The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lt
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importan
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armad
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1392820
Title:
CVE-2014-7841
Status in linux package in
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importan
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1392820
Title:
CVE-2014-7841
Status in linux
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided =>
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Unde
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-ec
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packag
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Pac
** Also affects: linux (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2 (Ubu
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
** Changed in: linux (Ubuntu Vivid)
Status: Fix Committed => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Invalid
--
You received this bug notification bec
** Changed in: linux-flo (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-flo (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-flo (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-flo (Ubuntu Trusty)
Importance: Undecided => Medium
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubunt
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubu
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launc
This bug was fixed in the package linux-ec2 - 2.6.32-373.90
---
linux-ec2 (2.6.32-373.90) lucid; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-69.136
* Release Tracking Bug
- LP: #1395971
[ Ubuntu: 2.6.32-69.136 ]
* net: sctp: fix skb_over_panic when receivi
This bug was fixed in the package linux-armadaxp - 3.2.0-1642.60
---
linux-armadaxp (3.2.0-1642.60) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1396189
* Rebase to Ubuntu-3.2.0-73.108
[ Ubuntu: 3.2.0-73.108 ]
* Release Tracking Bug
- LP: #1396
This bug was fixed in the package linux - 2.6.32-69.136
---
linux (2.6.32-69.136) lucid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1395827
[ Upstream Kernel Changes ]
* net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks
- LP: #1386367
This bug was fixed in the package linux - 3.2.0-73.108
---
linux (3.2.0-73.108) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1396072
[ Upstream Kernel Changes ]
* tracing/syscalls: Fix perf syscall tracing when syscall_nr == -1
- LP: #139200
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1457.77
---
linux-ti-omap4 (3.2.0-1457.77) precise; urgency=low
* Release Tracking Bug
- LP: #1396188
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-73.108
[ Ubuntu: 3.2.0-73.108 ]
* Release Tracking Bug
- LP:
** Changed in: linux-lts-trusty (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Importance: Undecided => Medium
** Changed in: linux-lts-trusty (Ubuntu Lucid)
** Description changed:
- net: sctp: NULL pointer dereference in af->from_addr_param on malformed
- packet
+ The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP
+ implementation in the Linux kernel before 3.17.4, when ASCONF is used,
+ allows remote attackers to cause a denial
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1392820
Title:
CVE-2014-7841
Status in “linux” package
** Description changed:
net: sctp: NULL pointer dereference in af->from_addr_param on malformed
packet
- Break-Fix: - e40607cbe270a9e8360907cb1e62ddf0736e4864
+ Break-Fix: d6de3097592b7ae7f8e233a4dafb088e2aa8170f
+ e40607cbe270a9e8360907cb1e62ddf0736e4864
--
You received this bug notifica
** Changed in: linux (Ubuntu Lucid)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1392820
Title:
CVE-2014-7841
Status in “linux” package in
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.
CVE-2014-7841
** Also affects: linux (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects:
34 matches
Mail list logo