[Bug 1172366] Re: CVE-2013-3223
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Yakkety) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Yakkety) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Also affects: linux (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Yakkety) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Yakkety) Importance: Undecided Status: New ** Also affects: linux-mako (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-manta (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-goldfish (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-flo (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-lts-trusty (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Low Status: Fix Committed ** Also affects: linux-lts-xenial (Ubuntu Yakkety) Importance: Low Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Also affects: linux (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-mako (Ubuntu Xenial) Importance: Low Status: New ** Also affects: linux-manta (Ubuntu Xenial) Importance: Low Status: New ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: Low Status: New ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Low Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Also affects: linux (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mako (Ubuntu Wily) Importance: Low Status: New ** Also affects: linux-manta (Ubuntu Wily) Importance: Low Status: New ** Also affects: linux-goldfish (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-flo (Ubuntu Wily) Importance: Low Status: New ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Wily) Importance: Low Status: Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-vivid (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Vivid) Importance: Undecided => Low ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-lts-vivid (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Utopic) Importance: Undecided => Low ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quantal (Ubuntu Lucid) ** No longer affects: linux-mvl-dove (Ubuntu Lucid) ** No longer affects: linux-ti-omap4 (Ubuntu Lucid) ** No longer affects: linux (Ubuntu Lucid) ** No longer affects: linux-mako (Ubuntu Lucid) ** No longer affects: linux-fsl-imx51 (Ubuntu Lucid) ** No longer affects: linux-lts-utopic (Ubuntu Lucid) ** No longer affects: linux-flo (Ubuntu Lucid) ** No longer affects: linux-lts-raring (Ubuntu Lucid) ** No longer affects: linux-manta (Ubuntu Lucid) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-quantal (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-raring (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-quantal (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-raring (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Low Status: Fix Released ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided Status: New ** No longer affects: linux-lts-trusty (Ubuntu Quantal) ** No longer affects: linux-lts-trusty (Ubuntu Raring) ** No longer affects: linux-lts-trusty (Ubuntu Saucy) ** No longer affects: linux-armadaxp (Ubuntu Quantal) ** No longer affects: linux-armadaxp (Ubuntu Raring) ** No longer affects: linux-armadaxp (Ubuntu Saucy) ** No longer affects: linux-ec2 (Ubuntu Quantal) ** No longer affects: linux-ec2 (Ubuntu Raring) ** No longer affects: linux-ec2 (Ubuntu Saucy) ** No longer affects: linux-goldfish (Ubuntu Quantal) ** No longer affects: linux-goldfish (Ubuntu Raring) ** No longer affects: linux-goldfish (Ubuntu Saucy) ** No longer affects: linux-lts-saucy (Ubuntu Quantal) ** No longer affects: linux-lts-saucy (Ubuntu Raring) ** No longer affects: linux-lts-saucy (Ubuntu Saucy) ** No longer affects: linux-lts-quantal (Ubuntu Quantal) ** No longer affects: linux-lts-quantal (Ubuntu Raring) ** No longer affects: linux-lts-quantal (Ubuntu Saucy) ** No longer affects: linux-mvl-dove (Ubuntu Quantal) ** No longer affects: linux-mvl-dove (Ubuntu Raring) ** No longer affects: linux-mvl-dove (Ubuntu Saucy) ** No longer affects: linux-ti-omap4 (Ubuntu Quantal) ** No longer affects: linux-ti-omap4 (Ubuntu Raring) ** No longer affects: linux-ti-omap4 (Ubuntu Saucy) ** No longer affects: linux (Ubuntu Quantal) ** No longer affects: linux (Ubuntu Raring) ** No longer affects: linux (Ubuntu Saucy) ** No longer affects: linux-mako (Ubuntu Quantal) ** No longer affects: linux-mako (Ubuntu Raring) ** No longer affects: linux-mako (Ubuntu Saucy) **
[Bug 1172366] Re: CVE-2013-3223
This bug was fixed in the package linux-ti-omap4 - 3.5.0-226.39 --- linux-ti-omap4 (3.5.0-226.39) quantal; urgency=low [ Brad Figg ] * UBUNTU: Fixup missing abi files causing FTBS linux-ti-omap4 (3.5.0-226.38) quantal; urgency=low * Release Tracking Bug - LP: #1188492 [ Paolo Pisati ] * rebased on Ubuntu-3.5.0-34.55 [ Ubuntu: 3.5.0-34.55 ] * Release Tracking Bug - LP: #1187926 * iwlwifi: dvm: fix zero LQ CMD sending avoidance - LP: #1186932 linux-ti-omap4 (3.5.0-226.37) quantal-proposed; urgency=low * Release Tracking Bug - LP: #1186475 [ Paolo Pisati ] * rebased on Ubuntu-3.5.0-33.54 [ Ubuntu: 3.5.0-33.54 ] * Release Tracking Bug - LP: #1186271 * crypto: algif - suppress sending source address information in recvmsg - LP: #1172363 - CVE-2013-3076 * ax25: fix info leak via msg_name in ax25_recvmsg() - LP: #1172366 - CVE-2013-3223 * Bluetooth: fix possible info leak in bt_sock_recvmsg() - LP: #1172368 - CVE-2013-3224 * tipc: fix info leaks via msg_name in recv_msg/recv_stream - LP: #1172403 - CVE-2013-3235 * rose: fix info leak via msg_name in rose_recvmsg() - LP: #1172394 - CVE-2013-3234 * Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg() - LP: #1172369 - CVE-2013-3225 * atm: update msg_namelen in vcc_recvmsg() - LP: #1172365 - CVE-2013-3222 * iwlwifi: add new pci id for 6x35 series - LP: #1180256 * ath9k_htc: accept 1.x firmware newer than 1.3 - LP: #1186062 * ssb: implement spurious tone avoidance - LP: #1186062 * can: mcp251x: add missing IRQF_ONESHOT to request_threaded_irq - LP: #1186062 * can: sja1000: fix handling on dt properties on little endian systems - LP: #1186062 * ath9k_hw: change AR9580 initvals to fix a stability issue - LP: #1186062 * ARM: 7696/1: Fix kexec by setting outer_cache.inv_all for Feroceon - LP: #1186062 * ARM: 7698/1: perf: fix group validation when using enable_on_exec - LP: #1186062 * hugetlbfs: add swap entry check in follow_hugetlb_page() - LP: #1186062 * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls - LP: #1186062 * hfsplus: fix potential overflow in hfsplus_file_truncate() - LP: #1186062 * sched: Convert BUG_ON()s in try_to_wake_up_local() to WARN_ON_ONCE()s - LP: #1186062 * perf/x86: Fix offcore_rsp valid mask for SNB/IVB - LP: #1186062 * vm: add vm_iomap_memory() helper function - LP: #1186062 * vm: convert HPET mmap to vm_iomap_memory() helper - LP: #1186062 * vm: convert fb_mmap to vm_iomap_memory() helper - LP: #1186062 * vm: convert snd_pcm_lib_mmap_iomem() to vm_iomap_memory() helper - LP: #1186062 * vm: convert mtdchar mmap to vm_iomap_memory() helper - LP: #1186062 * regulator: fixed regulator_bulk_enable unwinding code - LP: #1186062 * perf: Fix error return code - LP: #1186062 * xen/smp: Fix leakage of timer interrupt line for every CPU online/offline. - LP: #1186062 * xen/smp/spinlock: Fix leakage of the spinlock interrupt line for every CPU online/offline - LP: #1186062 * xen/time: Fix kasprintf splat when allocating timer%d IRQ line. - LP: #1186062 * s390/memory hotplug: prevent offline of active memory increments - LP: #1186062 * aio: fix possible invalid memory access when DEBUG is enabled - LP: #1186062 * TTY: do not update atime/mtime on read/write - LP: #1186062 * TTY: fix atime/mtime regression - LP: #1186062 * caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg() - LP: #1186062 * irda: Fix missing msg_namelen update in irda_recvmsg_dgram() - LP: #1186062 * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg() - LP: #1186062 * llc: Fix missing msg_namelen update in llc_ui_recvmsg() - LP: #1186062 * netrom: fix info leak via msg_name in nr_recvmsg() - LP: #1186062 * netrom: fix invalid use of sizeof in nr_recvmsg() - LP: #1186062 * NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg() - LP: #1186062 * cbq: incorrect processing of high limits - LP: #1186062 * net IPv6 : Fix broken IPv6 routing table after loopback down-up - LP: #1186062 * net: count hw_addr syncs so that unsync works properly. - LP: #1186062 * atl1e: limit gso segment size to prevent generation of wrong ip length fields - LP: #1186062 * bonding: fix bonding_masters race condition in bond unloading - LP: #1186062 * bonding: IFF_BONDING is not stripped on enslave failure - LP: #1186062 * af_unix: If we don't care about credentials coallesce all messages - LP: #1186062 * netfilter: don't reset nf_trace in nf_reset() - LP: #1186062 * rtnetlink: Call nlmsg_parse() with correct header length - LP: #1186062 * tcp: incoming connections might use wrong route under synflood - LP: #1186062 * tcp: Reallocate he
[Bug 1172366] Re: CVE-2013-3223
This bug was fixed in the package linux-ec2 - 2.6.32-353.66 --- linux-ec2 (2.6.32-353.66) lucid-proposed; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-48.110 * Release Tracking Bug - LP: #1186479 [ Ubuntu: 2.6.32-48.110 ] * (config) Import Xen specific config options from ec2 - LP: #1177431 * SAUCE: xen: Send spinlock IPI to all waiters - LP: #1011792, #1177431 * ax25: fix info leak via msg_name in ax25_recvmsg() - LP: #1172366 - CVE-2013-3223 * Bluetooth: fix possible info leak in bt_sock_recvmsg() - LP: #1172368 - CVE-2013-3224 * tipc: fix info leaks via msg_name in recv_msg/recv_stream - LP: #1172403 - CVE-2013-3235 * rose: fix info leak via msg_name in rose_recvmsg() - LP: #1172394 - CVE-2013-3234 * Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg() - LP: #1172369 - CVE-2013-3225 * atm: update msg_namelen in vcc_recvmsg() - LP: #1172365 - CVE-2013-3222 * KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798) - LP: #1158262 - CVE-2013-1798 * llc: Fix missing msg_namelen update in llc_ui_recvmsg() - LP: #1172385 - CVE-2013-3231 * netrom: fix info leak via msg_name in nr_recvmsg() - LP: #1172386 - CVE-2013-3232 * irda: Fix missing msg_namelen update in irda_recvmsg_dgram() - LP: #1172380 - CVE-2013-3228 * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg() - LP: #1172381 - CVE-2013-3229 -- Stefan BaderTue, 04 Jun 2013 10:12:05 +0200 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
This bug was fixed in the package linux-armadaxp - 3.5.0-1616.24 --- linux-armadaxp (3.5.0-1616.24) quantal-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1188493 * Rebase onto Ubuntu-3.5.0-34.55 [ Ubuntu: 3.5.0-34.55 ] * Release Tracking Bug - LP: #1187926 * iwlwifi: dvm: fix zero LQ CMD sending avoidance - LP: #1186932 -- Ike PanhcMon, 10 Jun 2013 13:42:34 +0800 ** Changed in: linux-armadaxp (Ubuntu Quantal) Status: Fix Committed => Fix Released ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
This bug was fixed in the package linux-ti-omap4 - 3.5.0-226.39 --- linux-ti-omap4 (3.5.0-226.39) quantal; urgency=low [ Brad Figg ] * UBUNTU: Fixup missing abi files causing FTBS linux-ti-omap4 (3.5.0-226.38) quantal; urgency=low * Release Tracking Bug - LP: #1188492 [ Paolo Pisati ] * rebased on Ubuntu-3.5.0-34.55 [ Ubuntu: 3.5.0-34.55 ] * Release Tracking Bug - LP: #1187926 * iwlwifi: dvm: fix zero LQ CMD sending avoidance - LP: #1186932 linux-ti-omap4 (3.5.0-226.37) quantal-proposed; urgency=low * Release Tracking Bug - LP: #1186475 [ Paolo Pisati ] * rebased on Ubuntu-3.5.0-33.54 [ Ubuntu: 3.5.0-33.54 ] * Release Tracking Bug - LP: #1186271 * crypto: algif - suppress sending source address information in recvmsg - LP: #1172363 - CVE-2013-3076 * ax25: fix info leak via msg_name in ax25_recvmsg() - LP: #1172366 - CVE-2013-3223 * Bluetooth: fix possible info leak in bt_sock_recvmsg() - LP: #1172368 - CVE-2013-3224 * tipc: fix info leaks via msg_name in recv_msg/recv_stream - LP: #1172403 - CVE-2013-3235 * rose: fix info leak via msg_name in rose_recvmsg() - LP: #1172394 - CVE-2013-3234 * Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg() - LP: #1172369 - CVE-2013-3225 * atm: update msg_namelen in vcc_recvmsg() - LP: #1172365 - CVE-2013-3222 * iwlwifi: add new pci id for 6x35 series - LP: #1180256 * ath9k_htc: accept 1.x firmware newer than 1.3 - LP: #1186062 * ssb: implement spurious tone avoidance - LP: #1186062 * can: mcp251x: add missing IRQF_ONESHOT to request_threaded_irq - LP: #1186062 * can: sja1000: fix handling on dt properties on little endian systems - LP: #1186062 * ath9k_hw: change AR9580 initvals to fix a stability issue - LP: #1186062 * ARM: 7696/1: Fix kexec by setting outer_cache.inv_all for Feroceon - LP: #1186062 * ARM: 7698/1: perf: fix group validation when using enable_on_exec - LP: #1186062 * hugetlbfs: add swap entry check in follow_hugetlb_page() - LP: #1186062 * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls - LP: #1186062 * hfsplus: fix potential overflow in hfsplus_file_truncate() - LP: #1186062 * sched: Convert BUG_ON()s in try_to_wake_up_local() to WARN_ON_ONCE()s - LP: #1186062 * perf/x86: Fix offcore_rsp valid mask for SNB/IVB - LP: #1186062 * vm: add vm_iomap_memory() helper function - LP: #1186062 * vm: convert HPET mmap to vm_iomap_memory() helper - LP: #1186062 * vm: convert fb_mmap to vm_iomap_memory() helper - LP: #1186062 * vm: convert snd_pcm_lib_mmap_iomem() to vm_iomap_memory() helper - LP: #1186062 * vm: convert mtdchar mmap to vm_iomap_memory() helper - LP: #1186062 * regulator: fixed regulator_bulk_enable unwinding code - LP: #1186062 * perf: Fix error return code - LP: #1186062 * xen/smp: Fix leakage of timer interrupt line for every CPU online/offline. - LP: #1186062 * xen/smp/spinlock: Fix leakage of the spinlock interrupt line for every CPU online/offline - LP: #1186062 * xen/time: Fix kasprintf splat when allocating timer%d IRQ line. - LP: #1186062 * s390/memory hotplug: prevent offline of active memory increments - LP: #1186062 * aio: fix possible invalid memory access when DEBUG is enabled - LP: #1186062 * TTY: do not update atime/mtime on read/write - LP: #1186062 * TTY: fix atime/mtime regression - LP: #1186062 * caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg() - LP: #1186062 * irda: Fix missing msg_namelen update in irda_recvmsg_dgram() - LP: #1186062 * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg() - LP: #1186062 * llc: Fix missing msg_namelen update in llc_ui_recvmsg() - LP: #1186062 * netrom: fix info leak via msg_name in nr_recvmsg() - LP: #1186062 * netrom: fix invalid use of sizeof in nr_recvmsg() - LP: #1186062 * NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg() - LP: #1186062 * cbq: incorrect processing of high limits - LP: #1186062 * net IPv6 : Fix broken IPv6 routing table after loopback down-up - LP: #1186062 * net: count hw_addr syncs so that unsync works properly. - LP: #1186062 * atl1e: limit gso segment size to prevent generation of wrong ip length fields - LP: #1186062 * bonding: fix bonding_masters race condition in bond unloading - LP: #1186062 * bonding: IFF_BONDING is not stripped on enslave failure - LP: #1186062 * af_unix: If we don't care about credentials coallesce all messages - LP: #1186062 * netfilter: don't reset nf_trace in nf_reset() - LP: #1186062 * rtnetlink: Call nlmsg_parse() with correct header length - LP: #1186062 * tcp: incoming connections might use wrong route under synflood - LP: #1186062 * tcp: Reallocate he
[Bug 1172366] Re: CVE-2013-3223
This bug was fixed in the package linux - 3.5.0-34.55 --- linux (3.5.0-34.55) quantal; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1187926 [ Upstream Kernel Changes ] * iwlwifi: dvm: fix zero LQ CMD sending avoidance - LP: #1186932 linux (3.5.0-33.54) quantal; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1186271 [ Upstream Kernel Changes ] * crypto: algif - suppress sending source address information in recvmsg - LP: #1172363 - CVE-2013-3076 * ax25: fix info leak via msg_name in ax25_recvmsg() - LP: #1172366 - CVE-2013-3223 * Bluetooth: fix possible info leak in bt_sock_recvmsg() - LP: #1172368 - CVE-2013-3224 * tipc: fix info leaks via msg_name in recv_msg/recv_stream - LP: #1172403 - CVE-2013-3235 * rose: fix info leak via msg_name in rose_recvmsg() - LP: #1172394 - CVE-2013-3234 * Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg() - LP: #1172369 - CVE-2013-3225 * atm: update msg_namelen in vcc_recvmsg() - LP: #1172365 - CVE-2013-3222 * iwlwifi: add new pci id for 6x35 series - LP: #1180256 * ath9k_htc: accept 1.x firmware newer than 1.3 - LP: #1186062 * ssb: implement spurious tone avoidance - LP: #1186062 * can: mcp251x: add missing IRQF_ONESHOT to request_threaded_irq - LP: #1186062 * can: sja1000: fix handling on dt properties on little endian systems - LP: #1186062 * ath9k_hw: change AR9580 initvals to fix a stability issue - LP: #1186062 * ARM: 7696/1: Fix kexec by setting outer_cache.inv_all for Feroceon - LP: #1186062 * ARM: 7698/1: perf: fix group validation when using enable_on_exec - LP: #1186062 * hugetlbfs: add swap entry check in follow_hugetlb_page() - LP: #1186062 * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls - LP: #1186062 * hfsplus: fix potential overflow in hfsplus_file_truncate() - LP: #1186062 * sched: Convert BUG_ON()s in try_to_wake_up_local() to WARN_ON_ONCE()s - LP: #1186062 * perf/x86: Fix offcore_rsp valid mask for SNB/IVB - LP: #1186062 * vm: add vm_iomap_memory() helper function - LP: #1186062 * vm: convert HPET mmap to vm_iomap_memory() helper - LP: #1186062 * vm: convert fb_mmap to vm_iomap_memory() helper - LP: #1186062 * vm: convert snd_pcm_lib_mmap_iomem() to vm_iomap_memory() helper - LP: #1186062 * vm: convert mtdchar mmap to vm_iomap_memory() helper - LP: #1186062 * regulator: fixed regulator_bulk_enable unwinding code - LP: #1186062 * perf: Fix error return code - LP: #1186062 * xen/smp: Fix leakage of timer interrupt line for every CPU online/offline. - LP: #1186062 * xen/smp/spinlock: Fix leakage of the spinlock interrupt line for every CPU online/offline - LP: #1186062 * xen/time: Fix kasprintf splat when allocating timer%d IRQ line. - LP: #1186062 * s390/memory hotplug: prevent offline of active memory increments - LP: #1186062 * aio: fix possible invalid memory access when DEBUG is enabled - LP: #1186062 * TTY: do not update atime/mtime on read/write - LP: #1186062 * TTY: fix atime/mtime regression - LP: #1186062 * caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg() - LP: #1186062 * irda: Fix missing msg_namelen update in irda_recvmsg_dgram() - LP: #1186062 * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg() - LP: #1186062 * llc: Fix missing msg_namelen update in llc_ui_recvmsg() - LP: #1186062 * netrom: fix info leak via msg_name in nr_recvmsg() - LP: #1186062 * netrom: fix invalid use of sizeof in nr_recvmsg() - LP: #1186062 * NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg() - LP: #1186062 * cbq: incorrect processing of high limits - LP: #1186062 * net IPv6 : Fix broken IPv6 routing table after loopback down-up - LP: #1186062 * net: count hw_addr syncs so that unsync works properly. - LP: #1186062 * atl1e: limit gso segment size to prevent generation of wrong ip length fields - LP: #1186062 * bonding: fix bonding_masters race condition in bond unloading - LP: #1186062 * bonding: IFF_BONDING is not stripped on enslave failure - LP: #1186062 * af_unix: If we don't care about credentials coallesce all messages - LP: #1186062 * netfilter: don't reset nf_trace in nf_reset() - LP: #1186062 * rtnetlink: Call nlmsg_parse() with correct header length - LP: #1186062 * tcp: incoming connections might use wrong route under synflood - LP: #1186062 * tcp: Reallocate headroom if it would overflow csum_start - LP: #1186062 * esp4: fix error return code in esp_output() - LP: #1186062 * net: sctp: sctp_auth_key_put: use kzfree instead of kfree - LP: #1186062 * tcp: call tcp_replace_ts_recent() from tcp_ack() - LP: #1186062 * net: rate-limit warn-bad-off
[Bug 1172366] Re: CVE-2013-3223
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1433.44 --- linux-ti-omap4 (3.2.0-1433.44) precise; urgency=low * Release Tracking Bug - LP: #1188464 [ Brad Figg ] * UBUNTU: Fixup missing abi files causing FTBS linux-ti-omap4 (3.2.0-1433.43) precise; urgency=low * Release Tracking Bug - LP: #1188464 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-48.74 [ Ubuntu: 3.2.0-48.74 ] * Release Tracking Bug - LP: #1188206 * iwlwifi: dvm: fix zero LQ CMD sending avoidance - LP: #1186932 linux-ti-omap4 (3.2.0-1433.42) precise-proposed; urgency=low * Release Tracking Bug - LP: #1187228 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-47.72 [ Ubuntu: 3.2.0-47.72 ] * Release Tracking Bug - LP: #1187066 * Revert "drm/i915: Fix detection of base of stolen memory" - LP: #1186572 * mmc: at91/avr32/atmel-mci: fix DMA-channel leak on module unload - LP: #1186572 * mmc: core: Fix bit width test failing on old eMMC cards - LP: #1186572 * mfd: adp5520: Restore mode bits on resume - LP: #1186572 * mmc: atmel-mci: pio hang on block errors - LP: #1186572 * x86: Eliminate irq_mis_count counted in arch_irq_stat - LP: #1186572 * ASoC: wm8994: missing break in wm8994_aif3_hw_params() - LP: #1186572 * ath9k: fix key allocation error handling for powersave keys - LP: #1186572 * nfsd4: don't allow owner override on 4.1 CLAIM_FH opens - LP: #1186572 * net/eth/ibmveth: Fixup retrieval of MAC address - LP: #1186572 * ext4: limit group search loop for non-extent files - LP: #1186572 * xen/vcpu/pvhvm: Fix vcpu hotplugging hanging. - LP: #1186572 * autofs - remove autofs dentry mount check - LP: #1186572 * ALSA: HDA: Fix Oops caused by dereference NULL pointer - LP: #1186572 * iscsi-target: Fix processing of OOO commands - LP: #1186572 * ACPICA: Fix possible buffer overflow during a field unit read operation - LP: #1186572 * B43: Handle DMA RX descriptor underrun - LP: #1186572 * mwifiex: clear is_suspended flag when interrupt is received early - LP: #1186572 * mwifiex: fix memory leak issue when driver unload - LP: #1186572 * mwifiex: fix setting of multicast filter - LP: #1186572 * cifs: only set ops for inodes in I_NEW state - LP: #1186572 * hp_accel: Ignore the