** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/812360
Title:
linux: 2.6.24-29.92 -proposed tracker
To manage
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/812360
Title:
linux: 2.6.24-29.92 -proposed tracker
To manage notifications
** Description changed:
This bug is for tracking the 2.6.24-29.92 upload package. This bug will
contain status and testing results releated to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
+
+
+
** Description changed:
This bug is for tracking the 2.6.24-29.92 upload package. This bug will
contain status and testing results releated to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-
-
There were false positives and have been fixed now.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/812360
Title:
linux: 2.6.24-29.92 -proposed tracker
To manage notifications about this bug go to:
This bug was fixed in the package linux - 2.6.24-29.92
---
linux (2.6.24-29.92) hardy-proposed; urgency=low
[Herton R. Krzesinski]
* Release Tracking Bug
- LP: #812360
[Upstream Kernel Changes]
* af_unix: limit unix_tot_inflight CVE-2010-4249
- LP: #769182
-
Copied to -security/-updates
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Still need to run KVM on i386. Nevertheless, I got an unexpected failure
on the QRT test 'test-kernel.py'. As such, I am failing QA. Bug 822967
has been opened for this error.
** Tags added: qa-testing-failed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
I do not see the issue on KVM i386.
For completeness, on all tests I also saw this error -- which I assumed
to be a coding error on QRT:
/proc/$pid/ DAC bypass on setuid (CVE-2011-1020) ... (skipped: not
fixed before Oneiric yet) FAIL
Confirmed that the /proc/$pid/ DAC bypass on setuid test is broken on
Hardy. I have corrected this.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/812360
Title:
linux: 2.6.24-29.92 -proposed tracker
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/regression-testing
Assignee: Canonical Platform QA Team (canonical-platform-qa) = C
de-Avillez (hggdh2)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress = Fix Released
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/812360
Title:
linux: 2.6.24-29.92 -proposed tracker
To
** Changed in: kernel-sru-workflow/verification-testing
Status: New = In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/812360
Title:
linux: 2.6.24-29.92 -proposed tracker
To manage
This kernel contains only CVE fixes and therefore has no bugs to be
verified
** Changed in: kernel-sru-workflow/verification-testing
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: kernel-sru-workflow/regression-testing
Status: New = Confirmed
** Changed in: kernel-sru-workflow/security-signoff
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = Kees Cook (kees)
--
You received this bug notification because you are a member of Ubuntu
Looks good, thanks!
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/812360
Title:
linux: 2.6.24-29.92
** Tags added: hardy
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/812360
Title:
linux: 2.6.24-29.92 -proposed tracker
To manage notifications about this bug go to:
20 matches
Mail list logo