CVE 2014-7842
Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.
Related bugs and status
CVE-2014-7842 (Candidate) is related to these bugs:
Bug #1335478: A new instance of IBM Domino 'bindsock' cannot bind to ports <1024 Kernel 3.13.0-29 and above
Bug #1386395: CVE-2014-8369
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1386395 | CVE-2014-8369 | linux (Ubuntu) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-fsl-imx51 (Ubuntu) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-mvl-dove (Ubuntu) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-backport-maverick (Ubuntu) | Undecided | New | ||
1386395 | CVE-2014-8369 | linux-lts-backport-natty (Ubuntu) | Undecided | New | ||
1386395 | CVE-2014-8369 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-ec2 (Ubuntu) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux (Ubuntu Vivid) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-ec2 (Ubuntu Vivid) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-fsl-imx51 (Ubuntu Vivid) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-backport-maverick (Ubuntu Vivid) | Undecided | New | ||
1386395 | CVE-2014-8369 | linux-lts-backport-natty (Ubuntu Vivid) | Undecided | New | ||
1386395 | CVE-2014-8369 | linux-mvl-dove (Ubuntu Vivid) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-ti-omap4 (Ubuntu Vivid) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-backport-maverick (Ubuntu Utopic) | Undecided | Won't Fix | ||
1386395 | CVE-2014-8369 | linux-lts-backport-natty (Ubuntu Utopic) | Undecided | Won't Fix | ||
1386395 | CVE-2014-8369 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1386395 | CVE-2014-8369 | linux-ec2 (Ubuntu Trusty) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-fsl-imx51 (Ubuntu Trusty) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-backport-maverick (Ubuntu Trusty) | Undecided | New | ||
1386395 | CVE-2014-8369 | linux-lts-backport-natty (Ubuntu Trusty) | Undecided | New | ||
1386395 | CVE-2014-8369 | linux-mvl-dove (Ubuntu Trusty) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux (Ubuntu Precise) | Medium | Fix Released | ||
1386395 | CVE-2014-8369 | linux-ec2 (Ubuntu Precise) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-fsl-imx51 (Ubuntu Precise) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-backport-maverick (Ubuntu Precise) | Undecided | Won't Fix | ||
1386395 | CVE-2014-8369 | linux-lts-backport-natty (Ubuntu Precise) | Undecided | Won't Fix | ||
1386395 | CVE-2014-8369 | linux-mvl-dove (Ubuntu Precise) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1386395 | CVE-2014-8369 | linux-lts-backport-maverick (Ubuntu Lucid) | Undecided | Won't Fix | ||
1386395 | CVE-2014-8369 | linux-lts-backport-natty (Ubuntu Lucid) | Undecided | Won't Fix | ||
1386395 | CVE-2014-8369 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1386395 | CVE-2014-8369 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-armadaxp (Ubuntu Vivid) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-saucy (Ubuntu Precise) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-saucy (Ubuntu Trusty) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-saucy (Ubuntu Vivid) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-quantal (Ubuntu Precise) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-quantal (Ubuntu Trusty) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-quantal (Ubuntu Vivid) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-raring (Ubuntu) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-raring (Ubuntu Precise) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-raring (Ubuntu Trusty) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-raring (Ubuntu Vivid) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1386395 | CVE-2014-8369 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-trusty (Ubuntu Vivid) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-utopic (Ubuntu) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-utopic (Ubuntu Precise) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-utopic (Ubuntu Trusty) | Medium | Fix Released | ||
1386395 | CVE-2014-8369 | linux-lts-utopic (Ubuntu Vivid) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux (Ubuntu Wily) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-ec2 (Ubuntu Wily) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-fsl-imx51 (Ubuntu Wily) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-backport-maverick (Ubuntu Wily) | Undecided | New | ||
1386395 | CVE-2014-8369 | linux-lts-backport-natty (Ubuntu Wily) | Undecided | New | ||
1386395 | CVE-2014-8369 | linux-lts-quantal (Ubuntu Wily) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-raring (Ubuntu Wily) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-saucy (Ubuntu Wily) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-lts-utopic (Ubuntu Wily) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-mvl-dove (Ubuntu Wily) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-goldfish (Ubuntu) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-goldfish (Ubuntu Vivid) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-goldfish (Ubuntu Wily) | Medium | Invalid | ||
1386395 | CVE-2014-8369 | linux-flo (Ubuntu) | Medium | Invalid |
Bug #1392823: CVE-2014-7842
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1392823 | CVE-2014-7842 | linux (Ubuntu) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-fsl-imx51 (Ubuntu) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-mvl-dove (Ubuntu) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-backport-maverick (Ubuntu) | Undecided | New | ||
1392823 | CVE-2014-7842 | linux-lts-backport-natty (Ubuntu) | Undecided | New | ||
1392823 | CVE-2014-7842 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-ec2 (Ubuntu) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux (Ubuntu Vivid) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-ec2 (Ubuntu Vivid) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-fsl-imx51 (Ubuntu Vivid) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-backport-maverick (Ubuntu Vivid) | Undecided | New | ||
1392823 | CVE-2014-7842 | linux-lts-backport-natty (Ubuntu Vivid) | Undecided | New | ||
1392823 | CVE-2014-7842 | linux-mvl-dove (Ubuntu Vivid) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-ti-omap4 (Ubuntu Vivid) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-backport-maverick (Ubuntu Utopic) | Undecided | Won't Fix | ||
1392823 | CVE-2014-7842 | linux-lts-backport-natty (Ubuntu Utopic) | Undecided | Won't Fix | ||
1392823 | CVE-2014-7842 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1392823 | CVE-2014-7842 | linux-ec2 (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-fsl-imx51 (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-backport-maverick (Ubuntu Trusty) | Undecided | New | ||
1392823 | CVE-2014-7842 | linux-lts-backport-natty (Ubuntu Trusty) | Undecided | New | ||
1392823 | CVE-2014-7842 | linux-mvl-dove (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux (Ubuntu Precise) | Medium | Fix Released | ||
1392823 | CVE-2014-7842 | linux-ec2 (Ubuntu Precise) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-fsl-imx51 (Ubuntu Precise) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-backport-maverick (Ubuntu Precise) | Undecided | Won't Fix | ||
1392823 | CVE-2014-7842 | linux-lts-backport-natty (Ubuntu Precise) | Undecided | Won't Fix | ||
1392823 | CVE-2014-7842 | linux-mvl-dove (Ubuntu Precise) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1392823 | CVE-2014-7842 | linux-lts-backport-maverick (Ubuntu Lucid) | Undecided | Won't Fix | ||
1392823 | CVE-2014-7842 | linux-lts-backport-natty (Ubuntu Lucid) | Undecided | Won't Fix | ||
1392823 | CVE-2014-7842 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1392823 | CVE-2014-7842 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-armadaxp (Ubuntu Vivid) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-saucy (Ubuntu Precise) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-saucy (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-saucy (Ubuntu Vivid) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-quantal (Ubuntu Precise) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-quantal (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-quantal (Ubuntu Vivid) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-raring (Ubuntu) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-raring (Ubuntu Precise) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-raring (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-raring (Ubuntu Vivid) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1392823 | CVE-2014-7842 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-trusty (Ubuntu Vivid) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-utopic (Ubuntu) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-utopic (Ubuntu Precise) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-lts-utopic (Ubuntu Trusty) | Medium | Fix Released | ||
1392823 | CVE-2014-7842 | linux-lts-utopic (Ubuntu Vivid) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-goldfish (Ubuntu) | Medium | New | ||
1392823 | CVE-2014-7842 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-goldfish (Ubuntu Vivid) | Medium | New | ||
1392823 | CVE-2014-7842 | linux-flo (Ubuntu) | Medium | New | ||
1392823 | CVE-2014-7842 | linux-flo (Ubuntu Precise) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-flo (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-flo (Ubuntu Vivid) | Medium | Won't Fix | ||
1392823 | CVE-2014-7842 | linux-mako (Ubuntu) | Medium | New | ||
1392823 | CVE-2014-7842 | linux-mako (Ubuntu Precise) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-mako (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-mako (Ubuntu Vivid) | Medium | New | ||
1392823 | CVE-2014-7842 | linux-manta (Ubuntu) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-manta (Ubuntu Precise) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-manta (Ubuntu Trusty) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-manta (Ubuntu Vivid) | Medium | New | ||
1392823 | CVE-2014-7842 | linux (Ubuntu Wily) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1392823 | CVE-2014-7842 | linux-ec2 (Ubuntu Wily) | Medium | Invalid |
Bug #1400289: Hyper-V: drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1400289 | Hyper-V: drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze | linux (Ubuntu) | High | Fix Released | ||
1400289 | Hyper-V: drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze | linux (Ubuntu Utopic) | High | Fix Released | ||
1400289 | Hyper-V: drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze | linux (Ubuntu Vivid) | High | Fix Released | ||
1400289 | Hyper-V: drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze | linux (Ubuntu Trusty) | High | Fix Released | ||
1400289 | Hyper-V: drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze | linux (Ubuntu Precise) | High | Fix Released |
Bug #1402551: High memory usage of Xorg and kwin after Xorg security updates [nvidia]
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1402551 | High memory usage of Xorg and kwin after Xorg security updates [nvidia] | nvidia-graphics-drivers-331-updates (Ubuntu) | Undecided | Confirmed | ||
1402551 | High memory usage of Xorg and kwin after Xorg security updates [nvidia] | nvidia-graphics-drivers-304-updates (Ubuntu) | Undecided | Confirmed | ||
1402551 | High memory usage of Xorg and kwin after Xorg security updates [nvidia] | kde-workspace (Ubuntu) | Undecided | In Progress |
Bug #1403154: linux: 3.2.0-75.110 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1403154 | linux: 3.2.0-75.110 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | linux (Ubuntu Precise) | Medium | Fix Released | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | Kernel SRU Workflow prepare-package-lbm | Medium | Fix Released | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1403154 | linux: 3.2.0-75.110 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1403239: linux-ti-omap4: 3.2.0-1458.78 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Fix Released | ||
1403239 | linux-ti-omap4: 3.2.0-1458.78 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1403240: linux-armadaxp: 3.2.0-1643.62 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Invalid | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Invalid | ||
1403240 | linux-armadaxp: 3.2.0-1643.62 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1403242: linux-lowlatency: 3.2.0-75.77 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | linux-lowlatency (Ubuntu) | Medium | Invalid | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | linux-lowlatency (Ubuntu Precise) | Medium | Fix Released | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Invalid | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Fix Released | ||
1403242 | linux-lowlatency: 3.2.0-75.77 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
See the
CVE page on Mitre.org
for more details.