** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importan
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1295090
Title:
CVE-2014-2523
To manage notifications about this bug go to:
htt
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importan
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1295090
Title:
CVE-2014-2523
To manage notifications about this bug
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided =>
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Unde
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-ec
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
** Also affects: linux (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2 (Ubu
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Invalid
** Changed in: linux (Ubuntu Utopic)
Status: Fix Committed => Invalid
** Changed in: linux (Ubuntu Vivid)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of
** Changed in: linux-flo (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-flo (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-flo (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-flo (Ubuntu Trusty)
Importance: Undecided => Medium
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Impo
** Also affects: linux (Ubuntu Vivid)
Importance: Medium
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux
** No longer affects: linux-armadaxp (Ubuntu Saucy)
** No longer affects: linux-ec2 (Ubuntu Saucy)
** No longer affects: linux-lts-saucy (Ubuntu Saucy)
** No longer affects: linux-lts-quantal (Ubuntu Saucy)
** No longer affects: linux-mvl-dove (Ubuntu Saucy)
** No longer affects: linux (Ubuntu
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1295090
Title:
CVE-2014-2523
To manage notifications about
This bug was fixed in the package linux-ti-omap4 - 3.5.0-242.58
---
linux-ti-omap4 (3.5.0-242.58) quantal; urgency=low
* Release Tracking Bug
- LP: #1317330
[ Paolo Pisati ]
* rebased on Ubuntu-3.5.0-51.75
[ Ubuntu: 3.5.0-51.75 ]
* Merged back Ubuntu-3.5.0-49.74 secu
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Saucy)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu P
Would someone mind explaining, please, why this remote code execution
vulnerability was only just now fixed in precise despite being fixed
upstream in January?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
This bug was fixed in the package linux-lts-raring -
3.8.0-41.60~precise1
---
linux-lts-raring (3.8.0-41.60~precise1) precise; urgency=low
[ Kamal Mostafa ]
* Revert "rtlwifi: Set the link state"
- LP: #1289429
- LP: #1319735
* Release Tracking Bug
- re-used previou
This bug was fixed in the package linux-lts-quantal -
3.5.0-51.76~precise1
---
linux-lts-quantal (3.5.0-51.76~precise1) precise; urgency=low
[ Brad Figg ]
* Revert "rtlwifi: Set the link state"
[ Kamal Mostafa ]
* Release Tracking Bug
- re-used previous tracking bug
li
** No longer affects: linux-armadaxp (Ubuntu Quantal)
** No longer affects: linux-ec2 (Ubuntu Quantal)
** No longer affects: linux-lts-saucy (Ubuntu Quantal)
** No longer affects: linux-lts-quantal (Ubuntu Quantal)
** No longer affects: linux-mvl-dove (Ubuntu Quantal)
** No longer affects: lin
** Also affects: linux (Ubuntu Utopic)
Importance: Medium
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects: li
This bug was fixed in the package linux-ec2 - 2.6.32-363.76
---
linux-ec2 (2.6.32-363.76) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebase to Ubuntu-2.6.32-58.120
* Release Tracking Bug
- LP: #1301071
[ Ubuntu: 2.6.32-58.120 ]
* netfilter: nf_conntrack_dccp: fix
This bug was fixed in the package linux - 2.6.32-58.120
---
linux (2.6.32-58.120) lucid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1300852
[ Upstream Kernel Changes ]
* netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
- LP: #1295090
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
** Changed in: linux-lts-ba
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
S
** Description changed:
- remote memory corruption in nf_conntrack_proto_dccp.c
+ net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through
+ 3.13.6 uses a DCCP header pointer incorrectly, which allows remote
+ attackers to cause a denial of service (system crash) or possibly
+ execute a
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
B
CVE-2014-2523
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
31 matches
Mail list logo