error from lis3lv02d_poweron() at resume - LP: #1186572 * KVM: VMX: fix halt emulation while emulating invalid guest sate - LP: #1186572 * dm snapshot: fix error return code in snapshot_ctr - LP: #1186572 * dm bufio: avoid a possible __vmalloc deadlock - LP: #1186572 * tick: Cleanup NOHZ per cpu data on cpu down - LP: #1186572 * ACPI / EC: Restart transaction even when the IBF flag set - LP: #1186572 * drm/radeon: check incoming cliprects pointer - LP: #1186572 * staging: vt6656: use free_netdev instead of kfree - LP: #1186572 * hwmon: fix error return code in abituguru_probe() - LP: #1186572 * Kirkwood: Enable PCIe port 1 on QNAP TS-11x/TS-21x - LP: #1186572 * avr32: fix relocation check for signed 18-bit offset - LP: #1186572 * powerpc/pseries: Fix partition migration hang in stop_topology_update - LP: #1186572 * powerpc: Bring all threads online prior to migration/hibernation - LP: #1186572 * timer: Don't reinitialize the cpu base lock during CPU_UP_PREPARE - LP: #1186572 * tg3: Skip powering down function 0 on certain serdes devices - LP: #1186572 * USB: xHCI: override bogus bulk wMaxPacketSize values - LP: #1186572 * USB: UHCI: fix for suspend of virtual HP controller - LP: #1186572 * tracing: Fix leaks of filter preds - LP: #1186572 * usermodehelper: check subprocess_info->path != NULL - LP: #1186572 * drivers/char/ipmi: memcpy, need additional 2 bytes to avoid memory overflow - LP: #1186572 * ipmi: ipmi_devintf: compat_ioctl method fails to take ipmi_mutex - LP: #1186572 * USB: reset resume quirk needed by a hub - LP: #1186572 * usb: option: Add Telewell TW-LTE 4G - LP: #1186572 * USB: Blacklisted Cinterion's PLxx WWAN Interface - LP: #1186572 * USB: option: add device IDs for Dell 5804 (Novatel E371) WWAN card - LP: #1186572 * i2c: designware: always clear interrupts before enabling them - LP: #1186572 * USB: ftdi_sio: Add support for Newport CONEX motor drivers - LP: #1186572 * btrfs: don't stop searching after encountering the wrong item - LP: #1186572 * virtio_console: fix uapi header - LP: #1186572 * ARM: plat-orion: Fix num_resources and id for ge10 and ge11 - LP: #1186572 * USB: cxacru: potential underflow in cxacru_cm_get_array() - LP: #1186572 * TTY: Fix tty miss restart after we turn off flow-control - LP: #1186572 * sunrpc: clarify comments on rpc_make_runnable - LP: #1186572 * SUNRPC: Prevent an rpc_task wakeup race - LP: #1186572 * perf: net_dropmonitor: Fix
[Bug 1172366] Re: CVE-2013-3223
This bug was fixed in the package linux - 3.2.0-48.74 --- linux (3.2.0-48.74) precise; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1188206 [ Upstream Kernel Changes ] * iwlwifi: dvm: fix zero LQ CMD sending avoidance - LP: #1186932 linux (3.2.0-47.72) precise; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1187066 [ Upstream Kernel Changes ] * Revert "drm/i915: Fix detection of base of stolen memory" - LP: #1186572 * mmc: at91/avr32/atmel-mci: fix DMA-channel leak on module unload - LP: #1186572 * mmc: core: Fix bit width test failing on old eMMC cards - LP: #1186572 * mfd: adp5520: Restore mode bits on resume - LP: #1186572 * mmc: atmel-mci: pio hang on block errors - LP: #1186572 * x86: Eliminate irq_mis_count counted in arch_irq_stat - LP: #1186572 * ASoC: wm8994: missing break in wm8994_aif3_hw_params() - LP: #1186572 * ath9k: fix key allocation error handling for powersave keys - LP: #1186572 * nfsd4: don't allow owner override on 4.1 CLAIM_FH opens - LP: #1186572 * net/eth/ibmveth: Fixup retrieval of MAC address - LP: #1186572 * ext4: limit group search loop for non-extent files - LP: #1186572 * xen/vcpu/pvhvm: Fix vcpu hotplugging hanging. - LP: #1186572 * autofs - remove autofs dentry mount check - LP: #1186572 * ALSA: HDA: Fix Oops caused by dereference NULL pointer - LP: #1186572 * iscsi-target: Fix processing of OOO commands - LP: #1186572 * ACPICA: Fix possible buffer overflow during a field unit read operation - LP: #1186572 * B43: Handle DMA RX descriptor underrun - LP: #1186572 * mwifiex: clear is_suspended flag when interrupt is received early - LP: #1186572 * mwifiex: fix memory leak issue when driver unload - LP: #1186572 * mwifiex: fix setting of multicast filter - LP: #1186572 * cifs: only set ops for inodes in I_NEW state - LP: #1186572 * hp_accel: Ignore the error from lis3lv02d_poweron() at resume - LP: #1186572 * KVM: VMX: fix halt emulation while emulating invalid guest sate - LP: #1186572 * dm snapshot: fix error return code in snapshot_ctr - LP: #1186572 * dm bufio: avoid a possible __vmalloc deadlock - LP: #1186572 * tick: Cleanup NOHZ per cpu data on cpu down - LP: #1186572 * ACPI / EC: Restart transaction even when the IBF flag set - LP: #1186572 * drm/radeon: check incoming cliprects pointer - LP: #1186572 * staging: vt6656: use free_netdev instead of kfree - LP: #1186572 * hwmon: fix error return code in abituguru_probe() - LP: #1186572 * Kirkwood: Enable PCIe port 1 on QNAP TS-11x/TS-21x - LP: #1186572 * avr32: fix relocation check for signed 18-bit offset - LP: #1186572 * powerpc/pseries: Fix partition migration hang in stop_topology_update - LP: #1186572 * powerpc: Bring all threads online prior to migration/hibernation - LP: #1186572 * timer: Don't reinitialize the cpu base lock during CPU_UP_PREPARE - LP: #1186572 * tg3: Skip powering down function 0 on certain serdes devices - LP: #1186572 * USB: xHCI: override bogus bulk wMaxPacketSize values - LP: #1186572 * USB: UHCI: fix for suspend of virtual HP controller - LP: #1186572 * tracing: Fix leaks of filter preds - LP: #1186572 * usermodehelper: check