CVE 2015-2922
The ndisc_router_
Related bugs and status
CVE-2015-2922 (Candidate) is related to these bugs:
Bug #1124250: Partially incorrect uid mapping with nfs4/idmapd/ldap-auth
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1124250 | Partially incorrect uid mapping with nfs4/idmapd/ldap-auth | Fedora | Critical | Won't Fix | ||
1124250 | Partially incorrect uid mapping with nfs4/idmapd/ldap-auth | nfs-utils (Debian) | Unknown | Fix Released | ||
1124250 | Partially incorrect uid mapping with nfs4/idmapd/ldap-auth | linux (Ubuntu) | Low | Fix Released | ||
1124250 | Partially incorrect uid mapping with nfs4/idmapd/ldap-auth | linux (Ubuntu Trusty) | Low | Fix Released | ||
1124250 | Partially incorrect uid mapping with nfs4/idmapd/ldap-auth | linux (Ubuntu Utopic) | Low | Fix Released |
Bug #1374389: [i915 Broadwell] Backported bugfixes
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1374389 | [i915 Broadwell] Backported bugfixes | linux (Ubuntu) | Undecided | Invalid | ||
1374389 | [i915 Broadwell] Backported bugfixes | linux (Ubuntu Trusty) | High | Fix Released | ||
1374389 | [i915 Broadwell] Backported bugfixes | linux (Ubuntu Utopic) | Undecided | Fix Released |
Bug #1384469: [i915_bdw] GPU hang bug, typo fix
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1384469 | [i915_bdw] GPU hang bug, typo fix | linux (Ubuntu) | Medium | Invalid | ||
1384469 | [i915_bdw] GPU hang bug, typo fix | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1384469 | [i915_bdw] GPU hang bug, typo fix | linux (Ubuntu Utopic) | Undecided | Fix Released |
Bug #1398544: Please enable CONFIG_PCIEASPM_DEBUG
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1398544 | Please enable CONFIG_PCIEASPM_DEBUG | linux (Ubuntu) | Wishlist | Fix Released | ||
1398544 | Please enable CONFIG_PCIEASPM_DEBUG | linux (Ubuntu Vivid) | Wishlist | Fix Released | ||
1398544 | Please enable CONFIG_PCIEASPM_DEBUG | linux (Ubuntu Utopic) | Wishlist | Fix Released | ||
1398544 | Please enable CONFIG_PCIEASPM_DEBUG | linux (Ubuntu Trusty) | Wishlist | Fix Released |
Bug #1400955: [Feature] Add Jacksonville support in e1000e driver
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1400955 | [Feature] Add Jacksonville support in e1000e driver | intel | Undecided | Fix Released | ||
1400955 | [Feature] Add Jacksonville support in e1000e driver | linux (Ubuntu) | Undecided | Fix Released | ||
1400955 | [Feature] Add Jacksonville support in e1000e driver | linux (Ubuntu Vivid) | Undecided | Fix Released |
Bug #1411193: [Asus F200MA] bluetooth not working
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1411193 | [Asus F200MA] bluetooth not working | linux (Ubuntu) | Medium | Fix Released | ||
1411193 | [Asus F200MA] bluetooth not working | linux (Ubuntu Utopic) | Undecided | Fix Released | ||
1411193 | [Asus F200MA] bluetooth not working | linux (Ubuntu Trusty) | Undecided | Fix Released | ||
1411193 | [Asus F200MA] bluetooth not working | linux (Ubuntu Precise) | Undecided | Fix Released |
Bug #1413540: Trusty soft lockup issues with nested KVM
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1413540 | Trusty soft lockup issues with nested KVM | linux (Ubuntu) | Undecided | Fix Released | ||
1413540 | Trusty soft lockup issues with nested KVM | linux (Ubuntu Trusty) | High | Fix Released |
Bug #1418140: CONFIG_DEFAULT_MMAP_MIN_ADDR needs to match on armhf and arm64 otherwise arm64 cannot run armhf binaries
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1418140 | CONFIG_DEFAULT_MMAP_MIN_ADDR needs to match on armhf and arm64 otherwise arm64 cannot run armhf binaries | linux (Ubuntu) | Medium | Fix Released | ||
1418140 | CONFIG_DEFAULT_MMAP_MIN_ADDR needs to match on armhf and arm64 otherwise arm64 cannot run armhf binaries | linux (Ubuntu Utopic) | Medium | Fix Released | ||
1418140 | CONFIG_DEFAULT_MMAP_MIN_ADDR needs to match on armhf and arm64 otherwise arm64 cannot run armhf binaries | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1418140 | CONFIG_DEFAULT_MMAP_MIN_ADDR needs to match on armhf and arm64 otherwise arm64 cannot run armhf binaries | linux (Ubuntu Vivid) | Medium | Fix Released |
Bug #1420627: powerpc: backport AST graphic driver updates for OpenPower
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1420627 | powerpc: backport AST graphic driver updates for OpenPower | linux (Ubuntu) | Medium | Fix Released | ||
1420627 | powerpc: backport AST graphic driver updates for OpenPower | linux (Ubuntu Utopic) | Medium | Fix Released |
Bug #1423413: [XPS 13 9343, Realtek ALC3263, Mic, Internal] No sound at all
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1423413 | [XPS 13 9343, Realtek ALC3263, Mic, Internal] No sound at all | linux (Ubuntu) | High | Fix Released | ||
1423413 | [XPS 13 9343, Realtek ALC3263, Mic, Internal] No sound at all | Dell Sputnik | Undecided | Fix Released |
Bug #1436745: Audio can not output via system internal speaker on a HP machine
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1436745 | Audio can not output via system internal speaker on a HP machine | linux (Ubuntu) | Critical | Fix Released | ||
