[Bug 1561403] Re: CVE-2016-2117

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-snapdragon - 4.4.0-1015.18 --- linux-snapdragon (4.4.0-1015.18) xenial; urgency=low [ Kamal Mostafa ] [ Ubuntu: 4.4.0-24.42 ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent

[Bug 1561403] Re: CVE-2016-2117

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.4.0-1012.16 --- linux-raspi2 (4.4.0-1012.16) xenial; urgency=low [ Andy Whitcroft ] * Rebase against Ubuntu-4.4.0-23.41 [ Ubuntu: 4.4.0-24.43 ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory

[Bug 1561403] Re: CVE-2016-2117

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-snapdragon - 4.4.0-1015.18 --- linux-snapdragon (4.4.0-1015.18) xenial; urgency=low [ Kamal Mostafa ] [ Ubuntu: 4.4.0-24.42 ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent

[Bug 1561403] Re: CVE-2016-2117

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-xenial - 4.4.0-24.43~14.04.1 --- linux-lts-xenial (4.4.0-24.43~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Bug 1561403] Re: CVE-2016-2117

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-24.43 --- linux (4.4.0-24.43) xenial; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking filesystems on top - SAUCE: ecryptfs:

[Bug 1561403] Re: CVE-2016-2117

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic - 3.16.0-73.95~14.04.1 --- linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Bug 1561403] Re: CVE-2016-2117

2016-06-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty - 3.13.0-88.135~precise1 --- linux-lts-trusty (3.13.0-88.135~precise1) precise; urgency=low [ Kamal Mostafa ] * CVE-2016-1583 (LP: #1588871) - ecryptfs: fix handling of directory opening - SAUCE: proc: prevent stacking

[Bug 1561403] Re: CVE-2016-2117

2016-05-31 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-87.133 --- linux (3.13.0-87.133) trusty; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1585315 [ Upstream Kernel Changes ] * Revert "usb: hub: do not clear BOS field during reset device" - LP: #1582864

[Bug 1561403] Re: CVE-2016-2117

2016-05-23 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Yakkety) Status: Fix Released => New ** Changed in: linux-snapdragon (Ubuntu Yakkety) Status: Fix Released => New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1561403] Re: CVE-2016-2117

2016-05-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-23.41 --- linux (4.4.0-23.41) xenial; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1582431 * zfs: disable module checks for zfs when cross-compiling (LP: #1581127) - [Packaging] disable zfs module checks

[Bug 1561403] Re: CVE-2016-2117

2016-05-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.4.0-1011.14 --- linux-raspi2 (4.4.0-1011.14) xenial; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1582847 * Rebase against Ubuntu-4.4.0-23.41 * zfs: disable module checks for zfs when cross-compiling (LP:

[Bug 1561403] Re: CVE-2016-2117

2016-05-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-snapdragon - 4.4.0-1014.16 --- linux-snapdragon (4.4.0-1014.16) xenial; urgency=low [ Kamal Mostafa ] * Rebase against Ubuntu-4.4.0-23.41 * Release Tracking Bug - LP: #1582679 * zfs: disable module checks for zfs when

[Bug 1561403] Re: CVE-2016-2117

2016-05-19 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-vivid (Ubuntu

[Bug 1561403] Re: CVE-2016-2117

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily)

[Bug 1561403] Re: CVE-2016-2117

2016-05-04 Thread Steve Beattie
** Changed in: linux (Ubuntu Precise) Status: New => Invalid ** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed ** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed **

[Bug 1561403] Re: CVE-2016-2117

2016-05-02 Thread Steve Beattie
** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => New ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => New ** Description changed: memory disclosure to ethernet due to unchecked scatter/gather IO + + Break-Fix: ec5f061564238892005257c83565a0b58ec79295 +

[Bug 1561403] Re: CVE-2016-2117

2016-05-02 Thread Kamal Mostafa
** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561403

[Bug 1561403] Re: CVE-2016-2117

2016-04-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety) Importance: High Status: New ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects:

[Bug 1561403] Re: CVE-2016-2117

2016-04-19 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1561403 Title: CVE-2016-2117 To manage notifications about this bug go to:

[Bug 1561403] Re: CVE-2016-2117

2016-03-24 Thread Steve Beattie
CVE-2016-2117 ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Also