[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-08-12 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1585365 Title: CVE-2016-4951 Status in linux package in Ubuntu:

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-08-12 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-updates/linux-lts-wily -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1585365 Title: CVE-2016-4951 Status in linux package in Ubuntu: Fix

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-64.72~14.04.1 --- linux-lts-vivid (3.19.0-64.72~14.04.1) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1595990 [ Upstream Kernel Changes ] * netfilter: x_tables: validate e->target_offset

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-xenial - 4.4.0-28.47~14.04.1 --- linux-lts-xenial (4.4.0-28.47~14.04.1) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1595884 * Linux netfilter local privilege escalation issues (LP: #1595350) -

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-wily - 4.2.0-41.48~14.04.1 --- linux-lts-wily (4.2.0-41.48~14.04.1) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1595921 [ Upstream Kernel Changes ] * netfilter: x_tables: validate e->target_offset

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.2.0-1033.43 --- linux-raspi2 (4.2.0-1033.43) wily; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1595920 * rebased on Ubuntu-4.2.0-41.48 [ Ubuntu: 4.2.0-41.48 ] * Release Tracking Bug - LP:

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-64.72 --- linux (3.19.0-64.72) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1595976 [ Upstream Kernel Changes ] * netfilter: x_tables: validate e->target_offset early - LP: #1555338 -

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.2.0-41.48 --- linux (4.2.0-41.48) wily; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1595914 [ Upstream Kernel Changes ] * netfilter: x_tables: validate e->target_offset early - LP: #1555338 -

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.4.0-1016.22 --- linux-raspi2 (4.4.0-1016.22) xenial; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1595881 * Rebase against Ubuntu-4.4.0-28.47 [ Ubuntu: 4.4.0-28.47 ] * Release Tracking Bug - LP:

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-snapdragon - 4.4.0-1019.22 --- linux-snapdragon (4.4.0-1019.22) xenial; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1595882 [ Ubuntu: 4.4.0-28.47 ] * Linux netfilter local privilege escalation issues (LP:

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-28.47 --- linux (4.4.0-28.47) xenial; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1595874 * Linux netfilter local privilege escalation issues (LP: #1595350) - netfilter: x_tables: don't move to

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-15 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-25.44 --- linux (4.4.0-25.44) xenial; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1591289 * Xenial update to v4.4.13 stable release (LP: #1590455) - MIPS64: R6: R2 emulation bugfix - MIPS: math-emu:

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-14 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.4.0-1013.17 --- linux-raspi2 (4.4.0-1013.17) xenial; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1591461 [ Ubuntu: 4.4.0-25.44 ] * Xenial update to v4.4.13 stable release (LP: #1590455) - MIPS64:

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-06-14 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-snapdragon - 4.4.0-1016.19 --- linux-snapdragon (4.4.0-1016.19) xenial; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1591462 [ Ubuntu: 4.4.0-25.44 ] * Xenial update to v4.4.13 stable release (LP: #1590455) -

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-05-25 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Invalid ** Changed in: linux (Ubuntu Precise) Status: New => Invalid ** Changed in: linux (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Invalid **

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-05-25 Thread Kamal Mostafa
** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed ** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed ** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel

[Kernel-packages] [Bug 1585365] Re: CVE-2016-4951

2016-05-24 Thread Steve Beattie
CVE-2016-4951 ** Also affects: linux (Ubuntu Yakkety) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Undecided Status: New ** Also