CVE 2015-5307
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
Related bugs and status
CVE-2015-5307 (Candidate) is related to these bugs:
Bug #1513540: CVE-2015-5307
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1513540 | CVE-2015-5307 | linux (Ubuntu) | High | Fix Released | ||
1513540 | CVE-2015-5307 | linux-fsl-imx51 (Ubuntu) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-mvl-dove (Ubuntu) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-backport-maverick (Ubuntu) | Undecided | New | ||
1513540 | CVE-2015-5307 | linux-lts-backport-natty (Ubuntu) | Undecided | New | ||
1513540 | CVE-2015-5307 | linux-ti-omap4 (Ubuntu) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-ec2 (Ubuntu) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux (Ubuntu Xenial) | High | Fix Released | ||
1513540 | CVE-2015-5307 | linux-ec2 (Ubuntu Xenial) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-fsl-imx51 (Ubuntu Xenial) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-backport-maverick (Ubuntu Xenial) | Undecided | New | ||
1513540 | CVE-2015-5307 | linux-lts-backport-natty (Ubuntu Xenial) | Undecided | New | ||
1513540 | CVE-2015-5307 | linux-mvl-dove (Ubuntu Xenial) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-ti-omap4 (Ubuntu Xenial) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux (Ubuntu Wily) | High | Fix Released | ||
1513540 | CVE-2015-5307 | linux-ec2 (Ubuntu Wily) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-fsl-imx51 (Ubuntu Wily) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-backport-maverick (Ubuntu Wily) | Undecided | New | ||
1513540 | CVE-2015-5307 | linux-lts-backport-natty (Ubuntu Wily) | Undecided | New | ||
1513540 | CVE-2015-5307 | linux-mvl-dove (Ubuntu Wily) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-ti-omap4 (Ubuntu Wily) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux (Ubuntu Vivid) | High | Fix Released | ||
1513540 | CVE-2015-5307 | linux-ec2 (Ubuntu Vivid) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-fsl-imx51 (Ubuntu Vivid) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-backport-maverick (Ubuntu Vivid) | Undecided | New | ||
1513540 | CVE-2015-5307 | linux-lts-backport-natty (Ubuntu Vivid) | Undecided | New | ||
1513540 | CVE-2015-5307 | linux-mvl-dove (Ubuntu Vivid) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-ti-omap4 (Ubuntu Vivid) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux (Ubuntu Trusty) | High | Fix Released | ||
1513540 | CVE-2015-5307 | linux-ec2 (Ubuntu Trusty) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-fsl-imx51 (Ubuntu Trusty) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-backport-maverick (Ubuntu Trusty) | Undecided | New | ||
1513540 | CVE-2015-5307 | linux-lts-backport-natty (Ubuntu Trusty) | Undecided | New | ||
1513540 | CVE-2015-5307 | linux-mvl-dove (Ubuntu Trusty) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-ti-omap4 (Ubuntu Trusty) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux (Ubuntu Precise) | High | Fix Released | ||
1513540 | CVE-2015-5307 | linux-ec2 (Ubuntu Precise) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-fsl-imx51 (Ubuntu Precise) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-backport-maverick (Ubuntu Precise) | Undecided | Won't Fix | ||
1513540 | CVE-2015-5307 | linux-lts-backport-natty (Ubuntu Precise) | Undecided | Won't Fix | ||
1513540 | CVE-2015-5307 | linux-mvl-dove (Ubuntu Precise) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-ti-omap4 (Ubuntu Precise) | High | Fix Released | ||
1513540 | CVE-2015-5307 | linux-lts-trusty (Ubuntu) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-trusty (Ubuntu Precise) | High | Fix Released | ||
1513540 | CVE-2015-5307 | linux-lts-trusty (Ubuntu Trusty) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-trusty (Ubuntu Vivid) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-trusty (Ubuntu Wily) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-trusty (Ubuntu Xenial) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-armadaxp (Ubuntu) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-armadaxp (Ubuntu Precise) | High | Fix Released | ||
1513540 | CVE-2015-5307 | linux-armadaxp (Ubuntu Trusty) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-armadaxp (Ubuntu Vivid) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-armadaxp (Ubuntu Wily) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-armadaxp (Ubuntu Xenial) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-wily (Ubuntu) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-wily (Ubuntu Precise) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-wily (Ubuntu Trusty) | High | Fix Released | ||