subprocess_info->path != NULL - LP: #1186572 * drivers/char/ipmi: memcpy, need additional 2 bytes to avoid memory overflow - LP: #1186572 * ipmi: ipmi_devintf: compat_ioctl method fails to take ipmi_mutex - LP: #1186572 * USB: reset resume quirk needed by a hub - LP: #1186572 * usb: option: Add Telewell TW-LTE 4G - LP: #1186572 * USB: Blacklisted Cinterion's PLxx WWAN Interface - LP: #1186572 * USB: option: add device IDs for Dell 5804 (Novatel E371) WWAN card - LP: #1186572 * i2c: designware: always clear interrupts before enabling them - LP: #1186572 * USB: ftdi_sio: Add support for Newport CONEX motor drivers - LP: #1186572 * btrfs: don't stop searching after encountering the wrong item - LP: #1186572 * virtio_console: fix uapi header - LP: #1186572 * ARM: plat-orion: Fix num_resources and id for ge10 and ge11 - LP: #1186572 * USB: cxacru: potential underflow in cxacru_cm_get_array() - LP: #1186572 * TTY: Fix tty miss restart after we turn off flow-control - LP: #1186572 * sunrpc: clarify comments on rpc_make_runnable - LP: #1186572 * SUNRPC: Prevent an rpc_task wakeup race - LP: #1186572 * perf: net_dropmonitor: Fix trace parameter order - LP: #1186572 * perf: net_dropmonitor: Fix symbol-relative addresses - LP: #1186572 * ACPI / video: Add "Asus UL30A" to ACPI video detect blacklist - LP: #1186572 * fat: fix possible overflow for fat_clusters - LP: #1186572 * wait: fix false timeouts when using wait_event_timeout() - LP: #1186572 * mm: m
[Bug 1172366] Re: CVE-2013-3223
This bug was fixed in the package linux-lts-quantal - 3.5.0-34.55~precise1 --- linux-lts-quantal (3.5.0-34.55~precise1) precise; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1188496 [ Upstream Kernel Changes ] * iwlwifi: dvm: fix zero LQ CMD sending avoidance - LP: #1186932 linux (3.5.0-33.54) quantal; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1186271 [ Upstream Kernel Changes ] * crypto: algif - suppress sending source address information in recvmsg - LP: #1172363 - CVE-2013-3076 * ax25: fix info leak via msg_name in ax25_recvmsg() - LP: #1172366 - CVE-2013-3223 * Bluetooth: fix possible info leak in bt_sock_recvmsg() - LP: #1172368 - CVE-2013-3224 * tipc: fix info leaks via msg_name in recv_msg/recv_stream - LP: #1172403 - CVE-2013-3235 * rose: fix info leak via msg_name in rose_recvmsg() - LP: #1172394 - CVE-2013-3234 * Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg() - LP: #1172369 - CVE-2013-3225 * atm: update msg_namelen in vcc_recvmsg() - LP: #1172365 - CVE-2013-3222 * iwlwifi: add new pci id for 6x35 series - LP: #1180256 * ath9k_htc: accept 1.x firmware newer than 1.3 - LP: #1186062 * ssb: implement spurious tone avoidance - LP: #1186062 * can: mcp251x: add missing IRQF_ONESHOT to request_threaded_irq - LP: #1186062 * can: sja1000: fix handling on dt properties on little endian systems - LP: #1186062 * ath9k_hw: change AR9580 initvals to fix a stability issue - LP: #1186062 * ARM: 7696/1: Fix kexec by setting outer_cache.inv_all for Feroceon - LP: #1186062 * ARM: 7698/1: perf: fix group validation when using enable_on_exec - LP: #1186062 * hugetlbfs: add swap entry check in follow_hugetlb_page() - LP: #1186062 * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls - LP: #1186062 * hfsplus: fix potential overflow in hfsplus_file_truncate() - LP: #1186062 * sched: Convert BUG_ON()s in try_to_wake_up_local() to WARN_ON_ONCE()s - LP: #1186062 * perf/x86: Fix offcore_rsp valid mask for SNB/IVB - LP: #1186062 * vm: add vm_iomap_memory() helper function - LP: #1186062 * vm: convert HPET mmap to vm_iomap_memory() helper - LP: #1186062 * vm: convert fb_mmap to vm_iomap_memory() helper - LP: #1186062 * vm: convert snd_pcm_lib_mmap_iomem() to vm_iomap_memory() helper - LP: #1186062 * vm: convert mtdchar mmap to vm_iomap_memory() helper - LP: #1186062 * regulator: fixed regulator_bulk_enable unwinding code - LP: #1186062 * perf: Fix error return code - LP: #1186062 * xen/smp: Fix leakage of timer interrupt line for every CPU online/offline. - LP: #1186062 * xen/smp/spinlock: Fix leakage of the spinlock interrupt line for every CPU online/offline - LP: #1186062 * xen/time: Fix kasprintf splat when allocating timer%d IRQ line. - LP: #1186062 * s390/memory hotplug: prevent offline of active memory increments - LP: #1186062 * aio: fix possible invalid memory access when DEBUG is enabled - LP: #1186062 * TTY: do not update atime/mtime on read/write - LP: #1186062 * TTY: fix atime/mtime regression - LP: #1186062 * caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg() - LP: #1186062 * irda: Fix missing msg_namelen update in irda_recvmsg_dgram() - LP: #1186062 * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg() - LP: #1186062 * llc: Fix missing msg_namelen update in llc_ui_recvmsg() - LP: #1186062 * netrom: fix info leak via msg_name in nr_recvmsg() - LP: #1186062 * netrom: fix invalid use of sizeof in nr_recvmsg() - LP: #1186062 * NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg() - LP: #1186062 * cbq: incorrect processing of high limits - LP: #1186062 * net IPv6 : Fix broken IPv6 routing table after loopback down-up - LP: #1186062 * net: count hw_addr syncs so that unsync works properly. - LP: #1186062 * atl1e: limit gso segment size to prevent generation of wrong ip length fields - LP: #1186062 * bonding: fix bonding_masters race condition in bond unloading - LP: #1186062 * bonding: IFF_BONDING is not stripped on enslave failure - LP: #1186062 * af_unix: If we don't care about credentials coallesce all messages - LP: #1186062 * netfilter: don't reset nf_trace in nf_reset() - LP: #1186062 * rtnetlink: Call nlmsg_parse() with correct header length - LP: #1186062 * tcp: incoming connections might use wrong route under synflood - LP: #1186062 * tcp: Reallocate headroom if it would overflow csum_start - LP: #1186062 * esp4: fix error return code in esp_output() - LP: #1186062 * net: sctp: sctp_auth_key_put: use kzfree instead of kfree - LP: #1186062 * tcp: call tcp_replace_ts_recent() from tcp_ack() - LP:
