This bug was fixed in the package linux - 3.13.0-144.193
---
linux (3.13.0-144.193) trusty; urgency=medium
* linux: 3.13.0-144.193 -proposed tracker (LP: #1755227)
* CVE-2017-12762
- isdn/i4l: fix buffer overflow
* CVE-2017-17807
- KEYS: add missing permission check fo
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'. If the problem still exists,
change the tag 'verifica
** Changed in: linux (Ubuntu Trusty)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742480
Title:
[Hyper-V] storvsc: do not assume SG list is con
https://lists.ubuntu.com/archives/kernel-team/2018-January/089675.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742480
Title:
[Hyper-V] storvsc: do not assume SG list is continuou
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Trusty)
Status: New => Triaged
** Changed in: linux (Ubuntu Trusty)
Importance: Undecided => High
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Marcelo
Based on the note that "This code path is not used post Linux 4.1",
Xenial 16.04 and newer releases should not be impacted. This would only
need to be considered for the v3.13 based Trusty 14.04 kernel. Will fix
up the nominations accordingly. Thanks.
--
You received this bug notification beca
6 matches
Mail list logo