** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importan
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importan
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1102374
Title:
CVE-2013-0190
To manage notifications about this bug
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided =>
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Unde
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-ec
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
** Also affects: linux (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2 (Ubu
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
This doesn't affect vivid according to http://people.canonical.com
/~ubuntu-security/cve/2013/CVE-2013-0190.html
** Changed in: linux (Ubuntu Vivid)
Status: Fix Committed => Invalid
** Changed in: linux-lts-backport-maverick (Ubuntu Trusty)
Status: New => Invalid
** Changed in: lin
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (
** Changed in: linux (Ubuntu Raring)
Status: Fix Committed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1102374
Title:
CVE-2013-0190
To manage notifications about this bug go t
This release has reached end-of-life [0].
[0] https://wiki.ubuntu.com/Releases
** Changed in: linux (Ubuntu Hardy)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1102374
** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
Status: New => Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-lts-backport-n
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1102374
Title:
CVE-2013-0190
To manage notifications about this
** Branch linked: lp:ubuntu/precise-security/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1102374
Title:
CVE-2013-0190
To manage notifications about this bug go to:
https://bugs.lau
** Also affects: linux (Ubuntu Saucy)
Importance: Medium
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Also affects: linux
This bug was fixed in the package linux-armadaxp - 3.5.0-1611.17
---
linux-armadaxp (3.5.0-1611.17) quantal-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1160181
* Rebase onto Ubuntu-3.5.0-27.46
[ Ubuntu: 3.5.0-27.46 ]
* Release Tracking Bug
-
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1427.36
---
linux-ti-omap4 (3.2.0-1427.36) precise-proposed; urgency=low
* Release Tracking Bug
- LP: #1135174
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-39.62
[ Ubuntu: 3.2.0-39.62 ]
* Release Tracking Bug
This bug was fixed in the package linux-ti-omap4 - 3.5.0-221.31
---
linux-ti-omap4 (3.5.0-221.31) quantal-proposed; urgency=low
* Release Tracking Bug
- LP: #1153648
[ Paolo Pisati ]
* rebased on Ubuntu-3.5.0-26.42
[ Ubuntu: 3.5.0-26.42 ]
* Release Tracking Bug
-
This bug was fixed in the package linux-ti-omap4 - 3.5.0-221.31
---
linux-ti-omap4 (3.5.0-221.31) quantal-proposed; urgency=low
* Release Tracking Bug
- LP: #1153648
[ Paolo Pisati ]
* rebased on Ubuntu-3.5.0-26.42
[ Ubuntu: 3.5.0-26.42 ]
* Release Tracking Bug
-
This bug was fixed in the package linux - 3.5.0-26.42
---
linux (3.5.0-26.42) quantal-proposed; urgency=low
[Steve Conklin]
* Release Tracking Bug
- LP: #1152715
[ Andy Whitcroft ]
* ubuntu: overlayfs -- fix missmerge of vfs_open changes
- LP: #1122094, #1147678
li
This bug was fixed in the package linux-lts-quantal -
3.5.0-26.42~precise1
---
linux-lts-quantal (3.5.0-26.42~precise1) precise-proposed; urgency=low
[Steve Conklin]
* Release Tracking Bug
- LP: #1153655
[ Andy Whitcroft ]
* ubuntu: overlayfs -- fix missmerge of vfs_ope
This bug was fixed in the package linux-armadaxp - 3.2.0-1615.23
---
linux-armadaxp (3.2.0-1615.23) precise-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1135175
* Rebase onto Ubuntu-3.2.0-39.62
[ Ubuntu: 3.2.0-39.62 ]
* Release Tracking Bug
-
This bug was fixed in the package linux - 3.2.0-39.62
---
linux (3.2.0-39.62) precise-proposed; urgency=low
[Brad Figg]
* Release Tracking Bug
- LP: #1134424
[ Herton Ronaldo Krzesinski ]
* Revert "SAUCE: samsung-laptop: disable in UEFI mode"
- LP: #1117693
* d-i:
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed'
to 'verification-done'.
If verification is not done by one week from today, this fix will b
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-quantal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1102374
Title:
CVE-2013-0190
To manage notifications about this bug go to:
https://bugs.
** Branch linked: lp:ubuntu/lucid-security/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1102374
Title:
CVE-2013-0190
To manage notifications about this bug go to:
https://bugs.launchpad.
This bug was fixed in the package linux-ec2 - 2.6.32-350.60
---
linux-ec2 (2.6.32-350.60) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-45.103
* Release Tracking Bug
- LP: #1119764
[ Ubuntu: 2.6.32-45.103 ]
* [debian] Remove dangling symlink
** Description changed:
- xen: Fix stack corruption in xen_failsafe_callback for 32bit PVOPS
- guests.
+ The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23
+ and other versions, when running a 32-bit PVOPS guest, allows local
+ users to cause a denial of service (guest crash) by
This bug was fixed in the package linux - 2.6.32-45.103
---
linux (2.6.32-45.103) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1118467
[ Tim Gardner ]
* [debian] Remove dangling symlink from headers package
- LP: #1112442
[ Upstream
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Oneiric)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
h
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: In Progre
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Oneiric)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Raring)
Status: New => Fix Committed
--
You received this bug notification because you are a
** Changed in: linux (Ubuntu Lucid)
Status: New => In Progress
** Changed in: linux (Ubuntu Lucid)
Assignee: (unassigned) => Luis Henriques (henrix)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.ne
CVE-2013-0190
** Also affects: linux (Ubuntu Raring)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Raring)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Raring)
Importance: Undecided
Status: New
** Also affec
37 matches
Mail list logo