CVE-2015-5157
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
CVE-2015-3291
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
Malicious user code can cause some fraction of NMIs to be ignored.
Break-Fix: - 810bc075f78ff2c221536eb3008eac6a492dba2d
** Affects: linux (Ubuntu)
Importance: Low
Status: New
** Affects: linux-armadaxp (U
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-trusty (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Sta
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/1477026
Title:
CVE-2015-3290
Status in linux pa
CVE-2015-3290
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Private security bug reported:
Placeholder
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-ec2 (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-fsl-imx51 (Ubuntu)
Importance
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1472545
Title:
linux-
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1472453
Title:
linux: 3.13.0-58
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1472346
Title:
linux: 3.19.0-23.
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1472223
Title:
linux-
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1472030
Title:
linux: 3.16.0-44.
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1472034
Title:
linux-t
looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1471889
Title:
linux: 3.2.0-88.1
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
Yep, thanks. I think I've got it now. I am working on a fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1448912
Title:
BUG: unable to handle kernel NULL pointer dereference (aa_label_
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Description changed:
[SCTP race condition allows list corruption and panic from userlevel]
- Break-Fix: 9f7d653b67aed2d92540fbb0a8adaf32fcf352ae -
+ Break-Fix: 9f7d653b67aed2d92540fbb0a8adaf32fcf352ae
+ 2d45a02d0166
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1442080
Title:
CVE-2014-9715
Status
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubunt
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1462170
Title:
CVE-2015-1805
Status in linux p
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1472165
Title:
CVE-2015-5366
Status in linux
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1472160
Title:
CVE-2015-5364
Status in linux
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: Fix Committed => Fix Released
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1469315
Title:
CVE-2015-4692
Status in linux
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubun
*** This bug is a security vulnerability ***
Public security bug reported:
[Linux UDP checksum DoS EGAIN part]
Break-Fix: - beb39db59d14990e401e235faf66a6b9b31240b0
** Affects: linux (Ubuntu)
Importance: Medium
Status: Fix Committed
** Affects: linux-armadaxp (Ubuntu)
Import
CVE-2015-5366
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[Linux UDP checksum DoS]
Break-Fix: - beb39db59d14990e401e235faf66a6b9b31240b0
** Affects: linux (Ubuntu)
Importance: Medium
Status: Fix Committed
** Affects: linux-armadaxp (Ubuntu)
Importance: Mediu
CVE-2015-5364
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launch
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Pack
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.laun
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1466983
Title:
linux-
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466792
Title:
linux: 3.16.0-43.
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1466855
Title:
linux-ti
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1466938
Title:
linux-
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466592
Title:
linux: 3.13.0-57.
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1466575
Title:
linux: 3.2.0-87.1
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
CVE-2015-3212
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[SCTP race condition allows list corruption and panic from userlevel]
Break-Fix: 9f7d653b67aed2d92540fbb0a8adaf32fcf352ae -
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armad
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New =>
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notificat
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification becau
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1453256
Title:
CVE-2015-3636
Status i
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification becau
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification becau
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1447367
Title:
CVE-2015-3331
Status i
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1430952
Title:
CVE-2015-2150
Status i
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1440234
Title:
CVE-2015-2830
Status i
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1438501
Title:
CVE-2014-9710
Status in linux
CVE-2015-4700
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
Crafted BPF filters may crash kernel during JIT optimisation
Break-Fix: 0a14842f5a3c0e88a1e59fac5c3025db39721f74
3f7352bf21f8fd7ba3e2fcef9488756f188e12be
** Affects: linux (Ubuntu)
Importance: Low
Status: N
CVE-2015-4692
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
kvm: x86: NULL pointer dereference in kvm_apic_has_events function
Break-Fix: 66450a21f99636af4fafac2afd33f1a40631bc3a -
** Affects: linux (Ubuntu)
Importance: Low
Status: New
** Affects: linux-armadaxp (U
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465755
Title:
linux: 3.19.0-22.
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
** Description changed:
- [Multiple out-of-bound reads in ozwpan driver]
+ The OZWPAN driver in the Linux kernel through 4.0.5 relies on an
+ untrusted length field during packet parsing, which allows remote
+ attackers to obtain sensitive information from kernel memory or cause a
+ denial of serv
** Description changed:
- [Missing length checks in packet processing]
+ drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux
+ kernel through 4.0.5 does not ensure that certain length values are
+ sufficiently large, which allows remote attackers to cause a denial of
+ service (sy
** Description changed:
- [Divide by zero in softirq]
+ The oz_usb_handle_ep_data function in drivers/staging/ozwpan/ozusbsvc1.c
+ in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote
+ attackers to cause a denial of service (divide-by-zero error and system
+ crash) via a crafted p
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Released
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Relea
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
** Description changed:
- [signed to unsigned data type change]
+ Integer signedness error in the oz_hcd_get_desc_cnf function in
+ drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel
+ through 4.0.5 allows remote attackers to cause a denial of service
+ (system crash) or possi
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1453256
Title:
CVE-2015-3636
Status i
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
*** This bug is a security vulnerability ***
Public security bug reported:
overlayfs privilege escalation
** Affects: linux (Ubuntu)
Importance: High
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: High
Status: Invalid
** Affects: linux-ec2 (Ubuntu)
CVE-2015-1328
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
CVE-2015-4004
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[Multiple out-of-bound reads in ozwpan driver]
Break-Fix: ae926051d7eb8f80dba9513db70d2e2fc8385d3a -
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
Impor
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
**
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
**
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
**
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => In
** Changed in: linux-lts-trusty (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Utopic)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: Ne
** Changed in: linux-lts-trusty (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Utopic)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: Ne
** Changed in: linux-lts-trusty (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Utopic)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: Ne
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1416503
Title:
CVE-2015-1420
Status in linux package in Ub
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1458901
Title:
linux: 3.2.0-85.1
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux (Ubuntu Wily)
Status: New => Invalid
** Ch
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1462255
Title:
CVE-2015-4178
Status in linux packa
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1462249
Title:
CVE-2015-4177
Status in linux packa
601 - 700 of 4213 matches
Mail list logo