The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Also affects: linux (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-ec2
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-lts-wily (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects:
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2
saucy has seen the end of its life and is no longer receiving any
updates. Marking the saucy task for this ticket as Won't Fix.
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
Status: Fix Committed = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Branch unlinked: lp:ubuntu/precise-security/linux-lts-raring
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174590
Title:
CVE-2013-1959
To manage notifications about this bug go to:
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174590
Title:
CVE-2013-1959
To manage notifications about this
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
Status: New = Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Raring)
Status: New = Invalid
** Changed in:
** Branch linked: lp:ubuntu/raring-proposed/linux-ppc
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174590
Title:
CVE-2013-1959
To manage notifications about this bug go to:
This bug was fixed in the package linux-lts-raring -
3.8.0-21.32~precise1
---
linux-lts-raring (3.8.0-21.32~precise1) precise-proposed; urgency=low
[Steve Conklin]
* Release Tracking Bug
- LP: #11800201
[ Upstream Kernel Changes ]
* perf: Treat attr.config as u64 in
** No longer affects: linux-armadaxp (Ubuntu Hardy)
** No longer affects: linux-armadaxp (Ubuntu Oneiric)
** No longer affects: linux-ec2 (Ubuntu Hardy)
** No longer affects: linux-ec2 (Ubuntu Oneiric)
** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy)
** No longer affects:
** Branch linked: lp:~ubuntu-branches/ubuntu/precise/linux-lts-raring
/precise-security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174590
Title:
CVE-2013-1959
To manage notifications about
** Branch linked: lp:~ubuntu-branches/ubuntu/precise/linux-lts-raring
/precise-proposed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174590
Title:
CVE-2013-1959
To manage notifications about
This bug was fixed in the package linux - 3.8.0-19.30
---
linux (3.8.0-19.30) raring-proposed; urgency=low
[ Upstream Kernel Changes ]
* Add file_ns_capable() helper function for open-time capability checking
(CVE-2013-1959)
- LP: #1174590
- CVE-2013-1959
* userns:
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New = Invalid
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status:
** Changed in: linux (Ubuntu Hardy)
Status: New = Invalid
** Changed in: linux (Ubuntu Quantal)
Status: New = Invalid
** Changed in: linux-ti-omap4 (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux-ti-omap4 (Ubuntu Hardy)
Status: New = Invalid
** Changed in:
** Changed in: linux-armadaxp (Ubuntu Saucy)
Status: New = Invalid
** Changed in: linux-armadaxp (Ubuntu Saucy)
Importance: Undecided = High
** Changed in: linux-ec2 (Ubuntu Saucy)
Status: New = Invalid
** Changed in: linux-ec2 (Ubuntu Saucy)
Importance: Undecided = High
**
CVE-2013-1959
** Also affects: linux (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also
20 matches
Mail list logo