The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lt
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance
** Also affects: linux (Ubuntu Yakkety)
Importance: High
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-security
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubun
** Branch linked: lp:ubuntu/trusty-security/linux-lts-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1513540
Title:
CVE-2015-5307
Status in linux package in Ubuntu:
Fix
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1475.97
---
linux-ti-omap4 (3.2.0-1475.97) precise; urgency=low
* Release Tracking Bug
- LP: #1521445
[ Luis Henriques ]
* rebased on Ubuntu-3.2.0-96.136
[ Ubuntu: 3.2.0-96.136 ]
* Release Tracking Bug
- LP
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1475.97
---
linux-ti-omap4 (3.2.0-1475.97) precise; urgency=low
* Release Tracking Bug
- LP: #1521445
[ Luis Henriques ]
* rebased on Ubuntu-3.2.0-96.136
[ Ubuntu: 3.2.0-96.136 ]
* Release Tracking Bug
- LP
This bug was fixed in the package linux-armadaxp - 3.2.0-1660.84
---
linux-armadaxp (3.2.0-1660.84) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1521448
* Rebase to Ubuntu-3.2.0-96.136
[ Ubuntu: 3.2.0-96.136 ]
* Release Tracking Bug
- LP: #1521
This bug was fixed in the package linux-armadaxp - 3.2.0-1660.84
---
linux-armadaxp (3.2.0-1660.84) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1521448
* Rebase to Ubuntu-3.2.0-96.136
[ Ubuntu: 3.2.0-96.136 ]
* Release Tracking Bug
- LP: #1521
This bug was fixed in the package linux-raspi2 - 4.2.0-1015.22
---
linux-raspi2 (4.2.0-1015.22) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1515537
* rebased on Ubuntu-4.2.0-19.23
[ Ubuntu: 4.2.0-19.23 ]
* Release Tracking Bug
- LP: #1515157
This bug was fixed in the package linux-raspi2 - 4.2.0-1015.22
---
linux-raspi2 (4.2.0-1015.22) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1515537
* rebased on Ubuntu-4.2.0-19.23
[ Ubuntu: 4.2.0-19.23 ]
* Release Tracking Bug
- LP: #1515157
** Description changed:
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x
through 4.6.x, allows guest OS users to cause a denial of service (host
OS panic or hang) by triggering many #AC (aka Alignment Check)
exceptions, related to svm.c and vmx.c.
+
+ Break-Fix: - 54a205
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Description changed:
The KVM subsystem in the Linux ker
** Description changed:
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x
through 4.6.x, allows guest OS users to cause a denial of service (host
OS panic or hang) by triggering many #AC (aka Alignment Check)
exceptions, related to svm.c and vmx.c.
+
+ Break-Fix: - 54a205
** Description changed:
- Ben Serebrin discovered that the KVM hypervisor implementation in the
- Linux kernel did not properly catch Alignment Check exceptions. An
- attacker in a guest virtual machine could use this to cause a denial of
- service (system crash) in the host OS.
+ The KVM subsyste
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-manta (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
** Changed in: linux-manta (Ubuntu Vivid)
Status: New => Invalid
**
This bug was fixed in the package linux - 4.2.0-19.23
---
linux (4.2.0-19.23) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1515157
[ Andy Whitcroft ]
* [Config] re-enable OSS support and blacklist
- LP: #1434842
[ dann frazier ]
* Revert
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux-lts-trusty (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Xenial)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Sta
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/1513540
Title:
CVE-2015-5307
Status in linux pa
21 matches
Mail list logo