[Bug 893148] Re: CVE-2011-4132

2016-02-09 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2015-12-02 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2015-11-14 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2015-10-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2015-09-01 Thread Mathew Hodson
** Changed in: linux (Ubuntu Precise)
   Status: Fix Released => Invalid

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Released => Invalid

** Changed in: linux (Ubuntu Vivid)
   Status: Fix Released => Invalid

** Changed in: linux (Ubuntu Wily)
   Status: Fix Released => Invalid

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Released => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Released => Invalid

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: Fix Committed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2015-05-07 Thread John Johansen
** Also affects: linux (Ubuntu Wily)
   Importance: Low
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-mako (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-manta (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-flo (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New = Fix Committed

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-ec2 (Ubuntu Lucid)

** No longer affects: linux-goldfish (Ubuntu Lucid)

** No longer affects: linux-lts-saucy (Ubuntu Lucid)

** No longer affects: linux-lts-quantal (Ubuntu Lucid)

** No longer affects: linux-mvl-dove (Ubuntu Lucid)

** No longer affects: linux-ti-omap4 (Ubuntu Lucid)

** No longer affects: linux (Ubuntu Lucid)

** No longer affects: linux-mako (Ubuntu Lucid)

** No longer affects: linux-fsl-imx51 (Ubuntu Lucid)

** No longer affects: linux-lts-utopic (Ubuntu Lucid)

** No longer affects: linux-flo (Ubuntu Lucid)

** No longer affects: linux-lts-raring (Ubuntu Lucid)

** No longer affects: linux-manta (Ubuntu Lucid)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2015-01-27 Thread John Johansen
** Changed in: linux-goldfish (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-goldfish (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-goldfish (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-goldfish (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-goldfish (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-flo (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-flo (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-flo (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-flo (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-flo (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Utopic)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2014-12-05 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2014-10-27 Thread John Johansen
** Also affects: linux (Ubuntu Vivid)
   Importance: Low
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2014-07-22 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Saucy)

** No longer affects: linux-ec2 (Ubuntu Saucy)

** No longer affects: linux-lts-saucy (Ubuntu Saucy)

** No longer affects: linux-lts-quantal (Ubuntu Saucy)

** No longer affects: linux-mvl-dove (Ubuntu Saucy)

** No longer affects: linux (Ubuntu Saucy)

** No longer affects: linux-fsl-imx51 (Ubuntu Saucy)

** No longer affects: linux-ti-omap4 (Ubuntu Saucy)

** No longer affects: linux-lts-raring (Ubuntu Saucy)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2014-05-19 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Quantal)

** No longer affects: linux-ec2 (Ubuntu Quantal)

** No longer affects: linux-lts-saucy (Ubuntu Quantal)

** No longer affects: linux-lts-quantal (Ubuntu Quantal)

** No longer affects: linux-mvl-dove (Ubuntu Quantal)

** No longer affects: linux (Ubuntu Quantal)

** No longer affects: linux-fsl-imx51 (Ubuntu Quantal)

** No longer affects: linux-ti-omap4 (Ubuntu Quantal)

** No longer affects: linux-lts-raring (Ubuntu Quantal)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2014-04-25 Thread John Johansen
** Also affects: linux (Ubuntu Utopic)
   Importance: Low
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2014-01-28 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Raring)

** No longer affects: linux-ec2 (Ubuntu Raring)

** No longer affects: linux-lts-saucy (Ubuntu Raring)

** No longer affects: linux-lts-quantal (Ubuntu Raring)

** No longer affects: linux-mvl-dove (Ubuntu Raring)

** No longer affects: linux (Ubuntu Raring)

** No longer affects: linux-fsl-imx51 (Ubuntu Raring)

** No longer affects: linux-ti-omap4 (Ubuntu Raring)

** No longer affects: linux-lts-raring (Ubuntu Raring)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
   Status: Fix Released = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2013-11-13 Thread John Johansen
** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-saucy (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Saucy)
   Importance: Undecided = Low

** Changed in: linux-lts-saucy (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-saucy (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-lts-saucy (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Quantal)
   Importance: Undecided = Low

** Changed in: linux-lts-saucy (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Raring)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2013-10-24 Thread John Johansen
** Also affects: linux (Ubuntu Trusty)
   Importance: Low
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Low
   Status: Fix Released

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Trusty)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Trusty)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Trusty)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2013-05-10 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Hardy)

** No longer affects: linux-armadaxp (Ubuntu Oneiric)

** No longer affects: linux-ec2 (Ubuntu Hardy)

** No longer affects: linux-ec2 (Ubuntu Oneiric)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Oneiric)

** No longer affects: linux-lts-backport-natty (Ubuntu Hardy)

** No longer affects: linux-lts-backport-natty (Ubuntu Oneiric)

** No longer affects: linux-lts-quantal (Ubuntu Hardy)

** No longer affects: linux-lts-quantal (Ubuntu Oneiric)

** No longer affects: linux-mvl-dove (Ubuntu Hardy)

** No longer affects: linux-mvl-dove (Ubuntu Oneiric)

** No longer affects: linux-lts-backport-maverick (Ubuntu Hardy)

** No longer affects: linux-lts-backport-maverick (Ubuntu Oneiric)

** No longer affects: linux (Ubuntu Hardy)

** No longer affects: linux (Ubuntu Oneiric)

** No longer affects: linux-fsl-imx51 (Ubuntu Hardy)

** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric)

** No longer affects: linux-ti-omap4 (Ubuntu Hardy)

** No longer affects: linux-ti-omap4 (Ubuntu Oneiric)

** No longer affects: linux-lts-raring (Ubuntu Hardy)

** No longer affects: linux-lts-raring (Ubuntu Oneiric)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2013-05-09 Thread John Johansen
** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-raring (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-lts-raring (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-raring (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Saucy)
   Importance: Undecided = Low

