[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Yakkety) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Yakkety) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Also affects: linux (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Yakkety) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Yakkety) Importance: Undecided Status: Invalid ** Also affects: linux-mako (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-manta (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-flo (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-lts-trusty (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Medium Status: Fix Committed ** Also affects: linux-lts-xenial (Ubuntu Yakkety) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Also affects: linux (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Undecided Status: Invalid ** Also affects: linux-mako (Ubuntu Xenial) Importance: Medium Status: New ** Also affects: linux-manta (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: Medium Status: New ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Also affects: linux (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mako (Ubuntu Wily) Importance: Medium Status: New ** Also affects: linux-manta (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-flo (Ubuntu Wily) Importance: Medium Status: New ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Wily) Importance: Medium Status: Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quantal (Ubuntu Lucid) ** No longer affects: linux-mvl-dove (Ubuntu Lucid) ** No longer affects: linux-ti-omap4 (Ubuntu Lucid) ** No longer affects: linux (Ubuntu Lucid) ** No longer affects: linux-mako (Ubuntu Lucid) ** No longer affects: linux-fsl-imx51 (Ubuntu Lucid) ** No longer affects: linux-lts-utopic (Ubuntu Lucid) ** No longer affects: linux-flo (Ubuntu Lucid) ** No longer affects: linux-lts-raring (Ubuntu Lucid) ** No longer affects: linux-manta (Ubuntu Lucid) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
trusty, utopic, vivid are not affected according to http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-1767.html ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Invalid ** Changed in: linux (Ubuntu Utopic) Status: Fix Committed => Invalid ** Changed in: linux (Ubuntu Vivid) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-manta (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Utopic) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Utopic) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Also affects: linux (Ubuntu Vivid) Importance: Medium Status: Fix Committed ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Vivid) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** No longer affects: linux-armadaxp (Ubuntu Saucy) ** No longer affects: linux-ec2 (Ubuntu Saucy) ** No longer affects: linux-lts-saucy (Ubuntu Saucy) ** No longer affects: linux-lts-quantal (Ubuntu Saucy) ** No longer affects: linux-mvl-dove (Ubuntu Saucy) ** No longer affects: linux (Ubuntu Saucy) ** No longer affects: linux-fsl-imx51 (Ubuntu Saucy) ** No longer affects: linux-ti-omap4 (Ubuntu Saucy) ** No longer affects: linux-lts-raring (Ubuntu Saucy) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** No longer affects: linux-armadaxp (Ubuntu Quantal) ** No longer affects: linux-ec2 (Ubuntu Quantal) ** No longer affects: linux-lts-saucy (Ubuntu Quantal) ** No longer affects: linux-lts-quantal (Ubuntu Quantal) ** No longer affects: linux-mvl-dove (Ubuntu Quantal) ** No longer affects: linux (Ubuntu Quantal) ** No longer affects: linux-fsl-imx51 (Ubuntu Quantal) ** No longer affects: linux-ti-omap4 (Ubuntu Quantal) ** No longer affects: linux-lts-raring (Ubuntu Quantal) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Also affects: linux (Ubuntu Utopic) Importance: Medium Status: Fix Committed ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Utopic) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Also affects: linux (Ubuntu Trusty) Importance: Medium Status: Fix Committed ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Medium Status: Fix Committed ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Trusty) Importance: Medium Status: Invalid ** No longer affects: linux-armadaxp (Ubuntu Hardy) ** No longer affects: linux-armadaxp (Ubuntu Oneiric) ** No longer affects: linux-armadaxp (Ubuntu Raring) ** No longer affects: linux-ec2 (Ubuntu Hardy) ** No longer affects: linux-ec2 (Ubuntu Oneiric) ** No longer affects: linux-ec2 (Ubuntu Raring) ** No longer affects: linux-lts-saucy (Ubuntu Hardy) ** No longer affects: linux-lts-saucy (Ubuntu Oneiric) ** No longer affects: linux-lts-saucy (Ubuntu Raring) ** No longer affects: linux-lts-quantal (Ubuntu Hardy) ** No longer affects: linux-lts-quantal (Ubuntu Oneiric) ** No longer affects: linux-lts-quantal (Ubuntu Raring) ** No longer affects: linux-mvl-dove (Ubuntu Hardy) ** No longer affects: linux-mvl-dove (Ubuntu Oneiric) ** No longer affects: linux-mvl-dove (Ubuntu Raring) ** No longer affects: linux (Ubuntu Hardy) ** No longer affects: linux (Ubuntu Oneiric) ** No longer affects: linux (Ubuntu Raring) ** No longer affects: linux-fsl-imx51 (Ubuntu Hardy) ** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric) ** No longer affects: linux-fsl-imx51 (Ubuntu Raring) ** No longer affects: linux-ti-omap4 (Ubuntu Hardy) ** No longer affects: linux-ti-omap4 (Ubuntu Oneiric) ** No longer affects: linux-ti-omap4 (Ubuntu Raring) ** No longer affects: linux-lts-raring (Ubuntu Hardy) ** No longer affects: linux-lts-raring (Ubuntu Oneiric) ** No longer affects: linux-lts-raring (Ubuntu Raring) ** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Committed => Invalid ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Saucy) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Saucy) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Quantal) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
This release has reached end-of-life [0]. [0] https://wiki.ubuntu.com/Releases ** Changed in: linux (Ubuntu Hardy) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-lts-backport-natty (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Raring) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Saucy) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Hardy) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Also affects: linux (Ubuntu Saucy) Importance: Medium Status: Fix Committed ** Also affects: linux-fsl-imx51 (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Saucy) Importance: Medium Status: Fix Committed ** Also affects: linux-lts-backport-maverick (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Saucy) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-armadaxp (Ubuntu Quantal) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-armadaxp (Ubuntu Raring) Status: Fix Committed => Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Quantal) Status: Fix Committed => Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
This bug was fixed in the package linux-ec2 - 2.6.32-351.63 --- linux-ec2 (2.6.32-351.63) lucid-proposed; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-46.107 * Release Tracking Bug - LP: #1159191 [ Ubuntu: 2.6.32-46.107 ] * SAUCE: signal: Fix use of missing sa_restorer field - LP: #1153813 - CVE-2013-0914 * ipvs: fix info leak in getsockopt(IP_VS_SO_GET_TIMEOUT) - LP: #1156732 - CVE-2012-6540 * kernel/signal.c: use __ARCH_HAS_SA_RESTORER instead of SA_RESTORER - LP: #1153813 - CVE-2013-0914 [ Ubuntu: 2.6.32-46.106 ] * tmpfs: fix use-after-free of mempolicy object - LP: #1143815 - CVE-2013-1767 * keys: fix race with concurrent install_user_keyrings() - LP: #1152788 - CVE-2013-1792 * signal: always clear sa_restorer on execve - LP: #1153813 - CVE-2013-0914 * Fix ptrace when task is in task_is_stopped(), state - LP: #1145234 * xfrm_user: fix info leak in copy_to_user_tmpl() - LP: #1156716 - CVE-2012-6537 * xfrm_user: fix info leak in copy_to_user_policy() - LP: #1156716 - CVE-2012-6537 * xfrm_user: fix info leak in copy_to_user_state() - LP: #1156716 - CVE-2012-6537 * net: fix info leak in compat dev_ifconf() - LP: #1156728 - CVE-2012-6539 -- Stefan BaderMon, 25 Mar 2013 14:38:06 +0100 ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1429.38 --- linux-ti-omap4 (3.2.0-1429.38) precise-proposed; urgency=low * Release Tracking Bug - LP: #1160194 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-40.64 [ Upstream Kernel Changes ] * Fix ABI directories [ Ubuntu: 3.2.0-40.64 ] * Release Tracking Bug - LP: #1160017 * SAUCE: Revert "SAUCE: xen/pv-spinlock: Never enable interrupts in xen_spin_lock_slow()" * SAUCE: PCI: define macro for marvell vendor ID - LP: #1159863 * SAUCE: PCI: fix system hang issue of Marvell SATA host controller - LP: #1159863 linux-ti-omap4 (3.2.0-1428.37) precise-proposed; urgency=low * Release Tracking Bug - LP: #1158081 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-40.63 [ Ubuntu: 3.2.0-40.63 ] * Release Tracking Bug - LP: #1157785 * [Config] re-disable CONFIG_SOUND_OSS_PRECLAIM - LP: #1105230 * [Config] CONFIG_NFS_V4_1=y - LP: #416 * Revert "drm: Add EDID_QUIRK_FORCE_REDUCED_BLANKING for ASUS VW222S" - LP: #1150557 * tmpfs: fix use-after-free of mempolicy object - LP: #1143815 - CVE-2013-1767 * sunvdc: Fix off-by-one in generic_request(). - LP: #1150557 * genirq: Avoid deadlock in spurious handling - LP: #1150557 * KVM: s390: Handle hosts not supporting s390-virtio. - LP: #1150557 * workqueue: consider work function when searching for busy work items - LP: #1150557 * v4l: Reset subdev v4l2_dev field to NULL if registration fails - LP: #1150557 * omap_vout: find_vma() needs ->mmap_sem held - LP: #1150557 * dca: check against empty dca_domains list before unregister provider - LP: #1150557 * powerpc/eeh: Fix crash when adding a device in a slot with DDW - LP: #1150557 * ext4: return ENOMEM if sb_getblk() fails - LP: #1150557 * pcmcia/vrc4171: Add missing spinlock init - LP: #1150557 * Purge existing TLB entries in set_pte_at and ptep_set_wrprotect - LP: #1150557 * ARM: PXA3xx: program the CSMSADRCFG register - LP: #1150557 * USB: option: add and update Alcatel modems - LP: #1150557 * quota: autoload the quota_v2 module for QFMT_VFS_V1 quota format - LP: #1150557 * ext4: fix possible use-after-free with AIO - LP: #1150557 * s390/kvm: Fix store status for ACRS/FPRS - LP: #1150557 * staging: comedi: disallow COMEDI_DEVCONFIG on non-board minors - LP: #1150557 * ALSA: usb-audio: fix Roland A-PRO support - LP: #1150557 * x86-32, mm: Rip out x86_32 NUMA remapping code - LP: #1150557 * ALSA: hda - Release assigned pin/cvt at error path of hdmi_pcm_open() - LP: #1150557 * ext4: fix race in ext4_mb_add_n_trim() - LP: #1150557 * zram: Fix deadlock bug in partial read/write - LP: #1150557 * Driver core: treat unregistered bus_types as having no devices - LP: #1150557 * ALSA: aloop: Fix Oops while PM resume - LP: #1150557 * UBIFS: fix double free of ubifs_orphan objects - LP: #1150557 * tty: set_termios/set_termiox should not return -EINTR - LP: #1150557 * hrtimer: Prevent hrtimer_enqueue_reprogram race - LP: #1150557 * nfsd: Fix memleak - LP: #1150557 * staging: comedi: check s->async for poll(), read() and write() - LP: #1150557 * ACPI: Add DMI entry for Sony VGN-FW41E_H - LP: #1150557 * vgacon/vt: clear buffer attributes when we load a 512 character font (v2) - LP: #1150557 * fbcon: don't lose the console font across generic->chip driver switch - LP: #1150557 * drm/usb: bind driver to correct device - LP: #1150557 * x86: Do not leak kernel page mapping locations - LP: #1150557 * timeconst.pl: Eliminate Perl warning - LP: #1150557 * fb: rework locking to fix lock ordering on takeover - LP: #1150557 * fb: Yet another band-aid for fixing lockdep mess - LP: #1150557 * p54usb: corrected USB ID for T-Com Sinus 154 data II - LP: #1150557 * rtlwifi: rtl8192cu: Fix NULL dereference BUG when using new_id - LP: #1150557 * rtlwifi: rtl8192cu: Add new USB ID - LP: #1150557 * USB: storage: properly handle the endian issues of idProduct - LP: #1150557 * x86/apic: Use x2apic physical mode based on FADT setting - LP: #1150557 * x86/apic: Work around boot failure on HP ProLiant DL980 G7 Server systems - LP: #1150557 * ALSA: rme32.c irq enabling after spin_lock_irq - LP: #1150557 * ALSA: ali5451: remove irq enabling in pointer callback - LP: #1150557 * drivers/rtc/rtc-pl031.c: restore ST variant functionality - LP: #1150557 * x86: Hyper-V: register clocksource only if its advertised - LP: #1150557 * x86/mm: Check if PUD is large when validating a kernel address - LP: #1150557 * USB: option: add Yota / Megafon M100-1 4g modem - LP: #1150557 * USB: serial: fix null-pointer dereferences on disconnect - LP: #1150557 * idr: idr_for_each_entry() macro - LP: #1150557 * pps: Add pps_lo
[Bug 1143815] Re: CVE-2013-1767
This bug was fixed in the package linux-armadaxp - 3.2.0-1616.25 --- linux-armadaxp (3.2.0-1616.25) precise-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1160195 * Rebase onto Ubuntu-3.2.0-40.64 [ Ubuntu: 3.2.0-40.64 ] * Release Tracking Bug - LP: #1160017 * SAUCE: Revert "SAUCE: xen/pv-spinlock: Never enable interrupts in xen_spin_lock_slow()" * SAUCE: PCI: define macro for marvell vendor ID - LP: #1159863 * SAUCE: PCI: fix system hang issue of Marvell SATA host controller - LP: #1159863 -- Ike PanhcTue, 26 Mar 2013 16:09:13 +0800 ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
This bug was fixed in the package linux - 3.2.0-40.64 --- linux (3.2.0-40.64) precise-proposed; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1160017 [ Stefan Bader ] * SAUCE: Revert "SAUCE: xen/pv-spinlock: Never enable interrupts in xen_spin_lock_slow()" [ Xiangliang Yu ] * SAUCE: PCI: define macro for marvell vendor ID - LP: #1159863 * SAUCE: PCI: fix system hang issue of Marvell SATA host controller - LP: #1159863 linux (3.2.0-40.63) precise-proposed; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1157785 [ Andy Whitcroft ] * [Config] re-disable CONFIG_SOUND_OSS_PRECLAIM - LP: #1105230 [ Luis Henriques ] * [Config] CONFIG_NFS_V4_1=y - LP: #416 [ Upstream Kernel Changes ] * Revert "drm: Add EDID_QUIRK_FORCE_REDUCED_BLANKING for ASUS VW222S" - LP: #1150557 * tmpfs: fix use-after-free of mempolicy object - LP: #1143815 - CVE-2013-1767 * sunvdc: Fix off-by-one in generic_request(). - LP: #1150557 * genirq: Avoid deadlock in spurious handling - LP: #1150557 * KVM: s390: Handle hosts not supporting s390-virtio. - LP: #1150557 * workqueue: consider work function when searching for busy work items - LP: #1150557 * v4l: Reset subdev v4l2_dev field to NULL if registration fails - LP: #1150557 * omap_vout: find_vma() needs ->mmap_sem held - LP: #1150557 * dca: check against empty dca_domains list before unregister provider - LP: #1150557 * powerpc/eeh: Fix crash when adding a device in a slot with DDW - LP: #1150557 * ext4: return ENOMEM if sb_getblk() fails - LP: #1150557 * pcmcia/vrc4171: Add missing spinlock init - LP: #1150557 * Purge existing TLB entries in set_pte_at and ptep_set_wrprotect - LP: #1150557 * ARM: PXA3xx: program the CSMSADRCFG register - LP: #1150557 * USB: option: add and update Alcatel modems - LP: #1150557 * quota: autoload the quota_v2 module for QFMT_VFS_V1 quota format - LP: #1150557 * ext4: fix possible use-after-free with AIO - LP: #1150557 * s390/kvm: Fix store status for ACRS/FPRS - LP: #1150557 * staging: comedi: disallow COMEDI_DEVCONFIG on non-board minors - LP: #1150557 * ALSA: usb-audio: fix Roland A-PRO support - LP: #1150557 * x86-32, mm: Rip out x86_32 NUMA remapping code - LP: #1150557 * ALSA: hda - Release assigned pin/cvt at error path of hdmi_pcm_open() - LP: #1150557 * ext4: fix race in ext4_mb_add_n_trim() - LP: #1150557 * zram: Fix deadlock bug in partial read/write - LP: #1150557 * Driver core: treat unregistered bus_types as having no devices - LP: #1150557 * ALSA: aloop: Fix Oops while PM resume - LP: #1150557 * UBIFS: fix double free of ubifs_orphan objects - LP: #1150557 * tty: set_termios/set_termiox should not return -EINTR - LP: #1150557 * hrtimer: Prevent hrtimer_enqueue_reprogram race - LP: #1150557 * nfsd: Fix memleak - LP: #1150557 * staging: comedi: check s->async for poll(), read() and write() - LP: #1150557 * ACPI: Add DMI entry for Sony VGN-FW41E_H - LP: #1150557 * vgacon/vt: clear buffer attributes when we load a 512 character font (v2) - LP: #1150557 * fbcon: don't lose the console font across generic->chip driver switch - LP: #1150557 * drm/usb: bind driver to correct device - LP: #1150557 * x86: Do not leak kernel page mapping locations - LP: #1150557 * timeconst.pl: Eliminate Perl warning - LP: #1150557 * fb: rework locking to fix lock ordering on takeover - LP: #1150557 * fb: Yet another band-aid for fixing lockdep mess - LP: #1150557 * p54usb: corrected USB ID for T-Com Sinus 154 data II - LP: #1150557 * rtlwifi: rtl8192cu: Fix NULL dereference BUG when using new_id - LP: #1150557 * rtlwifi: rtl8192cu: Add new USB ID - LP: #1150557 * USB: storage: properly handle the endian issues of idProduct - LP: #1150557 * x86/apic: Use x2apic physical mode based on FADT setting - LP: #1150557 * x86/apic: Work around boot failure on HP ProLiant DL980 G7 Server systems - LP: #1150557 * ALSA: rme32.c irq enabling after spin_lock_irq - LP: #1150557 * ALSA: ali5451: remove irq enabling in pointer callback - LP: #1150557 * drivers/rtc/rtc-pl031.c: restore ST variant functionality - LP: #1150557 * x86: Hyper-V: register clocksource only if its advertised - LP: #1150557 * x86/mm: Check if PUD is large when validating a kernel address - LP: #1150557 * USB: option: add Yota / Megafon M100-1 4g modem - LP: #1150557 * USB: serial: fix null-pointer dereferences on disconnect - LP: #1150557 * idr: idr_for_each_entry() macro - LP: #1150557 * pps: Add pps_lookup_dev() function - LP: #1150557 * pps: Use pps_lookup_dev to reduce ldisc coupling - LP: #1150557 * pps: Fix a use-after free bug when unregistering a source. - LP:
[Bug 1143815] Re: CVE-2013-1767
This bug was fixed in the package linux - 2.6.32-46.107 --- linux (2.6.32-46.107) lucid-proposed; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1158939 [ Ben Hutchings ] * SAUCE: signal: Fix use of missing sa_restorer field - LP: #1153813 - CVE-2013-0914 [ Upstream Kernel Changes ] * ipvs: fix info leak in getsockopt(IP_VS_SO_GET_TIMEOUT) - LP: #1156732 - CVE-2012-6540 * kernel/signal.c: use __ARCH_HAS_SA_RESTORER instead of SA_RESTORER - LP: #1153813 - CVE-2013-0914 linux (2.6.32-46.106) lucid-proposed; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1158829 [ Upstream Kernel Changes ] * tmpfs: fix use-after-free of mempolicy object - LP: #1143815 - CVE-2013-1767 * keys: fix race with concurrent install_user_keyrings() - LP: #1152788 - CVE-2013-1792 * signal: always clear sa_restorer on execve - LP: #1153813 - CVE-2013-0914 * Fix ptrace when task is in task_is_stopped(), state - LP: #1145234 * xfrm_user: fix info leak in copy_to_user_tmpl() - LP: #1156716 - CVE-2012-6537 * xfrm_user: fix info leak in copy_to_user_policy() - LP: #1156716 - CVE-2012-6537 * xfrm_user: fix info leak in copy_to_user_state() - LP: #1156716 - CVE-2012-6537 * net: fix info leak in compat dev_ifconf() - LP: #1156728 - CVE-2012-6539 -- Steve ConklinFri, 22 Mar 2013 13:57:09 -0500 ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-6537 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-6539 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-6540 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0914 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-1792 ** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2548 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux (Ubuntu Oneiric) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-armadaxp (Ubuntu Raring) Status: New => Fix Committed ** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New => Fix Committed ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux (Ubuntu Precise) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Oneiric) Status: New => Fix Committed ** Changed in: linux (Ubuntu Lucid) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Quantal) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Raring) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux (Ubuntu Precise) Status: New => In Progress ** Changed in: linux (Ubuntu Precise) Assignee: (unassigned) => Luis Henriques (henrix) ** Changed in: linux (Ubuntu Lucid) Status: New => In Progress ** Changed in: linux (Ubuntu Lucid) Assignee: (unassigned) => Luis Henriques (henrix) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
** Changed in: linux (Ubuntu Raring) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143815 Title: CVE-2013-1767 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1143815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1143815] Re: CVE-2013-1767
CVE-2013-1767 ** Also affects: linux (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Hardy) Importance: Undecided Status: New ** Changed in: linux-armadaxp (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Raring) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Raring) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Quantal)