The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importan
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1312989
Title:
CVE-2014-0181
Status in linux package in
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importan
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1312989
Title:
CVE-2014-0181
Status in linux
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided =>
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Unde
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-ec
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
** Also affects: linux (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2 (Ubu
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
** Changed in: linux-manta (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-manta (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-manta (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-manta (Ubuntu Trusty)
Importance: Undecided =>
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux-lts-trusty (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
** Also affects: linux (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2 (
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1312989
Title:
CVE-2014-0181
Status in “linux” package in Ubuntu:
This bug was fixed in the package linux - 3.13.0-35.62
---
linux (3.13.0-35.62) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1357148
[ Brad Figg ]
* Start new release
[ dann frazier ]
* SAUCE: (no-up) Fix build failure on arm64
- LP:
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1312989
Title:
CVE-2014-0181
Status in “linux” package in Ubuntu:
In
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1312989
Title:
CVE-2014-0181
Status in “linux” package in Ubuntu:
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a me
** No longer affects: linux-armadaxp (Ubuntu Saucy)
** No longer affects: linux-ec2 (Ubuntu Saucy)
** No longer affects: linux-lts-saucy (Ubuntu Saucy)
** No longer affects: linux-lts-quantal (Ubuntu Saucy)
** No longer affects: linux-mvl-dove (Ubuntu Saucy)
** No longer affects: linux (Ubuntu
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1312989
Title:
CVE-2014-0181
Status in “linux” p
** Changed in: linux (Ubuntu Trusty)
Status: New => In Progress
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Maarten Lankhorst (mlankhorst)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ub
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
** Changed in: linux-lts-ba
** Changed in: linux (Ubuntu Utopic)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1312989
Title:
CVE-2014-0181
Status in “linux” package in Ubun
** Description changed:
The Netlink implementation in the Linux kernel through 3.14.1 does not
provide a mechanism for authorizing socket operations based on the
opener of a socket, which allows local users to bypass intended access
restrictions and modify network configurations by using a
** No longer affects: linux-armadaxp (Ubuntu Quantal)
** No longer affects: linux-ec2 (Ubuntu Quantal)
** No longer affects: linux-lts-saucy (Ubuntu Quantal)
** No longer affects: linux-lts-quantal (Ubuntu Quantal)
** No longer affects: linux-mvl-dove (Ubuntu Quantal)
** No longer affects: lin
** Description changed:
- It is possible, by passing a netlink socket to a more privileged
- executable and then fooling that executable into writing to the socket
- data that happens to be valid netlink message, to do something that
- privileged executable did not intend to do.
+ The Netlink impl
CVE-2014-0181
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affec
31 matches
Mail list logo