[Bug 1077091] Re: CVE-2012-4565

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1077091] Re: CVE-2012-4565

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1077091] Re: CVE-2012-4565

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2016-04-26 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Yakkety)
   Importance: Undecided
   Status: Won't Fix

** Also affects: linux-lts-backport-oneiric (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Yakkety)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-saucy (Ubuntu Yakkety)
   Importance: Undecided
   Status: New

** Also affects: linux-mako (Ubuntu Yakkety)
   Importance: Medium
   Status: New

** Also affects: linux-manta (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-flo (Ubuntu Yakkety)
   Importance: Medium
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-raspi2 (Ubuntu Yakkety)
   Importance: Medium
   Status: Fix Committed

** Also affects: linux-lts-xenial (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2016-04-24 Thread Rolf Leggewie
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
   Status: New => Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
   Status: New => Won't Fix

** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2016-02-09 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2015-10-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: Won't Fix

** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Medium
   Status: New

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Medium
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Undecided
   Status: Won't Fix

** Also affects: linux-lts-backport-oneiric (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-saucy (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-mako (Ubuntu Wily)
   Importance: Medium
   Status: New

** Also affects: linux-manta (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-flo (Ubuntu Wily)
   Importance: Medium
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-ec2 (Ubuntu Lucid)

** No longer affects: linux-goldfish (Ubuntu Lucid)

** No longer affects: linux-lts-saucy (Ubuntu Lucid)

** No longer affects: linux-lts-quantal (Ubuntu Lucid)

** No longer affects: linux-mvl-dove (Ubuntu Lucid)

** No longer affects: linux-ti-omap4 (Ubuntu Lucid)

** No longer affects: linux (Ubuntu Lucid)

** No longer affects: linux-mako (Ubuntu Lucid)

** No longer affects: linux-fsl-imx51 (Ubuntu Lucid)

** No longer affects: linux-lts-utopic (Ubuntu Lucid)

** No longer affects: linux-flo (Ubuntu Lucid)

** No longer affects: linux-lts-raring (Ubuntu Lucid)

** No longer affects: linux-manta (Ubuntu Lucid)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2015-01-27 Thread John Johansen
** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-quantal (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-quantal (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Medium
   Status: Fix Released

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Undecided
   Status: Won't Fix

** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Vivid)
   Importance: Medium
   Status: Fix Released

** Also affects: linux-lts-quantal (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** No longer affects: linux-lts-trusty (Ubuntu Hardy)

** No longer affects: linux-lts-trusty (Ubuntu Oneiric)

** No longer affects: linux-lts-trusty (Ubuntu Quantal)

** No longer affects: linux-lts-trusty (Ubuntu Raring)

** No longer affects: linux-armadaxp (Ubuntu Hardy)

** No longer affects: linux-armadaxp (Ubuntu Oneiric)

** No longer affects: linux-armadaxp (Ubuntu Quantal)

** No longer affects: linux-armadaxp (Ubuntu Raring)

** No longer affects: linux-ec2 (Ubuntu Hardy)

** No longer affects: linux-ec2 (Ubuntu Oneiric)

** No longer affects: linux-ec2 (Ubuntu Quantal)

** No longer affects: linux-ec2 (Ubuntu Raring)

** No longer affects: linux-goldfish (Ubuntu Hardy)

** No longer affects: linux-goldfish (Ubuntu Oneiric)

** No longer affects: linux-goldfish (Ubuntu Quantal)

** No longer affects: linux-goldfish (Ubuntu Raring)

** No longer affects: linux-lts-saucy (Ubuntu Hardy)

** No longer affects: linux-lts-saucy (Ubuntu Oneiric)

** No longer affects: linux-lts-saucy (Ubuntu Quantal)

** No longer affects: linux-lts-saucy (Ubuntu Raring)

** No longer affects: linux-lts-quantal (Ubuntu Hardy)

** No longer affects: linux-lts-quantal (Ubuntu Oneiric)

** No longer affects: linux-lts-quantal (Ubuntu Quantal)

** No longer affects: linux-lts-quantal (Ubuntu Raring)

** No longer affects: linux-mvl-dove (Ubuntu Hardy)

** No longer affects: linux-mvl-dove (Ubuntu Oneiric)

** No longer affects: linux-mvl-dove (Ubuntu Quantal)

** No longer affects: linux-mvl-dove (Ubuntu Raring)

** No longer affects: linux-ti-omap4 (Ubuntu Hardy)

** No longer affects: linux-ti-omap4 (Ubuntu Oneiric)

** No longer affects: linux-ti-omap4 (Ubuntu Quantal)

** No longer affects: linux-ti-omap4 (Ubuntu Raring)

** No longer affects: linux (Ubuntu Hardy)

** No longer affects: linux (Ubuntu Oneiric)

** No

[Bug 1077091] Re: CVE-2012-4565

2013-05-22 Thread Jamie Strandboge
** Changed in: linux-lts-backport-natty (Ubuntu)
   Status: New => Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Status: Invalid => Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: Invalid => Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
   Status: Invalid => Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Raring)
   Status: Invalid => Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Status: Invalid => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2013-05-22 Thread Jamie Strandboge
** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Raring)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2013-05-22 Thread Jamie Strandboge
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2013-05-07 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/linux-ti-omap4

** Branch linked: lp:ubuntu/oneiric-security/linux-ti-omap4

** Branch linked: lp:ubuntu/precise-security/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2013-05-07 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-security/linux-lts-backport-oneiric

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2013-01-05 Thread John Johansen
** Description changed:

- Reading TCP stats when using TCP Illinois congestion control algorithm
- can cause a divide by zero kernel oops.
+ The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux
+ kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois
+ setting is enabled, allows local users to cause a denial of service
+ (divide-by-zero error and OOPS) by reading TCP stats.
  
  Break-Fix: - 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-12-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.5.0-1605.7

---
linux-armadaxp (3.5.0-1605.7) quantal-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1078674
  * Rebase onto Ubuntu-3.5.0-19.30

  [ Ubuntu: 3.5.0-19.30 ]

  * Release Tracking Bug
- LP: #1078041
  * [Config] update Vcs-git: to point to quantal
- LP: #1069204
  * SAUCE: ALSA: hda - add quirk for Thinkpad T430
- LP: #1060372
  * [Config] CONFIG_USB_OTG=n for all but armel/armhf
- LP: #1047527
  * [Config] remove ndiswrapper from Provides:
- LP: #1076395
  * [Config] ONFIG_AMD_IOMMU_V2=m
- LP: #1071520
  * kernel/sys.c: fix stack memory content leak via UNAME26
- LP: #1065622, #1060521
- CVE-2012-0957
  * use clamp_t in UNAME26 fix
- LP: #1065622, #1060521
- CVE-2012-0957
  * net: fix divide by zero in tcp algorithm illinois
- LP: #1077091
- CVE-2012-4565
  * SAUCE: Bluetooth: Add a load_firmware callback to struct hci_dev
- LP: #1065400
  * SAUCE: Bluetooth: Implement broadcom patchram firmware loader
- LP: #1065400
  * SAUCE: Bluetooth: Add support for 13d3:3388 and 13d3:3389
- LP: #1065400
 -- Ike PanhcWed, 21 Nov 2012 15:52:25 +0800

** Changed in: linux-armadaxp (Ubuntu Raring)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-12-03 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.5.0-1605.7

---
linux-armadaxp (3.5.0-1605.7) quantal-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1078674
  * Rebase onto Ubuntu-3.5.0-19.30

  [ Ubuntu: 3.5.0-19.30 ]

  * Release Tracking Bug
- LP: #1078041
  * [Config] update Vcs-git: to point to quantal
- LP: #1069204
  * SAUCE: ALSA: hda - add quirk for Thinkpad T430
- LP: #1060372
  * [Config] CONFIG_USB_OTG=n for all but armel/armhf
- LP: #1047527
  * [Config] remove ndiswrapper from Provides:
- LP: #1076395
  * [Config] ONFIG_AMD_IOMMU_V2=m
- LP: #1071520
  * kernel/sys.c: fix stack memory content leak via UNAME26
- LP: #1065622, #1060521
- CVE-2012-0957
  * use clamp_t in UNAME26 fix
- LP: #1065622, #1060521
- CVE-2012-0957
  * net: fix divide by zero in tcp algorithm illinois
- LP: #1077091
- CVE-2012-4565
  * SAUCE: Bluetooth: Add a load_firmware callback to struct hci_dev
- LP: #1065400
  * SAUCE: Bluetooth: Implement broadcom patchram firmware loader
- LP: #1065400
  * SAUCE: Bluetooth: Add support for 13d3:3388 and 13d3:3389
- LP: #1065400
 -- Ike PanhcWed, 21 Nov 2012 15:52:25 +0800

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-12-03 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1611.16

---
linux-armadaxp (3.2.0-1611.16) precise-proposed; urgency=low

  * Release Tracking Bug
-LP: #1079563
  * Rebase on Ubuntu-3.2.0-34.53

  [ Ubuntu: 3.2.0-34.53 ]

  * Release Tracking Bug
- LP: #1078760
  * SAUCE: input: Cypress PS/2 Trackpad list additional contributors
  * SAUCE: input: Cypress PS/2 Trackpad fix multi-source, double-click
- LP: #1055788
  * SAUCE: input: Cypress PS/2 Trackpad fix lost sync upon palm contact
- LP: #1048258
  * SAUCE: input: Cypress PS/2 Trackpad fix taps turning into hardware
clicks
- LP: #1064086
  * [Config] remove ndiswrapper from Provides:
- LP: #1076395
  * [Config] CONFIG_HP_WATCHDOG=m for x86en
- LP: #1076342
  * Revert "SUNRPC: Ensure we close the socket on EPIPE errors too..."
- LP: #1075355
  * Revert "ath9k_hw: Updated AR9003 tx gain table for 5GHz"
- LP: #1075355
  * eCryptfs: check for eCryptfs cipher support at mount
- LP: #338914
  * isci: fix isci_pci_probe() generates warning on efi failure path
- LP: #1068162
  * mtd: nand: Use the mirror BBT descriptor when reading its version
- LP: #1068162
  * drm/i915: prevent possible pin leak on error path
- LP: #1068162
  * workqueue: add missing smp_wmb() in process_one_work()
- LP: #1068162
  * TTY: ttyprintk, don't touch behind tty->write_buf
- LP: #1068162
  * Remove BUG_ON from n_tty_read()
- LP: #1068162
  * n_gsm.c: Implement 3GPP27.010 DLC start-up procedure in MUX
- LP: #1068162
  * n_gsm: uplink SKBs accumulate on list
- LP: #1068162
  * n_gsm : Flow control handling in Mux driver
- LP: #1068162
  * char: n_gsm: remove message filtering for contipated DLCI
- LP: #1068162
  * n_gsm: added interlocking for gsm_data_lock for certain code paths
- LP: #1068162
  * n_gsm: avoid accessing freed memory during CMD_FCOFF condition
- LP: #1068162
  * n_gsm: replace kfree_skb w/ appropriate dev_* versions
- LP: #1068162
  * n_gsm: memory leak in uplink error path
- LP: #1068162
  * UBI: fix autoresize handling in R/O mode
- LP: #1068162
  * UBI: erase free PEB with bitflip in EC header
- LP: #1068162
  * firmware: Add missing attributes to EFI variable attribute print out
from sysfs
- LP: #1068162
  * tools/hv: Fix exit() error code
- LP: #1068162
  * slab: fix the DEADLOCK issue on l3 alien lock
- LP: #1068162
  * gspca_pac7302: Add usb-id for 145f:013c
- LP: #1068162
  * gspca_pac7302: add support for device 1ae7:2001 Speedlink Snappy
Microphone SL-6825-SBK
- LP: #1068162
  * xhci: Warn when hosts don't halt.
- LP: #1068162
  * xHCI: add cmd_ring_state
- LP: #1068162
  * xHCI: add aborting command ring function
- LP: #1068162
  * xHCI: cancel command after command timeout
- LP: #1068162
  * hpsa: Use LUN reset instead of target reset
- LP: #1068162
  * rc: ite-cir: Initialise ite_dev::rdev earlier
- LP: #1068162
  * staging: speakup_soft: Fix reading of init string
- LP: #1068162
  * target: fix return code in target_core_init_configfs error path
- LP: #1068162
  * powerpc/eeh: Lock module while handling EEH event
- LP: #1068162
  * intel-iommu: Default to non-coherent for domains unattached to iommus
- LP: #1068162
  * workqueue: fix possible stall on try_to_grab_pending() of a delayed
work item
- LP: #1068162
  * PCI: Check P2P bridge for invalid secondary/subordinate range
- LP: #1068162
  * staging: comedi: don't dereference user memory for INSN_INTTRIG
- LP: #1068162
  * SUNRPC: Ensure that the TCP socket is closed when in CLOSE_WAIT
- LP: #1068162
  * ext4: fix potential deadlock in ext4_nonda_switch()
- LP: #1068162
  * staging: comedi: fix memory leak for saved channel list
- LP: #1068162
  * USB: option: blacklist QMI interface on ZTE MF683
- LP: #1068162
  * USB: qcaux: add Pantech vendor class match
- LP: #1068162
  * can: mscan-mpc5xxx: fix return value check in mpc512x_can_get_clock()
- LP: #1068162
  * iscsi-target: Correctly set 0x field within ISCSI_OP_REJECT PDU
- LP: #1068162
  * rcu: Fix day-one dyntick-idle stall-warning bug
- LP: #1068162
  * zfcp: Make trace record tags unique
- LP: #1068162
  * zfcp: Bounds checking for deferred error trace
- LP: #1068162
  * zfcp: Do not wakeup while suspended
- LP: #1068162
  * zfcp: remove invalid reference to list iterator variable
- LP: #1068162
  * zfcp: restore refcount check on port_remove
- LP: #1068162
  * zfcp: only access zfcp_scsi_dev for valid scsi_device
- LP: #1068162
  * ibmvscsi: Fix host config length field overflow
- LP: #1068162
  * scsi_remove_target: fix softlockup regression on hot remove
- LP: #1056746, #1068162
  * scsi_dh_alua: Enable STPG for unavailable ports
- LP: #1068162
  * Increase XHCI suspend timeout to 16ms
- LP: #1068162
  * usb: host: xhci: Fix Null pointer dereferencing wi

[Bug 1077091] Re: CVE-2012-4565

2012-12-03 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-350.57

---
linux-ec2 (2.6.32-350.57) lucid-proposed; urgency=low

  [ Stefan Bader ]

  * Rebased to Ubuntu-2.6.32-45.100
  * Release Tracking Bug
- LP: #1078882

  [ Ubuntu: 2.6.32-45.100 ]

  * eCryptfs: check for eCryptfs cipher support at mount
- LP: #338914
  * net: fix divide by zero in tcp algorithm illinois
- LP: #1077091
- CVE-2012-4565
 -- Stefan BaderThu, 15 Nov 2012 11:23:05 +0100

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-12-01 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-215.22

---
linux-ti-omap4 (3.5.0-215.22) quantal-proposed; urgency=low

  * Release Tracking Bug
- LP: #1078672

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.5.0-19.30

  [ Ubuntu: 3.5.0-19.30 ]

  * Release Tracking Bug
- LP: #1078041
  * [Config] update Vcs-git: to point to quantal
- LP: #1069204
  * SAUCE: ALSA: hda - add quirk for Thinkpad T430
- LP: #1060372
  * [Config] CONFIG_USB_OTG=n for all but armel/armhf
- LP: #1047527
  * [Config] remove ndiswrapper from Provides:
- LP: #1076395
  * [Config] ONFIG_AMD_IOMMU_V2=m
- LP: #1071520
  * kernel/sys.c: fix stack memory content leak via UNAME26
- LP: #1065622, #1060521
- CVE-2012-0957
  * use clamp_t in UNAME26 fix
- LP: #1065622, #1060521
- CVE-2012-0957
  * net: fix divide by zero in tcp algorithm illinois
- LP: #1077091
- CVE-2012-4565
  * SAUCE: Bluetooth: Add a load_firmware callback to struct hci_dev
- LP: #1065400
  * SAUCE: Bluetooth: Implement broadcom patchram firmware loader
- LP: #1065400
  * SAUCE: Bluetooth: Add support for 13d3:3388 and 13d3:3389
- LP: #1065400
 -- Paolo PisatiFri, 16 Nov 2012 10:39:59 +0100

** Changed in: linux-ti-omap4 (Ubuntu Raring)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-11-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-quantal -
3.5.0-19.30~precise1

---
linux-lts-quantal (3.5.0-19.30~precise1) precise-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1078677

  [ Andy Whitcroft ]

  * UBUNTU: ensure we build signed packages for precise
- LP: #1075181
  * [Config] update Vcs-git: to point to quantal
- LP: #1069204

  [ Joseph Salisbury ]

  * SAUCE: ALSA: hda - add quirk for Thinkpad T430
- LP: #1060372

  [ Tim Gardner ]

  * [Config] CONFIG_USB_OTG=n for all but armel/armhf
- LP: #1047527
  * [Config] remove ndiswrapper from Provides:
- LP: #1076395
  * [Config] ONFIG_AMD_IOMMU_V2=m
- LP: #1071520

  [ Upstream Kernel Changes ]

  * kernel/sys.c: fix stack memory content leak via UNAME26
- LP: #1065622, #1060521
- CVE-2012-0957
  * use clamp_t in UNAME26 fix
- LP: #1065622, #1060521
- CVE-2012-0957
  * net: fix divide by zero in tcp algorithm illinois
- LP: #1077091
- CVE-2012-4565

  [ Wen-chien Jesse Sung ]

  * SAUCE: Bluetooth: Add a load_firmware callback to struct hci_dev
- LP: #1065400
  * SAUCE: Bluetooth: Implement broadcom patchram firmware loader
- LP: #1065400
  * SAUCE: Bluetooth: Add support for 13d3:3388 and 13d3:3389
- LP: #1065400
 -- Luis HenriquesWed, 14 Nov 2012 11:55:55 
+

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-11-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-215.22

---
linux-ti-omap4 (3.5.0-215.22) quantal-proposed; urgency=low

  * Release Tracking Bug
- LP: #1078672

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.5.0-19.30

  [ Ubuntu: 3.5.0-19.30 ]

  * Release Tracking Bug
- LP: #1078041
  * [Config] update Vcs-git: to point to quantal
- LP: #1069204
  * SAUCE: ALSA: hda - add quirk for Thinkpad T430
- LP: #1060372
  * [Config] CONFIG_USB_OTG=n for all but armel/armhf
- LP: #1047527
  * [Config] remove ndiswrapper from Provides:
- LP: #1076395
  * [Config] ONFIG_AMD_IOMMU_V2=m
- LP: #1071520
  * kernel/sys.c: fix stack memory content leak via UNAME26
- LP: #1065622, #1060521
- CVE-2012-0957
  * use clamp_t in UNAME26 fix
- LP: #1065622, #1060521
- CVE-2012-0957
  * net: fix divide by zero in tcp algorithm illinois
- LP: #1077091
- CVE-2012-4565
  * SAUCE: Bluetooth: Add a load_firmware callback to struct hci_dev
- LP: #1065400
  * SAUCE: Bluetooth: Implement broadcom patchram firmware loader
- LP: #1065400
  * SAUCE: Bluetooth: Add support for 13d3:3388 and 13d3:3389
- LP: #1065400
 -- Paolo PisatiFri, 16 Nov 2012 10:39:59 +0100

