[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
This bug was fixed in the package linux-lts-utopic - 3.16.0-73.95~14.04.1 --- linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking filesystems on top - SAUCE: ecryptfs: forbid opening files without mmap handler -- Andy WhitcroftThu, 09 Jun 2016 08:46:24 +0100 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
This bug was fixed in the package linux-armadaxp - 3.2.0-1667.92 --- linux-armadaxp (3.2.0-1667.92) precise; urgency=low [ Andy Whitcroft ] * rebase to 3.2.0-104.145 [ Ubuntu: 3.2.0-104.145 ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix handling of directory opening - ecryptfs: don't reinvent the wheels, please - use struct completion - SAUCE: ecryptfs: forbid opening files without mmap handler -- Andy WhitcroftThu, 09 Jun 2016 14:18:38 +0100 ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1482.109 --- linux-ti-omap4 (3.2.0-1482.109) precise; urgency=low [ Kamal Mostafa ] [ Ubuntu: 3.2.0-104.145 ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix handling of directory opening - ecryptfs: don't reinvent the wheels, please - use struct completion - SAUCE: ecryptfs: forbid opening files without mmap handler -- Andy WhitcroftThu, 09 Jun 2016 11:22:47 +0100 ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
This bug was fixed in the package linux - 3.2.0-104.145 --- linux (3.2.0-104.145) precise; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix handling of directory opening - ecryptfs: don't reinvent the wheels, please - use struct completion - SAUCE: ecryptfs: forbid opening files without mmap handler -- Andy WhitcroftThu, 09 Jun 2016 10:45:14 +0100 ** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-1583 ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Wily) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-raspi2 (Ubuntu Wily) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Fix Released ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Fix Committed => Fix Released ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Yakkety) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Low ** Description changed: - cypress_m8 USB driver crash + drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows + physically proximate attackers to cause a denial of service (NULL + pointer dereference and system crash) via a USB device without both an + interrupt-in and an interrupt-out endpoint descriptor, related to the + cypress_generic_port_probe and cypress_open functions. Break-Fix: - c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Also affects: linux (Ubuntu Yakkety) Importance: Low Status: Fix Committed ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-mako (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-manta (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-goldfish (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-flo (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-lts-trusty (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-lts-xenial (Ubuntu Yakkety) Importance: Low Status: Invalid ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
** Description changed: cypress_m8 USB driver crash + + Break-Fix: - c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1556878 Title: CVE-2016-3137 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1556878/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1556878] Re: CVE-2016-3137
CVE-2016-3137 ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Precise) Importance: Undecided Status: New ** Changed in: linux-lts-trusty (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Precise) Status: New => Invalid ** Description changed: - Placeholder + cypress_m8 USB driver crash ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-trusty (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-lts-trusty (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Low ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Importance: Undecided