[Bug 1143815] Re: CVE-2013-1767

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2016-04-26 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Yakkety)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Yakkety)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-mako (Ubuntu Yakkety)
   Importance: Medium
   Status: New

** Also affects: linux-manta (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-flo (Ubuntu Yakkety)
   Importance: Medium
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-raspi2 (Ubuntu Yakkety)
   Importance: Medium
   Status: Fix Committed

** Also affects: linux-lts-xenial (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2015-10-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Medium
   Status: New

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Medium
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2015-08-18 Thread Mathew Hodson
** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: Fix Committed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-mako (Ubuntu Wily)
   Importance: Medium
   Status: New

** Also affects: linux-manta (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-flo (Ubuntu Wily)
   Importance: Medium
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-ec2 (Ubuntu Lucid)

** No longer affects: linux-goldfish (Ubuntu Lucid)

** No longer affects: linux-lts-saucy (Ubuntu Lucid)

** No longer affects: linux-lts-quantal (Ubuntu Lucid)

** No longer affects: linux-mvl-dove (Ubuntu Lucid)

** No longer affects: linux-ti-omap4 (Ubuntu Lucid)

** No longer affects: linux (Ubuntu Lucid)

** No longer affects: linux-mako (Ubuntu Lucid)

** No longer affects: linux-fsl-imx51 (Ubuntu Lucid)

** No longer affects: linux-lts-utopic (Ubuntu Lucid)

** No longer affects: linux-flo (Ubuntu Lucid)

** No longer affects: linux-lts-raring (Ubuntu Lucid)

** No longer affects: linux-manta (Ubuntu Lucid)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2015-03-24 Thread Mathew Hodson
trusty, utopic, vivid are not affected according to
http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-1767.html

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Invalid

** Changed in: linux (Ubuntu Utopic)
   Status: Fix Committed => Invalid

** Changed in: linux (Ubuntu Vivid)
   Status: Fix Committed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2015-01-27 Thread John Johansen
** Changed in: linux-manta (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-manta (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-manta (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-manta (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-manta (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Utopic)
   Importance: Undecided => Medium

** Changed in: linux-mako (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-mako (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-mako (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-mako (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-mako (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-mako (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-mako (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-mako (Ubuntu Utopic)
   Importance: Undecided => Medium

** Changed in: linux-goldfish (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-goldfish (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-goldfish (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-goldfish (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-goldfish (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-goldfish (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-goldfish (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-goldfish (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-goldfish (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-goldfish (Ubuntu Utopic)
   Importance: Undecided => Medium

** Changed in: linux-flo (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-flo (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-flo (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-flo (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-flo (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-flo (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-flo (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-flo (Ubuntu Utopic)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2014-12-05 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided => Medium

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2014-10-27 Thread John Johansen
** Also affects: linux (Ubuntu Vivid)
   Importance: Medium
   Status: Fix Committed

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Vivid)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2014-07-23 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Saucy)

** No longer affects: linux-ec2 (Ubuntu Saucy)

** No longer affects: linux-lts-saucy (Ubuntu Saucy)

** No longer affects: linux-lts-quantal (Ubuntu Saucy)

** No longer affects: linux-mvl-dove (Ubuntu Saucy)

** No longer affects: linux (Ubuntu Saucy)

** No longer affects: linux-fsl-imx51 (Ubuntu Saucy)

** No longer affects: linux-ti-omap4 (Ubuntu Saucy)

** No longer affects: linux-lts-raring (Ubuntu Saucy)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2014-05-20 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Quantal)

** No longer affects: linux-ec2 (Ubuntu Quantal)

** No longer affects: linux-lts-saucy (Ubuntu Quantal)

** No longer affects: linux-lts-quantal (Ubuntu Quantal)

** No longer affects: linux-mvl-dove (Ubuntu Quantal)

** No longer affects: linux (Ubuntu Quantal)

** No longer affects: linux-fsl-imx51 (Ubuntu Quantal)

** No longer affects: linux-ti-omap4 (Ubuntu Quantal)

** No longer affects: linux-lts-raring (Ubuntu Quantal)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2014-04-25 Thread John Johansen
** Also affects: linux (Ubuntu Utopic)
   Importance: Medium
   Status: Fix Committed

