** Changed in: linux (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1582758
Title:
Wily update to v4.2.8-ckt10 stable release
Status in linux pack
** Branch linked: lp:ubuntu/trusty-updates/linux-lts-wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1582758
Title:
Wily update to v4.2.8-ckt10 stable release
Status in linux packag
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1582758
Title:
Wily update to v4.2.8-ckt10 stable release
Status in
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
5 matches
Mail list logo