[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1482.109 --- linux-ti-omap4 (3.2.0-1482.109) precise; urgency=low [ Kamal Mostafa ] [ Ubuntu: 3.2.0-104.145 ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix handling of directory opening - ecryptfs: don't reinvent the wheels, please - use struct completion - SAUCE: ecryptfs: forbid opening files without mmap handler -- Andy WhitcroftThu, 09 Jun 2016 11:22:47 +0100 ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
This bug was fixed in the package linux-armadaxp - 3.2.0-1667.92 --- linux-armadaxp (3.2.0-1667.92) precise; urgency=low [ Andy Whitcroft ] * rebase to 3.2.0-104.145 [ Ubuntu: 3.2.0-104.145 ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix handling of directory opening - ecryptfs: don't reinvent the wheels, please - use struct completion - SAUCE: ecryptfs: forbid opening files without mmap handler -- Andy WhitcroftThu, 09 Jun 2016 14:18:38 +0100 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
This bug was fixed in the package linux - 3.2.0-104.145 --- linux (3.2.0-104.145) precise; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - SAUCE: proc: prevent stacking filesystems on top - ecryptfs: fix handling of directory opening - ecryptfs: don't reinvent the wheels, please - use struct completion - SAUCE: ecryptfs: forbid opening files without mmap handler -- Andy WhitcroftThu, 09 Jun 2016 10:45:14 +0100 ** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-1583 ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Wily) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-raspi2 (Ubuntu Wily) Status: Fix Committed => Fix Released ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Fix Released ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Fix Committed => Fix Released ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Yakkety) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Low ** Description changed: - Kernel panic on invalid USB device descriptor (ati_remote2 driver) + The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in + the Linux kernel before 4.5.1 allows physically proximate attackers to + cause a denial of service (NULL pointer dereference and system crash) + via a crafted endpoints value in a USB device descriptor. Break-Fix: - 950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Also affects: linux (Ubuntu Yakkety) Importance: Low Status: Fix Committed ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-mako (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-manta (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-goldfish (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-flo (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-lts-trusty (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-lts-xenial (Ubuntu Yakkety) Importance: Low Status: Invalid ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed ** Description changed: Kernel panic on invalid USB device descriptor (ati_remote2 driver) + + Break-Fix: - 950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561410 Title: CVE-2016-2185 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1561410] Re: CVE-2016-2185
CVE-2016-2185 ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Precise) Importance: Undecided Status: New ** Changed in: linux-lts-trusty (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Precise) Status: New => Invalid ** Description changed: - Placeholder + Kernel panic on invalid USB device descriptor (ati_remote2 driver) ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-trusty (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-lts-trusty (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Low ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-quantal