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Utopic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2014-02-13 Thread John Johansen
** Also affects: linux (Ubuntu Trusty)
   Importance: Medium
   Status: Fix Committed

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Medium
   Status: Fix Committed

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** No longer affects: linux-armadaxp (Ubuntu Hardy)

** No longer affects: linux-armadaxp (Ubuntu Oneiric)

** No longer affects: linux-armadaxp (Ubuntu Raring)

** No longer affects: linux-ec2 (Ubuntu Hardy)

** No longer affects: linux-ec2 (Ubuntu Oneiric)

** No longer affects: linux-ec2 (Ubuntu Raring)

** No longer affects: linux-lts-saucy (Ubuntu Hardy)

** No longer affects: linux-lts-saucy (Ubuntu Oneiric)

** No longer affects: linux-lts-saucy (Ubuntu Raring)

** No longer affects: linux-lts-quantal (Ubuntu Hardy)

** No longer affects: linux-lts-quantal (Ubuntu Oneiric)

** No longer affects: linux-lts-quantal (Ubuntu Raring)

** No longer affects: linux-mvl-dove (Ubuntu Hardy)

** No longer affects: linux-mvl-dove (Ubuntu Oneiric)

** No longer affects: linux-mvl-dove (Ubuntu Raring)

** No longer affects: linux (Ubuntu Hardy)

** No longer affects: linux (Ubuntu Oneiric)

** No longer affects: linux (Ubuntu Raring)

** No longer affects: linux-fsl-imx51 (Ubuntu Hardy)

** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric)

** No longer affects: linux-fsl-imx51 (Ubuntu Raring)

** No longer affects: linux-ti-omap4 (Ubuntu Hardy)

** No longer affects: linux-ti-omap4 (Ubuntu Oneiric)

** No longer affects: linux-ti-omap4 (Ubuntu Raring)

** No longer affects: linux-lts-raring (Ubuntu Hardy)

** No longer affects: linux-lts-raring (Ubuntu Oneiric)

** No longer affects: linux-lts-raring (Ubuntu Raring)

** Changed in: linux-ti-omap4 (Ubuntu Trusty)
   Status: Fix Committed => Invalid

** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-raring (Ubuntu Saucy)
   Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Saucy)
   Importance: Undecided => Medium

** Changed in: linux-lts-raring (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-lts-raring (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-lts-raring (Ubuntu Quantal)
   Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Quantal)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-08-18 Thread Julian Wiedmann
This release has reached end-of-life [0].

[0] https://wiki.ubuntu.com/Releases

** Changed in: linux (Ubuntu Hardy)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-05-22 Thread Jamie Strandboge
** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Raring)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Saucy)
   Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-05-22 Thread Jamie Strandboge
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-04-30 Thread John Johansen
** Also affects: linux (Ubuntu Saucy)
   Importance: Medium
   Status: Fix Committed

** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Saucy)
   Importance: Medium
   Status: Fix Committed

** Also affects: linux-lts-backport-maverick (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-04-09 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-04-09 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Raring)
   Status: Fix Committed => Invalid

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Quantal)
   Status: Fix Committed => Fix Released

** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-04-08 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-351.63

---
linux-ec2 (2.6.32-351.63) lucid-proposed; urgency=low

  [ Stefan Bader ]

  * Rebased to Ubuntu-2.6.32-46.107
  * Release Tracking Bug
- LP: #1159191

  [ Ubuntu: 2.6.32-46.107 ]

  * SAUCE: signal: Fix use of missing sa_restorer field
- LP: #1153813
- CVE-2013-0914
  * ipvs: fix info leak in getsockopt(IP_VS_SO_GET_TIMEOUT)
- LP: #1156732
- CVE-2012-6540
  * kernel/signal.c: use __ARCH_HAS_SA_RESTORER instead of SA_RESTORER
- LP: #1153813
- CVE-2013-0914

  [ Ubuntu: 2.6.32-46.106 ]

  * tmpfs: fix use-after-free of mempolicy object
- LP: #1143815
- CVE-2013-1767
  * keys: fix race with concurrent install_user_keyrings()
- LP: #1152788
- CVE-2013-1792
  * signal: always clear sa_restorer on execve
- LP: #1153813
- CVE-2013-0914
  * Fix ptrace when task is in task_is_stopped(), state
- LP: #1145234
  * xfrm_user: fix info leak in copy_to_user_tmpl()
- LP: #1156716
- CVE-2012-6537
  * xfrm_user: fix info leak in copy_to_user_policy()
- LP: #1156716
- CVE-2012-6537
  * xfrm_user: fix info leak in copy_to_user_state()
- LP: #1156716
- CVE-2012-6537
  * net: fix info leak in compat dev_ifconf()
- LP: #1156728
- CVE-2012-6539
 -- Stefan BaderMon, 25 Mar 2013 14:38:06 +0100

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-04-08 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1429.38

---
linux-ti-omap4 (3.2.0-1429.38) precise-proposed; urgency=low

  * Release Tracking Bug
- LP: #1160194

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.2.0-40.64

  [ Upstream Kernel Changes ]

  * Fix ABI directories

  [ Ubuntu: 3.2.0-40.64 ]

  * Release Tracking Bug
- LP: #1160017
  * SAUCE: Revert "SAUCE: xen/pv-spinlock: Never enable interrupts in
xen_spin_lock_slow()"
  * SAUCE: PCI: define macro for marvell vendor ID
- LP: #1159863
  * SAUCE: PCI: fix system hang issue of Marvell SATA host controller
- LP: #1159863

linux-ti-omap4 (3.2.0-1428.37) precise-proposed; urgency=low

  * Release Tracking Bug
- LP: #1158081

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.2.0-40.63

  [ Ubuntu: 3.2.0-40.63 ]

