** Branch linked: lp:ubuntu/trusty-security/linux-lts-wily
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1581201
Title:
CVE-2016-3713
To manage notifications about this bug go to:
https://bugs.laun
This bug was fixed in the package linux-raspi2 - 4.4.0-1011.14
---
linux-raspi2 (4.4.0-1011.14) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1582847
* Rebase against Ubuntu-4.4.0-23.41
* zfs: disable module checks for zfs when cross-compiling (LP:
This bug was fixed in the package linux-snapdragon - 4.4.0-1014.16
---
linux-snapdragon (4.4.0-1014.16) xenial; urgency=low
[ Kamal Mostafa ]
* Rebase against Ubuntu-4.4.0-23.41
* Release Tracking Bug
- LP: #1582679
* zfs: disable module checks for zfs when cross-compili
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Invalid
** Description changed:
A privileged user inside of a KVM g
This bug was fixed in the package linux - 4.4.0-22.40
---
linux (4.4.0-22.40) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
- SAUCE: KEYS: Fix ASN.1 indefinite length object pars
** Changed in: linux (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Invalid
** Cha
This bug was fixed in the package linux-lts-xenial - 4.4.0-22.40~14.04.1
---
linux-lts-xenial (4.4.0-22.40~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
- SAUCE: KEYS: F
This bug was fixed in the package linux-lts-wily - 4.2.0-36.42~14.04.1
---
linux-lts-wily (4.2.0-36.42~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
- SAUCE: KEYS: Fix A
This bug was fixed in the package linux-lts-xenial - 4.4.0-22.40~14.04.1
---
linux-lts-xenial (4.4.0-22.40~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
- SAUCE: KEYS: F
This bug was fixed in the package linux-lts-wily - 4.2.0-36.42~14.04.1
---
linux-lts-wily (4.2.0-36.42~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
- SAUCE: KEYS: Fix A
This bug was fixed in the package linux - 4.4.0-22.40
---
linux (4.4.0-22.40) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
- SAUCE: KEYS: Fix ASN.1 indefinite length object pars
This bug was fixed in the package linux-raspi2 - 4.4.0-1010.13
---
linux-raspi2 (4.4.0-1010.13) xenial; urgency=low
[ Kamal Mostafa ]
* Rebase against Ubuntu-4.4.0-22.40
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
This bug was fixed in the package linux - 4.4.0-22.40
---
linux (4.4.0-22.40) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
- SAUCE: KEYS: Fix ASN.1 indefinite length object pars
This bug was fixed in the package linux - 4.2.0-36.42
---
linux (4.2.0-36.42) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
- SAUCE: KEYS: Fix ASN.1 indefinite length object parsin
This bug was fixed in the package linux-snapdragon - 4.4.0-1013.15
---
linux-snapdragon (4.4.0-1013.15) xenial; urgency=low
[ Kamal Mostafa ]
* Rebase against Ubuntu-4.4.0-22.40
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #15
This bug was fixed in the package linux-raspi2 - 4.2.0-1029.38
---
linux-raspi2 (4.2.0-1029.38) wily; urgency=low
[ Kamal Mostafa ]
* Rebase against Ubuntu-4.2.0-36.42
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
This bug was fixed in the package linux-raspi2 - 4.2.0-1029.38
---
linux-raspi2 (4.2.0-1029.38) wily; urgency=low
[ Kamal Mostafa ]
* Rebase against Ubuntu-4.2.0-36.42
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
This bug was fixed in the package linux - 4.2.0-36.42
---
linux (4.2.0-36.42) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
- SAUCE: KEYS: Fix ASN.1 indefinite length object parsin
This bug was fixed in the package linux-raspi2 - 4.4.0-1010.13
---
linux-raspi2 (4.4.0-1010.13) xenial; urgency=low
[ Kamal Mostafa ]
* Rebase against Ubuntu-4.4.0-22.40
* CVE-2016-3713 (LP: #1581201)
- SAUCE: KVM: MTRR: remove MSR 0x2f8
* CVE-2016-0758 (LP: #1581202)
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1581201
Title:
CVE-2016-3713
To manage notifications about this bug go to:
https:/
20 matches
Mail list logo