1436745 | Audio can not output via system internal speaker on a HP machine | HWE Next | Critical | Fix Released | ||
1436745 | Audio can not output via system internal speaker on a HP machine | linux (Ubuntu Utopic) | Critical | Fix Released | ||
1436745 | Audio can not output via system internal speaker on a HP machine | linux (Ubuntu Trusty) | Critical | Fix Released | ||
1436745 | Audio can not output via system internal speaker on a HP machine | linux (Ubuntu Precise) | Undecided | Fix Released |
Bug #1438504: CVE-2015-2666
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1438504 | CVE-2015-2666 | linux (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-fsl-imx51 (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-mvl-dove (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-ec2 (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-ec2 (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-fsl-imx51 (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-mvl-dove (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-ti-omap4 (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1438504 | CVE-2015-2666 | linux-ec2 (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-fsl-imx51 (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-mvl-dove (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux (Ubuntu Precise) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-ec2 (Ubuntu Precise) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-fsl-imx51 (Ubuntu Precise) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-mvl-dove (Ubuntu Precise) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-ti-omap4 (Ubuntu Precise) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1438504 | CVE-2015-2666 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-trusty (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-armadaxp (Ubuntu Precise) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-armadaxp (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-goldfish (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-goldfish (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-saucy (Ubuntu Precise) | Medium | Won't Fix | ||
1438504 | CVE-2015-2666 | linux-lts-saucy (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-saucy (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-quantal (Ubuntu Precise) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-quantal (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-quantal (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-flo (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-flo (Ubuntu Precise) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-flo (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-flo (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-mako (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-mako (Ubuntu Precise) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-mako (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-mako (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-utopic (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-utopic (Ubuntu Precise) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-utopic (Ubuntu Trusty) | Medium | Fix Released | ||
1438504 | CVE-2015-2666 | linux-lts-utopic (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-raring (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-raring (Ubuntu Precise) | Medium | Won't Fix | ||
1438504 | CVE-2015-2666 | linux-lts-raring (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-raring (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-manta (Ubuntu) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-manta (Ubuntu Precise) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-manta (Ubuntu Trusty) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-manta (Ubuntu Vivid) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-ec2 (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-flo (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-fsl-imx51 (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-goldfish (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-quantal (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-raring (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-saucy (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-lts-utopic (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-mako (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-manta (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-mvl-dove (Ubuntu Wily) | Medium | Invalid | ||
1438504 | CVE-2015-2666 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid |
Bug #1438585: no console when starting VM from cloud image
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1438585 | no console when starting VM from cloud image | linux (Ubuntu) | Medium | Fix Released | ||
1438585 | no console when starting VM from cloud image | linux (Ubuntu Utopic) | Medium | Fix Released | ||
