** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance
** Also affects: linux (Ubuntu Yakkety)
Importance: High
Status: Fix Released
** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-armadaxp (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-l
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1534887
Title:
CVE-2016-0728
Status in linux package in
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-security
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubun
** Branch linked: lp:ubuntu/trusty-security/linux-lts-vivid
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1534887
Tit
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
** Description changed:
- kernel keyring bad reference count leads to use-after-free, possibly
- resulting in arbitrary code execution in the kernel.
+ The join_session_keyring function in security/keys/process_ke
** Changed in: linux-manta (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: New => Invalid
** Changed in: linux-mako (Ubuntu Vivid)
Status: New => Invalid
** Changed in: linux-goldfish (Ubuntu Vivid)
Status: New => Invalid
**
** Description changed:
kernel keyring bad reference count leads to use-after-free, possibly
resulting in arbitrary code execution in the kernel.
+
+ Break-Fix: 3a50597de8635cd05133bd12c95681c82fe7b878 -
--
You received this bug notification because you are a member of Kernel
Packages, whic
This bug was fixed in the package linux - 4.3.0-7.18
---
linux (4.3.0-7.18) xenial; urgency=low
[ Tim Gardner ]
* Release Tracking Bug
- LP: #1535736
[ Andy Whitcroft ]
* [Config] s390x -- the kernel provides ppp-modules such as there are
[ Upstream Kernel Changes ]
** Tags added: kernel-cve-tracking-bug
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1534887
Title:
CVE-2016-0728
Status in linux package in Ubuntu:
Incomplete
Status in lin
When are the kernel 4.4 packages going to be rebuilt with the fix?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1534887
Title:
CVE-2016-0728
Status in linux package in Ubuntu
This bug was fixed in the package linux-lts-trusty -
3.13.0-76.120~precise1
---
linux-lts-trusty (3.13.0-76.120~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henri
This bug was fixed in the package linux-lts-trusty -
3.13.0-76.120~precise1
---
linux-lts-trusty (3.13.0-76.120~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henri
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bu
This bug was fixed in the package linux-lts-vivid - 3.19.0-47.53~14.04.1
---
linux-lts-vivid (3.19.0-47.53~14.04.1) trusty; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henriques
This bug was fixed in the package linux-raspi2 - 4.2.0-1020.27
---
linux-raspi2 (4.2.0-1020.27) wily; urgency=low
[ Luis Henriques ]
* rebased on Ubuntu-4.2.0-25.30
[ Ubuntu: 4.2.0-25.30 ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2
This bug was fixed in the package linux-raspi2 - 4.2.0-1020.27
---
linux-raspi2 (4.2.0-1020.27) wily; urgency=low
[ Luis Henriques ]
* rebased on Ubuntu-4.2.0-25.30
[ Ubuntu: 4.2.0-25.30 ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2
This bug was fixed in the package linux-lts-utopic -
3.16.0-59.79~14.04.1
---
linux-lts-utopic (3.16.0-59.79~14.04.1) trusty; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henriques
This bug was fixed in the package linux-lts-vivid - 3.19.0-47.53~14.04.1
---
linux-lts-vivid (3.19.0-47.53~14.04.1) trusty; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henriques
This bug was fixed in the package linux-lts-utopic -
3.16.0-59.79~14.04.1
---
linux-lts-utopic (3.16.0-59.79~14.04.1) trusty; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henriques
This bug was fixed in the package linux - 3.19.0-47.53
---
linux (3.19.0-47.53) vivid; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henriques Mon, 18 Jan 2016
10:22:21 +
** C
This bug was fixed in the package linux-lts-wily - 4.2.0-25.30~14.04.1
---
linux-lts-wily (4.2.0-25.30~14.04.1) trusty; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henriques Mon,
This bug was fixed in the package linux - 3.13.0-76.120
---
linux (3.13.0-76.120) trusty; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henriques Mon, 18 Jan 2016
09:54:03 +
*
This bug was fixed in the package linux-lts-wily - 4.2.0-25.30~14.04.1
---
linux-lts-wily (4.2.0-25.30~14.04.1) trusty; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henriques Mon,
This bug was fixed in the package linux - 3.13.0-76.120
---
linux (3.13.0-76.120) trusty; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henriques Mon, 18 Jan 2016
09:54:03 +
*
This bug was fixed in the package linux - 4.2.0-25.30
---
linux (4.2.0-25.30) wily; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henriques Mon, 18 Jan 2016
10:30:55 +
** Chan
This bug was fixed in the package linux - 3.19.0-47.53
---
linux (3.19.0-47.53) vivid; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henriques Mon, 18 Jan 2016
10:22:21 +
** C
This bug was fixed in the package linux - 4.2.0-25.30
---
linux (4.2.0-25.30) wily; urgency=low
[ Upstream Kernel Changes ]
* KEYS: Fix keyring ref leak in join_session_keyring()
- LP: #1534887
- CVE-2016-0728
-- Luis Henriques Mon, 18 Jan 2016
10:30:55 +
** Chan
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1534887
Title:
CVE-2016-0728
Status in linux package in Ubun
30 matches
Mail list logo