The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I will create a patch accordance to the work.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this bug go to:
I will create a patch accordance to the work.
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Aaron Farias (timido)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Also affects: linux (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-ec2
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-lts-wily (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects:
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2
** Changed in: linux (Ubuntu Quantal)
Status: Fix Committed = Won't Fix
** Changed in: linux-ti-omap4 (Ubuntu Quantal)
Status: Fix Committed = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-ti-omap4 (Ubuntu Raring)
Status: Fix Committed = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New = Fix Released
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Quantal)
Status: New = Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
** Description changed:
The scm_set_cred function in include/net/scm.h in the Linux kernel
before 3.8.11 uses incorrect uid and gid values during credentials
passing, which allows local users to gain privileges via a crafted
application.
Break-Fix:
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this bug
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
Status: New = Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Raring)
Status: New = Invalid
** Changed in:
** Branch linked: lp:ubuntu/raring-proposed/linux-ppc
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this bug go to:
This bug was fixed in the package linux-lts-raring -
3.8.0-21.32~precise1
---
linux-lts-raring (3.8.0-21.32~precise1) precise-proposed; urgency=low
[Steve Conklin]
* Release Tracking Bug
- LP: #11800201
[ Upstream Kernel Changes ]
* perf: Treat attr.config as u64 in
** No longer affects: linux-armadaxp (Ubuntu Hardy)
** No longer affects: linux-armadaxp (Ubuntu Oneiric)
** No longer affects: linux-ec2 (Ubuntu Hardy)
** No longer affects: linux-ec2 (Ubuntu Oneiric)
** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy)
** No longer affects:
** Changed in: linux (Ubuntu Raring)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this bug
** Branch linked: lp:~ubuntu-branches/ubuntu/precise/linux-lts-raring
/precise-security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about
** Branch linked: lp:~ubuntu-branches/ubuntu/precise/linux-lts-raring
/precise-proposed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: New = Invalid
**
This bug was fixed in the package linux - 3.8.0-19.30
---
linux (3.8.0-19.30) raring-proposed; urgency=low
[ Upstream Kernel Changes ]
* Add file_ns_capable() helper function for open-time capability checking
(CVE-2013-1959)
- LP: #1174590
- CVE-2013-1959
* userns:
** Changed in: linux (Ubuntu Raring)
Status: Fix Released = New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this bug go to:
CVE-2013-1979
** Also affects: linux (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also
** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
Status: New = Invalid
** Changed in: linux-fsl-imx51 (Ubuntu Quantal)
Status: New = Invalid
** Changed in: linux-fsl-imx51 (Ubuntu Raring)
Status: New = Invalid
** Description changed:
- Placeholder
+ Writes to unix sockets
** Changed in: linux-armadaxp (Ubuntu Saucy)
Status: New = Invalid
** Changed in: linux-armadaxp (Ubuntu Saucy)
Importance: Undecided = High
** Changed in: linux-ec2 (Ubuntu Saucy)
Status: New = Invalid
** Changed in: linux-ec2 (Ubuntu Saucy)
Importance: Undecided = High
**
** Description changed:
Writes to unix sockets capture euid instead of uid.
- Break-Fix: - 83f1b4ba917db5dc5a061a44b3403ddb6e783494
- Break-Fix: - 41c21e351e79004dbb4efa4bc14a53a7e0af38c5
+ Break-Fix: 257b5358b32f17e0603b6ff57b13610b0e02348f
83f1b4ba917db5dc5a061a44b3403ddb6e783494
+
30 matches
Mail list logo