** Changed in: linux-lts-raring (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-lts-raring (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Quantal)
   Importance: Undecided = Low

** Changed in: linux-lts-raring (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Raring)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2013-04-30 Thread John Johansen
** Also affects: linux (Ubuntu Saucy)
   Importance: Low
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Saucy)
   Importance: Low
   Status: Fix Released

** Also affects: linux-lts-backport-maverick (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2013-04-09 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Raring)
   Status: Fix Released = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2012-11-09 Thread Marc Deslauriers
** Also affects: linux (Ubuntu Raring)
   Importance: Low
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Raring)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Raring)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Raring)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Raring)
   Importance: Low
   Status: Fix Released

** Also affects: linux-lts-backport-maverick (Ubuntu Raring)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Raring)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Raring)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Raring)
   Importance: Low
   Status: Fix Released

** No longer affects: linux-armadaxp (Ubuntu Maverick)

** No longer affects: linux-armadaxp (Ubuntu Natty)

** No longer affects: linux-ec2 (Ubuntu Maverick)

** No longer affects: linux-ec2 (Ubuntu Natty)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Maverick)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Natty)

** No longer affects: linux-lts-backport-natty (Ubuntu Maverick)

** No longer affects: linux-lts-backport-natty (Ubuntu Natty)

** No longer affects: linux-lts-quantal (Ubuntu Maverick)

** No longer affects: linux-lts-quantal (Ubuntu Natty)

** No longer affects: linux-mvl-dove (Ubuntu Maverick)

** No longer affects: linux-mvl-dove (Ubuntu Natty)

** No longer affects: linux-lts-backport-maverick (Ubuntu Maverick)

** No longer affects: linux-lts-backport-maverick (Ubuntu Natty)

** No longer affects: linux (Ubuntu Maverick)

** No longer affects: linux (Ubuntu Natty)

** No longer affects: linux-fsl-imx51 (Ubuntu Maverick)

** No longer affects: linux-fsl-imx51 (Ubuntu Natty)

** No longer affects: linux-ti-omap4 (Ubuntu Maverick)

** No longer affects: linux-ti-omap4 (Ubuntu Natty)

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-quantal (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-lts-quantal (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-quantal (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Raring)
   Importance: Undecided = Low

** Changed in: linux-lts-quantal (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-lts-quantal (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Quantal)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2012-09-19 Thread Leann Ogasawara
** Changed in: linux (Ubuntu Quantal)
   Status: Fix Committed = Fix Released

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2012-09-19 Thread Ike Panhc
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2012-05-04 Thread John Johansen
** Also affects: linux (Ubuntu Quantal)
   Importance: Low
   Status: Fix Committed

** Also affects: linux-armadaxp (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Quantal)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Quantal)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Quantal)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Quantal)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Quantal)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Quantal)
   Importance: Low
   Status: Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2012-05-04 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: New = Fix Committed

** Changed in: linux-armadaxp (Ubuntu Quantal)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2012-05-03 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2012-05-01 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-armadaxp (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Oneiric)
   Importance: Undecided = Low

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-armadaxp (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Hardy)
   Importance: Undecided = Low

** Changed in: linux-armadaxp (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Natty)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2012-04-30 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Maverick)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2012-02-01 Thread John Johansen
** Description changed:

- A flaw was found in the way Linux kernel's Journaling Block Device (JBD)
- handled invalid log first block value. An attacker able to mount
- malicious ext3 or ext4 image could use this flaw to crash the system.
+ The cleanup_journal_tail function in the Journaling Block Device (JBD)
+ functionality in the Linux kernel 2.6 allows local users to cause a
+ denial of service (assertion error and kernel oops) via an ext3 or ext4
+ image with an invalid log first block value.
  
  Break-Fix: - 8762202dd0d6e46854f786bdb6fb3780a1625efe

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2012-01-30 Thread Paolo Pisati
** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2012-01-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-15.25~lucid1

---
linux-lts-backport-oneiric (3.0.0-15.25~lucid1) lucid-proposed; urgency=low

  [Brad Figg]

  * Release Tracking Bug
- LP: #911103

  [ Upstream Kernel Changes ]

  * Revert clockevents: Set noop handler in clockevents_exchange_device()
- LP: #904569

linux (3.0.0-15.24) oneiric-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #903188

  [ Alex Bligh ]

  * (config) Change Xen paravirt drivers to be built-in
- LP: #886521

  [ Chase Douglas ]

  * Revert SAUCE: HID: hid-ntrig: add support for 1b96:0006 model
- LP: #724831
  * Revert SAUCE: hid: ntrig: Remove unused device ids
- LP: #724831

  [ Seth Forshee ]

  * SAUCE: dell-wmi: Demote unknown WMI event message to pr_debug
- LP: #581312

  [ Upstream Kernel Changes ]

  * Revert leds: save the delay values after a successful call to
blink_set()
- LP: #893741
  * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077
- LP: #887298
- CVE-2011-4077
  * drm/i915: fix IVB cursor support
- LP: #893222
  * drm/i915: always set FDI composite sync bit
- LP: #893222
  * jbd/jbd2: validate sb-s_first in journal_get_superblock()
- LP: #893148
- CVE-2011-4132
  * ALSA: hda - Don't add elements of other codecs to vmaster slave
- LP: #893741
  * virtio-pci: fix use after free
- LP: #893741
  * ASoC: Don't use wm8994-control_data in wm8994_readable_register()
- LP: #893741
  * sh: Fix cached/uncaced address calculation in 29bit mode
- LP: #893741
  * drm/i915: Fix object refcount leak on mmappable size limit error path.
- LP: #893741
  * drm/nouveau: initialize chan-fence.lock before use
- LP: #893741
  * drm/radeon/kms: make an aux failure debug only
- LP: #893741
  * ALSA: usb-audio - Check the dB-range validity in the later read, too
- LP: #893741
  * ALSA: usb-audio - Fix the missing volume quirks at delayed init
- LP: #893741
  * KEYS: Fix a NULL pointer deref in the user-defined key type
- LP: #893741
  * hfs: add sanity check for file name length
- LP: #893741
  * drm/radeon: add some missing FireMV pci ids
- LP: #893741
  * sfi: table irq 0xFF means 'no interrupt'
- LP: #893741
  * x86, mrst: use a temporary variable for SFI irq
- LP: #893741
  * b43: refuse to load unsupported firmware
- LP: #893741
  * md/raid5: abort any pending parity operations when array fails.
- LP: #893741
  * mfd: Fix twl4030 dependencies for audio codec
- LP: #893741
  * xen:pvhvm: enable PVHVM VCPU placement when using more than 32 CPUs.
- LP: #893741
  * xen-gntalloc: integer overflow in gntalloc_ioctl_alloc()
- LP: #893741
  * xen-gntalloc: signedness bug in add_grefs()
- LP: #893741
  * powerpc/ps3: Fix lost SMP IPIs
- LP: #893741
  * powerpc: Copy down exception vectors after feature fixups
- LP: #893741
  * backing-dev: ensure wakeup_timer is deleted
- LP: #893741
  * block: Always check length of all iov entries in blk_rq_map_user_iov()
- LP: #893741
  * Linux 3.0.10
- LP: #893741
  * drm/i915: add multi-threaded forcewake support
- LP: #891270
  * (pre-stable) HID: bump maximum global item tag report size to 96 bytes
- LP: #724831
  * eCryptfs: Prevent file create race condition
- LP: #813146
  * eCryptfs: Flush file in vma close
- LP: #870326
  * drm/i915: Fix inconsistent backlight level during disabled
- LP: #872652
  * fix WARNING: at drivers/scsi/scsi_lib.c:1704
- LP: #897514
  * hpsa: Disable ASPM
- LP: #897514
  * aacraid: controller hangs if kernel uses non-default ASPM policy
- LP: #897514
  * saa7164: Add support for another HVR2200 hardware revision
- LP: #897514
  * drm/i915/pch: Save/restore PCH_PORT_HOTPLUG across suspend
- LP: #897514
  * ARM: 7150/1: Allow kernel unaligned accesses on ARMv6+ processors
- LP: #897514
  * Net, libertas: Resolve memory leak in if_spi_host_to_card()
- LP: #897514
  * rt2x00: Fix sleep-while-atomic bug in powersaving code.
- LP: #897514
  * mac80211: fix NULL dereference in radiotap code
- LP: #897514
  * mac80211: fix bug in ieee80211_build_probe_req
- LP: #897514
  * nl80211: fix HT capability attribute validation
- LP: #897514
  * cfg80211: fix bug on regulatory core exit on access to last_request
- LP: #897514
  * ip6_tunnel: copy parms.name after register_netdevice
- LP: #897514
  * PM / driver core: disable device's runtime PM during shutdown
- LP: #897514
  * pch_phub: Support new device LAPIS Semiconductor ML7831 IOH
- LP: #897514
  * pch_phub: Fix MAC address writing issue for LAPIS ML7831
- LP: #897514
  * pch_uart: Fix hw-flow control issue
- LP: #897514
  * pch_uart: Fix DMA resource leak issue
- LP: #897514
  * pch_uart: Support new device LAPIS Semiconductor ML7831 IOH
- LP: #897514
  * tty: hvc_dcc: Fix duplicate character 

[Bug 893148] Re: CVE-2011-4132

2012-01-11 Thread John Johansen
** Changed in: linux (Ubuntu Oneiric)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2012-01-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1206.15

---
linux-ti-omap4 (3.0.0-1206.15) oneiric-proposed; urgency=low

  * Release Tracking Bug
- LP: #911102

  [ Ubuntu: 3.0.0-15.25 ]

  * Release Tracking Bug
- LP: #910894
  * Revert clockevents: Set noop handler in clockevents_exchange_device()
- LP: #904569

linux-ti-omap4 (3.0.0-1206.14) oneiric-proposed; urgency=low

  * Release Tracking Bug
- LP: #903695

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.0.0-15.24
  * [Config] updateconfigs (PL310_ERRATA_769419=N)

  [ Upstream Kernel Changes ]

  * use cache type functions for arch_get_unmapped_area
  * topdown mmap support

  [ Ubuntu: 3.0.0-15.24 ]

