[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lt

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importan

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2016-04-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety) Importance: Medium Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects:

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2016-04-24 Thread Rolf Leggewie
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armad

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2016-04-19 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1416503 Title: CVE-2015-1420 Status in linux package in

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importan

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1416503 Title: CVE-2015-1420 Status in linux

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided =>

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Unde

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-10-28 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial) Importance: Medium Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: lin

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-09-15 Thread Steve Beattie
** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https:

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty - 3.13.0-57.95~precise1 --- linux-lts-trusty (3.13.0-57.95~precise1) precise; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1466938 [ Brad Figg ] * Merged back Ubuntu-3.13.0-55.94 regression fix for secur

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1653.74 --- linux-armadaxp (3.2.0-1653.74) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1466856 * Rebase to Ubuntu-3.2.0-87.125 [ Ubuntu: 3.2.0-87.125 ] * Release Tracking Bug - LP: #1466

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-87.125 --- linux (3.2.0-87.125) precise; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1466575 [ Upstream Kernel Changes ] * Revert "debugfs: leave freeing a symlink body until inode eviction" - LP: #146

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1653.74 --- linux-armadaxp (3.2.0-1653.74) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1466856 * Rebase to Ubuntu-3.2.0-87.125 [ Ubuntu: 3.2.0-87.125 ] * Release Tracking Bug - LP: #1466

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1467.88 --- linux-ti-omap4 (3.2.0-1467.88) precise; urgency=low * Release Tracking Bug - LP: #1466855 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-87.125 [ Ubuntu: 3.2.0-87.125 ] * Release Tracking Bug - LP:

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-87.125 --- linux (3.2.0-87.125) precise; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1466575 [ Upstream Kernel Changes ] * Revert "debugfs: leave freeing a symlink body until inode eviction" - LP: #146

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1467.88 --- linux-ti-omap4 (3.2.0-1467.88) precise; urgency=low * Release Tracking Bug - LP: #1466855 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-87.125 [ Ubuntu: 3.2.0-87.125 ] * Release Tracking Bug - LP:

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-trusty - 3.13.0-57.95~precise1 --- linux-lts-trusty (3.13.0-57.95~precise1) precise; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1466938 [ Brad Figg ] * Merged back Ubuntu-3.13.0-55.94 regression fix for secur

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic - 3.16.0-43.58~14.04.1 --- linux-lts-utopic (3.16.0-43.58~14.04.1) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1466983 [ Brad Figg ] * Merged back Ubuntu-3.16.0-41.57 regression fix for security

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-utopic - 3.16.0-43.58~14.04.1 --- linux-lts-utopic (3.16.0-43.58~14.04.1) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1466983 [ Brad Figg ] * Merged back Ubuntu-3.16.0-41.57 regression fix for security

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-22.22~14.04.1 --- linux-lts-vivid (3.19.0-22.22~14.04.1) trusty; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465907 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-22.22~14.04.1 --- linux-lts-vivid (3.19.0-22.22~14.04.1) trusty; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465907 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-57.95 --- linux (3.13.0-57.95) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1466592 [ Brad Figg ] * Merged back Ubuntu-3.13.0-55.94 regression fix for security release linux (3.13.0-56.93) trusty;

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.16.0-43.58 --- linux (3.16.0-43.58) utopic; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1466792 [ Brad Figg ] * Merged back Ubuntu-3.16.0-41.57 regression fix for security release linux (3.16.0-42.56) utopic;

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-07-02 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-21 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1416503 Title: CVE-2015-1420 Status in linux package in Ubuntu: Fix

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-22.22 --- linux (3.19.0-22.22) vivid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1465755 [ Tai Nguyen ] * SAUCE: power: reset: Add syscon reboot device node for APM X-Gene platform - LP: #1463211 [

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-18 Thread Luis Henriques
** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1416503 Title: CVE-2015-1420 Status in linux package in

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any updates. Marking the lucid task for this ticket as "Won't Fix". ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packag

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any updates. Marking the lucid task for this ticket as "Won't Fix". ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Pac

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-16 Thread Brad Figg
** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1416503 Title: CVE-2015-1420 Status in linux package in

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-16 Thread Brad Figg
** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1416503 Title: CVE-2015-1420 Status in linux package in U

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-16 Thread Brad Figg
** Changed in: linux (Ubuntu Utopic) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1416503 Title: CVE-2015-1420 Status in linux package in

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-09 Thread John Johansen
** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1416503 Title: CVE-2015-1420 Status in linux package in Ub

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-06-03 Thread John Johansen
** Description changed: Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle du

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-05-26 Thread John Johansen
** Changed in: linux-lts-raring (Ubuntu Precise) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1416503 Title: CVE-2015-1420 Status in linux packa

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily) Importance: Medium Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quan

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-03-30 Thread John Johansen
** Description changed: Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle du

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-03-19 Thread John Johansen
** Description changed: - fs/fhandle.c race condition + Race condition in the handle_to_path function in fs/fhandle.c in the + Linux kernel through 3.19.1 allows local users to bypass intended size + restrictions and trigger read operations on additional memory locations + by changing the handle_b

[Kernel-packages] [Bug 1416503] Re: CVE-2015-1420

2015-01-30 Thread John Johansen
CVE-2015-1420 ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: