** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
** Also affects: linux (Ubuntu Yakkety)
Importance: Low
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects:
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Changed in: linux (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go
** Changed in: linux (Ubuntu Wily)
Status: Fix Committed => Invalid
** Changed in: linux (Ubuntu Xenial)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided =>
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Xenial)
Importance: Low
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-ec2
** Changed in: linux (Ubuntu Wily)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
** Description changed:
The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram
- Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier
- allows local users to cause a denial of service (BUG_ON and kernel panic)
- by establishing an RDS connection with the
** Changed in: linux (Ubuntu Vivid)
Status: Fix Released = Invalid
** Changed in: linux (Ubuntu Vivid)
Assignee: Andy Whitcroft (apw) = (unassigned)
** Changed in: linux (Ubuntu Wily)
Status: Fix Released = Invalid
** Changed in: linux (Ubuntu Wily)
Assignee: Andy
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
Trusty, Utopic, Vivid, and Wily are not affected according to
http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-2372.html
I think those tasks should be changed to Invalid.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: Invalid = Fix Committed
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: Invalid = Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: Invalid = Fix Committed
--
You received this bug notification
** Also affects: linux (Ubuntu Wily)
Importance: Low
Assignee: Andy Whitcroft (apw)
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Low
Status: Invalid
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects:
** Also affects: linux (Ubuntu Vivid)
Importance: Low
Assignee: Andy Whitcroft (apw)
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Low
Status:
** Changed in: linux-lts-backport-maverick (Ubuntu Saucy)
Status: New = Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Saucy)
Status: New = Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Saucy)
Status: New = Won't Fix
** Changed in:
** Also affects: linux (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-ec2
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-25.41~lucid1
---
linux-lts-backport-oneiric (3.0.0-25.41~lucid1) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1036577
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent
This bug was fixed in the package linux-ec2 - 2.6.32-347.53
---
linux-ec2 (2.6.32-347.53) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-42.96
* Release Tracking Bug
- LP: #1038971
[ Ubuntu: 2.6.32-42.96 ]
* SAUCE: rds_ib_send() -- prevent
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1215.27
---
linux-ti-omap4 (3.0.0-1215.27) oneiric-proposed; urgency=low
* Release Tracking Bug
- LP: #1036576
[ Paolo Pisati ]
* rebased on Ubuntu-3.0.0-25.41
[ Ubuntu: 3.0.0-25.41 ]
* Release Tracking Bug
This bug was fixed in the package linux - 3.0.0-25.41
---
linux (3.0.0-25.41) oneiric-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1036178
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
This bug was fixed in the package linux - 2.6.32-42.96
---
linux (2.6.32-42.96) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1036553
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
This bug was fixed in the package linux-ti-omap4 - 3.5.0-207.13
---
linux-ti-omap4 (3.5.0-207.13) quantal-proposed; urgency=low
[ Paolo Pisati ]
* Start new release
[ Stefan Bader ]
* (config) Enable getabis to use local package copies
[ Upstream Kernel Changes ]
*
unsubscribe
At 2012-08-20 23:49:15,Launchpad Bug Tracker 1016...@bugs.launchpad.net
wrote:
This bug was fixed in the package linux-ti-omap4 - 3.5.0-207.13
---
linux-ti-omap4 (3.5.0-207.13) quantal-proposed; urgency=low
[ Paolo Pisati ]
* Start new release
[ Stefan Bader ]
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-15.65~lucid1
---
linux-lts-backport-natty (2.6.38-15.65~lucid1) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1029786
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent
** Branch linked: lp:ubuntu/natty-security/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
This bug was fixed in the package linux - 2.6.38-15.65
---
linux (2.6.38-15.65) natty-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1027821
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.25
---
linux-ti-omap4 (2.6.38-1209.25) natty-proposed; urgency=low
* Release Tracking Bug
- LP: #1029784
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
This bug was fixed in the package linux - 3.2.0-29.46
---
linux (3.2.0-29.46) precise-proposed; urgency=low
[ Tim Gardner ]
* No change upload to fix armel/armhf FTBS caused by
'UBUNTU: [Config] SND_OMAP_SOC, SND_OMAP_SOC_MCBSP and
SND_OMAP_SOC_OMAP3_BEAGLE =y'
Added
This bug was fixed in the package linux-armadaxp - 3.2.0-1606.9
---
linux-armadaxp (3.2.0-1606.9) precise-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1030308
* Rebase onto Ubuntu-3.2.0-29.46
[ Ubuntu: 3.2.0-29.46 ]
* No change upload to fix
This bug was fixed in the package linux-armadaxp - 3.2.0-1606.9
---
linux-armadaxp (3.2.0-1606.9) precise-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1030308
* Rebase onto Ubuntu-3.2.0-29.46
[ Ubuntu: 3.2.0-29.46 ]
* No change upload to fix
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1417.23
---
linux-ti-omap4 (3.2.0-1417.23) precise-proposed; urgency=low
* Release Tracking Bug
- LP: #1030306
[ Paolo Pisati ]
* rebased on 3.2.0-29.46
[ Ubuntu: 3.2.0-29.46 ]
* No change upload to fix
** Branch linked: lp:ubuntu/precise-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
** Branch linked: lp:ubuntu/quantal-proposed/linux-lowlatency
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
This bug was fixed in the package linux - 3.5.0-7.7
---
linux (3.5.0-7.7) quantal-proposed; urgency=low
[ Andy Whitcroft ]
* [Config] CONFIG_X86_POWERNOW_K6=m
* [Config] CONFIG_X86_POWERNOW_K7=m
* [Config] CONFIG_X86_LONGHAUL=m
* [Config] CONFIG_X86_LONGRUN=m
* [Config]
** Branch linked: lp:ubuntu/precise-proposed/linux-armadaxp
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New = Fix Committed
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Fix Committed
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
** Changed in: linux (Ubuntu Quantal)
Status: New = In Progress
** Changed in: linux (Ubuntu Quantal)
Assignee: (unassigned) = Andy Whitcroft (apw)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Description changed:
A flaw was found in the Linux kernel's Reliable Datagram Sockets (RDS)
protocol implementation. A local, unprivileged user could use this flaw
to cause a denial of service.
+
+ Break-Fix: - local-2012-2372
--
You received this bug notification because you are a
CVE-2012-2372
** Also affects: linux (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also
48 matches
Mail list logo