This bug was fixed in the package linux-lts-trusty -
3.13.0-86.130~precise1
---
linux-lts-trusty (3.13.0-86.130~precise1) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1572261
[ Benjamin Tissoires ]
* SAUCE: Input: synaptics - handle spurious rele
This bug was fixed in the package linux-armadaxp - 3.2.0-1665.90
---
linux-armadaxp (3.2.0-1665.90) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1572755
* Rebase to Ubuntu-3.2.0-102.142
[ Ubuntu: 3.2.0-102.142 ]
* Release Tracking Bug
- LP: #15
This bug was fixed in the package linux - 3.13.0-86.130
---
linux (3.13.0-86.130) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1571718
[ Benjamin Tissoires ]
* SAUCE: Input: synaptics - handle spurious release of trackstick
buttons, again
This bug was fixed in the package linux - 3.2.0-102.142
---
linux (3.2.0-102.142) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1571853
[ Kamal Mostafa ]
* [debian] BugLink: close LP: bugs only for Launchpad urls
[ Upstream Kernel Changes ]
This bug was fixed in the package linux-armadaxp - 3.2.0-1665.90
---
linux-armadaxp (3.2.0-1665.90) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1572755
* Rebase to Ubuntu-3.2.0-102.142
[ Ubuntu: 3.2.0-102.142 ]
* Release Tracking Bug
- LP: #15
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1480.106
---
linux-ti-omap4 (3.2.0-1480.106) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1573271
[ Ubuntu-3.2.0-102.142 ]
* [debian] BugLink: close LP: bugs only for Launchpad urls
* Rev
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importan
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-armadaxp (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1563916
Title:
CVE-2016-0774
Status in linux p
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-wily (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Wily)
Status: New => Inva
** Description changed:
pipe buffer state corruption after unsuccessful atomic read from pipe
+
+ Break-Fix: local-2016-0774-break local-2016-0774-fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bu
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1563916
Title:
CVE-2016-0774
Status in linux package in
CVE-2016-0774
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-ti-omap4 (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-raspi2 (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects:
13 matches
Mail list logo