** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Invalid
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
saucy has seen the end of its life and is no longer receiving any
updates. Marking the saucy task for this ticket as Won't Fix.
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Changed in: linux (Ubuntu Quantal)
Status: New = Won't Fix
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New = Won't Fix
** Changed in: linux-ti-omap4 (Ubuntu Quantal)
Status: New = Won't Fix
--
You received this bug notification because you are a member of
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1256919
Title:
CVE-2013-6405
To manage notifications about this bug go
This bug was fixed in the package linux - 2.6.32-56.118
---
linux (2.6.32-56.118) lucid; urgency=low
[Brad Figg]
* Release Tracking Bug
- LP: #1266525
[ Upstream Kernel Changes ]
* inet: prevent leakage of uninitialized memory to user in recv syscalls
- LP:
This bug was fixed in the package linux-ec2 - 2.6.32-361.74
---
linux-ec2 (2.6.32-361.74) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-56.118
* Release Tracking Bug
- LP: #1266612
[ Ubuntu: 2.6.32-56.118 ]
* inet: prevent leakage of
** No longer affects: linux-armadaxp (Ubuntu Raring)
** No longer affects: linux-ec2 (Ubuntu Raring)
** No longer affects: linux-lts-saucy (Ubuntu Raring)
** No longer affects: linux-lts-quantal (Ubuntu Raring)
** No longer affects: linux-mvl-dove (Ubuntu Raring)
** No longer affects: linux
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Saucy)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Description changed:
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs:
- CVE-2013-7263, CVE-2013-7264, CVE-2013-7265. Reason: This candidate is
- a duplicate of CVE-2013-7263, CVE-2013-7264, and CVE-2013-7265. Notes:
- All CVE users should reference CVE-2013-7263, CVE-2013-7264,
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Fix Committed
** Description changed:
- net: uninitialised memory
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New = Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New = Won't Fix
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New = Won't Fix
** Changed in:
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs,
CVE-2013-6405
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also
13 matches
Mail list logo