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-11-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.5.0-19.30

---
linux (3.5.0-19.30) quantal-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1078041

  [ Andy Whitcroft ]

  * [Config] update Vcs-git: to point to quantal
- LP: #1069204

  [ Joseph Salisbury ]

  * SAUCE: ALSA: hda - add quirk for Thinkpad T430
- LP: #1060372

  [ Tim Gardner ]

  * [Config] CONFIG_USB_OTG=n for all but armel/armhf
- LP: #1047527
  * [Config] remove ndiswrapper from Provides:
- LP: #1076395
  * [Config] ONFIG_AMD_IOMMU_V2=m
- LP: #1071520

  [ Upstream Kernel Changes ]

  * kernel/sys.c: fix stack memory content leak via UNAME26
- LP: #1065622, #1060521
- CVE-2012-0957
  * use clamp_t in UNAME26 fix
- LP: #1065622, #1060521
- CVE-2012-0957
  * net: fix divide by zero in tcp algorithm illinois
- LP: #1077091
- CVE-2012-4565

  [ Wen-chien Jesse Sung ]

  * SAUCE: Bluetooth: Add a load_firmware callback to struct hci_dev
- LP: #1065400
  * SAUCE: Bluetooth: Implement broadcom patchram firmware loader
- LP: #1065400
  * SAUCE: Bluetooth: Add support for 13d3:3388 and 13d3:3389
- LP: #1065400
 -- Luis HenriquesTue, 13 Nov 2012 15:49:15 
+

** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-11-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1422.29

---
linux-ti-omap4 (3.2.0-1422.29) precise-proposed; urgency=low

  * Release Tracking Bug
- LP: #1079562

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.2.0-34.53

  [ Ubuntu: 3.2.0-34.53 ]

  * Release Tracking Bug
- LP: #1078760
  * SAUCE: input: Cypress PS/2 Trackpad list additional contributors
  * SAUCE: input: Cypress PS/2 Trackpad fix multi-source, double-click
- LP: #1055788
  * SAUCE: input: Cypress PS/2 Trackpad fix lost sync upon palm contact
- LP: #1048258
  * SAUCE: input: Cypress PS/2 Trackpad fix taps turning into hardware
clicks
- LP: #1064086
  * [Config] remove ndiswrapper from Provides:
- LP: #1076395
  * [Config] CONFIG_HP_WATCHDOG=m for x86en
- LP: #1076342
  * Revert "SUNRPC: Ensure we close the socket on EPIPE errors too..."
- LP: #1075355
  * Revert "ath9k_hw: Updated AR9003 tx gain table for 5GHz"
- LP: #1075355
  * eCryptfs: check for eCryptfs cipher support at mount
- LP: #338914
  * isci: fix isci_pci_probe() generates warning on efi failure path
- LP: #1068162
  * mtd: nand: Use the mirror BBT descriptor when reading its version
- LP: #1068162
  * drm/i915: prevent possible pin leak on error path
- LP: #1068162
  * workqueue: add missing smp_wmb() in process_one_work()
- LP: #1068162
  * TTY: ttyprintk, don't touch behind tty->write_buf
- LP: #1068162
  * Remove BUG_ON from n_tty_read()
- LP: #1068162
  * n_gsm.c: Implement 3GPP27.010 DLC start-up procedure in MUX
- LP: #1068162
  * n_gsm: uplink SKBs accumulate on list
- LP: #1068162
  * n_gsm : Flow control handling in Mux driver
- LP: #1068162
  * char: n_gsm: remove message filtering for contipated DLCI
- LP: #1068162
  * n_gsm: added interlocking for gsm_data_lock for certain code paths
- LP: #1068162
  * n_gsm: avoid accessing freed memory during CMD_FCOFF condition
- LP: #1068162
  * n_gsm: replace kfree_skb w/ appropriate dev_* versions
- LP: #1068162
  * n_gsm: memory leak in uplink error path
- LP: #1068162
  * UBI: fix autoresize handling in R/O mode
- LP: #1068162
  * UBI: erase free PEB with bitflip in EC header
- LP: #1068162
  * firmware: Add missing attributes to EFI variable attribute print out
from sysfs
- LP: #1068162
  * tools/hv: Fix exit() error code
- LP: #1068162
  * slab: fix the DEADLOCK issue on l3 alien lock
- LP: #1068162
  * gspca_pac7302: Add usb-id for 145f:013c
- LP: #1068162
  * gspca_pac7302: add support for device 1ae7:2001 Speedlink Snappy
Microphone SL-6825-SBK
- LP: #1068162
  * xhci: Warn when hosts don't halt.
- LP: #1068162
  * xHCI: add cmd_ring_state
- LP: #1068162
  * xHCI: add aborting command ring function
- LP: #1068162
  * xHCI: cancel command after command timeout
- LP: #1068162
  * hpsa: Use LUN reset instead of target reset
- LP: #1068162
  * rc: ite-cir: Initialise ite_dev::rdev earlier
- LP: #1068162
  * staging: speakup_soft: Fix reading of init string
- LP: #1068162
  * target: fix return code in target_core_init_configfs error path
- LP: #1068162
  * powerpc/eeh: Lock module while handling EEH event
- LP: #1068162
  * intel-iommu: Default to non-coherent for domains unattached to iommus
- LP: #1068162
  * workqueue: fix possible stall on try_to_grab_pending() of a delayed
work item
- LP: #1068162
  * PCI: Check P2P bridge for invalid secondary/subordinate range
- LP: #1068162
  * staging: comedi: don't dereference user memory for INSN_INTTRIG
- LP: #1068162
  * SUNRPC: Ensure that the TCP socket is closed when in CLOSE_WAIT
- LP: #1068162
  * ext4: fix potential deadlock in ext4_nonda_switch()
- LP: #1068162
  * staging: comedi: fix memory leak for saved channel list
- LP: #1068162
  * USB: option: blacklist QMI interface on ZTE MF683
- LP: #1068162
  * USB: qcaux: add Pantech vendor class match
- LP: #1068162
  * can: mscan-mpc5xxx: fix return value check in mpc512x_can_get_clock()
- LP: #1068162
  * iscsi-target: Correctly set 0x field within ISCSI_OP_REJECT PDU
- LP: #1068162
  * rcu: Fix day-one dyntick-idle stall-warning bug
- LP: #1068162
  * zfcp: Make trace record tags unique
- LP: #1068162
  * zfcp: Bounds checking for deferred error trace
- LP: #1068162
  * zfcp: Do not wakeup while suspended
- LP: #1068162
  * zfcp: remove invalid reference to list iterator variable
- LP: #1068162
  * zfcp: restore refcount check on port_remove
- LP: #1068162
  * zfcp: only access zfcp_scsi_dev for valid scsi_device
- LP: #1068162
  * ibmvscsi: Fix host config length field overflow
- LP: #1068162
  * scsi_remove_target: fix softlockup regression on hot remove
- LP: #1056746, #1068162
  * scsi_dh_alua: Enable STPG for unavailable ports
- LP: #1068162
  * Increase XHCI suspend timeout to 16ms
- LP: #1068162
  * usb: host: xhci: Fix Null p

[Bug 1077091] Re: CVE-2012-4565

2012-11-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-34.53

---
linux (3.2.0-34.53) precise-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1078760

  [ Kamal Mostafa ]

  * SAUCE: input: Cypress PS/2 Trackpad list additional contributors

  [ Kyle Fazzari ]

  * SAUCE: input: Cypress PS/2 Trackpad fix multi-source, double-click
- LP: #1055788
  * SAUCE: input: Cypress PS/2 Trackpad fix lost sync upon palm contact
- LP: #1048258
  * SAUCE: input: Cypress PS/2 Trackpad fix taps turning into hardware
clicks
- LP: #1064086

  [ Tim Gardner ]

  * [Config] remove ndiswrapper from Provides:
- LP: #1076395
  * [Config] CONFIG_HP_WATCHDOG=m for x86en
- LP: #1076342

  [ Upstream Kernel Changes ]

  * Revert "SUNRPC: Ensure we close the socket on EPIPE errors too..."
- LP: #1075355
  * Revert "ath9k_hw: Updated AR9003 tx gain table for 5GHz"
- LP: #1075355
  * eCryptfs: check for eCryptfs cipher support at mount
- LP: #338914
  * isci: fix isci_pci_probe() generates warning on efi failure path
- LP: #1068162
  * mtd: nand: Use the mirror BBT descriptor when reading its version
- LP: #1068162
  * drm/i915: prevent possible pin leak on error path
- LP: #1068162
  * workqueue: add missing smp_wmb() in process_one_work()
- LP: #1068162
  * TTY: ttyprintk, don't touch behind tty->write_buf
- LP: #1068162
  * Remove BUG_ON from n_tty_read()
- LP: #1068162
  * n_gsm.c: Implement 3GPP27.010 DLC start-up procedure in MUX
- LP: #1068162
  * n_gsm: uplink SKBs accumulate on list
- LP: #1068162
  * n_gsm : Flow control handling in Mux driver
- LP: #1068162
  * char: n_gsm: remove message filtering for contipated DLCI
- LP: #1068162
  * n_gsm: added interlocking for gsm_data_lock for certain code paths
- LP: #1068162
  * n_gsm: avoid accessing freed memory during CMD_FCOFF condition
- LP: #1068162
  * n_gsm: replace kfree_skb w/ appropriate dev_* versions
- LP: #1068162
  * n_gsm: memory leak in uplink error path
- LP: #1068162
  * UBI: fix autoresize handling in R/O mode
- LP: #1068162
  * UBI: erase free PEB with bitflip in EC header
- LP: #1068162
  * firmware: Add missing attributes to EFI variable attribute print out
from sysfs
- LP: #1068162
  * tools/hv: Fix exit() error code
- LP: #1068162
  * slab: fix the DEADLOCK issue on l3 alien lock
- LP: #1068162
  * gspca_pac7302: Add usb-id for 145f:013c
- LP: #1068162
  * gspca_pac7302: add support for device 1ae7:2001 Speedlink Snappy
Microphone SL-6825-SBK
- LP: #1068162
  * xhci: Warn when hosts don't halt.
- LP: #1068162
  * xHCI: add cmd_ring_state
- LP: #1068162
  * xHCI: add aborting command ring function
- LP: #1068162
  * xHCI: cancel command after command timeout
- LP: #1068162
  * hpsa: Use LUN reset instead of target reset
- LP: #1068162
  * rc: ite-cir: Initialise ite_dev::rdev earlier
- LP: #1068162
  * staging: speakup_soft: Fix reading of init string
- LP: #1068162
  * target: fix return code in target_core_init_configfs error path
- LP: #1068162
  * powerpc/eeh: Lock module while handling EEH event
- LP: #1068162
  * intel-iommu: Default to non-coherent for domains unattached to iommus
- LP: #1068162
  * workqueue: fix possible stall on try_to_grab_pending() of a delayed
work item
- LP: #1068162
  * PCI: Check P2P bridge for invalid secondary/subordinate range
- LP: #1068162
  * staging: comedi: don't dereference user memory for INSN_INTTRIG
- LP: #1068162
  * SUNRPC: Ensure that the TCP socket is closed when in CLOSE_WAIT
- LP: #1068162
  * ext4: fix potential deadlock in ext4_nonda_switch()
- LP: #1068162
  * staging: comedi: fix memory leak for saved channel list
- LP: #1068162
  * USB: option: blacklist QMI interface on ZTE MF683
- LP: #1068162
  * USB: qcaux: add Pantech vendor class match
- LP: #1068162
  * can: mscan-mpc5xxx: fix return value check in mpc512x_can_get_clock()
- LP: #1068162
  * iscsi-target: Correctly set 0x field within ISCSI_OP_REJECT PDU
- LP: #1068162
  * rcu: Fix day-one dyntick-idle stall-warning bug
- LP: #1068162
  * zfcp: Make trace record tags unique
- LP: #1068162
  * zfcp: Bounds checking for deferred error trace
- LP: #1068162
  * zfcp: Do not wakeup while suspended
- LP: #1068162
  * zfcp: remove invalid reference to list iterator variable
- LP: #1068162
  * zfcp: restore refcount check on port_remove
- LP: #1068162
  * zfcp: only access zfcp_scsi_dev for valid scsi_device
- LP: #1068162
  * ibmvscsi: Fix host config length field overflow
- LP: #1068162
  * scsi_remove_target: fix softlockup regression on hot remove
- LP: #1056746, #1068162
  * scsi_dh_alua: Enable STPG for unavailable ports
- LP: #1068162
  * Increase XHCI suspend timeout to 16ms
- LP: #1068162
  * usb: host: xhci: Fix Null pointer dereferencing with 71c731a 

[Bug 1077091] Re: CVE-2012-4565

2012-11-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-45.100

---
linux (2.6.32-45.100) lucid-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1078385

  [ Upstream Kernel Changes ]

