The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lt
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
** Changed in: linux (Ubuntu Xenial)
Status: Fix Committed => Invalid
** Changed in: linux (Ubuntu Yakkety)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://b
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Wishlist
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Import
** Also affects: linux (Ubuntu Yakkety)
Importance: Wishlist
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Wishlist
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Wishlist
Status: Invalid
** Also af
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
Status in linux package in
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-security
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubun
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Wishlist
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Import
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
Status in linux pa
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
Status in linux p
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
Status in linux package in
This bug was fixed in the package linux-lts-wily - 4.2.0-21.25~14.04.1
---
linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522374
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #150
This bug was fixed in the package linux-raspi2 - 4.2.0-1016.23
---
linux-raspi2 (4.2.0-1016.23) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522372
* rebased on Ubuntu-4.2.0-21.25
[ Ubuntu: 4.2.0-21.25 ]
* Release Tracking Bug
- LP: #1522108
This bug was fixed in the package linux-lts-wily - 4.2.0-21.25~14.04.1
---
linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522374
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #150
This bug was fixed in the package linux-raspi2 - 4.2.0-1016.23
---
linux-raspi2 (4.2.0-1016.23) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522372
* rebased on Ubuntu-4.2.0-21.25
[ Ubuntu: 4.2.0-21.25 ]
* Release Tracking Bug
- LP: #1522108
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Vivid)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-vivid (Ubuntu
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
* [media]
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
Status in linux pack
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
Status in linux p
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-wily (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Fix Committed
--
You received this bug notification because you
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
Status in linux package in
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
Status in linux package in Ub
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Wishlist
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided => Wishlist
** Changed in: linux-raspi2 (Ubuntu Xenial)
Importance: U
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Wishlist
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Un
** Also affects: linux (Ubuntu Xenial)
Importance: Wishlist
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Wishlist
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Wishlist
Status: Invalid
** Also affects: linux-
** Description changed:
- net: slip: crash when using PPP character device driver
+ The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel
+ through 4.2.3 does not ensure that certain slot numbers are valid, which
+ allows local users to cause a denial of service (NULL pointer
+ der
CVE-2015-7799
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
29 matches
Mail list logo