The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lt
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubu
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armad
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1469320
Title:
CVE-2015-4700
Status in linux package in
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance:
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1469320
Title:
CVE-2015-4700
Status in linux
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided => Lo
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Undecid
** Also affects: linux (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https:
** Description changed:
- Crafted BPF filters may crash kernel during JIT optimisation
+ The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the
+ Linux kernel before 4.0.6 allows local users to cause a denial of
+ service (system crash) by creating a packet filter and then loading
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Vivid)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
h
This bug was fixed in the package linux-armadaxp - 3.2.0-1654.75
---
linux-armadaxp (3.2.0-1654.75) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1472035
* Rebase to Ubuntu-3.2.0-88.126
[ Ubuntu: 3.2.0-88.126 ]
* Release Tracking Bug
- LP: #1471
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1468.89
---
linux-ti-omap4 (3.2.0-1468.89) precise; urgency=low
* Release Tracking Bug
- LP: #1472034
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-88.126
[ Ubuntu: 3.2.0-88.126 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux - 3.2.0-88.126
---
linux (3.2.0-88.126) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1471889
[ Upstream Kernel Changes ]
* pipe: iovec: Fix memory corruption when retrying atomic copy as
non-atomic
- CV
This bug was fixed in the package linux - 3.2.0-88.126
---
linux (3.2.0-88.126) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1471889
[ Upstream Kernel Changes ]
* pipe: iovec: Fix memory corruption when retrying atomic copy as
non-atomic
- CV
This bug was fixed in the package linux-armadaxp - 3.2.0-1654.75
---
linux-armadaxp (3.2.0-1654.75) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1472035
* Rebase to Ubuntu-3.2.0-88.126
[ Ubuntu: 3.2.0-88.126 ]
* Release Tracking Bug
- LP: #1471
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1468.89
---
linux-ti-omap4 (3.2.0-1468.89) precise; urgency=low
* Release Tracking Bug
- LP: #1472034
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-88.126
[ Ubuntu: 3.2.0-88.126 ]
* Release Tracking Bug
- LP:
** Changed in: linux (Ubuntu Wily)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1469320
Title:
CVE-2015-4700
Status in linux package i
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: Fix Committed => Fix Released
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launch
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1469320
Title:
CVE-2015-4700
Status in linux package in
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix
CVE-2015-4700
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
28 matches
Mail list logo