[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lt

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2016-04-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety) Importance: High Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2016-02-24 Thread Launchpad Bug Tracker
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily /trusty-security ** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily /trusty-proposed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubun

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2016-02-24 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-security/linux-lts-vivid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1513540 Title: CVE-2015-5307 Status in linux package in Ubuntu: Fix

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-12-17 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1475.97 --- linux-ti-omap4 (3.2.0-1475.97) precise; urgency=low * Release Tracking Bug - LP: #1521445 [ Luis Henriques ] * rebased on Ubuntu-3.2.0-96.136 [ Ubuntu: 3.2.0-96.136 ] * Release Tracking Bug - LP

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-12-17 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1475.97 --- linux-ti-omap4 (3.2.0-1475.97) precise; urgency=low * Release Tracking Bug - LP: #1521445 [ Luis Henriques ] * rebased on Ubuntu-3.2.0-96.136 [ Ubuntu: 3.2.0-96.136 ] * Release Tracking Bug - LP

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-12-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1660.84 --- linux-armadaxp (3.2.0-1660.84) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1521448 * Rebase to Ubuntu-3.2.0-96.136 [ Ubuntu: 3.2.0-96.136 ] * Release Tracking Bug - LP: #1521

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-12-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1660.84 --- linux-armadaxp (3.2.0-1660.84) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1521448 * Rebase to Ubuntu-3.2.0-96.136 [ Ubuntu: 3.2.0-96.136 ] * Release Tracking Bug - LP: #1521

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-11-30 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.2.0-1015.22 --- linux-raspi2 (4.2.0-1015.22) wily; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1515537 * rebased on Ubuntu-4.2.0-19.23 [ Ubuntu: 4.2.0-19.23 ] * Release Tracking Bug - LP: #1515157

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-11-30 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.2.0-1015.22 --- linux-raspi2 (4.2.0-1015.22) wily; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1515537 * rebased on Ubuntu-4.2.0-19.23 [ Ubuntu: 4.2.0-19.23 ] * Release Tracking Bug - LP: #1515157

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-11-26 Thread Steve Beattie
** Description changed: The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c. + + Break-Fix: - 54a205

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-11-25 Thread Steve Beattie
** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New => Invalid ** Description changed: The KVM subsystem in the Linux ker

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-11-24 Thread Steve Beattie
** Description changed: The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c. + + Break-Fix: - 54a205

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-11-19 Thread Steve Beattie
** Description changed: - Ben Serebrin discovered that the KVM hypervisor implementation in the - Linux kernel did not properly catch Alignment Check exceptions. An - attacker in a guest virtual machine could use this to cause a denial of - service (system crash) in the host OS. + The KVM subsyste

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-11-16 Thread Steve Beattie
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Vivid) Status: New => Invalid **

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-11-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.2.0-19.23 --- linux (4.2.0-19.23) wily; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1515157 [ Andy Whitcroft ] * [Config] re-enable OSS support and blacklist - LP: #1434842 [ dann frazier ] * Revert

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Released ** Changed in: linux-lts-trusty (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Sta

[Kernel-packages] [Bug 1513540] Re: CVE-2015-5307

2015-11-10 Thread Steve Beattie
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/1513540 Title: CVE-2015-5307 Status in linux pa