[Kernel-packages] [Bug 812360] Re: linux: 2.6.24-29.92 -proposed tracker

2015-02-11 Thread Kees Cook
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/812360

Title:
  linux: 2.6.24-29.92 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.24-29.92 upload package. This bug
  will contain status and testing results releated to that upload.

  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  kernel-stable-Prepare-package-start:Tuesday, 18. July 2011 15:31 UTC
  kernel-stable-Promote-to-updates-end:Tuesday, 08. August 2011 21:40 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/812360/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 706149] Re: CVE-2010-4074

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/706149

Title:
  CVE-2010-4074

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux source package in Karmic:
  Fix Released

Bug description:
  The USB subsystem in the Linux kernel before 2.6.36-rc5 does not
  properly initialize certain structure members, which allows local
  users to obtain potentially sensitive information from kernel stack
  memory via vectors related to TIOCGICOUNT ioctl calls, and the (1)
  mos7720_ioctl function in drivers/usb/serial/mos7720.c and (2)
  mos7840_ioctl function in drivers/usb/serial/mos7840.c.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/706149/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 803931] Re: CVE-2010-4238

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/803931

Title:
  CVE-2010-4238

Status in linux package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Invalid
Status in linux-fsl-imx51 source package in Lucid:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Invalid
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Invalid
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-lts-backport-maverick source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Invalid
Status in linux-ti-omap4 source package in Maverick:
  Invalid
Status in linux source package in Natty:
  Invalid
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Oneiric:
  Invalid
Status in linux-fsl-imx51 source package in Oneiric:
  Invalid
Status in linux-lts-backport-maverick source package in Oneiric:
  Invalid
Status in linux-mvl-dove source package in Oneiric:
  Invalid
Status in linux-ti-omap4 source package in Oneiric:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-lts-backport-maverick source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid

Bug description:
  The vbd_create function in Xen 3.1.2, when the Linux kernel 2.6.18 on
  Red Hat Enterprise Linux (RHEL) 5 is used, allows guest OS users to
  cause a denial of service (host OS panic) via an attempted access to a
  virtual CD-ROM device through the blkback driver. NOTE: some of these
  details are obtained from third party information.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/803931/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 731971] Re: CVE-2010-4346

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/731971

Title:
  CVE-2010-4346

Status in linux package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-lts-backport-maverick source package in Lucid:
  Won't Fix
Status in linux-mvl-dove source package in Lucid:
  In Progress
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-lts-backport-maverick source package in Maverick:
  Won't Fix
Status in linux-mvl-dove source package in Maverick:
  Won't Fix
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Invalid
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Invalid
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-lts-backport-maverick source package in Dapper:
  Won't Fix
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-lts-backport-maverick source package in Hardy:
  Won't Fix
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-lts-backport-maverick source package in Karmic:
  Won't Fix
Status in linux-mvl-dove source package in Karmic:
  Invalid
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  The install_special_mapping function in mm/mmap.c in the Linux kernel
  before 2.6.37-rc6 does not make an expected security_file_mmap
  function call, which allows local users to bypass intended
  mmap_min_addr restrictions and possibly conduct NULL pointer
  dereference attacks via a crafted assembly-language application.

  upstream commit: 462e635e5b73ba9a4c03913b77138cd57ce4b050

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/731971/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 709153] Re: CVE-2010-3865

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/709153

Title:
  CVE-2010-3865

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Invalid
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Invalid
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-mvl-dove source package in Karmic:
  Invalid
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in
  the Linux kernel allows local users to cause a denial of service
  (crash) and possibly execute arbitrary code via a crafted iovec struct
  in a Reliable Datagram Sockets (RDS) request, which triggers a buffer
  overflow.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/709153/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 712609] Re: CVE-2010-4248

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/712609

Title:
  CVE-2010-4248

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Invalid
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  posix-cpu-timers.c correctly assumes that the dying process does
  posix_cpu_timers_exit_group() and removes all !CPUCLOCK_PERTHREAD
  timers from signal->cpu_timers list.

  But, it also assumes that timer->it.cpu.task is always the group
  leader, and thus the dead ->task means the dead thread group.

  This is obviously not true after de_thread() changes the leader.
  After that almost every posix_cpu_timer_ method has problems.

  It is not simple to fix this bug correctly. First of all, I think
  that timer->it.cpu should use struct pid instead of task_struct.
  Also, the locking should be reworked completely. In particular,
  tasklist_lock should not be used at all. This all needs a lot of
  nontrivial and hard-to-test changes.

  Change __exit_signal() to do posix_cpu_timers_exit_group() when
  the old leader dies during exec. This is not the fix, just the
  temporary hack to hide the problem for 2.6.37 and stable. IOW,
  this is obviously wrong but this is what we currently have anyway:
  cpu timers do not work after mt exec.

  In theory this change adds another race. The exiting leader can
  detach the timers which were attached to the new leader. However,
  the window between de_thread() and release_task() is small, we
  can pretend that sys_timer_create() was called before de_thread().

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712609/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 688669] Re: Lucid update to 2.6.32.27+drm33.12 stable release

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/688669

Title:
  Lucid update to 2.6.32.27+drm33.12 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released

Bug description:
  SRU Justification

  Impact:
    The upstream process for stable tree updates is quite similar
    in scope to the Ubuntu SRU process, e.g., each patch has to
    demonstrably fix a bug, and each patch is vetted by upstream
    by originating either directly from Linus' tree or in a minimally
    backported form of that patch. The 2.6.32.27+drm33.12 upstream stable
    patch set is now available. It should be included in the Ubuntu
    kernel as well.

    git://git.kernel.org/pub/scm/linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git
    
http://git.kernel.org/?p=linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git;a=summary

  TEST CASE: TBD

    The following 126 patches are in the 2.6.32.27+drm33.12 stable
  release:

    * block: Ensure physical block size is unsigned int
    * block: limit vec count in bio_kmalloc() and bio_alloc_map_data()
    * block: take care not to overflow when calculating total iov length
    * block: check for proper length of iov entries in blk_rq_map_user_iov()
    * jme: Fix PHY power-off error
    * irda: Fix parameter extraction stack overflow
    * irda: Fix heap memory corruption in iriap.c
    * i2c-pca-platform: Change device name of request_irq
    * microblaze: Fix build with make 3.82
    * net: clear heap allocation for ETHTOOL_GRXCLSRLALL
    * Staging: asus_oled: fix up some sysfs attribute permissions
    * Staging: asus_oled: fix up my fixup for some sysfs attribute permissions
    * Staging: line6: fix up some sysfs attribute permissions
    * hpet: fix unwanted interrupt due to stale irq status bit
    * hpet: unmap unused I/O space
    * olpc_battery: Fix endian neutral breakage for s16 values
    * percpu: fix list_head init bug in __percpu_counter_init()
    * um: remove PAGE_SIZE alignment in linker script causing kernel segfault.
    * um: fix global timer issue when using CONFIG_NO_HZ
    * numa: fix slab_node(MPOL_BIND)
    * hwmon: (lm85) Fix ADT7468 frequency table
    * mm: fix return value of scan_lru_pages in memory unplug
    * mm: fix is_mem_section_removable() page_order BUG_ON check
    * ahci,ata_generic: let ata_generic handle new MBP w/ MCP89
    * ata_generic: implement ATA_GEN_* flags and force enable DMA on MBP 7,1
    * ssb: b43-pci-bridge: Add new vendor for BCM4318
    * sgi-xpc: XPC fails to discover partitions with all nasids above 128
    * xen: ensure that all event channels start off bound to VCPU 0
    * xen: don't bother to stop other cpus on shutdown/reboot
    * ipc: initialize structure memory to zero for compat functions
    * ipc: shm: fix information leak to userland
    * sys_semctl: fix kernel stack leakage
    * net: NETIF_F_HW_CSUM does not imply FCoE CRC offload
    * drivers/char/vt_ioctl.c: fix VT_OPENQRY error value
    * viafb: use proper register for colour when doing fill ops
    * eCryptfs: Clear LOOKUP_OPEN flag when creating lower file
    * md/raid1: really fix recovery looping when single good device fails.
    * md: fix return value of rdev_size_change()
    * x86: AMD Northbridge: Verify NB's node is online
    * tty: prevent DOS in the flush_to_ldisc
    * TTY: restore tty_ldisc_wait_idle
    * tty_ldisc: Fix BUG() on hangup
    * TTY: ldisc, fix open flag handling
    * KVM: VMX: fix vmx null pointer dereference on debug register access
    * KVM: x86: fix information leak to userland
    * KVM: VMX: Fix host userspace gsbase corruption
    * firewire: cdev: fix information leak
    * firewire: core: fix an information leak
    * firewire: ohci: fix buffer overflow in AR split packet handling
    * firewire: ohci: fix race in AR split packet handling
    * ALSA: ac97: Apply quirk for Dell Latitude D610 binding Master and 
Headphone controls
    * ALSA: HDA: Add an extra DAC for Realtek ALC887-VD
    * ALSA: hda: Use "alienware" model quirk for another SSID
    * netfilter: nf_conntrack: allow nf_ct_alloc_hashtable() to get highmem 
pages
    * latencytop: fix per task accumulator
    * mm/vfs: revalidate page->mapping in do_generic_file_read()
    * bio: take care not overflow page count when mapping/copying user data
    * libata-scsi passthru: fix bug which truncated LBA48 return values
    * libata: fix NULL sdev dereference race in atapi_qc_complete()
    * PCI: fix size checks for mmap() on /proc/bus/pci files
    * PCI: fix offset check for sysfs mmapped files
    * efifb: check that the base address is plausible on pci systems
    * USB: gadget: AT91: fix typo in atmel_usba_udc driver
    * USB: ftdi_sio: add device IDs for Milkymist One JTAG/serial
    * USB: option: fix when the drive

[Kernel-packages] [Bug 690730] Re: Maverick update to 2.6.35.10 stable upstream

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/690730

Title:
  Maverick update to 2.6.35.10 stable upstream

Status in linux package in Ubuntu:
  Fix Released

Bug description:
   SRU Justification

   Impact:

   The upstream process for stable tree updates is quite similar in
  scope to the Ubuntu SRU process, e.g., each patch has to demonstrably
  fix a bug, and each patch is vetted by upstream by originating either
  directly from Linus' tree or in a minimally backported form of that
  patch.

   The 2.6.35.10 upstream stable patch set is now available. It should be
   included in the Ubuntu kernel as well.

   http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.10
   http://kernel.org/pub/linux/kernel/v2.6/patch-2.6.35.10.bz2

   The following patches are in the 2.6.35.10 stable release:

   * block: Ensure physical block size is unsigned int
   * block: Fix race during disk initialization
   * block: limit vec count in bio_kmalloc() and bio_alloc_map_data()
   * block: take care not to overflow when calculating total iov length
   * block: check for proper length of iov entries in blk_rq_map_user_iov()
   * drm/radeon/kms: don't disable shared encoders on pre-DCE3 display blocks
   * jme: Fix PHY power-off error
   * irda: Fix parameter extraction stack overflow
   * irda: Fix heap memory corruption in iriap.c
   * cfg80211: fix BSS double-unlinking
   * cfg80211: fix locking
   * cfg80211: fix regression on processing country IEs
   * mac80211: fix channel assumption for association done work
   * mac80211: fix offchannel assumption upon association
   * mac80211: Fix signal strength average initialization for CQM events
   * mac80211: add helper for reseting the connection monitor
   * mac80211: reset connection idle when going offchannel
   * mac80211: make the beacon monitor available externally
   * mac80211: send last 3/5 probe requests as unicast
   * mac80211: disable beacon monitor while going offchannel
   * mac80211: use correct station flags lock
   * mac80211: clear txflags for ps-filtered frames
   * mac80211: reset probe send counter upon connection timer reset
   * mac80211: Fix ibss station got expired immediately
   * mac80211: don't sanitize invalid rates
   * mac80211: delete AddBA response timer
   * isdn/gigaset: fix bas_gigaset AT read error handling
   * isdn/gigaset: correct bas_gigaset rx buffer handling
   * isdn/gigaset: bas_gigaset locking fix
   * i2c-pca-platform: Change device name of request_irq
   * viafb: fix i2c_transfer error handling
   * drm/radeon/kms: register an i2c adapter name for the dp aux bus
   * ALSA: hda - Fix wrong SPDIF NID assignment for CA0110
   * ALSA: hda - Add some workarounds for Creative IBG
   * ALSA: OSS mixer emulation - fix locking
   * ALSA: HDA: Enable internal mic on Dell E6410 and Dell E6510
   * powerpc: Fix call to subpage_protection()
   * microblaze: Fix build with make 3.82
   * NFSv4: Don't call nfs4_reclaim_complete() on receiving 
NFS4ERR_STALE_CLIENTID
   * NFSv4: Don't call nfs4_state_mark_reclaim_reboot() from error handlers
   * NFSv4: Fix open recovery
   * NFS: Don't SIGBUS if nfs_vm_page_mkwrite races with a cache invalidation
   * drm/radeon/kms: MC vram map needs to be >= pci aperture size
   * drm/radeon/kms: properly compute group_size on 6xx/7xx
   * drm/radeon/kms: make sure blit addr masks are 64 bit
   * drm/radeon/kms: fix handling of tex lookup disable in cs checker on r2xx
   * drm/i915: Free hardware status page on unload when physically mapped
   * drm/i915: diasable clock gating for the panel power sequencer
   * drm/i915/overlay: Ensure that the reg_bo is in the GTT prior to writing.
   * pcnet_cs: add new_id
   * SH: Add missing consts to sys_execve() declaration
   * reiserfs: fix inode mutex - reiserfs lock misordering
   * reiserfs: don't acquire lock recursively in reiserfs_acl_chmod
   * staging: rt2870: Add new USB ID for Belkin F6D4050 v1
   * Staging: asus_oled: fix up some sysfs attribute permissions
   * Staging: asus_oled: fix up my fixup for some sysfs attribute permissions
   * ALSA: hda: Use hp-laptop quirk to enable headphones automute for Asus A52J
   * Staging: line6: fix up some sysfs attribute permissions
   * hpet: fix unwanted interrupt due to stale irq status bit
   * hpet: unmap unused I/O space
   * olpc_battery: Fix endian neutral breakage for s16 values
   * percpu: fix list_head init bug in __percpu_counter_init()
   * ipmi: proper spinlock initialization
   * um: remove PAGE_SIZE alignment in linker script causing kernel segfault.
   * um: fix global timer issue when using CONFIG_NO_HZ
   * numa: fix slab_node(MPOL_BIND)
   * hwmon: (lm85) Fix ADT7468 frequency table
   * oprofile: Fix the hang while taking the cpu offline
   * mm: fix return value of scan_lru_pages in memory un

[Kernel-packages] [Bug 801482] Re: CVE-2011-1171

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/801482

Title:
  CVE-2011-1171

Status in linux package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-lts-backport-natty package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-ec2 source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-lts-backport-maverick source package in Lucid:
  Fix Released
Status in linux-lts-backport-natty source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-ec2 source package in Maverick:
  Invalid
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-lts-backport-maverick source package in Maverick:
  Invalid
Status in linux-lts-backport-natty source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-ec2 source package in Natty:
  Invalid
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-lts-backport-natty source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Fix Released
Status in linux source package in Oneiric:
  Invalid
Status in linux-ec2 source package in Oneiric:
  Invalid
Status in linux-fsl-imx51 source package in Oneiric:
  Invalid
Status in linux-lts-backport-maverick source package in Oneiric:
  Invalid
Status in linux-lts-backport-natty source package in Oneiric:
  Invalid
Status in linux-mvl-dove source package in Oneiric:
  Invalid
Status in linux-ti-omap4 source package in Oneiric:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-ec2 source package in Hardy:
  Invalid
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-lts-backport-maverick source package in Hardy:
  Invalid
Status in linux-lts-backport-natty source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid

Bug description:
  net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux
  kernel before 2.6.39 does not place the expected '\0' character at the
  end of string data in the values of certain structure members, which
  allows local users to obtain potentially sensitive information from
  kernel memory by leveraging the CAP_NET_ADMIN capability to issue a
  crafted request, and then reading the argument to the resulting
  modprobe process.

