[Bug 987569] Re: CVE-2012-2121

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2016-02-09 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2015-11-15 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2015-10-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Medium
 Assignee: Steve Conklin (sconklin)
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily)
   Importance: Medium
 Assignee: Steve Conklin (sconklin)
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mako (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-manta (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-flo (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Importance: Undecided = Medium

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New = Fix Committed

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-ec2 (Ubuntu Lucid)

** No longer affects: linux-goldfish (Ubuntu Lucid)

** No longer affects: linux-lts-saucy (Ubuntu Lucid)

** No longer affects: linux-lts-quantal (Ubuntu Lucid)

** No longer affects: linux-mvl-dove (Ubuntu Lucid)

** No longer affects: linux-ti-omap4 (Ubuntu Lucid)

** No longer affects: linux (Ubuntu Lucid)

** No longer affects: linux-mako (Ubuntu Lucid)

** No longer affects: linux-fsl-imx51 (Ubuntu Lucid)

** No longer affects: linux-lts-utopic (Ubuntu Lucid)

** No longer affects: linux-flo (Ubuntu Lucid)

** No longer affects: linux-lts-raring (Ubuntu Lucid)

** No longer affects: linux-manta (Ubuntu Lucid)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2015-01-27 Thread John Johansen
** Changed in: linux-goldfish (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Utopic)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2014-12-05 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2014-10-27 Thread John Johansen
** Also affects: linux (Ubuntu Vivid)
   Importance: Medium
 Assignee: Steve Conklin (sconklin)
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2014-07-22 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Saucy)

** No longer affects: linux-ec2 (Ubuntu Saucy)

** No longer affects: linux-lts-saucy (Ubuntu Saucy)

** No longer affects: linux-lts-quantal (Ubuntu Saucy)

** No longer affects: linux-mvl-dove (Ubuntu Saucy)

** No longer affects: linux (Ubuntu Saucy)

** No longer affects: linux-fsl-imx51 (Ubuntu Saucy)

** No longer affects: linux-ti-omap4 (Ubuntu Saucy)

** No longer affects: linux-lts-raring (Ubuntu Saucy)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2014-05-19 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Quantal)

** No longer affects: linux-ec2 (Ubuntu Quantal)

** No longer affects: linux-lts-saucy (Ubuntu Quantal)

** No longer affects: linux-lts-quantal (Ubuntu Quantal)

** No longer affects: linux-mvl-dove (Ubuntu Quantal)

** No longer affects: linux (Ubuntu Quantal)

** No longer affects: linux-fsl-imx51 (Ubuntu Quantal)

** No longer affects: linux-ti-omap4 (Ubuntu Quantal)

** No longer affects: linux-lts-raring (Ubuntu Quantal)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2014-04-25 Thread John Johansen
** Also affects: linux (Ubuntu Utopic)
   Importance: Medium
 Assignee: Steve Conklin (sconklin)
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2014-02-13 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Raring)

** No longer affects: linux-ec2 (Ubuntu Raring)

** No longer affects: linux-lts-saucy (Ubuntu Raring)

** No longer affects: linux-lts-quantal (Ubuntu Raring)

** No longer affects: linux-mvl-dove (Ubuntu Raring)

** No longer affects: linux (Ubuntu Raring)

** No longer affects: linux-fsl-imx51 (Ubuntu Raring)

** No longer affects: linux-ti-omap4 (Ubuntu Raring)

** No longer affects: linux-lts-raring (Ubuntu Raring)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2013-12-02 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-359.72

---
linux-ec2 (2.6.32-359.72) lucid-proposed; urgency=low

  [ Stefan Bader ]

  * Rebased to Ubuntu-2.6.32-54.116
  * Release Tracking Bug
- LP: #1250690

  [ Ubuntu: 2.6.32-54.116 ]

  * SAUCE: ACPI battery: fix compiler warning
- LP: #1247154
  * KVM: unmap pages from the iommu when slots are removed
- LP: #987569
- CVE-2012-2121
  * uml: check length in exitcode_proc_write()
- LP: #1249271
- CVE-2013-4512
 -- Stefan Bader stefan.ba...@canonical.com   Wed, 13 Nov 2013 11:07:53 +0100

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2013-12-02 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-54.116

---
linux (2.6.32-54.116) lucid; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1250592

  [ Luis Henriques ]

  * SAUCE: ACPI battery: fix compiler warning
- LP: #1247154

  [ Upstream Kernel Changes ]

  * KVM: unmap pages from the iommu when slots are removed
- LP: #987569
- CVE-2012-2121
  * uml: check length in exitcode_proc_write()
- LP: #1249271
- CVE-2013-4512
 -- Steve Conklin sconk...@canonical.com   Tue, 12 Nov 2013 12:09:35 -0600

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-4512

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2013-12-02 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-54.116

---
linux (2.6.32-54.116) lucid; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1250592

  [ Luis Henriques ]

  * SAUCE: ACPI battery: fix compiler warning
- LP: #1247154

  [ Upstream Kernel Changes ]

  * KVM: unmap pages from the iommu when slots are removed
- LP: #987569
- CVE-2012-2121
  * uml: check length in exitcode_proc_write()
- LP: #1249271
- CVE-2013-4512
 -- Steve Conklin sconk...@canonical.com   Tue, 12 Nov 2013 12:09:35 -0600

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2013-12-02 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-359.72

---
linux-ec2 (2.6.32-359.72) lucid-proposed; urgency=low

  [ Stefan Bader ]

  * Rebased to Ubuntu-2.6.32-54.116
  * Release Tracking Bug
- LP: #1250690

  [ Ubuntu: 2.6.32-54.116 ]

  * SAUCE: ACPI battery: fix compiler warning
- LP: #1247154
  * KVM: unmap pages from the iommu when slots are removed
- LP: #987569
- CVE-2012-2121
  * uml: check length in exitcode_proc_write()
- LP: #1249271
- CVE-2013-4512
 -- Stefan Bader stefan.ba...@canonical.com   Wed, 13 Nov 2013 11:07:53 +0100

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2013-11-14 Thread John Johansen
** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-saucy (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Saucy)
   Importance: Undecided = Medium

** Changed in: linux-lts-saucy (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-saucy (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-lts-saucy (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Quantal)
   Importance: Undecided = Medium

** Changed in: linux-lts-saucy (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Raring)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2013-11-05 Thread John Johansen
** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Lucid)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2013-10-25 Thread John Johansen
** Also affects: linux (Ubuntu Trusty)
   Importance: Medium
 Assignee: Steve Conklin (sconklin)
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2013-05-23 Thread John Johansen
** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2013-05-10 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Hardy)

** No longer affects: linux-armadaxp (Ubuntu Oneiric)

** No longer affects: linux-ec2 (Ubuntu Hardy)

** No longer affects: linux-ec2 (Ubuntu Oneiric)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Oneiric)

** No longer affects: linux-lts-backport-natty (Ubuntu Hardy)

** No longer affects: linux-lts-backport-natty (Ubuntu Oneiric)

** No longer affects: linux-lts-quantal (Ubuntu Hardy)

** No longer affects: linux-lts-quantal (Ubuntu Oneiric)

** No longer affects: linux-mvl-dove (Ubuntu Hardy)

** No longer affects: linux-mvl-dove (Ubuntu Oneiric)

** No longer affects: linux-lts-backport-maverick (Ubuntu Hardy)

** No longer affects: linux-lts-backport-maverick (Ubuntu Oneiric)

** No longer affects: linux (Ubuntu Hardy)

** No longer affects: linux (Ubuntu Oneiric)

** No longer affects: linux-fsl-imx51 (Ubuntu Hardy)

** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric)

** No longer affects: linux-ti-omap4 (Ubuntu Hardy)

** No longer affects: linux-ti-omap4 (Ubuntu Oneiric)

** No longer affects: linux-lts-raring (Ubuntu Hardy)

** No longer affects: linux-lts-raring (Ubuntu Oneiric)

** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-raring (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-raring (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Saucy)
   Importance: Undecided = Medium

** Changed in: linux-lts-raring (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Quantal)
   Importance: Undecided = Medium

** Changed in: linux-lts-raring (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Raring)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2013-04-30 Thread John Johansen
** Also affects: linux (Ubuntu Saucy)
   Importance: Medium
 Assignee: Steve Conklin (sconklin)
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2013-04-09 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Raring)
   Status: Fix Released = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2013-01-31 Thread John Johansen
** Description changed:

  The KVM implementation in the Linux kernel before 3.3.4 does not
  properly manage the relationships between memory slots and the iommu,
- which allows guest OS users to cause a denial of service (host OS crash)
- by leveraging administrative access to the guest OS to conduct hotunplug
- and hotplug operations on devices.
+ which allows guest OS users to cause a denial of service (memory leak
+ and host OS crash) by leveraging administrative access to the guest OS
+ to conduct hotunplug and hotplug operations on devices.
  
  Break-Fix: - 32f6daad4651a748a58a3ab6da0611862175722f

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-11-09 Thread Marc Deslauriers
** No longer affects: linux-armadaxp (Ubuntu Natty)

** No longer affects: linux-ec2 (Ubuntu Natty)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Natty)

** No longer affects: linux-lts-backport-natty (Ubuntu Natty)

** No longer affects: linux-lts-quantal (Ubuntu Natty)

** No longer affects: linux-mvl-dove (Ubuntu Natty)

** No longer affects: linux-lts-backport-maverick (Ubuntu Natty)

** No longer affects: linux (Ubuntu Natty)

** No longer affects: linux-fsl-imx51 (Ubuntu Natty)

** No longer affects: linux-ti-omap4 (Ubuntu Natty)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-11-09 Thread Marc Deslauriers
** Also affects: linux (Ubuntu Raring)
   Importance: Medium
 Assignee: Steve Conklin (sconklin)
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Raring)
   Importance: Medium
   Status: Fix Released

** Also affects: linux-lts-quantal (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Changed in: linux-lts-quantal (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Raring)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-11-08 Thread John Johansen
** Changed in: linux-lts-quantal (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-quantal (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Oneiric)
   Importance: Undecided = Medium

** Changed in: linux-lts-quantal (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-quantal (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Hardy)
   Importance: Undecided = Medium

** Changed in: linux-lts-quantal (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Quantal)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-10-02 Thread Ike Panhc
Patch 32f6daad4651a748a58a3ab6da0611862175722f already in upstream 3.5

** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-09-20 Thread Paolo Pisati
** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: Fix Committed = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-09-12 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/natty-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-09-05 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-08-22 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-06-14 Thread John Johansen
** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-06-14 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1211.23

---
linux-ti-omap4 (3.0.0-1211.23) oneiric-proposed; urgency=low

  * Release Tracking Bug
- LP: #1005455

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.0.0-21.35

  [ Ubuntu: 3.0.0-21.35 ]

  * Release Tracking Bug
- LP: #1004571
  * [Config] control.stub is an intermediate product not a dependancy
- LP: #992414
  * SAUCE: async_populate_rootfs: fix build warnings
- LP: #1003417
  * Revert SAUCE: ite-cir: postpone ISR registration
- LP: #1002880
  * [Config] perarch and indep tools builds need separate build directories
  * Revert autofs: work around unhappy compat problem on x86-64
- LP: #996109
  * Revert usb: Fix build error due to dma_mask is not at pdev_archdata at
ARM
- LP: #996109
  * KVM: unmap pages from the iommu when slots are removed
- LP: #987569
- CVE-2012-2121
  * NFSv4: include bitmap in nfsv4 get acl data
- LP: #893147
- CVE-2011-4131
  * hugepages: fix use after free bug in quota handling
- LP: #990368
- CVE-2012-2133
  * nfs: Enclose hostname in brackets when needed in nfs_do_root_mount
- LP: #996109
  * NFSv4: Ensure that the LOCK code sets exception-inode
- LP: #996109
  * NFSv4: Ensure that we check lock exclusive/shared type against open
modes
- LP: #996109
  * x86, apic: APIC code touches invalid MSR on P5 class machines
- LP: #996109
  * xen: correctly check for pending events when restoring irq flags
- LP: #996109
  * xen/smp: Fix crash when booting with ACPI hotplug CPUs.
- LP: #996109
  * ASoC: dapm: Ensure power gets managed for line widgets
- LP: #996109
  * dmaengine: at_hdmac: remove clear-on-read in atc_dostart()
- LP: #996109
  * hwmon: fam15h_power: fix bogus values with current BIOSes
- LP: #996109
  * hwmon: (fam15h_power) Fix pci_device_id array
- LP: #996109
  * drm/i915: handle input/output sdvo timings separately in mode_set
- LP: #996109
  * drm/i915: fix integer overflow in i915_gem_execbuffer2()
- LP: #996109
  * drm/i915: fix integer overflow in i915_gem_do_execbuffer()
- LP: #996109
  * nl80211: ensure interface is up in various APIs
- LP: #996109
  * EHCI: fix criterion for resuming the root hub
- LP: #996109
  * brcm80211: smac: resume transmit fifo upon receiving frames
- LP: #996109
  * Fix modpost failures in fedora 17
- LP: #996109
  * mmc: unbreak sdhci-esdhc-imx on i.MX25
- LP: #996109
  * nfsd: fix b0rken error value for setattr on read-only mount
- LP: #996109
  * nfsd: fix error values returned by nfsd4_lockt() when nfsd_open() fails
- LP: #996109
  * USB: cdc-wdm: fix race leading leading to memory corruption
- LP: #996109
  * USB: EHCI: fix crash during suspend on ASUS computers
- LP: #996109
  * USB: gadget: storage gadgets send wrong error code for unknown commands
- LP: #996109
  * usb gadget: uvc: uvc_request_data::length field must be signed
- LP: #996109
  * pipes: add a packetized pipe mode for writing
- LP: #996109
  * autofs: make the autofsv5 packet file descriptor use a packetized pipe
- LP: #996109
  * ARM: 7403/1: tls: remove covert channel via TPIDRURW
- LP: #996109
  * SCSI: libsas: fix sas_find_bcast_phy() in the presence of 'vacant' phys
- LP: #996109
  * SCSI: libsas: fix false positive 'device attached' conditions
- LP: #996109
  * efi: Add new variable attributes
- LP: #996109
  * efivars: String functions
- LP: #996109
  * efivars: fix warnings when CONFIG_PSTORE=n
- LP: #996109
  * efi: Validate UEFI boot variables
- LP: #996109
  * efivars: Improve variable validation
- LP: #996109
  * hwmon: (coretemp) Increase CPU core limit
- LP: #996109
  * hwmon: (coretemp) fix oops on cpu unplug
- LP: #996109
  * libata: skip old error history when counting probe trials
- LP: #996109
  * i2c: pnx: Disable clk in suspend
- LP: #996109
  * ipw2200: Fix race condition in the command completion acknowledge
- LP: #996109
  * mac80211: fix AP mode EAP tx for VLAN stations
- LP: #996109
  * rtlwifi: Fix oops on unload
- LP: #996109
  * wl1251: fix crash on remove due to premature kfree
- LP: #996109
  * wl1251: fix crash on remove due to leftover work item
- LP: #996109
  * sched: Fix nohz load accounting -- again!
- LP: #996109
  * hfsplus: Fix potential buffer overflows
- LP: #996109
  * Linux 3.0.31
- LP: #996109
  * smsc95xx: mark link down on startup and let PHY interrupt deal with
carrier changes
- LP: #1002880
  * xen/pte: Fix crashes when trying to see non-existent PGD/PMD/PUD/PTEs
- LP: #1002880
  * xen/pci: don't use PCI BIOS service for configuration space accesses
- LP: #1002880
  * percpu, x86: don't use PMD_SIZE as embedded atom_size on 32bit
- LP: #1002880
  * asm-generic: Use __BITS_PER_LONG in statfs.h
- LP: #1002880
  * Fix __read_seqcount_begin() to use ACCESS_ONCE for sequence value 

[Bug 987569] Re: CVE-2012-2121

2012-06-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.0.0-21.35

---
linux (3.0.0-21.35) oneiric-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1004571

  [ Andy Whitcroft ]

  * [Config] control.stub is an intermediate product not a dependancy
- LP: #992414

  [ Herton Ronaldo Krzesinski ]

  * SAUCE: async_populate_rootfs: fix build warnings
- LP: #1003417

  [ Tim Gardner ]

  * Revert SAUCE: ite-cir: postpone ISR registration
- LP: #1002880
  * [Config] perarch and indep tools builds need separate build directories

  [ Upstream Kernel Changes ]

  * Revert autofs: work around unhappy compat problem on x86-64
- LP: #996109
  * Revert usb: Fix build error due to dma_mask is not at pdev_archdata at
ARM
- LP: #996109
  * KVM: unmap pages from the iommu when slots are removed
- LP: #987569
- CVE-2012-2121
  * NFSv4: include bitmap in nfsv4 get acl data
- LP: #893147
- CVE-2011-4131
  * hugepages: fix use after free bug in quota handling
- LP: #990368
- CVE-2012-2133
  * nfs: Enclose hostname in brackets when needed in nfs_do_root_mount
- LP: #996109
  * NFSv4: Ensure that the LOCK code sets exception-inode
- LP: #996109
  * NFSv4: Ensure that we check lock exclusive/shared type against open
modes
- LP: #996109
  * x86, apic: APIC code touches invalid MSR on P5 class machines
- LP: #996109
  * xen: correctly check for pending events when restoring irq flags
- LP: #996109
  * xen/smp: Fix crash when booting with ACPI hotplug CPUs.
- LP: #996109
  * ASoC: dapm: Ensure power gets managed for line widgets
- LP: #996109
  * dmaengine: at_hdmac: remove clear-on-read in atc_dostart()
- LP: #996109
  * hwmon: fam15h_power: fix bogus values with current BIOSes
- LP: #996109
  * hwmon: (fam15h_power) Fix pci_device_id array
- LP: #996109
  * drm/i915: handle input/output sdvo timings separately in mode_set
- LP: #996109
  * drm/i915: fix integer overflow in i915_gem_execbuffer2()
- LP: #996109
  * drm/i915: fix integer overflow in i915_gem_do_execbuffer()
- LP: #996109
  * nl80211: ensure interface is up in various APIs
- LP: #996109
  * EHCI: fix criterion for resuming the root hub
- LP: #996109
  * brcm80211: smac: resume transmit fifo upon receiving frames
- LP: #996109
  * Fix modpost failures in fedora 17
- LP: #996109
  * mmc: unbreak sdhci-esdhc-imx on i.MX25
- LP: #996109
  * nfsd: fix b0rken error value for setattr on read-only mount
- LP: #996109
  * nfsd: fix error values returned by nfsd4_lockt() when nfsd_open() fails
- LP: #996109
  * USB: cdc-wdm: fix race leading leading to memory corruption
- LP: #996109
  * USB: EHCI: fix crash during suspend on ASUS computers
- LP: #996109
  * USB: gadget: storage gadgets send wrong error code for unknown commands
- LP: #996109
  * usb gadget: uvc: uvc_request_data::length field must be signed
- LP: #996109
  * pipes: add a packetized pipe mode for writing
- LP: #996109
  * autofs: make the autofsv5 packet file descriptor use a packetized pipe
- LP: #996109
  * ARM: 7403/1: tls: remove covert channel via TPIDRURW
- LP: #996109
  * SCSI: libsas: fix sas_find_bcast_phy() in the presence of 'vacant' phys
- LP: #996109
  * SCSI: libsas: fix false positive 'device attached' conditions
- LP: #996109
  * efi: Add new variable attributes
- LP: #996109
  * efivars: String functions
- LP: #996109
  * efivars: fix warnings when CONFIG_PSTORE=n
- LP: #996109
  * efi: Validate UEFI boot variables
- LP: #996109
  * efivars: Improve variable validation
- LP: #996109
  * hwmon: (coretemp) Increase CPU core limit
- LP: #996109
  * hwmon: (coretemp) fix oops on cpu unplug
- LP: #996109
  * libata: skip old error history when counting probe trials
- LP: #996109
  * i2c: pnx: Disable clk in suspend
- LP: #996109
  * ipw2200: Fix race condition in the command completion acknowledge
- LP: #996109
  * mac80211: fix AP mode EAP tx for VLAN stations
- LP: #996109
  * rtlwifi: Fix oops on unload
- LP: #996109
  * wl1251: fix crash on remove due to premature kfree
- LP: #996109
  * wl1251: fix crash on remove due to leftover work item
- LP: #996109
  * sched: Fix nohz load accounting -- again!
- LP: #996109
  * hfsplus: Fix potential buffer overflows
- LP: #996109
  * Linux 3.0.31
- LP: #996109
  * smsc95xx: mark link down on startup and let PHY interrupt deal with
carrier changes
- LP: #1002880
  * xen/pte: Fix crashes when trying to see non-existent PGD/PMD/PUD/PTEs
- LP: #1002880
  * xen/pci: don't use PCI BIOS service for configuration space accesses
- LP: #1002880
  * percpu, x86: don't use PMD_SIZE as embedded atom_size on 32bit
- LP: #1002880
  * asm-generic: Use __BITS_PER_LONG in statfs.h
- LP: #1002880
  * Fix __read_seqcount_begin() to use ACCESS_ONCE for sequence value read
- LP: 

[Bug 987569] Re: CVE-2012-2121

2012-06-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-21.35~lucid1

---
linux-lts-backport-oneiric (3.0.0-21.35~lucid1) lucid-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1005456

  [ Andy Whitcroft ]

  * [Config] control.stub is an intermediate product not a dependancy
- LP: #992414

  [ Herton Ronaldo Krzesinski ]

  * SAUCE: async_populate_rootfs: fix build warnings
- LP: #1003417

  [ Tim Gardner ]

  * Revert SAUCE: ite-cir: postpone ISR registration
- LP: #1002880
  * [Config] perarch and indep tools builds need separate build directories

  [ Upstream Kernel Changes ]

  * Revert autofs: work around unhappy compat problem on x86-64
- LP: #996109
  * Revert usb: Fix build error due to dma_mask is not at pdev_archdata at
ARM
- LP: #996109
  * KVM: unmap pages from the iommu when slots are removed
- LP: #987569
- CVE-2012-2121
  * NFSv4: include bitmap in nfsv4 get acl data
- LP: #893147
- CVE-2011-4131
  * hugepages: fix use after free bug in quota handling
- LP: #990368
- CVE-2012-2133
  * nfs: Enclose hostname in brackets when needed in nfs_do_root_mount
- LP: #996109
  * NFSv4: Ensure that the LOCK code sets exception-inode
- LP: #996109
  * NFSv4: Ensure that we check lock exclusive/shared type against open
modes
- LP: #996109
  * x86, apic: APIC code touches invalid MSR on P5 class machines
- LP: #996109
  * xen: correctly check for pending events when restoring irq flags
- LP: #996109
  * xen/smp: Fix crash when booting with ACPI hotplug CPUs.
- LP: #996109
  * ASoC: dapm: Ensure power gets managed for line widgets
- LP: #996109
  * dmaengine: at_hdmac: remove clear-on-read in atc_dostart()
- LP: #996109
  * hwmon: fam15h_power: fix bogus values with current BIOSes
- LP: #996109
  * hwmon: (fam15h_power) Fix pci_device_id array
- LP: #996109
  * drm/i915: handle input/output sdvo timings separately in mode_set
- LP: #996109
  * drm/i915: fix integer overflow in i915_gem_execbuffer2()
- LP: #996109
  * drm/i915: fix integer overflow in i915_gem_do_execbuffer()
- LP: #996109
  * nl80211: ensure interface is up in various APIs
- LP: #996109
  * EHCI: fix criterion for resuming the root hub
- LP: #996109
  * brcm80211: smac: resume transmit fifo upon receiving frames
- LP: #996109
  * Fix modpost failures in fedora 17
- LP: #996109
  * mmc: unbreak sdhci-esdhc-imx on i.MX25
- LP: #996109
  * nfsd: fix b0rken error value for setattr on read-only mount
- LP: #996109
  * nfsd: fix error values returned by nfsd4_lockt() when nfsd_open() fails
- LP: #996109
  * USB: cdc-wdm: fix race leading leading to memory corruption
- LP: #996109
  * USB: EHCI: fix crash during suspend on ASUS computers
- LP: #996109
  * USB: gadget: storage gadgets send wrong error code for unknown commands
- LP: #996109
  * usb gadget: uvc: uvc_request_data::length field must be signed
- LP: #996109
  * pipes: add a packetized pipe mode for writing
- LP: #996109
  * autofs: make the autofsv5 packet file descriptor use a packetized pipe
- LP: #996109
  * ARM: 7403/1: tls: remove covert channel via TPIDRURW
- LP: #996109
  * SCSI: libsas: fix sas_find_bcast_phy() in the presence of 'vacant' phys
- LP: #996109
  * SCSI: libsas: fix false positive 'device attached' conditions
- LP: #996109
  * efi: Add new variable attributes
- LP: #996109
  * efivars: String functions
- LP: #996109
  * efivars: fix warnings when CONFIG_PSTORE=n
- LP: #996109
  * efi: Validate UEFI boot variables
- LP: #996109
  * efivars: Improve variable validation
- LP: #996109
  * hwmon: (coretemp) Increase CPU core limit
- LP: #996109
  * hwmon: (coretemp) fix oops on cpu unplug
- LP: #996109
  * libata: skip old error history when counting probe trials
- LP: #996109
  * i2c: pnx: Disable clk in suspend
- LP: #996109
  * ipw2200: Fix race condition in the command completion acknowledge
- LP: #996109
  * mac80211: fix AP mode EAP tx for VLAN stations
- LP: #996109
  * rtlwifi: Fix oops on unload
- LP: #996109
  * wl1251: fix crash on remove due to premature kfree
- LP: #996109
  * wl1251: fix crash on remove due to leftover work item
- LP: #996109
  * sched: Fix nohz load accounting -- again!
- LP: #996109
  * hfsplus: Fix potential buffer overflows
- LP: #996109
  * Linux 3.0.31
- LP: #996109
  * smsc95xx: mark link down on startup and let PHY interrupt deal with
carrier changes
- LP: #1002880
  * xen/pte: Fix crashes when trying to see non-existent PGD/PMD/PUD/PTEs
- LP: #1002880
  * xen/pci: don't use PCI BIOS service for configuration space accesses
- LP: #1002880
  * percpu, x86: don't use PMD_SIZE as embedded atom_size on 32bit
- LP: #1002880
  * asm-generic: Use __BITS_PER_LONG in statfs.h
- LP: #1002880
  * Fix __read_seqcount_begin() to 

[Bug 987569] Re: CVE-2012-2121

2012-06-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-15.60~lucid1

---
linux-lts-backport-natty (2.6.38-15.60~lucid1) lucid-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1003079

  [ Andy Whitcroft ]

  * [Config] control.stub is an intermediate product not a dependancy
- LP: #992414

  [ Herton Ronaldo Krzesinski ]

  * linux: add Build-Depends for libnewt-dev, to enable perf TUI support
- LP: #981717

  [ Tim Gardner ]

  * [Config] perarch and indep tools builds need separate build
directories

  [ Upstream Kernel Changes ]

  * fcaps: clear the same personality flags as suid when fcaps are used
- LP: #987571
- CVE-2012-2123
  * natty security: fix compile error in commoncap.c
- LP: #987571
- CVE-2012-2123
  * KVM: Clean up error handling during VCPU creation
- LP: #971685
- CVE-2012-1601
  * KVM: Ensure all vcpus are consistent with in-kernel irqchip settings
- LP: #971685
- CVE-2012-1601
  * KVM: unmap pages from the iommu when slots are removed
- LP: #987569
- CVE-2012-2121
  * NFSv4: include bitmap in nfsv4 get acl data
- LP: #893147
- CVE-2011-4131
  * hugepages: fix use after free bug in quota handling
- LP: #990368
- CVE-2012-2133
 -- Luis Henriques luis.henriq...@canonical.com   Wed, 23 May 2012 09:43:28 
+0100

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-06-12 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-security/linux-lts-backport-oneiric

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-06-01 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-05-30 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.38-15.60

---
linux (2.6.38-15.60) natty-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1002384

  [ Andy Whitcroft ]

  * [Config] control.stub is an intermediate product not a dependancy
- LP: #992414

  [ Herton Ronaldo Krzesinski ]

  * linux: add Build-Depends for libnewt-dev, to enable perf TUI support
- LP: #981717

  [ Tim Gardner ]

  * [Config] perarch and indep tools builds need separate build
directories

  [ Upstream Kernel Changes ]

  * fcaps: clear the same personality flags as suid when fcaps are used
- LP: #987571
- CVE-2012-2123
  * natty security: fix compile error in commoncap.c
- LP: #987571
- CVE-2012-2123
  * KVM: Clean up error handling during VCPU creation
- LP: #971685
- CVE-2012-1601
  * KVM: Ensure all vcpus are consistent with in-kernel irqchip settings
- LP: #971685
- CVE-2012-1601
  * KVM: unmap pages from the iommu when slots are removed
- LP: #987569
- CVE-2012-2121
  * NFSv4: include bitmap in nfsv4 get acl data
- LP: #893147
- CVE-2011-4131
  * hugepages: fix use after free bug in quota handling
- LP: #990368
- CVE-2012-2133
 -- Luis Henriques luis.henriq...@canonical.com   Mon, 21 May 2012 17:56:07 
+0100

** Changed in: linux (Ubuntu Natty)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-4131

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-1601

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2123

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2133

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-05-28 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-oneiric

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-05-25 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-05-23 Thread John Johansen
** Description changed:

- kvm: device assignment page leak
+ The KVM implementation in the Linux kernel before 3.3.4 does not
+ properly manage the relationships between memory slots and the iommu,
+ which allows guest OS users to cause a denial of service (host OS crash)
+ by leveraging administrative access to the guest OS to conduct hotunplug
+ and hotplug operations on devices.
  
  Break-Fix: - 32f6daad4651a748a58a3ab6da0611862175722f

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-05-22 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-05-21 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-05-04 Thread John Johansen
** Also affects: linux (Ubuntu Quantal)
   Importance: Medium
 Assignee: Steve Conklin (sconklin)
   Status: New

** Also affects: linux-armadaxp (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Quantal)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Quantal)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Quantal)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Quantal)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Quantal)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Quantal)
   Importance: Medium
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-05-04 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Quantal)
   Importance: Undecided = Medium

** Changed in: linux (Ubuntu Quantal)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-05-03 Thread John Johansen
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-05-02 Thread Brad Figg
** Changed in: linux (Ubuntu Natty)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Oneiric)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Precise)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-05-01 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-armadaxp (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Oneiric)
   Importance: Undecided = Medium

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-armadaxp (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Hardy)
   Importance: Undecided = Medium

** Changed in: linux-armadaxp (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Natty)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-04-24 Thread Steve Conklin
** Changed in: linux (Ubuntu Precise)
 Assignee: (unassigned) = Steve Conklin (sconklin)

** Changed in: linux (Ubuntu Oneiric)
 Assignee: (unassigned) = Steve Conklin (sconklin)

** Changed in: linux (Ubuntu Natty)
 Assignee: (unassigned) = Steve Conklin (sconklin)

** Changed in: linux (Ubuntu Lucid)
 Assignee: (unassigned) = Steve Conklin (sconklin)

** Changed in: linux (Ubuntu Hardy)
 Assignee: (unassigned) = Steve Conklin (sconklin)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/987569

Title:
  CVE-2012-2121

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987569/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 987569] Re: CVE-2012-2121

2012-04-23 Thread John Johansen
CVE-2012-2121

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Lucid)