The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
http
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
h
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance
** Also affects: linux (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-ec2 (
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:/
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1413741
Title:
CVE-2014-8159
To manage notifications about this bug go to:
htt
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1413741
Title:
CVE-2014-8159
To manage notifications about this bug
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided => H
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Undeci
** Also affects: linux (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-ec2 (Ubu
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bug
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Changed in: linux (Ubuntu Vivid)
Status: Fix Committed => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Invalid
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: Fix Committed => Invalid
--
You received this bug notification becaus
Vivid and Wily are not affected according to http://people.canonical.com
/~ubuntu-security/cve/2014/CVE-2014-8159.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1413741
Title:
CVE-2014-8159
To
** Description changed:
The InfiniBand (IB) implementation in the Linux kernel package before
2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly
restrict use of User Verbs for registration of memory regions, which
allows local users to access arbitrary physical memory l
** Description changed:
The InfiniBand (IB) implementation in the Linux kernel package before
2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly
restrict use of User Verbs for registration of memory regions, which
allows local users to access arbitrary physical memory l
** Description changed:
The InfiniBand (IB) implementation in the Linux kernel package before
2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly
restrict use of User Verbs for registration of memory regions, which
allows local users to access arbitrary physical memory l
** Changed in: linux (Ubuntu Vivid)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1413741
Title:
CVE-2014-8159
To manage notifications about this bug go to:
** Also affects: linux (Ubuntu Wily)
Importance: High
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: High
Status: Invalid
** Also affects: linux-ec2 (Ubuntu Wi
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1413741
Title:
CVE-2014-8159
To manage notifications about this
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
This bug was fixed in the package linux-ec2 - 2.6.32-377.94
---
linux-ec2 (2.6.32-377.94) lucid; urgency=low
[ Stefan Bader ]
* Release Tracking Bug
- LP: #1449524
* Rebase to Ubuntu-2.6.32-74.142
[ Ubuntu: 2.6.32-74.142 ]
* fs: take i_mutex during prepare_binprm for
This bug was fixed in the package linux-ec2 - 2.6.32-377.94
---
linux-ec2 (2.6.32-377.94) lucid; urgency=low
[ Stefan Bader ]
* Release Tracking Bug
- LP: #1449524
* Rebase to Ubuntu-2.6.32-74.142
[ Ubuntu: 2.6.32-74.142 ]
* fs: take i_mutex during prepare_binprm for
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1413741
Title:
CVE-2014-8159
To manage notifications about this bug
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1413741
Title:
CVE-2014-8159
To manage notifications about this bug go to:
https://bu
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/b
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
** Description changed:
The InfiniBand (IB) implementation in the Linux kernel package before
2.6.32-504.12.2 on Red Hat Enterprise
** Description changed:
- It was found that the Linux kernel's Infiniband subsystem did not
- properly sanitize input parameters while registering memory regions from
- the userspace via the (u)verbs API. As a result, an unrestricted
- physical memory access could be achieved. A local user with ac
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Vivid)
Sta
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8159
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1413741
Title:
CVE-2014-8159
To manage notifications about this bug go to:
This bug was fixed in the package linux - 3.19.0-9.9
---
linux (3.19.0-9.9) vivid; urgency=low
[ Leann Ogasawara ]
* Release Tracking Bug
- LP: #1430930
[ Shachar Raindel ]
* SAUCE: IB/core: Prevent integer overflow in ib_umem_get address
arithmetic
- LP: #14137
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1413741
Title:
CVE-2014-8159
To manage notifications about this bug go to:
https:/
34 matches
Mail list logo