CVE 2016-4794
Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.
Related bugs and status
CVE-2016-4794 (Candidate) is related to these bugs:
Bug #1498667: [Toshiba P50W-B00F] Touchscreen no longer working
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1498667 | [Toshiba P50W-B00F] Touchscreen no longer working | linux (Ubuntu) | Medium | Fix Released | ||
1498667 | [Toshiba P50W-B00F] Touchscreen no longer working | linux (Ubuntu Wily) | Medium | Won't Fix | ||
1498667 | [Toshiba P50W-B00F] Touchscreen no longer working | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1498667 | [Toshiba P50W-B00F] Touchscreen no longer working | linux (Ubuntu Yakkety) | Medium | Fix Released |
Bug #1555353: CVE-2016-3135
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1555353 | CVE-2016-3135 | linux (Ubuntu) | Medium | Fix Released | ||
1555353 | CVE-2016-3135 | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1555353 | CVE-2016-3135 | linux (Ubuntu Wily) | Medium | Fix Released | ||
1555353 | CVE-2016-3135 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-trusty (Ubuntu Xenial) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-armadaxp (Ubuntu Xenial) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-xenial (Ubuntu) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-xenial (Ubuntu Wily) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-xenial (Ubuntu Xenial) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-wily (Ubuntu) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-wily (Ubuntu Wily) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-wily (Ubuntu Xenial) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-goldfish (Ubuntu) | Medium | New | ||
1555353 | CVE-2016-3135 | linux-goldfish (Ubuntu Wily) | Medium | New | ||
1555353 | CVE-2016-3135 | linux-goldfish (Ubuntu Xenial) | Medium | New | ||
1555353 | CVE-2016-3135 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-saucy (Ubuntu Wily) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-saucy (Ubuntu Xenial) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-quantal (Ubuntu Wily) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-quantal (Ubuntu Xenial) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-raspi2 (Ubuntu) | Medium | Fix Released | ||
1555353 | CVE-2016-3135 | linux-raspi2 (Ubuntu Wily) | Medium | Fix Released | ||
1555353 | CVE-2016-3135 | linux-raspi2 (Ubuntu Xenial) | Medium | Fix Released | ||
1555353 | CVE-2016-3135 | linux-lts-vivid (Ubuntu) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-vivid (Ubuntu Wily) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-vivid (Ubuntu Xenial) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-mako (Ubuntu) | Medium | New | ||
1555353 | CVE-2016-3135 | linux-mako (Ubuntu Wily) | Medium | New | ||
1555353 | CVE-2016-3135 | linux-mako (Ubuntu Xenial) | Medium | New | ||
1555353 | CVE-2016-3135 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-ti-omap4 (Ubuntu Xenial) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-utopic (Ubuntu) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-utopic (Ubuntu Wily) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-utopic (Ubuntu Xenial) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-flo (Ubuntu) | Medium | New | ||
1555353 | CVE-2016-3135 | linux-flo (Ubuntu Wily) | Medium | New | ||
1555353 | CVE-2016-3135 | linux-flo (Ubuntu Xenial) | Medium | New | ||
1555353 | CVE-2016-3135 | linux-lts-raring (Ubuntu) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-raring (Ubuntu Wily) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-lts-raring (Ubuntu Xenial) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-manta (Ubuntu) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-manta (Ubuntu Wily) | Medium | New | ||
1555353 | CVE-2016-3135 | linux-manta (Ubuntu Xenial) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux (Ubuntu Trusty) | Medium | Invalid | ||
1555353 | CVE-2016-3135 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid |
Bug #1574102: Regression (constant vibration of device) in xpad driver in Ubuntu 16.04
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1574102 | Regression (constant vibration of device) in xpad driver in Ubuntu 16.04 | linux (Ubuntu) | Medium | Fix Released | ||
1574102 | Regression (constant vibration of device) in xpad driver in Ubuntu 16.04 | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1574102 | Regression (constant vibration of device) in xpad driver in Ubuntu 16.04 | linux (Ubuntu Yakkety) | Medium | Fix Released |
Bug #1581871: CVE-2016-4794
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1581871 | CVE-2016-4794 | linux (Ubuntu) | Medium | Fix Released | ||
1581871 | CVE-2016-4794 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-raspi2 (Ubuntu) | Medium | Fix Released | ||
1581871 | CVE-2016-4794 | linux (Ubuntu Yakkety) | Medium | Fix Released | ||
1581871 | CVE-2016-4794 | linux-raspi2 (Ubuntu Yakkety) | Medium | Fix Released | ||
1581871 | CVE-2016-4794 | linux-ti-omap4 (Ubuntu Yakkety) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1581871 | CVE-2016-4794 | linux-raspi2 (Ubuntu Xenial) | Medium | Fix Released | ||
1581871 | CVE-2016-4794 | linux-ti-omap4 (Ubuntu Xenial) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux (Ubuntu Wily) | Medium | New | ||
1581871 | CVE-2016-4794 | linux-raspi2 (Ubuntu Wily) | Medium | New | ||
1581871 | CVE-2016-4794 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux (Ubuntu Vivid) | Undecided | Fix Released | ||
1581871 | CVE-2016-4794 | linux-raspi2 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1581871 | CVE-2016-4794 | linux-ti-omap4 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1581871 | CVE-2016-4794 | linux (Ubuntu Trusty) | Medium | New | ||
1581871 | CVE-2016-4794 | linux-raspi2 (Ubuntu Trusty) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux (Ubuntu Precise) | Medium | Won't Fix | ||
1581871 | CVE-2016-4794 | linux-raspi2 (Ubuntu Precise) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-ti-omap4 (Ubuntu Precise) | Medium | Won't Fix | ||
1581871 | CVE-2016-4794 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-trusty (Ubuntu Precise) | Medium | Won't Fix | ||
1581871 | CVE-2016-4794 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-trusty (Ubuntu Vivid) | Undecided | Won't Fix | ||
1581871 | CVE-2016-4794 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-trusty (Ubuntu Xenial) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-trusty (Ubuntu Yakkety) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-armadaxp (Ubuntu Precise) | Medium | Won't Fix | ||
1581871 | CVE-2016-4794 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-armadaxp (Ubuntu Vivid) | Undecided | Won't Fix | ||
1581871 | CVE-2016-4794 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-armadaxp (Ubuntu Xenial) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-armadaxp (Ubuntu Yakkety) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-xenial (Ubuntu) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-xenial (Ubuntu Precise) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-xenial (Ubuntu Trusty) | Medium | Fix Released | ||
1581871 | CVE-2016-4794 | linux-lts-xenial (Ubuntu Vivid) | Undecided | New | ||
1581871 | CVE-2016-4794 | linux-lts-xenial (Ubuntu Wily) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-xenial (Ubuntu Xenial) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-xenial (Ubuntu Yakkety) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-vivid (Ubuntu) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-vivid (Ubuntu Precise) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-vivid (Ubuntu Trusty) | Medium | Fix Released | ||
1581871 | CVE-2016-4794 | linux-lts-vivid (Ubuntu Vivid) | Undecided | Won't Fix | ||
1581871 | CVE-2016-4794 | linux-lts-vivid (Ubuntu Wily) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-vivid (Ubuntu Xenial) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-lts-vivid (Ubuntu Yakkety) | Medium | Invalid | ||
1581871 | CVE-2016-4794 | linux-goldfish (Ubuntu) | Medium | New |
Bug #1583357: [Hyper-V] Rebase Hyper-V to 4.6 kernel
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1583357 | [Hyper-V] Rebase Hyper-V to 4.6 kernel | linux (Ubuntu) | Medium | Fix Released | ||
1583357 | [Hyper-V] Rebase Hyper-V to 4.6 kernel | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1583738: arm64: statically link rtc-efi
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1583738 | arm64: statically link rtc-efi | linux (Ubuntu) | High | Fix Released | ||
1583738 | arm64: statically link rtc-efi | linux (Ubuntu Yakkety) | High | Fix Released | ||
