CVE 2016-3137
drivers/
Related bugs and status
CVE-2016-3137 (Candidate) is related to these bugs:
Bug #661306: dangling symlinks in linux-doc package
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
661306 | dangling symlinks in linux-doc package | linux (Ubuntu) | Undecided | Fix Released | ||
661306 | dangling symlinks in linux-doc package | linux (Ubuntu Utopic) | Undecided | Fix Released | ||
661306 | dangling symlinks in linux-doc package | linux (Ubuntu Trusty) | Undecided | Fix Released | ||
661306 | dangling symlinks in linux-doc package | linux (Ubuntu Precise) | Undecided | Fix Released | ||
661306 | dangling symlinks in linux-doc package | linux (Ubuntu Vivid) | Undecided | Fix Released | ||
661306 | dangling symlinks in linux-doc package | linux (Ubuntu Lucid) | Undecided | Fix Released |
Bug #1505948: Memory arena corruption with FUSE (was Memory allocation failure crashes kernel hard, presumably related to FUSE)
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1505948 | Memory arena corruption with FUSE (was Memory allocation failure crashes kernel hard, presumably related to FUSE) | linux (Ubuntu) | High | Fix Released | ||
1505948 | Memory arena corruption with FUSE (was Memory allocation failure crashes kernel hard, presumably related to FUSE) | linux (Ubuntu Wily) | High | Fix Released | ||
1505948 | Memory arena corruption with FUSE (was Memory allocation failure crashes kernel hard, presumably related to FUSE) | linux (Fedora) | Critical | Won't Fix | ||
1505948 | Memory arena corruption with FUSE (was Memory allocation failure crashes kernel hard, presumably related to FUSE) | linux (Ubuntu Xenial) | High | Fix Released |
Bug #1528466: Mellanox ConnectX4 MTU limits: max and min
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1528466 | Mellanox ConnectX4 MTU limits: max and min | linux (Ubuntu) | Medium | Fix Released | ||
1528466 | Mellanox ConnectX4 MTU limits: max and min | linux (Ubuntu Wily) | Medium | Fix Released | ||
1528466 | Mellanox ConnectX4 MTU limits: max and min | linux-lts-wily (Ubuntu) | Medium | Fix Released | ||
1528466 | Mellanox ConnectX4 MTU limits: max and min | linux (Ubuntu Xenial) | Undecided | Fix Released |
Bug #1542944: QCA9565 / AR9565 bluetooth not work
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1542944 | QCA9565 / AR9565 bluetooth not work | linux-lts-wily (Ubuntu) | Medium | Fix Released | ||
1542944 | QCA9565 / AR9565 bluetooth not work | linux-firmware (Ubuntu) | Medium | Fix Released |
Bug #1546694: Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565)
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1546694 | Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565) | linux (Ubuntu) | Medium | Fix Released | ||
1546694 | Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565) | linux (Ubuntu Xenial) | Undecided | Fix Released | ||
1546694 | Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565) | linux (Ubuntu Vivid) | Undecided | Fix Released | ||
1546694 | Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565) | linux (Ubuntu Trusty) | Undecided | Fix Released | ||
1546694 | Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565) | linux (Ubuntu Wily) | Undecided | Fix Released |
Bug #1547231: /proc/$pid/maps performance regression
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1547231 | /proc/$pid/maps performance regression | linux (Ubuntu) | Medium | Fix Released | ||
1547231 | /proc/$pid/maps performance regression | linux (Ubuntu Trusty) | Medium | Triaged | ||
1547231 | /proc/$pid/maps performance regression | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1547231 | /proc/$pid/maps performance regression | linux (Ubuntu Vivid) | Undecided | Fix Released | ||
1547231 | /proc/$pid/maps performance regression | linux (Ubuntu Wily) | Undecided | Fix Released |
Bug #1553811: Thinkpad T460: Trackpoint mouse buttons instantly generate "release" event on press
Bug #1556264: [Hyper-V] vmbus: Fix a bug in hv_need_to_signal_on_read()
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1556264 | [Hyper-V] vmbus: Fix a bug in hv_need_to_signal_on_read() | linux (Ubuntu) | High | Fix Released | ||
1556264 | [Hyper-V] vmbus: Fix a bug in hv_need_to_signal_on_read() | linux (Ubuntu Wily) | High | Fix Released | ||
1556264 | [Hyper-V] vmbus: Fix a bug in hv_need_to_signal_on_read() | linux (Ubuntu Xenial) | High | Fix Released | ||
1556264 | [Hyper-V] vmbus: Fix a bug in hv_need_to_signal_on_read() | linux (Ubuntu Trusty) | High | Fix Released | ||
1556264 | [Hyper-V] vmbus: Fix a bug in hv_need_to_signal_on_read() | linux-lts-vivid (Ubuntu) | High | Fix Committed | ||
1556264 | [Hyper-V] vmbus: Fix a bug in hv_need_to_signal_on_read() | linux-lts-vivid (Ubuntu Trusty) | High | Fix Released |
Bug #1556878: CVE-2016-3137
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1556878 | CVE-2016-3137 | linux (Ubuntu) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-ti-omap4 (Ubuntu) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-raspi2 (Ubuntu) | Low | New | ||
1556878 | CVE-2016-3137 | linux (Ubuntu Xenial) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-raspi2 (Ubuntu Xenial) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-ti-omap4 (Ubuntu Xenial) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux (Ubuntu Wily) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-raspi2 (Ubuntu Wily) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-ti-omap4 (Ubuntu Wily) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux (Ubuntu Vivid) | Undecided | Won't Fix | ||
1556878 | CVE-2016-3137 | linux-raspi2 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1556878 | CVE-2016-3137 | linux-ti-omap4 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1556878 | CVE-2016-3137 | linux (Ubuntu Trusty) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-raspi2 (Ubuntu Trusty) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-ti-omap4 (Ubuntu Trusty) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux (Ubuntu Precise) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-raspi2 (Ubuntu Precise) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-ti-omap4 (Ubuntu Precise) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-lts-trusty (Ubuntu) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-trusty (Ubuntu Precise) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-lts-trusty (Ubuntu Trusty) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-trusty (Ubuntu Vivid) | Undecided | Won't Fix | ||
1556878 | CVE-2016-3137 | linux-lts-trusty (Ubuntu Wily) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-trusty (Ubuntu Xenial) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-armadaxp (Ubuntu) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-armadaxp (Ubuntu Precise) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-armadaxp (Ubuntu Trusty) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-armadaxp (Ubuntu Vivid) | Undecided | Won't Fix | ||
1556878 | CVE-2016-3137 | linux-armadaxp (Ubuntu Wily) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-armadaxp (Ubuntu Xenial) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-xenial (Ubuntu) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-xenial (Ubuntu Precise) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-xenial (Ubuntu Trusty) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-lts-xenial (Ubuntu Vivid) | Undecided | New | ||
1556878 | CVE-2016-3137 | linux-lts-xenial (Ubuntu Wily) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-xenial (Ubuntu Xenial) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-wily (Ubuntu) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-wily (Ubuntu Precise) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-wily (Ubuntu Trusty) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-lts-wily (Ubuntu Vivid) | Undecided | New | ||
1556878 | CVE-2016-3137 | linux-lts-wily (Ubuntu Wily) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-wily (Ubuntu Xenial) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-goldfish (Ubuntu) | Low | New | ||
1556878 | CVE-2016-3137 | linux-goldfish (Ubuntu Precise) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-goldfish (Ubuntu Trusty) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-goldfish (Ubuntu Vivid) | Undecided | New | ||
1556878 | CVE-2016-3137 | linux-goldfish (Ubuntu Wily) | Low | New | ||
1556878 | CVE-2016-3137 | linux-goldfish (Ubuntu Xenial) | Low | New | ||
1556878 | CVE-2016-3137 | linux-lts-saucy (Ubuntu) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-saucy (Ubuntu Precise) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-saucy (Ubuntu Trusty) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-saucy (Ubuntu Vivid) | Undecided | Won't Fix | ||
1556878 | CVE-2016-3137 | linux-lts-saucy (Ubuntu Wily) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-saucy (Ubuntu Xenial) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-quantal (Ubuntu) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-quantal (Ubuntu Precise) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-quantal (Ubuntu Trusty) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-quantal (Ubuntu Vivid) | Undecided | Won't Fix | ||
1556878 | CVE-2016-3137 | linux-lts-quantal (Ubuntu Wily) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-quantal (Ubuntu Xenial) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-vivid (Ubuntu) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-vivid (Ubuntu Precise) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-vivid (Ubuntu Trusty) | Low | Fix Released | ||
1556878 | CVE-2016-3137 | linux-lts-vivid (Ubuntu Vivid) | Undecided | Won't Fix | ||
1556878 | CVE-2016-3137 | linux-lts-vivid (Ubuntu Wily) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-vivid (Ubuntu Xenial) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-mako (Ubuntu) | Low | New | ||
1556878 | CVE-2016-3137 | linux-mako (Ubuntu Precise) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-mako (Ubuntu Trusty) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-mako (Ubuntu Vivid) | Undecided | Won't Fix | ||
1556878 | CVE-2016-3137 | linux-mako (Ubuntu Wily) | Low | New | ||
1556878 | CVE-2016-3137 | linux-mako (Ubuntu Xenial) | Low | New | ||
1556878 | CVE-2016-3137 | linux-lts-utopic (Ubuntu) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-utopic (Ubuntu Precise) | Low | Invalid | ||
1556878 | CVE-2016-3137 | linux-lts-utopic (Ubuntu Trusty) | Low | Fix Released |
Bug #1558847: CVE-2016-3156
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1558847 | CVE-2016-3156 | linux (Ubuntu) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-raspi2 (Ubuntu) | Medium | New | ||
1558847 | CVE-2016-3156 | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-raspi2 (Ubuntu Xenial) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-ti-omap4 (Ubuntu Xenial) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux (Ubuntu Wily) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-raspi2 (Ubuntu Wily) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux (Ubuntu Vivid) | Undecided | Won't Fix | ||
1558847 | CVE-2016-3156 | linux-raspi2 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1558847 | CVE-2016-3156 | linux-ti-omap4 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1558847 | CVE-2016-3156 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-raspi2 (Ubuntu Trusty) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux (Ubuntu Precise) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-raspi2 (Ubuntu Precise) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-trusty (Ubuntu Vivid) | Undecided | Won't Fix | ||
1558847 | CVE-2016-3156 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-trusty (Ubuntu Xenial) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-armadaxp (Ubuntu Vivid) | Undecided | Won't Fix | ||
1558847 | CVE-2016-3156 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-armadaxp (Ubuntu Xenial) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-xenial (Ubuntu) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-xenial (Ubuntu Precise) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-xenial (Ubuntu Trusty) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-lts-xenial (Ubuntu Vivid) | Undecided | New | ||
1558847 | CVE-2016-3156 | linux-lts-xenial (Ubuntu Wily) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-xenial (Ubuntu Xenial) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-wily (Ubuntu) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-wily (Ubuntu Precise) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-wily (Ubuntu Trusty) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-lts-wily (Ubuntu Vivid) | Undecided | New | ||
1558847 | CVE-2016-3156 | linux-lts-wily (Ubuntu Wily) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-wily (Ubuntu Xenial) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-goldfish (Ubuntu) | Medium | New | ||
1558847 | CVE-2016-3156 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-goldfish (Ubuntu Vivid) | Undecided | New | ||
1558847 | CVE-2016-3156 | linux-goldfish (Ubuntu Wily) | Medium | New | ||
1558847 | CVE-2016-3156 | linux-goldfish (Ubuntu Xenial) | Medium | New | ||
1558847 | CVE-2016-3156 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-saucy (Ubuntu Precise) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-saucy (Ubuntu Trusty) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-saucy (Ubuntu Vivid) | Undecided | Won't Fix | ||
1558847 | CVE-2016-3156 | linux-lts-saucy (Ubuntu Wily) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-saucy (Ubuntu Xenial) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-quantal (Ubuntu Precise) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-quantal (Ubuntu Trusty) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-quantal (Ubuntu Vivid) | Undecided | Won't Fix | ||
1558847 | CVE-2016-3156 | linux-lts-quantal (Ubuntu Wily) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-quantal (Ubuntu Xenial) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-vivid (Ubuntu) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-vivid (Ubuntu Precise) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-vivid (Ubuntu Trusty) | Medium | Fix Released | ||
1558847 | CVE-2016-3156 | linux-lts-vivid (Ubuntu Vivid) | Undecided | Won't Fix | ||
1558847 | CVE-2016-3156 | linux-lts-vivid (Ubuntu Wily) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-vivid (Ubuntu Xenial) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-mako (Ubuntu) | Medium | New | ||
1558847 | CVE-2016-3156 | linux-mako (Ubuntu Precise) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-mako (Ubuntu Trusty) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-mako (Ubuntu Vivid) | Undecided | Won't Fix | ||
1558847 | CVE-2016-3156 | linux-mako (Ubuntu Wily) | Medium | New | ||
1558847 | CVE-2016-3156 | linux-mako (Ubuntu Xenial) | Medium | New | ||
1558847 | CVE-2016-3156 | linux-lts-utopic (Ubuntu) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-utopic (Ubuntu Precise) | Medium | Invalid | ||
1558847 | CVE-2016-3156 | linux-lts-utopic (Ubuntu Trusty) | Medium | Fix Released |
Bug #1559918: [Bug]SKL-H boot hang when c8+c9+c10 enabled by intel_idle driver
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1559918 | [Bug]SKL-H boot hang when c8+c9+c10 enabled by intel_idle driver | intel | Undecided | Fix Released | ||
1559918 | [Bug]SKL-H boot hang when c8+c9+c10 enabled by intel_idle driver | linux (Ubuntu) | Undecided | Fix Released | ||
1559918 | [Bug]SKL-H boot hang when c8+c9+c10 enabled by intel_idle driver | linux (Ubuntu Xenial) | Undecided | Fix Released | ||
1559918 | [Bug]SKL-H boot hang when c8+c9+c10 enabled by intel_idle driver | linux (Ubuntu Wily) | Undecided | Fix Released | ||
1559918 | [Bug]SKL-H boot hang when c8+c9+c10 enabled by intel_idle driver | HWE Next | Undecided | Fix Released |
Bug #1559923: [Bug]Lenovo Yoga 260 and Carbon X1 4th gen freeze on HWP enable
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1559923 | [Bug]Lenovo Yoga 260 and Carbon X1 4th gen freeze on HWP enable | intel | Undecided | Fix Released | ||
1559923 | [Bug]Lenovo Yoga 260 and Carbon X1 4th gen freeze on HWP enable | linux (Ubuntu) | High | Fix Released | ||
1559923 | [Bug]Lenovo Yoga 260 and Carbon X1 4th gen freeze on HWP enable | linux (Ubuntu Wily) | Undecided | Fix Released | ||
1559923 | [Bug]Lenovo Yoga 260 and Carbon X1 4th gen freeze on HWP enable | linux (Ubuntu Xenial) | High | Fix Released | ||
1559923 | [Bug]Lenovo Yoga 260 and Carbon X1 4th gen freeze on HWP enable | linux (Ubuntu Vivid) | Undecided | Fix Released |
Bug #1559929: [Bug]Avoid PCI BAR setup warning on Broadwell-EP boot
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1559929 | [Bug]Avoid PCI BAR setup warning on Broadwell-EP boot | intel | Undecided | Fix Released | ||
1559929 | [Bug]Avoid PCI BAR setup warning on Broadwell-EP boot | linux (Ubuntu) | Undecided | Fix Released | ||
1559929 | [Bug]Avoid PCI BAR setup warning on Broadwell-EP boot | linux (Ubuntu Xenial) | Undecided | Fix Committed | ||
1559929 | [Bug]Avoid PCI BAR setup warning on Broadwell-EP boot | linux (Ubuntu Wily) | Undecided | Fix Released | ||
1559929 | [Bug]Avoid PCI BAR setup warning on Broadwell-EP boot | linux (Ubuntu Vivid) | Undecided | Fix Released |
Bug #1560835: Enable multitouch function on precision touchpad for Vivid
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1560835 | Enable multitouch function on precision touchpad for Vivid | linux (Ubuntu) | Undecided | Fix Released | ||
1560835 | Enable multitouch function on precision touchpad for Vivid | HWE Next | Undecided | Fix Released | ||
1560835 | Enable multitouch function on precision touchpad for Vivid | linux (Ubuntu Xenial) | Undecided | Fix Released | ||
1560835 | Enable multitouch function on precision touchpad for Vivid | linux (Ubuntu Wily) | Undecided | Won't Fix | ||
1560835 | Enable multitouch function on precision touchpad for Vivid | linux (Ubuntu Vivid) | Undecided | Fix Released |
Bug #1556562: VIA C7-D machine "kernel NULL pointer dereference" in skcipher_recvmsg_async
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1556562 | VIA C7-D machine "kernel NULL pointer dereference" in skcipher_recvmsg_async | linux (Ubuntu) | Critical | Fix Released | ||
1556562 | VIA C7-D machine "kernel NULL pointer dereference" in skcipher_recvmsg_async | linux (Ubuntu Wily) | Critical | Fix Released |
Bug #1561389: CVE-2016-0821
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1561389 | CVE-2016-0821 | linux (Ubuntu) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-raspi2 (Ubuntu) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux (Ubuntu Xenial) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-raspi2 (Ubuntu Xenial) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-ti-omap4 (Ubuntu Xenial) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux (Ubuntu Wily) | Medium | Fix Released | ||
1561389 | CVE-2016-0821 | linux-raspi2 (Ubuntu Wily) | Medium | Fix Released | ||
1561389 | CVE-2016-0821 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux (Ubuntu Vivid) | Undecided | Won't Fix | ||
1561389 | CVE-2016-0821 | linux-raspi2 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1561389 | CVE-2016-0821 | linux-ti-omap4 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1561389 | CVE-2016-0821 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1561389 | CVE-2016-0821 | linux-raspi2 (Ubuntu Trusty) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux (Ubuntu Precise) | Medium | Fix Released | ||
1561389 | CVE-2016-0821 | linux-raspi2 (Ubuntu Precise) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1561389 | CVE-2016-0821 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1561389 | CVE-2016-0821 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-trusty (Ubuntu Vivid) | Undecided | Won't Fix | ||
1561389 | CVE-2016-0821 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-trusty (Ubuntu Xenial) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1561389 | CVE-2016-0821 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-armadaxp (Ubuntu Vivid) | Undecided | Won't Fix | ||
1561389 | CVE-2016-0821 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-armadaxp (Ubuntu Xenial) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-xenial (Ubuntu) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-xenial (Ubuntu Precise) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-xenial (Ubuntu Trusty) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-xenial (Ubuntu Vivid) | Undecided | New | ||
1561389 | CVE-2016-0821 | linux-lts-xenial (Ubuntu Wily) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-xenial (Ubuntu Xenial) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-wily (Ubuntu) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-wily (Ubuntu Precise) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-wily (Ubuntu Trusty) | Medium | Fix Released | ||
1561389 | CVE-2016-0821 | linux-lts-wily (Ubuntu Vivid) | Undecided | New | ||
1561389 | CVE-2016-0821 | linux-lts-wily (Ubuntu Wily) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-wily (Ubuntu Xenial) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-goldfish (Ubuntu) | Medium | New | ||
1561389 | CVE-2016-0821 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-goldfish (Ubuntu Vivid) | Undecided | New | ||
1561389 | CVE-2016-0821 | linux-goldfish (Ubuntu Wily) | Medium | New | ||
1561389 | CVE-2016-0821 | linux-goldfish (Ubuntu Xenial) | Medium | New | ||
1561389 | CVE-2016-0821 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-saucy (Ubuntu Precise) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-saucy (Ubuntu Trusty) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-saucy (Ubuntu Vivid) | Undecided | Won't Fix | ||
1561389 | CVE-2016-0821 | linux-lts-saucy (Ubuntu Wily) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-saucy (Ubuntu Xenial) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-quantal (Ubuntu Precise) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-quantal (Ubuntu Trusty) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-quantal (Ubuntu Vivid) | Undecided | Won't Fix | ||
1561389 | CVE-2016-0821 | linux-lts-quantal (Ubuntu Wily) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-quantal (Ubuntu Xenial) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-vivid (Ubuntu) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-vivid (Ubuntu Precise) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-vivid (Ubuntu Trusty) | Medium | Fix Released | ||
1561389 | CVE-2016-0821 | linux-lts-vivid (Ubuntu Vivid) | Undecided | Won't Fix | ||
1561389 | CVE-2016-0821 | linux-lts-vivid (Ubuntu Wily) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-vivid (Ubuntu Xenial) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-mako (Ubuntu) | Medium | New | ||
1561389 | CVE-2016-0821 | linux-mako (Ubuntu Precise) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-mako (Ubuntu Trusty) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-mako (Ubuntu Vivid) | Undecided | Won't Fix | ||
1561389 | CVE-2016-0821 | linux-mako (Ubuntu Wily) | Medium | New | ||
1561389 | CVE-2016-0821 | linux-mako (Ubuntu Xenial) | Medium | New | ||
1561389 | CVE-2016-0821 | linux-lts-utopic (Ubuntu) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-utopic (Ubuntu Precise) | Medium | Invalid | ||
1561389 | CVE-2016-0821 | linux-lts-utopic (Ubuntu Trusty) | Medium | Fix Released |
Bug #1561677: Wily update to v4.2.8-ckt6 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1561677 | Wily update to v4.2.8-ckt6 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1561677 | Wily update to v4.2.8-ckt6 stable release | linux (Ubuntu Wily) | Undecided | Fix Released |
Bug #1561714: Vivid update to v3.19.8-ckt17 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1561714 | Vivid update to v3.19.8-ckt17 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1561714 | Vivid update to v3.19.8-ckt17 stable release | linux (Ubuntu Vivid) | Undecided | Fix Released |
Bug #1562778: I2C touchscreen init failed on HP X360
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1562778 | I2C touchscreen init failed on HP X360 | linux (Ubuntu) | Medium | Fix Released | ||
1562778 | I2C touchscreen init failed on HP X360 | HWE Next | Undecided | Fix Released | ||
1562778 | I2C touchscreen init failed on HP X360 | linux (Ubuntu Vivid) | Medium | Fix Released | ||
1562778 | I2C touchscreen init failed on HP X360 | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1562778 | I2C touchscreen init failed on HP X360 | linux (Ubuntu Wily) | Medium | Won't Fix |
Bug #1562900: Trusty update to v3.13.11-ckt37 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1562900 | Trusty update to v3.13.11-ckt37 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1562900 | Trusty update to v3.13.11-ckt37 stable release | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1563916: CVE-2016-0774
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1563916 | CVE-2016-0774 | linux (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-raspi2 (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-raspi2 (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-ti-omap4 (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-raspi2 (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-raspi2 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-ti-omap4 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1563916 | CVE-2016-0774 | linux-raspi2 (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux (Ubuntu Precise) | Medium | Fix Released | ||
1563916 | CVE-2016-0774 | linux-raspi2 (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1563916 | CVE-2016-0774 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1563916 | CVE-2016-0774 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-trusty (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-trusty (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1563916 | CVE-2016-0774 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-armadaxp (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-armadaxp (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-xenial (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-xenial (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-xenial (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-xenial (Ubuntu Vivid) | Undecided | New | ||
1563916 | CVE-2016-0774 | linux-lts-xenial (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-xenial (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-wily (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-wily (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-wily (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-wily (Ubuntu Vivid) | Undecided | New | ||
1563916 | CVE-2016-0774 | linux-lts-wily (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-wily (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-goldfish (Ubuntu) | Medium | New | ||
1563916 | CVE-2016-0774 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-goldfish (Ubuntu Vivid) | Undecided | New | ||
1563916 | CVE-2016-0774 | linux-goldfish (Ubuntu Wily) | Medium | New | ||
1563916 | CVE-2016-0774 | linux-goldfish (Ubuntu Xenial) | Medium | New | ||
1563916 | CVE-2016-0774 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-saucy (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-saucy (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-saucy (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-lts-saucy (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-saucy (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-quantal (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-quantal (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-quantal (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-lts-quantal (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-quantal (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-vivid (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-vivid (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-vivid (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-vivid (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-lts-vivid (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-vivid (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-mako (Ubuntu) | Medium | New | ||
1563916 | CVE-2016-0774 | linux-mako (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-mako (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-mako (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-mako (Ubuntu Wily) | Medium | New | ||
1563916 | CVE-2016-0774 | linux-mako (Ubuntu Xenial) | Medium | New | ||
1563916 | CVE-2016-0774 | linux-lts-utopic (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-utopic (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-utopic (Ubuntu Trusty) | Medium | Invalid |
Bug #1564950: Kernel panic when using CEPHFS (Hammer) /w kernel vivid-lts on Ubuntu 14.04
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1564950 | Kernel panic when using CEPHFS (Hammer) /w kernel vivid-lts on Ubuntu 14.04 | linux (Ubuntu) | Undecided | Fix Released | ||
1564950 | Kernel panic when using CEPHFS (Hammer) /w kernel vivid-lts on Ubuntu 14.04 | linux (Ubuntu Vivid) | Undecided | Fix Released | ||
1564950 | Kernel panic when using CEPHFS (Hammer) /w kernel vivid-lts on Ubuntu 14.04 | linux-lts-vivid (Ubuntu) | Undecided | Fix Released | ||
1564950 | Kernel panic when using CEPHFS (Hammer) /w kernel vivid-lts on Ubuntu 14.04 | linux-lts-utopic (Ubuntu) | Undecided | Fix Released | ||
1564950 | Kernel panic when using CEPHFS (Hammer) /w kernel vivid-lts on Ubuntu 14.04 | linux-lts-utopic (Ubuntu Trusty) | Undecided | Fix Released | ||
1564950 | Kernel panic when using CEPHFS (Hammer) /w kernel vivid-lts on Ubuntu 14.04 | linux-lts-vivid (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1566544: Wily update to v4.2.8-ckt7 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1566544 | Wily update to v4.2.8-ckt7 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1566544 | Wily update to v4.2.8-ckt7 stable release | linux (Ubuntu Wily) | Undecided | Fix Released |
Bug #1566551: Vivid update to v3.19.8-ckt18 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1566551 | Vivid update to v3.19.8-ckt18 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1566551 | Vivid update to v3.19.8-ckt18 stable release | linux (Ubuntu Vivid) | Undecided | Fix Released |
Bug #1567615: Trusty update to v3.13.11-ckt38 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1567615 | Trusty update to v3.13.11-ckt38 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1567615 | Trusty update to v3.13.11-ckt38 stable release | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1571027: Wily update to v4.2.8-ckt8 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1571027 | Wily update to v4.2.8-ckt8 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1571027 | Wily update to v4.2.8-ckt8 stable release | linux (Ubuntu Wily) | Undecided | Fix Released |
Bug #1571034: Vivid update to v3.19.8-ckt19 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1571034 | Vivid update to v3.19.8-ckt19 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1571034 | Vivid update to v3.19.8-ckt19 stable release | linux (Ubuntu Vivid) | Undecided | Fix Released |
Bug #1571041: Trusty update to v3.13.11-ckt39 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1571041 | Trusty update to v3.13.11-ckt39 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1571041 | Trusty update to v3.13.11-ckt39 stable release | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1571667: linux: 4.2.0-36.41 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1571667 | linux: 4.2.0-36.41 -proposed tracker | linux (Ubuntu) | Medium | Invalid | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | linux (Ubuntu Wily) | Medium | Fix Released | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1571667 | linux: 4.2.0-36.41 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1571694: linux: 3.19.0-59.65 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1571694 | linux: 3.19.0-59.65 -proposed tracker | linux (Ubuntu) | Medium | Invalid | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | linux (Ubuntu Vivid) | Medium | Fix Released | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1571694 | linux: 3.19.0-59.65 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1571718: linux: 3.13.0-86.130 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1571718 | linux: 3.13.0-86.130 -proposed tracker | linux (Ubuntu) | Medium | Invalid | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1571718 | linux: 3.13.0-86.130 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1572212: linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | linux-lts-wily (Ubuntu) | Medium | Invalid | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | linux-lts-wily (Ubuntu Trusty) | Medium | Fix Released | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1572212 | linux-lts-wily: 4.2.0-36.41~14.04.1 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1572258: linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | linux-lts-vivid (Ubuntu) | Medium | Invalid | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | linux-lts-vivid (Ubuntu Trusty) | Medium | Fix Released | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1572258 | linux-lts-vivid: 3.19.0-59.65~14.04.1 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1572261: linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1572261 | linux-lts-trusty: 3.13.0-86.130~precise1 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1572759: linux-keystone: 3.13.0-56.81 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | linux-keystone (Ubuntu) | Medium | Invalid | ||
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Invalid | ||
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released | ||
1572759 | linux-keystone: 3.13.0-56.81 -proposed tracker | linux-keystone (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1573242: linux-raspi2: 4.2.0-1029.37 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | linux-raspi2 (Ubuntu) | Medium | Invalid | ||
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | linux-raspi2 (Ubuntu Wily) | Medium | Fix Released | ||
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1573242 | linux-raspi2: 4.2.0-1029.37 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
See the
CVE page on Mitre.org
for more details.