  * eCryptfs: check for eCryptfs cipher support at mount
- LP: #338914
  * net: fix divide by zero in tcp algorithm illinois
- LP: #1077091
- CVE-2012-4565
 -- Luis HenriquesTue, 13 Nov 2012 17:53:05 
+

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-11-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.24-32.106

---
linux (2.6.24-32.106) hardy-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1077976

  [Upstream Kernel Changes]

  * net: fix divide by zero in tcp algorithm illinois
- LP: #1077091
- CVE-2012-4565
 -- Luis HenriquesMon, 12 Nov 2012 18:06:22 
+

** Changed in: linux (Ubuntu Hardy)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-11-28 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1218.31

---
linux-ti-omap4 (3.0.0-1218.31) oneiric-proposed; urgency=low

  * Release Tracking Bug
- LP: #1079255

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.0.0-2.45

  [ Ubuntu: 3.0.0-28.45 ]

  * Release Tracking Bug
- LP: #1078663
  * [Config] updateconfigs for stable updates
  * Revert "SUNRPC: Ensure we close the socket on EPIPE errors too..."
- LP: #1075332
  * mn10300: only add -mmem-funcs to KBUILD_CFLAGS if gcc supports it
- LP: #1067857
  * kbuild: make: fix if_changed when command contains backslashes
- LP: #1067857
  * media: rc: ite-cir: Initialise ite_dev::rdev earlier
- LP: #1067857
  * ACPI: run _OSC after ACPI_FULL_INITIALIZATION
- LP: #1067857
  * PCI: acpiphp: check whether _ADR evaluation succeeded
- LP: #1067857
  * lib/gcd.c: prevent possible div by 0
- LP: #1067857
  * kernel/sys.c: call disable_nonboot_cpus() in kernel_restart()
- LP: #1067857
  * drivers/scsi/atp870u.c: fix bad use of udelay
- LP: #1067857
  * workqueue: add missing smp_wmb() in process_one_work()
- LP: #1067857
  * xfrm: Workaround incompatibility of ESN and async crypto
- LP: #1067857
  * xfrm_user: return error pointer instead of NULL
- LP: #1067857
  * xfrm_user: return error pointer instead of NULL #2
- LP: #1067857
  * xfrm: fix a read lock imbalance in make_blackhole
- LP: #1067857
  * xfrm_user: fix info leak in copy_to_user_auth()
- LP: #1067857
  * xfrm_user: fix info leak in copy_to_user_state()
- LP: #1067857
  * xfrm_user: fix info leak in copy_to_user_policy()
- LP: #1067857
  * xfrm_user: fix info leak in copy_to_user_tmpl()
- LP: #1067857
  * xfrm_user: don't copy esn replay window twice for new states
- LP: #1067857
  * xfrm_user: ensure user supplied esn replay window is valid
- LP: #1067857
  * net: ethernet: davinci_cpdma: decrease the desc count when cleaning up
the remaining packets
- LP: #1067857
  * ixp4xx_hss: fix build failure due to missing linux/module.h inclusion
- LP: #1067857
  * netxen: check for root bus in netxen_mask_aer_correctable
- LP: #1067857
  * net-sched: sch_cbq: avoid infinite loop
- LP: #1067857
  * pkt_sched: fix virtual-start-time update in QFQ
- LP: #1067857
  * sierra_net: Endianess bug fix.
- LP: #1067857
  * 8021q: fix mac_len recomputation in vlan_untag()
- LP: #1067857
  * ipv6: release reference of ip6_null_entry's dst entry in __ip6_del_rt
- LP: #1067857
  * tcp: flush DMA queue before sk_wait_data if rcv_wnd is zero
- LP: #1067857
  * sctp: Don't charge for data in sndbuf again when transmitting packet
- LP: #1067857
  * pppoe: drop PPPOX_ZOMBIEs in pppoe_release
- LP: #1067857
  * net: small bug on rxhash calculation
- LP: #1067857
  * net: guard tcp_set_keepalive() to tcp sockets
- LP: #1067857
  * ipv4: raw: fix icmp_filter()
- LP: #1067857
  * ipv6: raw: fix icmpv6_filter()
- LP: #1067857
  * ipv6: mip6: fix mip6_mh_filter()
- LP: #1067857
  * l2tp: fix a typo in l2tp_eth_dev_recv()
- LP: #1067857
  * netrom: copy_datagram_iovec can fail
- LP: #1067857
  * net: do not disable sg for packets requiring no checksum
- LP: #1067857
  * aoe: assert AoE packets marked as requiring no checksum
- LP: #1067857
  * tg3: Fix TSO CAP for 5704 devs w / ASF enabled
- LP: #1067857
  * SCSI: zfcp: Make trace record tags unique
- LP: #1067857
  * SCSI: zfcp: Do not wakeup while suspended
- LP: #1067857
  * SCSI: zfcp: remove invalid reference to list iterator variable
- LP: #1067857
  * SCSI: zfcp: restore refcount check on port_remove
- LP: #1067857
  * SCSI: zfcp: only access zfcp_scsi_dev for valid scsi_device
- LP: #1067857
  * PCI: Check P2P bridge for invalid secondary/subordinate range
- LP: #1067857
  * ext4: online defrag is not supported for journaled files
- LP: #1067857
  * ext4: always set i_op in ext4_mknod()
- LP: #1067857
  * ext4: fix fdatasync() for files with only i_size changes
- LP: #1067857
  * ASoC: wm9712: Fix name of Capture Switch
- LP: #1067857
  * mm: fix invalidate_complete_page2() lock ordering
- LP: #1067857
  * mm: thp: fix pmd_present for split_huge_page and PROT_NONE with THP
- LP: #1067857
  * ALSA: aloop - add locking to timer access
- LP: #1067857
  * ALSA: usb - disable broken hw volume for Tenx TP6911
- LP: #1067857, #559939
  * ALSA: USB: Support for (original) Xbox Communicator
- LP: #1067857
  * drm/radeon: only adjust default clocks on NI GPUs
- LP: #1067857
  * drm/radeon: Add MSI quirk for gateway RS690
- LP: #1067857
  * drm/radeon: force MSIs on RS690 asics
- LP: #1067857
  * rcu: Fix day-one dyntick-idle stall-warning bug
- LP: #1067857
  * r8169: fix wake on lan setting for non-8111E.
- LP: #1067857
  * r8169: don't enable rx when shutdown.
- LP: #1067857
  * r8169: remove erroneous processing of alw

[Bug 1077091] Re: CVE-2012-4565

2012-11-28 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.0.0-28.45

---
linux (3.0.0-28.45) oneiric-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1078663

  [ Tim Gardner ]

  * [Config] updateconfigs for stable updates

  [ Upstream Kernel Changes ]

  * Revert "SUNRPC: Ensure we close the socket on EPIPE errors too..."
- LP: #1075332
  * mn10300: only add -mmem-funcs to KBUILD_CFLAGS if gcc supports it
- LP: #1067857
  * kbuild: make: fix if_changed when command contains backslashes
- LP: #1067857
  * media: rc: ite-cir: Initialise ite_dev::rdev earlier
- LP: #1067857
  * ACPI: run _OSC after ACPI_FULL_INITIALIZATION
- LP: #1067857
  * PCI: acpiphp: check whether _ADR evaluation succeeded
- LP: #1067857
  * lib/gcd.c: prevent possible div by 0
- LP: #1067857
  * kernel/sys.c: call disable_nonboot_cpus() in kernel_restart()
- LP: #1067857
  * drivers/scsi/atp870u.c: fix bad use of udelay
- LP: #1067857
  * workqueue: add missing smp_wmb() in process_one_work()
- LP: #1067857
  * xfrm: Workaround incompatibility of ESN and async crypto
- LP: #1067857
  * xfrm_user: return error pointer instead of NULL
- LP: #1067857
  * xfrm_user: return error pointer instead of NULL #2
- LP: #1067857
  * xfrm: fix a read lock imbalance in make_blackhole
- LP: #1067857
  * xfrm_user: fix info leak in copy_to_user_auth()
- LP: #1067857
  * xfrm_user: fix info leak in copy_to_user_state()
- LP: #1067857
  * xfrm_user: fix info leak in copy_to_user_policy()
- LP: #1067857
  * xfrm_user: fix info leak in copy_to_user_tmpl()
- LP: #1067857
  * xfrm_user: don't copy esn replay window twice for new states
- LP: #1067857
  * xfrm_user: ensure user supplied esn replay window is valid
- LP: #1067857
  * net: ethernet: davinci_cpdma: decrease the desc count when cleaning up
the remaining packets
- LP: #1067857
  * ixp4xx_hss: fix build failure due to missing linux/module.h inclusion
- LP: #1067857
  * netxen: check for root bus in netxen_mask_aer_correctable
- LP: #1067857
  * net-sched: sch_cbq: avoid infinite loop
- LP: #1067857
  * pkt_sched: fix virtual-start-time update in QFQ
- LP: #1067857
  * sierra_net: Endianess bug fix.
- LP: #1067857
  * 8021q: fix mac_len recomputation in vlan_untag()
- LP: #1067857
  * ipv6: release reference of ip6_null_entry's dst entry in __ip6_del_rt
- LP: #1067857
  * tcp: flush DMA queue before sk_wait_data if rcv_wnd is zero
- LP: #1067857
  * sctp: Don't charge for data in sndbuf again when transmitting packet
- LP: #1067857
  * pppoe: drop PPPOX_ZOMBIEs in pppoe_release
- LP: #1067857
  * net: small bug on rxhash calculation
- LP: #1067857
  * net: guard tcp_set_keepalive() to tcp sockets
- LP: #1067857
  * ipv4: raw: fix icmp_filter()
- LP: #1067857
  * ipv6: raw: fix icmpv6_filter()
- LP: #1067857
  * ipv6: mip6: fix mip6_mh_filter()
- LP: #1067857
  * l2tp: fix a typo in l2tp_eth_dev_recv()
- LP: #1067857
  * netrom: copy_datagram_iovec can fail
- LP: #1067857
  * net: do not disable sg for packets requiring no checksum
- LP: #1067857
  * aoe: assert AoE packets marked as requiring no checksum
- LP: #1067857
  * tg3: Fix TSO CAP for 5704 devs w / ASF enabled
- LP: #1067857
  * SCSI: zfcp: Make trace record tags unique
- LP: #1067857
  * SCSI: zfcp: Do not wakeup while suspended
- LP: #1067857
  * SCSI: zfcp: remove invalid reference to list iterator variable
- LP: #1067857
  * SCSI: zfcp: restore refcount check on port_remove
- LP: #1067857
  * SCSI: zfcp: only access zfcp_scsi_dev for valid scsi_device
- LP: #1067857
  * PCI: Check P2P bridge for invalid secondary/subordinate range
- LP: #1067857
  * ext4: online defrag is not supported for journaled files
- LP: #1067857
  * ext4: always set i_op in ext4_mknod()
- LP: #1067857
  * ext4: fix fdatasync() for files with only i_size changes
- LP: #1067857
  * ASoC: wm9712: Fix name of Capture Switch
- LP: #1067857
  * mm: fix invalidate_complete_page2() lock ordering
- LP: #1067857
  * mm: thp: fix pmd_present for split_huge_page and PROT_NONE with THP
- LP: #1067857
  * ALSA: aloop - add locking to timer access
- LP: #1067857
  * ALSA: usb - disable broken hw volume for Tenx TP6911
- LP: #1067857, #559939
  * ALSA: USB: Support for (original) Xbox Communicator
- LP: #1067857
  * drm/radeon: only adjust default clocks on NI GPUs
- LP: #1067857
  * drm/radeon: Add MSI quirk for gateway RS690
- LP: #1067857
  * drm/radeon: force MSIs on RS690 asics
- LP: #1067857
  * rcu: Fix day-one dyntick-idle stall-warning bug
- LP: #1067857
  * r8169: fix wake on lan setting for non-8111E.
- LP: #1067857
  * r8169: don't enable rx when shutdown.
- LP: #1067857
  * r8169: remove erroneous processing of always set bit.
- LP: #1067857
  * r8169: jumbo fixes.
- LP: #1067857
 

[Bug 1077091] Re: CVE-2012-4565

2012-11-28 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-28.45~lucid1

---
linux-lts-backport-oneiric (3.0.0-28.45~lucid1) lucid-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1079256

  [ Tim Gardner ]

  * [Config] updateconfigs for stable updates

  [ Upstream Kernel Changes ]

  * Revert "SUNRPC: Ensure we close the socket on EPIPE errors too..."
- LP: #1075332
  * mn10300: only add -mmem-funcs to KBUILD_CFLAGS if gcc supports it
- LP: #1067857
  * kbuild: make: fix if_changed when command contains backslashes
- LP: #1067857
  * media: rc: ite-cir: Initialise ite_dev::rdev earlier
- LP: #1067857
  * ACPI: run _OSC after ACPI_FULL_INITIALIZATION
- LP: #1067857
  * PCI: acpiphp: check whether _ADR evaluation succeeded
- LP: #1067857
  * lib/gcd.c: prevent possible div by 0
- LP: #1067857
  * kernel/sys.c: call disable_nonboot_cpus() in kernel_restart()
- LP: #1067857
  * drivers/scsi/atp870u.c: fix bad use of udelay
- LP: #1067857
  * workqueue: add missing smp_wmb() in process_one_work()
- LP: #1067857
  * xfrm: Workaround incompatibility of ESN and async crypto
- LP: #1067857
  * xfrm_user: return error pointer instead of NULL
- LP: #1067857
  * xfrm_user: return error pointer instead of NULL #2
- LP: #1067857
  * xfrm: fix a read lock imbalance in make_blackhole
- LP: #1067857
  * xfrm_user: fix info leak in copy_to_user_auth()
- LP: #1067857
  * xfrm_user: fix info leak in copy_to_user_state()
- LP: #1067857
  * xfrm_user: fix info leak in copy_to_user_policy()
- LP: #1067857
  * xfrm_user: fix info leak in copy_to_user_tmpl()
- LP: #1067857
  * xfrm_user: don't copy esn replay window twice for new states
- LP: #1067857
  * xfrm_user: ensure user supplied esn replay window is valid
- LP: #1067857
  * net: ethernet: davinci_cpdma: decrease the desc count when cleaning up
the remaining packets
- LP: #1067857
  * ixp4xx_hss: fix build failure due to missing linux/module.h inclusion
- LP: #1067857
  * netxen: check for root bus in netxen_mask_aer_correctable
- LP: #1067857
  * net-sched: sch_cbq: avoid infinite loop
- LP: #1067857
  * pkt_sched: fix virtual-start-time update in QFQ
- LP: #1067857
  * sierra_net: Endianess bug fix.
- LP: #1067857
  * 8021q: fix mac_len recomputation in vlan_untag()
- LP: #1067857
  * ipv6: release reference of ip6_null_entry's dst entry in __ip6_del_rt
- LP: #1067857
  * tcp: flush DMA queue before sk_wait_data if rcv_wnd is zero
- LP: #1067857
  * sctp: Don't charge for data in sndbuf again when transmitting packet
- LP: #1067857
  * pppoe: drop PPPOX_ZOMBIEs in pppoe_release
- LP: #1067857
  * net: small bug on rxhash calculation
- LP: #1067857
  * net: guard tcp_set_keepalive() to tcp sockets
- LP: #1067857
  * ipv4: raw: fix icmp_filter()
- LP: #1067857
  * ipv6: raw: fix icmpv6_filter()
- LP: #1067857
  * ipv6: mip6: fix mip6_mh_filter()
- LP: #1067857
  * l2tp: fix a typo in l2tp_eth_dev_recv()
- LP: #1067857
  * netrom: copy_datagram_iovec can fail
- LP: #1067857
  * net: do not disable sg for packets requiring no checksum
- LP: #1067857
  * aoe: assert AoE packets marked as requiring no checksum
- LP: #1067857
  * tg3: Fix TSO CAP for 5704 devs w / ASF enabled
- LP: #1067857
  * SCSI: zfcp: Make trace record tags unique
- LP: #1067857
  * SCSI: zfcp: Do not wakeup while suspended
- LP: #1067857
  * SCSI: zfcp: remove invalid reference to list iterator variable
- LP: #1067857
  * SCSI: zfcp: restore refcount check on port_remove
- LP: #1067857
  * SCSI: zfcp: only access zfcp_scsi_dev for valid scsi_device
- LP: #1067857
  * PCI: Check P2P bridge for invalid secondary/subordinate range
- LP: #1067857
  * ext4: online defrag is not supported for journaled files
- LP: #1067857
  * ext4: always set i_op in ext4_mknod()
- LP: #1067857
  * ext4: fix fdatasync() for files with only i_size changes
- LP: #1067857
  * ASoC: wm9712: Fix name of Capture Switch
- LP: #1067857
  * mm: fix invalidate_complete_page2() lock ordering
- LP: #1067857
  * mm: thp: fix pmd_present for split_huge_page and PROT_NONE with THP
- LP: #1067857
  * ALSA: aloop - add locking to timer access
- LP: #1067857
  * ALSA: usb - disable broken hw volume for Tenx TP6911
- LP: #1067857, #559939
  * ALSA: USB: Support for (original) Xbox Communicator
- LP: #1067857
  * drm/radeon: only adjust default clocks on NI GPUs
- LP: #1067857
  * drm/radeon: Add MSI quirk for gateway RS690
- LP: #1067857
  * drm/radeon: force MSIs on RS690 asics
- LP: #1067857
  * rcu: Fix day-one dyntick-idle stall-warning bug
- LP: #1067857
  * r8169: fix wake on lan setting for non-8111E.
- LP: #1067857
  * r8169: don't enable rx when shutdown.
- LP: #1067857
  * r8169: remove erroneous processing of always set bit.
- LP:

[Bug 1077091] Re: CVE-2012-4565

2012-11-28 Thread John Johansen
** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-11-21 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Raring)
   Status: New => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Raring)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-11-19 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-quantal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-11-16 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-11-12 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Committed

** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: New => Fix Committed

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New => Fix Committed

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Precise)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Oneiric)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Lucid)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Raring)
   Status: New => Invalid

** Changed in: linux (Ubuntu Hardy)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Quantal)
   Status: In Progress => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: New => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-11-12 Thread Luis Henriques
** Changed in: linux (Ubuntu Quantal)
   Status: New => In Progress

** Changed in: linux (Ubuntu Quantal)
 Assignee: (unassigned) => Luis Henriques (henrix)

** Changed in: linux (Ubuntu Precise)
   Status: New => In Progress

** Changed in: linux (Ubuntu Precise)
 Assignee: (unassigned) => Luis Henriques (henrix)

** Changed in: linux (Ubuntu Oneiric)
   Status: New => In Progress

** Changed in: linux (Ubuntu Oneiric)
 Assignee: (unassigned) => Luis Henriques (henrix)

** Changed in: linux (Ubuntu Lucid)
   Status: New => In Progress

** Changed in: linux (Ubuntu Lucid)
 Assignee: (unassigned) => Luis Henriques (henrix)

** Changed in: linux (Ubuntu Hardy)
   Status: New => In Progress

** Changed in: linux (Ubuntu Hardy)
 Assignee: (unassigned) => Luis Henriques (henrix)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1077091

Title:
  CVE-2012-4565

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1077091/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1077091] Re: CVE-2012-4565

2012-11-09 Thread Marc Deslauriers
CVE-2012-4565

** Also affects: linux (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Changed in: linux-armadaxp (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Raring)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Quantal)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Raring)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Quantal)