1583738 | arm64: statically link rtc-efi | linux (Ubuntu Vivid) | Undecided | Fix Released | ||
1583738 | arm64: statically link rtc-efi | linux (Ubuntu Xenial) | Undecided | Fix Released | ||
1583738 | arm64: statically link rtc-efi | linux (Ubuntu Wily) | Undecided | Won't Fix |
Bug #1584192: CVE-2016-4440
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1584192 | CVE-2016-4440 | linux (Ubuntu) | Medium | Fix Released | ||
1584192 | CVE-2016-4440 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-raspi2 (Ubuntu) | Medium | Fix Released | ||
1584192 | CVE-2016-4440 | linux (Ubuntu Yakkety) | Medium | Fix Released | ||
1584192 | CVE-2016-4440 | linux-raspi2 (Ubuntu Yakkety) | Medium | Fix Released | ||
1584192 | CVE-2016-4440 | linux-ti-omap4 (Ubuntu Yakkety) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1584192 | CVE-2016-4440 | linux-raspi2 (Ubuntu Xenial) | Medium | Fix Released | ||
1584192 | CVE-2016-4440 | linux-ti-omap4 (Ubuntu Xenial) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux (Ubuntu Wily) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-raspi2 (Ubuntu Wily) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux (Ubuntu Vivid) | Undecided | Won't Fix | ||
1584192 | CVE-2016-4440 | linux-raspi2 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1584192 | CVE-2016-4440 | linux-ti-omap4 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1584192 | CVE-2016-4440 | linux (Ubuntu Trusty) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-raspi2 (Ubuntu Trusty) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux (Ubuntu Precise) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-raspi2 (Ubuntu Precise) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-ti-omap4 (Ubuntu Precise) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-trusty (Ubuntu Precise) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-trusty (Ubuntu Vivid) | Undecided | Won't Fix | ||
1584192 | CVE-2016-4440 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-trusty (Ubuntu Xenial) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-trusty (Ubuntu Yakkety) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-armadaxp (Ubuntu Precise) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-armadaxp (Ubuntu Vivid) | Undecided | New | ||
1584192 | CVE-2016-4440 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-armadaxp (Ubuntu Xenial) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-armadaxp (Ubuntu Yakkety) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-xenial (Ubuntu) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-xenial (Ubuntu Precise) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-xenial (Ubuntu Trusty) | Medium | Fix Released | ||
1584192 | CVE-2016-4440 | linux-lts-xenial (Ubuntu Vivid) | Undecided | New | ||
1584192 | CVE-2016-4440 | linux-lts-xenial (Ubuntu Wily) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-xenial (Ubuntu Xenial) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-xenial (Ubuntu Yakkety) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-vivid (Ubuntu) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-vivid (Ubuntu Precise) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-vivid (Ubuntu Trusty) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-vivid (Ubuntu Vivid) | Undecided | Won't Fix | ||
1584192 | CVE-2016-4440 | linux-lts-vivid (Ubuntu Wily) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-vivid (Ubuntu Xenial) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-lts-vivid (Ubuntu Yakkety) | Medium | Invalid | ||
1584192 | CVE-2016-4440 | linux-goldfish (Ubuntu) | Medium | New |
Bug #1586418: exercising ptys causes a kernel oops
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1586418 | exercising ptys causes a kernel oops | linux (Ubuntu) | Medium | Fix Released | ||
1586418 | exercising ptys causes a kernel oops | linux (Ubuntu Trusty) | Undecided | Fix Released | ||
1586418 | exercising ptys causes a kernel oops | linux (Ubuntu Wily) | Undecided | Won't Fix | ||
1586418 | exercising ptys causes a kernel oops | linux (Ubuntu Yakkety) | Medium | Fix Released | ||
1586418 | exercising ptys causes a kernel oops | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1586418 | exercising ptys causes a kernel oops | linux (Ubuntu Vivid) | Undecided | Fix Released |
Bug #1589036: CVE-2016-5243
