The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-mvl-dove (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lt
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-ec2 (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-mave
** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/1530956
Title:
CVE-2015-7513
Status in li
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importan
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Also affects:
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1530956
Title:
CVE-2015-7513
Status in linux package in
** Branch linked: lp:~ubuntu-branches/ubuntu/trusty/linux-lts-wily
/trusty-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1530956
Title:
CVE-2015-7513
Status in linux
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importan
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: New => Fix Committed
** Description changed:
- Reload pit counters for all channels when restoring state
+ arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT
+ counter values during state restoration, which allows gu
** Changed in: linux-lts-wily (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-u
Fix released in 3.13.0-77.121
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1530956
Title:
CV
Fix released in 4.2.0-27.32
** Changed in: linux (Ubuntu Wily)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1530956
Title:
CVE-20
Fix released in 3.19.0-47.53
** Changed in: linux (Ubuntu Vivid)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1530956
Title:
CVE-
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1476.99
---
linux-ti-omap4 (3.2.0-1476.99) precise; urgency=medium
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1532928
* No change upload to override old version in PPA
linux-ti-omap4 (3.2.0-1476.98) precise; ur
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1476.99
---
linux-ti-omap4 (3.2.0-1476.99) precise; urgency=medium
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1532928
* No change upload to override old version in PPA
linux-ti-omap4 (3.2.0-1476.98) precise; ur
This bug was fixed in the package linux-armadaxp - 3.2.0-1661.85
---
linux-armadaxp (3.2.0-1661.85) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1532929
* Rebase to Ubuntu-3.2.0-98.138
[ Ubuntu: 3.2.0-98.138 ]
* Release Tracking Bug
- LP: #1532
This bug was fixed in the package linux-armadaxp - 3.2.0-1661.85
---
linux-armadaxp (3.2.0-1661.85) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1532929
* Rebase to Ubuntu-3.2.0-98.138
[ Ubuntu: 3.2.0-98.138 ]
* Release Tracking Bug
- LP: #1532
This bug was fixed in the package linux - 3.2.0-98.138
---
linux (3.2.0-98.138) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1532774
[ Upstream Kernel Changes ]
* Revert "xhci: don't finish a TD if we get a short transfer event mid
TD"
-
This bug was fixed in the package linux-lts-trusty -
3.13.0-75.119~precise1
---
linux-lts-trusty (3.13.0-75.119~precise1) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1532956
[ Kamal Mostafa ]
* Revert "SAUCE: disable stack-protector for ARM com
This bug was fixed in the package linux-lts-trusty -
3.13.0-75.119~precise1
---
linux-lts-trusty (3.13.0-75.119~precise1) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1532956
[ Kamal Mostafa ]
* Revert "SAUCE: disable stack-protector for ARM com
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-wily (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1530956
Title:
CVE-2015-7513
Status in linux package in
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Ch
CVE-2015-7513
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affec
26 matches
Mail list logo