  * Release Tracking Bug
- LP: #1157785
  * [Config] re-disable CONFIG_SOUND_OSS_PRECLAIM
- LP: #1105230
  * [Config] CONFIG_NFS_V4_1=y
- LP: #416
  * Revert "drm: Add EDID_QUIRK_FORCE_REDUCED_BLANKING for ASUS VW222S"
- LP: #1150557
  * tmpfs: fix use-after-free of mempolicy object
- LP: #1143815
- CVE-2013-1767
  * sunvdc: Fix off-by-one in generic_request().
- LP: #1150557
  * genirq: Avoid deadlock in spurious handling
- LP: #1150557
  * KVM: s390: Handle hosts not supporting s390-virtio.
- LP: #1150557
  * workqueue: consider work function when searching for busy work items
- LP: #1150557
  * v4l: Reset subdev v4l2_dev field to NULL if registration fails
- LP: #1150557
  * omap_vout: find_vma() needs ->mmap_sem held
- LP: #1150557
  * dca: check against empty dca_domains list before unregister provider
- LP: #1150557
  * powerpc/eeh: Fix crash when adding a device in a slot with DDW
- LP: #1150557
  * ext4: return ENOMEM if sb_getblk() fails
- LP: #1150557
  * pcmcia/vrc4171: Add missing spinlock init
- LP: #1150557
  * Purge existing TLB entries in set_pte_at and ptep_set_wrprotect
- LP: #1150557
  * ARM: PXA3xx: program the CSMSADRCFG register
- LP: #1150557
  * USB: option: add and update Alcatel modems
- LP: #1150557
  * quota: autoload the quota_v2 module for QFMT_VFS_V1 quota format
- LP: #1150557
  * ext4: fix possible use-after-free with AIO
- LP: #1150557
  * s390/kvm: Fix store status for ACRS/FPRS
- LP: #1150557
  * staging: comedi: disallow COMEDI_DEVCONFIG on non-board minors
- LP: #1150557
  * ALSA: usb-audio: fix Roland A-PRO support
- LP: #1150557
  * x86-32, mm: Rip out x86_32 NUMA remapping code
- LP: #1150557
  * ALSA: hda - Release assigned pin/cvt at error path of hdmi_pcm_open()
- LP: #1150557
  * ext4: fix race in ext4_mb_add_n_trim()
- LP: #1150557
  * zram: Fix deadlock bug in partial read/write
- LP: #1150557
  * Driver core: treat unregistered bus_types as having no devices
- LP: #1150557
  * ALSA: aloop: Fix Oops while PM resume
- LP: #1150557
  * UBIFS: fix double free of ubifs_orphan objects
- LP: #1150557
  * tty: set_termios/set_termiox should not return -EINTR
- LP: #1150557
  * hrtimer: Prevent hrtimer_enqueue_reprogram race
- LP: #1150557
  * nfsd: Fix memleak
- LP: #1150557
  * staging: comedi: check s->async for poll(), read() and write()
- LP: #1150557
  * ACPI: Add DMI entry for Sony VGN-FW41E_H
- LP: #1150557
  * vgacon/vt: clear buffer attributes when we load a 512 character font
(v2)
- LP: #1150557
  * fbcon: don't lose the console font across generic->chip driver switch
- LP: #1150557
  * drm/usb: bind driver to correct device
- LP: #1150557
  * x86: Do not leak kernel page mapping locations
- LP: #1150557
  * timeconst.pl: Eliminate Perl warning
- LP: #1150557
  * fb: rework locking to fix lock ordering on takeover
- LP: #1150557
  * fb: Yet another band-aid for fixing lockdep mess
- LP: #1150557
  * p54usb: corrected USB ID for T-Com Sinus 154 data II
- LP: #1150557
  * rtlwifi: rtl8192cu: Fix NULL dereference BUG when using new_id
- LP: #1150557
  * rtlwifi: rtl8192cu: Add new USB ID
- LP: #1150557
  * USB: storage: properly handle the endian issues of idProduct
- LP: #1150557
  * x86/apic: Use x2apic physical mode based on FADT setting
- LP: #1150557
  * x86/apic: Work around boot failure on HP ProLiant DL980 G7 Server
systems
- LP: #1150557
  * ALSA: rme32.c irq enabling after spin_lock_irq
- LP: #1150557
  * ALSA: ali5451: remove irq enabling in pointer callback
- LP: #1150557
  * drivers/rtc/rtc-pl031.c: restore ST variant functionality
- LP: #1150557
  * x86: Hyper-V: register clocksource only if its advertised
- LP: #1150557
  * x86/mm: Check if PUD is large when validating a kernel address
- LP: #1150557
  * USB: option: add Yota / Megafon M100-1 4g modem
- LP: #1150557
  * USB: serial: fix null-pointer dereferences on disconnect
- LP: #1150557
  * idr: idr_for_each_entry() macro
- LP: #1150557
  * pps: Add pps_lo

[Bug 1143815] Re: CVE-2013-1767

2013-04-08 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1616.25

---
linux-armadaxp (3.2.0-1616.25) precise-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1160195
  * Rebase onto Ubuntu-3.2.0-40.64

  [ Ubuntu: 3.2.0-40.64 ]

  * Release Tracking Bug
- LP: #1160017
  * SAUCE: Revert "SAUCE: xen/pv-spinlock: Never enable interrupts in
xen_spin_lock_slow()"
  * SAUCE: PCI: define macro for marvell vendor ID
- LP: #1159863
  * SAUCE: PCI: fix system hang issue of Marvell SATA host controller
- LP: #1159863
 -- Ike PanhcTue, 26 Mar 2013 16:09:13 +0800

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-04-08 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-40.64

---
linux (3.2.0-40.64) precise-proposed; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1160017

  [ Stefan Bader ]

  * SAUCE: Revert "SAUCE: xen/pv-spinlock: Never enable interrupts in
xen_spin_lock_slow()"

  [ Xiangliang Yu ]

  * SAUCE: PCI: define macro for marvell vendor ID
- LP: #1159863
  * SAUCE: PCI: fix system hang issue of Marvell SATA host controller
- LP: #1159863

linux (3.2.0-40.63) precise-proposed; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1157785

  [ Andy Whitcroft ]

  * [Config] re-disable CONFIG_SOUND_OSS_PRECLAIM
- LP: #1105230

  [ Luis Henriques ]

  * [Config] CONFIG_NFS_V4_1=y
- LP: #416

  [ Upstream Kernel Changes ]

  * Revert "drm: Add EDID_QUIRK_FORCE_REDUCED_BLANKING for ASUS VW222S"
- LP: #1150557
  * tmpfs: fix use-after-free of mempolicy object
- LP: #1143815
- CVE-2013-1767
  * sunvdc: Fix off-by-one in generic_request().
- LP: #1150557
  * genirq: Avoid deadlock in spurious handling
- LP: #1150557
  * KVM: s390: Handle hosts not supporting s390-virtio.
- LP: #1150557
  * workqueue: consider work function when searching for busy work items
- LP: #1150557
  * v4l: Reset subdev v4l2_dev field to NULL if registration fails
- LP: #1150557
  * omap_vout: find_vma() needs ->mmap_sem held
- LP: #1150557
  * dca: check against empty dca_domains list before unregister provider
- LP: #1150557
  * powerpc/eeh: Fix crash when adding a device in a slot with DDW
- LP: #1150557
  * ext4: return ENOMEM if sb_getblk() fails
- LP: #1150557
  * pcmcia/vrc4171: Add missing spinlock init
- LP: #1150557
  * Purge existing TLB entries in set_pte_at and ptep_set_wrprotect
- LP: #1150557
  * ARM: PXA3xx: program the CSMSADRCFG register
- LP: #1150557
  * USB: option: add and update Alcatel modems
- LP: #1150557
  * quota: autoload the quota_v2 module for QFMT_VFS_V1 quota format
- LP: #1150557
  * ext4: fix possible use-after-free with AIO
- LP: #1150557
  * s390/kvm: Fix store status for ACRS/FPRS
- LP: #1150557
  * staging: comedi: disallow COMEDI_DEVCONFIG on non-board minors
- LP: #1150557
  * ALSA: usb-audio: fix Roland A-PRO support
- LP: #1150557
  * x86-32, mm: Rip out x86_32 NUMA remapping code
- LP: #1150557
  * ALSA: hda - Release assigned pin/cvt at error path of hdmi_pcm_open()
- LP: #1150557
  * ext4: fix race in ext4_mb_add_n_trim()
- LP: #1150557
  * zram: Fix deadlock bug in partial read/write
- LP: #1150557
  * Driver core: treat unregistered bus_types as having no devices
- LP: #1150557
  * ALSA: aloop: Fix Oops while PM resume
- LP: #1150557
  * UBIFS: fix double free of ubifs_orphan objects
- LP: #1150557
  * tty: set_termios/set_termiox should not return -EINTR
- LP: #1150557
  * hrtimer: Prevent hrtimer_enqueue_reprogram race
- LP: #1150557
  * nfsd: Fix memleak
- LP: #1150557
  * staging: comedi: check s->async for poll(), read() and write()
- LP: #1150557
  * ACPI: Add DMI entry for Sony VGN-FW41E_H
- LP: #1150557
  * vgacon/vt: clear buffer attributes when we load a 512 character font
(v2)
- LP: #1150557
  * fbcon: don't lose the console font across generic->chip driver switch
- LP: #1150557
  * drm/usb: bind driver to correct device
- LP: #1150557
  * x86: Do not leak kernel page mapping locations
- LP: #1150557
  * timeconst.pl: Eliminate Perl warning
- LP: #1150557
  * fb: rework locking to fix lock ordering on takeover
- LP: #1150557
  * fb: Yet another band-aid for fixing lockdep mess
- LP: #1150557
  * p54usb: corrected USB ID for T-Com Sinus 154 data II
- LP: #1150557
  * rtlwifi: rtl8192cu: Fix NULL dereference BUG when using new_id
- LP: #1150557
  * rtlwifi: rtl8192cu: Add new USB ID
- LP: #1150557
  * USB: storage: properly handle the endian issues of idProduct
- LP: #1150557
  * x86/apic: Use x2apic physical mode based on FADT setting
- LP: #1150557
  * x86/apic: Work around boot failure on HP ProLiant DL980 G7 Server
systems
- LP: #1150557
  * ALSA: rme32.c irq enabling after spin_lock_irq
- LP: #1150557
  * ALSA: ali5451: remove irq enabling in pointer callback
- LP: #1150557
  * drivers/rtc/rtc-pl031.c: restore ST variant functionality
- LP: #1150557
  * x86: Hyper-V: register clocksource only if its advertised
- LP: #1150557
  * x86/mm: Check if PUD is large when validating a kernel address
- LP: #1150557
  * USB: option: add Yota / Megafon M100-1 4g modem
- LP: #1150557
  * USB: serial: fix null-pointer dereferences on disconnect
- LP: #1150557
  * idr: idr_for_each_entry() macro
- LP: #1150557
  * pps: Add pps_lookup_dev() function
- LP: #1150557
  * pps: Use pps_lookup_dev to reduce ldisc coupling
- LP: #1150557
  * pps: Fix a use-after free bug when unregistering a source.
- LP: 

[Bug 1143815] Re: CVE-2013-1767

2013-04-08 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-46.107

---
linux (2.6.32-46.107) lucid-proposed; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1158939

  [ Ben Hutchings ]

  * SAUCE: signal: Fix use of missing sa_restorer field
- LP: #1153813
- CVE-2013-0914

  [ Upstream Kernel Changes ]

  * ipvs: fix info leak in getsockopt(IP_VS_SO_GET_TIMEOUT)
- LP: #1156732
- CVE-2012-6540
  * kernel/signal.c: use __ARCH_HAS_SA_RESTORER instead of SA_RESTORER
- LP: #1153813
- CVE-2013-0914

linux (2.6.32-46.106) lucid-proposed; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1158829

  [ Upstream Kernel Changes ]

  * tmpfs: fix use-after-free of mempolicy object
- LP: #1143815
- CVE-2013-1767
  * keys: fix race with concurrent install_user_keyrings()
- LP: #1152788
- CVE-2013-1792
  * signal: always clear sa_restorer on execve
- LP: #1153813
- CVE-2013-0914
  * Fix ptrace when task is in task_is_stopped(), state
- LP: #1145234
  * xfrm_user: fix info leak in copy_to_user_tmpl()
- LP: #1156716
- CVE-2012-6537
  * xfrm_user: fix info leak in copy_to_user_policy()
- LP: #1156716
- CVE-2012-6537
  * xfrm_user: fix info leak in copy_to_user_state()
- LP: #1156716
- CVE-2012-6537
  * net: fix info leak in compat dev_ifconf()
- LP: #1156728
- CVE-2012-6539
 -- Steve ConklinFri, 22 Mar 2013 13:57:09 -0500

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-6537

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-6539

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-6540

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0914

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1792

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2548

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-04-04 Thread John Johansen
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-04-03 Thread John Johansen
** Changed in: linux (Ubuntu Oneiric)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-03-25 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-03-07 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Committed

** Changed in: linux-armadaxp (Ubuntu Raring)
   Status: New => Fix Committed

** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: New => Fix Committed

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New => Fix Committed

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New => Fix Committed

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Precise)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Oneiric)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Lucid)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Quantal)
   Status: New => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: New => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Raring)
   Status: New => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-03-07 Thread Luis Henriques
** Changed in: linux (Ubuntu Precise)
   Status: New => In Progress

** Changed in: linux (Ubuntu Precise)
 Assignee: (unassigned) => Luis Henriques (henrix)

** Changed in: linux (Ubuntu Lucid)
   Status: New => In Progress

** Changed in: linux (Ubuntu Lucid)
 Assignee: (unassigned) => Luis Henriques (henrix)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-03-04 Thread John Johansen
** Changed in: linux (Ubuntu Raring)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143815

Title:
  CVE-2013-1767

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1143815] Re: CVE-2013-1767

2013-03-04 Thread John Johansen
CVE-2013-1767

** Also affects: linux (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Changed in: linux-armadaxp (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Raring)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Quantal)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Raring)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Quantal)