  * Release Tracking Bug
- LP: #903188
  * (config) Change Xen paravirt drivers to be built-in
- LP: #886521
  * Revert SAUCE: HID: hid-ntrig: add support for 1b96:0006 model
- LP: #724831
  * Revert SAUCE: hid: ntrig: Remove unused device ids
- LP: #724831
  * SAUCE: dell-wmi: Demote unknown WMI event message to pr_debug
- LP: #581312
  * Revert leds: save the delay values after a successful call to
blink_set()
- LP: #893741
  * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077
- LP: #887298
- CVE-2011-4077
  * drm/i915: fix IVB cursor support
- LP: #893222
  * drm/i915: always set FDI composite sync bit
- LP: #893222
  * jbd/jbd2: validate sb-s_first in journal_get_superblock()
- LP: #893148
- CVE-2011-4132
  * ALSA: hda - Don't add elements of other codecs to vmaster slave
- LP: #893741
  * virtio-pci: fix use after free
- LP: #893741
  * ASoC: Don't use wm8994-control_data in wm8994_readable_register()
- LP: #893741
  * sh: Fix cached/uncaced address calculation in 29bit mode
- LP: #893741
  * drm/i915: Fix object refcount leak on mmappable size limit error path.
- LP: #893741
  * drm/nouveau: initialize chan-fence.lock before use
- LP: #893741
  * drm/radeon/kms: make an aux failure debug only
- LP: #893741
  * ALSA: usb-audio - Check the dB-range validity in the later read, too
- LP: #893741
  * ALSA: usb-audio - Fix the missing volume quirks at delayed init
- LP: #893741
  * KEYS: Fix a NULL pointer deref in the user-defined key type
- LP: #893741
  * hfs: add sanity check for file name length
- LP: #893741
  * drm/radeon: add some missing FireMV pci ids
- LP: #893741
  * sfi: table irq 0xFF means 'no interrupt'
- LP: #893741
  * x86, mrst: use a temporary variable for SFI irq
- LP: #893741
  * b43: refuse to load unsupported firmware
- LP: #893741
  * md/raid5: abort any pending parity operations when array fails.
- LP: #893741
  * mfd: Fix twl4030 dependencies for audio codec
- LP: #893741
  * xen:pvhvm: enable PVHVM VCPU placement when using more than 32 CPUs.
- LP: #893741
  * xen-gntalloc: integer overflow in gntalloc_ioctl_alloc()
- LP: #893741
  * xen-gntalloc: signedness bug in add_grefs()
- LP: #893741
  * powerpc/ps3: Fix lost SMP IPIs
- LP: #893741
  * powerpc: Copy down exception vectors after feature fixups
- LP: #893741
  * backing-dev: ensure wakeup_timer is deleted
- LP: #893741
  * block: Always check length of all iov entries in blk_rq_map_user_iov()
- LP: #893741
  * Linux 3.0.10
- LP: #893741
  * drm/i915: add multi-threaded forcewake support
- LP: #891270
  * (pre-stable) HID: bump maximum global item tag report size to 96 bytes
- LP: #724831
  * eCryptfs: Prevent file create race condition
- LP: #813146
  * eCryptfs: Flush file in vma close
- LP: #870326
  * drm/i915: Fix inconsistent backlight level during disabled
- LP: #872652
  * fix WARNING: at drivers/scsi/scsi_lib.c:1704
- LP: #897514
  * hpsa: Disable ASPM
- LP: #897514
  * aacraid: controller hangs if kernel uses non-default ASPM policy
- LP: #897514
  * saa7164: Add support for another HVR2200 hardware revision
- LP: #897514
  * drm/i915/pch: Save/restore PCH_PORT_HOTPLUG across suspend
- LP: #897514
  * ARM: 7150/1: Allow kernel unaligned accesses on ARMv6+ processors
- LP: #897514
  * Net, libertas: Resolve memory leak in if_spi_host_to_card()
- LP: #897514
  * rt2x00: Fix sleep-while-atomic bug in powersaving code.
- LP: #897514
  * mac80211: fix NULL dereference in radiotap code
- LP: #897514
  * mac80211: fix bug in ieee80211_build_probe_req
- LP: #897514
  * nl80211: fix HT capability attribute validation
- LP: #897514
  * cfg80211: fix bug on regulatory core exit on access to last_request
- LP: #897514
  * ip6_tunnel: copy parms.name after register_netdevice
- LP: #897514
  * PM / driver core: disable device's runtime PM during shutdown
- LP: #897514
  * pch_phub: Support new device LAPIS Semiconductor ML7831 IOH
- LP: #897514
  * pch_phub: Fix MAC address writing issue for LAPIS ML7831
- LP: #897514
  * pch_uart: Fix hw-flow control issue
- LP: #897514
  * pch_uart: 

[Bug 893148] Re: CVE-2011-4132

2011-12-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.38-13.53

---
linux (2.6.38-13.53) natty-proposed; urgency=low

  [Brad Figg]

  * Release Tracking Bug
- LP: #897320

  [ Upstream Kernel Changes ]

  * cifs, freezer: add wait_event_freezekillable and have cifs use it
- LP: #24330
  * Fixup trivial checkpatch warning
- LP: #24330
  * Fix build break when freezer not configured
- LP: #24330
  * PM / Freezer: Reimplement wait_event_freezekillable using
freezer_do_not_count/freezer_count
- LP: #24330
  * crypto: ghash - Avoid null pointer dereference if no key is set
- LP: #887299
- CVE-2011-4081
  * ata_piix: make DVD Drive recognisable on systems with Intel Sandybridge
chipsets(v2)
- LP: #737388, #782389, #794642
  * drm/i915: fix CB tuning check for ILK+
- LP: #891031
  * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077
- LP: #887298
- CVE-2011-4077
  * jbd/jbd2: validate sb-s_first in journal_get_superblock()
- LP: #893148
- CVE-2011-4132
  * hfs: add sanity check for file name length, CVE-2011-4330
- LP: #894374
- CVE-2011-4330
 -- Brad Figg brad.f...@canonical.com   Mon, 28 Nov 2011 09:48:40 -0800

** Changed in: linux (Ubuntu Natty)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-12-19 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-12-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.18

---
linux-ti-omap4 (2.6.38-1209.18) natty-proposed; urgency=low

  * Release Tracking Bug
- LP: #897566

  [ Upstream Kernel Changes ]

  * crypto: ghash - Avoid null pointer dereference if no key is set
- LP: #887299
- CVE-2011-4081
  * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077
- LP: #887298
- CVE-2011-4077
  * jbd/jbd2: validate sb-s_first in journal_get_superblock()
- LP: #893148
- CVE-2011-4132
  * inetpeer: reduce stack usage, CVE-2011-4087
- LP: #887302
- CVE-2011-4087
  * hfs: add sanity check for file name length, CVE-2011-4330
- LP: #894374
- CVE-2011-4330
  * ipv6: udp: fix the wrong headroom check
- LP: #894373
- CVE-2011-4326
 -- Paolo Pisati paolo.pis...@canonical.com   Fri, 02 Dec 2011 13:15:41 +0100

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-4087

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-12-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-13.53~lucid1

---
linux-lts-backport-natty (2.6.38-13.53~lucid1) lucid-proposed; urgency=low

  [Brad Figg]

  * Release Tracking Bug
- LP: #897567

  [ Upstream Kernel Changes ]

  * cifs, freezer: add wait_event_freezekillable and have cifs use it
- LP: #24330
  * Fixup trivial checkpatch warning
- LP: #24330
  * Fix build break when freezer not configured
- LP: #24330
  * PM / Freezer: Reimplement wait_event_freezekillable using
freezer_do_not_count/freezer_count
- LP: #24330
  * crypto: ghash - Avoid null pointer dereference if no key is set
- LP: #887299
- CVE-2011-4081
  * ata_piix: make DVD Drive recognisable on systems with Intel Sandybridge
chipsets(v2)
- LP: #737388, #782389, #794642
  * drm/i915: fix CB tuning check for ILK+
- LP: #891031
  * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077
- LP: #887298
- CVE-2011-4077
  * jbd/jbd2: validate sb-s_first in journal_get_superblock()
- LP: #893148
- CVE-2011-4132
  * hfs: add sanity check for file name length, CVE-2011-4330
- LP: #894374
- CVE-2011-4330

linux (2.6.38-13.52) natty-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #887379

  [ Konrad Rzeszutek Wilk ]

  * SAUCE: x86/paravirt: Partially revert remove lazy mode in interrupts
- LP: #854050

  [ Ming Lei ]

  * SAUCE: [media] uvcvideo: Set alternate setting 0 on resume if the bus
has been reset
- LP: #816484

  [ Seth Forshee ]

  * SAUCE: acer-wmi: Add wireless quirk for Lenovo 3000 N200
- LP: #857297

  [ Upstream Kernel Changes ]

  * Make TASKSTATS require root access, CVE-2011-2494
- LP: #866021
- CVE-2011-2494
  * proc: restrict access to /proc/PID/io, CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * proc: fix a race in do_io_accounting(), CVE-2011-2495
- LP: #866025
- CVE-2011-2495
  * staging: comedi: fix infoleak to userspace, CVE-2011-2909
- LP: #869261
- CVE-2011-2909
  * perf tools: do not look at ./config for configuration, CVE-2011-2905
- LP: #869259
- CVE-2011-2905
  * e1000e: workaround for packet drop on 82579 at 100Mbps
- LP: #870127
  * eCryptfs: Remove unnecessary grow_file() function
- LP: #745836
  * eCryptfs: Remove ECRYPTFS_NEW_FILE crypt stat flag
- LP: #745836
  * block: blkdev_get() should access -bd_disk only after success
- LP: #857170
  * ipv6: restore correct ECN handling on TCP xmit
- LP: #872179
  * nl80211: fix overflow in ssid_len - CVE-2011-2517
- LP: #869245
- CVE-2011-2517
  * ksm: fix NULL pointer dereference in scan_get_next_rmap_item() -
CVE-2011-2183
- LP: #869227
- CVE-2011-2183
  * NLM: Don't hang forever on NLM unlock requests - CVE-2011-2491
- LP: #869237
- CVE-2011-2491
  * KVM: fix kvmclock regression due to missing clock update
- LP: #795717
  * drm/i915: don't enable plane, pipe and PLL prematurely
- LP: #812638
  * drm/i915: add pipe/plane enable/disable functions
- LP: #812638
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Tue, 29 Nov 
2011 10:31:28 -0200

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2494

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2495

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2905

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2909

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-12-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.28

---
linux-ti-omap4 (2.6.35-903.28) maverick-proposed; urgency=low

  * Release Tracking Bug
- LP: #897740

  [ Upstream Kernel Changes ]

  * crypto: ghash - Avoid null pointer dereference if no key is set
- LP: #887299
- CVE-2011-4081
  * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077
- LP: #887298
- CVE-2011-4077
  * jbd/jbd2: validate sb-s_first in journal_get_superblock()
- LP: #893148
- CVE-2011-4132
  * hfs: add sanity check for file name length, CVE-2011-4330
- LP: #894374
- CVE-2011-4330
  * ipv6: udp: fix the wrong headroom check
- LP: #894373
- CVE-2011-4326
  * mm: make the vma list be doubly linked
- LP: #893190
  * mm: make the mlock() stack guard page checks stricter
- LP: #893190
  * mm: make stack guard page logic use vm_prev pointer
- LP: #893190
  * mm: Move vma_stack_continue into mm.h
- LP: #672664, #893190
  * Yama: fix default relationship to check thread group
- LP: #737676, #893190
  * Yama: use thread group leader when creating match
- LP: #729839, #893190
 -- Paolo Pisati paolo.pis...@canonical.com   Fri, 02 Dec 2011 13:04:02 +0100

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-12-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-mvl-dove - 2.6.32-421.39

---
linux-mvl-dove (2.6.32-421.39) maverick-proposed; urgency=low

  * Release Tracking Bug
- LP: #897742

  [ Paolo Pisati ]

  * Rebased to 2.6.32-37.80

  [ Ubuntu: 2.6.32-37.80 ]