  Break-Fix: - 78b79876761b86653df89c48a7010b5cbd41a84a

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801482/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 721282] Re: CVE-2010-4158

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/721282

Title:
  CVE-2010-4158

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Won't Fix
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Invalid
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  The sk_run_filter function in net/core/filter.c in the Linux kernel
  before 2.6.36.2 does not check whether a certain memory location has
  been initialized before executing a (1) BPF_S_LD_MEM or (2)
  BPF_S_LDX_MEM instruction, which allows local users to obtain
  potentially sensitive information from kernel stack memory via a
  crafted socket filter.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721282/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 706999] Re: CVE-2010-3448

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/706999

Title:
  CVE-2010-3448

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-linaro package in Ubuntu:
  Won't Fix
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-lts-backport-natty package in Ubuntu:
  Invalid
Status in linux-lts-backport-oneiric package in Ubuntu:
  Invalid
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-qcm-msm package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-armadaxp source package in Lucid:
  Invalid
Status in linux-ec2 source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-linaro source package in Lucid:
  Won't Fix
Status in linux-lts-backport-maverick source package in Lucid:
  Fix Released
Status in linux-lts-backport-natty source package in Lucid:
  Invalid
Status in linux-lts-backport-oneiric source package in Lucid:
  Invalid
Status in linux-lts-quantal source package in Lucid:
  Invalid
Status in linux-lts-raring source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-qcm-msm source package in Lucid:
  Invalid
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux-linaro source package in Oneiric:
  Won't Fix
Status in linux-qcm-msm source package in Oneiric:
  Won't Fix
Status in linux source package in Precise:
  Invalid
Status in linux-armadaxp source package in Precise:
  Invalid
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-linaro source package in Precise:
  New
Status in linux-lts-backport-maverick source package in Precise:
  Invalid
Status in linux-lts-backport-natty source package in Precise:
  Invalid
Status in linux-lts-backport-oneiric source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-qcm-msm source package in Precise:
  New
Status in linux-ti-omap4 source package in Precise:
  Invalid
Status in linux source package in Quantal:
  Fix Released
Status in linux-armadaxp source package in Quantal:
  Invalid
Status in linux-ec2 source package in Quantal:
  Invalid
Status in linux-fsl-imx51 source package in Quantal:
  Invalid
Status in linux-linaro source package in Quantal:
  Won't Fix
Status in linux-lts-backport-maverick source package in Quantal:
  Invalid
Status in linux-lts-backport-natty source package in Quantal:
  Invalid
Status in linux-lts-backport-oneiric source package in Quantal:
  Invalid
Status in linux-lts-quantal source package in Quantal:
  Invalid
Status in linux-lts-raring source package in Quantal:
  Invalid
Status in linux-mvl-dove source package in Quantal:
  Invalid
Status in linux-qcm-msm source package in Quantal:
  Invalid
Status in linux-ti-omap4 source package in Quantal:
  Invalid
Status in linux source package in Raring:
  Fix Released
Status in linux-armadaxp source package in Raring:
  Invalid
Status in linux-ec2 source package in Raring:
  Invalid
Status in linux-fsl-imx51 source package in Raring:
  Invalid
Status in linux-linaro source package in Raring:
  Won't Fix
Status in linux-lts-backport-maverick source package in Raring:
  Invalid
Status in linux-lts-backport-natty source package in Raring:
  Invalid
Status in linux-lts-backport-oneiric source package in Raring:
  Invalid
Status in linux-lts-quantal source package in Raring:
  Invalid
Status in linux-lts-raring source package in Raring:
  Invalid
Status in linux-mvl-dove source package in Raring:
  Invalid
Status in linux-qcm-msm source package in Raring:
  Invalid
Status in linux-ti-omap4 source package in Raring:
  Invalid
Status in linux-linaro source package in Hardy:
  Won't Fix
Status in linux-qcm-msm source package in Hardy:
  Invalid

Bug description:
  drivers/platform/x86/thinkpad_acpi.c in the Linux kernel before 2.6.34
  on ThinkPad devices, when the X.Org X server is used, does not
  properly restrict access to the video output control state, which
  allows local users to cause a denial of service (system hang) via a
  (1) read or (2) write operation.

  Break-Fix: - b525c06cdbd8a3963f0173ccd23f9147d4c384b5

To manage notifications about this bug go to:

[Kernel-packages] [Bug 737073] Re: CVE-2010-4527

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/737073

Title:
  CVE-2010-4527

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-lts-backport-maverick source package in Lucid:
  Won't Fix
Status in linux-mvl-dove source package in Lucid:
  In Progress
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-lts-backport-maverick source package in Maverick:
  Won't Fix
Status in linux-mvl-dove source package in Maverick:
  Won't Fix
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Won't Fix
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-lts-backport-maverick source package in Dapper:
  Won't Fix
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-lts-backport-maverick source package in Hardy:
  Won't Fix
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Won't Fix
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-lts-backport-maverick source package in Karmic:
  Won't Fix
Status in linux-mvl-dove source package in Karmic:
  Invalid
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  The load_mixer_volumes function in sound/oss/soundcard.c in the OSS sound
  subsystem in the Linux kernel before 2.6.37 incorrectly expects that a
  certain name field ends with a '\0' character, which allows local users to
  conduct buffer overflow attacks and gain privileges, or possibly obtain
  sensitive information from kernel memory, via a SOUND_MIXER_SETLEVELS ioctl
  call.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/737073/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 712615] Re: CVE-2010-0435

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/712615

Title:
  CVE-2010-0435

Status in linux package in Ubuntu:
  Fix Released
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Invalid
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-mvl-dove source package in Karmic:
  Invalid

Bug description:
  Gleb Napatov discovered that KVM did not correctly check certain privileged 
operations. A local attacker with access to a guest kernel
  could exploit this to crash the host system, leading to a denial of service.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712615/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 688765] Re: Can't init uart3 (no clocks available) at Beagleboard-xM

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/688765

Title:
  Can't init uart3 (no clocks available) at Beagleboard-xM

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Maverick:
  Fix Released

Bug description:
  Maverick on a Beagle-xM:

  [0.00] Initializing cgroup subsys cpuset
  [0.00] Initializing cgroup subsys cpu
  [0.00] Linux version 2.6.35-24-omap (buildd@satinash) (gcc version 
4.4.5 (Ubuntu/Linaro 4.4.4-14ubuntu5) ) #42-Ubuntu Wed Dec 8 06:37:32 UTC 2010 
(Ubuntu 2.6.35-24.42-omap 2.6.35.8)
  [0.00] CPU: ARMv7 Processor [413fc082] revision 2 (ARMv7), cr=10c53c7f
  [0.00] CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction 
cache
  [0.00] Machine: OMAP3 Beagle Board
  [0.00] Memory policy: ECC disabled, Data cache writeback
  [0.00] On node 0 totalpages: 131072
  [0.00] free_area_init_node: node 0, pgdat c0769b64, node_mem_map 
c0828000
  [0.00]   Normal zone: 1024 pages used for memmap
  [0.00]   Normal zone: 0 pages reserved
  [0.00]   Normal zone: 130048 pages, LIFO batch:31
  [0.00] OMAP3630 ES1.0 (l2cache iva sgx neon isp 192mhz_clk )
  [0.00] SRAM: Mapped pa 0x4020 to va 0xfe40 size: 0x10
  [0.00] Reserving 12582912 bytes SDRAM for VRAM
  [0.00] Built 1 zonelists in Zone order, mobility grouping on.  Total 
pages: 130048
  [0.00] Kernel command line: text splash ro elevator=noop vram=12M 
omapfb.mode=dvi:1280x720MR-16@60 root=UUID=aea6b659-1d5d-4854-badf-0320cadc01ff 
fixrtc console=ttyS2,115200n8
  [0.00] PID hash table entries: 2048 (order: 1, 8192 bytes)
  [0.00] Dentry cache hash table entries: 65536 (order: 6, 262144 bytes)
  [0.00] Inode-cache hash table entries: 32768 (order: 5, 131072 bytes)
  [0.00] allocated 2621440 bytes of page_cgroup
  [0.00] please try 'cgroup_disable=memory' option if you don't want 
memory cgroups
  [0.00] Memory: 256MB 256MB = 512MB total
  [0.00] Memory: 487308k/487308k available, 36980k reserved, 0K highmem
  [0.00] Virtual kernel memory layout:
  [0.00] vector  : 0x - 0x1000   (   4 kB)
  [0.00] fixmap  : 0xfff0 - 0xfffe   ( 896 kB)
  [0.00] DMA : 0xffc0 - 0xffe0   (   2 MB)
  [0.00] vmalloc : 0xe080 - 0xf800   ( 376 MB)
  [0.00] lowmem  : 0xc000 - 0xe000   ( 512 MB)
  [0.00] modules : 0xbf00 - 0xc000   (  16 MB)
  [0.00]   .init : 0xc0008000 - 0xc0044000   ( 240 kB)
  [0.00]   .text : 0xc0044000 - 0xc06b3000   (6588 kB)
  [0.00]   .data : 0xc071e000 - 0xc076de60   ( 320 kB)
  [0.00] SLUB: Genslabs=9, HWalign=64, Order=0-3, MinObjects=0, CPUs=1, 
Nodes=1
  [0.00] Hierarchical RCU implementation.
  [0.00]  RCU-based detection of stalled CPUs is disabled.
  [0.00]  Verbose stalled-CPUs detection is disabled.
  [0.00] NR_IRQS:402
  [0.00] Clocking rate (Crystal/Core/MPU): 26.0/332/600 MHz
  [0.00]  (null): no physical address for uart#3, so skipping 
early_init...
  [0.00] omap_hwmod: l3_hwmod: cannot be enabled (3)
  [0.00] omap_hwmod: l4_core_hwmod: cannot be enabled (3)
  [0.00] omap_hwmod: l4_per_hwmod: cannot be enabled (3)
  [0.00] omap_hwmod: l4_wkup_hwmod: cannot be enabled (3)
  [0.00] Reprogramming SDRC clock to 33200 Hz
  [0.00] GPMC revision 5.0
  [0.00] IRQ: Found an INTC at 0xfa20 (revision 4.0) with 96 
interrupts
  [0.00] Total of 96 interrupts on 1 active controller
  [0.00] OMAP GPIO hardware version 2.5
  [0.00] OMAP clockevent source: GPTIMER12 at 32768 Hz
  [0.00] Console: colour dummy device 80x30
  [0.00] Calibrating delay loop... 515.72 BogoMIPS (lpj=2015232)
  [0.00] pid_max: default: 32768 minimum: 301
  [0.00] Security Framework initialized
  [0.00] AppArmor: AppArmor initialized
  [0.00] Yama: becoming mindful.
  [0.00] Mount-cache hash table entries: 512
  [0.00] Initializing cgroup subsys ns
  [0.00] Initializing cgroup subsys cpuacct
  [0.00] Initializing cgroup subsys memory
  [0.00] Initializing cgroup subsys devices
  [0.00] Initializing cgroup subsys freezer
  [0.00] CPU: Testing write buffer coherency: ok
  [0.00] devtmpfs: initialized
  [0.00] regulator: core version 0.5
  [0.00] NET: Registered protocol family 16
  [0.00] mux: Setting signal mcspi1_clk.gpio171 0x011c -> 0x011c
  [0.00] mux: Setting signal mcspi1_simo.gpio172 0x011c -> 0

[Kernel-packages] [Bug 712723] Re: CVE-2010-4080

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/712723

Title:
  CVE-2010-4080

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-ti-omap4 source package in Maverick:
  Won't Fix
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Won't Fix
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory

  The SNDRV_HDSP_IOCTL_GET_CONFIG_INFO and
  SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctls in hdspm.c and hdsp.c allow
  unprivileged users to read uninitialized kernel stack memory, because
  several fields of the hdsp{m}_config_info structs declared on the stack
  are not altered or zeroed before being copied back to the user.  This
  patch takes care of it.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712723/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 720968] Re: CVE-2010-4073

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/720968

Title:
  CVE-2010-4073

Status in linux-mvl-dove package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Won't Fix

Bug description:
  The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not
  initialize certain structures, which allows local users to obtain
  potentially sensitive information from kernel stack memory via vectors
  related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3)
  compat_sys_shmctl functions in ipc/compat.c; and the (4)
  compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in
  ipc/compat_mq.c.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-mvl-dove/+bug/720968/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 744250] Re: Maverick update to 2.6.35-903.22 stable release

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/744250

Title:
  Maverick update to 2.6.35-903.22 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Maverick:
  Invalid
Status in linux-ti-omap4 source package in Maverick:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.35-903.22 upload package. This bug
  will contain status and testing results releated to that upload.

  The following patches are in the 2.6.35-903.22 stable release:

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/744250/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 707579] Re: CVE-2010-4078

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/707579

Title:
  CVE-2010-4078

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux source package in Dapper:
  Won't Fix
Status in linux source package in Hardy:
  Fix Released
Status in linux source package in Karmic:
  Fix Released

Bug description:
  The FBIOGET_VBLANK device ioctl allows unprivileged users to read 16
  bytes of uninitialized stack memory, because the "reserved" member of
  the fb_vblank struct declared on the stack is not altered or zeroed
  before being copied back to the user.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/707579/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 720966] Re: CVE-2010-4169

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/720966

Title:
  CVE-2010-4169

Status in linux-mvl-dove package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Won't Fix

Bug description:
  Use-after-free vulnerability in mm/mprotect.c in the Linux kernel
  before 2.6.37-rc2 allows local users to cause a denial of service via
  vectors involving an mprotect system call.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-mvl-dove/+bug/720966/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 690798] Re: arduino USB serial device breaks on lucid kernel upgrade

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/690798

Title:
  arduino USB serial device breaks on lucid kernel upgrade

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released

Bug description:
  Filing bug report on behalf of someone else.

  With Lucid kernel 2.6.32-24.43, the device and attached program work
  correctly.

  Upon upgrading to  2.6.32-25.45, the program stops working.

  The device is:
  Bus 001 Device 005: ID 0403:6001 Future Technology Devices International, Ltd 
FT232 USB-Serial (UART) IC

  A quick driveby browse of recent commits in that time window suggests
  this might be related, but this is merely a guess based on inspection.
  No bisection was done.

  
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=677aeafe19e88c282af74564048243ccabb1c590

  lspci, lsusb, and test code to follow.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/690798/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 805512] Re: CVE-2010-4649

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/805512

Title:
  CVE-2010-4649

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Hardy:
  Fix Released

Bug description:
  Integer overflow in the ib_uverbs_poll_cq function in
  drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37
  allows local users to cause a denial of service (memory corruption) or
  possibly have unspecified other impact via a large value of a certain

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/805512/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 710680] Re: CVE-2010-3874

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/710680

Title:
  CVE-2010-3874

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Invalid
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Invalid
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix

Bug description:
  Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c
  (aka the Broadcast Manager) in the Controller Area Network (CAN)
  implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms
  might allow local users to cause a denial of service (memory corruption)
  via a connect operation.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/710680/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 712744] Re: CVE-2010-4082

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/712744

Title:
  CVE-2010-4082

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Invalid
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Invalid
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix

Bug description:
  drivers/video/via/ioctl.c: prevent reading uninitialized stack memory

  The VIAFB_GET_INFO device ioctl allows unprivileged users to read 246
  bytes of uninitialized stack memory, because the "reserved" member of
  the viafb_ioctl_info struct declared on the stack is not altered or
  zeroed before being copied back to the user.  This patch takes care of
  it.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712744/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 687750] Re: [MAVERICK] THINKPAD EDGE 13 Horizontal scroll on touchpad is not functioning

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/687750

Title:
  [MAVERICK] THINKPAD EDGE 13 Horizontal scroll on touchpad is not
  functioning

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released

Bug description:
  Platform: Thinkpad Edge 13" Rev: SKU:
  CPU: Intel core i3
  GPU: Integrated

  Summary:
  When activated in the mouse preferences, horizontal scrolling is not 
functioning.

  Steps to reproduce:
  1) Open document with horizontal scroll requirements
  2) Open Mouse Preferences
  3) Check the box for Horizontal scroll in the Touchpad tab
  4) Attempt to scroll the document

  Expected result:
  Document scrolls using the lower edge of the touchpad

  Actual result:
  No action

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/687750/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 804225] Re: CVE-2011-1010

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/804225

Title:
  CVE-2011-1010

Status in linux package in Ubuntu:
  Fix Released
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-linaro package in Ubuntu:
  Won't Fix
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-lts-backport-natty package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-qcm-msm package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-ec2 source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-linaro source package in Lucid:
  Won't Fix
Status in linux-lts-backport-maverick source package in Lucid:
  Fix Released
Status in linux-lts-backport-natty source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-qcm-msm source package in Lucid:
  Invalid
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-ec2 source package in Maverick:
  Invalid
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-linaro source package in Maverick:
  Won't Fix
Status in linux-lts-backport-maverick source package in Maverick:
  Invalid
Status in linux-lts-backport-natty source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-qcm-msm source package in Maverick:
  Invalid
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-ec2 source package in Natty:
  Invalid
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-linaro source package in Natty:
  Won't Fix
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-lts-backport-natty source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-qcm-msm source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Oneiric:
  Invalid
Status in linux-ec2 source package in Oneiric:
  Invalid
Status in linux-fsl-imx51 source package in Oneiric:
  Invalid
Status in linux-linaro source package in Oneiric:
  Won't Fix
Status in linux-lts-backport-maverick source package in Oneiric:
  Invalid
Status in linux-lts-backport-natty source package in Oneiric:
  Invalid
Status in linux-mvl-dove source package in Oneiric:
  Invalid
Status in linux-qcm-msm source package in Oneiric:
  Invalid
Status in linux-ti-omap4 source package in Oneiric:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-ec2 source package in Hardy:
  Invalid
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-linaro source package in Hardy:
  Won't Fix
Status in linux-lts-backport-maverick source package in Hardy:
  Invalid
Status in linux-lts-backport-natty source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-qcm-msm source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid

Bug description:
  Buffer overflow in the mac_partition function in fs/partitions/mac.c
  in the Linux kernel before 2.6.37.2 allows local users to cause a
  denial of service (panic) or possibly have unspecified other impact
  via a malformed Mac OS partition table.

