CVE 2014-7822
The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.
Related bugs and status
CVE-2014-7822 (Candidate) is related to these bugs:
Bug #1400215: Atheros BT devices(ath3k) fail to work on USB3.0 buses
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1400215 | Atheros BT devices(ath3k) fail to work on USB3.0 buses | linux (Ubuntu) | High | Fix Released | ||
1400215 | Atheros BT devices(ath3k) fail to work on USB3.0 buses | HWE Next | High | Fix Released | ||
1400215 | Atheros BT devices(ath3k) fail to work on USB3.0 buses | linux (Ubuntu Trusty) | High | Fix Released | ||
1400215 | Atheros BT devices(ath3k) fail to work on USB3.0 buses | linux (Ubuntu Utopic) | High | Fix Released | ||
1400215 | Atheros BT devices(ath3k) fail to work on USB3.0 buses | linux (Ubuntu Vivid) | High | Fix Released | ||
1400215 | Atheros BT devices(ath3k) fail to work on USB3.0 buses | linux (Ubuntu Precise) | High | Fix Released |
Bug #1408972: openvswitch: failed to flow_del (No such file or directory)
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1408972 | openvswitch: failed to flow_del (No such file or directory) | linux (Ubuntu) | High | Invalid | ||
1408972 | openvswitch: failed to flow_del (No such file or directory) | openvswitch (Ubuntu) | Undecided | Invalid | ||
1408972 | openvswitch: failed to flow_del (No such file or directory) | linux (Ubuntu Trusty) | High | Fix Released | ||
1408972 | openvswitch: failed to flow_del (No such file or directory) | openvswitch (Ubuntu Trusty) | Undecided | New |
Bug #1410704: [HP 14 Notebook PC] mute LED does not work
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1410704 | [HP 14 Notebook PC] mute LED does not work | linux (Ubuntu) | Medium | Fix Released | ||
1410704 | [HP 14 Notebook PC] mute LED does not work | HWE Next | Medium | Fix Released | ||
1410704 | [HP 14 Notebook PC] mute LED does not work | linux (Ubuntu Utopic) | Undecided | Fix Released | ||
1410704 | [HP 14 Notebook PC] mute LED does not work | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1416498: CVE-2014-7822
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1416498 | CVE-2014-7822 | linux (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-fsl-imx51 (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-mvl-dove (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-backport-maverick (Ubuntu) | Undecided | New | ||
1416498 | CVE-2014-7822 | linux-lts-backport-natty (Ubuntu) | Undecided | New | ||
1416498 | CVE-2014-7822 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-ec2 (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-ec2 (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-fsl-imx51 (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-backport-maverick (Ubuntu Vivid) | Undecided | New | ||
1416498 | CVE-2014-7822 | linux-lts-backport-natty (Ubuntu Vivid) | Undecided | New | ||
1416498 | CVE-2014-7822 | linux-mvl-dove (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-ti-omap4 (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-backport-maverick (Ubuntu Utopic) | Undecided | Won't Fix | ||
1416498 | CVE-2014-7822 | linux-lts-backport-natty (Ubuntu Utopic) | Undecided | Won't Fix | ||
1416498 | CVE-2014-7822 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1416498 | CVE-2014-7822 | linux-ec2 (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-fsl-imx51 (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-backport-maverick (Ubuntu Trusty) | Undecided | New | ||
1416498 | CVE-2014-7822 | linux-lts-backport-natty (Ubuntu Trusty) | Undecided | New | ||
1416498 | CVE-2014-7822 | linux-mvl-dove (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux (Ubuntu Precise) | Medium | Fix Released | ||
1416498 | CVE-2014-7822 | linux-ec2 (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-fsl-imx51 (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-backport-maverick (Ubuntu Precise) | Undecided | Won't Fix | ||
1416498 | CVE-2014-7822 | linux-lts-backport-natty (Ubuntu Precise) | Undecided | Won't Fix | ||
1416498 | CVE-2014-7822 | linux-mvl-dove (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1416498 | CVE-2014-7822 | linux-lts-backport-maverick (Ubuntu Lucid) | Undecided | Won't Fix | ||
1416498 | CVE-2014-7822 | linux-lts-backport-natty (Ubuntu Lucid) | Undecided | Won't Fix | ||
1416498 | CVE-2014-7822 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1416498 | CVE-2014-7822 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-trusty (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1416498 | CVE-2014-7822 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-armadaxp (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-goldfish (Ubuntu) | Medium | New | ||
1416498 | CVE-2014-7822 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-goldfish (Ubuntu Vivid) | Medium | New | ||
1416498 | CVE-2014-7822 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-saucy (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-saucy (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-saucy (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-quantal (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-quantal (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-quantal (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-flo (Ubuntu) | Medium | New | ||
1416498 | CVE-2014-7822 | linux-flo (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-flo (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-flo (Ubuntu Vivid) | Medium | Won't Fix | ||
1416498 | CVE-2014-7822 | linux-mako (Ubuntu) | Medium | New | ||
1416498 | CVE-2014-7822 | linux-mako (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-mako (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-mako (Ubuntu Vivid) | Medium | New | ||
1416498 | CVE-2014-7822 | linux-lts-utopic (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-utopic (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-utopic (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-utopic (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-raring (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-raring (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-raring (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-raring (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-manta (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-manta (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-manta (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-manta (Ubuntu Vivid) | Medium | New | ||
1416498 | CVE-2014-7822 | linux (Ubuntu Wily) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-ec2 (Ubuntu Wily) | Medium | Invalid |
Bug #1423292: [Anders 2]GPU driver throws a call trace in dmesg
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1423292 | [Anders 2]GPU driver throws a call trace in dmesg | linux (Ubuntu) | Medium | Invalid | ||
1423292 | [Anders 2]GPU driver throws a call trace in dmesg | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1423292 | [Anders 2]GPU driver throws a call trace in dmesg | linux (Ubuntu Utopic) | Medium | Fix Released |
Bug #1427413: Precise update to 3.2.67 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1427413 | Precise update to 3.2.67 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1427413 | Precise update to 3.2.67 stable release | linux (Ubuntu Precise) | Undecided | Fix Released |
Bug #1427438: Trusty update to 3.13.11-ckt16 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1427438 | Trusty update to 3.13.11-ckt16 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1427438 | Trusty update to 3.13.11-ckt16 stable release | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1427733: linux: 3.13.0-47.78 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1427733 | linux: 3.13.0-47.78 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | In Progress | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Confirmed | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Confirmed | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | In Progress | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | In Progress | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1427736: linux: 3.2.0-78.113 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1427736 | linux: 3.2.0-78.113 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | In Progress | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Confirmed | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | Kernel SRU Workflow prepare-package-lbm | Medium | Fix Released | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Confirmed | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | In Progress | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | In Progress | ||
1427736 | linux: 3.2.0-78.113 -proposed tracker | linux (Ubuntu Precise) | Undecided | Fix Released |
Bug #1427847: linux-ti-omap4: 3.2.0-1461.81 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Fix Released | ||
1427847 | linux-ti-omap4: 3.2.0-1461.81 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1429821: CVE-2015-0274
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1429821 | CVE-2015-0274 | linux (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-fsl-imx51 (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-mvl-dove (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-maverick (Ubuntu) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-natty (Ubuntu) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-ti-omap4 (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ec2 (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ec2 (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-fsl-imx51 (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-maverick (Ubuntu Vivid) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-natty (Ubuntu Vivid) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-mvl-dove (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ti-omap4 (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-maverick (Ubuntu Utopic) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-natty (Ubuntu Utopic) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux (Ubuntu Trusty) | High | Fix Released | ||
1429821 | CVE-2015-0274 | linux-ec2 (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-fsl-imx51 (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-maverick (Ubuntu Trusty) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-natty (Ubuntu Trusty) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-mvl-dove (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ti-omap4 (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ec2 (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-fsl-imx51 (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-maverick (Ubuntu Precise) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-natty (Ubuntu Precise) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-mvl-dove (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ti-omap4 (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-maverick (Ubuntu Lucid) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-natty (Ubuntu Lucid) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-trusty (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-trusty (Ubuntu Precise) | High | Fix Released | ||
1429821 | CVE-2015-0274 | linux-lts-trusty (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-trusty (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-armadaxp (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-armadaxp (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-armadaxp (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-armadaxp (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-goldfish (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-goldfish (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-goldfish (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-goldfish (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-saucy (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-saucy (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-saucy (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-saucy (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-quantal (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-quantal (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-quantal (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-quantal (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-flo (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-flo (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-flo (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-flo (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-mako (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-mako (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-mako (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-mako (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-utopic (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-utopic (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-utopic (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-utopic (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-raring (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-raring (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-raring (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-raring (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-manta (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-manta (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-manta (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-manta (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux (Ubuntu Wily) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-armadaxp (Ubuntu Wily) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ec2 (Ubuntu Wily) | High | Invalid |
Bug #1431263: linux: 3.13.0-48.80 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1431263 | linux: 3.13.0-48.80 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1431280: x86: mm/fault: Fix semaphore imbalance
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1431280 | x86: mm/fault: Fix semaphore imbalance | linux (Ubuntu) | Undecided | Invalid | ||
1431280 | x86: mm/fault: Fix semaphore imbalance | linux (Ubuntu Precise) | Undecided | Fix Released |
Bug #1431359: linux: 3.2.0-79.115 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1431359 | linux: 3.2.0-79.115 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | linux (Ubuntu Precise) | Medium | Fix Released | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | Kernel SRU Workflow prepare-package-lbm | Medium | Fix Released | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1431359 | linux: 3.2.0-79.115 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1431491: linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
See the
CVE page on Mitre.org
for more details.