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1589036 | CVE-2016-5243 | linux (Ubuntu) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-raspi2 (Ubuntu) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux (Ubuntu Yakkety) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux-raspi2 (Ubuntu Yakkety) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux-ti-omap4 (Ubuntu Yakkety) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux-raspi2 (Ubuntu Xenial) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux-ti-omap4 (Ubuntu Xenial) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux (Ubuntu Wily) | Medium | New | ||
1589036 | CVE-2016-5243 | linux-raspi2 (Ubuntu Wily) | Medium | New | ||
1589036 | CVE-2016-5243 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux (Ubuntu Vivid) | Undecided | Fix Released | ||
1589036 | CVE-2016-5243 | linux-raspi2 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1589036 | CVE-2016-5243 | linux-ti-omap4 (Ubuntu Vivid) | Undecided | New | ||
1589036 | CVE-2016-5243 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux-raspi2 (Ubuntu Trusty) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux (Ubuntu Precise) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux-raspi2 (Ubuntu Precise) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-trusty (Ubuntu Vivid) | Undecided | New | ||
1589036 | CVE-2016-5243 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-trusty (Ubuntu Xenial) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-trusty (Ubuntu Yakkety) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-armadaxp (Ubuntu Vivid) | Undecided | New | ||
1589036 | CVE-2016-5243 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-armadaxp (Ubuntu Xenial) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-armadaxp (Ubuntu Yakkety) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-xenial (Ubuntu) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-xenial (Ubuntu Precise) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-xenial (Ubuntu Trusty) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux-lts-xenial (Ubuntu Vivid) | Undecided | New | ||
1589036 | CVE-2016-5243 | linux-lts-xenial (Ubuntu Wily) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-xenial (Ubuntu Xenial) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-xenial (Ubuntu Yakkety) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-vivid (Ubuntu) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-vivid (Ubuntu Precise) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-vivid (Ubuntu Trusty) | Medium | Fix Released | ||
1589036 | CVE-2016-5243 | linux-lts-vivid (Ubuntu Vivid) | Undecided | New | ||
1589036 | CVE-2016-5243 | linux-lts-vivid (Ubuntu Wily) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-vivid (Ubuntu Xenial) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-lts-vivid (Ubuntu Yakkety) | Medium | Invalid | ||
1589036 | CVE-2016-5243 | linux-goldfish (Ubuntu) | Medium | New |
Bug #1590655: [Hyper-V] storvsc messages for CD-ROM medium not present tray closed
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1590655 | [Hyper-V] storvsc messages for CD-ROM medium not present tray closed | linux (Ubuntu) | Medium | Fix Released | ||
1590655 | [Hyper-V] storvsc messages for CD-ROM medium not present tray closed | linux (Ubuntu Vivid) | Medium | Won't Fix | ||
1590655 | [Hyper-V] storvsc messages for CD-ROM medium not present tray closed | linux (Ubuntu Wily) | Medium | Won't Fix | ||
1590655 | [Hyper-V] storvsc messages for CD-ROM medium not present tray closed | linux (Ubuntu Yakkety) | Medium | Fix Released | ||
1590655 | [Hyper-V] storvsc messages for CD-ROM medium not present tray closed | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1590655 | [Hyper-V] storvsc messages for CD-ROM medium not present tray closed | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1593124: Add proper palm detection support for MS Precision Touchpad
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1593124 | Add proper palm detection support for MS Precision Touchpad | linux (Ubuntu) | Undecided | Fix Released | ||
1593124 | Add proper palm detection support for MS Precision Touchpad | HWE Next | Undecided | Fix Released | ||
1593124 | Add proper palm detection support for MS Precision Touchpad | HWE Next xenial | Undecided | Fix Released | ||
1593124 | Add proper palm detection support for MS Precision Touchpad | Linux | Unknown | Unknown | ||
1593124 | Add proper palm detection support for MS Precision Touchpad | linux (Ubuntu Xenial) | Undecided | Fix Released |
Bug #1595803: [i915_bpo][SKL] Display core init/uninit updates
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1595803 | [i915_bpo][SKL] Display core init/uninit updates | linux (Ubuntu) | Critical | Fix Released | ||
1595803 | [i915_bpo][SKL] Display core init/uninit updates | linux (Ubuntu Vivid) | Undecided | Fix Released | ||
1595803 | [i915_bpo][SKL] Display core init/uninit updates | HWE Next | Undecided | Fix Released |
Bug #1596575: Xenial update to v4.4.14 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1596575 | Xenial update to v4.4.14 stable release | linux (Ubuntu) | Undecided | Fix Released | ||
1596575 | Xenial update to v4.4.14 stable release | linux (Ubuntu Xenial) | Undecided | Fix Released |
Bug #1596871: [Bug] Legacy audio couldn't work after S3 resume on Kabylake
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1596871 | [Bug] Legacy audio couldn't work after S3 resume on Kabylake | intel | Undecided | Fix Released | ||
1596871 | [Bug] Legacy audio couldn't work after S3 resume on Kabylake | linux (Ubuntu) | Critical | Fix Released | ||
1596871 | [Bug] Legacy audio couldn't work after S3 resume on Kabylake | linux (Ubuntu Xenial) | Undecided | Fix Released |
Bug #1597564: the kernel hangs when reboot or shutdown on a lenovo baytrail-m based machine
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1597564 | the kernel hangs when reboot or shutdown on a lenovo baytrail-m based machine | linux (Ubuntu) | Critical | Fix Released | ||
1597564 | the kernel hangs when reboot or shutdown on a lenovo baytrail-m based machine | HWE Next | Critical | Fix Released | ||
1597564 | the kernel hangs when reboot or shutdown on a lenovo baytrail-m based machine | linux (Ubuntu Vivid) | Critical | Fix Released |
Bug #1597573: Network installer fails to detect network on AMD Overdrive (ARM64)
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1597573 | Network installer fails to detect network on AMD Overdrive (ARM64) | linux (Ubuntu) | Medium | Fix Released | ||
1597573 | Network installer fails to detect network on AMD Overdrive (ARM64) | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1597573 | Network installer fails to detect network on AMD Overdrive (ARM64) | linux (Ubuntu Yakkety) | Medium | Fix Released |
Bug #1597574: Config: missing AMD Seattle platform support
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1597574 | Config: missing AMD Seattle platform support | linux (Ubuntu) | Medium | Fix Released | ||
1597574 | Config: missing AMD Seattle platform support | linux (Ubuntu Yakkety) | Medium | Fix Released | ||
1597574 | Config: missing AMD Seattle platform support | linux (Ubuntu Xenial) | Medium | Fix Released |
Bug #1597867: thunderx nics fail to establish link
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1597867 | thunderx nics fail to establish link | linux (Ubuntu) | High | Fix Released | ||
1597867 | thunderx nics fail to establish link | linux (Ubuntu Xenial) | High | Fix Released |
Bug #1597971: kernel: signal return with invalid floating-point control
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1597971 | kernel: signal return with invalid floating-point control | linux (Ubuntu) | Undecided | Fix Released | ||
1597971 | kernel: signal return with invalid floating-point control | Ubuntu on IBM z Systems | High | Fix Released | ||
1597971 | kernel: signal return with invalid floating-point control | linux (Ubuntu Xenial) | Undecided | Fix Released | ||
1597971 | kernel: signal return with invalid floating-point control | linux (Ubuntu Yakkety) | Undecided | Fix Released |
Bug #1599068: Add support for Intel 8265 Bluetooth ([8087:0A2B])
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1599068 | Add support for Intel 8265 Bluetooth ([8087:0A2B]) | linux (Ubuntu) | Undecided | Fix Released | ||
1599068 | Add support for Intel 8265 Bluetooth ([8087:0A2B]) | HWE Next | Undecided | Fix Released | ||
1599068 | Add support for Intel 8265 Bluetooth ([8087:0A2B]) | linux (Ubuntu Xenial) | Undecided | Fix Released |
Bug #1599109: [i915_bpo] Rebase driver to v4.7-rc6 + gen9 workarounds + KBP PCH support