1438585 | no console when starting VM from cloud image | linux (Ubuntu Vivid) | Medium | Fix Released | ||
1438585 | no console when starting VM from cloud image | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1439441: Kernel provides incomplete audit information when an existing monitored file is modified
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1439441 | Kernel provides incomplete audit information when an existing monitored file is modified | linux (Ubuntu) | Undecided | Fix Released | ||
1439441 | Kernel provides incomplete audit information when an existing monitored file is modified | linux (Ubuntu Trusty) | Undecided | Fix Released | ||
1439441 | Kernel provides incomplete audit information when an existing monitored file is modified | linux (Ubuntu Utopic) | Undecided | Fix Released | ||
1439441 | Kernel provides incomplete audit information when an existing monitored file is modified | linux (Ubuntu Vivid) | Undecided | Fix Released |
Bug #1439562: backport request: include support for OpenPower hardware
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1439562 | backport request: include support for OpenPower hardware | linux (Ubuntu) | Medium | Fix Released | ||
1439562 | backport request: include support for OpenPower hardware | linux (Ubuntu Vivid) | Medium | Fix Released | ||
1439562 | backport request: include support for OpenPower hardware | linux (Ubuntu Utopic) | Medium | Fix Released |
Bug #1440156: suggest patches for be2iscsi in ubuntu 14.04
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1440156 | suggest patches for be2iscsi in ubuntu 14.04 | linux (Ubuntu) | Undecided | Fix Released | ||
1440156 | suggest patches for be2iscsi in ubuntu 14.04 | linux (Ubuntu Trusty) | Undecided | Fix Released | ||
1440156 | suggest patches for be2iscsi in ubuntu 14.04 | linux (Ubuntu Vivid) | Undecided | Fix Released |
Bug #1440270: regression: backlight can't be adjusted on UX32VD with 3.19.0-12-generic kernel
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1440270 | regression: backlight can't be adjusted on UX32VD with 3.19.0-12-generic kernel | linux (Ubuntu) | High | Fix Released | ||
1440270 | regression: backlight can't be adjusted on UX32VD with 3.19.0-12-generic kernel | linux (Ubuntu Vivid) | High | Fix Released |
Bug #1440392: kernel 3.19.0-12 breaks HDMI Audio
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1440392 | kernel 3.19.0-12 breaks HDMI Audio | linux (Ubuntu) | Medium | Fix Released |
Bug #1440724: linux-image 3.19.0.12.11 will not boot - Intel mobile 965 chipset
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1440724 | linux-image 3.19.0.12.11 will not boot - Intel mobile 965 chipset | linux (Ubuntu) | Critical | Fix Released | ||
1440724 | linux-image 3.19.0.12.11 will not boot - Intel mobile 965 chipset | linux (Ubuntu Vivid) | Critical | Fix Released |
Bug #1441103: CVE-2015-2922
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1441103 | CVE-2015-2922 | linux (Ubuntu) | Medium | Fix Released | ||
1441103 | CVE-2015-2922 | linux-fsl-imx51 (Ubuntu) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-mvl-dove (Ubuntu) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-backport-maverick (Ubuntu) | Undecided | New | ||
1441103 | CVE-2015-2922 | linux-lts-backport-natty (Ubuntu) | Undecided | New | ||
1441103 | CVE-2015-2922 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-ec2 (Ubuntu) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux (Ubuntu Vivid) | Medium | Fix Released | ||
1441103 | CVE-2015-2922 | linux-ec2 (Ubuntu Vivid) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-fsl-imx51 (Ubuntu Vivid) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-backport-maverick (Ubuntu Vivid) | Undecided | New | ||
1441103 | CVE-2015-2922 | linux-lts-backport-natty (Ubuntu Vivid) | Undecided | New | ||
1441103 | CVE-2015-2922 | linux-mvl-dove (Ubuntu Vivid) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-ti-omap4 (Ubuntu Vivid) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-backport-maverick (Ubuntu Utopic) | Undecided | Won't Fix | ||
1441103 | CVE-2015-2922 | linux-lts-backport-natty (Ubuntu Utopic) | Undecided | Won't Fix | ||
1441103 | CVE-2015-2922 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1441103 | CVE-2015-2922 | linux-ec2 (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-fsl-imx51 (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-backport-maverick (Ubuntu Trusty) | Undecided | New | ||
1441103 | CVE-2015-2922 | linux-lts-backport-natty (Ubuntu Trusty) | Undecided | New | ||
1441103 | CVE-2015-2922 | linux-mvl-dove (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux (Ubuntu Precise) | Medium | Fix Released | ||
1441103 | CVE-2015-2922 | linux-ec2 (Ubuntu Precise) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-fsl-imx51 (Ubuntu Precise) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-backport-maverick (Ubuntu Precise) | Undecided | Won't Fix | ||
1441103 | CVE-2015-2922 | linux-lts-backport-natty (Ubuntu Precise) | Undecided | Won't Fix | ||
1441103 | CVE-2015-2922 | linux-mvl-dove (Ubuntu Precise) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1441103 | CVE-2015-2922 | linux-lts-backport-maverick (Ubuntu Lucid) | Undecided | Won't Fix | ||
1441103 | CVE-2015-2922 | linux-lts-backport-natty (Ubuntu Lucid) | Undecided | Won't Fix | ||
1441103 | CVE-2015-2922 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1441103 | CVE-2015-2922 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-trusty (Ubuntu Vivid) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1441103 | CVE-2015-2922 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-armadaxp (Ubuntu Vivid) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-goldfish (Ubuntu) | Medium | New | ||
1441103 | CVE-2015-2922 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-goldfish (Ubuntu Vivid) | Medium | New | ||
1441103 | CVE-2015-2922 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-saucy (Ubuntu Precise) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-saucy (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-saucy (Ubuntu Vivid) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-quantal (Ubuntu Precise) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-quantal (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-quantal (Ubuntu Vivid) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-flo (Ubuntu) | Medium | New | ||
1441103 | CVE-2015-2922 | linux-flo (Ubuntu Precise) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-flo (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-flo (Ubuntu Vivid) | Medium | Won't Fix | ||
1441103 | CVE-2015-2922 | linux-mako (Ubuntu) | Medium | New | ||
1441103 | CVE-2015-2922 | linux-mako (Ubuntu Precise) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-mako (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-mako (Ubuntu Vivid) | Medium | New | ||
1441103 | CVE-2015-2922 | linux-lts-utopic (Ubuntu) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-utopic (Ubuntu Precise) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-utopic (Ubuntu Trusty) | Medium | Fix Released | ||
1441103 | CVE-2015-2922 | linux-lts-utopic (Ubuntu Vivid) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-raring (Ubuntu) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-raring (Ubuntu Precise) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-raring (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-lts-raring (Ubuntu Vivid) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-manta (Ubuntu) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-manta (Ubuntu Precise) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-manta (Ubuntu Trusty) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-manta (Ubuntu Vivid) | Medium | New | ||
1441103 | CVE-2015-2922 | linux (Ubuntu Wily) | Medium | Fix Released | ||
1441103 | CVE-2015-2922 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1441103 | CVE-2015-2922 | linux-ec2 (Ubuntu Wily) | Medium | Invalid |
Bug #1441284: Trusty update to 3.13.11-ckt18 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1441284 | Trusty update to 3.13.11-ckt18 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1441284 | Trusty update to 3.13.11-ckt18 stable release | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1441291: support EFI rtc on arm64
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1441291 | support EFI rtc on arm64 | linux (Ubuntu) | Undecided | Fix Released | ||
1441291 | support EFI rtc on arm64 | linux (Ubuntu Utopic) | Undecided | Fix Released | ||
1441291 | support EFI rtc on arm64 | linux (Ubuntu Trusty) | Undecided | Fix Released | ||
1441291 | support EFI rtc on arm64 | linux-lts-utopic (Ubuntu) | Undecided | Invalid | ||
1441291 | support EFI rtc on arm64 | linux-lts-utopic (Ubuntu Trusty) | Undecided | Fix Released | ||
1441291 | support EFI rtc on arm64 | linux-lts-utopic (Ubuntu Utopic) | Undecided | Invalid |
Bug #1441317: Utopic update to 3.16.7-ckt9 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1441317 | Utopic update to 3.16.7-ckt9 stable release | linux (Ubuntu) | Undecided | Fix Released | ||
1441317 | Utopic update to 3.16.7-ckt9 stable release | linux (Ubuntu Utopic) | Undecided | Fix Released |
Bug #1441856: ISST-LTE:Ubuntu15.04: After migration of Ubuntu15.04 lpar, RMC connection on HMC will be lost (LPM)(kernel/powerpc-ibm-utils)
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1441856 | ISST-LTE:Ubuntu15.04: After migration of Ubuntu15.04 lpar, RMC connection on HMC will be lost (LPM)(kernel/powerpc-ibm-utils) | linux (Ubuntu) | High | Fix Released | ||
1441856 | ISST-LTE:Ubuntu15.04: After migration of Ubuntu15.04 lpar, RMC connection on HMC will be lost (LPM)(kernel/powerpc-ibm-utils) | powerpc-ibm-utils (Ubuntu) | Undecided | Fix Released |
Bug #1442165: linux: 3.19.0-13.13 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1442165 | linux: 3.19.0-13.13 -proposed tracker | linux (Ubuntu) | Undecided | Fix Released | ||
1442165 | linux: 3.19.0-13.13 -proposed tracker | linux (Ubuntu Vivid) | Undecided | Fix Released | ||
