The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
** Also affects: linux (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-ec2
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** No longer affects: linux-flo (Ubuntu Vivid)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370044
Title:
CVE-2014-6416
To manage notifications about this bug go to:
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370044
Title:
CVE-2014-6416
To manage notifications about this bug go to:
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370044
Title:
CVE-2014-6416
To manage notifications about this
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided =>
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-ec2
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as Won't Fix.
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs,
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as Won't Fix.
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Also affects: linux (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects:
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Fix Released
** Changed in: linux-lts-trusty (Ubuntu Precise)
Importance: Undecided = Low
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
** Also affects: linux (Ubuntu Vivid)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This bug was fixed in the package linux - 3.13.0-37.64
---
linux (3.13.0-37.64) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1372576
[ dann frazier ]
* [Config] CONFIG_HW_RANDOM_XGENE=m on arm64
[ Edward Lin ]
* SAUCE: Add
This bug was fixed in the package linux - 3.2.0-70.105
---
linux (3.2.0-70.105) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- re-used previous tracking bug
[ Upstream Kernel Changes ]
* udf: Avoid infinite loop when processing indirect ICBs
- LP:
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1455.75
---
linux-ti-omap4 (3.2.0-1455.75) precise; urgency=low
* Release Tracking Bug
- LP: #1372683
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-70.105
[ Ubuntu: 3.2.0-70.105 ]
* Release Tracking Bug
-
This bug was fixed in the package linux-armadaxp - 3.2.0-1639.57
---
linux-armadaxp (3.2.0-1639.57) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1373656
* Rebase to Ubuntu-3.2.0-70.105
[ Ubuntu: 3.2.0-70.105 ]
* Release Tracking Bug
- re-used
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370044
Title:
CVE-2014-6416
To manage notifications about this bug go to:
** Description changed:
- [libceph: buffer overflow]
+ Buffer overflow in net/ceph/auth_x.c in Ceph, as used in the Linux
+ kernel before 3.16.3, allows remote attackers to cause a denial of
+ service (memory corruption and panic) or possibly have unspecified other
+ impact via a long unencrypted
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370044
Title:
CVE-2014-6416
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370044
Title:
CVE-2014-6416
To manage notifications about this bug
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370044
Title:
CVE-2014-6416
To manage notifications about this bug go to:
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux (Ubuntu Utopic)
Status: New = Invalid
--
You
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370044
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New = Invalid
** Description changed:
[libceph: buffer overflow]
- Break-Fix: -c27a3e4d667fdcad3db7b104f75659478e0c68d8
+ Break-Fix: ec0994e48ea2aebf62ff08376227f3a9ccf46262
+ c27a3e4d667fdcad3db7b104f75659478e0c68d8
--
CVE-2014-6416
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also
35 matches
Mail list logo