[Bug 1561399] Re: CVE-2016-0823
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561399 Title: CVE-2016-0823 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561399/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561399] Re: CVE-2016-0823
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Yakkety) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Yakkety) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561399 Title: CVE-2016-0823 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561399/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561399] Re: CVE-2016-0823
** Also affects: linux (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-manta (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-flo (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-lts-trusty (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-xenial (Ubuntu Yakkety) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561399 Title: CVE-2016-0823 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561399/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561399] Re: CVE-2016-0823
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561399 Title: CVE-2016-0823 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561399/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561399] Re: CVE-2016-0823
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux (Ubuntu Wily) Status: New => Invalid ** Changed in: linux (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Released ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561399 Title: CVE-2016-0823 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561399/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561399] Re: CVE-2016-0823
CVE-2016-0823 ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Precise) Importance: Undecided Status: New ** Changed in: linux-lts-trusty (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Precise) Status: New => Invalid ** Description changed: - Placeholder + The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel + before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local + users to obtain sensitive physical-address information by reading a + pagemap file, aka Android internal bug 25739721. + + Break-Fix: - ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Medium **