1442165 | linux: 3.19.0-13.13 -proposed tracker | Kernel Development Workflow | Medium | Fix Released | ||
1442165 | linux: 3.19.0-13.13 -proposed tracker | Kernel Development Workflow automated-testing | Medium | Won't Fix | ||
1442165 | linux: 3.19.0-13.13 -proposed tracker | Kernel Development Workflow prepare-package | Medium | Fix Released | ||
1442165 | linux: 3.19.0-13.13 -proposed tracker | Kernel Development Workflow prepare-package-meta | Medium | Fix Released | ||
1442165 | linux: 3.19.0-13.13 -proposed tracker | Kernel Development Workflow prepare-package-signed | Medium | Fix Released | ||
1442165 | linux: 3.19.0-13.13 -proposed tracker | Kernel Development Workflow promote-to-proposed | Medium | Fix Released | ||
1442165 | linux: 3.19.0-13.13 -proposed tracker | Kernel Development Workflow promote-to-release | Undecided | Fix Released |
Bug #1442285: linux: 3.13.0-50.82 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1442285 | linux: 3.13.0-50.82 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | New | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Confirmed | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Confirmed | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | New | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | New | ||
1442285 | linux: 3.13.0-50.82 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | New |
Bug #1442324: linux: 3.16.0-35.46 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1442324 | linux: 3.16.0-35.46 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | linux (Ubuntu Utopic) | Medium | Fix Released | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | New | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Confirmed | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Confirmed | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | New | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | New | ||
1442324 | linux: 3.16.0-35.46 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | New |
Bug #1442397: linux-ti-omap4: 3.2.0-1463.83 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Fix Released | ||
1442397 | linux-ti-omap4: 3.2.0-1463.83 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1442400: linux-lowlatency: 3.2.0-81.82 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | linux-lowlatency (Ubuntu) | Medium | Invalid | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | linux-lowlatency (Ubuntu Precise) | Medium | Fix Released | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | New | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | New | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | New | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | New | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | New | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Invalid | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | New | ||
1442400 | linux-lowlatency: 3.2.0-81.82 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | New |
Bug #1443946: linux: 3.16.0-36.48 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1443946 | linux: 3.16.0-36.48 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | linux (Ubuntu Utopic) | Medium | Fix Released | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1443946 | linux: 3.16.0-36.48 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1444141: linux: 3.13.0-51.84 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1444141 | linux: 3.13.0-51.84 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1444141 | linux: 3.13.0-51.84 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1444249: linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | linux-lts-utopic (Ubuntu) | Medium | Invalid | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | linux-lts-utopic (Ubuntu Trusty) | Medium | Fix Released | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1444249 | linux-lts-utopic: 3.16.0-36.48~14.04.1 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1444698: linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1444698 | linux-lts-trusty: 3.13.0-51.84~precise1 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1449311: linux-lowlatency: 3.2.0-82.83 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | linux-lowlatency (Ubuntu) | Medium | Invalid | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | linux-lowlatency (Ubuntu Precise) | Medium | Fix Released | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Invalid | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Fix Released | ||
1449311 | linux-lowlatency: 3.2.0-82.83 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1450066: IPv6 hop limit set to 0
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1450066 | IPv6 hop limit set to 0 | network-manager (Ubuntu) | High | Fix Released | ||
1450066 | IPv6 hop limit set to 0 | network-manager (Ubuntu Vivid) | High | Won't Fix | ||
1450066 | IPv6 hop limit set to 0 | NetworkManager | Critical | Fix Released | ||
1450066 | IPv6 hop limit set to 0 | network-manager (Debian) | Unknown | New |
See the
CVE page on Mitre.org
for more details.