The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
http
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
h
** Changed in: linux (Ubuntu Xenial)
Status: Fix Committed => Invalid
** Changed in: linux (Ubuntu Yakkety)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Wishlist
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Import
** Also affects: linux (Ubuntu Yakkety)
Importance: Wishlist
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Wishlist
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Wishlist
Status: Invalid
** Also af
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
To manage notifications about this bug go to:
htt
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-security
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-proposed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launc
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Wishlist
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Import
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
To manage notifications about this bug g
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bug
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
To manage notifications about this bug
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
To manage notifications about this bug go to:
ht
This bug was fixed in the package linux-raspi2 - 4.2.0-1016.23
---
linux-raspi2 (4.2.0-1016.23) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522372
* rebased on Ubuntu-4.2.0-21.25
[ Ubuntu: 4.2.0-21.25 ]
* Release Tracking Bug
- LP: #1522108
This bug was fixed in the package linux-raspi2 - 4.2.0-1016.23
---
linux-raspi2 (4.2.0-1016.23) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522372
* rebased on Ubuntu-4.2.0-21.25
[ Ubuntu: 4.2.0-21.25 ]
* Release Tracking Bug
- LP: #1522108
This bug was fixed in the package linux-lts-wily - 4.2.0-21.25~14.04.1
---
linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522374
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #150
This bug was fixed in the package linux-lts-wily - 4.2.0-21.25~14.04.1
---
linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522374
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #150
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Vivid)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-vivid (Ubuntu
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
* [media]
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
To manage notifications about this bug go
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
To manage notifications about this bug
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-wily (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Fix Committed
--
You received this bug notification because you
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
To manage notifications about this bug go to:
htt
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
To manage notifications about this bug go to:
https
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Wishlist
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided => Wishlist
** Changed in: linux-raspi2 (Ubuntu Xenial)
Importance: U
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Wishlist
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Un
** Also affects: linux (Ubuntu Xenial)
Importance: Wishlist
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Wishlist
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Wishlist
Status: Invalid
** Also affects: linux-
** Description changed:
- net: slip: crash when using PPP character device driver
+ The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel
+ through 4.2.3 does not ensure that certain slot numbers are valid, which
+ allows local users to cause a denial of service (NULL pointer
+ der
CVE-2015-7799
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
29 matches
Mail list logo