The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Also affects: linux (Ubuntu Xenial)
Importance: High
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects:
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-lts-wily (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects:
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2
http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-2850.html
says that this was fixed in precise for linux-ti-omap4.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990
Title:
** Changed in: linux (Ubuntu)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990
Title:
CVE-2013-2850
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu)
Status: Fix Committed = Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
saucy has seen the end of its life and is no longer receiving any
updates. Marking the saucy task for this ticket as Won't Fix.
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
Status: Fix Committed = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Description changed:
Heap-based buffer overflow in the iscsi_add_notunderstood_response
function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI
target subsystem in the Linux kernel through 3.9.4 allows remote
attackers to cause a denial of service (memory corruption and
** Changed in: linux-ti-omap4 (Ubuntu Quantal)
Status: Fix Committed = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990
Title:
CVE-2013-2850
To manage notifications about
** Changed in: linux-ti-omap4 (Ubuntu Raring)
Status: Fix Committed = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990
Title:
CVE-2013-2850
To manage notifications about this
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
Status: New = Invalid
** Changed in: linux-lts-backport-natty
** Description changed:
- The flaw is an unauthenticated remote heap buffer overflow in the Linux
- iSCSI target subsystem. If there is a target configured and listening on
- the network, a remote attacker can corrupt heap memory, and almost
- certainly gain kernel execution control. I only got
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990
Title:
CVE-2013-2850
To manage notifications about
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New = Fix Released
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux (Ubuntu Lucid)
Status: New =
** Changed in: linux (Ubuntu Saucy)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990
Title:
CVE-2013-2850
To manage notifications about this bug go to:
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Quantal)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Raring)
CVE-2013-2850
** Also affects: linux (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also
20 matches
Mail list logo