[Kernel-packages] [Bug 812360] Re: linux: 2.6.24-29.92 -proposed tracker
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/812360 Title: linux: 2.6.24-29.92 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Fix Released Bug description: This bug is for tracking the 2.6.24-29.92 upload package. This bug will contain status and testing results releated to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 18. July 2011 15:31 UTC kernel-stable-Promote-to-updates-end:Tuesday, 08. August 2011 21:40 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/812360/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 706149] Re: CVE-2010-4074
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/706149 Title: CVE-2010-4074 Status in linux package in Ubuntu: Fix Released Status in linux source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux source package in Karmic: Fix Released Bug description: The USB subsystem in the Linux kernel before 2.6.36-rc5 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to TIOCGICOUNT ioctl calls, and the (1) mos7720_ioctl function in drivers/usb/serial/mos7720.c and (2) mos7840_ioctl function in drivers/usb/serial/mos7840.c. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/706149/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 803931] Re: CVE-2010-4238
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/803931 Title: CVE-2010-4238 Status in linux package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Invalid Status in linux-fsl-imx51 source package in Lucid: Invalid Status in linux-lts-backport-maverick source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Invalid Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Invalid Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-lts-backport-maverick source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Invalid Status in linux-ti-omap4 source package in Maverick: Invalid Status in linux source package in Natty: Invalid Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Oneiric: Invalid Status in linux-fsl-imx51 source package in Oneiric: Invalid Status in linux-lts-backport-maverick source package in Oneiric: Invalid Status in linux-mvl-dove source package in Oneiric: Invalid Status in linux-ti-omap4 source package in Oneiric: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-lts-backport-maverick source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Bug description: The vbd_create function in Xen 3.1.2, when the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 is used, allows guest OS users to cause a denial of service (host OS panic) via an attempted access to a virtual CD-ROM device through the blkback driver. NOTE: some of these details are obtained from third party information. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/803931/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 731971] Re: CVE-2010-4346
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/731971 Title: CVE-2010-4346 Status in linux package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-lts-backport-maverick source package in Lucid: Won't Fix Status in linux-mvl-dove source package in Lucid: In Progress Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-lts-backport-maverick source package in Maverick: Won't Fix Status in linux-mvl-dove source package in Maverick: Won't Fix Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Invalid Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Invalid Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-lts-backport-maverick source package in Dapper: Won't Fix Status in linux-mvl-dove source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-lts-backport-maverick source package in Hardy: Won't Fix Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-lts-backport-maverick source package in Karmic: Won't Fix Status in linux-mvl-dove source package in Karmic: Invalid Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: The install_special_mapping function in mm/mmap.c in the Linux kernel before 2.6.37-rc6 does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application. upstream commit: 462e635e5b73ba9a4c03913b77138cd57ce4b050 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/731971/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 709153] Re: CVE-2010-3865
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/709153 Title: CVE-2010-3865 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Invalid Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-mvl-dove source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Invalid Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-mvl-dove source package in Karmic: Invalid Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/709153/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 712609] Re: CVE-2010-4248
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/712609 Title: CVE-2010-4248 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Invalid Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: posix-cpu-timers.c correctly assumes that the dying process does posix_cpu_timers_exit_group() and removes all !CPUCLOCK_PERTHREAD timers from signal->cpu_timers list. But, it also assumes that timer->it.cpu.task is always the group leader, and thus the dead ->task means the dead thread group. This is obviously not true after de_thread() changes the leader. After that almost every posix_cpu_timer_ method has problems. It is not simple to fix this bug correctly. First of all, I think that timer->it.cpu should use struct pid instead of task_struct. Also, the locking should be reworked completely. In particular, tasklist_lock should not be used at all. This all needs a lot of nontrivial and hard-to-test changes. Change __exit_signal() to do posix_cpu_timers_exit_group() when the old leader dies during exec. This is not the fix, just the temporary hack to hide the problem for 2.6.37 and stable. IOW, this is obviously wrong but this is what we currently have anyway: cpu timers do not work after mt exec. In theory this change adds another race. The exiting leader can detach the timers which were attached to the new leader. However, the window between de_thread() and release_task() is small, we can pretend that sys_timer_create() was called before de_thread(). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712609/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 688669] Re: Lucid update to 2.6.32.27+drm33.12 stable release
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/688669 Title: Lucid update to 2.6.32.27+drm33.12 stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 2.6.32.27+drm33.12 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/pub/scm/linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git http://git.kernel.org/?p=linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git;a=summary TEST CASE: TBD The following 126 patches are in the 2.6.32.27+drm33.12 stable release: * block: Ensure physical block size is unsigned int * block: limit vec count in bio_kmalloc() and bio_alloc_map_data() * block: take care not to overflow when calculating total iov length * block: check for proper length of iov entries in blk_rq_map_user_iov() * jme: Fix PHY power-off error * irda: Fix parameter extraction stack overflow * irda: Fix heap memory corruption in iriap.c * i2c-pca-platform: Change device name of request_irq * microblaze: Fix build with make 3.82 * net: clear heap allocation for ETHTOOL_GRXCLSRLALL * Staging: asus_oled: fix up some sysfs attribute permissions * Staging: asus_oled: fix up my fixup for some sysfs attribute permissions * Staging: line6: fix up some sysfs attribute permissions * hpet: fix unwanted interrupt due to stale irq status bit * hpet: unmap unused I/O space * olpc_battery: Fix endian neutral breakage for s16 values * percpu: fix list_head init bug in __percpu_counter_init() * um: remove PAGE_SIZE alignment in linker script causing kernel segfault. * um: fix global timer issue when using CONFIG_NO_HZ * numa: fix slab_node(MPOL_BIND) * hwmon: (lm85) Fix ADT7468 frequency table * mm: fix return value of scan_lru_pages in memory unplug * mm: fix is_mem_section_removable() page_order BUG_ON check * ahci,ata_generic: let ata_generic handle new MBP w/ MCP89 * ata_generic: implement ATA_GEN_* flags and force enable DMA on MBP 7,1 * ssb: b43-pci-bridge: Add new vendor for BCM4318 * sgi-xpc: XPC fails to discover partitions with all nasids above 128 * xen: ensure that all event channels start off bound to VCPU 0 * xen: don't bother to stop other cpus on shutdown/reboot * ipc: initialize structure memory to zero for compat functions * ipc: shm: fix information leak to userland * sys_semctl: fix kernel stack leakage * net: NETIF_F_HW_CSUM does not imply FCoE CRC offload * drivers/char/vt_ioctl.c: fix VT_OPENQRY error value * viafb: use proper register for colour when doing fill ops * eCryptfs: Clear LOOKUP_OPEN flag when creating lower file * md/raid1: really fix recovery looping when single good device fails. * md: fix return value of rdev_size_change() * x86: AMD Northbridge: Verify NB's node is online * tty: prevent DOS in the flush_to_ldisc * TTY: restore tty_ldisc_wait_idle * tty_ldisc: Fix BUG() on hangup * TTY: ldisc, fix open flag handling * KVM: VMX: fix vmx null pointer dereference on debug register access * KVM: x86: fix information leak to userland * KVM: VMX: Fix host userspace gsbase corruption * firewire: cdev: fix information leak * firewire: core: fix an information leak * firewire: ohci: fix buffer overflow in AR split packet handling * firewire: ohci: fix race in AR split packet handling * ALSA: ac97: Apply quirk for Dell Latitude D610 binding Master and Headphone controls * ALSA: HDA: Add an extra DAC for Realtek ALC887-VD * ALSA: hda: Use "alienware" model quirk for another SSID * netfilter: nf_conntrack: allow nf_ct_alloc_hashtable() to get highmem pages * latencytop: fix per task accumulator * mm/vfs: revalidate page->mapping in do_generic_file_read() * bio: take care not overflow page count when mapping/copying user data * libata-scsi passthru: fix bug which truncated LBA48 return values * libata: fix NULL sdev dereference race in atapi_qc_complete() * PCI: fix size checks for mmap() on /proc/bus/pci files * PCI: fix offset check for sysfs mmapped files * efifb: check that the base address is plausible on pci systems * USB: gadget: AT91: fix typo in atmel_usba_udc driver * USB: ftdi_sio: add device IDs for Milkymist One JTAG/serial * USB: option: fix when the drive
[Kernel-packages] [Bug 690730] Re: Maverick update to 2.6.35.10 stable upstream
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/690730 Title: Maverick update to 2.6.35.10 stable upstream Status in linux package in Ubuntu: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 2.6.35.10 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.10 http://kernel.org/pub/linux/kernel/v2.6/patch-2.6.35.10.bz2 The following patches are in the 2.6.35.10 stable release: * block: Ensure physical block size is unsigned int * block: Fix race during disk initialization * block: limit vec count in bio_kmalloc() and bio_alloc_map_data() * block: take care not to overflow when calculating total iov length * block: check for proper length of iov entries in blk_rq_map_user_iov() * drm/radeon/kms: don't disable shared encoders on pre-DCE3 display blocks * jme: Fix PHY power-off error * irda: Fix parameter extraction stack overflow * irda: Fix heap memory corruption in iriap.c * cfg80211: fix BSS double-unlinking * cfg80211: fix locking * cfg80211: fix regression on processing country IEs * mac80211: fix channel assumption for association done work * mac80211: fix offchannel assumption upon association * mac80211: Fix signal strength average initialization for CQM events * mac80211: add helper for reseting the connection monitor * mac80211: reset connection idle when going offchannel * mac80211: make the beacon monitor available externally * mac80211: send last 3/5 probe requests as unicast * mac80211: disable beacon monitor while going offchannel * mac80211: use correct station flags lock * mac80211: clear txflags for ps-filtered frames * mac80211: reset probe send counter upon connection timer reset * mac80211: Fix ibss station got expired immediately * mac80211: don't sanitize invalid rates * mac80211: delete AddBA response timer * isdn/gigaset: fix bas_gigaset AT read error handling * isdn/gigaset: correct bas_gigaset rx buffer handling * isdn/gigaset: bas_gigaset locking fix * i2c-pca-platform: Change device name of request_irq * viafb: fix i2c_transfer error handling * drm/radeon/kms: register an i2c adapter name for the dp aux bus * ALSA: hda - Fix wrong SPDIF NID assignment for CA0110 * ALSA: hda - Add some workarounds for Creative IBG * ALSA: OSS mixer emulation - fix locking * ALSA: HDA: Enable internal mic on Dell E6410 and Dell E6510 * powerpc: Fix call to subpage_protection() * microblaze: Fix build with make 3.82 * NFSv4: Don't call nfs4_reclaim_complete() on receiving NFS4ERR_STALE_CLIENTID * NFSv4: Don't call nfs4_state_mark_reclaim_reboot() from error handlers * NFSv4: Fix open recovery * NFS: Don't SIGBUS if nfs_vm_page_mkwrite races with a cache invalidation * drm/radeon/kms: MC vram map needs to be >= pci aperture size * drm/radeon/kms: properly compute group_size on 6xx/7xx * drm/radeon/kms: make sure blit addr masks are 64 bit * drm/radeon/kms: fix handling of tex lookup disable in cs checker on r2xx * drm/i915: Free hardware status page on unload when physically mapped * drm/i915: diasable clock gating for the panel power sequencer * drm/i915/overlay: Ensure that the reg_bo is in the GTT prior to writing. * pcnet_cs: add new_id * SH: Add missing consts to sys_execve() declaration * reiserfs: fix inode mutex - reiserfs lock misordering * reiserfs: don't acquire lock recursively in reiserfs_acl_chmod * staging: rt2870: Add new USB ID for Belkin F6D4050 v1 * Staging: asus_oled: fix up some sysfs attribute permissions * Staging: asus_oled: fix up my fixup for some sysfs attribute permissions * ALSA: hda: Use hp-laptop quirk to enable headphones automute for Asus A52J * Staging: line6: fix up some sysfs attribute permissions * hpet: fix unwanted interrupt due to stale irq status bit * hpet: unmap unused I/O space * olpc_battery: Fix endian neutral breakage for s16 values * percpu: fix list_head init bug in __percpu_counter_init() * ipmi: proper spinlock initialization * um: remove PAGE_SIZE alignment in linker script causing kernel segfault. * um: fix global timer issue when using CONFIG_NO_HZ * numa: fix slab_node(MPOL_BIND) * hwmon: (lm85) Fix ADT7468 frequency table * oprofile: Fix the hang while taking the cpu offline * mm: fix return value of scan_lru_pages in memory un
[Kernel-packages] [Bug 801482] Re: CVE-2011-1171
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/801482 Title: CVE-2011-1171 Status in linux package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-lts-backport-natty package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-ec2 source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-lts-backport-maverick source package in Lucid: Fix Released Status in linux-lts-backport-natty source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-ec2 source package in Maverick: Invalid Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-lts-backport-maverick source package in Maverick: Invalid Status in linux-lts-backport-natty source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-ec2 source package in Natty: Invalid Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-lts-backport-natty source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Fix Released Status in linux source package in Oneiric: Invalid Status in linux-ec2 source package in Oneiric: Invalid Status in linux-fsl-imx51 source package in Oneiric: Invalid Status in linux-lts-backport-maverick source package in Oneiric: Invalid Status in linux-lts-backport-natty source package in Oneiric: Invalid Status in linux-mvl-dove source package in Oneiric: Invalid Status in linux-ti-omap4 source package in Oneiric: Invalid Status in linux source package in Hardy: Fix Released Status in linux-ec2 source package in Hardy: Invalid Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-lts-backport-maverick source package in Hardy: Invalid Status in linux-lts-backport-natty source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Bug description: net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process. Break-Fix: - 78b79876761b86653df89c48a7010b5cbd41a84a To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801482/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 721282] Re: CVE-2010-4158
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/721282 Title: CVE-2010-4158 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Won't Fix Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Invalid Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721282/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 706999] Re: CVE-2010-3448
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/706999 Title: CVE-2010-3448 Status in linux package in Ubuntu: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-linaro package in Ubuntu: Won't Fix Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-lts-backport-natty package in Ubuntu: Invalid Status in linux-lts-backport-oneiric package in Ubuntu: Invalid Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-qcm-msm package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-armadaxp source package in Lucid: Invalid Status in linux-ec2 source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-linaro source package in Lucid: Won't Fix Status in linux-lts-backport-maverick source package in Lucid: Fix Released Status in linux-lts-backport-natty source package in Lucid: Invalid Status in linux-lts-backport-oneiric source package in Lucid: Invalid Status in linux-lts-quantal source package in Lucid: Invalid Status in linux-lts-raring source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-qcm-msm source package in Lucid: Invalid Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux-linaro source package in Oneiric: Won't Fix Status in linux-qcm-msm source package in Oneiric: Won't Fix Status in linux source package in Precise: Invalid Status in linux-armadaxp source package in Precise: Invalid Status in linux-ec2 source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-linaro source package in Precise: New Status in linux-lts-backport-maverick source package in Precise: Invalid Status in linux-lts-backport-natty source package in Precise: Invalid Status in linux-lts-backport-oneiric source package in Precise: Invalid Status in linux-lts-quantal source package in Precise: Invalid Status in linux-lts-raring source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-qcm-msm source package in Precise: New Status in linux-ti-omap4 source package in Precise: Invalid Status in linux source package in Quantal: Fix Released Status in linux-armadaxp source package in Quantal: Invalid Status in linux-ec2 source package in Quantal: Invalid Status in linux-fsl-imx51 source package in Quantal: Invalid Status in linux-linaro source package in Quantal: Won't Fix Status in linux-lts-backport-maverick source package in Quantal: Invalid Status in linux-lts-backport-natty source package in Quantal: Invalid Status in linux-lts-backport-oneiric source package in Quantal: Invalid Status in linux-lts-quantal source package in Quantal: Invalid Status in linux-lts-raring source package in Quantal: Invalid Status in linux-mvl-dove source package in Quantal: Invalid Status in linux-qcm-msm source package in Quantal: Invalid Status in linux-ti-omap4 source package in Quantal: Invalid Status in linux source package in Raring: Fix Released Status in linux-armadaxp source package in Raring: Invalid Status in linux-ec2 source package in Raring: Invalid Status in linux-fsl-imx51 source package in Raring: Invalid Status in linux-linaro source package in Raring: Won't Fix Status in linux-lts-backport-maverick source package in Raring: Invalid Status in linux-lts-backport-natty source package in Raring: Invalid Status in linux-lts-backport-oneiric source package in Raring: Invalid Status in linux-lts-quantal source package in Raring: Invalid Status in linux-lts-raring source package in Raring: Invalid Status in linux-mvl-dove source package in Raring: Invalid Status in linux-qcm-msm source package in Raring: Invalid Status in linux-ti-omap4 source package in Raring: Invalid Status in linux-linaro source package in Hardy: Won't Fix Status in linux-qcm-msm source package in Hardy: Invalid Bug description: drivers/platform/x86/thinkpad_acpi.c in the Linux kernel before 2.6.34 on ThinkPad devices, when the X.Org X server is used, does not properly restrict access to the video output control state, which allows local users to cause a denial of service (system hang) via a (1) read or (2) write operation. Break-Fix: - b525c06cdbd8a3963f0173ccd23f9147d4c384b5 To manage notifications about this bug go to:
[Kernel-packages] [Bug 737073] Re: CVE-2010-4527
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/737073 Title: CVE-2010-4527 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-lts-backport-maverick source package in Lucid: Won't Fix Status in linux-mvl-dove source package in Lucid: In Progress Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-lts-backport-maverick source package in Maverick: Won't Fix Status in linux-mvl-dove source package in Maverick: Won't Fix Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Won't Fix Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-lts-backport-maverick source package in Dapper: Won't Fix Status in linux-mvl-dove source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-lts-backport-maverick source package in Hardy: Won't Fix Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Won't Fix Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-lts-backport-maverick source package in Karmic: Won't Fix Status in linux-mvl-dove source package in Karmic: Invalid Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: The load_mixer_volumes function in sound/oss/soundcard.c in the OSS sound subsystem in the Linux kernel before 2.6.37 incorrectly expects that a certain name field ends with a '\0' character, which allows local users to conduct buffer overflow attacks and gain privileges, or possibly obtain sensitive information from kernel memory, via a SOUND_MIXER_SETLEVELS ioctl call. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/737073/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 712615] Re: CVE-2010-0435
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/712615 Title: CVE-2010-0435 Status in linux package in Ubuntu: Fix Released Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-mvl-dove source package in Natty: Invalid Status in linux source package in Dapper: Invalid Status in linux-mvl-dove source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-mvl-dove source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-mvl-dove source package in Karmic: Invalid Bug description: Gleb Napatov discovered that KVM did not correctly check certain privileged operations. A local attacker with access to a guest kernel could exploit this to crash the host system, leading to a denial of service. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712615/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 688765] Re: Can't init uart3 (no clocks available) at Beagleboard-xM
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/688765 Title: Can't init uart3 (no clocks available) at Beagleboard-xM Status in linux package in Ubuntu: Fix Released Status in linux source package in Maverick: Fix Released Bug description: Maverick on a Beagle-xM: [0.00] Initializing cgroup subsys cpuset [0.00] Initializing cgroup subsys cpu [0.00] Linux version 2.6.35-24-omap (buildd@satinash) (gcc version 4.4.5 (Ubuntu/Linaro 4.4.4-14ubuntu5) ) #42-Ubuntu Wed Dec 8 06:37:32 UTC 2010 (Ubuntu 2.6.35-24.42-omap 2.6.35.8) [0.00] CPU: ARMv7 Processor [413fc082] revision 2 (ARMv7), cr=10c53c7f [0.00] CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache [0.00] Machine: OMAP3 Beagle Board [0.00] Memory policy: ECC disabled, Data cache writeback [0.00] On node 0 totalpages: 131072 [0.00] free_area_init_node: node 0, pgdat c0769b64, node_mem_map c0828000 [0.00] Normal zone: 1024 pages used for memmap [0.00] Normal zone: 0 pages reserved [0.00] Normal zone: 130048 pages, LIFO batch:31 [0.00] OMAP3630 ES1.0 (l2cache iva sgx neon isp 192mhz_clk ) [0.00] SRAM: Mapped pa 0x4020 to va 0xfe40 size: 0x10 [0.00] Reserving 12582912 bytes SDRAM for VRAM [0.00] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 130048 [0.00] Kernel command line: text splash ro elevator=noop vram=12M omapfb.mode=dvi:1280x720MR-16@60 root=UUID=aea6b659-1d5d-4854-badf-0320cadc01ff fixrtc console=ttyS2,115200n8 [0.00] PID hash table entries: 2048 (order: 1, 8192 bytes) [0.00] Dentry cache hash table entries: 65536 (order: 6, 262144 bytes) [0.00] Inode-cache hash table entries: 32768 (order: 5, 131072 bytes) [0.00] allocated 2621440 bytes of page_cgroup [0.00] please try 'cgroup_disable=memory' option if you don't want memory cgroups [0.00] Memory: 256MB 256MB = 512MB total [0.00] Memory: 487308k/487308k available, 36980k reserved, 0K highmem [0.00] Virtual kernel memory layout: [0.00] vector : 0x - 0x1000 ( 4 kB) [0.00] fixmap : 0xfff0 - 0xfffe ( 896 kB) [0.00] DMA : 0xffc0 - 0xffe0 ( 2 MB) [0.00] vmalloc : 0xe080 - 0xf800 ( 376 MB) [0.00] lowmem : 0xc000 - 0xe000 ( 512 MB) [0.00] modules : 0xbf00 - 0xc000 ( 16 MB) [0.00] .init : 0xc0008000 - 0xc0044000 ( 240 kB) [0.00] .text : 0xc0044000 - 0xc06b3000 (6588 kB) [0.00] .data : 0xc071e000 - 0xc076de60 ( 320 kB) [0.00] SLUB: Genslabs=9, HWalign=64, Order=0-3, MinObjects=0, CPUs=1, Nodes=1 [0.00] Hierarchical RCU implementation. [0.00] RCU-based detection of stalled CPUs is disabled. [0.00] Verbose stalled-CPUs detection is disabled. [0.00] NR_IRQS:402 [0.00] Clocking rate (Crystal/Core/MPU): 26.0/332/600 MHz [0.00] (null): no physical address for uart#3, so skipping early_init... [0.00] omap_hwmod: l3_hwmod: cannot be enabled (3) [0.00] omap_hwmod: l4_core_hwmod: cannot be enabled (3) [0.00] omap_hwmod: l4_per_hwmod: cannot be enabled (3) [0.00] omap_hwmod: l4_wkup_hwmod: cannot be enabled (3) [0.00] Reprogramming SDRC clock to 33200 Hz [0.00] GPMC revision 5.0 [0.00] IRQ: Found an INTC at 0xfa20 (revision 4.0) with 96 interrupts [0.00] Total of 96 interrupts on 1 active controller [0.00] OMAP GPIO hardware version 2.5 [0.00] OMAP clockevent source: GPTIMER12 at 32768 Hz [0.00] Console: colour dummy device 80x30 [0.00] Calibrating delay loop... 515.72 BogoMIPS (lpj=2015232) [0.00] pid_max: default: 32768 minimum: 301 [0.00] Security Framework initialized [0.00] AppArmor: AppArmor initialized [0.00] Yama: becoming mindful. [0.00] Mount-cache hash table entries: 512 [0.00] Initializing cgroup subsys ns [0.00] Initializing cgroup subsys cpuacct [0.00] Initializing cgroup subsys memory [0.00] Initializing cgroup subsys devices [0.00] Initializing cgroup subsys freezer [0.00] CPU: Testing write buffer coherency: ok [0.00] devtmpfs: initialized [0.00] regulator: core version 0.5 [0.00] NET: Registered protocol family 16 [0.00] mux: Setting signal mcspi1_clk.gpio171 0x011c -> 0x011c [0.00] mux: Setting signal mcspi1_simo.gpio172 0x011c -> 0
[Kernel-packages] [Bug 712723] Re: CVE-2010-4080
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/712723 Title: CVE-2010-4080 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-ti-omap4 source package in Maverick: Won't Fix Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Won't Fix Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory The SNDRV_HDSP_IOCTL_GET_CONFIG_INFO and SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctls in hdspm.c and hdsp.c allow unprivileged users to read uninitialized kernel stack memory, because several fields of the hdsp{m}_config_info structs declared on the stack are not altered or zeroed before being copied back to the user. This patch takes care of it. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712723/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 720968] Re: CVE-2010-4073
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/720968 Title: CVE-2010-4073 Status in linux-mvl-dove package in Ubuntu: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Won't Fix Bug description: The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-mvl-dove/+bug/720968/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 744250] Re: Maverick update to 2.6.35-903.22 stable release
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/744250 Title: Maverick update to 2.6.35-903.22 stable release Status in linux package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Maverick: Invalid Status in linux-ti-omap4 source package in Maverick: Fix Released Bug description: This bug is for tracking the 2.6.35-903.22 upload package. This bug will contain status and testing results releated to that upload. The following patches are in the 2.6.35-903.22 stable release: To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/744250/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 707579] Re: CVE-2010-4078
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/707579 Title: CVE-2010-4078 Status in linux package in Ubuntu: Fix Released Status in linux source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux source package in Dapper: Won't Fix Status in linux source package in Hardy: Fix Released Status in linux source package in Karmic: Fix Released Bug description: The FBIOGET_VBLANK device ioctl allows unprivileged users to read 16 bytes of uninitialized stack memory, because the "reserved" member of the fb_vblank struct declared on the stack is not altered or zeroed before being copied back to the user. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/707579/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 720966] Re: CVE-2010-4169
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/720966 Title: CVE-2010-4169 Status in linux-mvl-dove package in Ubuntu: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Won't Fix Bug description: Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-mvl-dove/+bug/720966/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 690798] Re: arduino USB serial device breaks on lucid kernel upgrade
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/690798 Title: arduino USB serial device breaks on lucid kernel upgrade Status in linux package in Ubuntu: Fix Released Status in linux source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Bug description: Filing bug report on behalf of someone else. With Lucid kernel 2.6.32-24.43, the device and attached program work correctly. Upon upgrading to 2.6.32-25.45, the program stops working. The device is: Bus 001 Device 005: ID 0403:6001 Future Technology Devices International, Ltd FT232 USB-Serial (UART) IC A quick driveby browse of recent commits in that time window suggests this might be related, but this is merely a guess based on inspection. No bisection was done. http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=677aeafe19e88c282af74564048243ccabb1c590 lspci, lsusb, and test code to follow. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/690798/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 805512] Re: CVE-2010-4649
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/805512 Title: CVE-2010-4649 Status in linux package in Ubuntu: Invalid Status in linux source package in Hardy: Fix Released Bug description: Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/805512/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 710680] Re: CVE-2010-3874
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/710680 Title: CVE-2010-3874 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux source package in Dapper: Invalid Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux source package in Hardy: Invalid Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Bug description: Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/710680/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 712744] Re: CVE-2010-4082
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/712744 Title: CVE-2010-4082 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux source package in Dapper: Invalid Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux source package in Hardy: Invalid Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Bug description: drivers/video/via/ioctl.c: prevent reading uninitialized stack memory The VIAFB_GET_INFO device ioctl allows unprivileged users to read 246 bytes of uninitialized stack memory, because the "reserved" member of the viafb_ioctl_info struct declared on the stack is not altered or zeroed before being copied back to the user. This patch takes care of it. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712744/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 687750] Re: [MAVERICK] THINKPAD EDGE 13 Horizontal scroll on touchpad is not functioning
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/687750 Title: [MAVERICK] THINKPAD EDGE 13 Horizontal scroll on touchpad is not functioning Status in linux package in Ubuntu: Fix Released Status in linux source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Bug description: Platform: Thinkpad Edge 13" Rev: SKU: CPU: Intel core i3 GPU: Integrated Summary: When activated in the mouse preferences, horizontal scrolling is not functioning. Steps to reproduce: 1) Open document with horizontal scroll requirements 2) Open Mouse Preferences 3) Check the box for Horizontal scroll in the Touchpad tab 4) Attempt to scroll the document Expected result: Document scrolls using the lower edge of the touchpad Actual result: No action To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/687750/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 804225] Re: CVE-2011-1010
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/804225 Title: CVE-2011-1010 Status in linux package in Ubuntu: Fix Released Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-linaro package in Ubuntu: Won't Fix Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-lts-backport-natty package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-qcm-msm package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-ec2 source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-linaro source package in Lucid: Won't Fix Status in linux-lts-backport-maverick source package in Lucid: Fix Released Status in linux-lts-backport-natty source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-qcm-msm source package in Lucid: Invalid Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-ec2 source package in Maverick: Invalid Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-linaro source package in Maverick: Won't Fix Status in linux-lts-backport-maverick source package in Maverick: Invalid Status in linux-lts-backport-natty source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-qcm-msm source package in Maverick: Invalid Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-ec2 source package in Natty: Invalid Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-linaro source package in Natty: Won't Fix Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-lts-backport-natty source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-qcm-msm source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Oneiric: Invalid Status in linux-ec2 source package in Oneiric: Invalid Status in linux-fsl-imx51 source package in Oneiric: Invalid Status in linux-linaro source package in Oneiric: Won't Fix Status in linux-lts-backport-maverick source package in Oneiric: Invalid Status in linux-lts-backport-natty source package in Oneiric: Invalid Status in linux-mvl-dove source package in Oneiric: Invalid Status in linux-qcm-msm source package in Oneiric: Invalid Status in linux-ti-omap4 source package in Oneiric: Invalid Status in linux source package in Hardy: Fix Released Status in linux-ec2 source package in Hardy: Invalid Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-linaro source package in Hardy: Won't Fix Status in linux-lts-backport-maverick source package in Hardy: Invalid Status in linux-lts-backport-natty source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-qcm-msm source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Bug description: Buffer overflow in the mac_partition function in fs/partitions/mac.c in the Linux kernel before 2.6.37.2 allows local users to cause a denial of service (panic) or possibly have unspecified other impact via a malformed Mac OS partition table. Break-Fix: - fa7ea87a057958a8b7926c1a60a3ca6d696328ed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/804225/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 737823] Re: CVE-2010-4529
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/737823 Title: CVE-2010-4529 Status in linux package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-lts-backport-maverick source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-lts-backport-maverick source package in Maverick: Won't Fix Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Invalid Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Won't Fix Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-lts-backport-maverick source package in Dapper: Won't Fix Status in linux-mvl-dove source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-lts-backport-maverick source package in Hardy: Won't Fix Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Won't Fix Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-lts-backport-maverick source package in Karmic: Won't Fix Status in linux-mvl-dove source package in Karmic: Invalid Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: Integer underflow in the irda_getsockopt function in net/irda/af_irda.c in the Linux kernel before 2.6.37 on platforms other than x86 allows local users to obtain potentially sensitive information from kernel heap memory via an IRLMP_ENUMDEVICES getsockopt call. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/737823/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 711855] Re: CVE-2010-4160
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/711855 Title: CVE-2010-4160 Status in linux package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: In Progress Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux source package in Natty: Invalid Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux source package in Dapper: Won't Fix Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Bug description: Multiple integer overflows in the (1) pppol2tp_sendmsg function in net/l2tp/l2tp_ppp.c, and the (2) l2tp_ip_sendmsg function in net/l2tp/l2tp_ip.c, in the PPPoL2TP and IPoL2TP implementations in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (heap memory corruption and panic) or possibly gain privileges via a crafted sendto call. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711855/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 736394] Re: CVE-2010-4342
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/736394 Title: CVE-2010-4342 Status in linux package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-source-2.6.15 package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-lts-backport-maverick source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-source-2.6.15 source package in Lucid: Invalid Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-lts-backport-maverick source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-source-2.6.15 source package in Maverick: Invalid Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Oneiric: Invalid Status in linux-fsl-imx51 source package in Oneiric: Invalid Status in linux-lts-backport-maverick source package in Oneiric: Invalid Status in linux-mvl-dove source package in Oneiric: Invalid Status in linux-source-2.6.15 source package in Oneiric: Invalid Status in linux-ti-omap4 source package in Oneiric: Invalid Status in linux source package in Dapper: Won't Fix Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-lts-backport-maverick source package in Dapper: Invalid Status in linux-mvl-dove source package in Dapper: Invalid Status in linux-source-2.6.15 source package in Dapper: Won't Fix Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-lts-backport-maverick source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-source-2.6.15 source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-lts-backport-maverick source package in Karmic: Invalid Status in linux-mvl-dove source package in Karmic: Invalid Status in linux-source-2.6.15 source package in Karmic: Invalid Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: The aun_incoming function in net/econet/af_econet.c in the Linux kernel before 2.6.37-rc6, when Econet is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending an Acorn Universal Networking (AUN) packet over UDP. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/736394/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 711341] Re: CVE-2010-3880
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/711341 Title: CVE-2010-3880 Status in linux package in Ubuntu: Fix Released Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-mvl-dove source package in Natty: Invalid Status in linux source package in Dapper: Fix Released Status in linux-mvl-dove source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-mvl-dove source package in Hardy: Invalid Status in linux source package in Karmic: Won't Fix Status in linux-mvl-dove source package in Karmic: Invalid Bug description: net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711341/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 731199] Re: CVE-2010-4164
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/731199 Title: CVE-2010-4164 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-lts-backport-maverick source package in Lucid: Won't Fix Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-lts-backport-maverick source package in Maverick: Won't Fix Status in linux-mvl-dove source package in Maverick: Won't Fix Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Won't Fix Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-lts-backport-maverick source package in Dapper: Won't Fix Status in linux-mvl-dove source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-lts-backport-maverick source package in Hardy: Won't Fix Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-lts-backport-maverick source package in Karmic: Won't Fix Status in linux-mvl-dove source package in Karmic: Invalid Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: Placeholder To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/731199/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 727336] Re: linux: 2.6.32-30.59 / 2.6.32-216.33 / 2.6.32-416.33 -proposed tracker
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/727336 Title: linux: 2.6.32-30.59 / 2.6.32-216.33 / 2.6.32-416.33 -proposed tracker Status in linux package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: This bug is for tracking the 2.6.32-30.59 upload package. This bug will contain status and testing results releated to that upload. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/727336/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 709372] Re: CVE-2010-3873
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/709372 Title: CVE-2010-3873 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Fix Released Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: The X.25 implementation in the Linux kernel before 2.6.36.2 does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed (1) X25_FAC_CALLING_AE or (2) X25_FAC_CALLED_AE data, related to net/x25/x25_facilities.c and net/x25/x25_in.c, a different vulnerability than CVE-2010-4164. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/709372/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 801484] Re: CVE-2011-1173
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/801484 Title: CVE-2011-1173 Status in linux package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-lts-backport-natty package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-ec2 source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-lts-backport-maverick source package in Lucid: Fix Released Status in linux-lts-backport-natty source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-ec2 source package in Maverick: Invalid Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-lts-backport-maverick source package in Maverick: Invalid Status in linux-lts-backport-natty source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-ec2 source package in Natty: Invalid Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-lts-backport-natty source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Won't Fix Status in linux source package in Oneiric: Invalid Status in linux-ec2 source package in Oneiric: Invalid Status in linux-fsl-imx51 source package in Oneiric: Invalid Status in linux-lts-backport-maverick source package in Oneiric: Invalid Status in linux-lts-backport-natty source package in Oneiric: Invalid Status in linux-mvl-dove source package in Oneiric: Invalid Status in linux-ti-omap4 source package in Oneiric: Invalid Status in linux source package in Hardy: Fix Released Status in linux-ec2 source package in Hardy: Invalid Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-lts-backport-maverick source package in Hardy: Invalid Status in linux-lts-backport-natty source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Bug description: The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.39 on the x86_64 platform allows remote attackers to obtain potentially sensitive information from kernel stack memory by reading uninitialized data in the ah field of an Acorn Universal Networking (AUN) packet. Break-Fix: - 67c5c6cb8129c595f21e88254a3fc6b3b841ae8e To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801484/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 708860] Re: linux: 2.6.31-22.72 -proposed tracker
*** This bug is a duplicate of bug 716648 *** https://bugs.launchpad.net/bugs/716648 ** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/708860 Title: linux: 2.6.31-22.72 -proposed tracker Status in linux package in Ubuntu: Fix Released Bug description: This bug is for tracking the 2.6.31-22.72 upload package. This bug will contain status and testing results releated to that upload. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/708860/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 699885] Re: Lucid:2.6.32-28.55 -proposed tracker
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/699885 Title: Lucid:2.6.32-28.55 -proposed tracker Status in linux package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Bug description: This bug is for tracking the 2.6.32-28.55 upload package. This bug will contain status and testing results releated to that upload. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/699885/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 698345] Re: lucid-ec2: 2.6.32-312.24 -proposed tracker
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ec2 in Ubuntu. https://bugs.launchpad.net/bugs/698345 Title: lucid-ec2: 2.6.32-312.24 -proposed tracker Status in linux-ec2 package in Ubuntu: Invalid Status in linux-ec2 source package in Lucid: Fix Released Bug description: This bug is for tracking the 2.6.32-312.24 upload package. This bug will contain status and testing results releated to that upload. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-ec2/+bug/698345/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 806390] Re: CVE-2011-2484
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/806390 Title: CVE-2011-2484 Status in linux package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-lts-backport-natty package in Ubuntu: Invalid Status in linux-lts-backport-oneiric package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Fix Released Status in linux source package in Lucid: Fix Released Status in linux-ec2 source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-lts-backport-maverick source package in Lucid: Fix Released Status in linux-lts-backport-natty source package in Lucid: Fix Released Status in linux-lts-backport-oneiric source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-ec2 source package in Maverick: Invalid Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-lts-backport-maverick source package in Maverick: Invalid Status in linux-lts-backport-natty source package in Maverick: Invalid Status in linux-lts-backport-oneiric source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-ec2 source package in Natty: Invalid Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-lts-backport-natty source package in Natty: Invalid Status in linux-lts-backport-oneiric source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Fix Released Status in linux source package in Oneiric: Invalid Status in linux-ec2 source package in Oneiric: Invalid Status in linux-fsl-imx51 source package in Oneiric: Invalid Status in linux-lts-backport-maverick source package in Oneiric: Invalid Status in linux-lts-backport-natty source package in Oneiric: Invalid Status in linux-lts-backport-oneiric source package in Oneiric: Invalid Status in linux-mvl-dove source package in Oneiric: Invalid Status in linux-ti-omap4 source package in Oneiric: Fix Released Status in linux source package in Precise: Invalid Status in linux-ec2 source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: Invalid Status in linux-lts-backport-natty source package in Precise: Invalid Status in linux-lts-backport-oneiric source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Status in linux source package in Hardy: Fix Released Status in linux-ec2 source package in Hardy: Invalid Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-lts-backport-maverick source package in Hardy: Invalid Status in linux-lts-backport-natty source package in Hardy: Invalid Status in linux-lts-backport-oneiric source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Bug description: The add_del_listener function in kernel/taskstats.c in the Linux kernel 2.6.39.1 and earlier does not prevent multiple registrations of exit handlers, which allows local users to cause a denial of service (memory and CPU consumption), and bypass the OOM Killer, via a crafted application. Break-Fix: f9fd8914c1acca0d98b69d831b128d5b52f03c51 26c4caea9d697043cc5a458b96411b86d7f6babd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/806390/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 806374] Re: CVE-2010-4165
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/806374 Title: CVE-2010-4165 Status in linux package in Ubuntu: Invalid Status in linux source package in Hardy: Fix Released Bug description: The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/806374/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 698214] Re: Karmic: 2.6.31-22.71 -proposed tracker
*** This bug is a duplicate of bug 716648 *** https://bugs.launchpad.net/bugs/716648 ** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/698214 Title: Karmic: 2.6.31-22.71 -proposed tracker Status in linux package in Ubuntu: Invalid Status in linux source package in Karmic: Fix Released Bug description: This bug is for tracking the 2.6.31-22.71 upload package. This bug will contain status and testing results releated to that upload. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/698214/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 732700] Re: apparmor_parser triggers a kernel panic
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/732700 Title: apparmor_parser triggers a kernel panic Status in linux package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: SRU Justification: Impact: kernel panic when loading a malformed apparmor profile. Fix: see attached patch. Testcase: /etc/init.d/apparmor restart === While loading a new profile, in case of a malformed one, policy.c::aa_interface_replace_profiles() tries to free an ERR_PTR leading to a panic. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/732700/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 712737] Re: CVE-2010-4081
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/712737 Title: CVE-2010-4081 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-ti-omap4 source package in Maverick: Won't Fix Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Fix Released Status in linux source package in Dapper: Won't Fix Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory The SNDRV_HDSP_IOCTL_GET_CONFIG_INFO and SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctls in hdspm.c and hdsp.c allow unprivileged users to read uninitialized kernel stack memory, because several fields of the hdsp{m}_config_info structs declared on the stack are not altered or zeroed before being copied back to the user. This patch takes care of it. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712737/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 801483] Re: CVE-2011-1172
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/801483 Title: CVE-2011-1172 Status in linux package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-lts-backport-natty package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-ec2 source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-lts-backport-maverick source package in Lucid: Fix Released Status in linux-lts-backport-natty source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-ec2 source package in Maverick: Invalid Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-lts-backport-maverick source package in Maverick: Invalid Status in linux-lts-backport-natty source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-ec2 source package in Natty: Invalid Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-lts-backport-natty source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Won't Fix Status in linux source package in Oneiric: Invalid Status in linux-ec2 source package in Oneiric: Invalid Status in linux-fsl-imx51 source package in Oneiric: Invalid Status in linux-lts-backport-maverick source package in Oneiric: Invalid Status in linux-lts-backport-natty source package in Oneiric: Invalid Status in linux-mvl-dove source package in Oneiric: Invalid Status in linux-ti-omap4 source package in Oneiric: Invalid Status in linux source package in Hardy: Fix Released Status in linux-ec2 source package in Hardy: Invalid Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-lts-backport-maverick source package in Hardy: Invalid Status in linux-lts-backport-natty source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Bug description: net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process. Break-Fix: - 6a8ab060779779de8aea92ce3337ca348f973f54 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801483/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 708839] Re: CVE-2010-3859
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/708839 Title: CVE-2010-3859 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux source package in Dapper: Fix Released Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Bug description: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3859 The tipc_msg_build() function in net/tipc/msg.c contains an exploitable kernel heap overflow that would allow a local user to escalate privileges to root by issuing maliciously crafted sendmsg() calls via TIPC sockets. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/708839/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 801480] Re: CVE-2011-1170
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/801480 Title: CVE-2011-1170 Status in linux package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-lts-backport-natty package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-ec2 source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-lts-backport-maverick source package in Lucid: Fix Released Status in linux-lts-backport-natty source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-ec2 source package in Maverick: Invalid Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-lts-backport-maverick source package in Maverick: Invalid Status in linux-lts-backport-natty source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-ec2 source package in Natty: Invalid Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-lts-backport-natty source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Won't Fix Status in linux source package in Oneiric: Invalid Status in linux-ec2 source package in Oneiric: Invalid Status in linux-fsl-imx51 source package in Oneiric: Invalid Status in linux-lts-backport-maverick source package in Oneiric: Invalid Status in linux-lts-backport-natty source package in Oneiric: Invalid Status in linux-mvl-dove source package in Oneiric: Invalid Status in linux-ti-omap4 source package in Oneiric: Invalid Status in linux source package in Hardy: Fix Released Status in linux-ec2 source package in Hardy: Invalid Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-lts-backport-maverick source package in Hardy: Invalid Status in linux-lts-backport-natty source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Bug description: net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process. Break-Fix: - 42eab94fff18cb1091d3501cd284d6bd6cc9c143 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801480/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 812360] Re: linux: 2.6.24-29.92 -proposed tracker
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/812360 Title: linux: 2.6.24-29.92 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Fix Released Bug description: This bug is for tracking the 2.6.24-29.92 upload package. This bug will contain status and testing results releated to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 18. July 2011 15:31 UTC kernel-stable-Promote-to-updates-end:Tuesday, 08. August 2011 21:40 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/812360/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 712749] Re: CVE-2010-4083
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/712749 Title: CVE-2010-4083 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Fix Released Status in linux source package in Dapper: Won't Fix Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: sys_semctl: fix kernel stack leakage The semctl syscall has several code paths that lead to the leakage of uninitialized kernel stack memory (namely the IPC_INFO, SEM_INFO, IPC_STAT, and SEM_STAT commands) during the use of the older, obsolete version of the semid_ds struct. The copy_semid_to_user() function declares a semid_ds struct on the stack and copies it back to the user without initializing or zeroing the "sem_base", "sem_pending", "sem_pending_last", and "undo" pointers, allowing the leakage of 16 bytes of kernel stack memory. The code is still reachable on 32-bit systems - when calling semctl() newer glibc's automatically OR the IPC command with the IPC_64 flag, but invoking the syscall directly allows users to use the older versions of the struct. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712749/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 707649] Re: CVE-2010-4079
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/707649 Title: CVE-2010-4079 Status in linux package in Ubuntu: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: The FBIOGET_VBLANK device ioctl allows unprivileged users to read 16 bytes of uninitialized stack memory, because the "reserved" member of the fb_vblank struct declared on the stack is not altered or zeroed before being copied back to the user. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/707649/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 711045] Re: CVE-2010-3876
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/711045 Title: CVE-2010-3876 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Won't Fix Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux source package in Dapper: Won't Fix Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-mvl-dove source package in Dapper: Invalid Status in linux source package in Hardy: Won't Fix Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux source package in Karmic: Won't Fix Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-mvl-dove source package in Karmic: Invalid Bug description: net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711045/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 734950] Re: linux-ec2 2.6.32-315.28 -proposed tracker
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ec2 in Ubuntu. https://bugs.launchpad.net/bugs/734950 Title: linux-ec2 2.6.32-315.28 -proposed tracker Status in linux package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: New Status in linux source package in Lucid: Fix Released Status in linux-ec2 source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Invalid Status in linux-ec2 source package in Maverick: Won't Fix Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: This bug is for tracking the 2.6.32-31.60 upload package. This bug will contain status and testing results releated to that upload. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/734950/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 711865] Re: CVE-2010-3880
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/711865 Title: CVE-2010-3880 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux source package in Dapper: Fix Released Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-mvl-dove source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-mvl-dove source package in Karmic: Invalid Bug description: net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711865/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 692917] Re: autofs/autofs4 missing from linux-image-virtual
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/692917 Title: autofs/autofs4 missing from linux-image-virtual Status in linux package in Ubuntu: Fix Released Status in linux source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Bug description: Binary package hint: linux-image-virtual Autofs/autofs4 is missing from the virtual image. I don't know it this is by design or not. This means that I have to use the linux-image-server on my virtual machines to be able to automount. //Martin ProblemType: Bug DistroRelease: Ubuntu 10.10 Package: linux-image-2.6.35-24-virtual 2.6.35-24.42 Regression: No Reproducible: Yes ProcVersionSignature: Ubuntu 2.6.35-24.42-virtual 2.6.35.8 Uname: Linux 2.6.35-24-virtual x86_64 Architecture: amd64 Date: Tue Dec 21 10:44:07 2010 ProcEnviron: LANG=en_US.UTF-8 SHELL=/bin/bash SourcePackage: linux To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/692917/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 710714] Re: CVE-2010-3875
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/710714 Title: CVE-2010-3875 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Won't Fix Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-mvl-dove source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-mvl-dove source package in Karmic: Invalid Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/710714/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 800775] Re: CVE-2011-1090
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/800775 Title: CVE-2011-1090 Status in linux package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-lts-backport-natty package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-ec2 source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-lts-backport-maverick source package in Lucid: Fix Released Status in linux-lts-backport-natty source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-ec2 source package in Maverick: Invalid Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-lts-backport-maverick source package in Maverick: Invalid Status in linux-lts-backport-natty source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-ec2 source package in Natty: Invalid Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-lts-backport-natty source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Won't Fix Status in linux source package in Oneiric: Invalid Status in linux-ec2 source package in Oneiric: Invalid Status in linux-fsl-imx51 source package in Oneiric: Invalid Status in linux-lts-backport-maverick source package in Oneiric: Invalid Status in linux-lts-backport-natty source package in Oneiric: Invalid Status in linux-mvl-dove source package in Oneiric: Invalid Status in linux-ti-omap4 source package in Oneiric: Invalid Status in linux source package in Hardy: Fix Released Status in linux-ec2 source package in Hardy: Invalid Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-lts-backport-maverick source package in Hardy: Invalid Status in linux-lts-backport-natty source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Bug description: The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c in the Linux kernel before 2.6.38 stores NFSv4 ACL data in memory that is allocated by kmalloc but not properly freed, which allows local users to cause a denial of service (panic) via a crafted attempt to set an ACL. Break-Fix: - e9e3d724e2145f5039b423c290ce2b2c3d8f94bc To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/800775/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 711291] Re: CVE-2010-3877
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/711291 Title: CVE-2010-3877 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Invalid Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-mvl-dove source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-mvl-dove source package in Karmic: Invalid Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711291/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 707000] Re: CVE-2010-3698
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/707000 Title: CVE-2010-3698 Status in linux package in Ubuntu: Fix Released Status in linux source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux source package in Karmic: Fix Released Bug description: The KVM implementation in the Linux kernel before 2.6.36 does not properly reload the FS and GS segment registers, which allows host OS users to cause a denial of service (host OS crash) via a KVM_RUN ioctl call in conjunction with a modified Local Descriptor Table (LDT). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/707000/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 806366] Re: CVE-2010-4073
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/806366 Title: CVE-2010-4073 Status in linux package in Ubuntu: Invalid Status in linux source package in Hardy: Fix Released Bug description: The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/806366/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 697948] Re: Maverick: 2.6.35-25.43 -proposed tracker
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/697948 Title: Maverick: 2.6.35-25.43 -proposed tracker Status in linux package in Ubuntu: Invalid Status in linux source package in Maverick: Fix Released Bug description: This bug is for tracking the 2.6.35-25.43 upload package. This bug will contain status and testing results releated to that upload. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/697948/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 688070] Re: -virtual kernel missing nfsd module
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/688070 Title: -virtual kernel missing nfsd module Status in linux package in Ubuntu: Fix Released Status in linux source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Bug description: Bug 659084 reported missing nfs client functionality. That bug was fixed, but we're still missing the nfs daemon module. Note in https://bugs.launchpad.net/ubuntu/+source/linux/+bug/659084/comments/14 , the lack of 'nfsd.ko' Also, this affects both natty and maverick. ProblemType: Bug DistroRelease: Ubuntu 10.10 Package: linux-image-2.6.35-24-virtual 2.6.35-24.42 Regression: No Reproducible: Yes ProcVersionSignature: User Name 2.6.35-24.42-virtual 2.6.35.8 Uname: Linux 2.6.35-24-virtual x86_64 AlsaDevices: Error: command ['ls', '-l', '/dev/snd/'] failed with exit code 2: ls: cannot access /dev/snd/: No such file or directory AplayDevices: Error: [Errno 2] No such file or directory Architecture: amd64 ArecordDevices: Error: [Errno 2] No such file or directory CurrentDmesg: [1.998122] JBD: barrier-based sync failed on sda1-8 - disabling barriers [ 11.930012] eth0: no IPv6 routers present Date: Thu Dec 9 14:28:16 2010 Ec2AMI: ami-548c783d Ec2AMIManifest: (unknown) Ec2AvailabilityZone: us-east-1c Ec2InstanceType: c1.xlarge Ec2Kernel: aki-427d952b Ec2Ramdisk: unavailable Lspci: Lsusb: Error: command ['lsusb'] failed with exit code 1: ProcCmdLine: root=LABEL=uec-rootfs ro console=hvc0 ProcEnviron: PATH=(custom, user) LANG=en_US.UTF-8 SHELL=/bin/bash ProcModules: acpiphp 18752 0 - Live 0xa000 SourcePackage: linux To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/688070/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 801473] Re: CVE-2011-2534
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/801473 Title: CVE-2011-2534 Status in linux package in Ubuntu: Fix Released Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Won't Fix Status in linux source package in Oneiric: Fix Released Status in linux-fsl-imx51 source package in Oneiric: Invalid Status in linux-ti-omap4 source package in Oneiric: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Bug description: Buffer overflow in the clusterip_proc_write function in net/ipv4/netfilter/ipt_CLUSTERIP.c in the Linux kernel before 2.6.39 might allow local users to cause a denial of service or have unspecified other impact via a crafted write operation, related to string data that lacks a terminating '\0' character. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801473/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 669399] Re: Touchpad bottom edge unresponsive in ubuntu 10.10 64-bit
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/669399 Title: Touchpad bottom edge unresponsive in ubuntu 10.10 64-bit Status in linux package in Ubuntu: Won't Fix Status in linux source package in Maverick: Fix Released Bug description: Binary package hint: xserver-xorg-input-synaptics The lower 1/4 - 1/3 part of the my touchpad doesn't not produce cursor movement, nor events in xev & evtest. Horizontal scrolling is not functional and can NOT be enable in gpointing-device-settings. This is on a Lenovo Thinkpad X100e Laptop, running ubuntu 10.10 maverick AMD64 - a clean install - This Synaptic touchpad is fully functional -ie. not a hardware issue - as it is working quite well on Lucid 10.04 LiveCD. I presume it is coordination bug as the Y-axis reported back from the touchpad ranges from ~700 - 4400. X-axis is fine. I have another old Toshiba Satellite A55 running 32-bit ubuntu 10.10 and its ALPS touchpad is OK. $ lsb_release -rd Description: Ubuntu 10.10 Release: 10.10 $uname -a Linux xxx-thinkpad-X100e 2.6.35-22-generic #35-Ubuntu SMP Sat Oct 16 20:45:36 UTC 2010 x86_64 GNU/Linux ProblemType: Bug DistroRelease: Ubuntu 10.10 Package: linux-image-2.6.35-22-generic 2.6.35-22.35 Regression: Yes Reproducible: Yes ProcVersionSignature: Ubuntu 2.6.35-22.35-generic 2.6.35.4 Uname: Linux 2.6.35-22-generic x86_64 NonfreeKernelModules: fglrx AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.23. AplayDevices: List of PLAYBACK Hardware Devices card 0: SB [HDA ATI SB], device 0: CONEXANT Analog [CONEXANT Analog] Subdevices: 1/1 Subdevice #0: subdevice #0 Architecture: amd64 ArecordDevices: List of CAPTURE Hardware Devices card 0: SB [HDA ATI SB], device 0: CONEXANT Analog [CONEXANT Analog] Subdevices: 1/1 Subdevice #0: subdevice #0 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: julio 1456 F pulseaudio CRDA: Error: [Errno 2] No such file or directory Card0.Amixer.info: Card hw:0 'SB'/'HDA ATI SB at 0xd060 irq 16' Mixer name : 'Conexant CX20582 (Pebble)' Components : 'HDA:14f15066,17aa21b2,00100302' Controls : 6 Simple ctrls : 4 Card29.Amixer.info: Card hw:29 'ThinkPadEC'/'ThinkPad Console Audio Control at EC reg 0x30, fw 6XHT42WW-1.182000' Mixer name : 'ThinkPad EC 6XHT42WW-1.182000' Components : '' Controls : 1 Simple ctrls : 1 Card29.Amixer.values: Simple mixer control 'Console',0 Capabilities: pswitch pswitch-joined penum Playback channels: Mono Mono: Playback [on] Date: Mon Nov 1 18:39:08 2010 HibernationDevice: RESUME=UUID=126f9a99-f7ca-4bb4-9129-c645c5d0ecdf InstallationMedia: Ubuntu 10.10 "Maverick Meerkat" - Release amd64 (20101007) MachineType: LENOVO 28763RA ProcCmdLine: BOOT_IMAGE=/boot/vmlinuz-2.6.35-22-generic root=UUID=4b766bae-335b-4201-9bb6-dc4e01768404 ro quiet splash ProcEnviron: LANG=en_US.utf8 SHELL=/bin/bash RelatedPackageVersions: linux-firmware 1.38 RfKill: 0: tpacpi_bluetooth_sw: Bluetooth Soft blocked: yes Hard blocked: no SourcePackage: linux dmi.bios.date: 09/17/2010 dmi.bios.vendor: LENOVO dmi.bios.version: 6XET45WW (1.28 ) dmi.board.name: 28763RA dmi.board.vendor: LENOVO dmi.board.version: Not Available dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Not Available dmi.modalias: dmi:bvnLENOVO:bvr6XET45WW(1.28):bd09/17/2010:svnLENOVO:pn28763RA:pvrThinkPadX100e:rvnLENOVO:rn28763RA:rvrNotAvailable:cvnLENOVO:ct10:cvrNotAvailable: dmi.product.name: 28763RA dmi.product.version: ThinkPad X100e dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/669399/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 546091] Re: 10.04 Installer doesn't properly detect 9240 MegaRaid SAS Controlers
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/546091 Title: 10.04 Installer doesn't properly detect 9240 MegaRaid SAS Controlers Status in hw-detect package in Ubuntu: Confirmed Status in linux package in Ubuntu: Fix Released Status in linux-mvl-dove package in Ubuntu: Invalid Status in hw-detect source package in Lucid: Confirmed Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in hw-detect source package in Maverick: Won't Fix Status in linux source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: [Lucid] [LSI MegaRAID SAS Driver] Ubuntu 10.04/Lucid doesn't detect and load drivers for newer LSI MegaRaid SAS controllers like the 9240* and 9260* and 9280* More information and drivers can be found here: http://www.lsi.com/channel/products/megaraid/sassata/9240-8i/index.html. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/hw-detect/+bug/546091/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 497546] Re: Microphones not working on Dell Vostro 320
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/497546 Title: Microphones not working on Dell Vostro 320 Status in linux package in Ubuntu: Fix Released Status in linux source package in Lucid: Incomplete Status in linux source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Bug description: Binary package hint: pulseaudio Neither the internal microphone nor a microphone plugged into the mic port record sound in lucid on a Dell Vostro 320. Both worked in karmic, so this is a regression. Sound Preferences shows only "Internal Audio Analog Stereo" as an input source device. Nothing is displayed on the VU meter when the input volume is cranked all the way up (and of course unmuted) and no sound is recorded through either the internal or external microphones. Audio output works correctly on both the internal speakers and the headset jack. ProblemType: Bug AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.21. Architecture: amd64 ArecordDevices: List of CAPTURE Hardware Devices card 0: Intel [HDA Intel], device 0: CONEXANT Analog [CONEXANT Analog] Subdevices: 0/1 Subdevice #0: subdevice #0 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: ubuntu 1314 F pulseaudio /dev/snd/pcmC0D0c: ubuntu 1314 F...m pulseaudio Card0.Amixer.info: Card hw:0 'Intel'/'HDA Intel at 0xfe8f8000 irq 16' Mixer name : 'Conexant CX20582 (Pebble)' Components : 'HDA:14f15066,102802f5,00100300' Controls : 12 Simple ctrls : 10 Date: Wed Dec 16 15:46:25 2009 DistroRelease: Ubuntu 10.04 InstallationMedia: Ubuntu 10.04 "Lucid Lynx" - Alpha amd64 (20091216) Package: pulseaudio 1:0.9.21-0ubuntu2 ProcEnviron: LANG=en_US.UTF-8 SHELL=/bin/bash ProcVersionSignature: Ubuntu 2.6.32-8.12-generic SourcePackage: pulseaudio Tags: lucid Uname: Linux 2.6.32-8-generic x86_64 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/497546/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 581525] Re: Lucid: system becomes unstable randomly, seems related with apparmor
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/581525 Title: Lucid: system becomes unstable randomly, seems related with apparmor Status in apparmor package in Ubuntu: Fix Released Status in linux package in Ubuntu: Fix Released Status in apparmor source package in Lucid: Fix Released Status in linux source package in Lucid: Fix Released Status in apparmor source package in Maverick: Fix Released Status in linux source package in Maverick: Fix Released Bug description: SRU Justification (apparmor) 1. impact of the bug is medium for stable releases. There are two parts to this bug: the kernel side OOPSing when a the parser generates invalid tables, and the parser generating correct tables. The lucid kernel should receive the fix sometime in the future, but the userspace should also be fixed. The kernel bug was a broken test in verifying the dfa next/check table size (so the userspace bug was not caught when it should have been). This means that it can at times reference beyond the dfa table (by at most 255 entries). The userspace bug is that the next/check table is not correctly padded with 0 entries, so that it is impossible to reference beyond the end of the table when in the states that use the end of the table for their references. 2. This has been addressed during the maverick development cycle. 3. This is r1392 from the apparmor-2.5 branch. The commit mistakenly references a different bug (599450), but the text is: "Changes the table resizing so that there is always sufficient high entries in the table, preventing bounds violations from occurring." 4. TEST CASE: there are multiple possible test cases 4.1 Load a profile against a patched kernel (the maverick kernel can be used for this or a patched Lucid Kernel). The kernel will reject the profile with the following message in the logs AppArmor DFA next/check upper bounds error fixed, upgrade user space tools 4.2 The dfa verifier can be run against a profiles dfa in user space, but the checker is not part of the distro or easy to use atm as it requires manually extracting the tables from the profile. The full userspace profile verifier isn't available yet. 4.3 A profile can be compiled using the parser pre and post patching, and compared using a hex editor. The components of the profile that are changed are the size of the table and at the end of dfa table several 0 entries padding out the table. To do this choose a small profile eg. usr.sbin.tcpdump and run ./apparmor_parser -S >out.file ./apparmor_parser-patched -S >out.file2 The dfa table generated starts with the string aadfa\0 followed by a 4 byte (little endian blob size - this will differ), follow by the actual table header with various table size (some of these will change) and then the actual tables which almost fill the rest of the profile. Towards the end of the profile there should be extra 0's. And then the closing data of the profile which should not change. The data within the profile should not change beyond the couple of size entries and the 0 padding at the end. 5. The regression potential is considered low as the patch just pads out the table to make sure there are no bounds violations. The patch was pushed in maverick during its development cycle and showed no regressions. This is an important reliability fix for people who are affected (this has affected at least one Canonical server). Hi, Since last week I am experiencing a problem which seems related to apparmor. Kernel is crashing at aa_dfa_match_len+0xd9/0xf0, and a trace like the the following appears on my system logs: May 17 01:57:04 mplaptop kernel: [ 6430.314093] PGD 1002063 PUD 0 May 17 01:57:04 mplaptop kernel: [ 6430.314101] CPU 1 May 17 01:57:04 mplaptop kernel: [ 6430.314103] Modules linked in: xts gf128mul binfmt_misc ppdev vboxnetadp vboxnetflt vboxdrv sha256_generic cryptd aes_x86_64 aes_generic dm_crypt joydev snd_hda_codec_realtek ipt_REJECT ipt_LOG xt_limit xt_tcpudp ipt_addrtype xt_state dell_wmi arc4 snd_hda_intel snd_hda_codec snd_hwdep snd_pcm_oss snd_mixer_oss snd_pcm ip6table_filter ip6_tables snd_seq_dummy nf_nat_irc snd_seq_oss nf_conntrack_irc snd_seq_midi nf_nat_ftp snd_rawmidi nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 snd_seq_midi_event nf_conntrack_ftp snd_seq nf_conntrack iwlagn iptable_filter snd_timer snd_seq_device iwlcore ip_tables snd uvcvideo videodev v4l1_compat v4l2_compat_ioctl32 x_tables mac80211 sdhci_pci dell_laptop dcdbas sdhci led_class nvidia(P) soundcore snd_page_alloc cfg80211 psmouse serio_raw uinput lp parport usbhid hid fbcon tileblit font bitblit ohci1394 softcursor ieee1394 r8169 mii ahci vga16fb vgastate intel_agp video output May 17
[Kernel-packages] [Bug 681132] Re: Lucid update to 2.6.32.26+drm33.11 stable release
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/681132 Title: Lucid update to 2.6.32.26+drm33.11 stable release Status in linux package in Ubuntu: Fix Released Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 2.6.32.26+drm33.11 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/pub/scm/linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git http://git.kernel.org/?p=linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git;a=summary Test Case: TBD The following is the complete list of patches in the 2.6.32.26+drm33.11 stable release: * staging: usbip: Notify usb core of port status changes * staging: usbip: Process event flags without delay * powerpc/perf: Fix sampling enable for PPC970 * pcmcia: synclink_cs: fix information leak to userland * sched: Fix string comparison in /proc/sched_features * bluetooth: Fix missing NULL check * futex: Fix errors in nested key ref-counting * mm, x86: Saving vmcore with non-lazy freeing of vmas * x86, cpu: Fix renamed, not-yet-shipping AMD CPUID feature bit * x86, kexec: Make sure to stop all CPUs before exiting the kernel * x86, olpc: Don't retry EC commands forever * x86, mtrr: Assume SYS_CFG[Tom2ForceMemTypeWB] exists on all future AMD CPUs * x86, intr-remap: Set redirection hint in the IRTE * x86, kdump: Change copy_oldmem_page() to use cached addressing * KVM: SVM: Fix wrong intercept masks on 32 bit * KVM: MMU: fix direct sps access corrupted * KVM: MMU: fix conflict access permissions in direct sp * KVM: VMX: Fix host GDT.LIMIT corruption * KVM: SVM: Adjust tsc_offset only if tsc_unstable * KVM: x86: Fix SVM VMCB reset * KVM: x86: Move TSC reset out of vmcb_init * KVM: Fix fs/gs reload oops with invalid ldt * pipe: fix failure to return error code on ->confirm() * p54usb: fix off-by-one on !CONFIG_PM * p54usb: add five more USBIDs * drivers/net/wireless/p54/eeprom.c: Return -ENOMEM on memory allocation failure * USB: ftdi_sio: Add PID for accesio products * USB: add PID for FTDI based OpenDCC hardware * USB: ftdi_sio: new VID/PIDs for various Papouch devices * USB: ftdi_sio: add device ids for ScienceScope * usb: musb: blackfin: call gpio_free() on error path in musb_platform_init() * USB: option: Add more ZTE modem USB id's * USB: cp210x: Add Renesas RX-Stick device ID * USB: cp210x: Add WAGO 750-923 Service Cable device ID * USB: atmel_usba_udc: force vbus_pin at -EINVAL when gpio_request failled * USB: disable endpoints after unbinding interfaces, not before * USB: opticon: Fix long-standing bugs in opticon driver * USB: accept some invalid ep0-maxpacket values * sd name space exhaustion causes system hang * libsas: fix NCQ mixing with non-NCQ * gdth: integer overflow in ioctl * Fix race when removing SCSI devices * Fix regressions in scsi_internal_device_block * sgi-xp: incoming XPC channel messages can come in after the channel's partition structures have been torn down * Linux 2.6.32.26 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/681132/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 668380] Re: Lucid update to 2.6.32.25 stable release
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/668380 Title: Lucid update to 2.6.32.25 stable release Status in linux package in Ubuntu: Fix Released Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 2.6.32.25 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.25 http://kernel.org/pub/linux/kernel/v2.6/patch-2.6.32.25.bz2 Test Case: TBD The following 3 patches in the 2.6.32.25 stable update were already release in a security update. Therefore, we will omit these 3 patches from the 2.6.32.25 stable update: * ALSA: prevent heap corruption in snd_ctl_new * ocfs2: Don't walk off the end of fast symlinks. * rose: Fix signedness issues wrt. digi count. Additionally, 2 patches which were applied as "pre-stable" have landed in this 2.6.32.25 update. Therefore, we will drop the pre-stable patches in favor of the official patches from the 2.6.32.25 patch set: * ACPI: enable repeated PCIEXP wakeup by clearing PCIEXP_WAKE_STS on resume * mm: (pre-stable) Move vma_stack_continue into mm.h I'd also note that it appears somewhere along the way that updateconfigs and updateportsconfigs needed but be run but never was. Thus, I've also included 2 additional patches which update the configs and portsconfigs. The following is the complete list of patches in the 2.6.32.25 stable release: * x86, cpu: After uncapping CPUID, re-run CPU feature detection * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory * ALSA: oxygen: fix analog capture on Claro halo cards * ALSA: hda - Add Dell Latitude E6400 model quirk * ALSA: prevent heap corruption in snd_ctl_new() * ALSA: rawmidi: fix oops (use after free) when unloading a driver module * USB: fix bug in initialization of interface minor numbers * usb: musb: gadget: fix kernel panic if using out ep with FIFO_TXRX style * usb: musb: gadget: restart request on clearing endpoint halt * oprofile: Add Support for Intel CPU Family 6 / Model 29 * RDMA/cxgb3: Turn off RX coalescing for iWARP connections * mmc: sdhci-s3c: fix NULL ptr access in sdhci_s3c_remove * x86/amd-iommu: Set iommu configuration flags in enable-loop * x86/amd-iommu: Fix rounding-bug in __unmap_single * x86/amd-iommu: Work around S3 BIOS bug * tracing/x86: Don't use mcount in pvclock.c * tracing/x86: Don't use mcount in kvmclock.c * v4l1: fix 32-bit compat microcode loading translation * V4L/DVB: cx231xx: Avoid an OOPS when card is unknown (card=0) * V4L/DVB (13966): DVB-T regression fix for saa7134 cards * Input: joydev - fix JSIOCSAXMAP ioctl * x86, hpet: Fix bogus error check in hpet_assign_irq() * x86, irq: Plug memory leak in sparse irq * ubd: fix incorrect sector handling during request restart * ring-buffer: Fix typo of time extends per page * dmaengine: fix interrupt clearing for mv_xor * hrtimer: Preserve timer state in remove_hrtimer() * i2c-pca: Fix waitforcompletion() return value * ocfs2: Don't walk off the end of fast symlinks. * wext: fix potential private ioctl memory content leak * atl1: fix resume * x86, AMD, MCE thresholding: Fix the MCi_MISCj iteration order * De-pessimize rds_page_copy_user * drm/radeon: fix PCI ID 5657 to be an RV410 * xfrm4: strip ECN and IP Precedence bits in policy lookup * tcp: Fix >4GB writes on 64-bit. * net: Fix the condition passed to sk_wait_event() * Phonet: Correct header retrieval after pskb_may_pull * net: Fix IPv6 PMTU disc. w/ asymmetric routes * ip: fix truesize mismatch in ip fragmentation * net: clear heap allocations for privileged ethtool actions * tcp: Fix race in tcp_poll * netxen: dont set skb->truesize * rose: Fix signedness issues wrt. digi count. * net: blackhole route should always be recalculated * skge: add quirk to limit DMA * r8169: allocate with GFP_KERNEL flag when able to sleep * bsg: fix incorrect device_status value * r6040: fix r6040_multicast_list * r6040: Fix multicast list iteration when hash filter is used * powerpc: Initialise paca->kstack before ea
[Kernel-packages] [Bug 611803] Re: [Lenovo IdeaPad Y550A] Subwoofer don't mute/unmute on plugging external acoustics
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/611803 Title: [Lenovo IdeaPad Y550A] Subwoofer don't mute/unmute on plugging external acoustics Status in linux package in Ubuntu: Fix Released Status in linux source package in Maverick: Fix Released Bug description: Binary package hint: pulseaudio On Kubuntu 10.04 (ALSA only) I when I put headphones - speakers muted automatic. On Ubuntu 10.10 (with PulseAudio) when I put headphones subwoofer still continue to sound until I select "Analog Headphones" channel instead of "Analog Speakers" channel in system sound options. Tested on Intel HDA (in my case it's Realtek ALC272 chip). == Regression details == Discovered in version: maverick Last known good version: lucid To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/611803/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 628776] Re: HP NC511i Driver (be2net and be2scsi) is missing in kernel module udebs
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/628776 Title: HP NC511i Driver (be2net and be2scsi) is missing in kernel module udebs Status in linux package in Ubuntu: Fix Released Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: Dear Colleagues, I tested this morning two installations of Lucid (10.04.1) and Maverick (Daily from yesterday) server flavour. The installation was performed on a HP BL465 G7 Series with an HP NC511i Ethernet/ISCSI/FoE dual port 10GBit/s card. During installation via debian-installer, the network interfaces were not found, because of the missing kernel module. But after installation and rebooting into the production system, the kernel detected the card and loaded the following modules: be2net be2scsi Somehow those two modules are missing from the installer kernel udeb packages. Please consider a fix for Maverick and also for Lucid 10.04.2 Thx in advance, \sh To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/628776/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 605101] Re: gnome-volume-control: no internal microphone as input device port
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/605101 Title: gnome-volume-control: no internal microphone as input device port Status in linux package in Ubuntu: Fix Released Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: I am running lucid with all the updates on a Lenovo 3000 v100 with the following sound card (driver: snd-hda-intel): 00:1b.0 Audio device: Intel Corporation N10/ICH 7 Family High Definition Audio Controller (rev 02) 00:1b.0 0403: 8086:27d8 (rev 02) Subsystem: 17aa:3bfd In gnome-volume-control, the Internal Microphone (iMic) is not listed as a possible input device port. Only "Microphone" (Mic in alsamixer) and "Line-in" (Line in alsamixer) are available. In alsamixer, I can (after hitting F5 to see all controls) set the input source to "iMic" and then the microphone works fine, but not in gnome-volume-control. Following a suggestion on another bug report, I installed linux- backports-modules-alsa-2.6.32-23-generic, but this did not automatically determine the microphone to use or let me choose iMic in gnome-volume-control. Is there a way to fix this? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/605101/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 667796] Re: kernel only recognizes 32G of memory
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ec2 in Ubuntu. https://bugs.launchpad.net/bugs/667796 Title: kernel only recognizes 32G of memory Status in linux package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux source package in Maverick: Fix Released Status in linux-ec2 source package in Maverick: Invalid Bug description: SRU justification: Impact: The config option XEN_MAX_DOMAIN_MEMORY controls how much memory a Xen instance is seeing. The default for 64bit is 32GB, which is the reason that m2.4xlarge instances only report this amount of memory. Fix: Setting this limit to 70GB as there is a known restriction for t1.micro instances at about 80GB. Testcase: Booted m2.4xlarge with this set to 32GB shows 32GB of memory, when set to 70GB, it correctly reports 68GB. Booted a t1.micro as well to verify this has not caused problems there. --- The following is copied from https://bugs.launchpad.net/ubuntu/+source/linux/+bug/651370/comments/14 . I'm fairly sure that The problem is also with a stock image (without the additional command line options suggested in that bug). Brandon's and Scott's workaround works for me partly, but the kernel on an instance started in such a way seems to detect only 32 GB of memory even for a m2.4xlarge instance which should have 68.4 GB available, according to the EC2 instances page. Is this a side-effect of the workaround, or a completely separate bug? Maveric results: ubuntu@ip-10-230-9-87:~$ uname -a Linux ip-10-230-9-87 2.6.35-22-virtual #35-Ubuntu SMP Sat Oct 16 23:19:29 UTC 2010 x86_64 GNU/Linux ubuntu@ip-10-230-9-87:~$ ec2metadata --instance-type m2.4xlarge ubuntu@ip-10-230-9-87:~$ free total used free shared buffers cached Mem: 32810684 667628 32143056 0 6444 32152 -/+ buffers/cache: 629032 32181652 Swap: 0 0 0 Expected results (from a SUSE 11 guest): ip-10-230-45-187:~ # uname -a Linux ip-10-230-45-187 2.6.32.19-0.3-ec2 #1 SMP 2010-09-17 20:28:21 +0200 x86_64 x86_64 x86_64 GNU/Linux ip-10-230-45-187:~ # curl http://169.254.169.254/latest/meta-data/instance-type m2.4xlarge ip-10-230-45-187:~ # free total used free shared buffers cached Mem: 71705116 2361584 69343532 0 10972 126424 -/+ buffers/cache: 2224188 69480928 Swap: 0 0 0 ProblemType: Bug DistroRelease: Ubuntu 10.10 Package: linux-image-2.6.35-22-virtual 2.6.35-22.33 Regression: Yes Reproducible: Yes ProcVersionSignature: User Name 2.6.35-22.33-virtual 2.6.35.4 Uname: Linux 2.6.35-22-virtual x86_64 AlsaDevices: Error: command ['ls', '-l', '/dev/snd/'] failed with exit code 2: ls: cannot access /dev/snd/: No such file or directory AplayDevices: Error: [Errno 2] No such file or directory Architecture: amd64 ArecordDevices: Error: [Errno 2] No such file or directory CurrentDmesg: Date: Thu Oct 28 13:35:42 2010 Ec2AMI: ami-548c783d Ec2AMIManifest: (unknown) Ec2AvailabilityZone: us-east-1d Ec2InstanceType: t1.micro Ec2Kernel: aki-427d952b Ec2Ramdisk: unavailable Lspci: Lsusb: Error: command ['lsusb'] failed with exit code 1: ProcCmdLine: root=LABEL=uec-rootfs ro console=hvc0 ProcEnviron: LANG=en_US.UTF-8 SHELL=/bin/bash ProcModules: acpiphp 18752 0 - Live 0xa000 SourcePackage: linux To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/667796/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 649483] Re: Lucid update to 2.6.32.23 stable release
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/649483 Title: Lucid update to 2.6.32.23 stable release Status in linux package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 2.6.32.23 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.23 http://kernel.org/pub/linux/kernel/v2.6/patch-2.6.32.23.bz2 Test Case: TBD The following patches are in the 2.6.32.23 stable release: * Linux 2.6.32.23 * x86: Add memory modify constraints to xchg() and cmpxchg() * alpha: Fix printk format errors * sis-agp: Remove SIS 760, handled by amd64-agp * MIPS: Sibyte: Fix M3 TLB exception handler workaround. * pata_pdc202xx_old: fix UDMA mode for PDC2026x chipsets * pata_pdc202xx_old: fix UDMA mode for Promise UDMA33 cards * MIPS: uasm: Add OR instruction. * MIPS: Set io_map_base for several PCI bridges lacking it * MIPS: Quit using undefined behavior of ADDU in 64-bit atomic operations. * Input: add compat support for sysfs and /proc capabilities output * inotify: fix inotify oneshot support * hostap_pci: set dev->base_addr during probe * gro: Fix bogus gso_size on the first fraglist entry * clocksource: sh_tmu: compute mult and shift before registration * dasd: use correct label location for diag fba disks * asix: fix setting mac address for AX88772 * 3c503: Fix IRQ probing * sctp: Do not reset the packet during sctp_packet_config(). * Fix unprotected access to task credentials in waitid() * guard page for stacks that grow upwards * mm: page allocator: update free page counters after pages are placed on the free list * mm: page allocator: calculate a better estimate of NR_FREE_PAGES when memory is low and kswapd is awake * mm: page allocator: drain per-cpu lists after direct reclaim allocation fails * cxgb3: fix hot plug removal crash * AT91: change dma resource index * bnx2: Fix hang during rmmod bnx2. * bnx2: Fix netpoll crash. * ACPI: disable _OSI(Windows 2009) on Asus K50IJ * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory * xfs: prevent reading uninitialized stack memory * KEYS: Fix bug in keyctl_session_to_parent() if parent has no session keyring * KEYS: Fix RCU no-lock warning in keyctl_session_to_parent() * IA64: Optimize ticket spinlocks in fsys_rt_sigprocmask * IA64: fix siglock * ext4: Fix remaining racy updates of EXT4_I(inode)->i_flags * SCSI: mptsas: fix hangs caused by ATA pass-through * inotify: send IN_UNMOUNT events * aio: check for multiplication overflow in do_io_submit * percpu: fix pcpu_last_unit_cpu * drivers/video/sis/sis_main.c: prevent reading uninitialized stack memory * drivers/pci/intel-iommu.c: fix build with older gcc's * char: Mark /dev/zero and /dev/kmem as not capable of writeback * oprofile: Add Support for Intel CPU Family 6 / Model 22 (Intel Celeron 540) * sched: Fix user time incorrectly accounted as system time on 32-bit * pid: make setpgid() system call use RCU read-side critical section * net/llc: make opt unsigned in llc_ui_setsockopt() * Staging: vt6655: fix buffer overflow * bonding: correctly process non-linear skbs * drivers/net/eql.c: prevent reading uninitialized stack memory * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory * drivers/net/usb/hso.c: prevent reading uninitialized memory * sparc64: Get rid of indirect p1275 PROM call buffer. * r8169: fix mdio_read and update mdio_write according to hw specs * r8169: fix random mdio_write failures * UNIX: Do not loop forever at unix_autobind(). * tcp: Prevent overzealous packetization by SWS logic. * rds: fix a leak of kernel memory * net: Fix oops from tcp_collapse() when using splice() * bridge: Clear INET control block of SKBs passed into ip_fragment(). * bridge: Clear IPCB before possible entry into IP stack * tcp: fix three tcp sysctls tuning * tcp: Combat per-cpu skew in orphan tests. * tcp: select(writefds) don't hang up when a peer close connection * irda: Correctly
[Kernel-packages] [Bug 683257] Re: Lucid update to 2.6.32.26+drm33.12 stable release
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/683257 Title: Lucid update to 2.6.32.26+drm33.12 stable release Status in linux package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 2.6.32.26+drm33.12 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/pub/scm/linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git http://git.kernel.org/?p=linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git;a=summary Test Case: TBD The following is the complete list of patches in the 2.6.32.26+drm33.12 stable release: * drm/radeon: fix PCI ID 5657 to be an RV410 * Linux 2.6.32.26+drm33.12 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/683257/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 592039] Re: Please enable vmware-balloon driver in kernel config
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/592039 Title: Please enable vmware-balloon driver in kernel config Status in linux package in Ubuntu: Fix Released Status in linux source package in Maverick: Fix Released Bug description: VMware would like to have our balloon driver enabled by default in distribution kernels to improve customer experience and reduce number of third-party modules being loaded into the kernel. Please change the kernel configuration for Ubuntu 10.10 so that vmware-balloon driver is compiled as a module (CONFIG_VMWARE_BALLOON=m). The driver has to be compiled as a module to allow our installer detect that the driver is being supplied by the distribution and prevent installer from overwriting it. Also please ocnsider applying the following patch to the driver which fixes issue with the driver may start consuming excessive amount of memory during torture tests. The patch is in 2.6.32-rc2 and should make its way to stable as well. Thanks. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/592039/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 493156] Re: Please enable CONFIG_TASK_DELAY_ACCT
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/493156 Title: Please enable CONFIG_TASK_DELAY_ACCT Status in iotop package in Ubuntu: Invalid Status in linux package in Ubuntu: Fix Released Status in iotop source package in Lucid: Invalid Status in linux source package in Lucid: Fix Released Status in iotop source package in Maverick: Invalid Status in linux source package in Maverick: Fix Released Status in iotop source package in Natty: Invalid Status in linux source package in Natty: Fix Released Bug description: iotop 0.3.2-1 needs CONFIG_TASK_DELAY_ACCT enabled, and currently (2.6.32-7.9) only shows: > CONFIG_TASK_DELAY_ACCT not enabled in kernel, cannot determine SWAPIN and IO % Please consider enabling this option. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/iotop/+bug/493156/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 685015] Re: [MAVERICK] Thinkpad Edge 13 External headphones/mic not functiona
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/685015 Title: [MAVERICK] Thinkpad Edge 13 External headphones/mic not functiona Status in linux package in Ubuntu: Fix Released Status in linux source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Bug description: Image: 10.10 DVD Platform: Thinkpad Edge 13" BIOS Version: 83ET16WW (1.0) Platform: Rev: SKU: CPU: Core i3 GPU: Intel Inegrated Summary: Sound can neither be heard nor recorded through external means. This is a single jack for both mic and headphones, and was tested with a combo mic/headphone. Steps to reproduce: 1) Install 10.10 2) Plug in headphone/mic 3) Try to play sound from Sound Preferences, notice no sound from headphones 4) Try to record sound from gnome-sound-recorder, notice nothing recorded from external mic Expected results: Sound can be input/output through jack Actual results: No sound input/output externally To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/685015/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 644694] Re: Lucid update to 2.6.32.22 stable release
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/644694 Title: Lucid update to 2.6.32.22 stable release Status in linux package in Ubuntu: Fix Released Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 2.6.32.22 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.22 http://kernel.org/pub/linux/kernel/v2.6/patch-2.6.32.22.bz2 TEST CASE: TBD The following patches are in the 2.6.32.22 stable release: * Linux 2.6.32.22 * SUNRPC: Fix race corrupting rpc upcall * NFS: Fix a typo in nfs_sockaddr_match_ipaddr6 * apm_power: Add missing break statement * hwmon: (f75375s) Do not overwrite values read from registers * hwmon: (f75375s) Shift control mode to the correct bit position * arm: fix really nasty sigreturn bug * ALSA: hda - Handle pin NID 0x1a on ALC259/269 * ALSA: hda - Handle missing NID 0x1b on ALC259 codec * sched: cpuacct: Use bigger percpu counter batch values for stats counters * sched: Fix select_idle_sibling() logic in select_task_rq_fair() * sched: Pre-compute cpumask_weight(sched_domain_span(sd)) * sched: Fix select_idle_sibling() * sched: Fix vmark regression on big machines * sched: More generic WAKE_AFFINE vs select_idle_sibling() * sched: Cleanup select_task_rq_fair() * sched: apply RCU protection to wake_affine() * sched: Remove unnecessary RCU exclusion * sched: Fix rq->clock synchronization when migrating tasks * sched: Fix nr_uninterruptible count * sched: Optimize task_rq_lock() * sched: Fix TASK_WAKING vs fork deadlock * sched: Make select_fallback_rq() cpuset friendly * sched: _cpu_down(): Don't play with current->cpus_allowed * sched: sched_exec(): Remove the select_fallback_rq() logic * sched: move_task_off_dead_cpu(): Remove retry logic * sched: move_task_off_dead_cpu(): Take rq->lock around select_fallback_rq() * sched: Kill the broken and deadlockable cpuset_lock/cpuset_cpus_allowed_locked code * sched: set_cpus_allowed_ptr(): Don't use rq->migration_thread after unlock * sched: Queue a deboosted task to the head of the RT prio queue * sched: Implement head queueing for sched_rt * sched: Extend enqueue_task to allow head queueing * sched: Fix race between ttwu() and task_rq_lock() * sched: Fix incorrect sanity check * sched: Fix fork vs hotplug vs cpuset namespaces * sched: Fix hotplug hang * sched: Remove the cfs_rq dependency from set_task_cpu() * sched: Add pre and post wakeup hooks * sched: Fix select_task_rq() vs hotplug issues * sched: Fix sched_exec() balancing * sched: Fix broken assertion * sched: Make warning less noisy * sched: Ensure set_task_cpu() is never called on blocked tasks * sched: Use TASK_WAKING for fork wakups * sched: Fix set_cpu_active() in cpu_down() * sched: Use rcu in sched_get_rr_param() * sched: Use rcu in sched_get/set_affinity() * sched: Use rcu in sys_sched_getscheduler/sys_sched_getparam() * sched: Make wakeup side and atomic variants of completion API irq safe * sched: Remove forced2_migrations stats * sched: Sanitize fork() handling * sched: Clean up ttwu() rq locking * sched: Remove rq->clock coupling from set_task_cpu() * sched: Remove unused cpu_nr_migrations() * sched: Consolidate select_task_rq() callers * sched: Protect sched_rr_get_param() access to task->sched_class * sched: Protect task->cpus_allowed access in sched_getaffinity() * x86, tsc: Fix a preemption leak in restore_sched_clock_state() * wireless extensions: fix kernel heap content leak * ath5k: check return value of ieee80211_get_tx_rate * p54: fix tx feedback status flag check * perf: Initialize callchains roots's childen hits * memory hotplug: fix next block calculation in is_removable * Input: i8042 - fix device removal on unload * binfmt_misc: fix binfmt_misc priority * kernel/groups.c: fix integer overflow in groups_search * bounce: call flush_
[Kernel-packages] [Bug 643891] Re: [IDT 92HD71B7X] ALSA test tone not correctly played back
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/643891 Title: [IDT 92HD71B7X] ALSA test tone not correctly played back Status in linux package in Ubuntu: Fix Released Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Invalid Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: I have tried everything to get sound working on 10.04. Dell Latitude E6400. No luck. ProblemType: Bug DistroRelease: Ubuntu 10.04 Package: alsa-base 1.0.22.1+dfsg-0ubuntu3 ProcVersionSignature: Ubuntu 2.6.32-24.43-generic 2.6.32.15+drm33.5 Uname: Linux 2.6.32-24-generic i686 AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.23. Compiled on Jul 6 2010 for kernel 2.6.32-24-generic (SMP). Architecture: i386 ArecordDevices: List of CAPTURE Hardware Devices card 0: Intel [HDA Intel], device 0: STAC92xx Analog [STAC92xx Analog] Subdevices: 2/2 Subdevice #0: subdevice #0 Subdevice #1: subdevice #1 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stuart 1739 F pulseaudio /dev/snd/pcmC0D0p: stuart 1739 F...m pulseaudio Card0.Amixer.info: Card hw:0 'Intel'/'HDA Intel at 0xf6adc000 irq 32' Mixer name : 'Intel G45 DEVCTG' Components : 'HDA:111d76b2,10280233,00100302 HDA:80862802,80860101,0010' Controls : 34 Simple ctrls : 22 Date: Mon Sep 20 21:58:33 2010 InstallationMedia: Ubuntu 9.10 "Karmic Koala" - Release i386 (20091028.5) PackageArchitecture: all ProcEnviron: LANG=en_GB.utf8 SHELL=/bin/bash SelectedCard: 0 Intel HDA-Intel - HDA Intel SourcePackage: alsa-driver Symptom: audio Title: [IDT 92HD71B7X] ALSA test tone not correctly played back dmi.bios.date: 11/21/2008 dmi.bios.vendor: Dell Inc. dmi.bios.version: A09 dmi.board.name: 0HT027 dmi.board.vendor: Dell Inc. dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA09:bd11/21/2008:svnDellInc.:pnLatitudeE6400:pvr:rvnDellInc.:rn0HT027:rvr:cvnDellInc.:ct8:cvr: dmi.product.name: Latitude E6400 dmi.sys.vendor: Dell Inc. --- AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.23. Compiled on Sep 19 2010 for kernel 2.6.32-24-generic (SMP). Architecture: i386 ArecordDevices: List of CAPTURE Hardware Devices card 0: Intel [HDA Intel], device 0: STAC92xx Analog [STAC92xx Analog] Subdevices: 2/2 Subdevice #0: subdevice #0 Subdevice #1: subdevice #1 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: stuart 1852 F pulseaudio Card0.Amixer.info: Card hw:0 'Intel'/'HDA Intel at 0xf6adc000 irq 32' Mixer name : 'Intel Cantiga HDMI' Components : 'HDA:111d76b2,10280233,00100302 HDA:80862802,80860101,0010' Controls : 34 Simple ctrls : 22 DistroRelease: Ubuntu 10.04 InstallationMedia: Ubuntu 9.10 "Karmic Koala" - Release i386 (20091028.5) Package: alsa-base 1.0.22.1+dfsg-0ubuntu3 PackageArchitecture: all ProcEnviron: LANG=en_GB.utf8 SHELL=/bin/bash ProcVersionSignature: Ubuntu 2.6.32-24.43-generic 2.6.32.15+drm33.5 Tags: lucid Uname: Linux 2.6.32-24-generic i686 UserGroups: adm admin cdrom dialout lpadmin plugdev sambashare tomcat6 dmi.bios.date: 11/21/2008 dmi.bios.vendor: Dell Inc. dmi.bios.version: A09 dmi.board.name: 0HT027 dmi.board.vendor: Dell Inc. dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA09:bd11/21/2008:svnDellInc.:pnLatitudeE6400:pvr:rvnDellInc.:rn0HT027:rvr:cvnDellInc.:ct8:cvr: dmi.product.name: Latitude E6400 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/643891/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 686158] Re: Maverick update to 2.6.35.9 stable release
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/686158 Title: Maverick update to 2.6.35.9 stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Maverick: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 2.6.35.9 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.9 http://kernel.org/pub/linux/kernel/v2.6/patch-2.6.35.9.bz2 The following patches are in the 2.6.35.9 stable release: * Linux 2.6.35.9 * KVM: x86 emulator: fix regression with cmpxchg8b on i386 hosts * isdn: avoid calling tty_ldisc_flush() in atomic context * sgi-xp: incoming XPC channel messages can come in after the channel's partition structures have been torn down * ARM: cns3xxx: Fixup the missing second parameter to addruart macro to allow them to build. * secmark: do not return early if there was no error * xfrm4: strip ECN bits from tos field * net/core: Allow tagged VLAN packets to flow through VETH devices. * net: add a recursion limit in xmit path * Revert d88dca79d3852a3623f606f781e013d61486828a * Revert c6537d6742985da1fbf12ae26cde6a096fd35b5c * net-2.6: SYN retransmits: Add new parameter to retransmits_timed_out() * tcp: Fix race in tcp_poll * Limit sysctl_tcp_mem and sysctl_udp_mem initializers to prevent integer overflows. * net: Fix the condition passed to sk_wait_event() * rose: Fix signedness issues wrt. digi count. * r6040: Fix multicast filter some more * Phonet: Correct header retrieval after pskb_may_pull * qlcnic: dont set skb->truesize * netxen: dont set skb->truesize * net: Fix IPv6 PMTU disc. w/ asymmetric routes * ipv6: fix refcnt problem related to POSTDAD state * ip: fix truesize mismatch in ip fragmentation * gianfar: Fix crashes on RX path (Was Re: [Bugme-new] [Bug 19692] New: linux-2.6.36-rc5 crash with gianfar ethernet at full line rate traffic) * gianfar: fix double lock typo * net: clear heap allocations for privileged ethtool actions * Fix regressions in scsi_internal_device_block * Fix race when removing SCSI devices * gdth: integer overflow in ioctl * libsas: fix NCQ mixing with non-NCQ * sd name space exhaustion causes system hang * asus-laptop: fix gps rfkill * USB: accept some invalid ep0-maxpacket values * usb: r8a66597-hcd: Change mistake of the outsw function * USB: opticon: Fix long-standing bugs in opticon driver * USB: visor: fix initialisation of UX50/TH55 devices * USB: disable endpoints after unbinding interfaces, not before * USB: atmel_usba_udc: force vbus_pin at -EINVAL when gpio_request failled * USB: cp210x: Add WAGO 750-923 Service Cable device ID * USB: cp210x: Add Renesas RX-Stick device ID * USB: option: Add more ZTE modem USB id's * USB: Change acm_iad_descriptor bFunctionProtocol to USB_CDC_ACM_PROTO_AT_V25TER * usb: musb: blackfin: call gpio_free() on error path in musb_platform_init() * usb: musb: blackfin: call usb_nop_xceiv_unregister() in musb_platform_exit() * USB: MUSB: fix kernel WARNING/oops when unloading module in OTG mode * USB: ftdi_sio: add device ids for ScienceScope * USB: ftdi_sio: new VID/PIDs for various Papouch devices * USB: add PID for FTDI based OpenDCC hardware * USB: ftdi_sio: revert "USB: ftdi_sio: fix DTR/RTS line modes" * USB: ftdi_sio: Add PID for accesio products * USB: gadget: g_multi: fixed vendor and product ID * USB: gadget: g_ffs: fixed vendor and product ID * usb gadget: composite: prevent OOPS for non-standard control request * drivers/net/wireless/p54/eeprom.c: Return -ENOMEM on memory allocation failure * p54usb: add five more USBIDs * p54usb: fix off-by-one on !CONFIG_PM * pipe: fix failure to return error code on ->confirm() * USB: mct_u232: fix broken close * KVM: SVM: Restore correct registers after sel_cr0 intercept emulation * KVM: X86: Report SVM bit to userspace only when supported * x86, vm86: Fix preemption bug for int1 debug and int3 breakpoint handlers. * x86, kdump: Change copy_oldmem_page() to use cached addressing * x86, intr-remap: Set redirection hint in the IRTE * x86, mtrr: Assume SYS_CFG[Tom2ForceMemTypeWB] exists on all future AMD CPUs * x86, olpc: Don't retry EC commands forever * x86, kexec: Make sure to stop all CPUs before exiting the kernel * x86, cpu: Fix renamed, not-yet-shipping AMD CPUID feature bit * mm, x86: Saving vmcore wi
[Kernel-packages] [Bug 645371] Re: [Lucid] Update to DRM33.10 stable kernel
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/645371 Title: [Lucid] Update to DRM33.10 stable kernel Status in linux package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. Lucid was released with the DRM subsystem updated to the 2.6.33 level because 2.6.32 was too unstable there. Until 2.6.33 went out of upstream support, we picked the patches for DRM from this tree. After that we now keep an upstream tree that continues that effort and selectively picks changes from more recent stable kernels or upstream patches that been passing SRU criteria and review. http://git.kernel.org/?p=linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git;a=shortlog;h=refs/tags/v2.6.32.22.10 TEST CASE: TBD == The following 23 patches have been in 2.6.32.22.10: * drm/radeon/kms/igp: sideport is AMD only * drm/radeon/kms: flush HDP cache on GART table updates. * drm/radeon/kms/r7xx: add workaround for hw issue with HDP flush * drm/i915: Check overlay stride errata for i830 and i845 * drm/edid: Fix the HDTV hack sync adjustment * drm/i915: Use RSEN instead of HTPLG for tfp410 monitor detection. * i915: fix ironlake edp panel setup (v4) * drm/radeon/kms: add additional quirk for Acer rv620 laptop * drm/i915: fixup pageflip ringbuffer commands for i8xx * drm/i915: i8xx also doesn't like multiple oustanding pageflips * drm/i915/edp: Flush the write before waiting for PLLs * drm/radeon/kms: disable MSI on IGP chips * drm/radeon/kms: don't enable MSIs on AGP boards * drm/radeon/kms: fix typo in radeon_compute_pll_gain * drm/radeon/kms/DCE3+: switch pads to ddc mode when going i2c * drm/radeon/kms: fix sideport detection on newer rs880 boards * drm: stop information leak of old kernel stack. * drm/i915: Don't touch PORT_HOTPLUG_EN in intel_dp_detect() * drm/i915: Kill dangerous pending-flip debugging * drm/radeon/kms: release AGP bridge at suspend * drm/radeon/kms: initialize set_surface_reg reg for rs600 asic * drm/radeon/kms: fix a regression on r7xx AGP due to the HDP flush fix * Linux 2.6.32.22+drm33.10 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/645371/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 683938] Re: kernel crash on symlink chased from NFS to failing automount
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/683938 Title: kernel crash on symlink chased from NFS to failing automount Status in The Linux Kernel: Fix Released Status in linux package in Ubuntu: Fix Released Status in linux source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Bug description: SRU justification: Impact: When trying to mount an export where server and client have no common authentication method, the client will abort the mount by sending an advisory unmount message to the server. A bug in the RPC client setup causes the sunrpc code to access memory outside an allocated array, which will sooner or later cause the kernel to crash. Fix: Patch from upstream (about to be submitted and targeted for stable too) changes the setup to use the actual array size instead of a manually entered number. Testcase: Server exports a mount with an authentication method the client does not support, eg.: [/etc/exports] /srv/foo *(rw,sec=krb5) Client tries to mount this directory with no special authentication method: while true; do mount :/srv/foo /mnt; sync; sleep 1; done --- Create an automount indirect map entry to a nfs server that will deny the mount with a permission denied error. Create a symlink on some mounted NFS partition pointing at the name of that automount indirect map entry. Chase the symlink with ls, etc. Notice that the automounter tries and fails to mount the partition. (visible with automount -d -f, say) In a few minutes, depending on system activity, the kernel will crash with the symptoms of a memory corruption error. To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/683938/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 646114] Re: mlock on stack will create guard page gap
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/646114 Title: mlock on stack will create guard page gap Status in linux package in Ubuntu: Fix Released Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Fix Released Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux source package in Dapper: Invalid Status in linux-mvl-dove source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-mvl-dove source package in Hardy: Invalid Status in linux source package in Jaunty: Fix Released Status in linux-mvl-dove source package in Jaunty: Invalid Status in linux source package in Karmic: Fix Released Status in linux-mvl-dove source package in Karmic: Invalid Bug description: Calling mlock on a portion of the stack will cause the kernel to incorrectly show a gap in /proc/$pid/maps between the old stack and the mlock region. This can confuse applications. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/646114/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 684888] Re: Update intel_idle driver
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/684888 Title: Update intel_idle driver Status in linux package in Ubuntu: Invalid Status in linux source package in Maverick: Fix Released Bug description: SRU Justification: We periodically provide updated drivers to provide additional support for hardware and provide bug fixes. The intel_idle is a cpuidle driver that loads on specific Intel processors in lieu of the legacy ACPI processor_idle driver. The intent is to make Linux more efficient on these processors, as intel_idle knows more than ACPI, as well as make Linux more immune to ACPI BIOS bugs. As we now support HW that can leverage the intel_idle driver, it's advantageous to provide an updated version of the driver for those interested in it's use. All of the patches are already upstream as well (see details below). I'd originally pursued providing this update via linux-bcakports- modules. However, testing proved that because the acpi_idle driver is built into the kernel, it prevents the intel_idle driver from loading later on via LBM. This is because the core cpuidle driver is not capable of handling run-time changing of idle drivers. I would also like to note that these patches were originally submitted to upstream stable by the upstream maintainer. However, the submission was later retracted due to the fact that some of the patches are cosmetic in nature. See: git://git.kernel.org/pub/scm/linux/kernel/git/lenb/linux- idle-2.6.35.y.git idle-release Impact: These patches should only affect the intel_idle driver. It will also only load on supported systems. This driver can also be disabled by booting with "intel_idle.max_cstate=0" which disables intel_idle and the system will fall back on ACPI's "acpi_idle". I will also update https://wiki.ubuntu.com/Kernel/Dev/KernelDriverDeviations to note the update. Test Case: Load the kernel with the updated intel_idle driver on a system which is supported and confirm it loads/functions. A summary of the usptream patches is as follows: * intel_idle: do not use the LAPIC timer for ATOM C2 * intel_idle: add initial Sandy Bridge support * intel_idle: delete bogus data from cpuidle_state.power_usage * intel_idle: simplify test for leave_mm() * intel_idle: enable Atom C6 * intel_idle: Voluntary leave_mm before entering deeper * cpuidle: extend cpuidle and menu governor to handle dynamic states * intel_idle: add missing __percpu markup * intel_idle: Change mode 755 => 644 * x86, mwait: Move mwait constants to a common header file * intel_idle: recognize Lincroft Atom Processor * intel_idle: add support for Westmere-EX * intel_idle: delete power_policy modparam, and choose substate functions * intel_idle: delete substates DEBUG modparam To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/684888/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 645444] Re: [Lucid] Update to DRM33.8/9 stable kernel
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/645444 Title: [Lucid] Update to DRM33.8/9 stable kernel Status in linux package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. Lucid was released with the DRM subsystem updated to the 2.6.33 level because 2.6.32 was too unstable there. Until 2.6.33 went out of upstream support, we picked the patches for DRM from this tree. After that we now keep an upstream tree that continues that effort and selectively picks changes from more recent stable kernels or upstream patches that been passing SRU criteria and review. http://git.kernel.org/?p=linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git;a=shortlog;h=refs/tags/v2.6.32.17.9 TEST CASE: TBD == The following 10 patches have been in DRM33.8: * drm/i915: don't access FW_BLC_SELF on 965G * drm/radeon/kms: add quirk for ASUS HD 3600 board * drm/i915: gen3 page flipping fixes * drm/i915: don't queue flips during a flip pending event * drm/i915: Hold the spinlock whilst resetting unpin_work along error path * drm/i915: handle shared framebuffers when flipping * drm/i915: add PANEL_UNLOCK_REGS definition * drm/i915: make sure eDP panel is turned on * drm/i915: make sure we shut off the panel in eDP configs * Linux 2.6.32.17+drm33.8 The following 2 patches have been in DRM33.9 (Revert because accidentally applied twice): * Revert "drm/radeon/kms: add quirk for ASUS HD 3600 board" * Linux 2.6.32.17+drm33.9 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/645444/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 663176] Re: [Lucid] Update to DRM33.11 stable kernel
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/663176 Title: [Lucid] Update to DRM33.11 stable kernel Status in linux package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. Lucid was released with the DRM subsystem updated to the 2.6.33 level because 2.6.32 was too unstable there. Until 2.6.33 went out of upstream support, we picked the patches for DRM from this tree. After that we now keep an upstream tree that continues that effort and selectively picks changes from more recent stable kernels or upstream patches that been passing SRU criteria and review. http://git.kernel.org/?p=linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git;a=shortlog;h=refs/tags/v2.6.32.24.11 TEST CASE: TBD == The following 12 patches have been in 2.6.32.24.11: * i915: return -EFAULT if copy_to_user fails * i915_gem: return -EFAULT if copy_to_user fails * drm/i915: Prevent double dpms on * drm: Only decouple the old_fb from the crtc is we call mode_set* * drm/radeon/kms: fix potential segfault in r600_ioctl_wait_idle * drm/i915: Unset cursor if out-of-bounds upon mode change (v4) * drm/i915: disable FBC when more than one pipe is active * drm/radeon/kms: fix macbookpro connector quirk * drm/nouveau: use ALIGN instead of open coding it * drm/nouveau: Fix fbcon corruption with font width not divisible by 8 * drm/i915,agp/intel: Add second set of PCI-IDs for B43 * Linux 2.6.32.24+drm33.11 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/663176/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 716648] Re: linux: 2.6.31-22.73 -proposed tracker
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ec2 in Ubuntu. https://bugs.launchpad.net/bugs/716648 Title: linux: 2.6.31-22.73 -proposed tracker Status in linux package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux source package in Karmic: Fix Released Status in linux-ec2 source package in Karmic: Fix Released Bug description: This bug is for tracking the 2.6.31-22.73 upload package. This bug will contain status and testing results releated to that upload. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/716648/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 711797] Re: CVE-2010-4157
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/711797 Title: CVE-2010-4157 Status in linux package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-fsl-imx51 source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-fsl-imx51 source package in Maverick: Invalid Status in linux-ti-omap4 source package in Maverick: Won't Fix Status in linux source package in Natty: Invalid Status in linux-fsl-imx51 source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Invalid Status in linux source package in Dapper: Won't Fix Status in linux-fsl-imx51 source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-fsl-imx51 source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-fsl-imx51 source package in Karmic: Won't Fix Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711797/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 477106] Re: [regression] lucid alpha-2 and earlier freeze upon suspend with sd card plugged in with some hardware
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/477106 Title: [regression] lucid alpha-2 and earlier freeze upon suspend with sd card plugged in with some hardware Status in linux package in Ubuntu: Fix Released Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Bug description: This is another bugreport in a great series I filed. This time, against the lucid kernel. ProblemType: KernelOops Annotation: This occured during a previous suspend and prevented it from resuming properly. Architecture: amd64 ArecordDevices: List of CAPTURE Hardware Devices card 0: Intel [HDA Intel], device 0: AD198x Analog [AD198x Analog] Subdevices: 2/2 Subdevice #0: subdevice #0 Subdevice #1: subdevice #1 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: muelli 1720 F pulseaudio Card0.Amixer.info: Card hw:0 'Intel'/'HDA Intel at 0xf822 irq 17' Mixer name : 'Analog Devices AD1984' Components : 'HDA:11d41984,17aa20d6,00100400' Controls : 29 Simple ctrls : 18 Date: Sat Nov 7 00:00:53 2009 DistroRelease: Ubuntu 9.10 ExecutablePath: /usr/share/apport/apportcheckresume Failure: suspend/resume HibernationDevice: #RESUME=UUID=5273fb39-2d17-4d61-bc89-2c1b6efa1db3 InterpreterPath: /usr/bin/python2.6 MachineType: LENOVO 766636G Package: linux-image-2.6.32-2-generic 2.6.32-2.2 PccardctlIdent: Socket 0: no product info available PccardctlStatus: Socket 0: no card ProcCmdLine: root=/dev/mapper/cryptroot source=UUID=9c3d5596-27c6-4fd5-bfcd-fa8eef6f1230 ro quiet splash crashkernel=384M-2G:64M,2G-:128M ProcCmdline: /usr/bin/python /usr/share/apport/apportcheckresume ProcEnviron: PATH=(custom, no user) ProcVersionSignature: Ubuntu 2.6.32-2.2-generic RelatedPackageVersions: linux-firmware 1.24 SourcePackage: linux Tags: resume suspend Title: [LENOVO 766636G] suspend/resume failure Uname: Linux 2.6.32-2-generic x86_64 UserGroups: WpaSupplicantLog: dmi.bios.date: 07/01/2008 dmi.bios.vendor: LENOVO dmi.bios.version: 7NETB6WW (2.16 ) dmi.board.name: 766636G dmi.board.vendor: LENOVO dmi.board.version: Not Available dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Not Available dmi.modalias: dmi:bvnLENOVO:bvr7NETB6WW(2.16):bd07/01/2008:svnLENOVO:pn766636G:pvrThinkPadX61s:rvnLENOVO:rn766636G:rvrNotAvailable:cvnLENOVO:ct10:cvrNotAvailable: dmi.product.name: 766636G dmi.product.version: ThinkPad X61s dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/477106/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 716551] Re: linux: 2.6.32-29.58 -proposed tracker
