[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily)

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2016-04-26 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects:

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2016-04-24 Thread Rolf Leggewie
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2016-04-18 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1386393 Title: CVE-2014-3688 Status in linux package in

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily)

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1386393 Title: CVE-2014-3688 Status in linux

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance:

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2015-10-28 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects:

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects:

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any updates. Marking the lucid task for this ticket as Won't Fix. ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix -- You received this bug notification because you are a member of Kernel

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any updates. Marking the lucid task for this ticket as Won't Fix. ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix -- You received this bug notification because you are a member of Kernel

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ec2

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects:

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2015-03-30 Thread Mathew Hodson
** Changed in: linux (Ubuntu Vivid) Status: Fix Committed = Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed = Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: Fix Committed = Invalid -- You received this bug notification

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2015-01-28 Thread John Johansen
** Changed in: linux-manta (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-manta (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Trusty) Importance: Undecided =

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2014-12-12 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Utopic) Status: Fix Committed = Fix Released ** Changed in: linux-lts-utopic (Ubuntu

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2014-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-373.90 --- linux-ec2 (2.6.32-373.90) lucid; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-69.136 * Release Tracking Bug - LP: #1395971 [ Ubuntu: 2.6.32-69.136 ] * net: sctp: fix skb_over_panic when

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2014-12-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-69.136 --- linux (2.6.32-69.136) lucid; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1395827 [ Upstream Kernel Changes ] * net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks - LP:

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2014-12-08 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty)

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2014-12-04 Thread John Johansen
** Description changed: - net: sctp: remote memory pressure from excessive queueing + The SCTP implementation in the Linux kernel before 3.17.4 allows remote + attackers to cause a denial of service (memory consumption) by + triggering a large number of chunks in an association's output queue, as

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2014-12-02 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise)

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2014-11-20 Thread John Johansen
** Changed in: linux (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux (Ubuntu Utopic) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu.

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2014-11-13 Thread Brad Figg
** Changed in: linux (Ubuntu Lucid) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1386393 Title: CVE-2014-3688 Status in “linux” package in

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2014-11-13 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu.

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2014-11-12 Thread John Johansen
** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2014-10-30 Thread John Johansen
** Changed in: linux (Ubuntu Vivid) Status: New = Fix Committed ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Invalid ** Description changed: net: sctp: remote memory pressure from excessive queueing + + Break-Fix: 2e3216cd54b142ba605e87522e15f42e0c4e3996 +

[Kernel-packages] [Bug 1386393] Re: CVE-2014-3688

2014-10-27 Thread John Johansen
CVE-2014-3688 ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Undecided Status: New ** Also