** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-lts-wily (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-
** Changed in: linux-flo (Ubuntu Utopic)
Status: Invalid => Fix Committed
** Changed in: linux-mako (Ubuntu Utopic)
Status: Invalid => Fix Committed
** Changed in: linux-manta (Ubuntu Utopic)
Status: Invalid => Fix Committed
** Changed in: linux-goldfish (Ubuntu Utopic)
** Also affects: linux (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (Ubu
This bug was fixed for precise in the package linux-ti-omap4
3.2.0-1452.72
---
linux-ti-omap4 (3.2.0-1452.72) precise; urgency=low
* Release Tracking Bug
- LP: #1356452
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-68.102
[ Ubuntu: 3.2.0-68.102 ]
* Release Tracking Bug
Utopic is not affected according to http://people.canonical.com/~ubuntu-
security/cve/2014/CVE-2014-3917.html
** Changed in: linux (Ubuntu Utopic)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This bug was fixed for precise in the package linux-lts-trusty
3.13.0-33.58~precise1
---
linux-lts-trusty (3.13.0-33.58~precise1) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1350553
[ Upstream Kernel Changes ]
* mm: numa: do not automatically migrat
This bug was fixed for precise in the package linux 3.2.0-68.102
---
linux (3.2.0-68.102) precise; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1355387
[ Joseph Salisbury ]
* [Config] updateconfigs after Linux 3.2.62 update
[ Upstream Kernel Changes
** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1325941
Title:
CVE-2014-3917
To manage notifications about this bug go to:
h
** Changed in: linux-lts-backport-natty (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux-lts-backport-maverick (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/132
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux-lts-backport-natty (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/132
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux-lts-backport-maverick (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1325941
Title:
CVE-2014-3917
To manage notifications about
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchp
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1325941
Title:
CVE-2014-3917
To manage notifications about this bug g
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1325941
** No longer affects: linux-armadaxp (Ubuntu Saucy)
** No longer affects: linux-ec2 (Ubuntu Saucy)
** No longer affects: linux-lts-saucy (Ubuntu Saucy)
** No longer affects: linux-lts-quantal (Ubuntu Saucy)
** No longer affects: linux-mvl-dove (Ubuntu Saucy)
** No longer affects: linux (Ubuntu
This bug was fixed in the package linux-lts-raring -
3.8.0-44.66~precise1
---
linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-raring (3
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-quantal
** Also affects: linux-lts-trusty (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux-lts-trusty (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Utopic)
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
** Changed in: linux (Ubuntu Saucy)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1325941
T
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you a
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
** Changed in: linux-lts-ba
** Description changed:
kernel/auditsc.c in the Linux kernel through 3.14.5, when
CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local
users to obtain potentially sensitive single-bit values from kernel
memory or cause a denial of service (OOPS) via a large value of a
** Description changed:
- DoS with syscall auditing
+ kernel/auditsc.c in the Linux kernel through 3.14.5, when
+ CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local
+ users to obtain potentially sensitive single-bit values from kernel
+ memory or cause a denial of service (OOP
CVE-2014-3917
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affec
28 matches
Mail list logo