** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1568523
Title:
CVE-2016-3672
Status in linux package in Ubuntu:
Fix
** Branch linked: lp:ubuntu/trusty-updates/linux-lts-wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1568523
Title:
CVE-2016-3672
Status in linux package in Ubuntu:
Fix R
This bug was fixed in the package linux-lts-vivid - 3.19.0-61.69~14.04.1
---
linux-lts-vivid (3.19.0-61.69~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
This bug was fixed in the package linux-lts-utopic -
3.16.0-73.95~14.04.1
---
linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesys
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux - 3.2.0-104.145
---
linux (3.2.0-104.145) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on top
- ecryptfs: fix handling of directory opening
- ecryptfs: don't r
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1482.109
---
linux-ti-omap4 (3.2.0-1482.109) precise; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 3.2.0-104.145 ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on top
- ecryptfs: fix hand
This bug was fixed in the package linux-lts-trusty -
3.13.0-88.135~precise1
---
linux-lts-trusty (3.13.0-88.135~precise1) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking fi
This bug was fixed in the package linux - 3.19.0-61.69
---
linux (3.19.0-61.69) vivid; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forb
This bug was fixed in the package linux-lts-wily - 4.2.0-38.45~14.04.1
---
linux-lts-wily (4.2.0-38.45~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems o
This bug was fixed in the package linux-armadaxp - 3.2.0-1667.92
---
linux-armadaxp (3.2.0-1667.92) precise; urgency=low
[ Andy Whitcroft ]
* rebase to 3.2.0-104.145
[ Ubuntu: 3.2.0-104.145 ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on
This bug was fixed in the package linux-raspi2 - 4.2.0-1031.41
---
linux-raspi2 (4.2.0-1031.41) wily; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 4.2.0-38.45 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking file
This bug was fixed in the package linux - 3.13.0-87.133
---
linux (3.13.0-87.133) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1585315
[ Upstream Kernel Changes ]
* Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-wily (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1568523
Title:
CVE-2016-3672
Status in linux p
This bug was fixed in the package linux - 4.4.0-22.39
---
linux (4.4.0-22.39) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1578721
* LP: #1578705
- bpf: fix double-fdput in replace_map_fd_with_map_ptr()
-- Kamal Mostafa Thu, 05 May 2016 09:30
This bug was fixed in the package linux-raspi2 - 4.4.0-1010.12
---
linux-raspi2 (4.4.0-1010.12) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1578741
* Rebase against Ubuntu-4.4.0-22.39
-- Kamal Mostafa Thu, 05 May 2016 10:19:22 -0700
** Changed i
This bug was fixed in the package linux-snapdragon - 4.4.0-1013.14
---
linux-snapdragon (4.4.0-1013.14) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1578759
* Rebase to Ubuntu-4.4.0-22.39
-- Kamal Mostafa Thu, 05 May 2016 11:17:11 -0700
** Change
This bug was fixed in the package linux - 4.4.0-22.38
---
linux (4.4.0-22.38) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1573817
* autoreconstruct: need to also generate extend-diff-ignore options for links
(LP: #1574362)
- [Packaging] auto
This bug was fixed in the package linux-lts-xenial - 4.4.0-22.39~14.04.1
---
linux-lts-xenial (4.4.0-22.39~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1578775
* LP: #1578705
- bpf: fix double-fdput in replace_map_fd_with_map_ptr()
--
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Yakkety)
Importance: Low
Status: New
** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-armadaxp (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-lts-quantal (
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
** C
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1568523
Title:
CVE-2016-3672
Status in linux package in
CVE-2016-3672
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-ti-omap4 (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-raspi2 (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects:
25 matches
Mail list logo