** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects:
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1293714
Title:
CVE-2014-0101
Status in linux package in
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1293714
Title:
CVE-2014-0101
Status in linux
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects:
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** Also affects: linux (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects:
** Changed in: linux-manta (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-manta (Ubuntu Precise)
Importance: Undecided = Medium
** Changed in: linux-manta (Ubuntu Trusty)
Status: New = Invalid
** Changed in: linux-manta (Ubuntu Trusty)
Importance: Undecided =
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Precise)
Importance: Undecided = Medium
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
** Also affects: linux (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1293714
Title:
CVE-2014-0101
Status in
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1293714
Title:
CVE-2014-0101
Status
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux
** No longer affects: linux-armadaxp (Ubuntu Quantal)
** No longer affects: linux-ec2 (Ubuntu Quantal)
** No longer affects: linux-lts-saucy (Ubuntu Quantal)
** No longer affects: linux-lts-quantal (Ubuntu Quantal)
** No longer affects: linux-mvl-dove (Ubuntu Quantal)
** No longer affects:
** Also affects: linux (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects:
This bug was fixed in the package linux-ec2 - 2.6.32-363.76
---
linux-ec2 (2.6.32-363.76) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebase to Ubuntu-2.6.32-58.120
* Release Tracking Bug
- LP: #1301071
[ Ubuntu: 2.6.32-58.120 ]
* netfilter: nf_conntrack_dccp: fix
This bug was fixed in the package linux - 2.6.32-58.120
---
linux (2.6.32-58.120) lucid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1300852
[ Upstream Kernel Changes ]
* netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
- LP: #1295090
This bug was fixed in the package linux-ec2 - 2.6.32-363.76
---
linux-ec2 (2.6.32-363.76) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebase to Ubuntu-2.6.32-58.120
* Release Tracking Bug
- LP: #1301071
[ Ubuntu: 2.6.32-58.120 ]
* netfilter: nf_conntrack_dccp: fix
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New = Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New = Won't Fix
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New = Won't Fix
** Changed in:
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New = Invalid
--
You received this bug notification because you are a member of Kernel
Packages,
** Description changed:
The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux
kernel through 3.13.6 does not validate certain auth_enable and
- auth_capable fields before making a sctp_sf_authenticate call, which
+ auth_capable fields before making an sctp_sf_authenticate
CVE-2014-0101
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also
26 matches
Mail list logo