[Bug 990368] Re: CVE-2012-2133
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Also affects: linux (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-mako (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-manta (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Also affects: linux (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-mako (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-manta (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-flo (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Wily) Importance: Medium Status: Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quantal (Ubuntu Lucid) ** No longer affects: linux-mvl-dove (Ubuntu Lucid) ** No longer affects: linux-ti-omap4 (Ubuntu Lucid) ** No longer affects: linux (Ubuntu Lucid) ** No longer affects: linux-mako (Ubuntu Lucid) ** No longer affects: linux-fsl-imx51 (Ubuntu Lucid) ** No longer affects: linux-lts-utopic (Ubuntu Lucid) ** No longer affects: linux-flo (Ubuntu Lucid) ** No longer affects: linux-lts-raring (Ubuntu Lucid) ** No longer affects: linux-manta (Ubuntu Lucid) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-manta (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-flo (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-flo (Ubuntu Utopic) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Utopic) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Also affects: linux (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Vivid) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** No longer affects: linux-armadaxp (Ubuntu Saucy) ** No longer affects: linux-ec2 (Ubuntu Saucy) ** No longer affects: linux-lts-saucy (Ubuntu Saucy) ** No longer affects: linux-lts-quantal (Ubuntu Saucy) ** No longer affects: linux-mvl-dove (Ubuntu Saucy) ** No longer affects: linux (Ubuntu Saucy) ** No longer affects: linux-fsl-imx51 (Ubuntu Saucy) ** No longer affects: linux-ti-omap4 (Ubuntu Saucy) ** No longer affects: linux-lts-raring (Ubuntu Saucy) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** No longer affects: linux-armadaxp (Ubuntu Quantal) ** No longer affects: linux-ec2 (Ubuntu Quantal) ** No longer affects: linux-lts-saucy (Ubuntu Quantal) ** No longer affects: linux-lts-quantal (Ubuntu Quantal) ** No longer affects: linux-mvl-dove (Ubuntu Quantal) ** No longer affects: linux (Ubuntu Quantal) ** No longer affects: linux-fsl-imx51 (Ubuntu Quantal) ** No longer affects: linux-ti-omap4 (Ubuntu Quantal) ** No longer affects: linux-lts-raring (Ubuntu Quantal) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Also affects: linux (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Utopic) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Utopic) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
If i'm change "Affect me" always have message "Timeout error, please try again in a few minutes". -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Also affects: linux (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Trusty) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Trusty) Importance: Medium Status: Invalid ** No longer affects: linux-armadaxp (Ubuntu Hardy) ** No longer affects: linux-armadaxp (Ubuntu Oneiric) ** No longer affects: linux-armadaxp (Ubuntu Raring) ** No longer affects: linux-ec2 (Ubuntu Hardy) ** No longer affects: linux-ec2 (Ubuntu Oneiric) ** No longer affects: linux-ec2 (Ubuntu Raring) ** No longer affects: linux-lts-saucy (Ubuntu Hardy) ** No longer affects: linux-lts-saucy (Ubuntu Oneiric) ** No longer affects: linux-lts-saucy (Ubuntu Raring) ** No longer affects: linux-lts-quantal (Ubuntu Hardy) ** No longer affects: linux-lts-quantal (Ubuntu Oneiric) ** No longer affects: linux-lts-quantal (Ubuntu Raring) ** No longer affects: linux-mvl-dove (Ubuntu Hardy) ** No longer affects: linux-mvl-dove (Ubuntu Oneiric) ** No longer affects: linux-mvl-dove (Ubuntu Raring) ** No longer affects: linux (Ubuntu Hardy) ** No longer affects: linux (Ubuntu Oneiric) ** No longer affects: linux (Ubuntu Raring) ** No longer affects: linux-fsl-imx51 (Ubuntu Hardy) ** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric) ** No longer affects: linux-fsl-imx51 (Ubuntu Raring) ** No longer affects: linux-ti-omap4 (Ubuntu Hardy) ** No longer affects: linux-ti-omap4 (Ubuntu Oneiric) ** No longer affects: linux-ti-omap4 (Ubuntu Raring) ** No longer affects: linux-lts-raring (Ubuntu Hardy) ** No longer affects: linux-lts-raring (Ubuntu Oneiric) ** No longer affects: linux-lts-raring (Ubuntu Raring) ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Saucy) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Saucy) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-raring (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-raring (Ubuntu Quantal) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux (Ubuntu Hardy) Status: Confirmed => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Also affects: linux (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Saucy) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Saucy) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-armadaxp (Ubuntu Raring) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Branch linked: lp:ubuntu/precise-proposed/linux-lowlatency -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Also affects: linux (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Raring) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Raring) Importance: Medium Status: Fix Released ** Also affects: linux-lts-quantal (Ubuntu Raring) Importance: Undecided Status: New ** Changed in: linux-lts-quantal (Ubuntu Raring) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Raring) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** No longer affects: linux-armadaxp (Ubuntu Natty) ** No longer affects: linux-ec2 (Ubuntu Natty) ** No longer affects: linux-lts-backport-oneiric (Ubuntu Natty) ** No longer affects: linux-lts-backport-natty (Ubuntu Natty) ** No longer affects: linux-lts-quantal (Ubuntu Natty) ** No longer affects: linux-mvl-dove (Ubuntu Natty) ** No longer affects: linux-lts-backport-maverick (Ubuntu Natty) ** No longer affects: linux (Ubuntu Natty) ** No longer affects: linux-fsl-imx51 (Ubuntu Natty) ** No longer affects: linux-ti-omap4 (Ubuntu Natty) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-lts-quantal (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-quantal (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux-lts-quantal (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-quantal (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Hardy) Importance: Undecided => Medium ** Changed in: linux-lts-quantal (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Quantal) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
no huge pages on ti-omap4 arm ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
This bug was fixed in the package linux-armadaxp - 3.2.0-1605.8 --- linux-armadaxp (3.2.0-1605.8) precise-proposed; urgency=low * Release Tracking Bug -LP: #1020888 [ Jani Monoses ] * Fix warnings. * Adapt to new sched_clock API [ Ubuntu: 3.2.0-27.43 ] * No change upload to fix .ddeb generation in the PPA. * Release Tracking Bug - LP: #1020016 [ Ubuntu: 3.2.0-27.42 ] * Release Tracking Bug - LP: #1020016 * PACKAGING: add .gnu_debuglink sections to .ko files - LP: #669641 * [Config] Updateconfigs - LP: #1008345 * SAUCE: (upstreamed) [media] ene_ir: Fix driver initialisation - LP: #1014800 * SAUCE: ocfs2: Fix NULL pointer dereferrence in __ocfs2_change_file_space - LP: #1006012 * SAUCE: net: calxedaxgmac: enable rx cut-thru mode - LP: #1008345 * SAUCE: EDAC: Add support for the highbank platform memory - LP: #1008345 * SAUCE: EDAC: add support for highbank platform L2 cache ecc - LP: #1008345 * (pre-stable): bcma: add ext PA workaround for BCM4331 and BCM43431 - LP: #925577 * SAUCE: ALSA: hda - Fix power-map regression for HP dv6 & co - LP: #1013183 * [Config] Enable CONFIG_CGROUPS for highbank - LP: #1014692 * Revert "net: maintain namespace isolation between vlan and real device" - LP: #1013723 * x86/amd: Re-enable CPU topology extensions in case BIOS has disabled it - LP: #1009087 * hwmon: (k10temp) Add support for AMD Trinity CPUs - LP: #1009086 * hwmon: (fam15h_power) Increase output resolution - LP: #1009086 * Input: wacom - use BTN_TOOL_FINGER to indicate touch device type - LP: #1009435 * Input: wacom - use switch statement for wacom_tpc_irq() - LP: #1009435 * Input: wacom - isolate input registration - LP: #1009435 * Input: wacom - wireless monitor framework - LP: #1009435 * Input: wacom - create inputs when wireless connect - LP: #1009435 * Input: wacom - wireless battery status - LP: #1009435 * Input: wacom - check for allocation failure in probe() - LP: #1009435 * Input: wacom - add basic Intuos5 support - LP: #1009435 * Input: wacom - add Intuos5 Touch Ring/ExpressKey support - LP: #1009435 * Input: wacom - add Intuos5 Touch Ring LED support - LP: #1009435 * Input: wacom - add Intuos5 multitouch sensor support - LP: #1009435 * iommu/amd: Add workaround for event log erratum - LP: #1013723 * MIPS: BCM63XX: Add missing include for bcm63xx_gpio.h - LP: #1013723 * cifs: Include backup intent search flags during searches {try #2) - LP: #1013723 * sunrpc: fix loss of task->tk_status after rpc_delay call in xprt_alloc_slot - LP: #1013723 * exofs: Fix CRASH on very early IO errors. - LP: #1013723 * cifs: fix oops while traversing open file list (try #4) - LP: #1013723 * Fix dm-multipath starvation when scsi host is busy - LP: #1013723 * ixp4xx: fix compilation by adding gpiolib support - LP: #1013723 * drm/i915: properly handle interlaced bit for sdvo dtd conversion - LP: #1013723 * drm/i915: enable vdd when switching off the eDP panel - LP: #1013723 * drm/i915: Ignore LVDS on hp t5745 and hp st5747 thin client - LP: #1013723 * drm/i915: no lvds quirk for HP t5740e Thin Client - LP: #1013723 * drm/i915: wait for a vblank to pass after tv detect - LP: #1013723 * drm/i915: Update GEN6_RP_CONTROL definitions - LP: #1013723 * drm/i915: always use RPNSWREQ for turbo change requests - LP: #1013723 * solos-pci: Fix DMA support - LP: #1013723 * microblaze: Do not select GENERIC_GPIO by default - LP: #1013723 * fix boot failure on 32-bit systems caused by branch stubs placed before .text - LP: #1013723 * fix TLB fault path on PA2.0 narrow systems - LP: #1013723 * iwlwifi: update BT traffic load states correctly - LP: #1013723 * iwlwifi: do not use shadow registers by default - LP: #1013723 * wl1251: fix oops on early interrupt - LP: #1013723 * NFSv4: Map NFS4ERR_SHARE_DENIED into an EACCES error instead of EIO - LP: #1013723 * drm/radeon: fix XFX quirk - LP: #1013723 * ath9k: fix a use-after-free-bug when ath_tx_setup_buffer() fails - LP: #1013723 * mac80211: fix ADDBA declined after suspend with wowlan - LP: #1013723 * mm/fork: fix overflow in vma length when copying mmap on clone - LP: #1013723 * mm: consider all swapped back pages in used-once logic - LP: #1013723 * hugetlb: fix resv_map leak in error path - LP: #1013723 * mm/vmalloc.c: change void* into explict vm_struct* - LP: #1013723 * mm: fix faulty initialization in vmalloc_init() - LP: #1013723 * fix scsi_wait_scan - LP: #1013723 * mm: fix vma_resv_map() NULL pointer - LP: #1013723 * x86, amd, xen: Avoid NULL pointer paravirt references - LP: #1013723 * slub: fix a memory leak in get_partial_node() - LP: #1013723 * ext4: force ro mount i
[Bug 990368] Re: CVE-2012-2133
This bug was fixed in the package linux-armadaxp - 3.2.0-1605.8 --- linux-armadaxp (3.2.0-1605.8) precise-proposed; urgency=low * Release Tracking Bug -LP: #1020888 [ Jani Monoses ] * Fix warnings. * Adapt to new sched_clock API [ Ubuntu: 3.2.0-27.43 ] * No change upload to fix .ddeb generation in the PPA. * Release Tracking Bug - LP: #1020016 [ Ubuntu: 3.2.0-27.42 ] * Release Tracking Bug - LP: #1020016 * PACKAGING: add .gnu_debuglink sections to .ko files - LP: #669641 * [Config] Updateconfigs - LP: #1008345 * SAUCE: (upstreamed) [media] ene_ir: Fix driver initialisation - LP: #1014800 * SAUCE: ocfs2: Fix NULL pointer dereferrence in __ocfs2_change_file_space - LP: #1006012 * SAUCE: net: calxedaxgmac: enable rx cut-thru mode - LP: #1008345 * SAUCE: EDAC: Add support for the highbank platform memory - LP: #1008345 * SAUCE: EDAC: add support for highbank platform L2 cache ecc - LP: #1008345 * (pre-stable): bcma: add ext PA workaround for BCM4331 and BCM43431 - LP: #925577 * SAUCE: ALSA: hda - Fix power-map regression for HP dv6 & co - LP: #1013183 * [Config] Enable CONFIG_CGROUPS for highbank - LP: #1014692 * Revert "net: maintain namespace isolation between vlan and real device" - LP: #1013723 * x86/amd: Re-enable CPU topology extensions in case BIOS has disabled it - LP: #1009087 * hwmon: (k10temp) Add support for AMD Trinity CPUs - LP: #1009086 * hwmon: (fam15h_power) Increase output resolution - LP: #1009086 * Input: wacom - use BTN_TOOL_FINGER to indicate touch device type - LP: #1009435 * Input: wacom - use switch statement for wacom_tpc_irq() - LP: #1009435 * Input: wacom - isolate input registration - LP: #1009435 * Input: wacom - wireless monitor framework - LP: #1009435 * Input: wacom - create inputs when wireless connect - LP: #1009435 * Input: wacom - wireless battery status - LP: #1009435 * Input: wacom - check for allocation failure in probe() - LP: #1009435 * Input: wacom - add basic Intuos5 support - LP: #1009435 * Input: wacom - add Intuos5 Touch Ring/ExpressKey support - LP: #1009435 * Input: wacom - add Intuos5 Touch Ring LED support - LP: #1009435 * Input: wacom - add Intuos5 multitouch sensor support - LP: #1009435 * iommu/amd: Add workaround for event log erratum - LP: #1013723 * MIPS: BCM63XX: Add missing include for bcm63xx_gpio.h - LP: #1013723 * cifs: Include backup intent search flags during searches {try #2) - LP: #1013723 * sunrpc: fix loss of task->tk_status after rpc_delay call in xprt_alloc_slot - LP: #1013723 * exofs: Fix CRASH on very early IO errors. - LP: #1013723 * cifs: fix oops while traversing open file list (try #4) - LP: #1013723 * Fix dm-multipath starvation when scsi host is busy - LP: #1013723 * ixp4xx: fix compilation by adding gpiolib support - LP: #1013723 * drm/i915: properly handle interlaced bit for sdvo dtd conversion - LP: #1013723 * drm/i915: enable vdd when switching off the eDP panel - LP: #1013723 * drm/i915: Ignore LVDS on hp t5745 and hp st5747 thin client - LP: #1013723 * drm/i915: no lvds quirk for HP t5740e Thin Client - LP: #1013723 * drm/i915: wait for a vblank to pass after tv detect - LP: #1013723 * drm/i915: Update GEN6_RP_CONTROL definitions - LP: #1013723 * drm/i915: always use RPNSWREQ for turbo change requests - LP: #1013723 * solos-pci: Fix DMA support - LP: #1013723 * microblaze: Do not select GENERIC_GPIO by default - LP: #1013723 * fix boot failure on 32-bit systems caused by branch stubs placed before .text - LP: #1013723 * fix TLB fault path on PA2.0 narrow systems - LP: #1013723 * iwlwifi: update BT traffic load states correctly - LP: #1013723 * iwlwifi: do not use shadow registers by default - LP: #1013723 * wl1251: fix oops on early interrupt - LP: #1013723 * NFSv4: Map NFS4ERR_SHARE_DENIED into an EACCES error instead of EIO - LP: #1013723 * drm/radeon: fix XFX quirk - LP: #1013723 * ath9k: fix a use-after-free-bug when ath_tx_setup_buffer() fails - LP: #1013723 * mac80211: fix ADDBA declined after suspend with wowlan - LP: #1013723 * mm/fork: fix overflow in vma length when copying mmap on clone - LP: #1013723 * mm: consider all swapped back pages in used-once logic - LP: #1013723 * hugetlb: fix resv_map leak in error path - LP: #1013723 * mm/vmalloc.c: change void* into explict vm_struct* - LP: #1013723 * mm: fix faulty initialization in vmalloc_init() - LP: #1013723 * fix scsi_wait_scan - LP: #1013723 * mm: fix vma_resv_map() NULL pointer - LP: #1013723 * x86, amd, xen: Avoid NULL pointer paravirt references - LP: #1013723 * slub: fix a memory leak in get_partial_node() - LP: #1013723 * ext4: force ro mount i
[Bug 990368] Re: CVE-2012-2133
** Description changed: - There is a use after free bug in the kernel hugetlb code. The bug can - allow an authenticated, unprivileged local attacker to crash the system - (and possibly gain higher privileges) if huge pages are enabled in the - system. + Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge + pages are enabled, allows local users to cause a denial of service + (system crash) or possibly gain privileges by interacting with a + hugetlbfs filesystem, as demonstrated by a umount operation that + triggers improper handling of quota data. Break-Fix: - 90481622d75715bfcb68501280a917dbfe516029 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
RE: [Bug 990368] Re: CVE-2012-2133
Hi Andreia, I think that your error is unrelated to this bug. The bug is related to a control variable for hugetlbfs, confusingly named "quota". This variable has nothing to do with quota in NFS servers. Good luck, --Shachar > -Original Message- > From: boun...@canonical.com [mailto:boun...@canonical.com] On Behalf > Of Andreia Pio da Silva > Sent: Tuesday, June 26, 2012 5:26 PM > To: Shachar Raindel > Subject: [Bug 990368] Re: CVE-2012-2133 > > hugepages: fix use after free bug in "quota" handling - LP: #990368 - > CVE-2012-2133 > > Hi, > > My NFS server is a ubuntu server 10.04. > > please, after the kernel update to version 2.6.32.41 I am with the > following problem: I had the problem in NFS clients in the creation or > editing of files for only a few accounts: > > fsync failed: Disk quota exceeded > > Is very strange happens only on some accounts. > > I emphasize that these accounts with this error message has sufficient > quota on the server. > > Today I updated kernel to version 2.6.32.41.90 but the error remains. > > Have disabled the control of quotas on the server but can not take this as > a solution. Any proposal that can solve this problem? > > Thanks, > Andreia Pio da Silva > > -- > You received this bug notification because you are subscribed to a > duplicate bug report (987107). > https://bugs.launchpad.net/bugs/990368 > > Title: > CVE-2012-2133 > > Status in “linux” package in Ubuntu: > Invalid > Status in “linux-armadaxp” package in Ubuntu: > Fix Committed > Status in “linux-ec2” package in Ubuntu: > Invalid > Status in “linux-fsl-imx51” package in Ubuntu: > Invalid > Status in “linux-lts-backport-maverick” package in Ubuntu: > Invalid > Status in “linux-lts-backport-natty” package in Ubuntu: > Invalid > Status in “linux-lts-backport-oneiric” package in Ubuntu: > Invalid > Status in “linux-mvl-dove” package in Ubuntu: > Invalid > Status in “linux-ti-omap4” package in Ubuntu: > Fix Committed > Status in “linux” source package in Lucid: > Fix Released > Status in “linux-armadaxp” source package in Lucid: > Invalid > Status in “linux-ec2” source package in Lucid: > Fix Released > Status in “linux-fsl-imx51” source package in Lucid: > Invalid > Status in “linux-lts-backport-maverick” source package in Lucid: > Invalid > Status in “linux-lts-backport-natty” source package in Lucid: > Fix Released > Status in “linux-lts-backport-oneiric” source package in Lucid: > Fix Released > Status in “linux-mvl-dove” source package in Lucid: > Invalid > Status in “linux-ti-omap4” source package in Lucid: > Invalid > Status in “linux” source package in Natty: > Fix Released > Status in “linux-armadaxp” source package in Natty: > Invalid > Status in “linux-ec2” source package in Natty: > Invalid > Status in “linux-fsl-imx51” source package in Natty: > Invalid > Status in “linux-lts-backport-maverick” source package in Natty: > Invalid > Status in “linux-lts-backport-natty” source package in Natty: > Invalid > Status in “linux-lts-backport-oneiric” source package in Natty: > Invalid > Status in “linux-mvl-dove” source package in Natty: > Invalid > Status in “linux-ti-omap4” source package in Natty: > Confirmed > Status in “linux” source package in Oneiric: > Fix Released > Status in “linux-armadaxp” source package in Oneiric: > Invalid > Status in “linux-ec2” source package in Oneiric: > Invalid > Status in “linux-fsl-imx51” source package in Oneiric: > Invalid > Status in “linux-lts-backport-maverick” source package in Oneiric: > Invalid > Status in “linux-lts-backport-natty” source package in Oneiric: > Invalid > Status in “linux-lts-backport-oneiric” source package in Oneiric: > Invalid > Status in “linux-mvl-dove” source package in Oneiric: > Invalid > Status in “linux-ti-omap4” source package in Oneiric: > Fix Released > Status in “linux” source package in Precise: > Fix Released > Status in “linux-armadaxp” source package in Precise: > Fix Committed > Status in “linux-ec2” source package in Precise: > Invalid > Status in “linux-fsl-imx51” source package in Precise: > Invalid > Status in “linux-lts-backport-maverick” source package in Precise: > Invalid > Status in “linux-lts-backport-natty” source package in Precise: > Invalid > Status in “linux-lts-backport-oneiric” source package in Precise: > Invalid > Status in “linux-mvl-dove” source package in Precise: > Invalid > Status in “linux-ti-omap4” source package in Precise: > Fix Released > Status in “linux” source package in Q
[Bug 990368] Re: CVE-2012-2133
hugepages: fix use after free bug in "quota" handling - LP: #990368 - CVE-2012-2133 Hi, My NFS server is a ubuntu server 10.04. please, after the kernel update to version 2.6.32.41 I am with the following problem: I had the problem in NFS clients in the creation or editing of files for only a few accounts: fsync failed: Disk quota exceeded Is very strange happens only on some accounts. I emphasize that these accounts with this error message has sufficient quota on the server. Today I updated kernel to version 2.6.32.41.90 but the error remains. Have disabled the control of quotas on the server but can not take this as a solution. Any proposal that can solve this problem? Thanks, Andreia Pio da Silva -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Branch linked: lp:ubuntu/precise-proposed/linux-armadaxp -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1211.23 --- linux-ti-omap4 (3.0.0-1211.23) oneiric-proposed; urgency=low * Release Tracking Bug - LP: #1005455 [ Paolo Pisati ] * rebased on Ubuntu-3.0.0-21.35 [ Ubuntu: 3.0.0-21.35 ] * Release Tracking Bug - LP: #1004571 * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 * SAUCE: async_populate_rootfs: fix build warnings - LP: #1003417 * Revert "SAUCE: ite-cir: postpone ISR registration" - LP: #1002880 * [Config] perarch and indep tools builds need separate build directories * Revert "autofs: work around unhappy compat problem on x86-64" - LP: #996109 * Revert "usb: Fix build error due to dma_mask is not at pdev_archdata at ARM" - LP: #996109 * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * NFSv4: include bitmap in nfsv4 get acl data - LP: #893147 - CVE-2011-4131 * hugepages: fix use after free bug in "quota" handling - LP: #990368 - CVE-2012-2133 * nfs: Enclose hostname in brackets when needed in nfs_do_root_mount - LP: #996109 * NFSv4: Ensure that the LOCK code sets exception->inode - LP: #996109 * NFSv4: Ensure that we check lock exclusive/shared type against open modes - LP: #996109 * x86, apic: APIC code touches invalid MSR on P5 class machines - LP: #996109 * xen: correctly check for pending events when restoring irq flags - LP: #996109 * xen/smp: Fix crash when booting with ACPI hotplug CPUs. - LP: #996109 * ASoC: dapm: Ensure power gets managed for line widgets - LP: #996109 * dmaengine: at_hdmac: remove clear-on-read in atc_dostart() - LP: #996109 * hwmon: fam15h_power: fix bogus values with current BIOSes - LP: #996109 * hwmon: (fam15h_power) Fix pci_device_id array - LP: #996109 * drm/i915: handle input/output sdvo timings separately in mode_set - LP: #996109 * drm/i915: fix integer overflow in i915_gem_execbuffer2() - LP: #996109 * drm/i915: fix integer overflow in i915_gem_do_execbuffer() - LP: #996109 * nl80211: ensure interface is up in various APIs - LP: #996109 * EHCI: fix criterion for resuming the root hub - LP: #996109 * brcm80211: smac: resume transmit fifo upon receiving frames - LP: #996109 * Fix modpost failures in fedora 17 - LP: #996109 * mmc: unbreak sdhci-esdhc-imx on i.MX25 - LP: #996109 * nfsd: fix b0rken error value for setattr on read-only mount - LP: #996109 * nfsd: fix error values returned by nfsd4_lockt() when nfsd_open() fails - LP: #996109 * USB: cdc-wdm: fix race leading leading to memory corruption - LP: #996109 * USB: EHCI: fix crash during suspend on ASUS computers - LP: #996109 * USB: gadget: storage gadgets send wrong error code for unknown commands - LP: #996109 * usb gadget: uvc: uvc_request_data::length field must be signed - LP: #996109 * pipes: add a "packetized pipe" mode for writing - LP: #996109 * autofs: make the autofsv5 packet file descriptor use a packetized pipe - LP: #996109 * ARM: 7403/1: tls: remove covert channel via TPIDRURW - LP: #996109 * SCSI: libsas: fix sas_find_bcast_phy() in the presence of 'vacant' phys - LP: #996109 * SCSI: libsas: fix false positive 'device attached' conditions - LP: #996109 * efi: Add new variable attributes - LP: #996109 * efivars: String functions - LP: #996109 * efivars: fix warnings when CONFIG_PSTORE=n - LP: #996109 * efi: Validate UEFI boot variables - LP: #996109 * efivars: Improve variable validation - LP: #996109 * hwmon: (coretemp) Increase CPU core limit - LP: #996109 * hwmon: (coretemp) fix oops on cpu unplug - LP: #996109 * libata: skip old error history when counting probe trials - LP: #996109 * i2c: pnx: Disable clk in suspend - LP: #996109 * ipw2200: Fix race condition in the command completion acknowledge - LP: #996109 * mac80211: fix AP mode EAP tx for VLAN stations - LP: #996109 * rtlwifi: Fix oops on unload - LP: #996109 * wl1251: fix crash on remove due to premature kfree - LP: #996109 * wl1251: fix crash on remove due to leftover work item - LP: #996109 * sched: Fix nohz load accounting -- again! - LP: #996109 * hfsplus: Fix potential buffer overflows - LP: #996109 * Linux 3.0.31 - LP: #996109 * smsc95xx: mark link down on startup and let PHY interrupt deal with carrier changes - LP: #1002880 * xen/pte: Fix crashes when trying to see non-existent PGD/PMD/PUD/PTEs - LP: #1002880 * xen/pci: don't use PCI BIOS service for configuration space accesses - LP: #1002880 * percpu, x86: don't use PMD_SIZE as embedded atom_size on 32bit - LP: #1002880 * asm-generic: Use __BITS_PER_LONG in statfs.h - LP: #1002880 * Fix __read_seqcount_begin() to use ACCESS_ONCE for sequen
[Bug 990368] Re: CVE-2012-2133
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1414.19 --- linux-ti-omap4 (3.2.0-1414.19) precise-proposed; urgency=low * Release Tracking Bug - LP: #1004555 [ Paolo Pisati ] * [Config] updateconfigs following rebase * rebased on 3.2.0-25.40 [ Ubuntu: 3.2.0-25.40 ] * Release Tracking Bug - LP: #1003534 * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 * [Config] include include/generated/compile.h - LP: #942569 * SAUCE: rtc: pl031: Enable module alias autogeneration for AMBA drivers - LP: #1000831 * Revert "SAUCE: ite-cir: postpone ISR registration" - LP: #1002484 * SAUCE: async_populate_rootfs: fix build warnings - LP: #1003417 * [Config] add highbank flavour - LP: #1000831 * SAUCE: apparmor: fix long path failure due to disconnected path - LP: #955892 * SAUCE: apparmor: fix profile lookup for unconfined - LP: #978038, #987371 * SAUCE: arm highbank: add support for pl320-ipc driver - LP: #1000831 * SAUCE: input: add a key driver for highbank - LP: #1000831 * SAUCE: ARM: highbank: Add smc calls to enable/disable the L2 - LP: #1000831 * SAUCE: force DMA buffers to non-bufferable on highbank - LP: #1000831 * SAUCE: net: calxedaxgmac: fix net timeout recovery - LP: #1000831 * [Config] perarch and indep tools builds need separate build directories * [Config] CONFIG_XEN_ACPI_PROCESSOR=y - LP: #898112 * Revert "autofs: work around unhappy compat problem on x86-64" - LP: #1002482 * Input: wacom - cleanup feature report for bamboos - LP: #568064 * Input: wacom - remove unused bamboo HID parsing - LP: #568064 * Input: wacom - add some comments to wacom_parse_hid - LP: #568064 * Input: wacom - relax Bamboo stylus ID check - LP: #568064 * Input: wacom - read 3rd gen Bamboo Touch HID data - LP: #568064 * Input: wacom - 3rd gen Bamboo P&Touch packet support - LP: #568064 * Input: wacom - ignore unwanted bamboo packets - LP: #568064 * HID: wacom: Move parsing to a separate function - LP: #568064 * HID: wacom: Initial driver for Wacom Intuos4 Wireless (Bluetooth) - LP: #568064 * Input: wacom - add support for Cintiq 24HD - LP: #568064 * Input: wacom - add LED support for Cintiq 24HD - LP: #568064 * Input: wacom - add missing LEDS_CLASS to Kconfig - LP: #568064 * Input: wacom - fix 3rd-gen Bamboo MT when 4+ fingers are in use - LP: #568064 * power_supply: allow a power supply to explicitly point to powered device - LP: #568064 * power_supply: add "powers" links to self-powered HID devices - LP: #568064 * HID: wiimote: fix invalid power_supply_powers call - LP: #568064 * HID: wacom: Fix invalid power_supply_powers calls - LP: #568064 * ARM: 7178/1: fault.c: Port OOM changes into do_page_fault - LP: #951043 * ARM: 7368/1: fault.c: correct how the tsk->[maj|min]_flt gets incremented - LP: #951043 * hugepages: fix use after free bug in "quota" handling - LP: #990368 - CVE-2012-2133 * provide disable_cpufreq() function to disable the API. - LP: #898112 * xen/acpi-processor: C and P-state driver that uploads said data to hypervisor. - LP: #898112 * xen/acpi-processor: Do not depend on CPU frequency scaling drivers. - LP: #898112 * xen/acpi: Fix Kconfig dependency on CPU_FREQ - LP: #898112 * xen/acpi: Remove the WARN's as they just create noise. - LP: #898112 * xen/cpufreq: Disable the cpu frequency scaling drivers from loading. - LP: #898112 * xen/apic: Return the APIC ID (and version) for CPU 0. - LP: #898112 * ARM: highbank: add xgmac ethernet devices to dts - LP: #1000831 * net: add calxeda xgmac ethernet driver - LP: #1000831 * ARM: versatile: Add missing ENDPROC to headsmp.S - LP: #1000831 * ARM: msm: Add missing ENDPROC to headsmp.S - LP: #1000831 * ARM: ux500: add missing ENDPROC to headsmp.S - LP: #1000831 * ARM: exynos: remove incorrect BSYM usage - LP: #1000831 * ARM: imx: remove incorrect BSYM usage - LP: #1000831 * ARM: highbank: remove incorrect BSYM usage - LP: #1000831 * ARM: make BSYM macro assembly only - LP: #1000831 * ARM: amba: Auto-generate AMBA driver module aliases during modpost - LP: #1000831 * ARM: amba: Move definition of struct amba_id to mod_devicetable.h - LP: #1000831 * dmaengine: pl330: Enable module alias autogeneration for AMBA drivers - LP: #1000831 * crypto: sha512 - Fix byte counter overflow in SHA-512 - LP: #1002482 * ALSA: hda/conexant - Don't set HP pin-control bit unconditionally - LP: #1002482 * ALSA: hda/conexant - Set up the missing docking-station pins - LP: #1002482 * ARM: clps711x: serial driver hungs are a result of call disable_irq within ISR - LP: #1002482 * ARM: OMAP1: DMTIMER: fix broken timer clock source selection - LP: #100248
[Bug 990368] Re: CVE-2012-2133
This bug was fixed in the package linux - 3.2.0-25.40 --- linux (3.2.0-25.40) precise-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1003534 [ Andy Whitcroft ] * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 * [Config] include include/generated/compile.h - LP: #942569 [ Dave Martin ] * SAUCE: rtc: pl031: Enable module alias autogeneration for AMBA drivers - LP: #1000831 [ Herton Ronaldo Krzesinski ] * Revert "SAUCE: ite-cir: postpone ISR registration" - LP: #1002484 * SAUCE: async_populate_rootfs: fix build warnings - LP: #1003417 [ Ike Panhc ] * [Config] add highbank flavour - LP: #1000831 [ John Johansen ] * SAUCE: apparmor: fix long path failure due to disconnected path - LP: #955892 * SAUCE: apparmor: fix profile lookup for unconfined - LP: #978038, #987371 [ Mark Langsdorf ] * SAUCE: arm highbank: add support for pl320-ipc driver - LP: #1000831 [ Rob Herring ] * SAUCE: input: add a key driver for highbank - LP: #1000831 * SAUCE: ARM: highbank: Add smc calls to enable/disable the L2 - LP: #1000831 * SAUCE: force DMA buffers to non-bufferable on highbank - LP: #1000831 * SAUCE: net: calxedaxgmac: fix net timeout recovery - LP: #1000831 [ Tim Gardner ] * [Config] perarch and indep tools builds need separate build directories * [Config] CONFIG_XEN_ACPI_PROCESSOR=y - LP: #898112 [ Upstream Kernel Changes ] * Revert "autofs: work around unhappy compat problem on x86-64" - LP: #1002482 * Input: wacom - cleanup feature report for bamboos - LP: #568064 * Input: wacom - remove unused bamboo HID parsing - LP: #568064 * Input: wacom - add some comments to wacom_parse_hid - LP: #568064 * Input: wacom - relax Bamboo stylus ID check - LP: #568064 * Input: wacom - read 3rd gen Bamboo Touch HID data - LP: #568064 * Input: wacom - 3rd gen Bamboo P&Touch packet support - LP: #568064 * Input: wacom - ignore unwanted bamboo packets - LP: #568064 * HID: wacom: Move parsing to a separate function - LP: #568064 * HID: wacom: Initial driver for Wacom Intuos4 Wireless (Bluetooth) - LP: #568064 * Input: wacom - add support for Cintiq 24HD - LP: #568064 * Input: wacom - add LED support for Cintiq 24HD - LP: #568064 * Input: wacom - add missing LEDS_CLASS to Kconfig - LP: #568064 * Input: wacom - fix 3rd-gen Bamboo MT when 4+ fingers are in use - LP: #568064 * power_supply: allow a power supply to explicitly point to powered device - LP: #568064 * power_supply: add "powers" links to self-powered HID devices - LP: #568064 * HID: wiimote: fix invalid power_supply_powers call - LP: #568064 * HID: wacom: Fix invalid power_supply_powers calls - LP: #568064 * ARM: 7178/1: fault.c: Port OOM changes into do_page_fault - LP: #951043 * ARM: 7368/1: fault.c: correct how the tsk->[maj|min]_flt gets incremented - LP: #951043 * hugepages: fix use after free bug in "quota" handling - LP: #990368 - CVE-2012-2133 * provide disable_cpufreq() function to disable the API. - LP: #898112 * xen/acpi-processor: C and P-state driver that uploads said data to hypervisor. - LP: #898112 * xen/acpi-processor: Do not depend on CPU frequency scaling drivers. - LP: #898112 * xen/acpi: Fix Kconfig dependency on CPU_FREQ - LP: #898112 * xen/acpi: Remove the WARN's as they just create noise. - LP: #898112 * xen/cpufreq: Disable the cpu frequency scaling drivers from loading. - LP: #898112 * xen/apic: Return the APIC ID (and version) for CPU 0. - LP: #898112 * ARM: highbank: add xgmac ethernet devices to dts - LP: #1000831 * net: add calxeda xgmac ethernet driver - LP: #1000831 * ARM: versatile: Add missing ENDPROC to headsmp.S - LP: #1000831 * ARM: msm: Add missing ENDPROC to headsmp.S - LP: #1000831 * ARM: ux500: add missing ENDPROC to headsmp.S - LP: #1000831 * ARM: exynos: remove incorrect BSYM usage - LP: #1000831 * ARM: imx: remove incorrect BSYM usage - LP: #1000831 * ARM: highbank: remove incorrect BSYM usage - LP: #1000831 * ARM: make BSYM macro assembly only - LP: #1000831 * ARM: amba: Auto-generate AMBA driver module aliases during modpost - LP: #1000831 * ARM: amba: Move definition of struct amba_id to mod_devicetable.h - LP: #1000831 * dmaengine: pl330: Enable module alias autogeneration for AMBA drivers - LP: #1000831 * crypto: sha512 - Fix byte counter overflow in SHA-512 - LP: #1002482 * ALSA: hda/conexant - Don't set HP pin-control bit unconditionally - LP: #1002482 * ALSA: hda/conexant - Set up the missing docking-station pins - LP: #1002482 * ARM: clps711x: serial driver hungs are a result of call disable_irq within ISR - LP: #1002482 * ARM: OMAP1: DMTIMER: fix broken
[Bug 990368] Re: CVE-2012-2133
** Branch linked: lp:ubuntu/lucid-security/linux-lts-backport-oneiric -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
This bug was fixed in the package linux-ec2 - 2.6.32-345.49 --- linux-ec2 (2.6.32-345.49) lucid-proposed; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-41.90 * Release Tracking Bug - LP: #1003061 [ Ubuntu: 2.6.32-41.90 ] * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 * [Config] perarch and indep tools builds need separate build directories * hugepages: fix use after free bug in "quota" handling - LP: #990368 - CVE-2012-2133 -- Stefan BaderWed, 23 May 2012 15:34:49 +0200 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
This bug was fixed in the package linux - 2.6.32-41.90 --- linux (2.6.32-41.90) lucid-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1002389 [ Andy Whitcroft ] * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 [ Tim Gardner ] * [Config] perarch and indep tools builds need separate build directories [ Upstream Kernel Changes ] * hugepages: fix use after free bug in "quota" handling - LP: #990368 - CVE-2012-2133 -- Luis HenriquesMon, 21 May 2012 18:25:32 +0100 ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
This bug was fixed in the package linux-lts-backport-natty - 2.6.38-15.60~lucid1 --- linux-lts-backport-natty (2.6.38-15.60~lucid1) lucid-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1003079 [ Andy Whitcroft ] * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 [ Herton Ronaldo Krzesinski ] * linux: add Build-Depends for libnewt-dev, to enable perf TUI support - LP: #981717 [ Tim Gardner ] * [Config] perarch and indep tools builds need separate build directories [ Upstream Kernel Changes ] * fcaps: clear the same personality flags as suid when fcaps are used - LP: #987571 - CVE-2012-2123 * natty security: fix compile error in commoncap.c - LP: #987571 - CVE-2012-2123 * KVM: Clean up error handling during VCPU creation - LP: #971685 - CVE-2012-1601 * KVM: Ensure all vcpus are consistent with in-kernel irqchip settings - LP: #971685 - CVE-2012-1601 * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * NFSv4: include bitmap in nfsv4 get acl data - LP: #893147 - CVE-2011-4131 * hugepages: fix use after free bug in "quota" handling - LP: #990368 - CVE-2012-2133 -- Luis HenriquesWed, 23 May 2012 09:43:28 +0100 ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
This bug was fixed in the package linux-lts-backport-oneiric - 3.0.0-21.35~lucid1 --- linux-lts-backport-oneiric (3.0.0-21.35~lucid1) lucid-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1005456 [ Andy Whitcroft ] * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 [ Herton Ronaldo Krzesinski ] * SAUCE: async_populate_rootfs: fix build warnings - LP: #1003417 [ Tim Gardner ] * Revert "SAUCE: ite-cir: postpone ISR registration" - LP: #1002880 * [Config] perarch and indep tools builds need separate build directories [ Upstream Kernel Changes ] * Revert "autofs: work around unhappy compat problem on x86-64" - LP: #996109 * Revert "usb: Fix build error due to dma_mask is not at pdev_archdata at ARM" - LP: #996109 * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * NFSv4: include bitmap in nfsv4 get acl data - LP: #893147 - CVE-2011-4131 * hugepages: fix use after free bug in "quota" handling - LP: #990368 - CVE-2012-2133 * nfs: Enclose hostname in brackets when needed in nfs_do_root_mount - LP: #996109 * NFSv4: Ensure that the LOCK code sets exception->inode - LP: #996109 * NFSv4: Ensure that we check lock exclusive/shared type against open modes - LP: #996109 * x86, apic: APIC code touches invalid MSR on P5 class machines - LP: #996109 * xen: correctly check for pending events when restoring irq flags - LP: #996109 * xen/smp: Fix crash when booting with ACPI hotplug CPUs. - LP: #996109 * ASoC: dapm: Ensure power gets managed for line widgets - LP: #996109 * dmaengine: at_hdmac: remove clear-on-read in atc_dostart() - LP: #996109 * hwmon: fam15h_power: fix bogus values with current BIOSes - LP: #996109 * hwmon: (fam15h_power) Fix pci_device_id array - LP: #996109 * drm/i915: handle input/output sdvo timings separately in mode_set - LP: #996109 * drm/i915: fix integer overflow in i915_gem_execbuffer2() - LP: #996109 * drm/i915: fix integer overflow in i915_gem_do_execbuffer() - LP: #996109 * nl80211: ensure interface is up in various APIs - LP: #996109 * EHCI: fix criterion for resuming the root hub - LP: #996109 * brcm80211: smac: resume transmit fifo upon receiving frames - LP: #996109 * Fix modpost failures in fedora 17 - LP: #996109 * mmc: unbreak sdhci-esdhc-imx on i.MX25 - LP: #996109 * nfsd: fix b0rken error value for setattr on read-only mount - LP: #996109 * nfsd: fix error values returned by nfsd4_lockt() when nfsd_open() fails - LP: #996109 * USB: cdc-wdm: fix race leading leading to memory corruption - LP: #996109 * USB: EHCI: fix crash during suspend on ASUS computers - LP: #996109 * USB: gadget: storage gadgets send wrong error code for unknown commands - LP: #996109 * usb gadget: uvc: uvc_request_data::length field must be signed - LP: #996109 * pipes: add a "packetized pipe" mode for writing - LP: #996109 * autofs: make the autofsv5 packet file descriptor use a packetized pipe - LP: #996109 * ARM: 7403/1: tls: remove covert channel via TPIDRURW - LP: #996109 * SCSI: libsas: fix sas_find_bcast_phy() in the presence of 'vacant' phys - LP: #996109 * SCSI: libsas: fix false positive 'device attached' conditions - LP: #996109 * efi: Add new variable attributes - LP: #996109 * efivars: String functions - LP: #996109 * efivars: fix warnings when CONFIG_PSTORE=n - LP: #996109 * efi: Validate UEFI boot variables - LP: #996109 * efivars: Improve variable validation - LP: #996109 * hwmon: (coretemp) Increase CPU core limit - LP: #996109 * hwmon: (coretemp) fix oops on cpu unplug - LP: #996109 * libata: skip old error history when counting probe trials - LP: #996109 * i2c: pnx: Disable clk in suspend - LP: #996109 * ipw2200: Fix race condition in the command completion acknowledge - LP: #996109 * mac80211: fix AP mode EAP tx for VLAN stations - LP: #996109 * rtlwifi: Fix oops on unload - LP: #996109 * wl1251: fix crash on remove due to premature kfree - LP: #996109 * wl1251: fix crash on remove due to leftover work item - LP: #996109 * sched: Fix nohz load accounting -- again! - LP: #996109 * hfsplus: Fix potential buffer overflows - LP: #996109 * Linux 3.0.31 - LP: #996109 * smsc95xx: mark link down on startup and let PHY interrupt deal with carrier changes - LP: #1002880 * xen/pte: Fix crashes when trying to see non-existent PGD/PMD/PUD/PTEs - LP: #1002880 * xen/pci: don't use PCI BIOS service for configuration space accesses - LP: #1002880 * percpu, x86: don't use PMD_SIZE as embedded atom_size on 32bit - LP: #1002880 * asm-generic: Use __BITS_PER_LONG in statfs.h - LP: #1002880 * Fix __read_seqcount_beg
[Bug 990368] Re: CVE-2012-2133
This bug was fixed in the package linux - 3.0.0-21.35 --- linux (3.0.0-21.35) oneiric-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1004571 [ Andy Whitcroft ] * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 [ Herton Ronaldo Krzesinski ] * SAUCE: async_populate_rootfs: fix build warnings - LP: #1003417 [ Tim Gardner ] * Revert "SAUCE: ite-cir: postpone ISR registration" - LP: #1002880 * [Config] perarch and indep tools builds need separate build directories [ Upstream Kernel Changes ] * Revert "autofs: work around unhappy compat problem on x86-64" - LP: #996109 * Revert "usb: Fix build error due to dma_mask is not at pdev_archdata at ARM" - LP: #996109 * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * NFSv4: include bitmap in nfsv4 get acl data - LP: #893147 - CVE-2011-4131 * hugepages: fix use after free bug in "quota" handling - LP: #990368 - CVE-2012-2133 * nfs: Enclose hostname in brackets when needed in nfs_do_root_mount - LP: #996109 * NFSv4: Ensure that the LOCK code sets exception->inode - LP: #996109 * NFSv4: Ensure that we check lock exclusive/shared type against open modes - LP: #996109 * x86, apic: APIC code touches invalid MSR on P5 class machines - LP: #996109 * xen: correctly check for pending events when restoring irq flags - LP: #996109 * xen/smp: Fix crash when booting with ACPI hotplug CPUs. - LP: #996109 * ASoC: dapm: Ensure power gets managed for line widgets - LP: #996109 * dmaengine: at_hdmac: remove clear-on-read in atc_dostart() - LP: #996109 * hwmon: fam15h_power: fix bogus values with current BIOSes - LP: #996109 * hwmon: (fam15h_power) Fix pci_device_id array - LP: #996109 * drm/i915: handle input/output sdvo timings separately in mode_set - LP: #996109 * drm/i915: fix integer overflow in i915_gem_execbuffer2() - LP: #996109 * drm/i915: fix integer overflow in i915_gem_do_execbuffer() - LP: #996109 * nl80211: ensure interface is up in various APIs - LP: #996109 * EHCI: fix criterion for resuming the root hub - LP: #996109 * brcm80211: smac: resume transmit fifo upon receiving frames - LP: #996109 * Fix modpost failures in fedora 17 - LP: #996109 * mmc: unbreak sdhci-esdhc-imx on i.MX25 - LP: #996109 * nfsd: fix b0rken error value for setattr on read-only mount - LP: #996109 * nfsd: fix error values returned by nfsd4_lockt() when nfsd_open() fails - LP: #996109 * USB: cdc-wdm: fix race leading leading to memory corruption - LP: #996109 * USB: EHCI: fix crash during suspend on ASUS computers - LP: #996109 * USB: gadget: storage gadgets send wrong error code for unknown commands - LP: #996109 * usb gadget: uvc: uvc_request_data::length field must be signed - LP: #996109 * pipes: add a "packetized pipe" mode for writing - LP: #996109 * autofs: make the autofsv5 packet file descriptor use a packetized pipe - LP: #996109 * ARM: 7403/1: tls: remove covert channel via TPIDRURW - LP: #996109 * SCSI: libsas: fix sas_find_bcast_phy() in the presence of 'vacant' phys - LP: #996109 * SCSI: libsas: fix false positive 'device attached' conditions - LP: #996109 * efi: Add new variable attributes - LP: #996109 * efivars: String functions - LP: #996109 * efivars: fix warnings when CONFIG_PSTORE=n - LP: #996109 * efi: Validate UEFI boot variables - LP: #996109 * efivars: Improve variable validation - LP: #996109 * hwmon: (coretemp) Increase CPU core limit - LP: #996109 * hwmon: (coretemp) fix oops on cpu unplug - LP: #996109 * libata: skip old error history when counting probe trials - LP: #996109 * i2c: pnx: Disable clk in suspend - LP: #996109 * ipw2200: Fix race condition in the command completion acknowledge - LP: #996109 * mac80211: fix AP mode EAP tx for VLAN stations - LP: #996109 * rtlwifi: Fix oops on unload - LP: #996109 * wl1251: fix crash on remove due to premature kfree - LP: #996109 * wl1251: fix crash on remove due to leftover work item - LP: #996109 * sched: Fix nohz load accounting -- again! - LP: #996109 * hfsplus: Fix potential buffer overflows - LP: #996109 * Linux 3.0.31 - LP: #996109 * smsc95xx: mark link down on startup and let PHY interrupt deal with carrier changes - LP: #1002880 * xen/pte: Fix crashes when trying to see non-existent PGD/PMD/PUD/PTEs - LP: #1002880 * xen/pci: don't use PCI BIOS service for configuration space accesses - LP: #1002880 * percpu, x86: don't use PMD_SIZE as embedded atom_size on 32bit - LP: #1002880 * asm-generic: Use __BITS_PER_LONG in statfs.h - LP: #1002880 * Fix __read_seqcount_begin() to use ACCESS_ONCE for sequence value read -
[Bug 990368] Re: CVE-2012-2133
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Branch linked: lp:ubuntu/precise-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
This bug was fixed in the package linux - 2.6.38-15.60 --- linux (2.6.38-15.60) natty-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1002384 [ Andy Whitcroft ] * [Config] control.stub is an intermediate product not a dependancy - LP: #992414 [ Herton Ronaldo Krzesinski ] * linux: add Build-Depends for libnewt-dev, to enable perf TUI support - LP: #981717 [ Tim Gardner ] * [Config] perarch and indep tools builds need separate build directories [ Upstream Kernel Changes ] * fcaps: clear the same personality flags as suid when fcaps are used - LP: #987571 - CVE-2012-2123 * natty security: fix compile error in commoncap.c - LP: #987571 - CVE-2012-2123 * KVM: Clean up error handling during VCPU creation - LP: #971685 - CVE-2012-1601 * KVM: Ensure all vcpus are consistent with in-kernel irqchip settings - LP: #971685 - CVE-2012-1601 * KVM: unmap pages from the iommu when slots are removed - LP: #987569 - CVE-2012-2121 * NFSv4: include bitmap in nfsv4 get acl data - LP: #893147 - CVE-2011-4131 * hugepages: fix use after free bug in "quota" handling - LP: #990368 - CVE-2012-2133 -- Luis HenriquesMon, 21 May 2012 17:56:07 +0100 ** Changed in: linux (Ubuntu Natty) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-4131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-1601 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-2121 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-2123 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-oneiric -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: linux (Ubuntu Hardy) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New => Fix Committed ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux (Ubuntu Precise) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Oneiric) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Lucid) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Natty) Status: In Progress => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux (Ubuntu Quantal) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux (Ubuntu Lucid) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux (Ubuntu Precise) Status: New => In Progress ** Changed in: linux (Ubuntu Oneiric) Status: New => In Progress ** Changed in: linux (Ubuntu Natty) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-armadaxp (Ubuntu Quantal) Importance: Undecided => Medium ** Changed in: linux-ec2 (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Quantal) Importance: Undecided => Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Quantal) Importance: Undecided => Medium ** Changed in: linux-lts-backport-natty (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Quantal) Importance: Undecided => Medium ** Changed in: linux-mvl-dove (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Quantal) Importance: Undecided => Medium ** Changed in: linux-lts-backport-maverick (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Quantal) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Quantal) Importance: Undecided => Medium ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Importance: Undecided => Medium ** Changed in: linux-fsl-imx51 (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Quantal) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux (Ubuntu Hardy) Assignee: (unassigned) => Steve Conklin (sconklin) ** Changed in: linux (Ubuntu Lucid) Assignee: (unassigned) => Steve Conklin (sconklin) ** Changed in: linux (Ubuntu Natty) Assignee: (unassigned) => Steve Conklin (sconklin) ** Changed in: linux (Ubuntu Oneiric) Assignee: (unassigned) => Steve Conklin (sconklin) ** Changed in: linux (Ubuntu Precise) Assignee: (unassigned) => Steve Conklin (sconklin) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
** Changed in: linux-armadaxp (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-armadaxp (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-armadaxp (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Hardy) Importance: Undecided => Medium ** Changed in: linux-armadaxp (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Natty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/990368 Title: CVE-2012-2133 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/990368/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 990368] Re: CVE-2012-2133
CVE-2012-2133 ** Also affects: linux (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Hardy) Importance: Undecided Status: New ** Changed in: linux-ec2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-mvl-d