1513540 | CVE-2015-5307 | linux-lts-wily (Ubuntu Vivid) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-wily (Ubuntu Wily) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-wily (Ubuntu Xenial) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-goldfish (Ubuntu) | High | New | ||
1513540 | CVE-2015-5307 | linux-goldfish (Ubuntu Precise) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-goldfish (Ubuntu Trusty) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-goldfish (Ubuntu Vivid) | High | Won't Fix | ||
1513540 | CVE-2015-5307 | linux-goldfish (Ubuntu Wily) | High | New | ||
1513540 | CVE-2015-5307 | linux-goldfish (Ubuntu Xenial) | High | New | ||
1513540 | CVE-2015-5307 | linux-lts-saucy (Ubuntu) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-saucy (Ubuntu Precise) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-saucy (Ubuntu Trusty) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-saucy (Ubuntu Vivid) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-saucy (Ubuntu Wily) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-saucy (Ubuntu Xenial) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-quantal (Ubuntu) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-quantal (Ubuntu Precise) | High | Invalid | ||
1513540 | CVE-2015-5307 | linux-lts-quantal (Ubuntu Trusty) | High | Invalid |
Bug #1514759: Security vulnerability: update kernel packages on Ubuntu slaves (USN-2800-1 and related)
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1514759 | Security vulnerability: update kernel packages on Ubuntu slaves (USN-2800-1 and related) | Mirantis OpenStack | High | Invalid | ||
1514759 | Security vulnerability: update kernel packages on Ubuntu slaves (USN-2800-1 and related) | Mirantis OpenStack 7.0.x | High | Invalid | ||
1514759 | Security vulnerability: update kernel packages on Ubuntu slaves (USN-2800-1 and related) | Mirantis OpenStack 6.0.x | High | Won't Fix | ||
1514759 | Security vulnerability: update kernel packages on Ubuntu slaves (USN-2800-1 and related) | Mirantis OpenStack 5.1.x | High | Won't Fix | ||
1514759 | Security vulnerability: update kernel packages on Ubuntu slaves (USN-2800-1 and related) | Mirantis OpenStack 8.0.x | High | Invalid | ||
1514759 | Security vulnerability: update kernel packages on Ubuntu slaves (USN-2800-1 and related) | Mirantis OpenStack 6.1.x | High | Won't Fix |
Bug #1514962: linux-ti-omap4: 3.2.0-1474.96 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | Kernel SRU Workflow | Medium | Invalid | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | New | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | New | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | New | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | New | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Invalid | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Invalid | ||
1514962 | linux-ti-omap4: 3.2.0-1474.96 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | New |
Bug #1515537: linux-raspi2: 4.2.0-1015.22 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | linux-raspi2 (Ubuntu) | Undecided | Invalid | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | linux-raspi2 (Ubuntu Wily) | Undecided | Fix Released | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Invalid | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Invalid | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Fix Released | ||
1515537 | linux-raspi2: 4.2.0-1015.22 -proposed tracker | Kernel SRU Workflow verification-testing | Undecided | Fix Released |
Bug #1520184: CVE-2015-8104
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1520184 | CVE-2015-8104 | linux (Ubuntu) | Medium | Fix Released | ||
1520184 | CVE-2015-8104 | linux-fsl-imx51 (Ubuntu) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-mvl-dove (Ubuntu) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-backport-maverick (Ubuntu) | Undecided | New | ||
1520184 | CVE-2015-8104 | linux-lts-backport-natty (Ubuntu) | Undecided | New | ||
1520184 | CVE-2015-8104 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-ec2 (Ubuntu) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux (Ubuntu Xenial) | Medium | Fix Committed | ||
1520184 | CVE-2015-8104 | linux-ec2 (Ubuntu Xenial) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-fsl-imx51 (Ubuntu Xenial) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-backport-maverick (Ubuntu Xenial) | Undecided | New | ||
1520184 | CVE-2015-8104 | linux-lts-backport-natty (Ubuntu Xenial) | Undecided | New | ||
1520184 | CVE-2015-8104 | linux-mvl-dove (Ubuntu Xenial) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-ti-omap4 (Ubuntu Xenial) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux (Ubuntu Wily) | Medium | Fix Released | ||
