ND) protocol implementation in the IPv6 stack in the Linux + kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit + setting

[Kernel-packages] [Bug 1453256] Re: CVE-2015-3636

2015-06-03 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty)

[Kernel-packages] [Bug 1440234] Re: CVE-2015-2830

2015-06-03 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu.

[Kernel-packages] [Bug 1447367] Re: CVE-2015-3331

2015-06-03 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu.

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-03 Thread John Johansen
** Description changed: Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle

[Kernel-packages] [Bug 1430952] Re: CVE-2015-2150

2015-06-03 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu.

[Kernel-packages] [Bug 1457807] Re: CVE-2015-4036

2015-06-03 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New = Invalid ** Changed in: linux (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New

[Kernel-packages] [Bug 1458977] Re: linux-lts-utopic: 3.16.0-39.53~14.04.1 -proposed tracker

2015-06-02 Thread John Johansen
CVE-2015-0275 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-0275 ** Changed in: kernel-sru-workflow/security-signoff Status: Invalid = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1458778] Re: linux: 3.16.0-39.53 -proposed tracker

2015-06-02 Thread John Johansen
CVE-2015-0275 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-0275 ** Changed in: kernel-sru-workflow/security-signoff Status: Invalid = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in

[Kernel-packages] [Bug 1459957] Re: linux: 3.19.0-20.20 -proposed tracker

2015-06-02 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1459957 Title: linux:

[Kernel-packages] [Bug 1425270] Re: CVE-2015-0275

2015-06-02 Thread John Johansen
** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in

[Kernel-packages] [Bug 1457807] Re: CVE-2015-4036

2015-06-02 Thread John Johansen
** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1457807 Title: CVE-2015-4036 Status in linux

[Kernel-packages] [Bug 1458618] Re: linux: 3.13.0-54.91 -proposed tracker

2015-06-01 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1458778] Re: linux: 3.16.0-39.53 -proposed tracker

2015-06-01 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1458977] Re: linux-lts-utopic: 3.16.0-39.53~14.04.1 -proposed tracker

2015-06-01 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1459957] Re: linux: 3.19.0-20.20 -proposed tracker

2015-06-01 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1458999] Re: linux-ti-omap4: 3.2.0-1465.85 -proposed tracker

2015-06-01 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1458901] Re: linux: 3.2.0-85.122 -proposed tracker

2015-06-01 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1459068] Re: linux-lts-trusty: 3.13.0-54.91~precise1 -proposed tracker

2015-06-01 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1458999] Re: linux-ti-omap4: 3.2.0-1465.85 -proposed tracker

2015-06-01 Thread John Johansen
No CVEs ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1458999 Title: linux-ti-omap4:

[Kernel-packages] [Bug 1458778] Re: linux: 3.16.0-39.53 -proposed tracker

2015-06-01 Thread John Johansen
No CVEs ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1458778 Title: linux: 3.16.0-39.53

[Kernel-packages] [Bug 1458618] Re: linux: 3.13.0-54.91 -proposed tracker

2015-06-01 Thread John Johansen
No CVEs ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1458618 Title: linux: 3.13.0-54.91

[Kernel-packages] [Bug 1458901] Re: linux: 3.2.0-85.122 -proposed tracker

2015-06-01 Thread John Johansen
No CVEs ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1458901 Title: linux: 3.2.0-85.122 -proposed

[Kernel-packages] [Bug 1459068] Re: linux-lts-trusty: 3.13.0-54.91~precise1 -proposed tracker

2015-06-01 Thread John Johansen
No CVEs ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1459068 Title:

[Kernel-packages] [Bug 1458977] Re: linux-lts-utopic: 3.16.0-39.53~14.04.1 -proposed tracker

2015-06-01 Thread John Johansen
No CVEs ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1458977 Title:

[Kernel-packages] [Bug 1453256] Re: CVE-2015-3636

2015-05-27 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Vivid) Status: New = Fix Committed ** Changed in: linux (Ubuntu Wily) Status: New = Fix Committed ** Changed in: linux (Ubuntu Utopic) Status: New = Fix Committed **

[Kernel-packages] [Bug 1447367] Re: CVE-2015-3331

2015-05-27 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1447367 Title: CVE-2015-3331 Status in linux package in

[Kernel-packages] [Bug 1441108] Re: CVE-2015-2925

2015-05-27 Thread John Johansen
** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1441108 Title: CVE-2015-2925 Status in linux

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-05-26 Thread John Johansen
** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1416503 Title: CVE-2015-1420 Status in linux

[Kernel-packages] [Bug 1430952] Re: CVE-2015-2150

2015-05-26 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1430952 Title: CVE-2015-2150 Status in linux package in

[Kernel-packages] [Bug 1440234] Re: CVE-2015-2830

2015-05-26 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1440234 Title: CVE-2015-2830 Status in linux package in

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-05-26 Thread John Johansen
** Description changed: The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory

[Kernel-packages] [Bug 1448291] Re: CVE-2014-8171

2015-05-26 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Invalid ** Changed in: linux (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux (Ubuntu Wily) Status: New = Invalid ** Changed in: linux (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux

[Kernel-packages] [Bug 1403851] Re: CVE-2014-4323

2015-05-26 Thread John Johansen
** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1403851 Title: CVE-2014-4323 Status in linux package

[Kernel-packages] [Bug 1425270] Re: CVE-2015-0275

2015-05-26 Thread John Johansen
** Changed in: linux (Ubuntu Utopic) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1425270 Title: CVE-2015-0275 Status in linux package in

[Kernel-packages] [Bug 1413741] Re: CVE-2014-8159

2015-05-22 Thread John Johansen
** Description changed: The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory

[Kernel-packages] [Bug 1457807] [NEW] CVE-2015-4036

2015-05-22 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: [drivers/vhost/scsi.c: potential memory corruption] Break-Fix: 057cbf49a1f08297877e46c82f707b1bfea806a8 59c816c1f24df0204e01851431d3bab3eb76719c ** Affects: linux (Ubuntu) Importance: Medium Status: Fix

[Kernel-packages] [Bug 1457807] Re: CVE-2015-4036

2015-05-22 Thread John Johansen
CVE-2015-4036 ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Undecided Status: New ** Also affects:

[Kernel-packages] [Bug 1438501] Re: CVE-2014-9710

2015-05-21 Thread John Johansen
** Changed in: linux (Ubuntu Utopic) Status: Fix Committed = Fix Released ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp

[Kernel-packages] [Bug 1430952] Re: CVE-2015-2150

2015-05-21 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp

[Kernel-packages] [Bug 1440234] Re: CVE-2015-2830

2015-05-21 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp

[Kernel-packages] [Bug 1447367] Re: CVE-2015-3331

2015-05-21 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Utopic) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed = Fix Released ** Changed in: linux-lts-utopic (Ubuntu

[Kernel-packages] [Bug 1456732] Re: linux: 3.19.0-18.18 -proposed tracker

2015-05-20 Thread John Johansen
No CVEs ** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) ** Changed in: kernel-sru-workflow/security-signoff

[Kernel-packages] [Bug 1447371] Re: CVE-2015-3332

2015-05-20 Thread John Johansen
** Description changed: [TCP Fast Open local DoS] - Break-Fix: - local-2015-3332 + Break-Fix: 355a901e6cf1b2b763ec85caa2a9f04fbcc4ab4a local-2015-3332 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu.

[Kernel-packages] [Bug 1454785] Re: linux: 3.13.0-53.88 -proposed tracker

2015-05-18 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1451968] Re: linux: 3.2.0-84.121 -proposed tracker

2015-05-18 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1451968 Title: linux:

[Kernel-packages] [Bug 1452432] Re: linux-ti-omap4: 3.2.0-1464.84 -proposed tracker

2015-05-18 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1452623] Re: linux: 3.16.0-38.52 -proposed tracker

2015-05-18 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1452900] Re: linux-lts-trusty: 3.13.0-53.87~precise1 -proposed tracker

2015-05-18 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1451968] Re: linux: 3.2.0-84.121 -proposed tracker

2015-05-18 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1452000] Re: linux: 3.19.0-17.17 -proposed tracker

2015-05-18 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1452882] Re: linux-lts-utopic: 3.16.0-38.52~14.04.1 -proposed tracker

2015-05-18 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed = In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) = John Johansen (jjohansen) -- You received this bug notification because you are a member

[Kernel-packages] [Bug 1452000] Re: linux: 3.19.0-17.17 -proposed tracker

2015-05-18 Thread John Johansen
No CVEs ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1452000 Title: linux: 3.19.0-17.17

[Kernel-packages] [Bug 1452432] Re: linux-ti-omap4: 3.2.0-1464.84 -proposed tracker

2015-05-18 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1452432 Title:

[Kernel-packages] [Bug 1454785] Re: linux: 3.13.0-53.88 -proposed tracker

2015-05-18 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1454785 Title: linux:

[Kernel-packages] [Bug 1452623] Re: linux: 3.16.0-38.52 -proposed tracker

2015-05-18 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1452623 Title: linux:

[Kernel-packages] [Bug 1452900] Re: linux-lts-trusty: 3.13.0-53.87~precise1 -proposed tracker

2015-05-18 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1452900 Title:

[Kernel-packages] [Bug 1452882] Re: linux-lts-utopic: 3.16.0-38.52~14.04.1 -proposed tracker

2015-05-18 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1452882 Title:

[Kernel-packages] [Bug 1447373] Re: CVE-2015-3339

2015-05-13 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1447373 Title: CVE-2015-3339 Status in linux

[Kernel-packages] [Bug 1430952] Re: CVE-2015-2150

2015-05-13 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1430952 Title: CVE-2015-2150 Status in linux

[Kernel-packages] [Bug 1440234] Re: CVE-2015-2830

2015-05-13 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1440234 Title: CVE-2015-2830 Status in linux

[Kernel-packages] [Bug 1447367] Re: CVE-2015-3331

2015-05-13 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in

[Kernel-packages] [Bug 1448291] Re: CVE-2014-8171

2015-05-13 Thread John Johansen
** Description changed: [kernel: memcg: OOM handling DoS] + + Break-Fix: - 3812c8c8f3953921ef18544110dafc3505c1ac62 + Break-Fix: - 4942642080ea82d99ab5b653abb9a12b7ba31f4a -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp

[Kernel-packages] [Bug 1442080] Re: CVE-2014-9715

2015-05-13 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-saucy (Ubuntu Precise)

[Kernel-packages] [Bug 1438501] Re: CVE-2014-9710

2015-05-13 Thread John Johansen
** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1438501 Title: CVE-2014-9710 Status in linux

[Kernel-packages] [Bug 1447371] Re: CVE-2015-3332

2015-05-13 Thread John Johansen
** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1447371 Title: CVE-2015-3332 Status in linux

[Kernel-packages] [Bug 919115] Re: CVE-2012-0056

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2

[Kernel-packages] [Bug 971685] Re: CVE-2012-1601

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2

[Kernel-packages] [Bug 917842] Re: CVE-2012-0045

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2

<    3   4   5   6   7   8   9   10   11   12   >