CVE 2015-1350
The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.
Related bugs and status
CVE-2015-1350 (Candidate) is related to these bugs:
Bug #1415636: CVE-2015-1350
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1415636 | CVE-2015-1350 | linux (Ubuntu) | Medium | New | ||
1415636 | CVE-2015-1350 | linux-fsl-imx51 (Ubuntu) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-mvl-dove (Ubuntu) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-lts-backport-maverick (Ubuntu) | Undecided | New | ||
1415636 | CVE-2015-1350 | linux-lts-backport-natty (Ubuntu) | Undecided | New | ||
1415636 | CVE-2015-1350 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-ec2 (Ubuntu) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux (Ubuntu Vivid) | Medium | Won't Fix | ||
1415636 | CVE-2015-1350 | linux-ec2 (Ubuntu Vivid) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-fsl-imx51 (Ubuntu Vivid) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-lts-backport-maverick (Ubuntu Vivid) | Undecided | New | ||
1415636 | CVE-2015-1350 | linux-lts-backport-natty (Ubuntu Vivid) | Undecided | New | ||
1415636 | CVE-2015-1350 | linux-mvl-dove (Ubuntu Vivid) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-ti-omap4 (Ubuntu Vivid) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-lts-backport-maverick (Ubuntu Utopic) | Undecided | Won't Fix | ||
1415636 | CVE-2015-1350 | linux-lts-backport-natty (Ubuntu Utopic) | Undecided | Won't Fix | ||
1415636 | CVE-2015-1350 | linux (Ubuntu Trusty) | Medium | New | ||
1415636 | CVE-2015-1350 | linux-ec2 (Ubuntu Trusty) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-fsl-imx51 (Ubuntu Trusty) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-lts-backport-maverick (Ubuntu Trusty) | Undecided | New | ||
1415636 | CVE-2015-1350 | linux-lts-backport-natty (Ubuntu Trusty) | Undecided | New | ||
1415636 | CVE-2015-1350 | linux-mvl-dove (Ubuntu Trusty) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux (Ubuntu Precise) | Medium | Won't Fix | ||
1415636 | CVE-2015-1350 | linux-ec2 (Ubuntu Precise) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-fsl-imx51 (Ubuntu Precise) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-lts-backport-maverick (Ubuntu Precise) | Undecided | Won't Fix | ||
1415636 | CVE-2015-1350 | linux-lts-backport-natty (Ubuntu Precise) | Undecided | Won't Fix | ||
1415636 | CVE-2015-1350 | linux-mvl-dove (Ubuntu Precise) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-ti-omap4 (Ubuntu Precise) | Medium | Won't Fix | ||
1415636 | CVE-2015-1350 | linux-lts-backport-maverick (Ubuntu Lucid) | Undecided | Won't Fix | ||
1415636 | CVE-2015-1350 | linux-lts-backport-natty (Ubuntu Lucid) | Undecided | Won't Fix | ||
1415636 | CVE-2015-1350 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-lts-trusty (Ubuntu Precise) | Medium | Won't Fix | ||
1415636 | CVE-2015-1350 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-lts-trusty (Ubuntu Vivid) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-armadaxp (Ubuntu Precise) | Medium | Won't Fix | ||
1415636 | CVE-2015-1350 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-armadaxp (Ubuntu Vivid) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-goldfish (Ubuntu) | Medium | New | ||
1415636 | CVE-2015-1350 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-goldfish (Ubuntu Vivid) | Medium | New | ||
1415636 | CVE-2015-1350 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-lts-saucy (Ubuntu Precise) | Medium | Won't Fix | ||
1415636 | CVE-2015-1350 | linux-lts-saucy (Ubuntu Trusty) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-lts-saucy (Ubuntu Vivid) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1415636 | CVE-2015-1350 | linux-lts-quantal (Ubuntu Precise) | Medium | Won't Fix |
Bug #1239087: Safely remove is not working (or broken) in Gnome Disks
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1239087 | Safely remove is not working (or broken) in Gnome Disks | gnome-disk-utility (Ubuntu) | Undecided | New |
Bug #792085: Automatic remount of safely removed USB 3.0 drive
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
792085 | Automatic remount of safely removed USB 3.0 drive | linux (Fedora) | Undecided | Fix Released | ||
792085 | Automatic remount of safely removed USB 3.0 drive | linux (openSUSE) | Medium | Fix Released | ||
792085 | Automatic remount of safely removed USB 3.0 drive | linux (Ubuntu) | Medium | Fix Released | ||
792085 | Automatic remount of safely removed USB 3.0 drive | linux (Ubuntu Yakkety) | Medium | Fix Released | ||
792085 | Automatic remount of safely removed USB 3.0 drive | linux (Ubuntu Xenial) | Medium | Fix Released | ||
792085 | Automatic remount of safely removed USB 3.0 drive | linux (Ubuntu Trusty) | Medium | Triaged |
Bug #1772675: i40e PF reset due to incorrect MDD event
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1772675 | i40e PF reset due to incorrect MDD event | linux (Ubuntu) | Low | Fix Released | ||
1772675 | i40e PF reset due to incorrect MDD event | linux (Ubuntu Cosmic) | Low | Won't Fix | ||
1772675 | i40e PF reset due to incorrect MDD event | linux (Ubuntu Bionic) | High | Fix Released | ||
1772675 | i40e PF reset due to incorrect MDD event | linux (Ubuntu Xenial) | High | Fix Released |
Bug #1916656: Xenial update: v4.4.255 upstream stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1916656 | Xenial update: v4.4.255 upstream stable release | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1916657: Xenial update: v4.4.256 upstream stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1916657 | Xenial update: v4.4.256 upstream stable release | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1916660: Xenial update: v4.4.257 upstream stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1916660 | Xenial update: v4.4.257 upstream stable release | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1916661: Xenial update: v4.4.258 upstream stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1916661 | Xenial update: v4.4.258 upstream stable release | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1918182: Xenial update: v4.4.259 upstream stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1918182 | Xenial update: v4.4.259 upstream stable release | linux (Ubuntu) | Undecided | Invalid | ||
1918182 | Xenial update: v4.4.259 upstream stable release | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1918184: Xenial update: v4.4.260 upstream stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1918184 | Xenial update: v4.4.260 upstream stable release | linux (Ubuntu) | Undecided | Invalid | ||
1918184 | Xenial update: v4.4.260 upstream stable release | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1919553: xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1919553 | xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1919553 | xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Incomplete | ||
1919553 | xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Confirmed | ||
1919553 | xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1919553 | xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1919553 | xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1919553 | xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1919553 | xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1919553 | xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Invalid | ||
1919553 | xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | In Progress | ||
1919553 | xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released | ||
1919553 | xenial/linux-raspi2: 4.4.0-1149.160 -proposed tracker | linux-raspi2 (Ubuntu Xenial) | Medium | Fix Released |
Bug #1919555: xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1919555 | xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1919555 | xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Incomplete | ||
1919555 | xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Confirmed | ||
1919555 | xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1919555 | xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1919555 | xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1919555 | xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1919555 | xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1919555 | xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Invalid | ||
1919555 | xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | In Progress | ||
1919555 | xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released | ||
1919555 | xenial/linux-snapdragon: 4.4.0-1153.163 -proposed tracker | linux-snapdragon (Ubuntu Xenial) | Medium | Fix Released |
Bug #1919558: xenial/linux: 4.4.0-207.239 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Incomplete | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow kernel-signoff | Medium | Confirmed | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | In Progress | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | In Progress | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released | ||
1919558 | xenial/linux: 4.4.0-207.239 -proposed tracker | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1920218: Xenial update: v4.4.261 upstream stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1920218 | Xenial update: v4.4.261 upstream stable release | linux (Ubuntu) | Undecided | Invalid | ||
1920218 | Xenial update: v4.4.261 upstream stable release | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1920221: Xenial update: v4.4.262 upstream stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1920221 | Xenial update: v4.4.262 upstream stable release | linux (Ubuntu) | Undecided | Invalid | ||
1920221 | Xenial update: v4.4.262 upstream stable release | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1921969: lxd 2.0.11-0ubuntu1~16.04.4 ADT test failure with linux 4.4.0-207.239
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1921969 | lxd 2.0.11-0ubuntu1~16.04.4 ADT test failure with linux 4.4.0-207.239 | linux (Ubuntu) | Critical | Invalid | ||
1921969 | lxd 2.0.11-0ubuntu1~16.04.4 ADT test failure with linux 4.4.0-207.239 | linux (Ubuntu Xenial) | Critical | Fix Released |
Bug #1922062: xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1922062 | xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1922062 | xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1922062 | xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1922062 | xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1922062 | xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1922062 | xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1922062 | xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1922062 | xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1922062 | xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1922062 | xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1922062 | xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released | ||
1922062 | xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker | linux-kvm (Ubuntu Xenial) | Medium | Fix Released |
Bug #1922064: xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1922064 | xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1922064 | xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1922064 | xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1922064 | xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1922064 | xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1922064 | xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1922064 | xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1922064 | xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1922064 | xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Invalid | ||
1922064 | xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1922064 | xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released | ||
1922064 | xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker | linux-raspi2 (Ubuntu Xenial) | Medium | Fix Released |
Bug #1922066: xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1922066 | xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1922066 | xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1922066 | xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1922066 | xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1922066 | xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1922066 | xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1922066 | xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1922066 | xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1922066 | xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Invalid | ||
1922066 | xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1922066 | xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released | ||
1922066 | xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker | linux-snapdragon (Ubuntu Xenial) | Medium | Fix Released |
Bug #1922069: xenial/linux: 4.4.0-208.240 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow kernel-signoff | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released | ||
1922069 | xenial/linux: 4.4.0-208.240 -proposed tracker | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1922200: linux ADT test failure with linux/4.4.0-207.239 - ubuntu_qrt_kernel_security.test-kernel-security.py
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1922200 | linux ADT test failure with linux/4.4.0-207.239 - ubuntu_qrt_kernel_security.test-kernel-security.py | linux (Ubuntu) | Undecided | Invalid | ||
1922200 | linux ADT test failure with linux/4.4.0-207.239 - ubuntu_qrt_kernel_security.test-kernel-security.py | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1922596: linux ADT test failure with linux/4.4.0-208.240
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1922596 | linux ADT test failure with linux/4.4.0-208.240 | linux (Ubuntu) | Undecided | Invalid | ||
1922596 | linux ADT test failure with linux/4.4.0-208.240 | linux (Ubuntu Xenial) | Undecided | Invalid | ||
1922596 | linux ADT test failure with linux/4.4.0-208.240 | QA Regression Testing | Undecided | Fix Released |
See the
CVE page on Mitre.org
for more details.