[Bug 1172366] Re: CVE-2013-3223
This bug was fixed in the package linux-armadaxp - 3.2.0-1621.32 --- linux-armadaxp (3.2.0-1621.32) precise-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1188465 * Rebase onto Ubuntu-3.2.0-48.74 [ Ubuntu: 3.2.0-48.74 ] * Release Tracking Bug - LP: #1188206 * iwlwifi: dvm: fix zero LQ CMD sending avoidance - LP: #1186932 -- Ike PanhcMon, 10 Jun 2013 12:59:55 +0800 ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
This bug was fixed in the package linux - 2.6.32-48.110 --- linux (2.6.32-48.110) lucid; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1186340 [ Stefan Bader ] * (config) Import Xen specific config options from ec2 - LP: #1177431 * SAUCE: xen: Send spinlock IPI to all waiters - LP: #1011792, #1177431 [ Upstream Kernel Changes ] * ax25: fix info leak via msg_name in ax25_recvmsg() - LP: #1172366 - CVE-2013-3223 * Bluetooth: fix possible info leak in bt_sock_recvmsg() - LP: #1172368 - CVE-2013-3224 * tipc: fix info leaks via msg_name in recv_msg/recv_stream - LP: #1172403 - CVE-2013-3235 * rose: fix info leak via msg_name in rose_recvmsg() - LP: #1172394 - CVE-2013-3234 * Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg() - LP: #1172369 - CVE-2013-3225 * atm: update msg_namelen in vcc_recvmsg() - LP: #1172365 - CVE-2013-3222 * KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798) - LP: #1158262 - CVE-2013-1798 * llc: Fix missing msg_namelen update in llc_ui_recvmsg() - LP: #1172385 - CVE-2013-3231 * netrom: fix info leak via msg_name in nr_recvmsg() - LP: #1172386 - CVE-2013-3232 * irda: Fix missing msg_namelen update in irda_recvmsg_dgram() - LP: #1172380 - CVE-2013-3228 * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg() - LP: #1172381 - CVE-2013-3229 -- Steve ConklinFri, 31 May 2013 12:03:46 -0500 ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-1798 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-3228 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-3229 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-3231 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-3232 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
This bug was fixed in the package linux-ti-omap4 - 3.5.0-226.39 --- linux-ti-omap4 (3.5.0-226.39) quantal; urgency=low [ Brad Figg ] * UBUNTU: Fixup missing abi files causing FTBS linux-ti-omap4 (3.5.0-226.38) quantal; urgency=low * Release Tracking Bug - LP: #1188492 [ Paolo Pisati ] * rebased on Ubuntu-3.5.0-34.55 [ Ubuntu: 3.5.0-34.55 ] * Release Tracking Bug - LP: #1187926 * iwlwifi: dvm: fix zero LQ CMD sending avoidance - LP: #1186932 linux-ti-omap4 (3.5.0-226.37) quantal-proposed; urgency=low * Release Tracking Bug - LP: #1186475 [ Paolo Pisati ] * rebased on Ubuntu-3.5.0-33.54 [ Ubuntu: 3.5.0-33.54 ] * Release Tracking Bug - LP: #1186271 * crypto: algif - suppress sending source address information in recvmsg - LP: #1172363 - CVE-2013-3076 * ax25: fix info leak via msg_name in ax25_recvmsg() - LP: #1172366 - CVE-2013-3223 * Bluetooth: fix possible info leak in bt_sock_recvmsg() - LP: #1172368 - CVE-2013-3224 * tipc: fix info leaks via msg_name in recv_msg/recv_stream - LP: #1172403 - CVE-2013-3235 * rose: fix info leak via msg_name in rose_recvmsg() - LP: #1172394 - CVE-2013-3234 * Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg() - LP: #1172369 - CVE-2013-3225 * atm: update msg_namelen in vcc_recvmsg() - LP: #1172365 - CVE-2013-3222 * iwlwifi: add new pci id for 6x35 series - LP: #1180256 * ath9k_htc: accept 1.x firmware newer than 1.3 - LP: #1186062 * ssb: implement spurious tone avoidance - LP: #1186062 * can: mcp251x: add missing IRQF_ONESHOT to request_threaded_irq - LP: #1186062 * can: sja1000: fix handling on dt properties on little endian systems - LP: #1186062 * ath9k_hw: change AR9580 initvals to fix a stability issue - LP: #1186062 * ARM: 7696/1: Fix kexec by setting outer_cache.inv_all for Feroceon - LP: #1186062 * ARM: 7698/1: perf: fix group validation when using enable_on_exec - LP: #1186062 * hugetlbfs: add swap entry check in follow_hugetlb_page() - LP: #1186062 * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls - LP: #1186062 * hfsplus: fix potential overflow in hfsplus_file_truncate() - LP: #1186062 * sched: Convert BUG_ON()s in try_to_wake_up_local() to WARN_ON_ONCE()s - LP: #1186062 * perf/x86: Fix offcore_rsp valid mask for SNB/IVB - LP: #1186062 * vm: add vm_iomap_memory() helper function - LP: #1186062 * vm: convert HPET mmap to vm_iomap_memory() helper - LP: #1186062 * vm: convert fb_mmap to vm_iomap_memory() helper - LP: #1186062 * vm: convert snd_pcm_lib_mmap_iomem() to vm_iomap_memory() helper - LP: #1186062 * vm: convert mtdchar mmap to vm_iomap_memory() helper - LP: #1186062 * regulator: fixed regulator_bulk_enable unwinding code - LP: #1186062 * perf: Fix error return code - LP: #1186062 * xen/smp: Fix leakage of timer interrupt line for every CPU online/offline. - LP: #1186062 * xen/smp/spinlock: Fix leakage of the spinlock interrupt line for every CPU online/offline - LP: #1186062 * xen/time: Fix kasprintf splat when allocating timer%d IRQ line. - LP: #1186062 * s390/memory hotplug: prevent offline of active memory increments - LP: #1186062 * aio: fix possible invalid memory access when DEBUG is enabled - LP: #1186062 * TTY: do not update atime/mtime on read/write - LP: #1186062 * TTY: fix atime/mtime regression - LP: #1186062 * caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg() - LP: #1186062 * irda: Fix missing msg_namelen update in irda_recvmsg_dgram() - LP: #1186062 * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg() - LP: #1186062 * llc: Fix missing msg_namelen update in llc_ui_recvmsg() - LP: #1186062 * netrom: fix info leak via msg_name in nr_recvmsg() - LP: #1186062 * netrom: fix invalid use of sizeof in nr_recvmsg() - LP: #1186062 * NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg() - LP: #1186062 * cbq: incorrect processing of high limits - LP: #1186062 * net IPv6 : Fix broken IPv6 routing table after loopback down-up - LP: #1186062 * net: count hw_addr syncs so that unsync works properly. - LP: #1186062 * atl1e: limit gso segment size to prevent generation of wrong ip length fields - LP: #1186062 * bonding: fix bonding_masters race condition in bond unloading - LP: #1186062 * bonding: IFF_BONDING is not stripped on enslave failure - LP: #1186062 * af_unix: If we don't care about credentials coallesce all messages - LP: #1186062 * netfilter: don't reset nf_trace in nf_reset() - LP: #1186062 * rtnetlink: Call nlmsg_parse() with correct header length - LP: #1186062 * tcp: incoming connections might use wrong route under synflood - LP: #1186062 * tcp: Reallocate he
[Bug 1172366] Re: CVE-2013-3223
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-quantal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux-lts-raring (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux (Ubuntu Raring) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Raring) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Saucy) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** No longer affects: linux-armadaxp (Ubuntu Hardy) ** No longer affects: linux-armadaxp (Ubuntu Oneiric) ** No longer affects: linux-ec2 (Ubuntu Hardy) ** No longer affects: linux-ec2 (Ubuntu Oneiric) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Oneiric) ** No longer affects: linux-lts-backport-natty (Ubuntu Hardy) ** No longer affects: linux-lts-backport-natty (Ubuntu Oneiric) ** No longer affects: linux-lts-quantal (Ubuntu Hardy) ** No longer affects: linux-lts-quantal (Ubuntu Oneiric) ** No longer affects: linux-mvl-dove (Ubuntu Hardy) ** No longer affects: linux-mvl-dove (Ubuntu Oneiric) ** No longer affects: linux-lts-backport-maverick (Ubuntu Hardy) ** No longer affects: linux-lts-backport-maverick (Ubuntu Oneiric) ** No longer affects: linux (Ubuntu Hardy) ** No longer affects: linux (Ubuntu Oneiric) ** No longer affects: linux-fsl-imx51 (Ubuntu Hardy) ** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric) ** No longer affects: linux-ti-omap4 (Ubuntu Hardy) ** No longer affects: linux-ti-omap4 (Ubuntu Oneiric) ** No longer affects: linux-lts-raring (Ubuntu Hardy) ** No longer affects: linux-lts-raring (Ubuntu Oneiric) ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New => Fix Committed ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux (Ubuntu Precise) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Lucid) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Saucy) Status: New => Invalid ** Changed in: linux (Ubuntu Quantal) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Raring) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Saucy) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Raring) Status: New => Fix Committed ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-raring (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-raring (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Lucid) Importance: Undecided => Low ** Changed in: linux-lts-raring (Ubuntu Saucy) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Saucy) Importance: Undecided => Low ** Changed in: linux-lts-raring (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Quantal) Importance: Undecided => Low ** Changed in: linux-lts-raring (Ubuntu Raring) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Raring) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Changed in: linux (Ubuntu Lucid) Status: New => In Progress ** Changed in: linux (Ubuntu Lucid) Assignee: (unassigned) => Luis Henriques (henrix) ** Changed in: linux (Ubuntu Precise) Status: New => In Progress ** Changed in: linux (Ubuntu Precise) Assignee: (unassigned) => Luis Henriques (henrix) ** Changed in: linux (Ubuntu Quantal) Status: New => In Progress ** Changed in: linux (Ubuntu Quantal) Assignee: (unassigned) => Luis Henriques (henrix) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
** Also affects: linux (Ubuntu Saucy) Importance: Low Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Saucy) Importance: Low Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Saucy) Importance: Low Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1172366 Title: CVE-2013-3223 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1172366] Re: CVE-2013-3223
CVE-2013-3223 ** Also affects: linux (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Hardy) Importance: Undecided Status: New ** Changed in: linux-armadaxp (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Raring) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Raring) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Raring) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Status: N