[Bug 1558847] Re: CVE-2016-3156
** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
This bug was fixed in the package linux - 3.2.0-104.145 --- linux (3.2.0-104.145) precise; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix handling of directory opening - ecryptfs: don't reinvent the wheels, please - use struct completion - SAUCE: ecryptfs: forbid opening files without mmap handler -- Andy WhitcroftThu, 09 Jun 2016 10:45:14 +0100 ** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-1583 ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
This bug was fixed in the package linux-armadaxp - 3.2.0-1667.92 --- linux-armadaxp (3.2.0-1667.92) precise; urgency=low [ Andy Whitcroft ] * rebase to 3.2.0-104.145 [ Ubuntu: 3.2.0-104.145 ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix handling of directory opening - ecryptfs: don't reinvent the wheels, please - use struct completion - SAUCE: ecryptfs: forbid opening files without mmap handler -- Andy WhitcroftThu, 09 Jun 2016 14:18:38 +0100 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1482.109 --- linux-ti-omap4 (3.2.0-1482.109) precise; urgency=low [ Kamal Mostafa ] [ Ubuntu: 3.2.0-104.145 ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix handling of directory opening - ecryptfs: don't reinvent the wheels, please - use struct completion - SAUCE: ecryptfs: forbid opening files without mmap handler -- Andy WhitcroftThu, 09 Jun 2016 11:22:47 +0100 ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
** Changed in: linux-lts-wily (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Wily) Status: Fix Committed => Fix Released ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-raspi2 (Ubuntu Wily) Status: Fix Committed => Fix Released ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
This bug was fixed in the package linux-lts-trusty - 3.13.0-86.130~precise1 --- linux-lts-trusty (3.13.0-86.130~precise1) precise; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1572261 [ Benjamin Tissoires ] * SAUCE: Input: synaptics - handle spurious release of trackstick buttons, again - LP: #1553811 [ K. Y. Srinivasan ] * SAUCE: (noup): Drivers: hv: vmbus: Fix a bug in hv_need_to_signal_on_read() - LP: #1556264 [ Kamal Mostafa ] * [debian] BugLink: close LP: bugs only for Launchpad urls * [Config] updateconfigs after v3.13.11-ckt38 [ Tim Gardner ] * [Debian] Fix linux-doc dangling symlinks - LP: #661306 [ Upstream Kernel Changes ] * Revert "jffs2: Fix lock acquisition order bug in jffs2_write_begin" - LP: #1562900 * [stable-only] AIO: properly check iovec sizes - LP: #1562900 * Input: aiptek - fix crash on detecting device without endpoints - LP: #1562900 * wext: fix message delay/ordering - LP: #1562900 * cfg80211/wext: fix message ordering - LP: #1562900 * mac80211: fix use of uninitialised values in RX aggregation - LP: #1562900 * libata: fix HDIO_GET_32BIT ioctl - LP: #1562900 * mac80211: minstrel_ht: set default tx aggregation timeout to 0 - LP: #1562900 * jffs2: Fix page lock / f->sem deadlock - LP: #1562900 * Fix directory hardlinks from deleted directories - LP: #1562900 * iommu/amd: Fix boot warning when device 00:00.0 is not iommu covered - LP: #1562900 * libata: Align ata_device's id on a cacheline - LP: #1562900 * vfio: fix ioctl error handling - LP: #1562900 * ALSA: ctl: Fix ioctls for X32 ABI - LP: #1562900 * ALSA: rawmidi: Fix ioctls X32 ABI - LP: #1562900 * ALSA: timer: Fix broken compat timer user status ioctl - LP: #1562900 * ALSA: timer: Fix ioctls for X32 ABI - LP: #1562900 * cifs: fix out-of-bounds access in lease parsing - LP: #1562900 * CIFS: Fix SMB2+ interim response processing for read requests - LP: #1562900 * ALSA: hdspm: Fix wrong boolean ctl value accesses - LP: #1562900 * ALSA: hdspm: Fix zero-division - LP: #1562900 * ALSA: hdsp: Fix wrong boolean ctl value accesses - LP: #1562900 * USB: cp210x: Add ID for Parrot NMEA GPS Flight Recorder - LP: #1562900 * ASoC: wm8958: Fix enum ctl accesses in a wrong type - LP: #1562900 * ASoC: wm8994: Fix enum ctl accesses in a wrong type - LP: #1562900 * ASoC: wm_adsp: Fix enum ctl accesses in a wrong type - LP: #1562900 * USB: serial: option: add support for Telit LE922 PID 0x1045 - LP: #1562900 * USB: serial: option: add support for Quectel UC20 - LP: #1562900 * ALSA: seq: oss: Don't drain at closing a client - LP: #1562900 * drm/ast: Fix incorrect register check for DRAM width - LP: #1562900 * drm/radeon/pm: update current crtc info after setting the powerstate - LP: #1562900 * PM / sleep / x86: Fix crash on graph trace through x86 suspend - LP: #1562900 * ALSA: hda - Fix mic issues on Acer Aspire E1-472 - LP: #1562900 * MIPS: traps: Fix SIGFPE information leak from `do_ov' and `do_trap_or_bp' - LP: #1562900 * ubi: Fix out of bounds write in volume update code - LP: #1562900 * KVM: VMX: disable PEBS before a guest entry - LP: #1562900 * ext4: iterate over buffer heads correctly in move_extent_per_page() - LP: #1562900 * net/mlx4_core: Allow resetting VF admin mac to zero - LP: #1562900 * ipv6: re-enable fragment header matching in ipv6_find_hdr - LP: #1562900 * cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind - LP: #1562900 * net: moxa: fix an error code - LP: #1562900 * IB/core: Use GRH when the path hop-limit > 0 - LP: #1562900 * Linux 3.13.11-ckt37 - LP: #1562900 * Drivers: hv_vmbus: Fix signal to host condition - LP: #1556264 * [stable-only] pipe: Fix buffer offset after partially failed read - LP: #1563916 * EDAC, amd64_edac: Shift wrapping issue in f1x_get_norm_dct_addr() - LP: #1567615 * tty: Fix GPF in flush_to_ldisc(), part 2 - LP: #1567615 * [media] media: v4l2-compat-ioctl32: fix missing length copy in put_v4l2_buffer32 - LP: #1567615 * [media] pwc: Add USB id for Philips Spc880nc webcam - LP: #1567615 * 8250: use callbacks to access UART_DLL/UART_DLM - LP: #1567615 * net: irda: Fix use-after-free in irtty_open() - LP: #1567615 * usb: retry reset if a device times out - LP: #1567615 * HID: core: do not scan reports if the group is already set - LP: #1567615 * HID: fix hid_ignore_special_drivers module parameter - LP: #1567615 * scripts/coccinelle: modernize & - LP: #1567615 * [media] adv7511: TX_EDID_PRESENT is still 1 after a disconnect - LP: #1567615 * [media] saa7134: Fix bytesperline not being set correctly for planar formats - LP: #1567615 * perf tools: Dont stop PMU
[Bug 1558847] Re: CVE-2016-3156
This bug was fixed in the package linux - 3.13.0-86.130 --- linux (3.13.0-86.130) trusty; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1571718 [ Benjamin Tissoires ] * SAUCE: Input: synaptics - handle spurious release of trackstick buttons, again - LP: #1553811 [ K. Y. Srinivasan ] * SAUCE: (noup): Drivers: hv: vmbus: Fix a bug in hv_need_to_signal_on_read() - LP: #1556264 [ Kamal Mostafa ] * [debian] BugLink: close LP: bugs only for Launchpad urls * [Config] updateconfigs after v3.13.11-ckt38 [ Tim Gardner ] * [Debian] Fix linux-doc dangling symlinks - LP: #661306 [ Upstream Kernel Changes ] * Revert "jffs2: Fix lock acquisition order bug in jffs2_write_begin" - LP: #1562900 * [stable-only] AIO: properly check iovec sizes - LP: #1562900 * Input: aiptek - fix crash on detecting device without endpoints - LP: #1562900 * wext: fix message delay/ordering - LP: #1562900 * cfg80211/wext: fix message ordering - LP: #1562900 * mac80211: fix use of uninitialised values in RX aggregation - LP: #1562900 * libata: fix HDIO_GET_32BIT ioctl - LP: #1562900 * mac80211: minstrel_ht: set default tx aggregation timeout to 0 - LP: #1562900 * jffs2: Fix page lock / f->sem deadlock - LP: #1562900 * Fix directory hardlinks from deleted directories - LP: #1562900 * iommu/amd: Fix boot warning when device 00:00.0 is not iommu covered - LP: #1562900 * libata: Align ata_device's id on a cacheline - LP: #1562900 * vfio: fix ioctl error handling - LP: #1562900 * ALSA: ctl: Fix ioctls for X32 ABI - LP: #1562900 * ALSA: rawmidi: Fix ioctls X32 ABI - LP: #1562900 * ALSA: timer: Fix broken compat timer user status ioctl - LP: #1562900 * ALSA: timer: Fix ioctls for X32 ABI - LP: #1562900 * cifs: fix out-of-bounds access in lease parsing - LP: #1562900 * CIFS: Fix SMB2+ interim response processing for read requests - LP: #1562900 * ALSA: hdspm: Fix wrong boolean ctl value accesses - LP: #1562900 * ALSA: hdspm: Fix zero-division - LP: #1562900 * ALSA: hdsp: Fix wrong boolean ctl value accesses - LP: #1562900 * USB: cp210x: Add ID for Parrot NMEA GPS Flight Recorder - LP: #1562900 * ASoC: wm8958: Fix enum ctl accesses in a wrong type - LP: #1562900 * ASoC: wm8994: Fix enum ctl accesses in a wrong type - LP: #1562900 * ASoC: wm_adsp: Fix enum ctl accesses in a wrong type - LP: #1562900 * USB: serial: option: add support for Telit LE922 PID 0x1045 - LP: #1562900 * USB: serial: option: add support for Quectel UC20 - LP: #1562900 * ALSA: seq: oss: Don't drain at closing a client - LP: #1562900 * drm/ast: Fix incorrect register check for DRAM width - LP: #1562900 * drm/radeon/pm: update current crtc info after setting the powerstate - LP: #1562900 * PM / sleep / x86: Fix crash on graph trace through x86 suspend - LP: #1562900 * ALSA: hda - Fix mic issues on Acer Aspire E1-472 - LP: #1562900 * MIPS: traps: Fix SIGFPE information leak from `do_ov' and `do_trap_or_bp' - LP: #1562900 * ubi: Fix out of bounds write in volume update code - LP: #1562900 * KVM: VMX: disable PEBS before a guest entry - LP: #1562900 * ext4: iterate over buffer heads correctly in move_extent_per_page() - LP: #1562900 * net/mlx4_core: Allow resetting VF admin mac to zero - LP: #1562900 * ipv6: re-enable fragment header matching in ipv6_find_hdr - LP: #1562900 * cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind - LP: #1562900 * net: moxa: fix an error code - LP: #1562900 * IB/core: Use GRH when the path hop-limit > 0 - LP: #1562900 * Linux 3.13.11-ckt37 - LP: #1562900 * Drivers: hv_vmbus: Fix signal to host condition - LP: #1556264 * [stable-only] pipe: Fix buffer offset after partially failed read - LP: #1563916 * EDAC, amd64_edac: Shift wrapping issue in f1x_get_norm_dct_addr() - LP: #1567615 * tty: Fix GPF in flush_to_ldisc(), part 2 - LP: #1567615 * [media] media: v4l2-compat-ioctl32: fix missing length copy in put_v4l2_buffer32 - LP: #1567615 * [media] pwc: Add USB id for Philips Spc880nc webcam - LP: #1567615 * 8250: use callbacks to access UART_DLL/UART_DLM - LP: #1567615 * net: irda: Fix use-after-free in irtty_open() - LP: #1567615 * usb: retry reset if a device times out - LP: #1567615 * HID: core: do not scan reports if the group is already set - LP: #1567615 * HID: fix hid_ignore_special_drivers module parameter - LP: #1567615 * scripts/coccinelle: modernize & - LP: #1567615 * [media] adv7511: TX_EDID_PRESENT is still 1 after a disconnect - LP: #1567615 * [media] saa7134: Fix bytesperline not being set correctly for planar formats - LP: #1567615 * perf tools: Dont stop PMU parsing on alias parse error - LP: #1567615
[Bug 1558847] Re: CVE-2016-3156
** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Fix Released ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Fix Committed => Fix Released ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Yakkety) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Medium ** Description changed: - Local denial of service to network + The IPv4 implementation in the Linux kernel before 4.5.2 mishandles + destruction of device objects, which allows guest OS users to cause a + denial of service (host OS networking outage) by arranging for a large + number of IP addresses. Break-Fix: - fbd40ea0180a2d328c5adc61414dc8bab9335ce2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
** Also affects: linux (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-manta (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-flo (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-lts-trusty (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-lts-xenial (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Changed in: linux (Ubuntu Yakkety) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
** Description changed: Local denial of service to network + + Break-Fix: - fbd40ea0180a2d328c5adc61414dc8bab9335ce2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1558847 Title: CVE-2016-3156 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1558847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1558847] Re: CVE-2016-3156
CVE-2016-3156 ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Precise) Importance: Undecided Status: New ** Changed in: linux-lts-trusty (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Precise) Status: New => Invalid ** Description changed: - Placeholder + Local denial of service to network ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu