The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects:
utopic has seen the end of its life and is no longer receiving any
updates. Marking the utopic task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
utopic has seen the end of its life and is no longer receiving any
updates. Marking the utopic task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1336135
Title:
CVE-2014-4667
To manage notifications about this bug go to:
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1336135
Title:
CVE-2014-4667
To manage notifications about this
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects:
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as Won't Fix.
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs,
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as Won't Fix.
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Also affects: linux (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects:
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed = Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed = Invalid
** Changed in: linux (Ubuntu Utopic)
Status: Fix Committed = Invalid
** Changed in: linux (Ubuntu Vivid)
** Also affects: linux (Ubuntu Vivid)
Importance: Medium
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects:
saucy has seen the end of its life and is no longer receiving any
updates. Marking the saucy task for this ticket as Won't Fix.
** Changed in: linux-lts-backport-natty (Ubuntu Saucy)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs,
saucy has seen the end of its life and is no longer receiving any
updates. Marking the saucy task for this ticket as Won't Fix.
** Changed in: linux-lts-backport-maverick (Ubuntu Saucy)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Invalid = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1336135
Title:
CVE-2014-4667
To manage notifications about this
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: Fix Committed = Fix Released
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Invalid = Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Trusty)
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1336135
Title:
CVE-2014-4667
To manage notifications about
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New
This bug was fixed in the package linux - 2.6.32-65.131
---
linux (2.6.32-65.131) lucid; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1357394
[ Upstream Kernel Changes ]
* x86_32, entry: Store badsys error code in %eax
- LP: #1334989
-
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New = Invalid
--
You received this bug notification because you are a
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1336135
Title:
CVE-2014-4667
To manage notifications about this bug go to:
** No longer affects: linux-armadaxp (Ubuntu Saucy)
** No longer affects: linux-ec2 (Ubuntu Saucy)
** No longer affects: linux-lts-saucy (Ubuntu Saucy)
** No longer affects: linux-lts-quantal (Ubuntu Saucy)
** No longer affects: linux-mvl-dove (Ubuntu Saucy)
** No longer affects: linux
** Description changed:
- [sctp: sk_ack_backlog wrap-around problem] DOS
+ The sctp_association_free function in net/sctp/associola.c in the Linux
+ kernel before 3.15.2 does not properly manage a certain backlog value,
+ which allows remote attackers to cause a denial of service (socket
+
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1336135
Title:
CVE-2014-4667
To manage notifications about this bug go to:
** Description changed:
- [sctp: sk_ack_backlog wrap-around problem]
+ [sctp: sk_ack_backlog wrap-around problem] DOS
- Break-Fix: - d3217b15a19a4779c39b212358a5c71d725822ee
+ Break-Fix: de76e695a5ce19c121ba7e246b45f258be678a75
+ d3217b15a19a4779c39b212358a5c71d725822ee
--
You received this
CVE-2014-4667
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also
33 matches
Mail list logo