1520184 | CVE-2015-8104 | linux-ec2 (Ubuntu Wily) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-fsl-imx51 (Ubuntu Wily) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-backport-maverick (Ubuntu Wily) | Undecided | New | ||
1520184 | CVE-2015-8104 | linux-lts-backport-natty (Ubuntu Wily) | Undecided | New | ||
1520184 | CVE-2015-8104 | linux-mvl-dove (Ubuntu Wily) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux (Ubuntu Vivid) | Medium | Fix Released | ||
1520184 | CVE-2015-8104 | linux-ec2 (Ubuntu Vivid) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-fsl-imx51 (Ubuntu Vivid) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-backport-maverick (Ubuntu Vivid) | Undecided | New | ||
1520184 | CVE-2015-8104 | linux-lts-backport-natty (Ubuntu Vivid) | Undecided | New | ||
1520184 | CVE-2015-8104 | linux-mvl-dove (Ubuntu Vivid) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-ti-omap4 (Ubuntu Vivid) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1520184 | CVE-2015-8104 | linux-ec2 (Ubuntu Trusty) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-fsl-imx51 (Ubuntu Trusty) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-backport-maverick (Ubuntu Trusty) | Undecided | New | ||
1520184 | CVE-2015-8104 | linux-lts-backport-natty (Ubuntu Trusty) | Undecided | New | ||
1520184 | CVE-2015-8104 | linux-mvl-dove (Ubuntu Trusty) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux (Ubuntu Precise) | Medium | Fix Released | ||
1520184 | CVE-2015-8104 | linux-ec2 (Ubuntu Precise) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-fsl-imx51 (Ubuntu Precise) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-backport-maverick (Ubuntu Precise) | Undecided | Won't Fix | ||
1520184 | CVE-2015-8104 | linux-lts-backport-natty (Ubuntu Precise) | Undecided | Won't Fix | ||
1520184 | CVE-2015-8104 | linux-mvl-dove (Ubuntu Precise) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1520184 | CVE-2015-8104 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1520184 | CVE-2015-8104 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-trusty (Ubuntu Vivid) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-trusty (Ubuntu Xenial) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1520184 | CVE-2015-8104 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-armadaxp (Ubuntu Vivid) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-armadaxp (Ubuntu Xenial) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-wily (Ubuntu) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-wily (Ubuntu Precise) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-wily (Ubuntu Trusty) | Medium | Fix Released | ||
1520184 | CVE-2015-8104 | linux-lts-wily (Ubuntu Vivid) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-wily (Ubuntu Wily) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-wily (Ubuntu Xenial) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-goldfish (Ubuntu) | Medium | New | ||
1520184 | CVE-2015-8104 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-goldfish (Ubuntu Vivid) | Medium | New | ||
1520184 | CVE-2015-8104 | linux-goldfish (Ubuntu Wily) | Medium | New | ||
1520184 | CVE-2015-8104 | linux-goldfish (Ubuntu Xenial) | Medium | New | ||
1520184 | CVE-2015-8104 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-saucy (Ubuntu Precise) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-saucy (Ubuntu Trusty) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-saucy (Ubuntu Vivid) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-saucy (Ubuntu Wily) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-saucy (Ubuntu Xenial) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-quantal (Ubuntu Precise) | Medium | Invalid | ||
1520184 | CVE-2015-8104 | linux-lts-quantal (Ubuntu Trusty) | Medium | Invalid |
Bug #1521445: linux-ti-omap4: 3.2.0-1475.97 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Fix Released | ||
1521445 | linux-ti-omap4: 3.2.0-1475.97 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1521448: linux-armadaxp: 3.2.0-1660.84 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Invalid | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Invalid | ||
1521448 | linux-armadaxp: 3.2.0-1660.84 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1538115: virtualbox SRU for CVEs
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1538115 | virtualbox SRU for CVEs | virtualbox (Ubuntu) | Medium | Fix Released |
Bug #1671760: Xen HVM guests running linux 4.10 fail to boot on Intel hosts
Bug #1671864: Xen stable update to 4.6.5
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1671864 | Xen stable update to 4.6.5 | xen (Ubuntu) | Medium | Invalid | ||
1671864 | Xen stable update to 4.6.5 | xen (Ubuntu Xenial) | Medium | Fix Released |
See the
CVE page on Mitre.org
for more details.