[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Also affects: linux (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-mako (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-manta (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Low Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux (Ubuntu Precise) Status: Fix Released => Invalid ** Changed in: linux (Ubuntu Trusty) Status: Fix Released => Invalid ** Changed in: linux (Ubuntu Vivid) Status: Fix Released => Invalid ** Changed in: linux (Ubuntu Wily) Status: Fix Released => Invalid ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Released => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Released => Invalid ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Also affects: linux (Ubuntu Wily) Importance: Low Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-mako (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-manta (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-goldfish (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-flo (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Wily) Importance: Low Status: Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-lts-vivid (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Vivid) Importance: Undecided = Low ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Importance: Undecided = Low ** Changed in: linux-lts-vivid (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Utopic) Importance: Undecided = Low ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Importance: Undecided = Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quantal (Ubuntu Lucid) ** No longer affects: linux-mvl-dove (Ubuntu Lucid) ** No longer affects: linux-ti-omap4 (Ubuntu Lucid) ** No longer affects: linux (Ubuntu Lucid) ** No longer affects: linux-mako (Ubuntu Lucid) ** No longer affects: linux-fsl-imx51 (Ubuntu Lucid) ** No longer affects: linux-lts-utopic (Ubuntu Lucid) ** No longer affects: linux-flo (Ubuntu Lucid) ** No longer affects: linux-lts-raring (Ubuntu Lucid) ** No longer affects: linux-manta (Ubuntu Lucid) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-goldfish (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-goldfish (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Trusty) Importance: Undecided = Low ** Changed in: linux-goldfish (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-goldfish (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Vivid) Importance: Undecided = Low ** Changed in: linux-goldfish (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Utopic) Importance: Undecided = Low ** Changed in: linux-flo (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-flo (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Trusty) Importance: Undecided = Low ** Changed in: linux-flo (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-flo (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Vivid) Importance: Undecided = Low ** Changed in: linux-flo (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Utopic) Importance: Undecided = Low ** Changed in: linux-mako (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-mako (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Trusty) Importance: Undecided = Low ** Changed in: linux-mako (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-mako (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Vivid) Importance: Undecided = Low ** Changed in: linux-mako (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Utopic) Importance: Undecided = Low ** Changed in: linux-manta (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-manta (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Trusty) Importance: Undecided = Low ** Changed in: linux-manta (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-manta (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Vivid) Importance: Undecided = Low ** Changed in: linux-manta (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Utopic) Importance: Undecided = Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided = Low ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided = Low ** Changed in: linux-lts-trusty (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided = Low ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Trusty) Importance: Undecided = Low ** Changed in: linux-lts-utopic (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-lts-utopic (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Vivid) Importance: Undecided = Low ** Changed in: linux-lts-utopic (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Utopic) Importance: Undecided = Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Also affects: linux (Ubuntu Vivid) Importance: Low Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Vivid) Importance: Low Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** No longer affects: linux-armadaxp (Ubuntu Saucy) ** No longer affects: linux-ec2 (Ubuntu Saucy) ** No longer affects: linux-lts-saucy (Ubuntu Saucy) ** No longer affects: linux-lts-quantal (Ubuntu Saucy) ** No longer affects: linux-mvl-dove (Ubuntu Saucy) ** No longer affects: linux (Ubuntu Saucy) ** No longer affects: linux-fsl-imx51 (Ubuntu Saucy) ** No longer affects: linux-ti-omap4 (Ubuntu Saucy) ** No longer affects: linux-lts-raring (Ubuntu Saucy) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** No longer affects: linux-armadaxp (Ubuntu Quantal) ** No longer affects: linux-ec2 (Ubuntu Quantal) ** No longer affects: linux-lts-saucy (Ubuntu Quantal) ** No longer affects: linux-lts-quantal (Ubuntu Quantal) ** No longer affects: linux-mvl-dove (Ubuntu Quantal) ** No longer affects: linux (Ubuntu Quantal) ** No longer affects: linux-fsl-imx51 (Ubuntu Quantal) ** No longer affects: linux-ti-omap4 (Ubuntu Quantal) ** No longer affects: linux-lts-raring (Ubuntu Quantal) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Also affects: linux (Ubuntu Utopic) Importance: Low Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Utopic) Importance: Low Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** No longer affects: linux-armadaxp (Ubuntu Raring) ** No longer affects: linux-ec2 (Ubuntu Raring) ** No longer affects: linux-lts-saucy (Ubuntu Raring) ** No longer affects: linux-lts-quantal (Ubuntu Raring) ** No longer affects: linux-mvl-dove (Ubuntu Raring) ** No longer affects: linux (Ubuntu Raring) ** No longer affects: linux-fsl-imx51 (Ubuntu Raring) ** No longer affects: linux-ti-omap4 (Ubuntu Raring) ** No longer affects: linux-lts-raring (Ubuntu Raring) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-lts-saucy (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Saucy) Importance: Undecided = Low ** Changed in: linux-lts-saucy (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-lts-saucy (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Trusty) Importance: Undecided = Low ** Changed in: linux-lts-saucy (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Quantal) Importance: Undecided = Low ** Changed in: linux-lts-saucy (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Raring) Importance: Undecided = Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Also affects: linux (Ubuntu Trusty) Importance: Low Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Low Status: Fix Released ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Trusty) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Trusty) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Trusty) Importance: Low Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** No longer affects: linux-armadaxp (Ubuntu Hardy) ** No longer affects: linux-armadaxp (Ubuntu Oneiric) ** No longer affects: linux-ec2 (Ubuntu Hardy) ** No longer affects: linux-ec2 (Ubuntu Oneiric) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Oneiric) ** No longer affects: linux-lts-backport-natty (Ubuntu Hardy) ** No longer affects: linux-lts-backport-natty (Ubuntu Oneiric) ** No longer affects: linux-lts-quantal (Ubuntu Hardy) ** No longer affects: linux-lts-quantal (Ubuntu Oneiric) ** No longer affects: linux-mvl-dove (Ubuntu Hardy) ** No longer affects: linux-mvl-dove (Ubuntu Oneiric) ** No longer affects: linux-lts-backport-maverick (Ubuntu Hardy) ** No longer affects: linux-lts-backport-maverick (Ubuntu Oneiric) ** No longer affects: linux (Ubuntu Hardy) ** No longer affects: linux (Ubuntu Oneiric) ** No longer affects: linux-fsl-imx51 (Ubuntu Hardy) ** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric) ** No longer affects: linux-ti-omap4 (Ubuntu Hardy) ** No longer affects: linux-ti-omap4 (Ubuntu Oneiric) ** No longer affects: linux-lts-raring (Ubuntu Hardy) ** No longer affects: linux-lts-raring (Ubuntu Oneiric) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-lts-raring (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Oneiric) Importance: Undecided = Low ** Changed in: linux-lts-raring (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-lts-raring (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Saucy) Importance: Undecided = Low ** Changed in: linux-lts-raring (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Hardy) Importance: Undecided = Low ** Changed in: linux-lts-raring (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Quantal) Importance: Undecided = Low ** Changed in: linux-lts-raring (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Raring) Importance: Undecided = Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Also affects: linux (Ubuntu Saucy) Importance: Low Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Saucy) Importance: Low Status: Fix Released ** Also affects: linux-lts-backport-maverick (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Saucy) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Saucy) Importance: Low Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-armadaxp (Ubuntu Raring) Status: Fix Released = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Also affects: linux (Ubuntu Raring) Importance: Low Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Raring) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Raring) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Raring) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Raring) Importance: Low Status: Fix Released ** Also affects: linux-lts-backport-maverick (Ubuntu Raring) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Raring) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Raring) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Raring) Importance: Low Status: Fix Released ** No longer affects: linux-armadaxp (Ubuntu Maverick) ** No longer affects: linux-armadaxp (Ubuntu Natty) ** No longer affects: linux-ec2 (Ubuntu Maverick) ** No longer affects: linux-ec2 (Ubuntu Natty) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Maverick) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Natty) ** No longer affects: linux-lts-backport-natty (Ubuntu Maverick) ** No longer affects: linux-lts-backport-natty (Ubuntu Natty) ** No longer affects: linux-lts-quantal (Ubuntu Maverick) ** No longer affects: linux-lts-quantal (Ubuntu Natty) ** No longer affects: linux-mvl-dove (Ubuntu Maverick) ** No longer affects: linux-mvl-dove (Ubuntu Natty) ** No longer affects: linux-lts-backport-maverick (Ubuntu Maverick) ** No longer affects: linux-lts-backport-maverick (Ubuntu Natty) ** No longer affects: linux (Ubuntu Maverick) ** No longer affects: linux (Ubuntu Natty) ** No longer affects: linux-fsl-imx51 (Ubuntu Maverick) ** No longer affects: linux-fsl-imx51 (Ubuntu Natty) ** No longer affects: linux-ti-omap4 (Ubuntu Maverick) ** No longer affects: linux-ti-omap4 (Ubuntu Natty) ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-lts-quantal (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Oneiric) Importance: Undecided = Low ** Changed in: linux-lts-quantal (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-lts-quantal (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Raring) Importance: Undecided = Low ** Changed in: linux-lts-quantal (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Hardy) Importance: Undecided = Low ** Changed in: linux-lts-quantal (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Quantal) Importance: Undecided = Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux (Ubuntu Quantal) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux-armadaxp (Ubuntu Quantal) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Also affects: linux (Ubuntu Quantal) Importance: Low Status: Fix Committed ** Also affects: linux-armadaxp (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Quantal) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Quantal) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Quantal) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Quantal) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Quantal) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Quantal) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Quantal) Importance: Low Status: Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Quantal) Importance: Undecided = Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-armadaxp (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-armadaxp (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Oneiric) Importance: Undecided = Low ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-armadaxp (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Hardy) Importance: Undecided = Low ** Changed in: linux-armadaxp (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Natty) Importance: Undecided = Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-armadaxp (Ubuntu Maverick) Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Description changed: - A flaw was found in the way Linux kernel's Journaling Block Device (JBD) - handled invalid log first block value. An attacker able to mount - malicious ext3 or ext4 image could use this flaw to crash the system. + The cleanup_journal_tail function in the Journaling Block Device (JBD) + functionality in the Linux kernel 2.6 allows local users to cause a + denial of service (assertion error and kernel oops) via an ext3 or ext4 + image with an invalid log first block value. Break-Fix: - 8762202dd0d6e46854f786bdb6fb3780a1625efe -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
This bug was fixed in the package linux-lts-backport-oneiric - 3.0.0-15.25~lucid1 --- linux-lts-backport-oneiric (3.0.0-15.25~lucid1) lucid-proposed; urgency=low [Brad Figg] * Release Tracking Bug - LP: #911103 [ Upstream Kernel Changes ] * Revert clockevents: Set noop handler in clockevents_exchange_device() - LP: #904569 linux (3.0.0-15.24) oneiric-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #903188 [ Alex Bligh ] * (config) Change Xen paravirt drivers to be built-in - LP: #886521 [ Chase Douglas ] * Revert SAUCE: HID: hid-ntrig: add support for 1b96:0006 model - LP: #724831 * Revert SAUCE: hid: ntrig: Remove unused device ids - LP: #724831 [ Seth Forshee ] * SAUCE: dell-wmi: Demote unknown WMI event message to pr_debug - LP: #581312 [ Upstream Kernel Changes ] * Revert leds: save the delay values after a successful call to blink_set() - LP: #893741 * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077 - LP: #887298 - CVE-2011-4077 * drm/i915: fix IVB cursor support - LP: #893222 * drm/i915: always set FDI composite sync bit - LP: #893222 * jbd/jbd2: validate sb-s_first in journal_get_superblock() - LP: #893148 - CVE-2011-4132 * ALSA: hda - Don't add elements of other codecs to vmaster slave - LP: #893741 * virtio-pci: fix use after free - LP: #893741 * ASoC: Don't use wm8994-control_data in wm8994_readable_register() - LP: #893741 * sh: Fix cached/uncaced address calculation in 29bit mode - LP: #893741 * drm/i915: Fix object refcount leak on mmappable size limit error path. - LP: #893741 * drm/nouveau: initialize chan-fence.lock before use - LP: #893741 * drm/radeon/kms: make an aux failure debug only - LP: #893741 * ALSA: usb-audio - Check the dB-range validity in the later read, too - LP: #893741 * ALSA: usb-audio - Fix the missing volume quirks at delayed init - LP: #893741 * KEYS: Fix a NULL pointer deref in the user-defined key type - LP: #893741 * hfs: add sanity check for file name length - LP: #893741 * drm/radeon: add some missing FireMV pci ids - LP: #893741 * sfi: table irq 0xFF means 'no interrupt' - LP: #893741 * x86, mrst: use a temporary variable for SFI irq - LP: #893741 * b43: refuse to load unsupported firmware - LP: #893741 * md/raid5: abort any pending parity operations when array fails. - LP: #893741 * mfd: Fix twl4030 dependencies for audio codec - LP: #893741 * xen:pvhvm: enable PVHVM VCPU placement when using more than 32 CPUs. - LP: #893741 * xen-gntalloc: integer overflow in gntalloc_ioctl_alloc() - LP: #893741 * xen-gntalloc: signedness bug in add_grefs() - LP: #893741 * powerpc/ps3: Fix lost SMP IPIs - LP: #893741 * powerpc: Copy down exception vectors after feature fixups - LP: #893741 * backing-dev: ensure wakeup_timer is deleted - LP: #893741 * block: Always check length of all iov entries in blk_rq_map_user_iov() - LP: #893741 * Linux 3.0.10 - LP: #893741 * drm/i915: add multi-threaded forcewake support - LP: #891270 * (pre-stable) HID: bump maximum global item tag report size to 96 bytes - LP: #724831 * eCryptfs: Prevent file create race condition - LP: #813146 * eCryptfs: Flush file in vma close - LP: #870326 * drm/i915: Fix inconsistent backlight level during disabled - LP: #872652 * fix WARNING: at drivers/scsi/scsi_lib.c:1704 - LP: #897514 * hpsa: Disable ASPM - LP: #897514 * aacraid: controller hangs if kernel uses non-default ASPM policy - LP: #897514 * saa7164: Add support for another HVR2200 hardware revision - LP: #897514 * drm/i915/pch: Save/restore PCH_PORT_HOTPLUG across suspend - LP: #897514 * ARM: 7150/1: Allow kernel unaligned accesses on ARMv6+ processors - LP: #897514 * Net, libertas: Resolve memory leak in if_spi_host_to_card() - LP: #897514 * rt2x00: Fix sleep-while-atomic bug in powersaving code. - LP: #897514 * mac80211: fix NULL dereference in radiotap code - LP: #897514 * mac80211: fix bug in ieee80211_build_probe_req - LP: #897514 * nl80211: fix HT capability attribute validation - LP: #897514 * cfg80211: fix bug on regulatory core exit on access to last_request - LP: #897514 * ip6_tunnel: copy parms.name after register_netdevice - LP: #897514 * PM / driver core: disable device's runtime PM during shutdown - LP: #897514 * pch_phub: Support new device LAPIS Semiconductor ML7831 IOH - LP: #897514 * pch_phub: Fix MAC address writing issue for LAPIS ML7831 - LP: #897514 * pch_uart: Fix hw-flow control issue - LP: #897514 * pch_uart: Fix DMA resource leak issue - LP: #897514 * pch_uart: Support new device LAPIS Semiconductor ML7831 IOH - LP: #897514 * tty: hvc_dcc: Fix duplicate character
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux (Ubuntu Oneiric) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1206.15 --- linux-ti-omap4 (3.0.0-1206.15) oneiric-proposed; urgency=low * Release Tracking Bug - LP: #911102 [ Ubuntu: 3.0.0-15.25 ] * Release Tracking Bug - LP: #910894 * Revert clockevents: Set noop handler in clockevents_exchange_device() - LP: #904569 linux-ti-omap4 (3.0.0-1206.14) oneiric-proposed; urgency=low * Release Tracking Bug - LP: #903695 [ Paolo Pisati ] * rebased on Ubuntu-3.0.0-15.24 * [Config] updateconfigs (PL310_ERRATA_769419=N) [ Upstream Kernel Changes ] * use cache type functions for arch_get_unmapped_area * topdown mmap support [ Ubuntu: 3.0.0-15.24 ] * Release Tracking Bug - LP: #903188 * (config) Change Xen paravirt drivers to be built-in - LP: #886521 * Revert SAUCE: HID: hid-ntrig: add support for 1b96:0006 model - LP: #724831 * Revert SAUCE: hid: ntrig: Remove unused device ids - LP: #724831 * SAUCE: dell-wmi: Demote unknown WMI event message to pr_debug - LP: #581312 * Revert leds: save the delay values after a successful call to blink_set() - LP: #893741 * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077 - LP: #887298 - CVE-2011-4077 * drm/i915: fix IVB cursor support - LP: #893222 * drm/i915: always set FDI composite sync bit - LP: #893222 * jbd/jbd2: validate sb-s_first in journal_get_superblock() - LP: #893148 - CVE-2011-4132 * ALSA: hda - Don't add elements of other codecs to vmaster slave - LP: #893741 * virtio-pci: fix use after free - LP: #893741 * ASoC: Don't use wm8994-control_data in wm8994_readable_register() - LP: #893741 * sh: Fix cached/uncaced address calculation in 29bit mode - LP: #893741 * drm/i915: Fix object refcount leak on mmappable size limit error path. - LP: #893741 * drm/nouveau: initialize chan-fence.lock before use - LP: #893741 * drm/radeon/kms: make an aux failure debug only - LP: #893741 * ALSA: usb-audio - Check the dB-range validity in the later read, too - LP: #893741 * ALSA: usb-audio - Fix the missing volume quirks at delayed init - LP: #893741 * KEYS: Fix a NULL pointer deref in the user-defined key type - LP: #893741 * hfs: add sanity check for file name length - LP: #893741 * drm/radeon: add some missing FireMV pci ids - LP: #893741 * sfi: table irq 0xFF means 'no interrupt' - LP: #893741 * x86, mrst: use a temporary variable for SFI irq - LP: #893741 * b43: refuse to load unsupported firmware - LP: #893741 * md/raid5: abort any pending parity operations when array fails. - LP: #893741 * mfd: Fix twl4030 dependencies for audio codec - LP: #893741 * xen:pvhvm: enable PVHVM VCPU placement when using more than 32 CPUs. - LP: #893741 * xen-gntalloc: integer overflow in gntalloc_ioctl_alloc() - LP: #893741 * xen-gntalloc: signedness bug in add_grefs() - LP: #893741 * powerpc/ps3: Fix lost SMP IPIs - LP: #893741 * powerpc: Copy down exception vectors after feature fixups - LP: #893741 * backing-dev: ensure wakeup_timer is deleted - LP: #893741 * block: Always check length of all iov entries in blk_rq_map_user_iov() - LP: #893741 * Linux 3.0.10 - LP: #893741 * drm/i915: add multi-threaded forcewake support - LP: #891270 * (pre-stable) HID: bump maximum global item tag report size to 96 bytes - LP: #724831 * eCryptfs: Prevent file create race condition - LP: #813146 * eCryptfs: Flush file in vma close - LP: #870326 * drm/i915: Fix inconsistent backlight level during disabled - LP: #872652 * fix WARNING: at drivers/scsi/scsi_lib.c:1704 - LP: #897514 * hpsa: Disable ASPM - LP: #897514 * aacraid: controller hangs if kernel uses non-default ASPM policy - LP: #897514 * saa7164: Add support for another HVR2200 hardware revision - LP: #897514 * drm/i915/pch: Save/restore PCH_PORT_HOTPLUG across suspend - LP: #897514 * ARM: 7150/1: Allow kernel unaligned accesses on ARMv6+ processors - LP: #897514 * Net, libertas: Resolve memory leak in if_spi_host_to_card() - LP: #897514 * rt2x00: Fix sleep-while-atomic bug in powersaving code. - LP: #897514 * mac80211: fix NULL dereference in radiotap code - LP: #897514 * mac80211: fix bug in ieee80211_build_probe_req - LP: #897514 * nl80211: fix HT capability attribute validation - LP: #897514 * cfg80211: fix bug on regulatory core exit on access to last_request - LP: #897514 * ip6_tunnel: copy parms.name after register_netdevice - LP: #897514 * PM / driver core: disable device's runtime PM during shutdown - LP: #897514 * pch_phub: Support new device LAPIS Semiconductor ML7831 IOH - LP: #897514 * pch_phub: Fix MAC address writing issue for LAPIS ML7831 - LP: #897514 * pch_uart: Fix hw-flow control issue - LP: #897514 * pch_uart:
[Bug 893148] Re: CVE-2011-4132
This bug was fixed in the package linux - 2.6.38-13.53 --- linux (2.6.38-13.53) natty-proposed; urgency=low [Brad Figg] * Release Tracking Bug - LP: #897320 [ Upstream Kernel Changes ] * cifs, freezer: add wait_event_freezekillable and have cifs use it - LP: #24330 * Fixup trivial checkpatch warning - LP: #24330 * Fix build break when freezer not configured - LP: #24330 * PM / Freezer: Reimplement wait_event_freezekillable using freezer_do_not_count/freezer_count - LP: #24330 * crypto: ghash - Avoid null pointer dereference if no key is set - LP: #887299 - CVE-2011-4081 * ata_piix: make DVD Drive recognisable on systems with Intel Sandybridge chipsets(v2) - LP: #737388, #782389, #794642 * drm/i915: fix CB tuning check for ILK+ - LP: #891031 * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077 - LP: #887298 - CVE-2011-4077 * jbd/jbd2: validate sb-s_first in journal_get_superblock() - LP: #893148 - CVE-2011-4132 * hfs: add sanity check for file name length, CVE-2011-4330 - LP: #894374 - CVE-2011-4330 -- Brad Figg brad.f...@canonical.com Mon, 28 Nov 2011 09:48:40 -0800 ** Changed in: linux (Ubuntu Natty) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.18 --- linux-ti-omap4 (2.6.38-1209.18) natty-proposed; urgency=low * Release Tracking Bug - LP: #897566 [ Upstream Kernel Changes ] * crypto: ghash - Avoid null pointer dereference if no key is set - LP: #887299 - CVE-2011-4081 * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077 - LP: #887298 - CVE-2011-4077 * jbd/jbd2: validate sb-s_first in journal_get_superblock() - LP: #893148 - CVE-2011-4132 * inetpeer: reduce stack usage, CVE-2011-4087 - LP: #887302 - CVE-2011-4087 * hfs: add sanity check for file name length, CVE-2011-4330 - LP: #894374 - CVE-2011-4330 * ipv6: udp: fix the wrong headroom check - LP: #894373 - CVE-2011-4326 -- Paolo Pisati paolo.pis...@canonical.com Fri, 02 Dec 2011 13:15:41 +0100 ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-4087 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
This bug was fixed in the package linux-lts-backport-natty - 2.6.38-13.53~lucid1 --- linux-lts-backport-natty (2.6.38-13.53~lucid1) lucid-proposed; urgency=low [Brad Figg] * Release Tracking Bug - LP: #897567 [ Upstream Kernel Changes ] * cifs, freezer: add wait_event_freezekillable and have cifs use it - LP: #24330 * Fixup trivial checkpatch warning - LP: #24330 * Fix build break when freezer not configured - LP: #24330 * PM / Freezer: Reimplement wait_event_freezekillable using freezer_do_not_count/freezer_count - LP: #24330 * crypto: ghash - Avoid null pointer dereference if no key is set - LP: #887299 - CVE-2011-4081 * ata_piix: make DVD Drive recognisable on systems with Intel Sandybridge chipsets(v2) - LP: #737388, #782389, #794642 * drm/i915: fix CB tuning check for ILK+ - LP: #891031 * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077 - LP: #887298 - CVE-2011-4077 * jbd/jbd2: validate sb-s_first in journal_get_superblock() - LP: #893148 - CVE-2011-4132 * hfs: add sanity check for file name length, CVE-2011-4330 - LP: #894374 - CVE-2011-4330 linux (2.6.38-13.52) natty-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #887379 [ Konrad Rzeszutek Wilk ] * SAUCE: x86/paravirt: Partially revert remove lazy mode in interrupts - LP: #854050 [ Ming Lei ] * SAUCE: [media] uvcvideo: Set alternate setting 0 on resume if the bus has been reset - LP: #816484 [ Seth Forshee ] * SAUCE: acer-wmi: Add wireless quirk for Lenovo 3000 N200 - LP: #857297 [ Upstream Kernel Changes ] * Make TASKSTATS require root access, CVE-2011-2494 - LP: #866021 - CVE-2011-2494 * proc: restrict access to /proc/PID/io, CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * proc: fix a race in do_io_accounting(), CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * staging: comedi: fix infoleak to userspace, CVE-2011-2909 - LP: #869261 - CVE-2011-2909 * perf tools: do not look at ./config for configuration, CVE-2011-2905 - LP: #869259 - CVE-2011-2905 * e1000e: workaround for packet drop on 82579 at 100Mbps - LP: #870127 * eCryptfs: Remove unnecessary grow_file() function - LP: #745836 * eCryptfs: Remove ECRYPTFS_NEW_FILE crypt stat flag - LP: #745836 * block: blkdev_get() should access -bd_disk only after success - LP: #857170 * ipv6: restore correct ECN handling on TCP xmit - LP: #872179 * nl80211: fix overflow in ssid_len - CVE-2011-2517 - LP: #869245 - CVE-2011-2517 * ksm: fix NULL pointer dereference in scan_get_next_rmap_item() - CVE-2011-2183 - LP: #869227 - CVE-2011-2183 * NLM: Don't hang forever on NLM unlock requests - CVE-2011-2491 - LP: #869237 - CVE-2011-2491 * KVM: fix kvmclock regression due to missing clock update - LP: #795717 * drm/i915: don't enable plane, pipe and PLL prematurely - LP: #812638 * drm/i915: add pipe/plane enable/disable functions - LP: #812638 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com Tue, 29 Nov 2011 10:31:28 -0200 ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2494 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2495 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2905 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2909 ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.28 --- linux-ti-omap4 (2.6.35-903.28) maverick-proposed; urgency=low * Release Tracking Bug - LP: #897740 [ Upstream Kernel Changes ] * crypto: ghash - Avoid null pointer dereference if no key is set - LP: #887299 - CVE-2011-4081 * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077 - LP: #887298 - CVE-2011-4077 * jbd/jbd2: validate sb-s_first in journal_get_superblock() - LP: #893148 - CVE-2011-4132 * hfs: add sanity check for file name length, CVE-2011-4330 - LP: #894374 - CVE-2011-4330 * ipv6: udp: fix the wrong headroom check - LP: #894373 - CVE-2011-4326 * mm: make the vma list be doubly linked - LP: #893190 * mm: make the mlock() stack guard page checks stricter - LP: #893190 * mm: make stack guard page logic use vm_prev pointer - LP: #893190 * mm: Move vma_stack_continue into mm.h - LP: #672664, #893190 * Yama: fix default relationship to check thread group - LP: #737676, #893190 * Yama: use thread group leader when creating match - LP: #729839, #893190 -- Paolo Pisati paolo.pis...@canonical.com Fri, 02 Dec 2011 13:04:02 +0100 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
This bug was fixed in the package linux-mvl-dove - 2.6.32-421.39 --- linux-mvl-dove (2.6.32-421.39) maverick-proposed; urgency=low * Release Tracking Bug - LP: #897742 [ Paolo Pisati ] * Rebased to 2.6.32-37.80 [ Ubuntu: 2.6.32-37.80 ] * Release Tracking Bug - LP: #898283 * Revert x86, hotplug: Use mwait to offline a processor, fix the legacy case - LP: #888042 * Revert usb: musb: restore INDEX register in resume path - LP: #888042 * Revert MIPS: MTX-1: Make au1000_eth probe all PHY - LP: #888042 * Revert ALSA: hda: Fix quirk for Dell Inspiron 910 - LP: #875300 * USB: ftdi_sio: add Calao reference board support - LP: #888042 * USB: EHCI: Do not rely on PORT_SUSPEND to stop USB resuming in ehci_bus_resume(). - LP: #888042 * rt2x00: do not drop usb dev reference counter on suspend - LP: #888042 * atm: br2684: Fix oops due to skb-dev being NULL - LP: #888042 * sparc: Allow handling signals when stack is corrupted. - LP: #888042 * sparc: fix array bounds error setting up PCIC NMI trap - LP: #888042 * net: Fix IPv6 GSO type checks in Intel ethernet drivers - LP: #888042 * ipv6: Add GSO support on forwarding path - LP: #888042 * GRO: fix merging a paged skb after non-paged skbs - LP: #888042 * xen-blkfront: fix data size for xenbus_gather in blkfront_connect - LP: #888042 * md/linear: avoid corrupting structure while waiting for rcu_free to complete. - LP: #888042 * powerpc/pci: Check devices status property when scanning OF tree - LP: #888042 * xen: x86_32: do not enable iterrupts when returning from exception in interrupt context - LP: #888042 * xen/smp: Warn user why they keel over - nosmp or noapic and what to use instead. - LP: #888042 * ARM: davinci: da850 EVM: read mac address from SPI flash - LP: #888042 * md: Fix handling for devices from 2TB to 4TB in 0.90 metadata. - LP: #888042 * net/9p: fix client code to fail more gracefully on protocol error - LP: #888042 * fs/9p: Fid is not valid after a failed clunk. - LP: #888042 * net/9p: Fix the msize calculation. - LP: #888042 * irda: fix smsc-ircc2 section mismatch warning - LP: #888042 * qla2xxx: Correct inadvertent loop state transitions during port-update handling. - LP: #888042 * e1000: Fix driver to be used on PA RISC C8000 workstations - LP: #888042 * ASoC: Fix reporting of partial jack updates - LP: #888042 * ALSA: HDA: Cirrus - fix Surround Speaker volume control name - LP: #888042 * b43: Fix beacon problem in ad-hoc mode - LP: #888042 * wireless: Reset beacon_found while updating regulatory - LP: #888042 * USB: PL2303: correctly handle baudrates above 115200 - LP: #888042 * ASIX: Add AX88772B USB ID - LP: #888042 * hvc_console: Improve tty/console put_chars handling - LP: #888042 * TPM: Call tpm_transmit with correct size - LP: #888042 * TPM: Zero buffer after copying to userspace - LP: #888042 * libiscsi_tcp: fix LLD data allocation - LP: #888042 * cnic: Improve NETDEV_UP event handling - LP: #888042 * ALSA: hda/realtek - Avoid bogus HP-pin assignment - LP: #888042 * 3w-9xxx: fix iommu_iova leak - LP: #888042 * aacraid: reset should disable MSI interrupt - LP: #888042 * libsas: fix failure to revalidate domain for anything but the first expander child. - LP: #888042 * cfg80211: Fix validation of AKM suites - LP: #888042 * libsas: fix panic when single phy is disabled on a wide port - LP: #888042 * ahci: Enable SB600 64bit DMA on Asus M3A - LP: #888042 * HID: usbhid: Add support for SiGma Micro chip - LP: #888042 * hwmon: (w83627ehf) Properly report thermal diode sensors - LP: #888042 * x25: Prevent skb overreads when checking call user data - LP: #888042 * staging: quatech_usb2: Potential lost wakeup scenario in TIOCMIWAIT - LP: #888042 * USB: qcserial: add device ID for HP un2430 Mobile Broadband Module - LP: #888042 * xhci-mem.c: Check for ring-first_seg != NULL - LP: #888042 * ipr: Always initiate hard reset in kdump kernel - LP: #888042 * libsas: set sas_address and device type of rphy - LP: #888042 * ALSA: HDA: Add new revision for ALC662 - LP: #877373, #888042 * x86: Fix compilation bug in kprobes' twobyte_is_boostable - LP: #888042 * epoll: fix spurious lockdep warnings - LP: #888042 * usbmon vs. tcpdump: fix dropped packet count - LP: #888042 * USB: storage: Use normalized sense when emulating autosense - LP: #888042 * USB: pid_ns: ensure pid is not freed during kill_pid_info_as_uid - LP: #888042 * usb: cdc-acm: Owen SI-30 support - LP: #888042 * USB: add RESET_RESUME for webcams shown to be quirky - LP: #888042 * USB: pl2303: add id for SMART device - LP: #888042 * USB: ftdi_sio: add PID for Sony Ericsson Urban
[Bug 893148] Re: CVE-2011-4132
