** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importan
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1293714
Title:
CVE-2014-0101
To manage notifications about this bug go to:
htt
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importan
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1293714
Title:
CVE-2014-0101
To manage notifications about this bug
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided =>
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Unde
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-ec
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
** Also affects: linux (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2 (Ubu
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
** Changed in: linux-manta (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-manta (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-manta (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-manta (Ubuntu Trusty)
Importance: Undecided =>
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Impo
** Also affects: linux (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2 (
** No longer affects: linux-armadaxp (Ubuntu Saucy)
** No longer affects: linux-ec2 (Ubuntu Saucy)
** No longer affects: linux-lts-saucy (Ubuntu Saucy)
** No longer affects: linux-lts-quantal (Ubuntu Saucy)
** No longer affects: linux-mvl-dove (Ubuntu Saucy)
** No longer affects: linux (Ubuntu
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1293714
Title:
CVE-2014-0101
To manage notifications about th
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1293714
Title:
CVE-2014-0101
To manage notifications about
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubu
** No longer affects: linux-armadaxp (Ubuntu Quantal)
** No longer affects: linux-ec2 (Ubuntu Quantal)
** No longer affects: linux-lts-saucy (Ubuntu Quantal)
** No longer affects: linux-lts-quantal (Ubuntu Quantal)
** No longer affects: linux-mvl-dove (Ubuntu Quantal)
** No longer affects: lin
** Also affects: linux (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects: linux-ec
This bug was fixed in the package linux-ec2 - 2.6.32-363.76
---
linux-ec2 (2.6.32-363.76) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebase to Ubuntu-2.6.32-58.120
* Release Tracking Bug
- LP: #1301071
[ Ubuntu: 2.6.32-58.120 ]
* netfilter: nf_conntrack_dccp: fix
This bug was fixed in the package linux-ec2 - 2.6.32-363.76
---
linux-ec2 (2.6.32-363.76) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebase to Ubuntu-2.6.32-58.120
* Release Tracking Bug
- LP: #1301071
[ Ubuntu: 2.6.32-58.120 ]
* netfilter: nf_conntrack_dccp: fix
This bug was fixed in the package linux - 2.6.32-58.120
---
linux (2.6.32-58.120) lucid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1300852
[ Upstream Kernel Changes ]
* netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
- LP: #1295090
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
** Changed in: linux-lts-ba
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, w
** Description changed:
The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux
kernel through 3.13.6 does not validate certain auth_enable and
- auth_capable fields before making a sctp_sf_authenticate call, which
+ auth_capable fields before making an sctp_sf_authenticate cal
CVE-2014-0101
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
27 matches
Mail list logo