  Break-Fix: - fa7ea87a057958a8b7926c1a60a3ca6d696328ed

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/804225/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 737823] Re: CVE-2010-4529

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/737823

Title:
  CVE-2010-4529

Status in linux package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-lts-backport-maverick source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-lts-backport-maverick source package in Maverick:
  Won't Fix
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Invalid
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Won't Fix
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-lts-backport-maverick source package in Dapper:
  Won't Fix
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-lts-backport-maverick source package in Hardy:
  Won't Fix
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Won't Fix
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-lts-backport-maverick source package in Karmic:
  Won't Fix
Status in linux-mvl-dove source package in Karmic:
  Invalid
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  Integer underflow in the irda_getsockopt function in net/irda/af_irda.c in
  the Linux kernel before 2.6.37 on platforms other than x86 allows local
  users to obtain potentially sensitive information from kernel heap memory
  via an IRLMP_ENUMDEVICES getsockopt call.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/737823/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 711855] Re: CVE-2010-4160

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/711855

Title:
  CVE-2010-4160

Status in linux package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  In Progress
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux source package in Natty:
  Invalid
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Won't Fix
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix

Bug description:
  Multiple integer overflows in the (1) pppol2tp_sendmsg function in
  net/l2tp/l2tp_ppp.c, and the (2) l2tp_ip_sendmsg function in
  net/l2tp/l2tp_ip.c, in the PPPoL2TP and IPoL2TP implementations in the
  Linux kernel before 2.6.36.2 allow local users to cause a denial of service
  (heap memory corruption and panic) or possibly gain privileges via a
  crafted sendto call.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711855/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 736394] Re: CVE-2010-4342

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/736394

Title:
  CVE-2010-4342

Status in linux package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-source-2.6.15 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-lts-backport-maverick source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-source-2.6.15 source package in Lucid:
  Invalid
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-lts-backport-maverick source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-source-2.6.15 source package in Maverick:
  Invalid
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Oneiric:
  Invalid
Status in linux-fsl-imx51 source package in Oneiric:
  Invalid
Status in linux-lts-backport-maverick source package in Oneiric:
  Invalid
Status in linux-mvl-dove source package in Oneiric:
  Invalid
Status in linux-source-2.6.15 source package in Oneiric:
  Invalid
Status in linux-ti-omap4 source package in Oneiric:
  Invalid
Status in linux source package in Dapper:
  Won't Fix
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-lts-backport-maverick source package in Dapper:
  Invalid
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux-source-2.6.15 source package in Dapper:
  Won't Fix
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-lts-backport-maverick source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-source-2.6.15 source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-lts-backport-maverick source package in Karmic:
  Invalid
Status in linux-mvl-dove source package in Karmic:
  Invalid
Status in linux-source-2.6.15 source package in Karmic:
  Invalid
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  The aun_incoming function in net/econet/af_econet.c in the Linux kernel
  before 2.6.37-rc6, when Econet is enabled, allows remote attackers to cause
  a denial of service (NULL pointer dereference and OOPS) by sending an Acorn
  Universal Networking (AUN) packet over UDP.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/736394/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 711341] Re: CVE-2010-3880

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/711341

Title:
  CVE-2010-3880

Status in linux package in Ubuntu:
  Fix Released
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Fix Released
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Won't Fix
Status in linux-mvl-dove source package in Karmic:
  Invalid

Bug description:
  net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not
  properly audit INET_DIAG bytecode, which allows local users to cause a
  denial of service (kernel infinite loop) via crafted
  INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains
  multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP
  instructions.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711341/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 731199] Re: CVE-2010-4164

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/731199

Title:
  CVE-2010-4164

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-lts-backport-maverick source package in Lucid:
  Won't Fix
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-lts-backport-maverick source package in Maverick:
  Won't Fix
Status in linux-mvl-dove source package in Maverick:
  Won't Fix
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Won't Fix
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-lts-backport-maverick source package in Dapper:
  Won't Fix
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-lts-backport-maverick source package in Hardy:
  Won't Fix
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-lts-backport-maverick source package in Karmic:
  Won't Fix
Status in linux-mvl-dove source package in Karmic:
  Invalid
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  Placeholder

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/731199/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 727336] Re: linux: 2.6.32-30.59 / 2.6.32-216.33 / 2.6.32-416.33 -proposed tracker

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/727336

Title:
  linux: 2.6.32-30.59 /  2.6.32-216.33 / 2.6.32-416.33 -proposed tracker

Status in linux package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-30.59 upload package. This bug
  will contain status and testing results releated to that upload.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/727336/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 709372] Re: CVE-2010-3873

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/709372

Title:
  CVE-2010-3873

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Fix Released
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  The X.25 implementation in the Linux kernel before 2.6.36.2 does not
  properly parse facilities, which allows remote attackers to cause a denial
  of service (heap memory corruption and panic) or possibly have unspecified
  other impact via malformed (1) X25_FAC_CALLING_AE or (2) X25_FAC_CALLED_AE
  data, related to net/x25/x25_facilities.c and net/x25/x25_in.c, a different
  vulnerability than CVE-2010-4164.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/709372/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 801484] Re: CVE-2011-1173

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/801484

Title:
  CVE-2011-1173

Status in linux package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-lts-backport-natty package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-ec2 source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-lts-backport-maverick source package in Lucid:
  Fix Released
Status in linux-lts-backport-natty source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-ec2 source package in Maverick:
  Invalid
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-lts-backport-maverick source package in Maverick:
  Invalid
Status in linux-lts-backport-natty source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-ec2 source package in Natty:
  Invalid
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-lts-backport-natty source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Won't Fix
Status in linux source package in Oneiric:
  Invalid
Status in linux-ec2 source package in Oneiric:
  Invalid
Status in linux-fsl-imx51 source package in Oneiric:
  Invalid
Status in linux-lts-backport-maverick source package in Oneiric:
  Invalid
Status in linux-lts-backport-natty source package in Oneiric:
  Invalid
Status in linux-mvl-dove source package in Oneiric:
  Invalid
Status in linux-ti-omap4 source package in Oneiric:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-ec2 source package in Hardy:
  Invalid
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-lts-backport-maverick source package in Hardy:
  Invalid
Status in linux-lts-backport-natty source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid

Bug description:
  The econet_sendmsg function in net/econet/af_econet.c in the Linux
  kernel before 2.6.39 on the x86_64 platform allows remote attackers to
  obtain potentially sensitive information from kernel stack memory by
  reading uninitialized data in the ah field of an Acorn Universal
  Networking (AUN) packet.

  Break-Fix: - 67c5c6cb8129c595f21e88254a3fc6b3b841ae8e

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801484/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 708860] Re: linux: 2.6.31-22.72 -proposed tracker

2015-02-11 Thread Mathew Hodson
*** This bug is a duplicate of bug 716648 ***
https://bugs.launchpad.net/bugs/716648

** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/708860

Title:
  linux: 2.6.31-22.72 -proposed tracker

Status in linux package in Ubuntu:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.31-22.72 upload package. This bug
  will contain status and testing results releated to that upload.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/708860/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 699885] Re: Lucid:2.6.32-28.55 -proposed tracker

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/699885

Title:
  Lucid:2.6.32-28.55  -proposed tracker

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-28.55 upload package. This bug
  will contain status and testing results releated to that upload.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/699885/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 698345] Re: lucid-ec2: 2.6.32-312.24 -proposed tracker

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ec2 in Ubuntu.
https://bugs.launchpad.net/bugs/698345

Title:
  lucid-ec2: 2.6.32-312.24 -proposed tracker

Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-ec2 source package in Lucid:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-312.24 upload package. This bug
  will contain status and testing results releated to that upload.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-ec2/+bug/698345/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 806390] Re: CVE-2011-2484

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/806390

Title:
  CVE-2011-2484

Status in linux package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-lts-backport-natty package in Ubuntu:
  Invalid
Status in linux-lts-backport-oneiric package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Fix Released
Status in linux source package in Lucid:
  Fix Released
Status in linux-ec2 source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-lts-backport-maverick source package in Lucid:
  Fix Released
Status in linux-lts-backport-natty source package in Lucid:
  Fix Released
Status in linux-lts-backport-oneiric source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-ec2 source package in Maverick:
  Invalid
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-lts-backport-maverick source package in Maverick:
  Invalid
Status in linux-lts-backport-natty source package in Maverick:
  Invalid
Status in linux-lts-backport-oneiric source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-ec2 source package in Natty:
  Invalid
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-lts-backport-natty source package in Natty:
  Invalid
Status in linux-lts-backport-oneiric source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Fix Released
Status in linux source package in Oneiric:
  Invalid
Status in linux-ec2 source package in Oneiric:
  Invalid
Status in linux-fsl-imx51 source package in Oneiric:
  Invalid
Status in linux-lts-backport-maverick source package in Oneiric:
  Invalid
Status in linux-lts-backport-natty source package in Oneiric:
  Invalid
Status in linux-lts-backport-oneiric source package in Oneiric:
  Invalid
Status in linux-mvl-dove source package in Oneiric:
  Invalid
Status in linux-ti-omap4 source package in Oneiric:
  Fix Released
Status in linux source package in Precise:
  Invalid
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  Invalid
Status in linux-lts-backport-natty source package in Precise:
  Invalid
Status in linux-lts-backport-oneiric source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Hardy:
  Fix Released
Status in linux-ec2 source package in Hardy:
  Invalid
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-lts-backport-maverick source package in Hardy:
  Invalid
Status in linux-lts-backport-natty source package in Hardy:
  Invalid
Status in linux-lts-backport-oneiric source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid

Bug description:
  The add_del_listener function in kernel/taskstats.c in the Linux
  kernel 2.6.39.1 and earlier does not prevent multiple registrations of
  exit handlers, which allows local users to cause a denial of service
  (memory and CPU consumption), and bypass the OOM Killer, via a crafted
  application.

  Break-Fix: f9fd8914c1acca0d98b69d831b128d5b52f03c51
  26c4caea9d697043cc5a458b96411b86d7f6babd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/806390/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 806374] Re: CVE-2010-4165

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/806374

Title:
  CVE-2010-4165

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Hardy:
  Fix Released

Bug description:
  The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before
  2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which
  allows local users to cause a denial of service (OOPS) via a setsockopt
  call that specifies a small value, leading to a divide-by-zero error or
  incorrect use of a signed integer.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/806374/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 698214] Re: Karmic: 2.6.31-22.71 -proposed tracker

2015-02-11 Thread Mathew Hodson
*** This bug is a duplicate of bug 716648 ***
https://bugs.launchpad.net/bugs/716648

** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/698214

Title:
  Karmic: 2.6.31-22.71 -proposed tracker

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Karmic:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.31-22.71 upload package. This bug
  will contain status and testing results releated to that upload.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/698214/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 732700] Re: apparmor_parser triggers a kernel panic

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/732700

Title:
  apparmor_parser triggers a kernel panic

Status in linux package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  SRU Justification:

  Impact: kernel panic when loading a malformed apparmor profile.
  Fix: see attached patch.
  Testcase: /etc/init.d/apparmor restart

  ===

  While loading a new profile, in case of a malformed one,
  policy.c::aa_interface_replace_profiles() tries to free an ERR_PTR
  leading to a panic.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/732700/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 712737] Re: CVE-2010-4081

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/712737

Title:
  CVE-2010-4081

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-ti-omap4 source package in Maverick:
  Won't Fix
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Fix Released
Status in linux source package in Dapper:
  Won't Fix
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory

  The SNDRV_HDSP_IOCTL_GET_CONFIG_INFO and
  SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctls in hdspm.c and hdsp.c allow
  unprivileged users to read uninitialized kernel stack memory, because
  several fields of the hdsp{m}_config_info structs declared on the stack
  are not altered or zeroed before being copied back to the user.  This
  patch takes care of it.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712737/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 801483] Re: CVE-2011-1172

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/801483

Title:
  CVE-2011-1172

Status in linux package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-lts-backport-natty package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-ec2 source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-lts-backport-maverick source package in Lucid:
  Fix Released
Status in linux-lts-backport-natty source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-ec2 source package in Maverick:
  Invalid
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-lts-backport-maverick source package in Maverick:
  Invalid
Status in linux-lts-backport-natty source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-ec2 source package in Natty:
  Invalid
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-lts-backport-natty source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Won't Fix
Status in linux source package in Oneiric:
  Invalid
Status in linux-ec2 source package in Oneiric:
  Invalid
Status in linux-fsl-imx51 source package in Oneiric:
  Invalid
Status in linux-lts-backport-maverick source package in Oneiric:
  Invalid
Status in linux-lts-backport-natty source package in Oneiric:
  Invalid
Status in linux-mvl-dove source package in Oneiric:
  Invalid
Status in linux-ti-omap4 source package in Oneiric:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-ec2 source package in Hardy:
  Invalid
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-lts-backport-maverick source package in Hardy:
  Invalid
Status in linux-lts-backport-natty source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid

Bug description:
  net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the
  Linux kernel before 2.6.39 does not place the expected '\0' character
  at the end of string data in the values of certain structure members,
  which allows local users to obtain potentially sensitive information
  from kernel memory by leveraging the CAP_NET_ADMIN capability to issue
  a crafted request, and then reading the argument to the resulting
  modprobe process.

  Break-Fix: - 6a8ab060779779de8aea92ce3337ca348f973f54

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801483/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 708839] Re: CVE-2010-3859

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Fix Released
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix

Bug description:
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3859

  The tipc_msg_build() function in net/tipc/msg.c contains an exploitable kernel
  heap overflow that would allow a local user to escalate privileges to root by
  issuing maliciously crafted sendmsg() calls via TIPC sockets.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/708839/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 801480] Re: CVE-2011-1170

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/801480

Title:
  CVE-2011-1170

Status in linux package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-lts-backport-natty package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-ec2 source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-lts-backport-maverick source package in Lucid:
  Fix Released
Status in linux-lts-backport-natty source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-ec2 source package in Maverick:
  Invalid
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-lts-backport-maverick source package in Maverick:
  Invalid
Status in linux-lts-backport-natty source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-ec2 source package in Natty:
  Invalid
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-lts-backport-natty source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Won't Fix
Status in linux source package in Oneiric:
  Invalid
Status in linux-ec2 source package in Oneiric:
  Invalid
Status in linux-fsl-imx51 source package in Oneiric:
  Invalid
Status in linux-lts-backport-maverick source package in Oneiric:
  Invalid
Status in linux-lts-backport-natty source package in Oneiric:
  Invalid
Status in linux-mvl-dove source package in Oneiric:
  Invalid
Status in linux-ti-omap4 source package in Oneiric:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-ec2 source package in Hardy:
  Invalid
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-lts-backport-maverick source package in Hardy:
  Invalid
Status in linux-lts-backport-natty source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid

Bug description:
  net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the
  Linux kernel before 2.6.39 does not place the expected '\0' character
  at the end of string data in the values of certain structure members,
  which allows local users to obtain potentially sensitive information
  from kernel memory by leveraging the CAP_NET_ADMIN capability to issue
  a crafted request, and then reading the argument to the resulting
  modprobe process.

  Break-Fix: - 42eab94fff18cb1091d3501cd284d6bd6cc9c143

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801480/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 812360] Re: linux: 2.6.24-29.92 -proposed tracker

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/812360

Title:
  linux: 2.6.24-29.92 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.24-29.92 upload package. This bug
  will contain status and testing results releated to that upload.

  For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  kernel-stable-Prepare-package-start:Tuesday, 18. July 2011 15:31 UTC
  kernel-stable-Promote-to-updates-end:Tuesday, 08. August 2011 21:40 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/812360/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 712749] Re: CVE-2010-4083

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/712749

Title:
  CVE-2010-4083

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Fix Released
Status in linux source package in Dapper:
  Won't Fix
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  sys_semctl: fix kernel stack leakage

  The semctl syscall has several code paths that lead to the leakage of
  uninitialized kernel stack memory (namely the IPC_INFO, SEM_INFO,
  IPC_STAT, and SEM_STAT commands) during the use of the older, obsolete
  version of the semid_ds struct. 

  The copy_semid_to_user() function declares a semid_ds struct on the stack
  and copies it back to the user without initializing or zeroing the
  "sem_base", "sem_pending", "sem_pending_last", and "undo" pointers,
  allowing the leakage of 16 bytes of kernel stack memory.
   
  The code is still reachable on 32-bit systems - when calling semctl()
  newer glibc's automatically OR the IPC command with the IPC_64 flag, but
  invoking the syscall directly allows users to use the older versions of
  the struct.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/712749/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 707649] Re: CVE-2010-4079

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/707649

Title:
  CVE-2010-4079

Status in linux package in Ubuntu:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  The FBIOGET_VBLANK device ioctl allows unprivileged users to read 16
  bytes of uninitialized stack memory, because the "reserved" member of
  the fb_vblank struct declared on the stack is not altered or zeroed
  before being copied back to the user.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/707649/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 711045] Re: CVE-2010-3876

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/711045

Title:
  CVE-2010-3876

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Won't Fix
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Won't Fix
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Won't Fix
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Won't Fix
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-mvl-dove source package in Karmic:
  Invalid

Bug description:
  net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not
  properly initialize certain structure members, which allows local users to
  obtain potentially sensitive information from kernel stack memory by
  leveraging the CAP_NET_RAW capability to read copies of the applicable
  structures.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711045/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 734950] Re: linux-ec2 2.6.32-315.28 -proposed tracker

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ec2 in Ubuntu.
https://bugs.launchpad.net/bugs/734950

Title:
  linux-ec2 2.6.32-315.28 -proposed tracker

Status in linux package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  New
Status in linux source package in Lucid:
  Fix Released
Status in linux-ec2 source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Invalid
Status in linux-ec2 source package in Maverick:
  Won't Fix
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-31.60 upload package. This bug
  will contain status and testing results releated to that upload.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/734950/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 711865] Re: CVE-2010-3880

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/711865

Title:
  CVE-2010-3880

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Fix Released
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-mvl-dove source package in Karmic:
  Invalid

Bug description:
  net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not
  properly audit INET_DIAG bytecode, which allows local users to cause a
  denial of service (kernel infinite loop) via crafted
  INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains
  multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP
  instructions.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711865/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 692917] Re: autofs/autofs4 missing from linux-image-virtual

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/692917

Title:
  autofs/autofs4 missing from linux-image-virtual

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released

Bug description:
  Binary package hint: linux-image-virtual

  Autofs/autofs4 is missing from the virtual image. I don't know it this
  is by design or not.

