The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Also affects: linux (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-ec2
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-lts-wily (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects:
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2
** Changed in: linux-lts-backport-maverick (Ubuntu Quantal)
Status: New = Won't Fix
** Changed in: linux-lts-backport-maverick (Ubuntu Raring)
Status: New = Won't Fix
** Changed in: linux-lts-backport-maverick (Ubuntu Saucy)
Status: New = Won't Fix
--
You received this bug
** Changed in: linux-lts-backport-maverick (Ubuntu)
Status: New = Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
This bug was fixed in the package linux-ti-omap4 - 3.5.0-233.49
---
linux-ti-omap4 (3.5.0-233.49) quantal; urgency=low
* Release Tracking Bug
- LP: #1224116
[ Paolo Pisati ]
* rebased on Ubuntu-3.5.0-41.64
[ Ubuntu: 3.5.0-41.64 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux - 3.2.0-54.82
---
linux (3.2.0-54.82) precise; urgency=low
[Steve Conklin]
* Release Tracking Bug
- LP: #1223490
[ Upstream Kernel Changes ]
* Revert zram: use zram-lock to protect zram_free_page() in swap free
notify path
This bug was fixed in the package linux - 3.5.0-41.64
---
linux (3.5.0-41.64) quantal; urgency=low
[Brad Figg]
* Release Tracking Bug
- LP: #1223451
[ Upstream Kernel Changes ]
* kernel-doc: bugfix - multi-line macros
- LP: #1223920
* Revert zram: use zram-lock
This bug was fixed in the package linux-lts-raring -
3.8.0-31.46~precise1
---
linux-lts-raring (3.8.0-31.46~precise1) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1223628
* UBUNTU: [Config] KUSER_HELPERS=y for armhf
[ Upstream Kernel Changes ]
*
This bug was fixed in the package linux - 3.8.0-31.46
---
linux (3.8.0-31.46) raring; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1223406
* UBUNTU: [Config] KUSER_HELPERS=y for armhf
[ Upstream Kernel Changes ]
* Revert cpuidle: Quickly notice prediction
This bug was fixed in the package linux-lts-raring -
3.8.0-31.46~precise1
---
linux-lts-raring (3.8.0-31.46~precise1) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1223628
* UBUNTU: [Config] KUSER_HELPERS=y for armhf
[ Upstream Kernel Changes ]
*
This bug was fixed in the package linux-lts-quantal -
3.5.0-41.64~precise1
---
linux-lts-quantal (3.5.0-41.64~precise1) precise; urgency=low
[Brad Figg]
* Release Tracking Bug
- LP: #1224120
[ Upstream Kernel Changes ]
* kernel-doc: bugfix - multi-line macros
- LP:
This bug was fixed in the package linux-ti-omap4 - 3.5.0-233.49
---
linux-ti-omap4 (3.5.0-233.49) quantal; urgency=low
* Release Tracking Bug
- LP: #1224116
[ Paolo Pisati ]
* rebased on Ubuntu-3.5.0-41.64
[ Ubuntu: 3.5.0-41.64 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-armadaxp - 3.5.0-1622.30
---
linux-armadaxp (3.5.0-1622.30) quantal-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1224117
* Rebase onto Ubuntu-3.5.0-41.64
[ Ubuntu: 3.5.0-41.64 ]
* Release Tracking Bug
-
This bug was fixed in the package linux-ti-omap4 - 3.5.0-233.49
---
linux-ti-omap4 (3.5.0-233.49) quantal; urgency=low
* Release Tracking Bug
- LP: #1224116
[ Paolo Pisati ]
* rebased on Ubuntu-3.5.0-41.64
[ Ubuntu: 3.5.0-41.64 ]
* Release Tracking Bug
- LP:
** Description changed:
- linux-kernel privilege escalation on ARM/perf
+ The validate_event function in arch/arm/kernel/perf_event.c in the Linux
+ kernel before 3.10.8 on the ARM platform allows local users to gain
+ privileges or cause a denial of service (NULL pointer dereference and
+ system
** Branch linked: lp:ubuntu/precise-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1216442
Title:
CVE-2013-4254
Status in “linux” package in Ubuntu:
** Branch linked: lp:ubuntu/quantal-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1216442
Title:
CVE-2013-4254
Status in “linux” package in Ubuntu:
Test
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1216442
Title:
CVE-2013-4254
Status in “linux” package in Ubuntu:
Invalid
Status in “linux-armadaxp” package in Ubuntu:
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New = Fix Committed
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
CVE-2013-4254
** Also affects: linux (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also
24 matches
Mail list logo