The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lt
** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/1496232
Title:
CVE-2015-6937
Status in li
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Yakkety)
Importance: Low
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-ec
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1496232
Title:
CVE-2015-6937
Status in linux package in
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance:
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1496232
Title:
CVE-2015-6937
Status in linux
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided => Lo
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Undecid
** Also affects: linux (Ubuntu Xenial)
Importance: Low
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (
** Description changed:
- It was discovered that the Reliable Datagram Sockets (RDS)
- implementation in the Linux kernel did not verify sockets were properly
- bound before attempting to send a message, which could cause a NULL
- pointer dereference. An attacker could use this to cause a denial o
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Vivid)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-vivid (Ubuntu
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1472.93
---
linux-ti-omap4 (3.2.0-1472.93) precise; urgency=low
* Release Tracking Bug
- LP: #1503104
[ Luis Henriques ]
* rebased on Ubuntu-3.2.0-92.130
[ Ubuntu: 3.2.0-92.130 ]
* Release Tracking Bug
- LP
This bug was fixed in the package linux-armadaxp - 3.2.0-1657.79
---
linux-armadaxp (3.2.0-1657.79) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1503105
* Rebase to Ubuntu-3.2.0-92.130
[ Ubuntu: 3.2.0-92.130 ]
* Release Tracking Bug
- LP: #1500
This bug was fixed in the package linux-lts-utopic -
3.16.0-51.69~14.04.1
---
linux-lts-utopic (3.16.0-51.69~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1503717
[ Andy Whitcroft ]
* Revert "SAUCE: aufs3: mmap: Fix races in madvise_remov
This bug was fixed in the package linux - 3.2.0-92.130
---
linux (3.2.0-92.130) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1500854
[ dan.street...@canonical.com ]
* [Config] HOTPLUG_PCI_ACPI=y
- LP: #1479031
[ John Johansen ]
* SAUCE: (no
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty
** Description changed:
- Description needed
+ It was discovered that the Reliable Datagram Sockets (RDS)
+ implementation in the Linux kernel did not verify sockets were properly
+ bound before attempting to send a message, which could cause a NULL
+ pointer dereference. An attacker could use thi
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1496232
Title:
CVE-2015-6937
Status in linux package in Ub
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launch
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https:
CVE-2015-6937
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
23 matches
Mail list logo