  This means that I have to use the linux-image-server on my virtual
  machines to be able to automount.

  //Martin

  ProblemType: Bug
  DistroRelease: Ubuntu 10.10
  Package: linux-image-2.6.35-24-virtual 2.6.35-24.42
  Regression: No
  Reproducible: Yes
  ProcVersionSignature: Ubuntu 2.6.35-24.42-virtual 2.6.35.8
  Uname: Linux 2.6.35-24-virtual x86_64
  Architecture: amd64
  Date: Tue Dec 21 10:44:07 2010
  ProcEnviron:
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  SourcePackage: linux

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/692917/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 710714] Re: CVE-2010-3875

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/710714

Title:
  CVE-2010-3875

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Won't Fix
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-mvl-dove source package in Karmic:
  Invalid
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before
  2.6.37-rc2 does not initialize a certain structure, which allows local
  users to obtain potentially sensitive information from kernel stack memory
  by reading a copy of this structure.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/710714/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 800775] Re: CVE-2011-1090

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/800775

Title:
  CVE-2011-1090

Status in linux package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-lts-backport-natty package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-ec2 source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-lts-backport-maverick source package in Lucid:
  Fix Released
Status in linux-lts-backport-natty source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-ec2 source package in Maverick:
  Invalid
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-lts-backport-maverick source package in Maverick:
  Invalid
Status in linux-lts-backport-natty source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-ec2 source package in Natty:
  Invalid
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-lts-backport-natty source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Won't Fix
Status in linux source package in Oneiric:
  Invalid
Status in linux-ec2 source package in Oneiric:
  Invalid
Status in linux-fsl-imx51 source package in Oneiric:
  Invalid
Status in linux-lts-backport-maverick source package in Oneiric:
  Invalid
Status in linux-lts-backport-natty source package in Oneiric:
  Invalid
Status in linux-mvl-dove source package in Oneiric:
  Invalid
Status in linux-ti-omap4 source package in Oneiric:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-ec2 source package in Hardy:
  Invalid
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-lts-backport-maverick source package in Hardy:
  Invalid
Status in linux-lts-backport-natty source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid

Bug description:
  The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c in the Linux
  kernel before 2.6.38 stores NFSv4 ACL data in memory that is allocated
  by kmalloc but not properly freed, which allows local users to cause a
  denial of service (panic) via a crafted attempt to set an ACL.

  Break-Fix: - e9e3d724e2145f5039b423c290ce2b2c3d8f94bc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/800775/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 711291] Re: CVE-2010-3877

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/711291

Title:
  CVE-2010-3877

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Invalid
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-mvl-dove source package in Karmic:
  Invalid
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  The get_name function in net/tipc/socket.c in the Linux kernel before
  2.6.37-rc2 does not initialize a certain structure, which allows local
  users to obtain potentially sensitive information from kernel stack memory
  by reading a copy of this structure.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711291/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 707000] Re: CVE-2010-3698

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/707000

Title:
  CVE-2010-3698

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux source package in Karmic:
  Fix Released

Bug description:
  The KVM implementation in the Linux kernel before 2.6.36 does not properly
  reload the FS and GS segment registers, which allows host OS users to cause
  a denial of service (host OS crash) via a KVM_RUN ioctl call in conjunction
  with a modified Local Descriptor Table (LDT).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/707000/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 806366] Re: CVE-2010-4073

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/806366

Title:
  CVE-2010-4073

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Hardy:
  Fix Released

Bug description:
  The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize
  certain structures, which allows local users to obtain potentially
  sensitive information from kernel stack memory via vectors related to the
  (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl
  functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5)
  compat_sys_mq_getsetattr functions in ipc/compat_mq.c.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/806366/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 697948] Re: Maverick: 2.6.35-25.43 -proposed tracker

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/697948

Title:
  Maverick: 2.6.35-25.43 -proposed tracker

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Maverick:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.35-25.43 upload package. This bug
  will contain status and testing results releated to that upload.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/697948/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 688070] Re: -virtual kernel missing nfsd module

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/688070

Title:
  -virtual kernel missing nfsd module

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released

Bug description:
  Bug 659084 reported missing nfs client functionality.

  That bug was fixed, but we're still missing the nfs daemon module.

  Note in
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/659084/comments/14
  , the lack of 'nfsd.ko'

  
  Also, this affects both natty and maverick.

  ProblemType: Bug
  DistroRelease: Ubuntu 10.10
  Package: linux-image-2.6.35-24-virtual 2.6.35-24.42
  Regression: No
  Reproducible: Yes
  ProcVersionSignature: User Name 2.6.35-24.42-virtual 2.6.35.8
  Uname: Linux 2.6.35-24-virtual x86_64
  AlsaDevices: Error: command ['ls', '-l', '/dev/snd/'] failed with exit code 
2: ls: cannot access /dev/snd/: No such file or directory
  AplayDevices: Error: [Errno 2] No such file or directory
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory
  CurrentDmesg:
   [1.998122] JBD: barrier-based sync failed on sda1-8 - disabling barriers
   [   11.930012] eth0: no IPv6 routers present
  Date: Thu Dec  9 14:28:16 2010
  Ec2AMI: ami-548c783d
  Ec2AMIManifest: (unknown)
  Ec2AvailabilityZone: us-east-1c
  Ec2InstanceType: c1.xlarge
  Ec2Kernel: aki-427d952b
  Ec2Ramdisk: unavailable
  Lspci:
   
  Lsusb: Error: command ['lsusb'] failed with exit code 1:
  ProcCmdLine: root=LABEL=uec-rootfs ro console=hvc0
  ProcEnviron:
   PATH=(custom, user)
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcModules: acpiphp 18752 0 - Live 0xa000
  SourcePackage: linux

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/688070/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 801473] Re: CVE-2011-2534

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/801473

Title:
  CVE-2011-2534

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Won't Fix
Status in linux source package in Oneiric:
  Fix Released
Status in linux-fsl-imx51 source package in Oneiric:
  Invalid
Status in linux-ti-omap4 source package in Oneiric:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid

Bug description:
  Buffer overflow in the clusterip_proc_write function in
  net/ipv4/netfilter/ipt_CLUSTERIP.c in the Linux kernel before 2.6.39 might
  allow local users to cause a denial of service or have unspecified other
  impact via a crafted write operation, related to string data that lacks a
  terminating '\0' character.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/801473/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 669399] Re: Touchpad bottom edge unresponsive in ubuntu 10.10 64-bit

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/669399

Title:
  Touchpad bottom edge unresponsive in ubuntu 10.10 64-bit

Status in linux package in Ubuntu:
  Won't Fix
Status in linux source package in Maverick:
  Fix Released

Bug description:
  Binary package hint: xserver-xorg-input-synaptics

  The lower 1/4 - 1/3 part of the my touchpad doesn't not produce cursor 
movement, nor events in xev & evtest.
  Horizontal scrolling is not functional and can NOT be enable in 
gpointing-device-settings.

  This is on a Lenovo Thinkpad X100e Laptop, running ubuntu 10.10 maverick 
AMD64 - a clean install - 
  This Synaptic touchpad is fully functional -ie. not a hardware issue - as it 
is working quite well on Lucid 10.04 LiveCD.

  I presume it is coordination bug as the Y-axis reported back from the
  touchpad ranges from ~700 - 4400. X-axis is fine.

  I have another old Toshiba Satellite A55 running 32-bit ubuntu 10.10
  and its ALPS touchpad is OK.

  
  $ lsb_release -rd
  Description:  Ubuntu 10.10
  Release:  10.10
  $uname -a
  Linux xxx-thinkpad-X100e 2.6.35-22-generic #35-Ubuntu SMP Sat Oct 16 20:45:36 
UTC 2010 x86_64 GNU/Linux

  ProblemType: Bug
  DistroRelease: Ubuntu 10.10
  Package: linux-image-2.6.35-22-generic 2.6.35-22.35
  Regression: Yes
  Reproducible: Yes
  ProcVersionSignature: Ubuntu 2.6.35-22.35-generic 2.6.35.4
  Uname: Linux 2.6.35-22-generic x86_64
  NonfreeKernelModules: fglrx
  AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.23.
  AplayDevices:
    List of PLAYBACK Hardware Devices 
   card 0: SB [HDA ATI SB], device 0: CONEXANT Analog [CONEXANT Analog]
 Subdevices: 1/1
 Subdevice #0: subdevice #0
  Architecture: amd64
  ArecordDevices:
    List of CAPTURE Hardware Devices 
   card 0: SB [HDA ATI SB], device 0: CONEXANT Analog [CONEXANT Analog]
 Subdevices: 1/1
 Subdevice #0: subdevice #0
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  julio  1456 F pulseaudio
  CRDA: Error: [Errno 2] No such file or directory
  Card0.Amixer.info:
   Card hw:0 'SB'/'HDA ATI SB at 0xd060 irq 16'
 Mixer name : 'Conexant CX20582 (Pebble)'
 Components : 'HDA:14f15066,17aa21b2,00100302'
 Controls  : 6
 Simple ctrls  : 4
  Card29.Amixer.info:
   Card hw:29 'ThinkPadEC'/'ThinkPad Console Audio Control at EC reg 0x30, fw 
6XHT42WW-1.182000'
 Mixer name : 'ThinkPad EC 6XHT42WW-1.182000'
 Components : ''
 Controls  : 1
 Simple ctrls  : 1
  Card29.Amixer.values:
   Simple mixer control 'Console',0
 Capabilities: pswitch pswitch-joined penum
 Playback channels: Mono
 Mono: Playback [on]
  Date: Mon Nov  1 18:39:08 2010
  HibernationDevice: RESUME=UUID=126f9a99-f7ca-4bb4-9129-c645c5d0ecdf
  InstallationMedia: Ubuntu 10.10 "Maverick Meerkat" - Release amd64 (20101007)
  MachineType: LENOVO 28763RA
  ProcCmdLine: BOOT_IMAGE=/boot/vmlinuz-2.6.35-22-generic 
root=UUID=4b766bae-335b-4201-9bb6-dc4e01768404 ro quiet splash
  ProcEnviron:
   LANG=en_US.utf8
   SHELL=/bin/bash
  RelatedPackageVersions: linux-firmware 1.38
  RfKill:
   0: tpacpi_bluetooth_sw: Bluetooth
Soft blocked: yes
Hard blocked: no
  SourcePackage: linux
  dmi.bios.date: 09/17/2010
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 6XET45WW (1.28 )
  dmi.board.name: 28763RA
  dmi.board.vendor: LENOVO
  dmi.board.version: Not Available
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Not Available
  dmi.modalias: 
dmi:bvnLENOVO:bvr6XET45WW(1.28):bd09/17/2010:svnLENOVO:pn28763RA:pvrThinkPadX100e:rvnLENOVO:rn28763RA:rvrNotAvailable:cvnLENOVO:ct10:cvrNotAvailable:
  dmi.product.name: 28763RA
  dmi.product.version: ThinkPad X100e
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/669399/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 546091] Re: 10.04 Installer doesn't properly detect 9240 MegaRaid SAS Controlers

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/546091

Title:
  10.04 Installer doesn't properly detect 9240 MegaRaid SAS Controlers

Status in hw-detect package in Ubuntu:
  Confirmed
Status in linux package in Ubuntu:
  Fix Released
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in hw-detect source package in Lucid:
  Confirmed
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in hw-detect source package in Maverick:
  Won't Fix
Status in linux source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  [Lucid] [LSI MegaRAID SAS Driver] Ubuntu 10.04/Lucid doesn't detect and load 
drivers for newer LSI MegaRaid SAS controllers like the 9240* and 9260* and 
9280*
  More information and drivers can be found here: 
http://www.lsi.com/channel/products/megaraid/sassata/9240-8i/index.html.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/hw-detect/+bug/546091/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 497546] Re: Microphones not working on Dell Vostro 320

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/497546

Title:
  Microphones not working on Dell Vostro 320

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Lucid:
  Incomplete
Status in linux source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released

Bug description:
  Binary package hint: pulseaudio

  Neither the internal microphone nor a microphone plugged into the mic
  port record sound in lucid on a Dell Vostro 320.  Both worked in
  karmic, so this is a regression.

  Sound Preferences shows only "Internal Audio Analog Stereo" as an
  input source device.  Nothing is displayed on the VU meter when the
  input volume is cranked all the way up (and of course unmuted) and no
  sound is recorded through either the internal or external microphones.

  Audio output works correctly on both the internal speakers and the
  headset jack.

  ProblemType: Bug
  AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.21.
  Architecture: amd64
  ArecordDevices:
    List of CAPTURE Hardware Devices 
   card 0: Intel [HDA Intel], device 0: CONEXANT Analog [CONEXANT Analog]
 Subdevices: 0/1
 Subdevice #0: subdevice #0
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  ubuntu 1314 F pulseaudio
   /dev/snd/pcmC0D0c:   ubuntu 1314 F...m pulseaudio
  Card0.Amixer.info:
   Card hw:0 'Intel'/'HDA Intel at 0xfe8f8000 irq 16'
 Mixer name : 'Conexant CX20582 (Pebble)'
 Components : 'HDA:14f15066,102802f5,00100300'
 Controls  : 12
 Simple ctrls  : 10
  Date: Wed Dec 16 15:46:25 2009
  DistroRelease: Ubuntu 10.04
  InstallationMedia: Ubuntu 10.04 "Lucid Lynx" - Alpha amd64 (20091216)
  Package: pulseaudio 1:0.9.21-0ubuntu2
  ProcEnviron:
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcVersionSignature: Ubuntu 2.6.32-8.12-generic
  SourcePackage: pulseaudio
  Tags: lucid
  Uname: Linux 2.6.32-8-generic x86_64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/497546/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 581525] Re: Lucid: system becomes unstable randomly, seems related with apparmor

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/581525

Title:
  Lucid: system becomes unstable randomly, seems related with apparmor

Status in apparmor package in Ubuntu:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in apparmor source package in Lucid:
  Fix Released
Status in linux source package in Lucid:
  Fix Released
Status in apparmor source package in Maverick:
  Fix Released
Status in linux source package in Maverick:
  Fix Released

Bug description:
  SRU Justification (apparmor)

  1. impact of the bug is medium for stable releases. There are two
  parts to this bug: the kernel side OOPSing when a the parser generates
  invalid tables, and the parser generating correct tables. The lucid
  kernel should receive the fix sometime in the future, but the
  userspace should also be fixed.

  The kernel bug was a broken test in verifying the dfa next/check table
  size (so the userspace bug was not caught when it should have been).
  This means that it can at times reference beyond the dfa table (by at
  most 255 entries).

  The userspace bug is that the next/check table is not correctly padded
  with 0 entries, so that it is impossible to reference beyond the end
  of the table when in the states that use the end of the table for
  their references.

  
  2. This has been addressed during the maverick development cycle.

  3. This is r1392 from the apparmor-2.5 branch. The commit mistakenly
  references a different bug (599450), but the text is: "Changes the
  table resizing so that there is always sufficient high entries in the
  table, preventing bounds violations from occurring."

  4. TEST CASE: there are multiple possible test cases
  4.1 Load a profile against a patched kernel (the maverick kernel can be used 
for this or a patched Lucid Kernel).  The kernel will reject the profile with 
the following message in the logs
  AppArmor DFA next/check upper bounds error fixed, upgrade user space tools

  4.2 The dfa verifier can be run against a profiles dfa in user space,
  but the checker is not part of the distro or easy to use atm as it
  requires manually extracting the tables from the profile.  The full
  userspace profile verifier isn't available yet.

  4.3 A profile can be compiled using the parser pre and post patching, and 
compared using a hex editor.  The components of the profile that are changed 
are the size of the table and at the end of dfa table several 0 entries padding 
out the table.  To do this choose a small profile eg. usr.sbin.tcpdump and run
  ./apparmor_parser -S  >out.file
  ./apparmor_parser-patched -S  >out.file2

  The dfa table generated starts with the string aadfa\0 followed by a 4
  byte (little endian blob size - this will differ), follow by the
  actual table header with various table size (some of these will
  change) and then the actual tables which almost fill the rest of the
  profile.  Towards the end of the profile there should be extra 0's.
  And then the closing data of the profile which should not change.  The
  data within the profile should not change beyond the couple of size
  entries and the 0 padding at the end.

  
  5. The regression potential is considered low as the patch just pads out the 
table to make sure there are no bounds violations. The patch was pushed in 
maverick during its development cycle and showed no regressions. This is an 
important reliability fix for people who are affected (this has affected at 
least one Canonical server).

  
  Hi,

  Since last week I am experiencing a problem which seems related to
  apparmor. Kernel is crashing at aa_dfa_match_len+0xd9/0xf0, and a
  trace like the the following appears on my system logs:

  May 17 01:57:04 mplaptop kernel: [ 6430.314093] PGD 1002063 PUD 0
  May 17 01:57:04 mplaptop kernel: [ 6430.314101] CPU 1
  May 17 01:57:04 mplaptop kernel: [ 6430.314103] Modules linked in: xts 
gf128mul binfmt_misc ppdev vboxnetadp vboxnetflt vboxdrv sha256_generic cryptd 
aes_x86_64 aes_generic dm_crypt joydev snd_hda_codec_realtek ipt_REJECT ipt_LOG 
xt_limit xt_tcpudp ipt_addrtype xt_state dell_wmi arc4 snd_hda_intel 
snd_hda_codec snd_hwdep snd_pcm_oss snd_mixer_oss snd_pcm ip6table_filter 
ip6_tables snd_seq_dummy nf_nat_irc snd_seq_oss nf_conntrack_irc snd_seq_midi 
nf_nat_ftp snd_rawmidi nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 
snd_seq_midi_event nf_conntrack_ftp snd_seq nf_conntrack iwlagn iptable_filter 
snd_timer snd_seq_device iwlcore ip_tables snd uvcvideo videodev v4l1_compat 
v4l2_compat_ioctl32 x_tables mac80211 sdhci_pci dell_laptop dcdbas sdhci 
led_class nvidia(P) soundcore snd_page_alloc cfg80211 psmouse serio_raw uinput 
lp parport usbhid hid fbcon tileblit font bitblit ohci1394 softcursor ieee1394 
r8169 mii ahci vga16fb vgastate intel_agp video output
  May 17 

[Kernel-packages] [Bug 681132] Re: Lucid update to 2.6.32.26+drm33.11 stable release

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/681132

Title:
  Lucid update to 2.6.32.26+drm33.11 stable release

Status in linux package in Ubuntu:
  Fix Released
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  SRU Justification

  Impact:

  The upstream process for stable tree updates is quite similar in scope
  to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a
  bug, and each patch is vetted by upstream by originating either
  directly from Linus' tree or in a minimally backported form of that
  patch. The 2.6.32.26+drm33.11 upstream stable patch set is now
  available. It should be included in the Ubuntu kernel as well.

git://git.kernel.org/pub/scm/linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git

http://git.kernel.org/?p=linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git;a=summary

  Test Case: TBD

  The following is the complete list of patches in the
  2.6.32.26+drm33.11 stable release:

  
   * staging: usbip: Notify usb core of port status changes
   * staging: usbip: Process event flags without delay
   * powerpc/perf: Fix sampling enable for PPC970
   * pcmcia: synclink_cs: fix information leak to userland
   * sched: Fix string comparison in /proc/sched_features
   * bluetooth: Fix missing NULL check
   * futex: Fix errors in nested key ref-counting
   * mm, x86: Saving vmcore with non-lazy freeing of vmas
   * x86, cpu: Fix renamed, not-yet-shipping AMD CPUID feature bit
   * x86, kexec: Make sure to stop all CPUs before exiting the kernel
   * x86, olpc: Don't retry EC commands forever
   * x86, mtrr: Assume SYS_CFG[Tom2ForceMemTypeWB] exists on all future AMD CPUs
   * x86, intr-remap: Set redirection hint in the IRTE
   * x86, kdump: Change copy_oldmem_page() to use cached addressing
   * KVM: SVM: Fix wrong intercept masks on 32 bit
   * KVM: MMU: fix direct sps access corrupted
   * KVM: MMU: fix conflict access permissions in direct sp
   * KVM: VMX: Fix host GDT.LIMIT corruption
   * KVM: SVM: Adjust tsc_offset only if tsc_unstable
   * KVM: x86: Fix SVM VMCB reset
   * KVM: x86: Move TSC reset out of vmcb_init
   * KVM: Fix fs/gs reload oops with invalid ldt
   * pipe: fix failure to return error code on ->confirm()
   * p54usb: fix off-by-one on !CONFIG_PM
   * p54usb: add five more USBIDs
   * drivers/net/wireless/p54/eeprom.c: Return -ENOMEM on memory allocation 
failure
   * USB: ftdi_sio: Add PID for accesio products
   * USB: add PID for FTDI based OpenDCC hardware
   * USB: ftdi_sio: new VID/PIDs for various Papouch devices
   * USB: ftdi_sio: add device ids for ScienceScope
   * usb: musb: blackfin: call gpio_free() on error path in musb_platform_init()
   * USB: option: Add more ZTE modem USB id's
   * USB: cp210x: Add Renesas RX-Stick device ID
   * USB: cp210x: Add WAGO 750-923 Service Cable device ID
   * USB: atmel_usba_udc: force vbus_pin at -EINVAL when gpio_request failled
   * USB: disable endpoints after unbinding interfaces, not before
   * USB: opticon: Fix long-standing bugs in opticon driver
   * USB: accept some invalid ep0-maxpacket values
   * sd name space exhaustion causes system hang
   * libsas: fix NCQ mixing with non-NCQ
   * gdth: integer overflow in ioctl
   * Fix race when removing SCSI devices
   * Fix regressions in scsi_internal_device_block
   * sgi-xp: incoming XPC channel messages can come in after the channel's 
partition structures have been torn down
   * Linux 2.6.32.26

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/681132/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 668380] Re: Lucid update to 2.6.32.25 stable release

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/668380

Title:
  Lucid update to 2.6.32.25 stable release

Status in linux package in Ubuntu:
  Fix Released
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  SRU Justification

  Impact:

  The upstream process for stable tree updates is quite similar in scope
  to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a
  bug, and each patch is vetted by upstream by originating either
  directly from Linus' tree or in a minimally backported form of that
  patch. The 2.6.32.25 upstream stable patch set is now available. It
  should be included in the Ubuntu kernel as well.

    http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.25
    http://kernel.org/pub/linux/kernel/v2.6/patch-2.6.32.25.bz2

  Test Case: TBD

  The following 3 patches in the 2.6.32.25 stable update were already
  release in a security update.  Therefore, we will omit these 3 patches
  from the 2.6.32.25 stable update:

   * ALSA: prevent heap corruption in snd_ctl_new
   * ocfs2: Don't walk off the end of fast symlinks.
   * rose: Fix signedness issues wrt. digi count.

  Additionally, 2 patches which were applied as "pre-stable" have landed
  in this 2.6.32.25 update.  Therefore, we will drop the pre-stable
  patches in favor of the official patches from the 2.6.32.25 patch set:

   * ACPI: enable repeated PCIEXP wakeup by clearing PCIEXP_WAKE_STS on resume
   * mm: (pre-stable) Move vma_stack_continue into mm.h

  I'd also note that it appears somewhere along the way that
  updateconfigs and updateportsconfigs needed but be run but never was.
  Thus, I've also included 2 additional patches which update the configs
  and portsconfigs.

  The following is the complete list of patches in the 2.6.32.25 stable
  release:

   * x86, cpu: After uncapping CPUID, re-run CPU feature detection
   * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory
   * ALSA: oxygen: fix analog capture on Claro halo cards
   * ALSA: hda - Add Dell Latitude E6400 model quirk
   * ALSA: prevent heap corruption in snd_ctl_new()
   * ALSA: rawmidi: fix oops (use after free) when unloading a driver module
   * USB: fix bug in initialization of interface minor numbers
   * usb: musb: gadget: fix kernel panic if using out ep with FIFO_TXRX style
   * usb: musb: gadget: restart request on clearing endpoint halt
   * oprofile: Add Support for Intel CPU Family 6 / Model 29
   * RDMA/cxgb3: Turn off RX coalescing for iWARP connections
   * mmc: sdhci-s3c: fix NULL ptr access in sdhci_s3c_remove
   * x86/amd-iommu: Set iommu configuration flags in enable-loop
   * x86/amd-iommu: Fix rounding-bug in __unmap_single
   * x86/amd-iommu: Work around S3 BIOS bug
   * tracing/x86: Don't use mcount in pvclock.c
   * tracing/x86: Don't use mcount in kvmclock.c
   * v4l1: fix 32-bit compat microcode loading translation
   * V4L/DVB: cx231xx: Avoid an OOPS when card is unknown (card=0)
   * V4L/DVB (13966): DVB-T regression fix for saa7134 cards
   * Input: joydev - fix JSIOCSAXMAP ioctl
   * x86, hpet: Fix bogus error check in hpet_assign_irq()
   * x86, irq: Plug memory leak in sparse irq
   * ubd: fix incorrect sector handling during request restart
   * ring-buffer: Fix typo of time extends per page
   * dmaengine: fix interrupt clearing for mv_xor
   * hrtimer: Preserve timer state in remove_hrtimer()
   * i2c-pca: Fix waitforcompletion() return value
   * ocfs2: Don't walk off the end of fast symlinks.
   * wext: fix potential private ioctl memory content leak
   * atl1: fix resume
   * x86, AMD, MCE thresholding: Fix the MCi_MISCj iteration order
   * De-pessimize rds_page_copy_user
   * drm/radeon: fix PCI ID 5657 to be an RV410
   * xfrm4: strip ECN and IP Precedence bits in policy lookup
   * tcp: Fix >4GB writes on 64-bit.
   * net: Fix the condition passed to sk_wait_event()
   * Phonet: Correct header retrieval after pskb_may_pull
   * net: Fix IPv6 PMTU disc. w/ asymmetric routes
   * ip: fix truesize mismatch in ip fragmentation
   * net: clear heap allocations for privileged ethtool actions
   * tcp: Fix race in tcp_poll
   * netxen: dont set skb->truesize
   * rose: Fix signedness issues wrt. digi count.
   * net: blackhole route should always be recalculated
   * skge: add quirk to limit DMA
   * r8169: allocate with GFP_KERNEL flag when able to sleep
   * bsg: fix incorrect device_status value
   * r6040: fix r6040_multicast_list
   * r6040: Fix multicast list iteration when hash filter is used
   * powerpc: Initialise paca->kstack before ea

[Kernel-packages] [Bug 611803] Re: [Lenovo IdeaPad Y550A] Subwoofer don't mute/unmute on plugging external acoustics

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/611803

Title:
  [Lenovo IdeaPad Y550A] Subwoofer don't mute/unmute on plugging
  external acoustics

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Maverick:
  Fix Released

Bug description:
  Binary package hint: pulseaudio

  On Kubuntu 10.04 (ALSA only) I when I put headphones - speakers muted 
automatic.
  On Ubuntu 10.10 (with PulseAudio) when I put headphones subwoofer still 
continue to sound until I select "Analog Headphones" channel instead of "Analog 
Speakers" channel in system sound options.
  Tested on Intel HDA (in my case it's Realtek ALC272 chip).

  == Regression details ==
  Discovered in version: maverick
  Last known good version: lucid

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/611803/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 628776] Re: HP NC511i Driver (be2net and be2scsi) is missing in kernel module udebs

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/628776

Title:
  HP NC511i Driver (be2net and be2scsi) is missing in kernel module
  udebs

Status in linux package in Ubuntu:
  Fix Released
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  Dear Colleagues,

  I tested this morning two installations of Lucid (10.04.1) and
  Maverick (Daily from yesterday) server flavour.

  The installation was performed on a HP BL465 G7 Series with an HP NC511i 
Ethernet/ISCSI/FoE dual port 10GBit/s card.
  During installation via debian-installer, the network interfaces were not 
found, because of the missing kernel module.

  But after installation and rebooting into the production system, the
  kernel detected the card and loaded the following modules:

  be2net 
  be2scsi

  Somehow those two modules are missing from the installer kernel udeb
  packages.

  Please consider a fix for Maverick and also for Lucid 10.04.2

  Thx in advance,

  \sh

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/628776/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 605101] Re: gnome-volume-control: no internal microphone as input device port

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/605101

Title:
  gnome-volume-control: no internal microphone as input device port

Status in linux package in Ubuntu:
  Fix Released
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  I am running lucid with all the updates on a Lenovo 3000 v100 with the
  following sound card (driver: snd-hda-intel):

  00:1b.0 Audio device: Intel Corporation N10/ICH 7 Family High
  Definition Audio Controller (rev 02)

  00:1b.0 0403: 8086:27d8 (rev 02)
Subsystem: 17aa:3bfd

  In gnome-volume-control, the Internal Microphone (iMic) is not listed
  as a possible input device port.  Only "Microphone" (Mic in alsamixer)
  and "Line-in" (Line in alsamixer) are available.  In alsamixer, I can
  (after hitting F5 to see all controls) set the input source to "iMic"
  and then the microphone works fine, but not in gnome-volume-control.
  Following a suggestion on another bug report, I installed linux-
  backports-modules-alsa-2.6.32-23-generic, but this did not
  automatically determine the microphone to use or let me choose iMic in
  gnome-volume-control.

  Is there a way to fix this?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/605101/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 667796] Re: kernel only recognizes 32G of memory

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ec2 in Ubuntu.
https://bugs.launchpad.net/bugs/667796

Title:
  kernel only recognizes 32G of memory

Status in linux package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-ec2 source package in Maverick:
  Invalid

Bug description:
  SRU justification:

  Impact: The config option XEN_MAX_DOMAIN_MEMORY controls how much
  memory a Xen instance is seeing. The default for 64bit is 32GB, which
  is the reason that m2.4xlarge instances only report this amount of
  memory.

  Fix: Setting this limit to 70GB as there is a known restriction for
  t1.micro instances at about 80GB.

  Testcase: Booted m2.4xlarge with this set to 32GB shows 32GB of
  memory, when set to 70GB, it correctly reports 68GB. Booted a t1.micro
  as well to verify this has not caused problems there.

  ---

  The following is copied from
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/651370/comments/14
  .  I'm fairly sure that The problem is also with a stock image
  (without the additional command line options suggested in that bug).

  Brandon's and Scott's workaround works for me partly, but the kernel
  on an instance started in such a way seems to detect only 32 GB of
  memory even for a m2.4xlarge instance which should have 68.4 GB
  available, according to the EC2 instances page. Is this a side-effect
  of the workaround, or a completely separate bug?

  Maveric results:
  ubuntu@ip-10-230-9-87:~$ uname -a
  Linux ip-10-230-9-87 2.6.35-22-virtual #35-Ubuntu SMP Sat Oct 16 23:19:29 UTC 
2010 x86_64 GNU/Linux
  ubuntu@ip-10-230-9-87:~$ ec2metadata --instance-type
  m2.4xlarge
  ubuntu@ip-10-230-9-87:~$ free
   total used free shared buffers cached
  Mem: 32810684 667628 32143056 0 6444 32152
  -/+ buffers/cache: 629032 32181652
  Swap: 0 0 0

  Expected results (from a SUSE 11 guest):
  ip-10-230-45-187:~ # uname -a
  Linux ip-10-230-45-187 2.6.32.19-0.3-ec2 #1 SMP 2010-09-17 20:28:21 +0200 
x86_64 x86_64 x86_64 GNU/Linux
  ip-10-230-45-187:~ # curl 
http://169.254.169.254/latest/meta-data/instance-type
  m2.4xlarge
  ip-10-230-45-187:~ # free
   total used free shared buffers cached
  Mem: 71705116 2361584 69343532 0 10972 126424
  -/+ buffers/cache: 2224188 69480928
  Swap: 0 0 0

  ProblemType: Bug
  DistroRelease: Ubuntu 10.10
  Package: linux-image-2.6.35-22-virtual 2.6.35-22.33
  Regression: Yes
  Reproducible: Yes
  ProcVersionSignature: User Name 2.6.35-22.33-virtual 2.6.35.4
  Uname: Linux 2.6.35-22-virtual x86_64
  AlsaDevices: Error: command ['ls', '-l', '/dev/snd/'] failed with exit code 
2: ls: cannot access /dev/snd/: No such file or directory
  AplayDevices: Error: [Errno 2] No such file or directory
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory
  CurrentDmesg:

  Date: Thu Oct 28 13:35:42 2010
  Ec2AMI: ami-548c783d
  Ec2AMIManifest: (unknown)
  Ec2AvailabilityZone: us-east-1d
  Ec2InstanceType: t1.micro
  Ec2Kernel: aki-427d952b
  Ec2Ramdisk: unavailable
  Lspci:

  Lsusb: Error: command ['lsusb'] failed with exit code 1:
  ProcCmdLine: root=LABEL=uec-rootfs ro console=hvc0
  ProcEnviron:
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcModules: acpiphp 18752 0 - Live 0xa000
  SourcePackage: linux

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/667796/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 649483] Re: Lucid update to 2.6.32.23 stable release

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/649483

Title:
  Lucid update to 2.6.32.23 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  
  SRU Justification

  Impact:

  The upstream process for stable tree updates is quite similar in scope
  to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a
  bug, and each patch is vetted by upstream by originating either
  directly from Linus' tree or in a minimally backported form of that
  patch.

