[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Also affects: linux (Ubuntu Xenial) Importance: Medium Assignee: Steve Conklin (sconklin) Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-manta (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Also affects: linux (Ubuntu Wily) Importance: Medium Assignee: Steve Conklin (sconklin) Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-manta (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-flo (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Wily) Importance: Medium Status: Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-vivid (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Importance: Undecided = Medium ** Changed in: linux-lts-vivid (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quantal (Ubuntu Lucid) ** No longer affects: linux-mvl-dove (Ubuntu Lucid) ** No longer affects: linux-ti-omap4 (Ubuntu Lucid) ** No longer affects: linux (Ubuntu Lucid) ** No longer affects: linux-mako (Ubuntu Lucid) ** No longer affects: linux-fsl-imx51 (Ubuntu Lucid) ** No longer affects: linux-lts-utopic (Ubuntu Lucid) ** No longer affects: linux-flo (Ubuntu Lucid) ** No longer affects: linux-lts-raring (Ubuntu Lucid) ** No longer affects: linux-manta (Ubuntu Lucid) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-goldfish (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-goldfish (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-goldfish (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-goldfish (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-goldfish (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-flo (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-flo (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-flo (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-flo (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-flo (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-mako (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-mako (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-mako (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-mako (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-mako (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-manta (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-manta (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-manta (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-manta (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-manta (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Utopic) Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-lts-utopic (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-lts-utopic (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-lts-utopic (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Utopic) Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Also affects: linux (Ubuntu Vivid) Importance: Medium Assignee: Steve Conklin (sconklin) Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Vivid) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** No longer affects: linux-armadaxp (Ubuntu Saucy) ** No longer affects: linux-ec2 (Ubuntu Saucy) ** No longer affects: linux-lts-saucy (Ubuntu Saucy) ** No longer affects: linux-lts-quantal (Ubuntu Saucy) ** No longer affects: linux-mvl-dove (Ubuntu Saucy) ** No longer affects: linux (Ubuntu Saucy) ** No longer affects: linux-fsl-imx51 (Ubuntu Saucy) ** No longer affects: linux-ti-omap4 (Ubuntu Saucy) ** No longer affects: linux-lts-raring (Ubuntu Saucy) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** No longer affects: linux-armadaxp (Ubuntu Quantal) ** No longer affects: linux-ec2 (Ubuntu Quantal) ** No longer affects: linux-lts-saucy (Ubuntu Quantal) ** No longer affects: linux-lts-quantal (Ubuntu Quantal) ** No longer affects: linux-mvl-dove (Ubuntu Quantal) ** No longer affects: linux (Ubuntu Quantal) ** No longer affects: linux-fsl-imx51 (Ubuntu Quantal) ** No longer affects: linux-ti-omap4 (Ubuntu Quantal) ** No longer affects: linux-lts-raring (Ubuntu Quantal) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Also affects: linux (Ubuntu Utopic) Importance: Medium Assignee: Steve Conklin (sconklin) Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Utopic) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** No longer affects: linux-armadaxp (Ubuntu Raring) ** No longer affects: linux-ec2 (Ubuntu Raring) ** No longer affects: linux-lts-saucy (Ubuntu Raring) ** No longer affects: linux-lts-quantal (Ubuntu Raring) ** No longer affects: linux-mvl-dove (Ubuntu Raring) ** No longer affects: linux (Ubuntu Raring) ** No longer affects: linux-fsl-imx51 (Ubuntu Raring) ** No longer affects: linux-ti-omap4 (Ubuntu Raring) ** No longer affects: linux-lts-raring (Ubuntu Raring) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
This bug was fixed in the package linux-ec2 - 2.6.32-359.72 --- linux-ec2 (2.6.32-359.72) lucid-proposed; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-54.116 * Release Tracking Bug - LP: #1250690 [ Ubuntu: 2.6.32-54.116 ] * SAUCE: ACPI battery: fix compiler warning - LP: #1247154 * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * uml: check length in exitcode_proc_write() - LP: #1249271 - CVE-2013-4512 -- Stefan Bader stefan.ba...@canonical.com Wed, 13 Nov 2013 11:07:53 +0100 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
This bug was fixed in the package linux - 2.6.32-54.116 --- linux (2.6.32-54.116) lucid; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1250592 [ Luis Henriques ] * SAUCE: ACPI battery: fix compiler warning - LP: #1247154 [ Upstream Kernel Changes ] * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * uml: check length in exitcode_proc_write() - LP: #1249271 - CVE-2013-4512 -- Steve Conklin sconk...@canonical.com Tue, 12 Nov 2013 12:09:35 -0600 ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-4512 ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
This bug was fixed in the package linux - 2.6.32-54.116 --- linux (2.6.32-54.116) lucid; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1250592 [ Luis Henriques ] * SAUCE: ACPI battery: fix compiler warning - LP: #1247154 [ Upstream Kernel Changes ] * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * uml: check length in exitcode_proc_write() - LP: #1249271 - CVE-2013-4512 -- Steve Conklin sconk...@canonical.com Tue, 12 Nov 2013 12:09:35 -0600 ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
This bug was fixed in the package linux-ec2 - 2.6.32-359.72 --- linux-ec2 (2.6.32-359.72) lucid-proposed; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-54.116 * Release Tracking Bug - LP: #1250690 [ Ubuntu: 2.6.32-54.116 ] * SAUCE: ACPI battery: fix compiler warning - LP: #1247154 * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * uml: check length in exitcode_proc_write() - LP: #1249271 - CVE-2013-4512 -- Stefan Bader stefan.ba...@canonical.com Wed, 13 Nov 2013 11:07:53 +0100 ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-saucy (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Saucy) Importance: Undecided = Medium ** Changed in: linux-lts-saucy (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-lts-saucy (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-lts-saucy (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Quantal) Importance: Undecided = Medium ** Changed in: linux-lts-saucy (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-lts-saucy (Ubuntu Raring) Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-ec2 (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux (Ubuntu Lucid) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Also affects: linux (Ubuntu Trusty) Importance: Medium Assignee: Steve Conklin (sconklin) Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Trusty) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** No longer affects: linux-armadaxp (Ubuntu Hardy) ** No longer affects: linux-armadaxp (Ubuntu Oneiric) ** No longer affects: linux-ec2 (Ubuntu Hardy) ** No longer affects: linux-ec2 (Ubuntu Oneiric) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Oneiric) ** No longer affects: linux-lts-backport-natty (Ubuntu Hardy) ** No longer affects: linux-lts-backport-natty (Ubuntu Oneiric) ** No longer affects: linux-lts-quantal (Ubuntu Hardy) ** No longer affects: linux-lts-quantal (Ubuntu Oneiric) ** No longer affects: linux-mvl-dove (Ubuntu Hardy) ** No longer affects: linux-mvl-dove (Ubuntu Oneiric) ** No longer affects: linux-lts-backport-maverick (Ubuntu Hardy) ** No longer affects: linux-lts-backport-maverick (Ubuntu Oneiric) ** No longer affects: linux (Ubuntu Hardy) ** No longer affects: linux (Ubuntu Oneiric) ** No longer affects: linux-fsl-imx51 (Ubuntu Hardy) ** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric) ** No longer affects: linux-ti-omap4 (Ubuntu Hardy) ** No longer affects: linux-ti-omap4 (Ubuntu Oneiric) ** No longer affects: linux-lts-raring (Ubuntu Hardy) ** No longer affects: linux-lts-raring (Ubuntu Oneiric) ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-raring (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-lts-raring (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Saucy) Importance: Undecided = Medium ** Changed in: linux-lts-raring (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Quantal) Importance: Undecided = Medium ** Changed in: linux-lts-raring (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-lts-raring (Ubuntu Raring) Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Also affects: linux (Ubuntu Saucy) Importance: Medium Assignee: Steve Conklin (sconklin) Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Saucy) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-armadaxp (Ubuntu Raring) Status: Fix Released = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Description changed: The KVM implementation in the Linux kernel before 3.3.4 does not properly manage the relationships between memory slots and the iommu, - which allows guest OS users to cause a denial of service (host OS crash) - by leveraging administrative access to the guest OS to conduct hotunplug - and hotplug operations on devices. + which allows guest OS users to cause a denial of service (memory leak + and host OS crash) by leveraging administrative access to the guest OS + to conduct hotunplug and hotplug operations on devices. Break-Fix: - 32f6daad4651a748a58a3ab6da0611862175722f -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** No longer affects: linux-armadaxp (Ubuntu Natty) ** No longer affects: linux-ec2 (Ubuntu Natty) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Natty) ** No longer affects: linux-lts-backport-natty (Ubuntu Natty) ** No longer affects: linux-lts-quantal (Ubuntu Natty) ** No longer affects: linux-mvl-dove (Ubuntu Natty) ** No longer affects: linux-lts-backport-maverick (Ubuntu Natty) ** No longer affects: linux (Ubuntu Natty) ** No longer affects: linux-fsl-imx51 (Ubuntu Natty) ** No longer affects: linux-ti-omap4 (Ubuntu Natty) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Also affects: linux (Ubuntu Raring) Importance: Medium Assignee: Steve Conklin (sconklin) Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Raring) Importance: Medium Status: Fix Released ** Also affects: linux-lts-quantal (Ubuntu Raring) Importance: Undecided Status: New ** Changed in: linux-lts-quantal (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Raring) Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-lts-quantal (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-quantal (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Oneiric) Importance: Undecided = Medium ** Changed in: linux-lts-quantal (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-lts-quantal (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Hardy) Importance: Undecided = Medium ** Changed in: linux-lts-quantal (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Quantal) Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
Patch 32f6daad4651a748a58a3ab6da0611862175722f already in upstream 3.5 ** Changed in: linux-armadaxp (Ubuntu Quantal) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: Fix Committed = Invalid ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Branch linked: lp:ubuntu/natty-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1211.23 --- linux-ti-omap4 (3.0.0-1211.23) oneiric-proposed; urgency=low * Release Tracking Bug - LP: #1005455 [ Paolo Pisati ] * rebased on Ubuntu-3.0.0-21.35 [ Ubuntu: 3.0.0-21.35 ] * Release Tracking Bug - LP: #1004571 * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 * SAUCE: async_populate_rootfs: fix build warnings - LP: #1003417 * Revert SAUCE: ite-cir: postpone ISR registration - LP: #1002880 * [Config] perarch and indep tools builds need separate build directories * Revert autofs: work around unhappy compat problem on x86-64 - LP: #996109 * Revert usb: Fix build error due to dma_mask is not at pdev_archdata at ARM - LP: #996109 * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * NFSv4: include bitmap in nfsv4 get acl data - LP: #893147 - CVE-2011-4131 * hugepages: fix use after free bug in quota handling - LP: #990368 - CVE-2012-2133 * nfs: Enclose hostname in brackets when needed in nfs_do_root_mount - LP: #996109 * NFSv4: Ensure that the LOCK code sets exception-inode - LP: #996109 * NFSv4: Ensure that we check lock exclusive/shared type against open modes - LP: #996109 * x86, apic: APIC code touches invalid MSR on P5 class machines - LP: #996109 * xen: correctly check for pending events when restoring irq flags - LP: #996109 * xen/smp: Fix crash when booting with ACPI hotplug CPUs. - LP: #996109 * ASoC: dapm: Ensure power gets managed for line widgets - LP: #996109 * dmaengine: at_hdmac: remove clear-on-read in atc_dostart() - LP: #996109 * hwmon: fam15h_power: fix bogus values with current BIOSes - LP: #996109 * hwmon: (fam15h_power) Fix pci_device_id array - LP: #996109 * drm/i915: handle input/output sdvo timings separately in mode_set - LP: #996109 * drm/i915: fix integer overflow in i915_gem_execbuffer2() - LP: #996109 * drm/i915: fix integer overflow in i915_gem_do_execbuffer() - LP: #996109 * nl80211: ensure interface is up in various APIs - LP: #996109 * EHCI: fix criterion for resuming the root hub - LP: #996109 * brcm80211: smac: resume transmit fifo upon receiving frames - LP: #996109 * Fix modpost failures in fedora 17 - LP: #996109 * mmc: unbreak sdhci-esdhc-imx on i.MX25 - LP: #996109 * nfsd: fix b0rken error value for setattr on read-only mount - LP: #996109 * nfsd: fix error values returned by nfsd4_lockt() when nfsd_open() fails - LP: #996109 * USB: cdc-wdm: fix race leading leading to memory corruption - LP: #996109 * USB: EHCI: fix crash during suspend on ASUS computers - LP: #996109 * USB: gadget: storage gadgets send wrong error code for unknown commands - LP: #996109 * usb gadget: uvc: uvc_request_data::length field must be signed - LP: #996109 * pipes: add a packetized pipe mode for writing - LP: #996109 * autofs: make the autofsv5 packet file descriptor use a packetized pipe - LP: #996109 * ARM: 7403/1: tls: remove covert channel via TPIDRURW - LP: #996109 * SCSI: libsas: fix sas_find_bcast_phy() in the presence of 'vacant' phys - LP: #996109 * SCSI: libsas: fix false positive 'device attached' conditions - LP: #996109 * efi: Add new variable attributes - LP: #996109 * efivars: String functions - LP: #996109 * efivars: fix warnings when CONFIG_PSTORE=n - LP: #996109 * efi: Validate UEFI boot variables - LP: #996109 * efivars: Improve variable validation - LP: #996109 * hwmon: (coretemp) Increase CPU core limit - LP: #996109 * hwmon: (coretemp) fix oops on cpu unplug - LP: #996109 * libata: skip old error history when counting probe trials - LP: #996109 * i2c: pnx: Disable clk in suspend - LP: #996109 * ipw2200: Fix race condition in the command completion acknowledge - LP: #996109 * mac80211: fix AP mode EAP tx for VLAN stations - LP: #996109 * rtlwifi: Fix oops on unload - LP: #996109 * wl1251: fix crash on remove due to premature kfree - LP: #996109 * wl1251: fix crash on remove due to leftover work item - LP: #996109 * sched: Fix nohz load accounting -- again! - LP: #996109 * hfsplus: Fix potential buffer overflows - LP: #996109 * Linux 3.0.31 - LP: #996109 * smsc95xx: mark link down on startup and let PHY interrupt deal with carrier changes - LP: #1002880 * xen/pte: Fix crashes when trying to see non-existent PGD/PMD/PUD/PTEs - LP: #1002880 * xen/pci: don't use PCI BIOS service for configuration space accesses - LP: #1002880 * percpu, x86: don't use PMD_SIZE as embedded atom_size on 32bit - LP: #1002880 * asm-generic: Use __BITS_PER_LONG in statfs.h - LP: #1002880 * Fix __read_seqcount_begin() to use ACCESS_ONCE for sequence value
[Bug 987569] Re: CVE-2012-2121
This bug was fixed in the package linux - 3.0.0-21.35 --- linux (3.0.0-21.35) oneiric-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1004571 [ Andy Whitcroft ] * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 [ Herton Ronaldo Krzesinski ] * SAUCE: async_populate_rootfs: fix build warnings - LP: #1003417 [ Tim Gardner ] * Revert SAUCE: ite-cir: postpone ISR registration - LP: #1002880 * [Config] perarch and indep tools builds need separate build directories [ Upstream Kernel Changes ] * Revert autofs: work around unhappy compat problem on x86-64 - LP: #996109 * Revert usb: Fix build error due to dma_mask is not at pdev_archdata at ARM - LP: #996109 * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * NFSv4: include bitmap in nfsv4 get acl data - LP: #893147 - CVE-2011-4131 * hugepages: fix use after free bug in quota handling - LP: #990368 - CVE-2012-2133 * nfs: Enclose hostname in brackets when needed in nfs_do_root_mount - LP: #996109 * NFSv4: Ensure that the LOCK code sets exception-inode - LP: #996109 * NFSv4: Ensure that we check lock exclusive/shared type against open modes - LP: #996109 * x86, apic: APIC code touches invalid MSR on P5 class machines - LP: #996109 * xen: correctly check for pending events when restoring irq flags - LP: #996109 * xen/smp: Fix crash when booting with ACPI hotplug CPUs. - LP: #996109 * ASoC: dapm: Ensure power gets managed for line widgets - LP: #996109 * dmaengine: at_hdmac: remove clear-on-read in atc_dostart() - LP: #996109 * hwmon: fam15h_power: fix bogus values with current BIOSes - LP: #996109 * hwmon: (fam15h_power) Fix pci_device_id array - LP: #996109 * drm/i915: handle input/output sdvo timings separately in mode_set - LP: #996109 * drm/i915: fix integer overflow in i915_gem_execbuffer2() - LP: #996109 * drm/i915: fix integer overflow in i915_gem_do_execbuffer() - LP: #996109 * nl80211: ensure interface is up in various APIs - LP: #996109 * EHCI: fix criterion for resuming the root hub - LP: #996109 * brcm80211: smac: resume transmit fifo upon receiving frames - LP: #996109 * Fix modpost failures in fedora 17 - LP: #996109 * mmc: unbreak sdhci-esdhc-imx on i.MX25 - LP: #996109 * nfsd: fix b0rken error value for setattr on read-only mount - LP: #996109 * nfsd: fix error values returned by nfsd4_lockt() when nfsd_open() fails - LP: #996109 * USB: cdc-wdm: fix race leading leading to memory corruption - LP: #996109 * USB: EHCI: fix crash during suspend on ASUS computers - LP: #996109 * USB: gadget: storage gadgets send wrong error code for unknown commands - LP: #996109 * usb gadget: uvc: uvc_request_data::length field must be signed - LP: #996109 * pipes: add a packetized pipe mode for writing - LP: #996109 * autofs: make the autofsv5 packet file descriptor use a packetized pipe - LP: #996109 * ARM: 7403/1: tls: remove covert channel via TPIDRURW - LP: #996109 * SCSI: libsas: fix sas_find_bcast_phy() in the presence of 'vacant' phys - LP: #996109 * SCSI: libsas: fix false positive 'device attached' conditions - LP: #996109 * efi: Add new variable attributes - LP: #996109 * efivars: String functions - LP: #996109 * efivars: fix warnings when CONFIG_PSTORE=n - LP: #996109 * efi: Validate UEFI boot variables - LP: #996109 * efivars: Improve variable validation - LP: #996109 * hwmon: (coretemp) Increase CPU core limit - LP: #996109 * hwmon: (coretemp) fix oops on cpu unplug - LP: #996109 * libata: skip old error history when counting probe trials - LP: #996109 * i2c: pnx: Disable clk in suspend - LP: #996109 * ipw2200: Fix race condition in the command completion acknowledge - LP: #996109 * mac80211: fix AP mode EAP tx for VLAN stations - LP: #996109 * rtlwifi: Fix oops on unload - LP: #996109 * wl1251: fix crash on remove due to premature kfree - LP: #996109 * wl1251: fix crash on remove due to leftover work item - LP: #996109 * sched: Fix nohz load accounting -- again! - LP: #996109 * hfsplus: Fix potential buffer overflows - LP: #996109 * Linux 3.0.31 - LP: #996109 * smsc95xx: mark link down on startup and let PHY interrupt deal with carrier changes - LP: #1002880 * xen/pte: Fix crashes when trying to see non-existent PGD/PMD/PUD/PTEs - LP: #1002880 * xen/pci: don't use PCI BIOS service for configuration space accesses - LP: #1002880 * percpu, x86: don't use PMD_SIZE as embedded atom_size on 32bit - LP: #1002880 * asm-generic: Use __BITS_PER_LONG in statfs.h - LP: #1002880 * Fix __read_seqcount_begin() to use ACCESS_ONCE for sequence value read - LP:
[Bug 987569] Re: CVE-2012-2121
This bug was fixed in the package linux-lts-backport-oneiric - 3.0.0-21.35~lucid1 --- linux-lts-backport-oneiric (3.0.0-21.35~lucid1) lucid-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1005456 [ Andy Whitcroft ] * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 [ Herton Ronaldo Krzesinski ] * SAUCE: async_populate_rootfs: fix build warnings - LP: #1003417 [ Tim Gardner ] * Revert SAUCE: ite-cir: postpone ISR registration - LP: #1002880 * [Config] perarch and indep tools builds need separate build directories [ Upstream Kernel Changes ] * Revert autofs: work around unhappy compat problem on x86-64 - LP: #996109 * Revert usb: Fix build error due to dma_mask is not at pdev_archdata at ARM - LP: #996109 * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * NFSv4: include bitmap in nfsv4 get acl data - LP: #893147 - CVE-2011-4131 * hugepages: fix use after free bug in quota handling - LP: #990368 - CVE-2012-2133 * nfs: Enclose hostname in brackets when needed in nfs_do_root_mount - LP: #996109 * NFSv4: Ensure that the LOCK code sets exception-inode - LP: #996109 * NFSv4: Ensure that we check lock exclusive/shared type against open modes - LP: #996109 * x86, apic: APIC code touches invalid MSR on P5 class machines - LP: #996109 * xen: correctly check for pending events when restoring irq flags - LP: #996109 * xen/smp: Fix crash when booting with ACPI hotplug CPUs. - LP: #996109 * ASoC: dapm: Ensure power gets managed for line widgets - LP: #996109 * dmaengine: at_hdmac: remove clear-on-read in atc_dostart() - LP: #996109 * hwmon: fam15h_power: fix bogus values with current BIOSes - LP: #996109 * hwmon: (fam15h_power) Fix pci_device_id array - LP: #996109 * drm/i915: handle input/output sdvo timings separately in mode_set - LP: #996109 * drm/i915: fix integer overflow in i915_gem_execbuffer2() - LP: #996109 * drm/i915: fix integer overflow in i915_gem_do_execbuffer() - LP: #996109 * nl80211: ensure interface is up in various APIs - LP: #996109 * EHCI: fix criterion for resuming the root hub - LP: #996109 * brcm80211: smac: resume transmit fifo upon receiving frames - LP: #996109 * Fix modpost failures in fedora 17 - LP: #996109 * mmc: unbreak sdhci-esdhc-imx on i.MX25 - LP: #996109 * nfsd: fix b0rken error value for setattr on read-only mount - LP: #996109 * nfsd: fix error values returned by nfsd4_lockt() when nfsd_open() fails - LP: #996109 * USB: cdc-wdm: fix race leading leading to memory corruption - LP: #996109 * USB: EHCI: fix crash during suspend on ASUS computers - LP: #996109 * USB: gadget: storage gadgets send wrong error code for unknown commands - LP: #996109 * usb gadget: uvc: uvc_request_data::length field must be signed - LP: #996109 * pipes: add a packetized pipe mode for writing - LP: #996109 * autofs: make the autofsv5 packet file descriptor use a packetized pipe - LP: #996109 * ARM: 7403/1: tls: remove covert channel via TPIDRURW - LP: #996109 * SCSI: libsas: fix sas_find_bcast_phy() in the presence of 'vacant' phys - LP: #996109 * SCSI: libsas: fix false positive 'device attached' conditions - LP: #996109 * efi: Add new variable attributes - LP: #996109 * efivars: String functions - LP: #996109 * efivars: fix warnings when CONFIG_PSTORE=n - LP: #996109 * efi: Validate UEFI boot variables - LP: #996109 * efivars: Improve variable validation - LP: #996109 * hwmon: (coretemp) Increase CPU core limit - LP: #996109 * hwmon: (coretemp) fix oops on cpu unplug - LP: #996109 * libata: skip old error history when counting probe trials - LP: #996109 * i2c: pnx: Disable clk in suspend - LP: #996109 * ipw2200: Fix race condition in the command completion acknowledge - LP: #996109 * mac80211: fix AP mode EAP tx for VLAN stations - LP: #996109 * rtlwifi: Fix oops on unload - LP: #996109 * wl1251: fix crash on remove due to premature kfree - LP: #996109 * wl1251: fix crash on remove due to leftover work item - LP: #996109 * sched: Fix nohz load accounting -- again! - LP: #996109 * hfsplus: Fix potential buffer overflows - LP: #996109 * Linux 3.0.31 - LP: #996109 * smsc95xx: mark link down on startup and let PHY interrupt deal with carrier changes - LP: #1002880 * xen/pte: Fix crashes when trying to see non-existent PGD/PMD/PUD/PTEs - LP: #1002880 * xen/pci: don't use PCI BIOS service for configuration space accesses - LP: #1002880 * percpu, x86: don't use PMD_SIZE as embedded atom_size on 32bit - LP: #1002880 * asm-generic: Use __BITS_PER_LONG in statfs.h - LP: #1002880 * Fix __read_seqcount_begin() to
[Bug 987569] Re: CVE-2012-2121
This bug was fixed in the package linux-lts-backport-natty - 2.6.38-15.60~lucid1 --- linux-lts-backport-natty (2.6.38-15.60~lucid1) lucid-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1003079 [ Andy Whitcroft ] * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 [ Herton Ronaldo Krzesinski ] * linux: add Build-Depends for libnewt-dev, to enable perf TUI support - LP: #981717 [ Tim Gardner ] * [Config] perarch and indep tools builds need separate build directories [ Upstream Kernel Changes ] * fcaps: clear the same personality flags as suid when fcaps are used - LP: #987571 - CVE-2012-2123 * natty security: fix compile error in commoncap.c - LP: #987571 - CVE-2012-2123 * KVM: Clean up error handling during VCPU creation - LP: #971685 - CVE-2012-1601 * KVM: Ensure all vcpus are consistent with in-kernel irqchip settings - LP: #971685 - CVE-2012-1601 * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * NFSv4: include bitmap in nfsv4 get acl data - LP: #893147 - CVE-2011-4131 * hugepages: fix use after free bug in quota handling - LP: #990368 - CVE-2012-2133 -- Luis Henriques luis.henriq...@canonical.com Wed, 23 May 2012 09:43:28 +0100 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Branch linked: lp:ubuntu/lucid-security/linux-lts-backport-oneiric -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
This bug was fixed in the package linux - 2.6.38-15.60 --- linux (2.6.38-15.60) natty-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1002384 [ Andy Whitcroft ] * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 [ Herton Ronaldo Krzesinski ] * linux: add Build-Depends for libnewt-dev, to enable perf TUI support - LP: #981717 [ Tim Gardner ] * [Config] perarch and indep tools builds need separate build directories [ Upstream Kernel Changes ] * fcaps: clear the same personality flags as suid when fcaps are used - LP: #987571 - CVE-2012-2123 * natty security: fix compile error in commoncap.c - LP: #987571 - CVE-2012-2123 * KVM: Clean up error handling during VCPU creation - LP: #971685 - CVE-2012-1601 * KVM: Ensure all vcpus are consistent with in-kernel irqchip settings - LP: #971685 - CVE-2012-1601 * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * NFSv4: include bitmap in nfsv4 get acl data - LP: #893147 - CVE-2011-4131 * hugepages: fix use after free bug in quota handling - LP: #990368 - CVE-2012-2133 -- Luis Henriques luis.henriq...@canonical.com Mon, 21 May 2012 17:56:07 +0100 ** Changed in: linux (Ubuntu Natty) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-4131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-1601 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-2123 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-2133 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-oneiric -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Description changed: - kvm: device assignment page leak + The KVM implementation in the Linux kernel before 3.3.4 does not + properly manage the relationships between memory slots and the iommu, + which allows guest OS users to cause a denial of service (host OS crash) + by leveraging administrative access to the guest OS to conduct hotunplug + and hotplug operations on devices. Break-Fix: - 32f6daad4651a748a58a3ab6da0611862175722f -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Also affects: linux (Ubuntu Quantal) Importance: Medium Assignee: Steve Conklin (sconklin) Status: New ** Also affects: linux-armadaxp (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Quantal) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Quantal) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Quantal) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Quantal) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Quantal) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Quantal) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Quantal) Importance: Medium Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-armadaxp (Ubuntu Quantal) Importance: Undecided = Medium ** Changed in: linux (Ubuntu Quantal) Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux (Ubuntu Natty) Status: New = Fix Committed ** Changed in: linux (Ubuntu Oneiric) Status: New = Fix Committed ** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux-armadaxp (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-armadaxp (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Oneiric) Importance: Undecided = Medium ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-armadaxp (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Hardy) Importance: Undecided = Medium ** Changed in: linux-armadaxp (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Natty) Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
** Changed in: linux (Ubuntu Precise) Assignee: (unassigned) = Steve Conklin (sconklin) ** Changed in: linux (Ubuntu Oneiric) Assignee: (unassigned) = Steve Conklin (sconklin) ** Changed in: linux (Ubuntu Natty) Assignee: (unassigned) = Steve Conklin (sconklin) ** Changed in: linux (Ubuntu Lucid) Assignee: (unassigned) = Steve Conklin (sconklin) ** Changed in: linux (Ubuntu Hardy) Assignee: (unassigned) = Steve Conklin (sconklin) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/987569 Title: CVE-2012-2121 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 987569] Re: CVE-2012-2121
CVE-2012-2121 ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Hardy) Importance: Undecided Status: New ** Changed in: linux-ec2 (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-ti-omap4 (Ubuntu Lucid)