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/716551 Title: linux: 2.6.32-29.58 -proposed tracker Status in linux package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Fix Released Status in linux source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Bug description: This bug is for tracking the 2.6.32-29.58 upload package. This bug will contain status and testing results releated to that upload. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/716551/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 720189] Re: CVE-2010-4076, CVE-2010-4077
** CVE removed: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4249 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu. https://bugs.launchpad.net/bugs/720189 Title: CVE-2010-4076, CVE-2010-4077 Status in linux package in Ubuntu: Fix Released Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Lucid: Fix Released Status in linux-lts-backport-maverick source package in Lucid: Fix Released Status in linux-mvl-dove source package in Lucid: Fix Released Status in linux-ti-omap4 source package in Lucid: Invalid Status in linux source package in Maverick: Fix Released Status in linux-lts-backport-maverick source package in Maverick: Invalid Status in linux-mvl-dove source package in Maverick: Fix Released Status in linux-ti-omap4 source package in Maverick: Fix Released Status in linux source package in Natty: Fix Released Status in linux-lts-backport-maverick source package in Natty: Invalid Status in linux-mvl-dove source package in Natty: Invalid Status in linux-ti-omap4 source package in Natty: Fix Released Status in linux source package in Dapper: Fix Released Status in linux-lts-backport-maverick source package in Dapper: Invalid Status in linux-mvl-dove source package in Dapper: Invalid Status in linux-ti-omap4 source package in Dapper: Invalid Status in linux source package in Hardy: Fix Released Status in linux-lts-backport-maverick source package in Hardy: Invalid Status in linux-mvl-dove source package in Hardy: Invalid Status in linux-ti-omap4 source package in Hardy: Invalid Status in linux source package in Karmic: Fix Released Status in linux-lts-backport-maverick source package in Karmic: Invalid Status in linux-mvl-dove source package in Karmic: Invalid Status in linux-ti-omap4 source package in Karmic: Invalid Bug description: The rs_ioctl function in drivers/char/amiserial.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/720189/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1420580] Re: linux-ec2: 2.6.32-376.93 -proposed tracker
** Changed in: kernel-sru-workflow/verification-testing Status: New => In Progress ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Description changed: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 11. February 2015 02:03 UTC kernel-stable-master-bug:1419974 kernel-stable-Certification-testing-end:Wednesday, 11. February 2015 10:01 UTC kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 15:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 15:02 UTC - kernel-stable-phase-changed:Wednesday, 11. February 2015 15:02 UTC - kernel-stable-phase:ReadyToBePackaged kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC + kernel-stable-phase:Verification & Testing + kernel-stable-phase-changed:Thursday, 12. February 2015 06:03 UTC + kernel-stable-Security-signoff-start:Thursday, 12. February 2015 06:03 UTC + kernel-stable-Verification-testing-start:Thursday, 12. February 2015 06:03 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ec2 in Ubuntu. https://bugs.launchpad.net/bugs/1420580 Title: linux-ec2: 2.6.32-376.93 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Confirmed Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-ec2 package in Ubuntu: Invalid Status in linux-ec2 source package in Lucid: New Bug description: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 11. February 2015 02:03 UTC kernel-stable-master-bug:1419974 kernel-stable-Certification-testing-end:Wednesday, 11. February 2015 10:01 UTC kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 15:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 15:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 12. February 2015 06:03 UTC kernel-stable-Security-signoff-start:Thursday, 12. February 2015 06:03 UTC kernel-stable-Verification-testing-start:Thursday, 12. February 2015 06:03 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1420580/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1419974] Re: linux: 2.6.32-73.140 -proposed tracker
** Changed in: kernel-sru-workflow/verification-testing Status: New => In Progress ** Changed in: kernel-sru-workflow/certification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Description changed: This bug is for tracking the 2.6.32-73.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 09. February 2015 20:19 UTC - kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 02:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 02:05 UTC - kernel-stable-phase-changed:Wednesday, 11. February 2015 02:05 UTC kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC + kernel-stable-phase:Verification & Testing + kernel-stable-phase-changed:Thursday, 12. February 2015 06:02 UTC + kernel-stable-Verification-testing-start:Thursday, 12. February 2015 06:02 UTC + kernel-stable-Certification-testing-start:Thursday, 12. February 2015 06:02 UTC + kernel-stable-Security-signoff-start:Thursday, 12. February 2015 06:02 UTC + kernel-stable-Regression-testing-start:Thursday, 12. February 2015 06:02 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1419974 Title: linux: 2.6.32-73.140 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Confirmed Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux package in Ubuntu: Invalid Status in linux source package in Lucid: New Bug description: This bug is for tracking the 2.6.32-73.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 09. February 2015 20:19 UTC kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 02:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 02:05 UTC kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 12. February 2015 06:02 UTC kernel-stable-Verification-testing-start:Thursday, 12. February 2015 06:02 UTC kernel-stable-Certification-testing-start:Thursday, 12. February 2015 06:02 UTC kernel-stable-Security-signoff-start:Thursday, 12. February 2015 06:02 UTC kernel-stable-Regression-testing-start:Thursday, 12. February 2015 06:02 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1419974/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1400215] Re: Atheros BT devices(ath3k) fail to work on USB3.0 buses
patch has been submitted to kernel-team and stable@vger -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1400215 Title: Atheros BT devices(ath3k) fail to work on USB3.0 buses Status in HWE Next Project: In Progress Status in linux package in Ubuntu: In Progress Bug description: Atheros BT devices(ath3k) fail to work on USB3.0 buses, but work well on USB 2.0 1. BT devices will disappear from USB3.0 buses. 2. BT devices can be found on USB3.0 buses, but can not be found by hciconfig. 3. There are FW loading error messages in dmesg with USB3.0. $ dmesg | grep Blu [ 13.996701] Bluetooth: Core ver 2.19 [ 13.996716] Bluetooth: HCI device and connection manager initialized [ 13.996722] Bluetooth: HCI socket layer initialized [ 13.996723] Bluetooth: L2CAP socket layer initialized [ 13.996729] Bluetooth: SCO socket layer initialized [ 15.763696] Bluetooth: RFCOMM TTY layer initialized [ 15.763705] Bluetooth: RFCOMM socket layer initialized [ 15.763709] Bluetooth: RFCOMM ver 1.11 [ 15.772693] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [ 15.772696] Bluetooth: BNEP filters: protocol multicast [ 15.772703] Bluetooth: BNEP socket layer initialized [ 17.378235] Bluetooth: Error in firmware loading err = -110,len = 448, size = 1496 [ 17.378242] Bluetooth: Loading sysconfig file failed To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1400215/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1417915] Re: ThinkPad T550: thinkpad_acpi is not loaded automatically
patch is in x86-platform upstreaming queue now. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1417915 Title: ThinkPad T550: thinkpad_acpi is not loaded automatically Status in HWE Next Project: In Progress Status in linux package in Ubuntu: In Progress Bug description: BIOS version has new string pattern now, "xxxyTkkW", need to add that support. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1417915/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1400215] Re: Atheros BT devices(ath3k) fail to work on USB3.0 buses
it's in mainline now, start backporting, c561a5753dd631920c4459a067d22679b3d110d6 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1400215 Title: Atheros BT devices(ath3k) fail to work on USB3.0 buses Status in HWE Next Project: In Progress Status in linux package in Ubuntu: In Progress Bug description: Atheros BT devices(ath3k) fail to work on USB3.0 buses, but work well on USB 2.0 1. BT devices will disappear from USB3.0 buses. 2. BT devices can be found on USB3.0 buses, but can not be found by hciconfig. 3. There are FW loading error messages in dmesg with USB3.0. $ dmesg | grep Blu [ 13.996701] Bluetooth: Core ver 2.19 [ 13.996716] Bluetooth: HCI device and connection manager initialized [ 13.996722] Bluetooth: HCI socket layer initialized [ 13.996723] Bluetooth: L2CAP socket layer initialized [ 13.996729] Bluetooth: SCO socket layer initialized [ 15.763696] Bluetooth: RFCOMM TTY layer initialized [ 15.763705] Bluetooth: RFCOMM socket layer initialized [ 15.763709] Bluetooth: RFCOMM ver 1.11 [ 15.772693] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [ 15.772696] Bluetooth: BNEP filters: protocol multicast [ 15.772703] Bluetooth: BNEP socket layer initialized [ 17.378235] Bluetooth: Error in firmware loading err = -110,len = 448, size = 1496 [ 17.378242] Bluetooth: Loading sysconfig file failed To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1400215/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1419974] Re: linux: 2.6.32-73.140 -proposed tracker
** Description changed: This bug is for tracking the 2.6.32-73.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 09. February 2015 20:19 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 02:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 02:05 UTC kernel-stable-phase-changed:Wednesday, 11. February 2015 02:05 UTC + kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1419974 Title: linux: 2.6.32-73.140 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Lucid: New Bug description: This bug is for tracking the 2.6.32-73.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 09. February 2015 20:19 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 02:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 02:05 UTC kernel-stable-phase-changed:Wednesday, 11. February 2015 02:05 UTC kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1419974/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1420580] Re: linux-ec2: 2.6.32-376.93 -proposed tracker
** Description changed: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 11. February 2015 02:03 UTC kernel-stable-master-bug:1419974 kernel-stable-Certification-testing-end:Wednesday, 11. February 2015 10:01 UTC kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 15:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 15:02 UTC kernel-stable-phase-changed:Wednesday, 11. February 2015 15:02 UTC kernel-stable-phase:ReadyToBePackaged + kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ec2 in Ubuntu. https://bugs.launchpad.net/bugs/1420580 Title: linux-ec2: 2.6.32-376.93 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-ec2 package in Ubuntu: Invalid Status in linux-ec2 source package in Lucid: New Bug description: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 11. February 2015 02:03 UTC kernel-stable-master-bug:1419974 kernel-stable-Certification-testing-end:Wednesday, 11. February 2015 10:01 UTC kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 15:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 15:02 UTC kernel-stable-phase-changed:Wednesday, 11. February 2015 15:02 UTC kernel-stable-phase:ReadyToBePackaged kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1420580/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1401960] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1401960 Title: usb 3 hdd drive takes inordinate time to become available after attaching Status in linux package in Ubuntu: Confirmed Bug description: Test case: Boot up, log in attach a usb 3 hdd drive (type that doesn't have it's own power supply What happens: Takes about 30 -35 sec. before the drive shows in nautilus & unity launcher What's expected: drive should show in a sec. or less ProblemType: Bug DistroRelease: Ubuntu 15.04 Package: linux-image-3.16.0-25-generic 3.16.0-25.33 ProcVersionSignature: Ubuntu 3.16.0-25.33-generic 3.16.7 Uname: Linux 3.16.0-25-generic x86_64 ApportVersion: 2.15-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: doug 2152 F pulseaudio /dev/snd/controlC1: doug 2152 F pulseaudio CurrentDesktop: Unity Date: Fri Dec 12 11:10:14 2014 InstallationDate: Installed on 2014-11-16 (26 days ago) InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Alpha amd64 (20141114) MachineType: LENOVO 20217 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-25-generic.efi.signed root=UUID=91a821ed-7160-439b-8519-939faa93bf90 ro quiet splash RelatedPackageVersions: linux-restricted-modules-3.16.0-25-generic N/A linux-backports-modules-3.16.0-25-generic N/A linux-firmware 1.139 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/18/2013 dmi.bios.vendor: LENOVO dmi.bios.version: 74CN44WW(V3.05) dmi.board.asset.tag: No Asset Tag dmi.board.name: VIQY0Y1 dmi.board.vendor: LENOVO dmi.board.version: 31900058STD dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Lenovo IdeaPad Y510P dmi.modalias: dmi:bvnLENOVO:bvr74CN44WW(V3.05):bd09/18/2013:svnLENOVO:pn20217:pvrLenovoIdeaPadY510P:rvnLENOVO:rnVIQY0Y1:rvr31900058STD:cvnLENOVO:ct10:cvrLenovoIdeaPadY510P: dmi.product.name: 20217 dmi.product.version: Lenovo IdeaPad Y510P dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1401960/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1419974] Re: linux: 2.6.32-73.140 -proposed tracker
Copied to -proposed and overrides adjusted. ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1419974 Title: linux: 2.6.32-73.140 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Lucid: New Bug description: This bug is for tracking the 2.6.32-73.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 09. February 2015 20:19 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 02:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 02:05 UTC kernel-stable-phase-changed:Wednesday, 11. February 2015 02:05 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1419974/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1420580] Re: linux-ec2: 2.6.32-376.93 -proposed tracker
Copied to -proposed. ** Changed in: linux-ec2 (Ubuntu) Status: New => Invalid ** Changed in: kernel-sru-workflow/upload-to-ppa Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ec2 in Ubuntu. https://bugs.launchpad.net/bugs/1420580 Title: linux-ec2: 2.6.32-376.93 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux-ec2 package in Ubuntu: Invalid Status in linux-ec2 source package in Lucid: New Bug description: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 11. February 2015 02:03 UTC kernel-stable-master-bug:1419974 kernel-stable-Certification-testing-end:Wednesday, 11. February 2015 10:01 UTC kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 15:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 15:02 UTC kernel-stable-phase-changed:Wednesday, 11. February 2015 15:02 UTC kernel-stable-phase:ReadyToBePackaged To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1420580/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1419974] Re: linux: 2.6.32-73.140 -proposed tracker
** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1419974 Title: linux: 2.6.32-73.140 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow package-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-ports-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Lucid: New Bug description: This bug is for tracking the 2.6.32-73.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 09. February 2015 20:19 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 02:05 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 02:05 UTC kernel-stable-phase-changed:Wednesday, 11. February 2015 02:05 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1419974/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1401960] Re: usb 3 hdd drive takes inordinate time to become available after attaching
** Changed in: linux (Ubuntu) Status: Expired => New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1401960 Title: usb 3 hdd drive takes inordinate time to become available after attaching Status in linux package in Ubuntu: New Bug description: Test case: Boot up, log in attach a usb 3 hdd drive (type that doesn't have it's own power supply What happens: Takes about 30 -35 sec. before the drive shows in nautilus & unity launcher What's expected: drive should show in a sec. or less ProblemType: Bug DistroRelease: Ubuntu 15.04 Package: linux-image-3.16.0-25-generic 3.16.0-25.33 ProcVersionSignature: Ubuntu 3.16.0-25.33-generic 3.16.7 Uname: Linux 3.16.0-25-generic x86_64 ApportVersion: 2.15-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: doug 2152 F pulseaudio /dev/snd/controlC1: doug 2152 F pulseaudio CurrentDesktop: Unity Date: Fri Dec 12 11:10:14 2014 InstallationDate: Installed on 2014-11-16 (26 days ago) InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Alpha amd64 (20141114) MachineType: LENOVO 20217 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-25-generic.efi.signed root=UUID=91a821ed-7160-439b-8519-939faa93bf90 ro quiet splash RelatedPackageVersions: linux-restricted-modules-3.16.0-25-generic N/A linux-backports-modules-3.16.0-25-generic N/A linux-firmware 1.139 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/18/2013 dmi.bios.vendor: LENOVO dmi.bios.version: 74CN44WW(V3.05) dmi.board.asset.tag: No Asset Tag dmi.board.name: VIQY0Y1 dmi.board.vendor: LENOVO dmi.board.version: 31900058STD dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Lenovo IdeaPad Y510P dmi.modalias: dmi:bvnLENOVO:bvr74CN44WW(V3.05):bd09/18/2013:svnLENOVO:pn20217:pvrLenovoIdeaPadY510P:rvnLENOVO:rnVIQY0Y1:rvr31900058STD:cvnLENOVO:ct10:cvrLenovoIdeaPadY510P: dmi.product.name: 20217 dmi.product.version: Lenovo IdeaPad Y510P dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1401960/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp