[Bug 949905] Re: CVE-2012-1097
** Changed in: linux (Ubuntu) Status: Fix Released => Invalid ** Changed in: linux (Ubuntu Precise) Status: Fix Released => Invalid ** Changed in: linux (Ubuntu Trusty) Status: Fix Released => Invalid ** Changed in: linux (Ubuntu Vivid) Status: Fix Released => Invalid ** Changed in: linux (Ubuntu Wily) Status: Fix Released => Invalid ** Changed in: linux (Ubuntu Xenial) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Also affects: linux (Ubuntu Xenial) Importance: Medium Assignee: Andy Whitcroft (apw) Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-manta (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Also affects: linux (Ubuntu Wily) Importance: Medium Assignee: Andy Whitcroft (apw) Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-manta (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-flo (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Wily) Importance: Medium Status: Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quantal (Ubuntu Lucid) ** No longer affects: linux-mvl-dove (Ubuntu Lucid) ** No longer affects: linux-ti-omap4 (Ubuntu Lucid) ** No longer affects: linux (Ubuntu Lucid) ** No longer affects: linux-mako (Ubuntu Lucid) ** No longer affects: linux-fsl-imx51 (Ubuntu Lucid) ** No longer affects: linux-lts-utopic (Ubuntu Lucid) ** No longer affects: linux-flo (Ubuntu Lucid) ** No longer affects: linux-lts-raring (Ubuntu Lucid) ** No longer affects: linux-manta (Ubuntu Lucid) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-goldfish (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Utopic) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Utopic) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Also affects: linux (Ubuntu Vivid) Importance: Medium Assignee: Andy Whitcroft (apw) Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Vivid) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** No longer affects: linux-armadaxp (Ubuntu Saucy) ** No longer affects: linux-ec2 (Ubuntu Saucy) ** No longer affects: linux-lts-saucy (Ubuntu Saucy) ** No longer affects: linux-lts-quantal (Ubuntu Saucy) ** No longer affects: linux-mvl-dove (Ubuntu Saucy) ** No longer affects: linux (Ubuntu Saucy) ** No longer affects: linux-fsl-imx51 (Ubuntu Saucy) ** No longer affects: linux-ti-omap4 (Ubuntu Saucy) ** No longer affects: linux-lts-raring (Ubuntu Saucy) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** No longer affects: linux-armadaxp (Ubuntu Quantal) ** No longer affects: linux-ec2 (Ubuntu Quantal) ** No longer affects: linux-lts-saucy (Ubuntu Quantal) ** No longer affects: linux-lts-quantal (Ubuntu Quantal) ** No longer affects: linux-mvl-dove (Ubuntu Quantal) ** No longer affects: linux (Ubuntu Quantal) ** No longer affects: linux-fsl-imx51 (Ubuntu Quantal) ** No longer affects: linux-ti-omap4 (Ubuntu Quantal) ** No longer affects: linux-lts-raring (Ubuntu Quantal) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Also affects: linux (Ubuntu Utopic) Importance: Medium Assignee: Andy Whitcroft (apw) Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Utopic) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** No longer affects: linux-armadaxp (Ubuntu Raring) ** No longer affects: linux-ec2 (Ubuntu Raring) ** No longer affects: linux-lts-saucy (Ubuntu Raring) ** No longer affects: linux-lts-quantal (Ubuntu Raring) ** No longer affects: linux-mvl-dove (Ubuntu Raring) ** No longer affects: linux (Ubuntu Raring) ** No longer affects: linux-fsl-imx51 (Ubuntu Raring) ** No longer affects: linux-ti-omap4 (Ubuntu Raring) ** No longer affects: linux-lts-raring (Ubuntu Raring) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-saucy (Ubuntu Saucy) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Saucy) Importance: Undecided => Medium ** Changed in: linux-lts-saucy (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-saucy (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-saucy (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Quantal) Importance: Undecided => Medium ** Changed in: linux-lts-saucy (Ubuntu Raring) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Raring) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Also affects: linux (Ubuntu Trusty) Importance: Medium Assignee: Andy Whitcroft (apw) Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Medium Status: Fix Released ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Trusty) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** No longer affects: linux-armadaxp (Ubuntu Hardy) ** No longer affects: linux-armadaxp (Ubuntu Oneiric) ** No longer affects: linux-ec2 (Ubuntu Hardy) ** No longer affects: linux-ec2 (Ubuntu Oneiric) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Oneiric) ** No longer affects: linux-lts-backport-natty (Ubuntu Hardy) ** No longer affects: linux-lts-backport-natty (Ubuntu Oneiric) ** No longer affects: linux-lts-quantal (Ubuntu Hardy) ** No longer affects: linux-lts-quantal (Ubuntu Oneiric) ** No longer affects: linux-mvl-dove (Ubuntu Hardy) ** No longer affects: linux-mvl-dove (Ubuntu Oneiric) ** No longer affects: linux-lts-backport-maverick (Ubuntu Hardy) ** No longer affects: linux-lts-backport-maverick (Ubuntu Oneiric) ** No longer affects: linux (Ubuntu Hardy) ** No longer affects: linux (Ubuntu Oneiric) ** No longer affects: linux-fsl-imx51 (Ubuntu Hardy) ** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric) ** No longer affects: linux-ti-omap4 (Ubuntu Hardy) ** No longer affects: linux-ti-omap4 (Ubuntu Oneiric) ** No longer affects: linux-lts-raring (Ubuntu Hardy) ** No longer affects: linux-lts-raring (Ubuntu Oneiric) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-lts-raring (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Saucy) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Saucy) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Hardy) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Quantal) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Raring) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Raring) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Also affects: linux (Ubuntu Saucy) Importance: Medium Assignee: Andy Whitcroft (apw) Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Saucy) Importance: Medium Status: Fix Released ** Also affects: linux-lts-backport-maverick (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Saucy) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-armadaxp (Ubuntu Raring) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Also affects: linux (Ubuntu Raring) Importance: Medium Assignee: Andy Whitcroft (apw) Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Raring) Importance: Medium Status: Fix Released ** Also affects: linux-lts-backport-maverick (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Raring) Importance: Medium Status: Fix Released ** Also affects: linux-lts-quantal (Ubuntu Raring) Importance: Undecided Status: New ** Changed in: linux-lts-quantal (Ubuntu Raring) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Raring) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** No longer affects: linux-armadaxp (Ubuntu Maverick) ** No longer affects: linux-armadaxp (Ubuntu Natty) ** No longer affects: linux-ec2 (Ubuntu Maverick) ** No longer affects: linux-ec2 (Ubuntu Natty) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Maverick) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Natty) ** No longer affects: linux-lts-backport-natty (Ubuntu Maverick) ** No longer affects: linux-lts-backport-natty (Ubuntu Natty) ** No longer affects: linux-lts-quantal (Ubuntu Maverick) ** No longer affects: linux-lts-quantal (Ubuntu Natty) ** No longer affects: linux-mvl-dove (Ubuntu Maverick) ** No longer affects: linux-mvl-dove (Ubuntu Natty) ** No longer affects: linux-lts-backport-maverick (Ubuntu Maverick) ** No longer affects: linux-lts-backport-maverick (Ubuntu Natty) ** No longer affects: linux (Ubuntu Maverick) ** No longer affects: linux (Ubuntu Natty) ** No longer affects: linux-fsl-imx51 (Ubuntu Maverick) ** No longer affects: linux-fsl-imx51 (Ubuntu Natty) ** No longer affects: linux-ti-omap4 (Ubuntu Maverick) ** No longer affects: linux-ti-omap4 (Ubuntu Natty) ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-quantal (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux-lts-quantal (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-quantal (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Hardy) Importance: Undecided => Medium ** Changed in: linux-lts-quantal (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Quantal) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
This bug was fixed in the package linux-armadaxp - 3.2.0-1605.8 --- linux-armadaxp (3.2.0-1605.8) precise-proposed; urgency=low * Release Tracking Bug -LP: #1020888 [ Jani Monoses ] * Fix warnings. * Adapt to new sched_clock API [ Ubuntu: 3.2.0-27.43 ] * No change upload to fix .ddeb generation in the PPA. * Release Tracking Bug - LP: #1020016 [ Ubuntu: 3.2.0-27.42 ] * Release Tracking Bug - LP: #1020016 * PACKAGING: add .gnu_debuglink sections to .ko files - LP: #669641 * [Config] Updateconfigs - LP: #1008345 * SAUCE: (upstreamed) [media] ene_ir: Fix driver initialisation - LP: #1014800 * SAUCE: ocfs2: Fix NULL pointer dereferrence in __ocfs2_change_file_space - LP: #1006012 * SAUCE: net: calxedaxgmac: enable rx cut-thru mode - LP: #1008345 * SAUCE: EDAC: Add support for the highbank platform memory - LP: #1008345 * SAUCE: EDAC: add support for highbank platform L2 cache ecc - LP: #1008345 * (pre-stable): bcma: add ext PA workaround for BCM4331 and BCM43431 - LP: #925577 * SAUCE: ALSA: hda - Fix power-map regression for HP dv6 & co - LP: #1013183 * [Config] Enable CONFIG_CGROUPS for highbank - LP: #1014692 * Revert "net: maintain namespace isolation between vlan and real device" - LP: #1013723 * x86/amd: Re-enable CPU topology extensions in case BIOS has disabled it - LP: #1009087 * hwmon: (k10temp) Add support for AMD Trinity CPUs - LP: #1009086 * hwmon: (fam15h_power) Increase output resolution - LP: #1009086 * Input: wacom - use BTN_TOOL_FINGER to indicate touch device type - LP: #1009435 * Input: wacom - use switch statement for wacom_tpc_irq() - LP: #1009435 * Input: wacom - isolate input registration - LP: #1009435 * Input: wacom - wireless monitor framework - LP: #1009435 * Input: wacom - create inputs when wireless connect - LP: #1009435 * Input: wacom - wireless battery status - LP: #1009435 * Input: wacom - check for allocation failure in probe() - LP: #1009435 * Input: wacom - add basic Intuos5 support - LP: #1009435 * Input: wacom - add Intuos5 Touch Ring/ExpressKey support - LP: #1009435 * Input: wacom - add Intuos5 Touch Ring LED support - LP: #1009435 * Input: wacom - add Intuos5 multitouch sensor support - LP: #1009435 * iommu/amd: Add workaround for event log erratum - LP: #1013723 * MIPS: BCM63XX: Add missing include for bcm63xx_gpio.h - LP: #1013723 * cifs: Include backup intent search flags during searches {try #2) - LP: #1013723 * sunrpc: fix loss of task->tk_status after rpc_delay call in xprt_alloc_slot - LP: #1013723 * exofs: Fix CRASH on very early IO errors. - LP: #1013723 * cifs: fix oops while traversing open file list (try #4) - LP: #1013723 * Fix dm-multipath starvation when scsi host is busy - LP: #1013723 * ixp4xx: fix compilation by adding gpiolib support - LP: #1013723 * drm/i915: properly handle interlaced bit for sdvo dtd conversion - LP: #1013723 * drm/i915: enable vdd when switching off the eDP panel - LP: #1013723 * drm/i915: Ignore LVDS on hp t5745 and hp st5747 thin client - LP: #1013723 * drm/i915: no lvds quirk for HP t5740e Thin Client - LP: #1013723 * drm/i915: wait for a vblank to pass after tv detect - LP: #1013723 * drm/i915: Update GEN6_RP_CONTROL definitions - LP: #1013723 * drm/i915: always use RPNSWREQ for turbo change requests - LP: #1013723 * solos-pci: Fix DMA support - LP: #1013723 * microblaze: Do not select GENERIC_GPIO by default - LP: #1013723 * fix boot failure on 32-bit systems caused by branch stubs placed before .text - LP: #1013723 * fix TLB fault path on PA2.0 narrow systems - LP: #1013723 * iwlwifi: update BT traffic load states correctly - LP: #1013723 * iwlwifi: do not use shadow registers by default - LP: #1013723 * wl1251: fix oops on early interrupt - LP: #1013723 * NFSv4: Map NFS4ERR_SHARE_DENIED into an EACCES error instead of EIO - LP: #1013723 * drm/radeon: fix XFX quirk - LP: #1013723 * ath9k: fix a use-after-free-bug when ath_tx_setup_buffer() fails - LP: #1013723 * mac80211: fix ADDBA declined after suspend with wowlan - LP: #1013723 * mm/fork: fix overflow in vma length when copying mmap on clone - LP: #1013723 * mm: consider all swapped back pages in used-once logic - LP: #1013723 * hugetlb: fix resv_map leak in error path - LP: #1013723 * mm/vmalloc.c: change void* into explict vm_struct* - LP: #1013723 * mm: fix faulty initialization in vmalloc_init() - LP: #1013723 * fix scsi_wait_scan - LP: #1013723 * mm: fix vma_resv_map() NULL pointer - LP: #1013723 * x86, amd, xen: Avoid NULL pointer paravirt references - LP: #1013723 * slub: fix a memory leak in get_partial_node() - LP: #1013723 * ext4: force ro mount i
[Bug 949905] Re: CVE-2012-1097
This bug was fixed in the package linux-armadaxp - 3.2.0-1603.6 --- linux-armadaxp (3.2.0-1603.6) precise-proposed; urgency=low [ Jani Monoses ] * SAUCE: Add CONFIG_SHEEVA_ERRATA_ARM_CPU_6409 - LP: #1006217 [ Ubuntu: 3.2.0-24.39 ] * Release Tracking Bug - LP: #1002329 * SAUCE: ata_piix: add a disable_driver option - LP: #994870 [ Ubuntu: 3.2.0-24.38 ] * Release Tracking Bug - LP: #991925 * linux: add Build-Depends for libnewt-dev, to enable perf TUI support - LP: #981717 * SAUCE: Allow filtering of cpufreq drivers - LP: #984288 * x86 bpf_jit: fix a bug in emitting the 16-bit immediate operand of AND - LP: #981162 * tg3: Fix 5717 serdes powerdown problem - LP: #981162 * sky2: dont overwrite settings for PHY Quick link - LP: #981162 * rose_dev: fix memcpy-bug in rose_set_mac_address - LP: #981162 * net: usb: cdc_eem: fix mtu - LP: #981162 * Fix non TBI PHY access; a bad merge undid bug fix in a previous commit. - LP: #981162 * ASoC: wm8994: Update WM8994 DCS calibration - LP: #981162 * mtd: ixp4xx: oops in ixp4xx_flash_probe - LP: #981162 * mtd: mips: lantiq: reintroduce support for cmdline partitions - LP: #981162 * mtd: nand: gpmi: use correct member for checking NAND_BBT_USE_FLASH - LP: #981162 * mtd: sst25l: initialize writebufsize - LP: #981162 * mtd: block2mtd: initialize writebufsize - LP: #981162 * mtd: lart: initialize writebufsize - LP: #981162 * mtd: m25p80: set writebufsize - LP: #981162 * ACPI: Do cpufreq clamping for throttling per package v2 - LP: #981162 * PNPACPI: Fix device ref leaking in acpi_pnp_match - LP: #981162 * modpost: fix ALL_INIT_DATA_SECTIONS - LP: #981162 * genirq: Adjust irq thread affinity on IRQ_SET_MASK_OK_NOCOPY return value - LP: #981162 * tracing: Fix ftrace stack trace entries - LP: #981162 * tracing: Fix ent_size in trace output - LP: #981162 * m68k/mac: Add missing platform check before registering platform devices - LP: #981162 * mac80211: fix possible tid_rx->reorder_timer use after free - LP: #981162 * rtlwifi: rtl8192ce: rtl8192cu: rtl8192de: Fix low-gain setting when scanning - LP: #981162 * drm: Validate requested virtual size against allocated fb size - LP: #981162 * drm/radeon/kms: fix fans after resume - LP: #981162 * drm/i915: no-lvds quirk on MSI DC500 - LP: #981162 * drm/i915: Add lock on drm_helper_resume_force_mode - LP: #981162 * drm/i915: quirk away broken OpRegion VBT - LP: #981162 * r8169: runtime resume before shutdown. - LP: #981162 * target: Fix unsupported WRITE_SAME sense payload - LP: #981162 * kgdb,debug_core: pass the breakpoint struct instead of address and memory - LP: #981162 * kgdbts: Fix kernel oops with CONFIG_DEBUG_RODATA - LP: #981162 * kgdbts: (1 of 2) fix single step awareness to work correctly with SMP - LP: #981162 * kgdbts: (2 of 2) fix single step awareness to work correctly with SMP - LP: #981162 * x86,kgdb: Fix DEBUG_RODATA limitation using text_poke() - LP: #981162 * CIFS: Fix VFS lock usage for oplocked files - LP: #981162 * ARM: tegra: remove Tegra30 errata from MACH_TEGRA_DT - LP: #981162 * mmc: sdhci-dove: Fix compile error by including module.h - LP: #981162 * mmc: atmel-mci: correct data timeout computation - LP: #981162 * tcm_fc: Add abort flag for gracefully handling exchange timeout - LP: #981162 * tcm_fc: Do not free tpg structure during wq allocation failure - LP: #981162 * sysctl: fix write access to dmesg_restrict/kptr_restrict - LP: #981162 * modpost: Fix modpost license checking of vmlinux.o - LP: #981162 * x86/PCI: use host bridge _CRS info on MSI MS-7253 - LP: #981162 * x86/PCI: do not tie MSI MS-7253 use_crs quirk to BIOS version - LP: #981162 * TOMOYO: Fix mount flags checking order. - LP: #981162 * acer-wmi: No wifi rfkill on Sony machines - LP: #981162 * Fix length of buffer copied in __nfs4_get_acl_uncached - LP: #981162 * sched/x86: Fix overflow in cyc2ns_offset - LP: #981162 * mfd: Clear twl6030 IRQ status register only once - LP: #981162 * USB: Add Motorola Rokr E6 Id to the USBNet driver "zaurus" - LP: #981162 * ioat: fix size of 'completion' for Xen - LP: #981162 * ASoC: ak4642: fixup: mute needs +1 step - LP: #981162 * cred: copy_process() should clear child->replacement_session_keyring - LP: #981162 * iommu/amd: Make sure IOMMU interrupts are re-enabled on resume - LP: #981162 * Linux 3.2.15 - LP: #981162 * drm/radeon/kms: fix DVO setup on some r4xx chips - LP: #987337 * drm/i915/ringbuffer: Exclude last 2 cachlines of ring on 845g - LP: #987337 * drm/radeon: only add the mm i2c bus if the hw_i2c module param is set - LP: #987337 * drm/i915: properly compute dp dithering f
[Bug 949905] Re: CVE-2012-1097
** Branch linked: lp:ubuntu/precise-proposed/linux-armadaxp -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Description changed: - regset: Prevent null pointer reference on readonly regsets + The regset (aka register set) feature in the Linux kernel before 3.2.10 + does not properly handle the absence of .get and .set methods, which + allows local users to cause a denial of service (NULL pointer + dereference) or possibly have unspecified other impact via a (1) + PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call. Break-Fix: bdf88217b70dbb18c4ee27a6c497286e040a6705 c8e252586f8d5de906385d8cf6385fee289a825e Break-Fix: bdf88217b70dbb18c4ee27a6c497286e040a6705 5189fa19a4b2b4c3bec37c3a019d446148827717 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1209.21 --- linux-ti-omap4 (3.0.0-1209.21) oneiric-proposed; urgency=low * Release Tracking Bug - LP: #985999 [ Paolo Pisati ] * rebased on 3.0.0-19.33 [ Ubuntu: 3.0.0-19.33 ] * Release Tracking Bug - LP: #985736 * SAUCE: ite-cir: postpone ISR registration - LP: #984387 linux-ti-omap4 (3.0.0-1209.20) oneiric-proposed; urgency=low * Release Tracking Bug - LP: #975060 [ Paolo Pisati ] * rebased on Ubuntu-3.0.0-19.32 [ Ubuntu: 3.0.0-19.32 ] * Release Tracking Bug - LP: #974368 * SAUCE (no-up) Provide a param for allowing the BIOS to handle changing the brightness on AC/battery status changes. - LP: #949311 * SAUCE (no-up) Quirk for enabling backlight hotkeys on Samsung N150P - LP: #875893 * SAUCE: (drop after 3.5) drm/i915: reinstate GM45 TV detection fix - LP: #638939 * SAUCE: (no-up) Reinstate missing hunk from nx emulation - LP: #972821 * SAUCE: ubuntu drivers: use UMH_WAIT_PROC consistently - LP: #963685 * SAUCE: disable_nx should not be in __cpuinitdata section for X86_32 - LP: #968233 * SAUCE: (no-up) remove __initdata from vesafb_fix - LP: #969309 * usermodehelper: use UMH_WAIT_PROC consistently - LP: #963685 * usermodehelper: introduce umh_complete(sub_info) - LP: #963685 * usermodehelper: implement UMH_KILLABLE - LP: #963685 * usermodehelper: kill umh_wait, renumber UMH_* constants - LP: #963685 * usermodehelper: call_usermodehelper() doesn't need do_exit() - LP: #963685 * kmod: introduce call_modprobe() helper - LP: #963685 * kmod: make __request_module() killable - LP: #963685 * x86, tsc: Fix SMI induced variation in quick_pit_calibrate() - LP: #965586 * ata_piix: Add Toshiba Satellite Pro A120 to the quirks list due to broken suspend functionality. - LP: #886850 * ACPICA: Fix regression in FADT revision checks - LP: #883441 * ASPM: Fix pcie devices with non-pcie children - LP: #961482 * USB: option: Add MediaTek MT6276M modem&app interfaces - LP: #971808 * USB: option driver: adding support for Telit CC864-SINGLE, CC864-DUAL and DE910-DUAL modems - LP: #971808 * USB: option: make interface blacklist work again - LP: #971808 * USB: option: add ZTE MF820D - LP: #971808 * USB: ftdi_sio: fix problem when the manufacture is a NULL string - LP: #971808 * USB: ftdi_sio: add support for BeagleBone rev A5+ - LP: #971808 * USB: Microchip VID mislabeled as Hornby VID in ftdi_sio. - LP: #971808 * USB: ftdi_sio: new PID: Distortec JTAG-lock-pick - LP: #971808 * USB: ftdi_sio: add support for FT-X series devices - LP: #971808 * USB: ftdi_sio: new PID: LUMEL PD12 - LP: #971808 * powerpc/usb: fix bug of kernel hang when initializing usb - LP: #971808 * usb: musb: Reselect index reg in interrupt context - LP: #971808 * usb: gadgetfs: return number of bytes on ep0 read request - LP: #971808 * USB: gadget: Make g_hid device class conform to spec. - LP: #971808 * futex: Cover all PI opcodes with cmpxchg enabled check - LP: #971808 * sysfs: Fix memory leak in sysfs_sd_setsecdata(). - LP: #971808 * tty: moxa: fix bit test in moxa_start() - LP: #971808 * TTY: Wrong unicode value copied in con_set_unimap() - LP: #971808 * USB: serial: fix console error reporting - LP: #971808 * cdc-wdm: Fix more races on the read path - LP: #971808 * cdc-wdm: Don't clear WDM_READ unless entire read buffer is emptied - LP: #971808 * usb: fsl_udc_core: Fix scheduling while atomic dump message - LP: #971808 * usb: Fix build error due to dma_mask is not at pdev_archdata at ARM - LP: #971808 * USB: qcserial: add several new serial devices - LP: #971808 * USB: qcserial: don't grab QMI port on Gobi 1000 devices - LP: #971808 * usb-serial: Add support for the Sealevel SeaLINK+8 2038-ROHS device - LP: #971808 * usb: cp210x: Update to support CP2105 and multiple interface devices - LP: #971808 * USB: serial: mos7840: Fixed MCS7820 device attach problem - LP: #971808 * rt2x00: Add support for D-Link DWA-127 to rt2800usb. - LP: #971808 * rtlwifi: Handle previous allocation failures when freeing device memory - LP: #971808 * rtlwifi: rtl8192c: Prevent sleeping from invalid context in rtl8192cu - LP: #971808 * rtlwifi: rtl8192ce: Fix loss of receive performance - LP: #971808 * math: Introduce div64_long - LP: #971808 * ntp: Fix integer overflow when setting time - LP: #971808 * uevent: send events in correct order according to seqnum (v3) - LP: #971808 * genirq: Fix long-term regression in genirq irq_set_irq_type() handling - LP: #971808 * genirq: Fix incorrect check for forced IRQ thread handler - LP: #971808 * rtc: Disable the alarm in the hardware (v2) - LP: #971808 * p54spi: Rele
[Bug 949905] Re: CVE-2012-1097
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.23 --- linux-ti-omap4 (2.6.38-1209.23) natty-proposed; urgency=low * Release Tracking Bug - LP: #967822 [ Upstream Kernel Changes ] * regset: Prevent null pointer reference on readonly regsets - LP: #949905 - CVE-2012-1097 * regset: Return -EFAULT, not -EIO, on host-side memory fault - LP: #949905 - CVE-2012-1097 * mm: memcg: Correct unregistring of events attached to the same eventfd - LP: #952828 - CVE-2012-1146 * eCryptfs: Copy up lower inode attrs after setting lower xattr -- Paolo PisatiFri, 30 Mar 2012 12:06:33 +0200 ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New => Fix Committed ** Changed in: linux-armadaxp (Ubuntu Quantal) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Also affects: linux (Ubuntu Quantal) Importance: Medium Assignee: Andy Whitcroft (apw) Status: Fix Released ** Also affects: linux-armadaxp (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Quantal) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Quantal) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Quantal) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Quantal) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Quantal) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Quantal) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Quantal) Importance: Medium Status: Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-armadaxp (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-armadaxp (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-armadaxp (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Hardy) Importance: Undecided => Medium ** Changed in: linux-armadaxp (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Natty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-armadaxp (Ubuntu Maverick) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
This bug was fixed in the package linux-lts-backport-oneiric - 3.0.0-19.33~lucid1 --- linux-lts-backport-oneiric (3.0.0-19.33~lucid1) lucid-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #986000 [ Luis Henriques ] * SAUCE: ite-cir: postpone ISR registration - LP: #984387 linux (3.0.0-19.32) oneiric-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #974368 [ Brad Figg ] * SAUCE (no-up) Provide a param for allowing the BIOS to handle changing the brightness on AC/battery status changes. - LP: #949311 * SAUCE (no-up) Quirk for enabling backlight hotkeys on Samsung N150P - LP: #875893 [ Daniel Vetter ] * SAUCE: (drop after 3.5) drm/i915: reinstate GM45 TV detection fix - LP: #638939 [ Herton Ronaldo Krzesinski ] * SAUCE: (no-up) Reinstate missing hunk from nx emulation - LP: #972821 [ Tim Gardner ] * SAUCE: ubuntu drivers: use UMH_WAIT_PROC consistently - LP: #963685 * SAUCE: disable_nx should not be in __cpuinitdata section for X86_32 - LP: #968233 * SAUCE: (no-up) remove __initdata from vesafb_fix - LP: #969309 [ Upstream Kernel Changes ] * usermodehelper: use UMH_WAIT_PROC consistently - LP: #963685 * usermodehelper: introduce umh_complete(sub_info) - LP: #963685 * usermodehelper: implement UMH_KILLABLE - LP: #963685 * usermodehelper: kill umh_wait, renumber UMH_* constants - LP: #963685 * usermodehelper: call_usermodehelper() doesn't need do_exit() - LP: #963685 * kmod: introduce call_modprobe() helper - LP: #963685 * kmod: make __request_module() killable - LP: #963685 * x86, tsc: Fix SMI induced variation in quick_pit_calibrate() - LP: #965586 * ata_piix: Add Toshiba Satellite Pro A120 to the quirks list due to broken suspend functionality. - LP: #886850 * ACPICA: Fix regression in FADT revision checks - LP: #883441 * ASPM: Fix pcie devices with non-pcie children - LP: #961482 * USB: option: Add MediaTek MT6276M modem&app interfaces - LP: #971808 * USB: option driver: adding support for Telit CC864-SINGLE, CC864-DUAL and DE910-DUAL modems - LP: #971808 * USB: option: make interface blacklist work again - LP: #971808 * USB: option: add ZTE MF820D - LP: #971808 * USB: ftdi_sio: fix problem when the manufacture is a NULL string - LP: #971808 * USB: ftdi_sio: add support for BeagleBone rev A5+ - LP: #971808 * USB: Microchip VID mislabeled as Hornby VID in ftdi_sio. - LP: #971808 * USB: ftdi_sio: new PID: Distortec JTAG-lock-pick - LP: #971808 * USB: ftdi_sio: add support for FT-X series devices - LP: #971808 * USB: ftdi_sio: new PID: LUMEL PD12 - LP: #971808 * powerpc/usb: fix bug of kernel hang when initializing usb - LP: #971808 * usb: musb: Reselect index reg in interrupt context - LP: #971808 * usb: gadgetfs: return number of bytes on ep0 read request - LP: #971808 * USB: gadget: Make g_hid device class conform to spec. - LP: #971808 * futex: Cover all PI opcodes with cmpxchg enabled check - LP: #971808 * sysfs: Fix memory leak in sysfs_sd_setsecdata(). - LP: #971808 * tty: moxa: fix bit test in moxa_start() - LP: #971808 * TTY: Wrong unicode value copied in con_set_unimap() - LP: #971808 * USB: serial: fix console error reporting - LP: #971808 * cdc-wdm: Fix more races on the read path - LP: #971808 * cdc-wdm: Don't clear WDM_READ unless entire read buffer is emptied - LP: #971808 * usb: fsl_udc_core: Fix scheduling while atomic dump message - LP: #971808 * usb: Fix build error due to dma_mask is not at pdev_archdata at ARM - LP: #971808 * USB: qcserial: add several new serial devices - LP: #971808 * USB: qcserial: don't grab QMI port on Gobi 1000 devices - LP: #971808 * usb-serial: Add support for the Sealevel SeaLINK+8 2038-ROHS device - LP: #971808 * usb: cp210x: Update to support CP2105 and multiple interface devices - LP: #971808 * USB: serial: mos7840: Fixed MCS7820 device attach problem - LP: #971808 * rt2x00: Add support for D-Link DWA-127 to rt2800usb. - LP: #971808 * rtlwifi: Handle previous allocation failures when freeing device memory - LP: #971808 * rtlwifi: rtl8192c: Prevent sleeping from invalid context in rtl8192cu - LP: #971808 * rtlwifi: rtl8192ce: Fix loss of receive performance - LP: #971808 * math: Introduce div64_long - LP: #971808 * ntp: Fix integer overflow when setting time - LP: #971808 * uevent: send events in correct order according to seqnum (v3) - LP: #971808 * genirq: Fix long-term regression in genirq irq_set_irq_type() handling - LP: #971808 * genirq: Fix incorrect check for forced IRQ thread handler - LP: #971808 * rtc: Disable the alarm in the hardware (v2) - LP: #971808 * p54spi: Release GPIO lines and IRQ on error in
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-mvl-dove (Ubuntu Maverick) Status: Fix Committed => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
This bug was fixed in the package linux-ec2 - 2.6.32-345.47 --- linux-ec2 (2.6.32-345.47) lucid-proposed; urgency=low [ Stefan Bader ] * Rebase to Ubuntu-2.6.32-41.88 * Release Tracking Bug - LP: #968780 [ Ubuntu: 2.6.32-41.88 ] * [Config] restore build-% shortcut * SAUCE: ubuntu drivers: use UMH_WAIT_PROC consistently - LP: #963685 * Revert "Revert "USB: xhci - fix unsafe macro definitions"" - LP: #948139 * Revert "Revert "USB: xhci - fix math in xhci_get_endpoint_interval()"" - LP: #948139 * Revert "Revert "xhci: Fix full speed bInterval encoding."" - LP: #948139 * bsg: fix sysfs link remove warning - LP: #946928 * hwmon: (f75375s) Fix bit shifting in f75375_write16 - LP: #948139 * lib: proportion: lower PROP_MAX_SHIFT to 32 on 64-bit kernel - LP: #948139 * relay: prevent integer overflow in relay_open() - LP: #948139 * mac80211: timeout a single frame in the rx reorder buffer - LP: #948139 * kernel.h: fix wrong usage of __ratelimit() - LP: #948139 * printk_ratelimited(): fix uninitialized spinlock - LP: #948139 * hwmon: (f75375s) Fix automatic pwm mode setting for F75373 & F75375 - LP: #948139 * crypto: sha512 - Use binary and instead of modulus - LP: #948139 * crypto: sha512 - Avoid stack bloat on i386 - LP: #948139 * crypto: sha512 - use standard ror64() - LP: #948139 * SCSI: 3w-9xxx fix bug in sgl loading - LP: #948139 * ARM: 7321/1: cache-v7: Disable preemption when reading CCSIDR - LP: #948139 * ARM: 7325/1: fix v7 boot with lockdep enabled - LP: #948139 * USB: Added Kamstrup VID/PIDs to cp210x serial driver. - LP: #948139 * USB: Fix handoff when BIOS disables host PCI device. - LP: #948139 * xhci: Fix encoding for HS bulk/control NAK rate. - LP: #948139 * hdpvr: fix race conditon during start of streaming - LP: #948139 * cdrom: use copy_to_user() without the underscores - LP: #948139 * autofs: work around unhappy compat problem on x86-64 - LP: #948139 * Fix autofs compile without CONFIG_COMPAT - LP: #948139 * compat: fix compile breakage on s390 - LP: #948139 * PM: Print a warning if firmware is requested when tasks are frozen - LP: #948139 * firmware loader: allow builtin firmware load even if usermodehelper is disabled - LP: #948139 * PM / Sleep: Fix freezer failures due to racy usermodehelper_is_disabled() - LP: #948139 * PM / Sleep: Fix read_unlock_usermodehelper() call. - LP: #948139 * Linux 2.6.32.58 - LP: #948139 * regset: Prevent null pointer reference on readonly regsets - LP: #949905 - CVE-2012-1097 * regset: Return -EFAULT, not -EIO, on host-side memory fault - LP: #949905 - CVE-2012-1097 * KVM: Remove ability to assign a device without iommu support - LP: #897812 - CVE-2011-4347 * eCryptfs: Copy up lower inode attrs after setting lower xattr * eCryptfs: Improve statfs reporting - LP: #885744 * drm/i915: no lvds quirk for AOpen MP45 - LP: #955078 * drm/radeon/kms: fix MSI re-arm on rv370+ - LP: #955078 * Linux 2.6.32.58+drm33.24 - LP: #955078 * KVM: x86: extend "struct x86_emulate_ops" with "get_cpuid" - LP: #917842 - CVE-2012-0045 * KVM: x86: fix missing checks in syscall emulation - LP: #917842 - CVE-2012-0045 * eCryptfs: Clear ECRYPTFS_NEW_FILE flag during truncate - LP: #745836 * compat: Re-add missing asm/compat.h include to fix compile breakage on s390 - LP: #959252 * IA64: Remove COMPAT_IA32 support - LP: #959252 * writeback: fixups for !dirty_writeback_centisecs - LP: #959252 * KEYS: Enable the compat keyctl wrapper on s390x - LP: #959252 * cifs: fix dentry refcount leak when opening a FIFO on lookup - LP: #959252 * net/usbnet: avoid recursive locking in usbnet_stop() - LP: #959252 * watchdog: hpwdt: clean up set_memory_x call for 32 bit - LP: #959252 * blkfront: Fix backtrace in del_gendisk - LP: #959252 * Linux 2.6.32.59 - LP: #959252 * USB: EHCI: go back to using the system clock for QH unlinks - LP: #624510 * kmod: fix resource leak in call_usermodehelper_pipe() - LP: #963685 * kmod: add init function to usermodehelper - LP: #963685 * usermodehelper: use UMH_WAIT_PROC consistently - LP: #963685 * usermodehelper: introduce umh_complete(sub_info) - LP: #963685 * usermodehelper: implement UMH_KILLABLE - LP: #963685 * usermodehelper: kill umh_wait, renumber UMH_* constants - LP: #963685 * usermodehelper: call_usermodehelper() doesn't need do_exit() - LP: #963685 * kmod: introduce call_modprobe() helper - LP: #963685 * kmod: make __request_module() killable - LP: #963685 -- Stefan BaderFri, 30 Mar 2012 13:34:20 +0200 ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you a
[Bug 949905] Re: CVE-2012-1097
This bug was fixed in the package linux - 2.6.32-41.88 --- linux (2.6.32-41.88) lucid-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #966443 [ Andy Whitcroft ] * [Config] restore build-% shortcut [ Tim Gardner ] * SAUCE: ubuntu drivers: use UMH_WAIT_PROC consistently - LP: #963685 [ Upstream Kernel Changes ] * Revert "Revert "USB: xhci - fix unsafe macro definitions"" - LP: #948139 * Revert "Revert "USB: xhci - fix math in xhci_get_endpoint_interval()"" - LP: #948139 * Revert "Revert "xhci: Fix full speed bInterval encoding."" - LP: #948139 * bsg: fix sysfs link remove warning - LP: #946928 * hwmon: (f75375s) Fix bit shifting in f75375_write16 - LP: #948139 * lib: proportion: lower PROP_MAX_SHIFT to 32 on 64-bit kernel - LP: #948139 * relay: prevent integer overflow in relay_open() - LP: #948139 * mac80211: timeout a single frame in the rx reorder buffer - LP: #948139 * kernel.h: fix wrong usage of __ratelimit() - LP: #948139 * printk_ratelimited(): fix uninitialized spinlock - LP: #948139 * hwmon: (f75375s) Fix automatic pwm mode setting for F75373 & F75375 - LP: #948139 * crypto: sha512 - Use binary and instead of modulus - LP: #948139 * crypto: sha512 - Avoid stack bloat on i386 - LP: #948139 * crypto: sha512 - use standard ror64() - LP: #948139 * SCSI: 3w-9xxx fix bug in sgl loading - LP: #948139 * ARM: 7321/1: cache-v7: Disable preemption when reading CCSIDR - LP: #948139 * ARM: 7325/1: fix v7 boot with lockdep enabled - LP: #948139 * USB: Added Kamstrup VID/PIDs to cp210x serial driver. - LP: #948139 * USB: Fix handoff when BIOS disables host PCI device. - LP: #948139 * xhci: Fix encoding for HS bulk/control NAK rate. - LP: #948139 * hdpvr: fix race conditon during start of streaming - LP: #948139 * cdrom: use copy_to_user() without the underscores - LP: #948139 * autofs: work around unhappy compat problem on x86-64 - LP: #948139 * Fix autofs compile without CONFIG_COMPAT - LP: #948139 * compat: fix compile breakage on s390 - LP: #948139 * PM: Print a warning if firmware is requested when tasks are frozen - LP: #948139 * firmware loader: allow builtin firmware load even if usermodehelper is disabled - LP: #948139 * PM / Sleep: Fix freezer failures due to racy usermodehelper_is_disabled() - LP: #948139 * PM / Sleep: Fix read_unlock_usermodehelper() call. - LP: #948139 * Linux 2.6.32.58 - LP: #948139 * regset: Prevent null pointer reference on readonly regsets - LP: #949905 - CVE-2012-1097 * regset: Return -EFAULT, not -EIO, on host-side memory fault - LP: #949905 - CVE-2012-1097 * KVM: Remove ability to assign a device without iommu support - LP: #897812 - CVE-2011-4347 * eCryptfs: Copy up lower inode attrs after setting lower xattr * eCryptfs: Improve statfs reporting - LP: #885744 * drm/i915: no lvds quirk for AOpen MP45 - LP: #955078 * drm/radeon/kms: fix MSI re-arm on rv370+ - LP: #955078 * Linux 2.6.32.58+drm33.24 - LP: #955078 * KVM: x86: extend "struct x86_emulate_ops" with "get_cpuid" - LP: #917842 - CVE-2012-0045 * KVM: x86: fix missing checks in syscall emulation - LP: #917842 - CVE-2012-0045 * eCryptfs: Clear ECRYPTFS_NEW_FILE flag during truncate - LP: #745836 * compat: Re-add missing asm/compat.h include to fix compile breakage on s390 - LP: #959252 * IA64: Remove COMPAT_IA32 support - LP: #959252 * writeback: fixups for !dirty_writeback_centisecs - LP: #959252 * KEYS: Enable the compat keyctl wrapper on s390x - LP: #959252 * cifs: fix dentry refcount leak when opening a FIFO on lookup - LP: #959252 * net/usbnet: avoid recursive locking in usbnet_stop() - LP: #959252 * watchdog: hpwdt: clean up set_memory_x call for 32 bit - LP: #959252 * blkfront: Fix backtrace in del_gendisk - LP: #959252 * Linux 2.6.32.59 - LP: #959252 * USB: EHCI: go back to using the system clock for QH unlinks - LP: #624510 * kmod: fix resource leak in call_usermodehelper_pipe() - LP: #963685 * kmod: add init function to usermodehelper - LP: #963685 * usermodehelper: use UMH_WAIT_PROC consistently - LP: #963685 * usermodehelper: introduce umh_complete(sub_info) - LP: #963685 * usermodehelper: implement UMH_KILLABLE - LP: #963685 * usermodehelper: kill umh_wait, renumber UMH_* constants - LP: #963685 * usermodehelper: call_usermodehelper() doesn't need do_exit() - LP: #963685 * kmod: introduce call_modprobe() helper - LP: #963685 * kmod: make __request_module() killable - LP: #963685 -- Luis HenriquesTue, 27 Mar 2012 19:44:59 +0100 ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you
[Bug 949905] Re: CVE-2012-1097
This bug was fixed in the package linux-lts-backport-natty - 2.6.38-14.58~lucid1 --- linux-lts-backport-natty (2.6.38-14.58~lucid1) lucid-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #967823 [ Andy Whitcroft ] * [Config] restore build-% shortcut [ Upstream Kernel Changes ] * eCryptfs: Make truncate path killable - LP: #947270 * bsg: fix sysfs link remove warning - LP: #946928 * regset: Prevent null pointer reference on readonly regsets - LP: #949905 - CVE-2012-1097 * regset: Return -EFAULT, not -EIO, on host-side memory fault - LP: #949905 - CVE-2012-1097 * mm: memcg: Correct unregistring of events attached to the same eventfd - LP: #952828 - CVE-2012-1146 * KVM: Remove ability to assign a device without iommu support - LP: #897812 - CVE-2011-4347 * eCryptfs: Copy up lower inode attrs after setting lower xattr * eCryptfs: Handle failed metadata read in lookup - LP: #509180 * eCryptfs: Improve statfs reporting - LP: #885744 * KVM: x86: extend "struct x86_emulate_ops" with "get_cpuid" - LP: #917842 - CVE-2012-0045 * KVM: x86: fix missing checks in syscall emulation - LP: #917842 - CVE-2012-0045 -- Luis HenriquesThu, 29 Mar 2012 12:04:36 +0100 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
This bug was fixed in the package linux-lts-backport-maverick - 2.6.35-32.68~lucid1 --- linux-lts-backport-maverick (2.6.35-32.68~lucid1) lucid-proposed; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #967068 [ Andy Whitcroft ] * [Config] restore build-% shortcut [ Upstream Kernel Changes ] * bsg: fix sysfs link remove warning - LP: #946928 * regset: Prevent null pointer reference on readonly regsets - LP: #949905 - CVE-2012-1097 * regset: Return -EFAULT, not -EIO, on host-side memory fault - LP: #949905 - CVE-2012-1097 * mm: memcg: Correct unregistring of events attached to the same eventfd - LP: #952828 - CVE-2012-1146 * KVM: Remove ability to assign a device without iommu support - LP: #897812 - CVE-2011-4347 * KVM: x86: extend "struct x86_emulate_ops" with "get_cpuid" - LP: #917842 - CVE-2012-0045 * KVM: x86: fix missing checks in syscall emulation - LP: #917842 - CVE-2012-0045 * eCryptfs: Clear ECRYPTFS_NEW_FILE flag during truncate - LP: #745836 -- Luis HenriquesWed, 28 Mar 2012 16:24:53 +0100 ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-4347 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-0045 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-1146 ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Branch linked: lp:ubuntu/maverick-proposed/linux-mvl-dove -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-oneiric -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4 ** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4 ** Branch linked: lp:ubuntu/natty-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-maverick -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux (Ubuntu Oneiric) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Maverick) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Natty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Branch linked: lp:ubuntu/linux-lowlatency -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
** Branch linked: lp:ubuntu/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1408.11 --- linux-ti-omap4 (3.2.0-1408.11) precise; urgency=low [ Paolo Pisati ] * rebased on 3.2.0-18.29 * [Config] drop SECURITY_APPARMOR_COMPAT_24 (updateconfigs) [ Ubuntu: 3.2.0-18.29 ] * [Config] restore build-% shortcut * SAUCE: ata_piix: defer disks to the Hyper-V drivers by default - LP: #929545, #942316 * SAUCE: drm: give up on edid retries when i2c bus is not responding - LP: #855124 * SAUCE: (drop after 3.3) platform/x86: Add driver for Apple gmux device - LP: #925544 * bsg: fix sysfs link remove warning - LP: #946928 * regset: Prevent null pointer reference on readonly regsets - LP: #949905 - CVE-2012-1097 * regset: Return -EFAULT, not -EIO, on host-side memory fault - LP: #949905 - CVE-2012-1097 * SAUCE: (drop after 3.4) ALSA: hda - add id for Atom Cedar Trail HDMI codec [ Ubuntu: 3.2.0-18.28 ] * ubuntu: AUFS -- adapt to the new changelog handling * ubuntu: AUFS -- sort out the relative header paths * ubuntu: AUFS -- update to d266b0c5d0693d6383976ee54b9e2c0fa9a3f5b0 * SAUCE: (drop after 3.3) HID: hid-magicmouse: Add pointer and buttonpad properties for Magic Trackpad * SAUCE: Input: synaptics - add second variant of two-button clickpad * SAUCE: Input: synapticss - Set buttonpad property for all clickpads * SAUCE: iwlwifi: fix key removal - LP: #911059 * Revert "SAUCE: AppArmor: Fix unpack of network tables." * Revert "SAUCE: AppArmor: Allow dfa backward compatibility with broken userspace" * SAUCE: AppArmor: Add mising end of structure test to caps unpacking * SAUCE: AppArmor: Fix dropping of allowed operations that are force audited * SAUCE: AppArmor: Fix underflow in xindex calculation * SAUCE: AppArmor: fix mapping of META_READ to audit and quiet flags * SAUCE: AppArmor: Fix the error case for chroot relative path name lookup - LP: #925028 * SAUCE: AppArmor: Retrieve the dentry_path for error reporting when path lookup fails - LP: #925028 * SAUCE: AppArmor: Minor cleanup of d_namespace_path to consolidate error handling * SAUCE: AppArmor: Update dfa matching routines. * SAUCE: AppArmor: Move path failure information into aa_get_name and rename * SAUCE: AppArmor: Make chroot relative the default path lookup type * SAUCE: AppArmor: Add ability to load extended policy * SAUCE: AppArmor: basic networking rules * SAUCE: AppArmor: Add profile introspection file to interface * SAUCE: AppArmor: Add the ability to mediate mount * SAUCE: AppArmor: Add mount information to apparmorfs * SAUCE: AppArmor: refactor securityfs to use structures * SAUCE: AppArmor: add initial "features" directory to securityfs * SAUCE: AppArmor: add "file" details to securityfs * SAUCE: AppArmor: export known rlimit names/value mappings in securityfs * Revert "[Config] Enable CONFIG_NVRAM=m" - LP: #942193 * Rebase to v3.2.7 * [Config] Enable CONFIG_USB_SERIAL_QUATECH2=m on arm and powerpc * [Config] Enable CONFIG_USB_SERIAL_QUATECH_USB2=m on arm and powerpc * [Config] Add CONFIG_NVRAM to config enforcer - LP: #942193 * [Config] Enable CONFIG_SCSI_IBMVSCSI=m for powerpc - LP: #943090 * [Config] Enable CONFIG_SCSI_IPR=m for powerpc - LP: #943090 * provide ipmi udeb - LP: #942926 * Rebase to v3.2.9 * Add ibmveth to d-i/modules-powerpc/nic-modules - LP: #712188 * [Config] Enable CONFIG_SCSI_IBMVFC=m for powerpc - LP: #712188 * Add ibmvfc and ibmvscsic to d-i/modules-powerpc/nic-modules - LP: #712188 * SAUCE: ALSA: hda - Add Lynx Point HD Audio Controller DeviceIDs - LP: #900119 * SAUCE: ahci: AHCI-mode SATA patch for Intel Lynx Point DeviceIDs - LP: #900119 * SAUCE: ata_piix: IDE-mode SATA patch for Intel Lynx Point DeviceIDs - LP: #900119 * SAUCE: i2c-i801: Add device IDs for Intel Lynx Point - LP: #900119 * [Config] updateconfigs after apparmor patches * [Config] Added hv_netvsc and hv_storvsc to -virtual - LP: #942256 * [Config] Enable aufs - LP: #943119 * Revert "Revert "ath9k_hw: fix interpretation of the rx KeyMiss flag"" * Revert "AppArmor: compatibility patch for v5 interface" * Revert "AppArmor: compatibility patch for v5 network controll" * ACPI / PM: Do not save/restore NVS on Asus K54C/K54HR - LP: #898503 * rebase to v3.2.9 - LP: #900802 * rebase to v3.2.8 * rebase to v3.2.7 - LP: #930842 -- Paolo PisatiMon, 12 Mar 2012 11:18:37 +0100 ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@list
[Bug 949905] Re: CVE-2012-1097
** Changed in: linux-ec2 (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-ec2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Maverick) Status: New => Fix Committed ** Changed in: linux-mvl-dove (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Natty) Status: New => Invalid ** Changed in: linux (Ubuntu Oneiric) Status: New => Fix Committed ** Changed in: linux (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux (Ubuntu Maverick) Status: New => Fix Committed ** Changed in: linux (Ubuntu Natty) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: New => Fix Committed ** Changed in: linux-fsl-imx51 (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-fsl-imx51 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Natty) Status: New => Invalid ** Description changed: - Placeholder + regset: Prevent null pointer reference on readonly regsets + + Break-Fix: bdf88217b70dbb18c4ee27a6c497286e040a6705 c8e252586f8d5de906385d8cf6385fee289a825e + Break-Fix: bdf88217b70dbb18c4ee27a6c497286e040a6705 5189fa19a4b2b4c3bec37c3a019d446148827717 ** Changed in: linux-ec2 (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux-ec2 (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-ec2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-ec2 (Ubuntu Hardy) Importance: Undecided => Medium ** Changed in: linux-ec2 (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Maverick) Importance: Undecided => Medium ** Changed in: linux-ec2 (Ubuntu Natty) Importance: Undecided => Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Importance: Undecided => Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick) Importance: Undecided => M
[Bug 949905] Re: CVE-2012-1097
This bug was fixed in the package linux - 3.2.0-18.29 --- linux (3.2.0-18.29) precise; urgency=low [ Andy Whitcroft ] * [Config] restore build-% shortcut * SAUCE: ata_piix: defer disks to the Hyper-V drivers by default - LP: #929545, #942316 [ Eugeni Dodonov ] * SAUCE: drm: give up on edid retries when i2c bus is not responding - LP: #855124 [ Seth Forshee ] * SAUCE: (drop after 3.3) platform/x86: Add driver for Apple gmux device - LP: #925544 [ Upstream Kernel Changes ] * bsg: fix sysfs link remove warning - LP: #946928 * regset: Prevent null pointer reference on readonly regsets - LP: #949905 - CVE-2012-1097 * regset: Return -EFAULT, not -EIO, on host-side memory fault - LP: #949905 - CVE-2012-1097 [ Wu Fengguang ] * SAUCE: (drop after 3.4) ALSA: hda - add id for Atom Cedar Trail HDMI codec -- Leann OgasawaraFri, 09 Mar 2012 07:56:11 -0800 ** Changed in: linux (Ubuntu Precise) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 949905] Re: CVE-2012-1097
CVE-2012-1097 ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Hardy) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Precise) Assignee: (unassigned) => Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs