** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-lts-wily (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects:
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-ec2
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: Fix Committed = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1261570
Title:
CVE-2013-6376
To manage notifications about
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Saucy)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1261570
Title:
CVE-2013-6376
To manage notifications about this
** No longer affects: linux-armadaxp (Ubuntu Raring)
** No longer affects: linux-ec2 (Ubuntu Raring)
** No longer affects: linux-lts-saucy (Ubuntu Raring)
** No longer affects: linux-lts-quantal (Ubuntu Raring)
** No longer affects: linux-mvl-dove (Ubuntu Raring)
** No longer affects: linux
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Saucy)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Description changed:
- kvm: BUG_ON() in apic_cluster_id()
+ The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
+ subsystem in the Linux kernel through 3.12.5 allows guest OS users to
+ cause a denial of service (host OS crash) via a crafted ICR write
+ operation in x2apic
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New = Invalid
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New =
** Description changed:
- The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
- subsystem in the Linux kernel through 3.12.5 allows guest OS users to
- cause a denial of service (host OS crash) via a crafted ICR write
- operation in x2apic mode.
+ kvm: BUG_ON() in
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1261570
Title:
CVE-2013-6376
To manage notifications about this bug go to:
** Changed in: linux (Ubuntu Trusty)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1261570
Title:
CVE-2013-6376
To manage notifications about this bug go to:
** Description changed:
- kvm: BUG_ON() in apic_cluster_id()
+ The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
+ subsystem in the Linux kernel through 3.12.5 allows guest OS users to
+ cause a denial of service (host OS crash) via a crafted ICR write
+ operation in x2apic
** Description changed:
- The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
- subsystem in the Linux kernel through 3.12.5 allows guest OS users to
- cause a denial of service (host OS crash) via a crafted ICR write
- operation in x2apic mode.
+ kvm: BUG_ON() in
** Description changed:
- The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
- subsystem in the Linux kernel through 3.12.5 allows guest OS users to
- cause a denial of service (host OS crash) via a crafted ICR write
- operation in x2apic mode.
+ kvm: BUG_ON() in
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New = Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New = Won't Fix
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New = Won't Fix
** Changed in:
** Description changed:
- kvm: BUG_ON() in apic_cluster_id()
+ The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
+ subsystem in the Linux kernel through 3.12.5 allows guest OS users to
+ cause a denial of service (host OS crash) via a crafted ICR write
+ operation in x2apic
CVE-2013-6376
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also
20 matches
Mail list logo