  * Release Tracking Bug
- LP: #898283
  * Revert x86, hotplug: Use mwait to offline a processor, fix the legacy
case
- LP: #888042
  * Revert usb: musb: restore INDEX register in resume path
- LP: #888042
  * Revert MIPS: MTX-1: Make au1000_eth probe all PHY
- LP: #888042
  * Revert ALSA: hda: Fix quirk for Dell Inspiron 910
- LP: #875300
  * USB: ftdi_sio: add Calao reference board support
- LP: #888042
  * USB: EHCI: Do not rely on PORT_SUSPEND to stop USB resuming in
ehci_bus_resume().
- LP: #888042
  * rt2x00: do not drop usb dev reference counter on suspend
- LP: #888042
  * atm: br2684: Fix oops due to skb-dev being NULL
- LP: #888042
  * sparc: Allow handling signals when stack is corrupted.
- LP: #888042
  * sparc: fix array bounds error setting up PCIC NMI trap
- LP: #888042
  * net: Fix IPv6 GSO type checks in Intel ethernet drivers
- LP: #888042
  * ipv6: Add GSO support on forwarding path
- LP: #888042
  * GRO: fix merging a paged skb after non-paged skbs
- LP: #888042
  * xen-blkfront: fix data size for xenbus_gather in blkfront_connect
- LP: #888042
  * md/linear: avoid corrupting structure while waiting for rcu_free to
complete.
- LP: #888042
  * powerpc/pci: Check devices status property when scanning OF tree
- LP: #888042
  * xen: x86_32: do not enable iterrupts when returning from exception in
interrupt context
- LP: #888042
  * xen/smp: Warn user why they keel over - nosmp or noapic and what to use
instead.
- LP: #888042
  * ARM: davinci: da850 EVM: read mac address from SPI flash
- LP: #888042
  * md: Fix handling for devices from 2TB to 4TB in 0.90 metadata.
- LP: #888042
  * net/9p: fix client code to fail more gracefully on protocol error
- LP: #888042
  * fs/9p: Fid is not valid after a failed clunk.
- LP: #888042
  * net/9p: Fix the msize calculation.
- LP: #888042
  * irda: fix smsc-ircc2 section mismatch warning
- LP: #888042
  * qla2xxx: Correct inadvertent loop state transitions during port-update
handling.
- LP: #888042
  * e1000: Fix driver to be used on PA RISC C8000 workstations
- LP: #888042
  * ASoC: Fix reporting of partial jack updates
- LP: #888042
  * ALSA: HDA: Cirrus - fix Surround Speaker volume control name
- LP: #888042
  * b43: Fix beacon problem in ad-hoc mode
- LP: #888042
  * wireless: Reset beacon_found while updating regulatory
- LP: #888042
  * USB: PL2303: correctly handle baudrates above 115200
- LP: #888042
  * ASIX: Add AX88772B USB ID
- LP: #888042
  * hvc_console: Improve tty/console put_chars handling
- LP: #888042
  * TPM: Call tpm_transmit with correct size
- LP: #888042
  * TPM: Zero buffer after copying to userspace
- LP: #888042
  * libiscsi_tcp: fix LLD data allocation
- LP: #888042
  * cnic: Improve NETDEV_UP event handling
- LP: #888042
  * ALSA: hda/realtek - Avoid bogus HP-pin assignment
- LP: #888042
  * 3w-9xxx: fix iommu_iova leak
- LP: #888042
  * aacraid: reset should disable MSI interrupt
- LP: #888042
  * libsas: fix failure to revalidate domain for anything but the first
expander child.
- LP: #888042
  * cfg80211: Fix validation of AKM suites
- LP: #888042
  * libsas: fix panic when single phy is disabled on a wide port
- LP: #888042
  * ahci: Enable SB600 64bit DMA on Asus M3A
- LP: #888042
  * HID: usbhid: Add support for SiGma Micro chip
- LP: #888042
  * hwmon: (w83627ehf) Properly report thermal diode sensors
- LP: #888042
  * x25: Prevent skb overreads when checking call user data
- LP: #888042
  * staging: quatech_usb2: Potential lost wakeup scenario in TIOCMIWAIT
- LP: #888042
  * USB: qcserial: add device ID for HP un2430 Mobile Broadband Module
- LP: #888042
  * xhci-mem.c: Check for ring-first_seg != NULL
- LP: #888042
  * ipr: Always initiate hard reset in kdump kernel
- LP: #888042
  * libsas: set sas_address and device type of rphy
- LP: #888042
  * ALSA: HDA: Add new revision for ALC662
- LP: #877373, #888042
  * x86: Fix compilation bug in kprobes' twobyte_is_boostable
- LP: #888042
  * epoll: fix spurious lockdep warnings
- LP: #888042
  * usbmon vs. tcpdump: fix dropped packet count
- LP: #888042
  * USB: storage: Use normalized sense when emulating autosense
- LP: #888042
  * USB: pid_ns: ensure pid is not freed during kill_pid_info_as_uid
- LP: #888042
  * usb: cdc-acm: Owen SI-30 support
- LP: #888042
  * USB: add RESET_RESUME for webcams shown to be quirky
- LP: #888042
  * USB: pl2303: add id for SMART device
- LP: #888042
  * USB: ftdi_sio: add PID for Sony Ericsson Urban
   

[Bug 893148] Re: CVE-2011-4132

2011-12-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-341.42

---
linux-ec2 (2.6.32-341.42) lucid-proposed; urgency=low

  [Stefan Bader]

  * Release Tracking Bug
- LP: #900752
  * XEN: xen-blkfront: fix data size for xenbus_gather in blkfront_connect
- LP: #888042

linux-ec2 (2.6.32-341.41) lucid-proposed; urgency=low

  [ Stefan Bader ]

  * Release Tracking Bug
- LP: #899737
  * Revert SAUCE: XEN: Import 26ab8408157fbbc669e1aab1f271bb3cb1c433d0
- LP: #888042
  * Rebased to Ubuntu-Ubuntu-2.6.32-37.81

  [ Ubuntu: 2.6.32-37.81 ]

  * (pre-stable) sparc: sigutil: Include linux/errno.h
- LP: #899311

  [ Ubuntu: 2.6.32-37.80 ]

  * Revert x86, hotplug: Use mwait to offline a processor, fix the legacy
case
- LP: #888042
  * Revert usb: musb: restore INDEX register in resume path
- LP: #888042
  * Revert MIPS: MTX-1: Make au1000_eth probe all PHY
- LP: #888042
  * Revert ALSA: hda: Fix quirk for Dell Inspiron 910
- LP: #875300
  * USB: ftdi_sio: add Calao reference board support
- LP: #888042
  * USB: EHCI: Do not rely on PORT_SUSPEND to stop USB resuming in
ehci_bus_resume().
- LP: #888042
  * rt2x00: do not drop usb dev reference counter on suspend
- LP: #888042
  * atm: br2684: Fix oops due to skb-dev being NULL
- LP: #888042
  * sparc: Allow handling signals when stack is corrupted.
- LP: #888042
  * sparc: fix array bounds error setting up PCIC NMI trap
- LP: #888042
  * net: Fix IPv6 GSO type checks in Intel ethernet drivers
- LP: #888042
  * ipv6: Add GSO support on forwarding path
- LP: #888042
  * GRO: fix merging a paged skb after non-paged skbs
- LP: #888042
  * xen-blkfront: fix data size for xenbus_gather in blkfront_connect
- LP: #888042
  * md/linear: avoid corrupting structure while waiting for rcu_free to
complete.
- LP: #888042
  * powerpc/pci: Check devices status property when scanning OF tree
- LP: #888042
  * xen: x86_32: do not enable iterrupts when returning from exception in
interrupt context
- LP: #888042
  * xen/smp: Warn user why they keel over - nosmp or noapic and what to use
instead.
- LP: #888042
  * ARM: davinci: da850 EVM: read mac address from SPI flash
- LP: #888042
  * md: Fix handling for devices from 2TB to 4TB in 0.90 metadata.
- LP: #888042
  * net/9p: fix client code to fail more gracefully on protocol error
- LP: #888042
  * fs/9p: Fid is not valid after a failed clunk.
- LP: #888042
  * net/9p: Fix the msize calculation.
- LP: #888042
  * irda: fix smsc-ircc2 section mismatch warning
- LP: #888042
  * qla2xxx: Correct inadvertent loop state transitions during port-update
handling.
- LP: #888042
  * e1000: Fix driver to be used on PA RISC C8000 workstations
- LP: #888042
  * ASoC: Fix reporting of partial jack updates
- LP: #888042
  * ALSA: HDA: Cirrus - fix Surround Speaker volume control name
- LP: #888042
  * b43: Fix beacon problem in ad-hoc mode
- LP: #888042
  * wireless: Reset beacon_found while updating regulatory
- LP: #888042
  * USB: PL2303: correctly handle baudrates above 115200
- LP: #888042
  * ASIX: Add AX88772B USB ID
- LP: #888042
  * hvc_console: Improve tty/console put_chars handling
- LP: #888042
  * TPM: Call tpm_transmit with correct size
- LP: #888042
  * TPM: Zero buffer after copying to userspace
- LP: #888042
  * libiscsi_tcp: fix LLD data allocation
- LP: #888042
  * cnic: Improve NETDEV_UP event handling
- LP: #888042
  * ALSA: hda/realtek - Avoid bogus HP-pin assignment
- LP: #888042
  * 3w-9xxx: fix iommu_iova leak
- LP: #888042
  * aacraid: reset should disable MSI interrupt
- LP: #888042
  * libsas: fix failure to revalidate domain for anything but the first
expander child.
- LP: #888042
  * cfg80211: Fix validation of AKM suites
- LP: #888042
  * libsas: fix panic when single phy is disabled on a wide port
- LP: #888042
  * ahci: Enable SB600 64bit DMA on Asus M3A
- LP: #888042
  * HID: usbhid: Add support for SiGma Micro chip
- LP: #888042
  * hwmon: (w83627ehf) Properly report thermal diode sensors
- LP: #888042
  * x25: Prevent skb overreads when checking call user data
- LP: #888042
  * staging: quatech_usb2: Potential lost wakeup scenario in TIOCMIWAIT
- LP: #888042
  * USB: qcserial: add device ID for HP un2430 Mobile Broadband Module
- LP: #888042
  * xhci-mem.c: Check for ring-first_seg != NULL
- LP: #888042
  * ipr: Always initiate hard reset in kdump kernel
- LP: #888042
  * libsas: set sas_address and device type of rphy
- LP: #888042
  * ALSA: HDA: Add new revision for ALC662
- LP: #877373, #888042
  * x86: Fix compilation bug in kprobes' twobyte_is_boostable
- LP: #888042
  * epoll: fix spurious lockdep warnings
- LP: #888042
  * usbmon vs. tcpdump: fix dropped packet count
- LP: #888042
  * USB: storage: Use normalized sense when emulating 

[Bug 893148] Re: CVE-2011-4132

2011-12-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-612.31

---
linux-fsl-imx51 (2.6.31-612.31) lucid-proposed; urgency=low

  * Release Tracking Bug
- LP: #899736

  [ Upstream Kernel Changes ]

  * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077
- LP: #887298
- CVE-2011-4077
  * jbd/jbd2: validate sb-s_first in journal_get_superblock()
- LP: #893148
- CVE-2011-4132
  * hfs: add sanity check for file name length, CVE-2011-4330
- LP: #894374
- CVE-2011-4330
 -- Paolo Pisati paolo.pis...@canonical.com   Mon, 05 Dec 2011 09:32:22 +0100

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-12-07 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.24-30.97

---
linux (2.6.24-30.97) hardy-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #897225

  [Upstream Kernel Changes]

  * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077
- LP: #887298
- CVE-2011-4077
  * jbd/jbd2: validate sb-s_first in journal_get_superblock()
- LP: #893148
- CVE-2011-4132
  * hfs: add sanity check for file name length, CVE-2011-4330
- LP: #894374
- CVE-2011-4330
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Mon, 28 Nov 
2011 11:39:07 -0200

** Changed in: linux (Ubuntu Hardy)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-4077

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-4330

** Changed in: linux (Ubuntu Maverick)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-4081

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-4326

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-12-07 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.35-31.63

---
linux (2.6.35-31.63) maverick-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #897265

  [ Upstream Kernel Changes ]

  * crypto: ghash - Avoid null pointer dereference if no key is set
- LP: #887299
- CVE-2011-4081
  * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077
- LP: #887298
- CVE-2011-4077
  * jbd/jbd2: validate sb-s_first in journal_get_superblock()
- LP: #893148
- CVE-2011-4132
  * hfs: add sanity check for file name length, CVE-2011-4330
- LP: #894374
- CVE-2011-4330
  * ipv6: udp: fix the wrong headroom check
- LP: #894373
- CVE-2011-4326
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Mon, 28 Nov 
2011 14:05:38 -0200

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1585

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2183

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2491

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2496

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-2517

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-12-07 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-maverick -
2.6.35-31.63~lucid1

---
linux-lts-backport-maverick (2.6.35-31.63~lucid1) lucid-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #897744

  [ Upstream Kernel Changes ]

  * crypto: ghash - Avoid null pointer dereference if no key is set
- LP: #887299
- CVE-2011-4081
  * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077
- LP: #887298
- CVE-2011-4077
  * jbd/jbd2: validate sb-s_first in journal_get_superblock()
- LP: #893148
- CVE-2011-4132
  * hfs: add sanity check for file name length, CVE-2011-4330
- LP: #894374
- CVE-2011-4330
  * ipv6: udp: fix the wrong headroom check
- LP: #894373
- CVE-2011-4326

linux (2.6.35-31.62) maverick-proposed; urgency=low

  [Herton R. Krzesinski]

  * Release Tracking Bug
- LP: #887378

  [ Upstream Kernel Changes ]

  * ipv6: restore correct ECN handling on TCP xmit
- LP: #872179
  * nl80211: fix overflow in ssid_len - CVE-2011-2517
- LP: #869245
- CVE-2011-2517
  * vm: fix vm_pgoff wrap in stack expansion - CVE-2011-2496
- LP: #869243
- CVE-2011-2496
  * vm: fix vm_pgoff wrap in upward expansion - CVE-2011-2496
- LP: #869243
- CVE-2011-2496
  * ksm: fix NULL pointer dereference in scan_get_next_rmap_item() -
CVE-2011-2183
- LP: #869227
- CVE-2011-2183
  * NLM: Don't hang forever on NLM unlock requests - CVE-2011-2491
- LP: #869237
- CVE-2011-2491
  * cifs: clean up cifs_find_smb_ses (try #2), CVE-2011-1585
- LP: #869208
- CVE-2011-1585
  * cifs: fix NULL pointer dereference in cifs_find_smb_ses, CVE-2011-1585
- LP: #869208
- CVE-2011-1585
  * cifs: check for NULL session password, CVE-2011-1585
- LP: #869208
- CVE-2011-1585
 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com   Tue, 29 Nov 
2011 15:42:23 -0200

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-12-05 Thread John Johansen
** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-12-04 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/natty-proposed/linux-ti-omap4

** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-12-04 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/maverick-proposed/linux-mvl-dove

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-11-30 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty

** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-maverick

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-11-24 Thread John Johansen
** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: In Progress = Fix Committed

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: In Progress = Fix Committed

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: In Progress = Fix Committed

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Status: In Progress = Fix Committed

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Status: In Progress = Fix Committed

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: In Progress = Fix Committed

** Changed in: linux (Ubuntu Oneiric)
   Status: In Progress = Fix Committed

** Changed in: linux (Ubuntu Lucid)
   Status: In Progress = Fix Committed

** Changed in: linux (Ubuntu Hardy)
   Status: In Progress = Fix Committed

** Changed in: linux (Ubuntu Maverick)
   Status: In Progress = Fix Committed

** Changed in: linux (Ubuntu Natty)
   Status: In Progress = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: In Progress = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: In Progress = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: In Progress = Fix Committed

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 893148] Re: CVE-2011-4132

2011-11-22 Thread Andy Whitcroft
** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: New = In Progress

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: New = In Progress

** Changed in: linux-ti-omap4 (Ubuntu Natty)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: New = In Progress

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Status: New = In Progress

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux (Ubuntu Oneiric)
   Status: New = In Progress

** Changed in: linux (Ubuntu Oneiric)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux (Ubuntu Natty)
   Status: New = In Progress

** Changed in: linux (Ubuntu Natty)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux (Ubuntu Maverick)
   Status: New = In Progress

** Changed in: linux (Ubuntu Maverick)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux (Ubuntu Lucid)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux (Ubuntu Hardy)
   Status: New = In Progress

** Changed in: linux (Ubuntu Hardy)
 Assignee: (unassigned) = Andy Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148

Title:
  CVE-2011-4132

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs