** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/711865
Title:
CVE-2010-3880
To manage notifications about this bug go to:
** Changed in: linux (Ubuntu Dapper)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/711865
Title:
CVE-2010-3880
To manage notifications about this bug go
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/711865
Title:
CVE-2010-3880
To manage notifications about this bug go to:
** Tags added: kernel-cve-tracking-bug
** Tags removed: kernel-cve-tracker
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/711865
Title:
CVE-2010-3880
To manage notifications about this bug go to:
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-609.26
---
linux-fsl-imx51 (2.6.31-609.26) lucid; urgency=low
[ Paolo Pisati ]
* Tracking bug
- LP: #795219
* [Config] Disable parport_pc on fsl-imx51
- LP: #601226
[ Upstream Kernel Changes ]
* ALSA:
** Changed in: linux-mvl-dove (Ubuntu Karmic)
Status: New = Invalid
** Changed in: linux-mvl-dove (Ubuntu Hardy)
Status: New = Invalid
** Changed in: linux-mvl-dove (Ubuntu Dapper)
Status: New = Invalid
--
You received this bug notification because you are a member of
karmic is EOL
** Changed in: linux-fsl-imx51 (Ubuntu Karmic)
Status: New = Won't Fix
** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
Status: New = In Progress
** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
Assignee: (unassigned) = Paolo Pisati (p-pisati)
--
You received this
This bug was fixed in the package linux-mvl-dove - 2.6.32-416.33
---
linux-mvl-dove (2.6.32-416.33) maverick; urgency=low
[ Ubuntu: 2.6.32-31.60 ]
* Release Tracking Bug
- LP: #734950
* SAUCE: Clear new_profile in error path
- LP: #732700
* [Config]
** Branch linked: lp:ubuntu/maverick-proposed/linux-mvl-dove
** Branch linked: lp:ubuntu/lucid-proposed/linux-mvl-dove
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/711865
Title:
CVE-2010-3880
--
** Changed in: linux-mvl-dove (Ubuntu Natty)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/711865
Title:
CVE-2010-3880
--
ubuntu-bugs mailing list
** Also affects: linux-mvl-dove (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux-mvl-dove (Ubuntu Lucid)
Status: New = Fix Committed
** Changed in: linux-mvl-dove (Ubuntu Maverick)
Status: New = Fix Committed
** Changed in: linux-mvl-dove (Ubuntu Maverick)
This bug was fixed in the package linux - 2.6.32-29.58
---
linux (2.6.32-29.58) lucid-proposed; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #716551
[ Upstream Kernel Changes ]
* net: fix rds_iovec page count overflow, CVE-2010-3865
- LP: #709153
-
This bug was fixed in the package linux - 2.6.35-27.48
---
linux (2.6.35-27.48) maverick-proposed; urgency=low
[ Steve Conklin ]
* Release Tracking Bug
- LP: #723335
[ Upstream Kernel Changes ]
* thinkpad-acpi: avoid keymap pitfall
- LP: #722747
linux
** Branch linked: lp:ubuntu/dapper-updates/linux-source-2.6.15
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/711865
Title:
CVE-2010-3880
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
This bug was fixed in the package linux - 2.6.24-28.86
---
linux (2.6.24-28.86) hardy-proposed; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #716166
[Tim Gardner]
* xen unified block-device I/O interface back end can orphan devices,
CVE-2010-3699
-
This bug was fixed in the package linux - 2.6.31-22.73
---
linux (2.6.31-22.73) karmic-proposed; urgency=low
[ Steve Conklin ]
* Release Tracking Bug
- LP: #716648
[ Upstream Kernel Changes ]
* copied ABI directory
* net: Limit socket I/O iovec total length to
** Tags added: kernel-cve-tracker
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/711865
Title:
CVE-2010-3880
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
** Branch linked: lp:ubuntu/dapper-proposed/linux-source-2.6.15
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/711865
Title:
CVE-2010-3880
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2
** Branch linked: lp:ubuntu/karmic-proposed/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/711865
Title:
CVE-2010-3880
--
** Patch added: Dapper: inet_diag: Make sure we actually run the same bytecode
we audited, CVE-2010-3880
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711865/+attachment/1840465/+files/0001-inet_diag-Make-sure-we-actually-run-the-same-bytecod.patch
** Changed in: linux (Ubuntu
** Patch added: Hardy: inet_diag: Make sure we actually run the same bytecode
we audited, CVE-2010-3880
https://bugs.launchpad.net/ubuntu/dapper/+source/linux/+bug/711865/+attachment/1840470/+files/0001-inet_diag-Make-sure-we-actually-run-the-same-bytecod.patch
** Changed in: linux (Ubuntu
** Patch added: Karmic: inet_diag: Make sure we actually run the same bytecode
we audited, CVE-2010-3880
https://bugs.launchpad.net/ubuntu/hardy/+source/linux/+bug/711865/+attachment/1840471/+files/0001-inet_diag-Make-sure-we-actually-run-the-same-bytecod.patch
** Changed in: linux (Ubuntu
** Patch added: Lucid: inet_diag: Make sure we actually run the same bytecode
we audited, CVE-2010-3880
https://bugs.launchpad.net/ubuntu/karmic/+source/linux/+bug/711865/+attachment/1840472/+files/0001-inet_diag-Make-sure-we-actually-run-the-same-bytecod.patch
** Changed in: linux (Ubuntu
** Patch added: Maverick: inet_diag: Make sure we actually run the same
bytecode we audited, CVE-2010-3880
https://bugs.launchpad.net/ubuntu/lucid/+source/linux/+bug/711865/+attachment/1840473/+files/0001-inet_diag-Make-sure-we-actually-run-the-same-bytecod.patch
** Changed in: linux
** Also affects: linux-fsl-imx51 (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux-fsl-imx51 (Ubuntu Dapper)
Status: New = Invalid
** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
Status: New = Invalid
** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
** Changed in: linux (Ubuntu Natty)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/711865
Title:
CVE-2010-3880
--
ubuntu-bugs mailing list
26 matches
Mail list logo