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1599109 | [i915_bpo] Rebase driver to v4.7-rc6 + gen9 workarounds + KBP PCH support | linux (Ubuntu) | Undecided | Fix Released | ||
1599109 | [i915_bpo] Rebase driver to v4.7-rc6 + gen9 workarounds + KBP PCH support | linux (Ubuntu Xenial) | High | Fix Released |
Bug #1599250: Hotplug device addition issue - missing patches on Xenial kernel
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1599250 | Hotplug device addition issue - missing patches on Xenial kernel | linux (Ubuntu) | Undecided | Fix Released | ||
1599250 | Hotplug device addition issue - missing patches on Xenial kernel | linux (Ubuntu Xenial) | Undecided | Fix Released | ||
1599250 | Hotplug device addition issue - missing patches on Xenial kernel | linux (Ubuntu Yakkety) | Undecided | Fix Released |
Bug #1599257: sync spl 0.6.5.6-0ubuntu4 changes into Xenial kernel source
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1599257 | sync spl 0.6.5.6-0ubuntu4 changes into Xenial kernel source | linux (Ubuntu) | Medium | Fix Released | ||
1599257 | sync spl 0.6.5.6-0ubuntu4 changes into Xenial kernel source | linux (Ubuntu Xenial) | Undecided | Fix Released |
Bug #1599347: [yakkety] d-i does not support (ehci_msm) Qualcomm On-Chip EHCI Host Controller
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1599347 | [yakkety] d-i does not support (ehci_msm) Qualcomm On-Chip EHCI Host Controller | linux (Ubuntu) | High | Fix Released | ||
1599347 | [yakkety] d-i does not support (ehci_msm) Qualcomm On-Chip EHCI Host Controller | linux (Ubuntu Yakkety) | High | Fix Released | ||
1599347 | [yakkety] d-i does not support (ehci_msm) Qualcomm On-Chip EHCI Host Controller | linux (Ubuntu Xenial) | Undecided | Fix Released |
Bug #1599379: Baytrail-I got black screen with HDMI output
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1599379 | Baytrail-I got black screen with HDMI output | linux (Ubuntu) | Undecided | Fix Released | ||
1599379 | Baytrail-I got black screen with HDMI output | HWE Next | Undecided | Fix Released | ||
1599379 | Baytrail-I got black screen with HDMI output | linux (Ubuntu Xenial) | Undecided | Fix Released |
Bug #1599562: linux: Homogenize changelog format across releases
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1599562 | linux: Homogenize changelog format across releases | linux (Ubuntu) | Undecided | Fix Released | ||
1599562 | linux: Homogenize changelog format across releases | linux (Ubuntu Vivid) | Undecided | Fix Released | ||
1599562 | linux: Homogenize changelog format across releases | linux (Ubuntu Xenial) | Undecided | Fix Released | ||
1599562 | linux: Homogenize changelog format across releases | linux (Ubuntu Wily) | Undecided | Won't Fix | ||
1599562 | linux: Homogenize changelog format across releases | linux (Ubuntu Yakkety) | Undecided | Fix Released | ||
1599562 | linux: Homogenize changelog format across releases | linux (Ubuntu Precise) | Undecided | Fix Released | ||
1599562 | linux: Homogenize changelog format across releases | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1600124: Adjust KBL PCI-ID's
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1600124 | Adjust KBL PCI-ID's | linux (Ubuntu) | Undecided | Fix Released | ||
1600124 | Adjust KBL PCI-ID's | libdrm (Ubuntu) | Undecided | Fix Released | ||
1600124 | Adjust KBL PCI-ID's | mesa (Ubuntu) | Undecided | Fix Released | ||
1600124 | Adjust KBL PCI-ID's | xserver-xorg-video-intel (Ubuntu) | Undecided | Fix Released | ||
1600124 | Adjust KBL PCI-ID's | libdrm (Ubuntu Xenial) | Undecided | Fix Released | ||
1600124 | Adjust KBL PCI-ID's | linux (Ubuntu Xenial) | Undecided | Fix Released | ||
1600124 | Adjust KBL PCI-ID's | mesa (Ubuntu Xenial) | Undecided | Fix Released | ||
1600124 | Adjust KBL PCI-ID's | xserver-xorg-video-intel (Ubuntu Xenial) | Undecided | Fix Released |
Bug #1601831: qeth: delete napi struct when removing a qeth device
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1601831 | qeth: delete napi struct when removing a qeth device | linux (Ubuntu) | Undecided | Fix Released | ||
1601831 | qeth: delete napi struct when removing a qeth device | linux (Ubuntu Xenial) | Undecided | Fix Released | ||
1601831 | qeth: delete napi struct when removing a qeth device | linux (Ubuntu Precise) | Undecided | Fix Released | ||
1601831 | qeth: delete napi struct when removing a qeth device | linux (Ubuntu Yakkety) | Undecided | Fix Released | ||
1601831 | qeth: delete napi struct when removing a qeth device | linux (Ubuntu Trusty) | Undecided | Fix Released | ||
1601831 | qeth: delete napi struct when removing a qeth device | Ubuntu on IBM z Systems | High | Fix Released | ||
1601831 | qeth: delete napi struct when removing a qeth device | linux (Ubuntu Vivid) | Undecided | Fix Released |
Bug #1601952: Xenial update to v4.4.15 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1601952 | Xenial update to v4.4.15 stable release | linux (Ubuntu) | Undecided | Fix Released | ||
1601952 | Xenial update to v4.4.15 stable release | linux (Ubuntu Xenial) | Undecided | Fix Released |
Bug #1602579: the system hangs in the dma driver when reboot or shutdown on a baytrail-m laptop
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1602579 | the system hangs in the dma driver when reboot or shutdown on a baytrail-m laptop | HWE Next | Critical | Fix Released | ||
1602579 | the system hangs in the dma driver when reboot or shutdown on a baytrail-m laptop | linux (Ubuntu) | Critical | Fix Released | ||
1602579 | the system hangs in the dma driver when reboot or shutdown on a baytrail-m laptop | linux (Ubuntu Xenial) | Undecided | Fix Released |
Bug #1603483: [Xenial] Include Huawei PCIe SSD hio kernel driver
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1603483 | [Xenial] Include Huawei PCIe SSD hio kernel driver | linux (Ubuntu) | High | Fix Released | ||
1603483 | [Xenial] Include Huawei PCIe SSD hio kernel driver | linux (Ubuntu Xenial) | High | Fix Released |
Bug #1603719: [regression] NFS client: access problems after updating to kernel 4.4.0-31-generic
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1603719 | [regression] NFS client: access problems after updating to kernel 4.4.0-31-generic | linux (Ubuntu) | High | Fix Released | ||
1603719 | [regression] NFS client: access problems after updating to kernel 4.4.0-31-generic | linux (Ubuntu Xenial) | High | Fix Released |
Bug #1603975: thinkpad yoga 260 wacom touchscreen not working
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1603975 | thinkpad yoga 260 wacom touchscreen not working | linux (Ubuntu) | Undecided | Fix Released | ||
1603975 | thinkpad yoga 260 wacom touchscreen not working | linux (Ubuntu Xenial) | Undecided | Fix Released |
Bug #1604153: linux: 3.19.0-66.74 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1604153 | linux: 3.19.0-66.74 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | linux (Ubuntu Vivid) | Medium | Fix Released | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1604153 | linux: 3.19.0-66.74 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1604159: linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | linux-lts-vivid (Ubuntu) | Undecided | Invalid | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | linux-lts-vivid (Ubuntu Trusty) | Medium | Fix Released | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1604159 | linux-lts-vivid: 3.19.0-66.74~14.04.1 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1604344: changelog: add CVEs as first class citizens
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1604344 | changelog: add CVEs as first class citizens | linux (Ubuntu) | High | Fix Released | ||
1604344 | changelog: add CVEs as first class citizens | linux (Ubuntu Precise) | High | Fix Released | ||
1604344 | changelog: add CVEs as first class citizens | linux (Ubuntu Vivid) | High | Fix Released | ||
1604344 | changelog: add CVEs as first class citizens | linux (Ubuntu Xenial) | High | Fix Released | ||
1604344 | changelog: add CVEs as first class citizens | linux (Ubuntu Trusty) | High | Fix Released |
Bug #1604443: linux: 4.4.0-32.51 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1604443 | linux: 4.4.0-32.51 -proposed tracker | linux (Ubuntu) | Undecided | Fix Released | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Incomplete | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Confirmed | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Confirmed | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1604443 | linux: 4.4.0-32.51 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Confirmed |
Bug #1604457: linux-raspi2: 4.4.0-1018.24 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | linux-raspi2 (Ubuntu) | Undecided | Fix Released | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | linux-raspi2 (Ubuntu Xenial) | Medium | Fix Released | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Confirmed | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Confirmed | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Confirmed | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | New | ||
1604457 | linux-raspi2: 4.4.0-1018.24 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Confirmed |
Bug #1604458: linux-snapdragon: 4.4.0-1021.24 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | linux-snapdragon (Ubuntu) | Undecided | Fix Released | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | linux-snapdragon (Ubuntu Xenial) | Medium | Fix Released | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Confirmed | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Confirmed | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | New | ||
1604458 | linux-snapdragon: 4.4.0-1021.24 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Confirmed |
Bug #1604830: Drop superseded namespace mount patches
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1604830 | Drop superseded namespace mount patches | linux-snapdragon (Ubuntu) | Undecided | Fix Released | ||
1604830 | Drop superseded namespace mount patches | linux-raspi2 (Ubuntu) | Undecided | Fix Released | ||
1604830 | Drop superseded namespace mount patches | linux-raspi2 (Ubuntu Xenial) | High | Fix Released | ||
1604830 | Drop superseded namespace mount patches | linux-snapdragon (Ubuntu Xenial) | High | Fix Released |
Bug #1605709: linux: 4.4.0-33.52 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1605709 | linux: 4.4.0-33.52 -proposed tracker | linux (Ubuntu) | Undecided | Fix Released | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Incomplete | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Confirmed | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Confirmed | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1605709 | linux: 4.4.0-33.52 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Confirmed |
Bug #1605715: linux-raspi2: 4.4.0-1019.25 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | linux-raspi2 (Ubuntu) | Undecided | Fix Released | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | linux-raspi2 (Ubuntu Xenial) | Medium | Fix Released | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Confirmed | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Confirmed | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | New | ||
1605715 | linux-raspi2: 4.4.0-1019.25 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Confirmed |
Bug #1605716: linux-snapdragon: 4.4.0-1022.25 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | linux-snapdragon (Ubuntu) | Undecided | Fix Released | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | linux-snapdragon (Ubuntu Xenial) | Medium | Fix Released | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Confirmed | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Confirmed | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | New | ||
1605716 | linux-snapdragon: 4.4.0-1022.25 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Confirmed |
Bug #1606147: [APL][SAUCE] Slow system response time due to a monitor bug
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1606147 | [APL][SAUCE] Slow system response time due to a monitor bug | linux (Ubuntu) | High | Fix Released | ||
1606147 | [APL][SAUCE] Slow system response time due to a monitor bug | HWE Next | Undecided | Fix Released | ||
1606147 | [APL][SAUCE] Slow system response time due to a monitor bug | linux (Ubuntu Xenial) | High | Fix Released |
Bug #1606960: linux: 4.4.0-34.53 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1606960 | linux: 4.4.0-34.53 -proposed tracker | linux (Ubuntu) | Undecided | Fix Released | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1606960 | linux: 4.4.0-34.53 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1606965: linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | linux-lts-xenial (Ubuntu) | Undecided | Invalid | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | linux-lts-xenial (Ubuntu Trusty) | Medium | Fix Released | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1606965 | linux-lts-xenial: 4.4.0-34.53~14.04.1 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
See the
CVE page on Mitre.org
for more details.