** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Invalid
** C
** Description changed:
The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel
through 4.3.3 attempts to merge distinct setattr operations, which
allows local users to bypass intended access restrictions and modify the
attributes of arbitrary overlay files via a crafted appli
** Also affects: linux (Ubuntu Yakkety)
Importance: High
Status: Fix Released
** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-armadaxp (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-l
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1528904
Title:
CVE-2015-8660
Status in linux package in
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-security
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubun
** Branch linked: lp:ubuntu/trusty-security/linux-lts-vivid
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1528904
Tit
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1528904
Title:
CVE-2015-8660
Status in linux pack
This bug was fixed in the package linux - 4.3.0-6.17
---
linux (4.3.0-6.17) xenial; urgency=low
[ Tim Gardner ]
* Release Tracking Bug
- LP: #1532958
[ Eric Dumazet ]
* SAUCE: (noup) net: fix IP early demux races
- LP: #1526946
[ Guilherme G. Piccoli ]
* SAUCE
10 matches
Mail list logo