The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
http
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
h
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubu
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:/
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423757
Title:
CVE-2015-1593
To manage notifications about this bug go to:
htt
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance:
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423757
Title:
CVE-2015-1593
To manage notifications about this bug
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided => Lo
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Undecid
** Also affects: linux (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs,
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bug
** Also affects: linux (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu Wily)
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
This bug was fixed in the package linux-armadaxp - 3.2.0-1648.67
---
linux-armadaxp (3.2.0-1648.67) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1435581
* Rebase to Ubuntu-3.2.0-80.116
[ Ubuntu: 3.2.0-80.116 ]
* Release Tracking Bug
- LP: #1435
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1462.82
---
linux-ti-omap4 (3.2.0-1462.82) precise; urgency=low
* Release Tracking Bug
- LP: #1435579
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-80.116
[ Ubuntu: 3.2.0-80.116 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-lts-trusty -
3.13.0-49.81~precise1
---
linux-lts-trusty (3.13.0-49.81~precise1) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1436132
[ Alex Hung ]
* SAUCE: ACPI / blacklist: blacklist Win8 OSI for HP Pavili
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1462.82
---
linux-ti-omap4 (3.2.0-1462.82) precise; urgency=low
* Release Tracking Bug
- LP: #1435579
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-80.116
[ Ubuntu: 3.2.0-80.116 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-armadaxp - 3.2.0-1648.67
---
linux-armadaxp (3.2.0-1648.67) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1435581
* Rebase to Ubuntu-3.2.0-80.116
[ Ubuntu: 3.2.0-80.116 ]
* Release Tracking Bug
- LP: #1435
This bug was fixed in the package linux - 3.2.0-80.116
---
linux (3.2.0-80.116) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1435392
[ Andy Whitcroft ]
* [Packaging] generate live watchdog blacklists
- LP: #1432837
[ Upstream Kernel Changes ]
This bug was fixed in the package linux - 3.13.0-49.81
---
linux (3.13.0-49.81) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1436016
[ Alex Hung ]
* SAUCE: ACPI / blacklist: blacklist Win8 OSI for HP Pavilion dv6
- LP: #1416940
[ Andy Whitc
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precis
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423757
Title:
CVE-2015-1593
To manage notifications about this bug go to:
htt
** Changed in: linux (Ubuntu Vivid)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423757
Title:
CVE-2015-1593
To manage notifications about this bug go to:
https://bu
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423757
Title:
CVE-2015-1593
To manage notifications about this bug go to:
ht
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423757
Title:
CVE-2015-1593
To manage notifications about this bug go to:
htt
** Description changed:
- Linux ASLR integer overflow
+ The stack randomization feature in the Linux kernel before 3.19.1 on
+ 64-bit platforms uses incorrect data types for the results of bitwise
+ left-shift operations, which makes it easier for attackers to bypass the
+ ASLR protection mechanis
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.lau
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423757
Title:
CVE-2015-1593
To manage notifications about this bug go t
** Description changed:
Linux ASLR integer overflow
- Break-Fix: - -
+ Break-Fix: - 4e7c22d447bb6d7e37bfe39ff658486ae78e8d77
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1423757
Title:
CVE-20
CVE-2015-1593
** Also affects: linux (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects:
33 matches
Mail list logo