[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily)

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2016-04-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects:

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2016-04-24 Thread Rolf Leggewie
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2016-04-18 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1392820 Title: CVE-2014-7841 Status in linux package in

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily)

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1392820 Title: CVE-2014-7841 Status in linux

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance:

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-10-28 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects:

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects:

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any updates. Marking the lucid task for this ticket as Won't Fix. ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix -- You received this bug notification because you are a member of Kernel

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any updates. Marking the lucid task for this ticket as Won't Fix. ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix -- You received this bug notification because you are a member of Kernel

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ec2

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects:

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-03-29 Thread Mathew Hodson
** Changed in: linux (Ubuntu Vivid) Status: Fix Committed = Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: Fix Committed = Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed = Invalid -- You received this bug notification

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-01-28 Thread John Johansen
** Changed in: linux-flo (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-flo (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Trusty) Importance: Undecided = Medium **

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-01-14 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2015-01-05 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-12-18 Thread John Johansen
** Changed in: linux (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux (Ubuntu Utopic) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu.

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1457.77 --- linux-ti-omap4 (3.2.0-1457.77) precise; urgency=low * Release Tracking Bug - LP: #1396188 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-73.108 [ Ubuntu: 3.2.0-73.108 ] * Release Tracking Bug - LP:

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-69.136 --- linux (2.6.32-69.136) lucid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1395827 [ Upstream Kernel Changes ] * net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks - LP:

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-73.108 --- linux (3.2.0-73.108) precise; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1396072 [ Upstream Kernel Changes ] * tracing/syscalls: Fix perf syscall tracing when syscall_nr == -1 - LP:

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1642.60 --- linux-armadaxp (3.2.0-1642.60) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1396189 * Rebase to Ubuntu-3.2.0-73.108 [ Ubuntu: 3.2.0-73.108 ] * Release Tracking Bug - LP:

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-373.90 --- linux-ec2 (2.6.32-373.90) lucid; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-69.136 * Release Tracking Bug - LP: #1395971 [ Ubuntu: 2.6.32-69.136 ] * net: sctp: fix skb_over_panic when

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-12-08 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Lucid)

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-12-04 Thread John Johansen
** Description changed: - net: sctp: NULL pointer dereference in af-from_addr_param on malformed - packet + The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP + implementation in the Linux kernel before 3.17.4, when ASCONF is used, + allows remote attackers to cause a denial

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-12-02 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-11-25 Thread Andy Whitcroft
** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1392820 Title: CVE-2014-7841 Status in “linux” package

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-11-24 Thread Brad Figg
** Changed in: linux (Ubuntu Lucid) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1392820 Title: CVE-2014-7841 Status in “linux” package in

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-11-24 Thread John Johansen
** Description changed: net: sctp: NULL pointer dereference in af-from_addr_param on malformed packet - Break-Fix: - e40607cbe270a9e8360907cb1e62ddf0736e4864 + Break-Fix: d6de3097592b7ae7f8e233a4dafb088e2aa8170f + e40607cbe270a9e8360907cb1e62ddf0736e4864 -- You received this bug

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-11-20 Thread John Johansen
** Changed in: linux (Ubuntu Vivid) Status: New = Fix Committed ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu.

[Kernel-packages] [Bug 1392820] Re: CVE-2014-7841

2014-11-14 Thread John Johansen
CVE-2014-7841 ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Undecided Status: New ** Also