This bug was fixed in the package linux-ec2 - 2.6.32-341.42 --- linux-ec2 (2.6.32-341.42) lucid-proposed; urgency=low [Stefan Bader] * Release Tracking Bug - LP: #900752 * XEN: xen-blkfront: fix data size for xenbus_gather in blkfront_connect - LP: #888042 linux-ec2 (2.6.32-341.41) lucid-proposed; urgency=low [ Stefan Bader ] * Release Tracking Bug - LP: #899737 * Revert SAUCE: XEN: Import 26ab8408157fbbc669e1aab1f271bb3cb1c433d0 - LP: #888042 * Rebased to Ubuntu-Ubuntu-2.6.32-37.81 [ Ubuntu: 2.6.32-37.81 ] * (pre-stable) sparc: sigutil: Include linux/errno.h - LP: #899311 [ Ubuntu: 2.6.32-37.80 ] * Revert x86, hotplug: Use mwait to offline a processor, fix the legacy case - LP: #888042 * Revert usb: musb: restore INDEX register in resume path - LP: #888042 * Revert MIPS: MTX-1: Make au1000_eth probe all PHY - LP: #888042 * Revert ALSA: hda: Fix quirk for Dell Inspiron 910 - LP: #875300 * USB: ftdi_sio: add Calao reference board support - LP: #888042 * USB: EHCI: Do not rely on PORT_SUSPEND to stop USB resuming in ehci_bus_resume(). - LP: #888042 * rt2x00: do not drop usb dev reference counter on suspend - LP: #888042 * atm: br2684: Fix oops due to skb-dev being NULL - LP: #888042 * sparc: Allow handling signals when stack is corrupted. - LP: #888042 * sparc: fix array bounds error setting up PCIC NMI trap - LP: #888042 * net: Fix IPv6 GSO type checks in Intel ethernet drivers - LP: #888042 * ipv6: Add GSO support on forwarding path - LP: #888042 * GRO: fix merging a paged skb after non-paged skbs - LP: #888042 * xen-blkfront: fix data size for xenbus_gather in blkfront_connect - LP: #888042 * md/linear: avoid corrupting structure while waiting for rcu_free to complete. - LP: #888042 * powerpc/pci: Check devices status property when scanning OF tree - LP: #888042 * xen: x86_32: do not enable iterrupts when returning from exception in interrupt context - LP: #888042 * xen/smp: Warn user why they keel over - nosmp or noapic and what to use instead. - LP: #888042 * ARM: davinci: da850 EVM: read mac address from SPI flash - LP: #888042 * md: Fix handling for devices from 2TB to 4TB in 0.90 metadata. - LP: #888042 * net/9p: fix client code to fail more gracefully on protocol error - LP: #888042 * fs/9p: Fid is not valid after a failed clunk. - LP: #888042 * net/9p: Fix the msize calculation. - LP: #888042 * irda: fix smsc-ircc2 section mismatch warning - LP: #888042 * qla2xxx: Correct inadvertent loop state transitions during port-update handling. - LP: #888042 * e1000: Fix driver to be used on PA RISC C8000 workstations - LP: #888042 * ASoC: Fix reporting of partial jack updates - LP: #888042 * ALSA: HDA: Cirrus - fix Surround Speaker volume control name - LP: #888042 * b43: Fix beacon problem in ad-hoc mode - LP: #888042 * wireless: Reset beacon_found while updating regulatory - LP: #888042 * USB: PL2303: correctly handle baudrates above 115200 - LP: #888042 * ASIX: Add AX88772B USB ID - LP: #888042 * hvc_console: Improve tty/console put_chars handling - LP: #888042 * TPM: Call tpm_transmit with correct size - LP: #888042 * TPM: Zero buffer after copying to userspace - LP: #888042 * libiscsi_tcp: fix LLD data allocation - LP: #888042 * cnic: Improve NETDEV_UP event handling - LP: #888042 * ALSA: hda/realtek - Avoid bogus HP-pin assignment - LP: #888042 * 3w-9xxx: fix iommu_iova leak - LP: #888042 * aacraid: reset should disable MSI interrupt - LP: #888042 * libsas: fix failure to revalidate domain for anything but the first expander child. - LP: #888042 * cfg80211: Fix validation of AKM suites - LP: #888042 * libsas: fix panic when single phy is disabled on a wide port - LP: #888042 * ahci: Enable SB600 64bit DMA on Asus M3A - LP: #888042 * HID: usbhid: Add support for SiGma Micro chip - LP: #888042 * hwmon: (w83627ehf) Properly report thermal diode sensors - LP: #888042 * x25: Prevent skb overreads when checking call user data - LP: #888042 * staging: quatech_usb2: Potential lost wakeup scenario in TIOCMIWAIT - LP: #888042 * USB: qcserial: add device ID for HP un2430 Mobile Broadband Module - LP: #888042 * xhci-mem.c: Check for ring-first_seg != NULL - LP: #888042 * ipr: Always initiate hard reset in kdump kernel - LP: #888042 * libsas: set sas_address and device type of rphy - LP: #888042 * ALSA: HDA: Add new revision for ALC662 - LP: #877373, #888042 * x86: Fix compilation bug in kprobes' twobyte_is_boostable - LP: #888042 * epoll: fix spurious lockdep warnings - LP: #888042 * usbmon vs. tcpdump: fix dropped packet count - LP: #888042 * USB: storage: Use normalized sense when emulating
[Bug 893148] Re: CVE-2011-4132
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-612.31 --- linux-fsl-imx51 (2.6.31-612.31) lucid-proposed; urgency=low * Release Tracking Bug - LP: #899736 [ Upstream Kernel Changes ] * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077 - LP: #887298 - CVE-2011-4077 * jbd/jbd2: validate sb-s_first in journal_get_superblock() - LP: #893148 - CVE-2011-4132 * hfs: add sanity check for file name length, CVE-2011-4330 - LP: #894374 - CVE-2011-4330 -- Paolo Pisati paolo.pis...@canonical.com Mon, 05 Dec 2011 09:32:22 +0100 ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
This bug was fixed in the package linux - 2.6.24-30.97 --- linux (2.6.24-30.97) hardy-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #897225 [Upstream Kernel Changes] * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077 - LP: #887298 - CVE-2011-4077 * jbd/jbd2: validate sb-s_first in journal_get_superblock() - LP: #893148 - CVE-2011-4132 * hfs: add sanity check for file name length, CVE-2011-4330 - LP: #894374 - CVE-2011-4330 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com Mon, 28 Nov 2011 11:39:07 -0200 ** Changed in: linux (Ubuntu Hardy) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-4077 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-4330 ** Changed in: linux (Ubuntu Maverick) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-4081 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-4326 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
This bug was fixed in the package linux - 2.6.35-31.63 --- linux (2.6.35-31.63) maverick-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #897265 [ Upstream Kernel Changes ] * crypto: ghash - Avoid null pointer dereference if no key is set - LP: #887299 - CVE-2011-4081 * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077 - LP: #887298 - CVE-2011-4077 * jbd/jbd2: validate sb-s_first in journal_get_superblock() - LP: #893148 - CVE-2011-4132 * hfs: add sanity check for file name length, CVE-2011-4330 - LP: #894374 - CVE-2011-4330 * ipv6: udp: fix the wrong headroom check - LP: #894373 - CVE-2011-4326 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com Mon, 28 Nov 2011 14:05:38 -0200 ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1585 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2183 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2491 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2496 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2517 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
This bug was fixed in the package linux-lts-backport-maverick - 2.6.35-31.63~lucid1 --- linux-lts-backport-maverick (2.6.35-31.63~lucid1) lucid-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #897744 [ Upstream Kernel Changes ] * crypto: ghash - Avoid null pointer dereference if no key is set - LP: #887299 - CVE-2011-4081 * xfs: Fix possible memory corruption in xfs_readlink, CVE-2011-4077 - LP: #887298 - CVE-2011-4077 * jbd/jbd2: validate sb-s_first in journal_get_superblock() - LP: #893148 - CVE-2011-4132 * hfs: add sanity check for file name length, CVE-2011-4330 - LP: #894374 - CVE-2011-4330 * ipv6: udp: fix the wrong headroom check - LP: #894373 - CVE-2011-4326 linux (2.6.35-31.62) maverick-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #887378 [ Upstream Kernel Changes ] * ipv6: restore correct ECN handling on TCP xmit - LP: #872179 * nl80211: fix overflow in ssid_len - CVE-2011-2517 - LP: #869245 - CVE-2011-2517 * vm: fix vm_pgoff wrap in stack expansion - CVE-2011-2496 - LP: #869243 - CVE-2011-2496 * vm: fix vm_pgoff wrap in upward expansion - CVE-2011-2496 - LP: #869243 - CVE-2011-2496 * ksm: fix NULL pointer dereference in scan_get_next_rmap_item() - CVE-2011-2183 - LP: #869227 - CVE-2011-2183 * NLM: Don't hang forever on NLM unlock requests - CVE-2011-2491 - LP: #869237 - CVE-2011-2491 * cifs: clean up cifs_find_smb_ses (try #2), CVE-2011-1585 - LP: #869208 - CVE-2011-1585 * cifs: fix NULL pointer dereference in cifs_find_smb_ses, CVE-2011-1585 - LP: #869208 - CVE-2011-1585 * cifs: check for NULL session password, CVE-2011-1585 - LP: #869208 - CVE-2011-1585 -- Herton Ronaldo Krzesinski herton.krzesin...@canonical.com Tue, 29 Nov 2011 15:42:23 -0200 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux (Ubuntu Lucid) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Branch linked: lp:ubuntu/natty-proposed/linux-ti-omap4 ** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Branch linked: lp:ubuntu/maverick-proposed/linux-mvl-dove -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty ** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-maverick -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-ec2 (Ubuntu Lucid) Status: In Progress = Fix Committed ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: In Progress = Fix Committed ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: In Progress = Fix Committed ** Changed in: linux-mvl-dove (Ubuntu Lucid) Status: In Progress = Fix Committed ** Changed in: linux-mvl-dove (Ubuntu Maverick) Status: In Progress = Fix Committed ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: In Progress = Fix Committed ** Changed in: linux (Ubuntu Oneiric) Status: In Progress = Fix Committed ** Changed in: linux (Ubuntu Lucid) Status: In Progress = Fix Committed ** Changed in: linux (Ubuntu Hardy) Status: In Progress = Fix Committed ** Changed in: linux (Ubuntu Maverick) Status: In Progress = Fix Committed ** Changed in: linux (Ubuntu Natty) Status: In Progress = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: In Progress = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: In Progress = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: In Progress = Fix Committed ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: In Progress = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 893148] Re: CVE-2011-4132
** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: New = In Progress ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: New = In Progress ** Changed in: linux-ti-omap4 (Ubuntu Natty) Assignee: (unassigned) = Andy Whitcroft (apw) ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: New = In Progress ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Assignee: (unassigned) = Andy Whitcroft (apw) ** Changed in: linux-mvl-dove (Ubuntu Maverick) Status: New = In Progress ** Changed in: linux-mvl-dove (Ubuntu Lucid) Status: New = In Progress ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: New = In Progress ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = In Progress ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = In Progress ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: New = In Progress ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Assignee: (unassigned) = Andy Whitcroft (apw) ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New = In Progress ** Changed in: linux (Ubuntu Oneiric) Status: New = In Progress ** Changed in: linux (Ubuntu Oneiric) Assignee: (unassigned) = Andy Whitcroft (apw) ** Changed in: linux (Ubuntu Natty) Status: New = In Progress ** Changed in: linux (Ubuntu Natty) Assignee: (unassigned) = Andy Whitcroft (apw) ** Changed in: linux (Ubuntu Maverick) Status: New = In Progress ** Changed in: linux (Ubuntu Maverick) Assignee: (unassigned) = Andy Whitcroft (apw) ** Changed in: linux (Ubuntu Lucid) Status: New = In Progress ** Changed in: linux (Ubuntu Lucid) Assignee: (unassigned) = Andy Whitcroft (apw) ** Changed in: linux (Ubuntu Hardy) Status: New = In Progress ** Changed in: linux (Ubuntu Hardy) Assignee: (unassigned) = Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/893148/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs