On Wed, Oct 21, 2020 at 10:32:14PM -, Peter Burkholder wrote:
> Is there an approval/publication step that y'alls still need to take?
Yes, there is; it's been a busy, uh, three months give or take.
Thanks for the friendly reminder. :)
--
You received this bug notification because you are a
This CVE still shows up as "Reserved" at
https://nvd.nist.gov/vuln/detail/CVE-2020-11935 and
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11935.
Is there an approval/publication step that y'alls still need to take?
Thanks, Peter
--
You received this bug notification because you are a
The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release
** Changed in: linux (Ubuntu Eoan)
Status: Fix Committed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
Marking as fix released for X/B/F on kernel packages versions:
- Xenial: 4.4.0-186.216
- Bionic: 4.15.0-112.113
- Focal: 5.4.0-42.46
Covered in USNs:
https://usn.ubuntu.com/4425-1
https://usn.ubuntu.com/4426-1
https://usn.ubuntu.com/4427-1
** Changed in: linux (Ubuntu Bionic)
Status: In
** Tags added: patch
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1873074
Title:
kernel panic hit by kube-proxy iptables-save/restore caused by aufs
To manage notifications about this bug go to:
h
This is public in the Ubuntu CVE Tracker so making the bug public too.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1873074
Title