The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
htt
This bug was fixed in the package linux-ec2 - 2.6.32-360.73
---
linux-ec2 (2.6.32-360.73) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-55.117
* Release Tracking Bug
- LP: #1257527
[ Ubuntu: 2.6.32-55.117 ]
* ipvs: Add boundary check on ioctl
This bug was fixed in the package linux - 2.6.32-55.117
---
linux (2.6.32-55.117) lucid; urgency=low
[Steve Conklin]
* Release Tracking Bug
- LP: #1257364
[ Upstream Kernel Changes ]
* ipvs: Add boundary check on ioctl arguments
- LP: #1252424
- CVE-2013-4588
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
** Changed in: linux-lts-ba
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1252424
Title:
CVE-2013-4588
To manage notifications about this bug go to:
** Description changed:
- Linux kernel built with the IP Virtual Server(CONFIG_IP_VS) support is
- vulnerable to a buffer overflow flaw. It could occur while setting or
- retrieving socket options via setsockopt(2) or getsockopt(2) calls.
- Though a user needs to have CAP_NET_ADMIN privileges to p
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/125242
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status:
CVE-2013-4588
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec