The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubu
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug n
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1187732
Title:
CVE-2013-2141
To manage notifications about this bug go to:
htt
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance:
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1187732
Title:
CVE-2013-2141
To manage notifications about this bug
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided => Lo
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Undecid
** Also affects: linux (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
** Also affects: linux (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu Wily)
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (
saucy has seen the end of its life and is no longer receiving any
updates. Marking the saucy task for this ticket as "Won't Fix".
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
Status: Fix Committed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-lts-backport-nat
** Changed in: linux-ti-omap4 (Ubuntu Raring)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1187732
Title:
CVE-2013-2141
To manage notifications about t
This bug was fixed in the package linux-ec2 - 2.6.32-354.67
---
linux-ec2 (2.6.32-354.67) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-49.111
* SAUCE: ec2: Backport x86/mm: Check if PUD is large when validating a
kernel address
- LP: #1193044
This bug was fixed in the package linux - 2.6.32-49.111
---
linux (2.6.32-49.111) lucid; urgency=low
[Steve Conklin]
* Release Tracking Bug
- LP: #1193108
[ Upstream Kernel Changes ]
* Revert "pcdp: use early_ioremap/early_iounmap to access pcdp table"
- LP: #119304
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/118773
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1187732
Title:
CVE-2013-2141
To manage notifications about this bug go to:
https://bugs.launchpad.
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-om
** Description changed:
- kernel info leak in tkill/tgkill
+ The do_tkill function in kernel/signal.c in the Linux kernel before
+ 3.8.9 does not initialize a certain data structure, which allows local
+ users to obtain sensitive information from kernel memory via a crafted
+ application that make
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
CVE-2013-2141
** Also affects: linux (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects:
25 matches
Mail list logo