  The 2.6.32.23 upstream stable patch set is now available. It should be
  included in the Ubuntu kernel as well.

  http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.23
  http://kernel.org/pub/linux/kernel/v2.6/patch-2.6.32.23.bz2

  Test Case: TBD

  The following patches are in the 2.6.32.23 stable release:

  *  Linux 2.6.32.23
  *  x86: Add memory modify constraints to xchg() and cmpxchg()
  *  alpha: Fix printk format errors
  *  sis-agp: Remove SIS 760, handled by amd64-agp
  *  MIPS: Sibyte: Fix M3 TLB exception handler workaround.
  *  pata_pdc202xx_old: fix UDMA mode for PDC2026x chipsets
  *  pata_pdc202xx_old: fix UDMA mode for Promise UDMA33 cards
  *  MIPS: uasm: Add OR instruction.
  *  MIPS: Set io_map_base for several PCI bridges lacking it
  *  MIPS: Quit using undefined behavior of ADDU in 64-bit atomic operations.
  *  Input: add compat support for sysfs and /proc capabilities output
  *  inotify: fix inotify oneshot support
  *  hostap_pci: set dev->base_addr during probe
  *  gro: Fix bogus gso_size on the first fraglist entry
  *  clocksource: sh_tmu: compute mult and shift before registration
  *  dasd: use correct label location for diag fba disks
  *  asix: fix setting mac address for AX88772
  *  3c503: Fix IRQ probing
  *  sctp: Do not reset the packet during sctp_packet_config().
  *  Fix unprotected access to task credentials in waitid()
  *  guard page for stacks that grow upwards
  *  mm: page allocator: update free page counters after pages are placed on 
the free list
  *  mm: page allocator: calculate a better estimate of NR_FREE_PAGES when 
memory is low and kswapd is awake
  *  mm: page allocator: drain per-cpu lists after direct reclaim allocation 
fails
  *  cxgb3: fix hot plug removal crash
  *  AT91: change dma resource index
  *  bnx2: Fix hang during rmmod bnx2.
  *  bnx2: Fix netpoll crash.
  *  ACPI: disable _OSI(Windows 2009) on Asus K50IJ
  *  drivers/video/via/ioctl.c: prevent reading uninitialized stack memory
  *  xfs: prevent reading uninitialized stack memory
  *  KEYS: Fix bug in keyctl_session_to_parent() if parent has no session 
keyring
  *  KEYS: Fix RCU no-lock warning in keyctl_session_to_parent()
  *  IA64: Optimize ticket spinlocks in fsys_rt_sigprocmask
  *  IA64: fix siglock
  *  ext4: Fix remaining racy updates of EXT4_I(inode)->i_flags
  *  SCSI: mptsas: fix hangs caused by ATA pass-through
  *  inotify: send IN_UNMOUNT events
  *  aio: check for multiplication overflow in do_io_submit
  *  percpu: fix pcpu_last_unit_cpu
  *  drivers/video/sis/sis_main.c: prevent reading uninitialized stack memory
  *  drivers/pci/intel-iommu.c: fix build with older gcc's
  *  char: Mark /dev/zero and /dev/kmem as not capable of writeback
  *  oprofile: Add Support for Intel CPU Family 6 / Model 22 (Intel Celeron 540)
  *  sched: Fix user time incorrectly accounted as system time on 32-bit
  *  pid: make setpgid() system call use RCU read-side critical section
  *  net/llc: make opt unsigned in llc_ui_setsockopt()
  *  Staging: vt6655: fix buffer overflow
  *  bonding: correctly process non-linear skbs
  *  drivers/net/eql.c: prevent reading uninitialized stack memory
  *  drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory
  *  drivers/net/usb/hso.c: prevent reading uninitialized memory
  *  sparc64: Get rid of indirect p1275 PROM call buffer.
  *  r8169: fix mdio_read and update mdio_write according to hw specs
  *  r8169: fix random mdio_write failures
  *  UNIX: Do not loop forever at unix_autobind().
  *  tcp: Prevent overzealous packetization by SWS logic.
  *  rds: fix a leak of kernel memory
  *  net: Fix oops from tcp_collapse() when using splice()
  *  bridge: Clear INET control block of SKBs passed into ip_fragment().
  *  bridge: Clear IPCB before possible entry into IP stack
  *  tcp: fix three tcp sysctls tuning
  *  tcp: Combat per-cpu skew in orphan tests.
  *  tcp: select(writefds) don't hang up when a peer close connection
  *  irda: Correctly 

[Kernel-packages] [Bug 683257] Re: Lucid update to 2.6.32.26+drm33.12 stable release

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/683257

Title:
  Lucid update to 2.6.32.26+drm33.12 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  SRU Justification

  Impact:

  The upstream process for stable tree updates is quite similar in scope
  to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a
  bug, and each patch is vetted by upstream by originating either
  directly from Linus' tree or in a minimally backported form of that
  patch. The 2.6.32.26+drm33.12 upstream stable patch set is now
  available. It should be included in the Ubuntu kernel as well.

git://git.kernel.org/pub/scm/linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git

http://git.kernel.org/?p=linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git;a=summary

  Test Case: TBD

  The following is the complete list of patches in the
  2.6.32.26+drm33.12 stable release:

   * drm/radeon: fix PCI ID 5657 to be an RV410
   * Linux 2.6.32.26+drm33.12

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/683257/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 592039] Re: Please enable vmware-balloon driver in kernel config

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/592039

Title:
  Please enable vmware-balloon driver in kernel config

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Maverick:
  Fix Released

Bug description:
  VMware would like to have our balloon driver enabled by default in
  distribution kernels to improve customer experience and reduce number
  of third-party modules being loaded into the kernel.

  Please change the kernel configuration for Ubuntu 10.10 so that
  vmware-balloon driver is compiled as a  module
  (CONFIG_VMWARE_BALLOON=m). The driver has to be compiled as a module
  to allow our installer detect that the driver is being supplied by the
  distribution and prevent installer from overwriting it.

  Also please ocnsider applying the following patch to the driver which fixes 
issue with the driver may start consuming excessive
  amount of memory during torture tests. The patch is in 2.6.32-rc2 and should 
make its way to stable as well.

  Thanks.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/592039/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 493156] Re: Please enable CONFIG_TASK_DELAY_ACCT

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/493156

Title:
  Please enable CONFIG_TASK_DELAY_ACCT

Status in iotop package in Ubuntu:
  Invalid
Status in linux package in Ubuntu:
  Fix Released
Status in iotop source package in Lucid:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in iotop source package in Maverick:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in iotop source package in Natty:
  Invalid
Status in linux source package in Natty:
  Fix Released

Bug description:
  iotop 0.3.2-1 needs CONFIG_TASK_DELAY_ACCT enabled, and currently
  (2.6.32-7.9) only shows:

  > CONFIG_TASK_DELAY_ACCT not enabled in kernel, cannot determine
  SWAPIN and IO %

  Please consider enabling this option.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iotop/+bug/493156/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 685015] Re: [MAVERICK] Thinkpad Edge 13 External headphones/mic not functiona

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/685015

Title:
  [MAVERICK] Thinkpad Edge 13 External headphones/mic not functiona

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released

Bug description:
  Image: 10.10 DVD
  Platform: Thinkpad Edge 13"
  BIOS Version: 83ET16WW (1.0)
  Platform: Rev: SKU:
  CPU: Core i3
  GPU: Intel Inegrated

  Summary:
  Sound can neither be heard nor recorded through external means. This is a 
single jack for both mic and headphones, and was tested with a combo 
mic/headphone.

  Steps to reproduce:
  1) Install 10.10
  2) Plug in headphone/mic
  3) Try to play sound from Sound Preferences, notice no sound from headphones
  4) Try to record sound from gnome-sound-recorder, notice nothing recorded 
from external mic

  Expected results:
  Sound can be input/output through jack

  Actual results:
  No sound input/output externally

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/685015/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 644694] Re: Lucid update to 2.6.32.22 stable release

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/644694

Title:
  Lucid update to 2.6.32.22 stable release

Status in linux package in Ubuntu:
  Fix Released
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  SRU Justification

  Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from Linus' tree or in a minimally
backported form of that patch. The 2.6.32.22 upstream stable
patch set is now available. It should be included in the Ubuntu
kernel as well.

http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.22
http://kernel.org/pub/linux/kernel/v2.6/patch-2.6.32.22.bz2

  TEST CASE: TBD

The following patches are in the 2.6.32.22 stable release:

 * Linux 2.6.32.22
 * SUNRPC: Fix race corrupting rpc upcall
 * NFS: Fix a typo in nfs_sockaddr_match_ipaddr6
 * apm_power: Add missing break statement
 * hwmon: (f75375s) Do not overwrite values read from registers
 * hwmon: (f75375s) Shift control mode to the correct bit position
 * arm: fix really nasty sigreturn bug
 * ALSA: hda - Handle pin NID 0x1a on ALC259/269
 * ALSA: hda - Handle missing NID 0x1b on ALC259 codec
 * sched: cpuacct: Use bigger percpu counter batch values for stats counters
 * sched: Fix select_idle_sibling() logic in select_task_rq_fair()
 * sched: Pre-compute cpumask_weight(sched_domain_span(sd))
 * sched: Fix select_idle_sibling()
 * sched: Fix vmark regression on big machines
 * sched: More generic WAKE_AFFINE vs select_idle_sibling()
 * sched: Cleanup select_task_rq_fair()
 * sched: apply RCU protection to wake_affine()
 * sched: Remove unnecessary RCU exclusion
 * sched: Fix rq->clock synchronization when migrating tasks
 * sched: Fix nr_uninterruptible count
 * sched: Optimize task_rq_lock()
 * sched: Fix TASK_WAKING vs fork deadlock
 * sched: Make select_fallback_rq() cpuset friendly
 * sched: _cpu_down(): Don't play with current->cpus_allowed
 * sched: sched_exec(): Remove the select_fallback_rq() logic
 * sched: move_task_off_dead_cpu(): Remove retry logic
 * sched: move_task_off_dead_cpu(): Take rq->lock around 
select_fallback_rq()
 * sched: Kill the broken and deadlockable 
cpuset_lock/cpuset_cpus_allowed_locked code
 * sched: set_cpus_allowed_ptr(): Don't use rq->migration_thread after 
unlock
 * sched: Queue a deboosted task to the head of the RT prio queue
 * sched: Implement head queueing for sched_rt
 * sched: Extend enqueue_task to allow head queueing
 * sched: Fix race between ttwu() and task_rq_lock()
 * sched: Fix incorrect sanity check
 * sched: Fix fork vs hotplug vs cpuset namespaces
 * sched: Fix hotplug hang
 * sched: Remove the cfs_rq dependency from set_task_cpu()
 * sched: Add pre and post wakeup hooks
 * sched: Fix select_task_rq() vs hotplug issues
 * sched: Fix sched_exec() balancing
 * sched: Fix broken assertion
 * sched: Make warning less noisy
 * sched: Ensure set_task_cpu() is never called on blocked tasks
 * sched: Use TASK_WAKING for fork wakups
 * sched: Fix set_cpu_active() in cpu_down()
 * sched: Use rcu in sched_get_rr_param()
 * sched: Use rcu in sched_get/set_affinity()
 * sched: Use rcu in sys_sched_getscheduler/sys_sched_getparam()
 * sched: Make wakeup side and atomic variants of completion API irq safe
 * sched: Remove forced2_migrations stats
 * sched: Sanitize fork() handling
 * sched: Clean up ttwu() rq locking
 * sched: Remove rq->clock coupling from set_task_cpu()
 * sched: Remove unused cpu_nr_migrations()
 * sched: Consolidate select_task_rq() callers
 * sched: Protect sched_rr_get_param() access to task->sched_class
 * sched: Protect task->cpus_allowed access in sched_getaffinity()
 * x86, tsc: Fix a preemption leak in restore_sched_clock_state()
 * wireless extensions: fix kernel heap content leak
 * ath5k: check return value of ieee80211_get_tx_rate
 * p54: fix tx feedback status flag check
 * perf: Initialize callchains roots's childen hits
 * memory hotplug: fix next block calculation in is_removable
 * Input: i8042 - fix device removal on unload
 * binfmt_misc: fix binfmt_misc priority
 * kernel/groups.c: fix integer overflow in groups_search
 * bounce: call flush_

[Kernel-packages] [Bug 643891] Re: [IDT 92HD71B7X] ALSA test tone not correctly played back

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/643891

Title:
  [IDT 92HD71B7X] ALSA test tone not correctly played back

Status in linux package in Ubuntu:
  Fix Released
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Invalid
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  I have tried everything to get sound working on 10.04. Dell Latitude
  E6400. No luck.

  ProblemType: Bug
  DistroRelease: Ubuntu 10.04
  Package: alsa-base 1.0.22.1+dfsg-0ubuntu3
  ProcVersionSignature: Ubuntu 2.6.32-24.43-generic 2.6.32.15+drm33.5
  Uname: Linux 2.6.32-24-generic i686
  AlsaVersion:
   Advanced Linux Sound Architecture Driver Version 1.0.23.
   Compiled on Jul  6 2010 for kernel 2.6.32-24-generic (SMP).
  Architecture: i386
  ArecordDevices:
    List of CAPTURE Hardware Devices 
   card 0: Intel [HDA Intel], device 0: STAC92xx Analog [STAC92xx Analog]
 Subdevices: 2/2
 Subdevice #0: subdevice #0
 Subdevice #1: subdevice #1
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stuart 1739 F pulseaudio
   /dev/snd/pcmC0D0p:   stuart 1739 F...m pulseaudio
  Card0.Amixer.info:
   Card hw:0 'Intel'/'HDA Intel at 0xf6adc000 irq 32'
 Mixer name : 'Intel G45 DEVCTG'
 Components : 'HDA:111d76b2,10280233,00100302 
HDA:80862802,80860101,0010'
 Controls  : 34
 Simple ctrls  : 22
  Date: Mon Sep 20 21:58:33 2010
  InstallationMedia: Ubuntu 9.10 "Karmic Koala" - Release i386 (20091028.5)
  PackageArchitecture: all
  ProcEnviron:
   LANG=en_GB.utf8
   SHELL=/bin/bash
  SelectedCard: 0 Intel HDA-Intel - HDA Intel
  SourcePackage: alsa-driver
  Symptom: audio
  Title: [IDT 92HD71B7X] ALSA test tone not correctly played back
  dmi.bios.date: 11/21/2008
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A09
  dmi.board.name: 0HT027
  dmi.board.vendor: Dell Inc.
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA09:bd11/21/2008:svnDellInc.:pnLatitudeE6400:pvr:rvnDellInc.:rn0HT027:rvr:cvnDellInc.:ct8:cvr:
  dmi.product.name: Latitude E6400
  dmi.sys.vendor: Dell Inc.
  --- 
  AlsaVersion:
   Advanced Linux Sound Architecture Driver Version 1.0.23.
   Compiled on Sep 19 2010 for kernel 2.6.32-24-generic (SMP).
  Architecture: i386
  ArecordDevices:
    List of CAPTURE Hardware Devices 
   card 0: Intel [HDA Intel], device 0: STAC92xx Analog [STAC92xx Analog]
 Subdevices: 2/2
 Subdevice #0: subdevice #0
 Subdevice #1: subdevice #1
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stuart 1852 F pulseaudio
  Card0.Amixer.info:
   Card hw:0 'Intel'/'HDA Intel at 0xf6adc000 irq 32'
 Mixer name : 'Intel Cantiga HDMI'
 Components : 'HDA:111d76b2,10280233,00100302 
HDA:80862802,80860101,0010'
 Controls  : 34
 Simple ctrls  : 22
  DistroRelease: Ubuntu 10.04
  InstallationMedia: Ubuntu 9.10 "Karmic Koala" - Release i386 (20091028.5)
  Package: alsa-base 1.0.22.1+dfsg-0ubuntu3
  PackageArchitecture: all
  ProcEnviron:
   LANG=en_GB.utf8
   SHELL=/bin/bash
  ProcVersionSignature: Ubuntu 2.6.32-24.43-generic 2.6.32.15+drm33.5
  Tags: lucid
  Uname: Linux 2.6.32-24-generic i686
  UserGroups: adm admin cdrom dialout lpadmin plugdev sambashare tomcat6
  dmi.bios.date: 11/21/2008
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A09
  dmi.board.name: 0HT027
  dmi.board.vendor: Dell Inc.
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA09:bd11/21/2008:svnDellInc.:pnLatitudeE6400:pvr:rvnDellInc.:rn0HT027:rvr:cvnDellInc.:ct8:cvr:
  dmi.product.name: Latitude E6400
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/643891/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 686158] Re: Maverick update to 2.6.35.9 stable release

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/686158

Title:
  Maverick update to 2.6.35.9 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Maverick:
  Fix Released

Bug description:
  SRU Justification

  Impact:

  The upstream process for stable tree updates is quite similar in scope
  to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a
  bug, and each patch is vetted by upstream by originating either
  directly from Linus' tree or in a minimally backported form of that
  patch.

  The 2.6.35.9 upstream stable patch set is now available. It should be
  included in the Ubuntu kernel as well.

  http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.9
  http://kernel.org/pub/linux/kernel/v2.6/patch-2.6.35.9.bz2

  The following patches are in the 2.6.35.9 stable release:

  
  * Linux 2.6.35.9
  * KVM: x86 emulator: fix regression with cmpxchg8b on i386 hosts
  * isdn: avoid calling tty_ldisc_flush() in atomic context
  * sgi-xp: incoming XPC channel messages can come in after the channel's 
partition structures have been torn down
  * ARM: cns3xxx: Fixup the missing second parameter to addruart macro to allow 
them to build.
  * secmark: do not return early if there was no error
  * xfrm4: strip ECN bits from tos field
  * net/core: Allow tagged VLAN packets to flow through VETH devices.
  * net: add a recursion limit in xmit path
  * Revert d88dca79d3852a3623f606f781e013d61486828a
  * Revert c6537d6742985da1fbf12ae26cde6a096fd35b5c
  * net-2.6: SYN retransmits: Add new parameter to retransmits_timed_out()
  * tcp: Fix race in tcp_poll
  * Limit sysctl_tcp_mem and sysctl_udp_mem initializers to prevent integer 
overflows.
  * net: Fix the condition passed to sk_wait_event()
  * rose: Fix signedness issues wrt. digi count.
  * r6040: Fix multicast filter some more
  * Phonet: Correct header retrieval after pskb_may_pull
  * qlcnic: dont set skb->truesize
  * netxen: dont set skb->truesize
  * net: Fix IPv6 PMTU disc. w/ asymmetric routes
  * ipv6: fix refcnt problem related to POSTDAD state
  * ip: fix truesize mismatch in ip fragmentation
  * gianfar: Fix crashes on RX path (Was Re: [Bugme-new] [Bug 19692] New: 
linux-2.6.36-rc5 crash with gianfar ethernet at full line rate traffic)
  * gianfar: fix double lock typo
  * net: clear heap allocations for privileged ethtool actions
  * Fix regressions in scsi_internal_device_block
  * Fix race when removing SCSI devices
  * gdth: integer overflow in ioctl
  * libsas: fix NCQ mixing with non-NCQ
  * sd name space exhaustion causes system hang
  * asus-laptop: fix gps rfkill
  * USB: accept some invalid ep0-maxpacket values
  * usb: r8a66597-hcd: Change mistake of the outsw function
  * USB: opticon: Fix long-standing bugs in opticon driver
  * USB: visor: fix initialisation of UX50/TH55 devices
  * USB: disable endpoints after unbinding interfaces, not before
  * USB: atmel_usba_udc: force vbus_pin at -EINVAL when gpio_request failled
  * USB: cp210x: Add WAGO 750-923 Service Cable device ID
  * USB: cp210x: Add Renesas RX-Stick device ID
  * USB: option: Add more ZTE modem USB id's
  * USB: Change acm_iad_descriptor bFunctionProtocol to 
USB_CDC_ACM_PROTO_AT_V25TER
  * usb: musb: blackfin: call gpio_free() on error path in musb_platform_init()
  * usb: musb: blackfin: call usb_nop_xceiv_unregister() in musb_platform_exit()
  * USB: MUSB: fix kernel WARNING/oops when unloading module in OTG mode
  * USB: ftdi_sio: add device ids for ScienceScope
  * USB: ftdi_sio: new VID/PIDs for various Papouch devices
  * USB: add PID for FTDI based OpenDCC hardware
  * USB: ftdi_sio: revert "USB: ftdi_sio: fix DTR/RTS line modes"
  * USB: ftdi_sio: Add PID for accesio products
  * USB: gadget: g_multi: fixed vendor and product ID
  * USB: gadget: g_ffs: fixed vendor and product ID
  * usb gadget: composite: prevent OOPS for non-standard control request
  * drivers/net/wireless/p54/eeprom.c: Return -ENOMEM on memory allocation 
failure
  * p54usb: add five more USBIDs
  * p54usb: fix off-by-one on !CONFIG_PM
  * pipe: fix failure to return error code on ->confirm()
  * USB: mct_u232: fix broken close
  * KVM: SVM: Restore correct registers after sel_cr0 intercept emulation
  * KVM: X86: Report SVM bit to userspace only when supported
  * x86, vm86: Fix preemption bug for int1 debug and int3 breakpoint handlers.
  * x86, kdump: Change copy_oldmem_page() to use cached addressing
  * x86, intr-remap: Set redirection hint in the IRTE
  * x86, mtrr: Assume SYS_CFG[Tom2ForceMemTypeWB] exists on all future AMD CPUs
  * x86, olpc: Don't retry EC commands forever
  * x86, kexec: Make sure to stop all CPUs before exiting the kernel
  * x86, cpu: Fix renamed, not-yet-shipping AMD CPUID feature bit
  * mm, x86: Saving vmcore wi

[Kernel-packages] [Bug 645371] Re: [Lucid] Update to DRM33.10 stable kernel

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/645371

Title:
  [Lucid] Update to DRM33.10 stable kernel

Status in linux package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  SRU Justification

  Impact: The upstream process for stable tree updates is quite similar in 
scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a 
bug, and each patch is vetted by upstream by originating either directly from 
Linus' tree or in a minimally backported form of that patch.
  Lucid was released with the DRM subsystem updated to the 2.6.33 level because 
2.6.32 was too unstable there. Until 2.6.33 went out of upstream support, we 
picked the patches for DRM from this tree. After that we now keep an upstream 
tree that continues that effort and selectively picks changes from more recent 
stable kernels or upstream patches that been passing SRU criteria and review.

  
http://git.kernel.org/?p=linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git;a=shortlog;h=refs/tags/v2.6.32.22.10

  TEST CASE: TBD

  ==

  The following 23 patches have been in 2.6.32.22.10:
  * drm/radeon/kms/igp: sideport is AMD only
  * drm/radeon/kms: flush HDP cache on GART table updates.
  * drm/radeon/kms/r7xx: add workaround for hw issue with HDP flush
  * drm/i915: Check overlay stride errata for i830 and i845
  * drm/edid: Fix the HDTV hack sync adjustment
  * drm/i915: Use RSEN instead of HTPLG for tfp410 monitor detection.
  * i915: fix ironlake edp panel setup (v4)
  * drm/radeon/kms: add additional quirk for Acer rv620 laptop
  * drm/i915: fixup pageflip ringbuffer commands for i8xx
  * drm/i915: i8xx also doesn't like multiple oustanding pageflips
  * drm/i915/edp: Flush the write before waiting for PLLs
  * drm/radeon/kms: disable MSI on IGP chips
  * drm/radeon/kms: don't enable MSIs on AGP boards
  * drm/radeon/kms: fix typo in radeon_compute_pll_gain
  * drm/radeon/kms/DCE3+: switch pads to ddc mode when going i2c
  * drm/radeon/kms: fix sideport detection on newer rs880 boards
  * drm: stop information leak of old kernel stack.
  * drm/i915: Don't touch PORT_HOTPLUG_EN in intel_dp_detect()
  * drm/i915: Kill dangerous pending-flip debugging
  * drm/radeon/kms: release AGP bridge at suspend
  * drm/radeon/kms: initialize set_surface_reg reg for rs600 asic
  * drm/radeon/kms: fix a regression on r7xx AGP due to the HDP flush fix
  * Linux 2.6.32.22+drm33.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/645371/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 683938] Re: kernel crash on symlink chased from NFS to failing automount

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/683938

Title:
  kernel crash on symlink chased from NFS to failing automount

Status in The Linux Kernel:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released

Bug description:
  SRU justification:

  Impact: When trying to mount an export where server and client have no
  common authentication method, the client will abort the mount by
  sending an advisory unmount message to the server. A bug in the RPC
  client setup causes the sunrpc code to access memory outside an
  allocated array, which will sooner or later cause the kernel to crash.

  Fix: Patch from upstream (about to be submitted and targeted for
  stable too) changes the setup to use the actual array size instead of
  a manually entered number.

  Testcase:

  Server exports a mount with an authentication method the client does not 
support, eg.:
  [/etc/exports] /srv/foo *(rw,sec=krb5)

  Client tries to mount this directory with no special authentication method:
  while true; do mount :/srv/foo /mnt; sync; sleep 1; done

  ---

  Create an automount indirect map entry to a nfs server that will deny the 
mount with a permission denied error.
  Create a symlink on some mounted NFS partition pointing at the name of that 
automount indirect map entry.
  Chase the symlink with ls, etc.
  Notice that the automounter tries and fails to mount the partition. (visible 
with automount -d -f, say)

  In a few minutes, depending on system activity, the kernel will crash
  with the symptoms of a memory corruption error.

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/683938/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 646114] Re: mlock on stack will create guard page gap

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/646114

Title:
  mlock on stack will create guard page gap

Status in linux package in Ubuntu:
  Fix Released
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux source package in Dapper:
  Invalid
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux source package in Jaunty:
  Fix Released
Status in linux-mvl-dove source package in Jaunty:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-mvl-dove source package in Karmic:
  Invalid

Bug description:
  Calling mlock on a portion of the stack will cause the kernel to
  incorrectly show a gap in /proc/$pid/maps between the old stack and
  the mlock region. This can confuse applications.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/646114/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 684888] Re: Update intel_idle driver

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/684888

Title:
  Update intel_idle driver

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Maverick:
  Fix Released

Bug description:
  SRU Justification:

  We periodically provide updated drivers to provide additional support
  for hardware and provide bug fixes. The intel_idle is a cpuidle driver
  that loads on specific Intel processors in lieu of the legacy ACPI
  processor_idle driver. The intent is to make Linux more efficient on
  these processors, as intel_idle knows more than ACPI, as well as make
  Linux more immune to ACPI BIOS bugs. As we now support HW that can
  leverage the intel_idle driver, it's advantageous to provide an
  updated version of the driver for those interested in it's use. All of
  the patches are already upstream as well (see details below).

  I'd originally pursued providing this update via linux-bcakports-
  modules.  However, testing proved that because the acpi_idle driver is
  built into the kernel, it prevents the intel_idle driver from loading
  later on via LBM. This is because the core cpuidle driver is not
  capable of handling run-time changing of idle drivers.

  I would also like to note that these patches were originally submitted to 
upstream stable by the upstream maintainer.  However, the submission
  was later retracted due to the fact that some of the patches are cosmetic in 
nature.  See:

  git://git.kernel.org/pub/scm/linux/kernel/git/lenb/linux-
  idle-2.6.35.y.git idle-release

  Impact:

  These patches should only affect the intel_idle driver.  It will also
  only load on supported systems.  This driver can also be disabled by
  booting with "intel_idle.max_cstate=0" which disables intel_idle and
  the system will fall back on ACPI's "acpi_idle".

  I will also update
  https://wiki.ubuntu.com/Kernel/Dev/KernelDriverDeviations to note the
  update.

  Test Case:

  Load the kernel with the updated intel_idle driver on a system which
  is supported and confirm it loads/functions.

  A summary of the usptream patches is as follows:

   * intel_idle: do not use the LAPIC timer for ATOM C2
   * intel_idle: add initial Sandy Bridge support
   * intel_idle: delete bogus data from cpuidle_state.power_usage
   * intel_idle: simplify test for leave_mm()
   * intel_idle: enable Atom C6
   * intel_idle: Voluntary leave_mm before entering deeper
   * cpuidle: extend cpuidle and menu governor to handle dynamic states
   * intel_idle: add missing __percpu markup
   * intel_idle: Change mode 755 => 644
   * x86, mwait: Move mwait constants to a common header file
   * intel_idle: recognize Lincroft Atom Processor
   * intel_idle: add support for Westmere-EX
   * intel_idle: delete power_policy modparam, and choose substate functions
   * intel_idle: delete substates DEBUG modparam

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/684888/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 645444] Re: [Lucid] Update to DRM33.8/9 stable kernel

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/645444

Title:
  [Lucid] Update to DRM33.8/9 stable kernel

Status in linux package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  SRU Justification

  Impact: The upstream process for stable tree updates is quite similar in 
scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a 
bug, and each patch is vetted by upstream by originating either directly from 
Linus' tree or in a minimally backported form of that patch.
  Lucid was released with the DRM subsystem updated to the 2.6.33 level because 
2.6.32 was too unstable there. Until 2.6.33 went out of upstream support, we 
picked the patches for DRM from this tree. After that we now keep an upstream 
tree that continues that effort and selectively picks changes from more recent 
stable kernels or upstream patches that been passing SRU criteria and review.

  
http://git.kernel.org/?p=linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git;a=shortlog;h=refs/tags/v2.6.32.17.9

  TEST CASE: TBD

  ==

  The following 10 patches have been in DRM33.8:
  * drm/i915: don't access FW_BLC_SELF on 965G
  * drm/radeon/kms: add quirk for ASUS HD 3600 board
  * drm/i915: gen3 page flipping fixes
  * drm/i915: don't queue flips during a flip pending event
  * drm/i915: Hold the spinlock whilst resetting unpin_work along error path
  * drm/i915: handle shared framebuffers when flipping
  * drm/i915: add PANEL_UNLOCK_REGS definition
  * drm/i915: make sure eDP panel is turned on
  * drm/i915: make sure we shut off the panel in eDP configs
  * Linux 2.6.32.17+drm33.8

  The following 2 patches have been in DRM33.9 (Revert because accidentally 
applied twice):
  * Revert "drm/radeon/kms: add quirk for ASUS HD 3600 board"
  * Linux 2.6.32.17+drm33.9

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/645444/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 663176] Re: [Lucid] Update to DRM33.11 stable kernel

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/663176

Title:
  [Lucid] Update to DRM33.11 stable kernel

Status in linux package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  SRU Justification

  Impact: The upstream process for stable tree updates is quite similar in 
scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a 
bug, and each patch is vetted by upstream by originating either directly from 
Linus' tree or in a minimally backported form of that patch.
  Lucid was released with the DRM subsystem updated to the 2.6.33 level because 
2.6.32 was too unstable there. Until 2.6.33 went out of upstream support, we 
picked the patches for DRM from this tree. After that we now keep an upstream 
tree that continues that effort and selectively picks changes from more recent 
stable kernels or upstream patches that been passing SRU criteria and review.

  
http://git.kernel.org/?p=linux/kernel/git/smb/linux-2.6.32.y-drm33.z.git;a=shortlog;h=refs/tags/v2.6.32.24.11

  TEST CASE: TBD

  ==

  The following 12 patches have been in 2.6.32.24.11:
  * i915: return -EFAULT if copy_to_user fails
  * i915_gem: return -EFAULT if copy_to_user fails
  * drm/i915: Prevent double dpms on
  * drm: Only decouple the old_fb from the crtc is we call mode_set*
  * drm/radeon/kms: fix potential segfault in r600_ioctl_wait_idle
  * drm/i915: Unset cursor if out-of-bounds upon mode change (v4)
  * drm/i915: disable FBC when more than one pipe is active
  * drm/radeon/kms: fix macbookpro connector quirk
  * drm/nouveau: use ALIGN instead of open coding it
  * drm/nouveau: Fix fbcon corruption with font width not divisible by 8
  * drm/i915,agp/intel: Add second set of PCI-IDs for B43
  * Linux 2.6.32.24+drm33.11

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/663176/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 716648] Re: linux: 2.6.31-22.73 -proposed tracker

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ec2 in Ubuntu.
https://bugs.launchpad.net/bugs/716648

Title:
  linux: 2.6.31-22.73 -proposed tracker

Status in linux package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-ec2 source package in Karmic:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.31-22.73 upload package. This bug
  will contain status and testing results releated to that upload.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/716648/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 711797] Re: CVE-2010-4157

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/711797

Title:
  CVE-2010-4157

Status in linux package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux-ti-omap4 source package in Maverick:
  Won't Fix
Status in linux source package in Natty:
  Invalid
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Won't Fix
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the
  Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to
  cause a denial of service (memory corruption) or possibly have unspecified
  other impact via a large argument in an ioctl call.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711797/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 477106] Re: [regression] lucid alpha-2 and earlier freeze upon suspend with sd card plugged in with some hardware

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/477106

Title:
  [regression] lucid alpha-2 and earlier freeze upon suspend with sd
  card plugged in with some hardware

Status in linux package in Ubuntu:
  Fix Released
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released

Bug description:
  This is another bugreport in a great series I filed. This time,
  against the lucid kernel.

  ProblemType: KernelOops
  Annotation: This occured during a previous suspend and prevented it from 
resuming properly.
  Architecture: amd64
  ArecordDevices:
    List of CAPTURE Hardware Devices 
   card 0: Intel [HDA Intel], device 0: AD198x Analog [AD198x Analog]
     Subdevices: 2/2
     Subdevice #0: subdevice #0
     Subdevice #1: subdevice #1
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  muelli 1720 F pulseaudio
  Card0.Amixer.info:
   Card hw:0 'Intel'/'HDA Intel at 0xf822 irq 17'
     Mixer name : 'Analog Devices AD1984'
     Components : 'HDA:11d41984,17aa20d6,00100400'
     Controls  : 29
     Simple ctrls  : 18
  Date: Sat Nov  7 00:00:53 2009
  DistroRelease: Ubuntu 9.10
  ExecutablePath: /usr/share/apport/apportcheckresume
  Failure: suspend/resume
  HibernationDevice: #RESUME=UUID=5273fb39-2d17-4d61-bc89-2c1b6efa1db3
  InterpreterPath: /usr/bin/python2.6
  MachineType: LENOVO 766636G
  Package: linux-image-2.6.32-2-generic 2.6.32-2.2
  PccardctlIdent:
   Socket 0:
     no product info available
  PccardctlStatus:
   Socket 0:
     no card
  ProcCmdLine: root=/dev/mapper/cryptroot 
source=UUID=9c3d5596-27c6-4fd5-bfcd-fa8eef6f1230 ro quiet splash  
crashkernel=384M-2G:64M,2G-:128M
  ProcCmdline: /usr/bin/python /usr/share/apport/apportcheckresume
  ProcEnviron: PATH=(custom, no user)
  ProcVersionSignature: Ubuntu 2.6.32-2.2-generic
  RelatedPackageVersions: linux-firmware 1.24
  SourcePackage: linux
  Tags: resume suspend
  Title: [LENOVO 766636G] suspend/resume failure
  Uname: Linux 2.6.32-2-generic x86_64
  UserGroups:

  WpaSupplicantLog:

  dmi.bios.date: 07/01/2008
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 7NETB6WW (2.16 )
  dmi.board.name: 766636G
  dmi.board.vendor: LENOVO
  dmi.board.version: Not Available
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Not Available
  dmi.modalias: 
dmi:bvnLENOVO:bvr7NETB6WW(2.16):bd07/01/2008:svnLENOVO:pn766636G:pvrThinkPadX61s:rvnLENOVO:rn766636G:rvrNotAvailable:cvnLENOVO:ct10:cvrNotAvailable:
  dmi.product.name: 766636G
  dmi.product.version: ThinkPad X61s
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/477106/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 716551] Re: linux: 2.6.32-29.58 -proposed tracker

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/716551

Title:
  linux: 2.6.32-29.58 -proposed tracker

Status in linux package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Fix Released
Status in linux source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released

Bug description:
  This bug is for tracking the 2.6.32-29.58 upload package. This bug
  will contain status and testing results releated to that upload.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/716551/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 720189] Re: CVE-2010-4076, CVE-2010-4077

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/720189

Title:
  CVE-2010-4076, CVE-2010-4077

Status in linux package in Ubuntu:
  Fix Released
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-lts-backport-maverick source package in Lucid:
  Fix Released
Status in linux-mvl-dove source package in Lucid:
  Fix Released
Status in linux-ti-omap4 source package in Lucid:
  Invalid
Status in linux source package in Maverick:
  Fix Released
Status in linux-lts-backport-maverick source package in Maverick:
  Invalid
Status in linux-mvl-dove source package in Maverick:
  Fix Released
Status in linux-ti-omap4 source package in Maverick:
  Fix Released
Status in linux source package in Natty:
  Fix Released
Status in linux-lts-backport-maverick source package in Natty:
  Invalid
Status in linux-mvl-dove source package in Natty:
  Invalid
Status in linux-ti-omap4 source package in Natty:
  Fix Released
Status in linux source package in Dapper:
  Fix Released
Status in linux-lts-backport-maverick source package in Dapper:
  Invalid
Status in linux-mvl-dove source package in Dapper:
  Invalid
Status in linux-ti-omap4 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-lts-backport-maverick source package in Hardy:
  Invalid
Status in linux-mvl-dove source package in Hardy:
  Invalid
Status in linux-ti-omap4 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-lts-backport-maverick source package in Karmic:
  Invalid
Status in linux-mvl-dove source package in Karmic:
  Invalid
Status in linux-ti-omap4 source package in Karmic:
  Invalid

Bug description:
  The rs_ioctl function in drivers/char/amiserial.c in the Linux kernel
  2.6.36.1 and earlier does not properly initialize a certain structure
  member, which allows local users to obtain potentially sensitive
  information from kernel stack memory via a TIOCGICOUNT ioctl call.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/720189/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1420580] Re: linux-ec2: 2.6.32-376.93 -proposed tracker

2015-02-11 Thread Brad Figg
** Changed in: kernel-sru-workflow/verification-testing
   Status: New => In Progress

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Confirmed

** Description changed:

  This bug is for tracking the  upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 11. February 2015 02:03 UTC
  kernel-stable-master-bug:1419974
  kernel-stable-Certification-testing-end:Wednesday, 11. February 2015 10:01 UTC
  kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 15:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 15:02 UTC
- kernel-stable-phase-changed:Wednesday, 11. February 2015 15:02 UTC
- kernel-stable-phase:ReadyToBePackaged
  kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC
+ kernel-stable-phase:Verification & Testing
+ kernel-stable-phase-changed:Thursday, 12. February 2015 06:03 UTC
+ kernel-stable-Security-signoff-start:Thursday, 12. February 2015 06:03 UTC
+ kernel-stable-Verification-testing-start:Thursday, 12. February 2015 06:03 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ec2 in Ubuntu.
https://bugs.launchpad.net/bugs/1420580

Title:
  linux-ec2: 2.6.32-376.93 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Confirmed
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-ec2 source package in Lucid:
  New

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 11. February 2015 02:03 UTC
  kernel-stable-master-bug:1419974
  kernel-stable-Certification-testing-end:Wednesday, 11. February 2015 10:01 UTC
  kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 15:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 15:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 12. February 2015 06:03 UTC
  kernel-stable-Security-signoff-start:Thursday, 12. February 2015 06:03 UTC
  kernel-stable-Verification-testing-start:Thursday, 12. February 2015 06:03 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1420580/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1419974] Re: linux: 2.6.32-73.140 -proposed tracker

2015-02-11 Thread Brad Figg
** Changed in: kernel-sru-workflow/verification-testing
   Status: New => In Progress

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Confirmed

** Description changed:

  This bug is for tracking the 2.6.32-73.140 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 09. February 2015 20:19 UTC
- kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 02:05 UTC
- kernel-stable-phase-changed:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC
+ kernel-stable-phase:Verification & Testing
+ kernel-stable-phase-changed:Thursday, 12. February 2015 06:02 UTC
+ kernel-stable-Verification-testing-start:Thursday, 12. February 2015 06:02 UTC
+ kernel-stable-Certification-testing-start:Thursday, 12. February 2015 06:02 
UTC
+ kernel-stable-Security-signoff-start:Thursday, 12. February 2015 06:02 UTC
+ kernel-stable-Regression-testing-start:Thursday, 12. February 2015 06:02 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1419974

Title:
  linux: 2.6.32-73.140 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  New

Bug description:
  This bug is for tracking the 2.6.32-73.140 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 09. February 2015 20:19 UTC
  kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 12. February 2015 06:02 UTC
  kernel-stable-Verification-testing-start:Thursday, 12. February 2015 06:02 UTC
  kernel-stable-Certification-testing-start:Thursday, 12. February 2015 06:02 
UTC
  kernel-stable-Security-signoff-start:Thursday, 12. February 2015 06:02 UTC
  kernel-stable-Regression-testing-start:Thursday, 12. February 2015 06:02 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1419974/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1400215] Re: Atheros BT devices(ath3k) fail to work on USB3.0 buses

2015-02-11 Thread Adam Lee
patch has been submitted to kernel-team and stable@vger

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1400215

Title:
  Atheros BT devices(ath3k) fail to work on USB3.0 buses

Status in HWE Next Project:
  In Progress
Status in linux package in Ubuntu:
  In Progress

Bug description:
  Atheros BT devices(ath3k) fail to work on USB3.0 buses, but work well
  on USB 2.0

    1. BT devices will disappear from USB3.0 buses.
    2. BT devices can be found on USB3.0 buses, but can not be found by 
hciconfig.
    3. There are FW loading error messages in dmesg with USB3.0.

  $ dmesg | grep Blu
  [ 13.996701] Bluetooth: Core ver 2.19
  [ 13.996716] Bluetooth: HCI device and connection manager initialized
  [ 13.996722] Bluetooth: HCI socket layer initialized
  [ 13.996723] Bluetooth: L2CAP socket layer initialized
  [ 13.996729] Bluetooth: SCO socket layer initialized
  [ 15.763696] Bluetooth: RFCOMM TTY layer initialized
  [ 15.763705] Bluetooth: RFCOMM socket layer initialized
  [ 15.763709] Bluetooth: RFCOMM ver 1.11
  [ 15.772693] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [ 15.772696] Bluetooth: BNEP filters: protocol multicast
  [ 15.772703] Bluetooth: BNEP socket layer initialized
  [ 17.378235] Bluetooth: Error in firmware loading err = -110,len = 448, size 
= 1496
  [ 17.378242] Bluetooth: Loading sysconfig file failed

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1400215/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1417915] Re: ThinkPad T550: thinkpad_acpi is not loaded automatically

2015-02-11 Thread Adam Lee
patch is in x86-platform upstreaming queue now.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1417915

Title:
  ThinkPad T550: thinkpad_acpi is not loaded automatically

Status in HWE Next Project:
  In Progress
Status in linux package in Ubuntu:
  In Progress

Bug description:
  BIOS version has new string pattern now, "xxxyTkkW", need to add that
  support.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1417915/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1400215] Re: Atheros BT devices(ath3k) fail to work on USB3.0 buses

2015-02-11 Thread Adam Lee
it's in mainline now, start backporting,
c561a5753dd631920c4459a067d22679b3d110d6

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1400215

Title:
  Atheros BT devices(ath3k) fail to work on USB3.0 buses

Status in HWE Next Project:
  In Progress
Status in linux package in Ubuntu:
  In Progress

Bug description:
  Atheros BT devices(ath3k) fail to work on USB3.0 buses, but work well
  on USB 2.0

    1. BT devices will disappear from USB3.0 buses.
    2. BT devices can be found on USB3.0 buses, but can not be found by 
hciconfig.
    3. There are FW loading error messages in dmesg with USB3.0.

  $ dmesg | grep Blu
  [ 13.996701] Bluetooth: Core ver 2.19
  [ 13.996716] Bluetooth: HCI device and connection manager initialized
  [ 13.996722] Bluetooth: HCI socket layer initialized
  [ 13.996723] Bluetooth: L2CAP socket layer initialized
  [ 13.996729] Bluetooth: SCO socket layer initialized
  [ 15.763696] Bluetooth: RFCOMM TTY layer initialized
  [ 15.763705] Bluetooth: RFCOMM socket layer initialized
  [ 15.763709] Bluetooth: RFCOMM ver 1.11
  [ 15.772693] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [ 15.772696] Bluetooth: BNEP filters: protocol multicast
  [ 15.772703] Bluetooth: BNEP socket layer initialized
  [ 17.378235] Bluetooth: Error in firmware loading err = -110,len = 448, size 
= 1496
  [ 17.378242] Bluetooth: Loading sysconfig file failed

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1400215/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1419974] Re: linux: 2.6.32-73.140 -proposed tracker

2015-02-11 Thread Brad Figg
** Description changed:

  This bug is for tracking the 2.6.32-73.140 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 09. February 2015 20:19 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-phase-changed:Wednesday, 11. February 2015 02:05 UTC
+ kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1419974

Title:
  linux: 2.6.32-73.140 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  New

Bug description:
  This bug is for tracking the 2.6.32-73.140 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 09. February 2015 20:19 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-phase-changed:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1419974/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1420580] Re: linux-ec2: 2.6.32-376.93 -proposed tracker

2015-02-11 Thread Brad Figg
** Description changed:

  This bug is for tracking the  upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 11. February 2015 02:03 UTC
  kernel-stable-master-bug:1419974
  kernel-stable-Certification-testing-end:Wednesday, 11. February 2015 10:01 UTC
  kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 15:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 15:02 UTC
  kernel-stable-phase-changed:Wednesday, 11. February 2015 15:02 UTC
  kernel-stable-phase:ReadyToBePackaged
+ kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ec2 in Ubuntu.
https://bugs.launchpad.net/bugs/1420580

Title:
  linux-ec2: 2.6.32-376.93 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-ec2 source package in Lucid:
  New

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 11. February 2015 02:03 UTC
  kernel-stable-master-bug:1419974
  kernel-stable-Certification-testing-end:Wednesday, 11. February 2015 10:01 UTC
  kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 15:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 15:02 UTC
  kernel-stable-phase-changed:Wednesday, 11. February 2015 15:02 UTC
  kernel-stable-phase:ReadyToBePackaged
  kernel-stable-Promote-to-proposed-end:Thursday, 12. February 2015 05:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1420580/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1401960] Status changed to Confirmed

2015-02-11 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401960

Title:
  usb 3 hdd drive takes inordinate time to become available after
  attaching

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Test case:
  Boot up, log in
  attach a usb 3 hdd drive (type that doesn't have it's own power supply

  What happens:
  Takes about 30 -35 sec. before the drive shows in nautilus & unity launcher
  What's expected:
  drive should show in a sec. or less

  ProblemType: Bug
  DistroRelease: Ubuntu 15.04
  Package: linux-image-3.16.0-25-generic 3.16.0-25.33
  ProcVersionSignature: Ubuntu 3.16.0-25.33-generic 3.16.7
  Uname: Linux 3.16.0-25-generic x86_64
  ApportVersion: 2.15-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  doug   2152 F pulseaudio
   /dev/snd/controlC1:  doug   2152 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri Dec 12 11:10:14 2014
  InstallationDate: Installed on 2014-11-16 (26 days ago)
  InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Alpha amd64 (20141114)
  MachineType: LENOVO 20217
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-25-generic.efi.signed 
root=UUID=91a821ed-7160-439b-8519-939faa93bf90 ro quiet splash
  RelatedPackageVersions:
   linux-restricted-modules-3.16.0-25-generic N/A
   linux-backports-modules-3.16.0-25-generic  N/A
   linux-firmware 1.139
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/18/2013
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 74CN44WW(V3.05)
  dmi.board.asset.tag: No Asset Tag
  dmi.board.name: VIQY0Y1
  dmi.board.vendor: LENOVO
  dmi.board.version: 31900058STD
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo IdeaPad Y510P
  dmi.modalias: 
dmi:bvnLENOVO:bvr74CN44WW(V3.05):bd09/18/2013:svnLENOVO:pn20217:pvrLenovoIdeaPadY510P:rvnLENOVO:rnVIQY0Y1:rvr31900058STD:cvnLENOVO:ct10:cvrLenovoIdeaPadY510P:
  dmi.product.name: 20217
  dmi.product.version: Lenovo IdeaPad Y510P
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1401960/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1419974] Re: linux: 2.6.32-73.140 -proposed tracker

2015-02-11 Thread Adam Conrad
Copied to -proposed and overrides adjusted.

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1419974

Title:
  linux: 2.6.32-73.140 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  New

Bug description:
  This bug is for tracking the 2.6.32-73.140 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 09. February 2015 20:19 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-phase-changed:Wednesday, 11. February 2015 02:05 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1419974/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1420580] Re: linux-ec2: 2.6.32-376.93 -proposed tracker

2015-02-11 Thread Adam Conrad
Copied to -proposed.

** Changed in: linux-ec2 (Ubuntu)
   Status: New => Invalid

** Changed in: kernel-sru-workflow/upload-to-ppa
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ec2 in Ubuntu.
https://bugs.launchpad.net/bugs/1420580

Title:
  linux-ec2: 2.6.32-376.93 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-ec2 source package in Lucid:
  New

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 11. February 2015 02:03 UTC
  kernel-stable-master-bug:1419974
  kernel-stable-Certification-testing-end:Wednesday, 11. February 2015 10:01 UTC
  kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 15:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 15:02 UTC
  kernel-stable-phase-changed:Wednesday, 11. February 2015 15:02 UTC
  kernel-stable-phase:ReadyToBePackaged

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1420580/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1419974] Re: linux: 2.6.32-73.140 -proposed tracker

2015-02-11 Thread Adam Conrad
** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1419974

Title:
  linux: 2.6.32-73.140 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow package-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-ports-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  New

Bug description:
  This bug is for tracking the 2.6.32-73.140 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 09. February 2015 20:19 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 11. February 2015 02:05 UTC
  kernel-stable-phase-changed:Wednesday, 11. February 2015 02:05 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1419974/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1401960] Re: usb 3 hdd drive takes inordinate time to become available after attaching

2015-02-11 Thread Doug McMahon
** Changed in: linux (Ubuntu)
   Status: Expired => New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401960

Title:
  usb 3 hdd drive takes inordinate time to become available after
  attaching

Status in linux package in Ubuntu:
  New

Bug description:
  Test case:
  Boot up, log in
  attach a usb 3 hdd drive (type that doesn't have it's own power supply

  What happens:
  Takes about 30 -35 sec. before the drive shows in nautilus & unity launcher
  What's expected:
  drive should show in a sec. or less

  ProblemType: Bug
  DistroRelease: Ubuntu 15.04
  Package: linux-image-3.16.0-25-generic 3.16.0-25.33
  ProcVersionSignature: Ubuntu 3.16.0-25.33-generic 3.16.7
  Uname: Linux 3.16.0-25-generic x86_64
  ApportVersion: 2.15-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  doug   2152 F pulseaudio
   /dev/snd/controlC1:  doug   2152 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri Dec 12 11:10:14 2014
  InstallationDate: Installed on 2014-11-16 (26 days ago)
  InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Alpha amd64 (20141114)
  MachineType: LENOVO 20217
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-25-generic.efi.signed 
root=UUID=91a821ed-7160-439b-8519-939faa93bf90 ro quiet splash
  RelatedPackageVersions:
   linux-restricted-modules-3.16.0-25-generic N/A
   linux-backports-modules-3.16.0-25-generic  N/A
   linux-firmware 1.139
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/18/2013
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 74CN44WW(V3.05)
  dmi.board.asset.tag: No Asset Tag
  dmi.board.name: VIQY0Y1
  dmi.board.vendor: LENOVO
  dmi.board.version: 31900058STD
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo IdeaPad Y510P
  dmi.modalias: 
dmi:bvnLENOVO:bvr74CN44WW(V3.05):bd09/18/2013:svnLENOVO:pn20217:pvrLenovoIdeaPadY510P:rvnLENOVO:rnVIQY0Y1:rvr31900058STD:cvnLENOVO:ct10:cvrLenovoIdeaPadY510P:
  dmi.product.name: 20217
  dmi.product.version: Lenovo IdeaPad Y510P
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1401960/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


  1   2   3   >