The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lt
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importan
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux
utopic has seen the end of its life and is no longer receiving any
updates. Marking the utopic task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
utopic has seen the end of its life and is no longer receiving any
updates. Marking the utopic task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Pac
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1349804
Title:
CVE-2014-5077
Status in linux package in
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importan
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1349804
Title:
CVE-2014-5077
Status in linux
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided =>
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Unde
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-ec
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Pac
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packag
** Also affects: linux (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2 (Ubu
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
utopic, vivid are not affected according to http://people.canonical.com
/~ubuntu-security/cve/2014/CVE-2014-5077.html
** Changed in: linux (Ubuntu Utopic)
Status: Fix Committed => Invalid
** Changed in: linux (Ubuntu Vivid)
Status: Fix Committed => Invalid
** Changed in: linux-lts-
** Also affects: linux (Ubuntu Vivid)
Importance: Medium
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1349804
Title:
CVE-2014-5077
Status in “l
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1349804
Title:
CVE-2014-5077
Status in “linux” package in Ubuntu:
This bug was fixed in the package linux - 3.13.0-36.63
---
linux (3.13.0-36.63) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1365052
[ Feng Kan ]
* SAUCE: (no-up) irqchip:gic: change access of gicc_ctrl register to read
modify write.
-
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1349804
Title:
CVE-2014-5077
Status in
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1349804
Title:
CVE-2014-5077
Status in “linux” package in Ubuntu:
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1349804
Title:
CVE-2014-5077
Status in “linux” package in Ubuntu:
Fi
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1349804
Title:
CVE-2014-5077
Status in “linux” package i
This bug was fixed in the package linux-armadaxp - 3.2.0-1637.54
---
linux-armadaxp (3.2.0-1637.54) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1356455
* Rebase to Ubuntu-3.2.0-68.102
[ Ubuntu: 3.2.0-68.102 ]
* Release Tracking Bug
- LP: #1355
This bug was fixed in the package linux-armadaxp - 3.2.0-1637.54
---
linux-armadaxp (3.2.0-1637.54) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1356455
* Rebase to Ubuntu-3.2.0-68.102
[ Ubuntu: 3.2.0-68.102 ]
* Release Tracking Bug
- LP: #1355
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1452.72
---
linux-ti-omap4 (3.2.0-1452.72) precise; urgency=low
* Release Tracking Bug
- LP: #1356452
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-68.102
[ Ubuntu: 3.2.0-68.102 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux - 3.2.0-68.102
---
linux (3.2.0-68.102) precise; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1355387
[ Joseph Salisbury ]
* [Config] updateconfigs after Linux 3.2.62 update
[ Upstream Kernel Changes ]
* Re
This bug was fixed in the package linux-ec2 - 2.6.32-369.85
---
linux-ec2 (2.6.32-369.85) lucid; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-65.129
* Rebased to Ubuntu-2.6.32-65.131
* Release Tracking Bug
- LP: #1357410
[ Upstream Kernel Changes ]
* xen:
This bug was fixed in the package linux - 2.6.32-65.131
---
linux (2.6.32-65.131) lucid; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1357394
[ Upstream Kernel Changes ]
* x86_32, entry: Store badsys error code in %eax
- LP: #1334989
- CVE-2014
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a me
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
** Description changed:
- net: SCTP: NULL pointer dereference
+ The sctp_assoc_update function in net/sctp/associola.c in the Linux
+ kernel through 3.15.8, when SCTP authentication is enabled, allows
+ remote attackers to c
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: New => Fix Committed
** Description changed:
net: SCTP: NULL pointer dereference
+
+ Break-Fix: - 1be9a950c646c9092fb3618197f7b6bfb50e82aa
--
You received this bug no
CVE-2014-5077
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affec
37 matches
Mail list logo