The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lt
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-l
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance
** Also affects: linux (Ubuntu Yakkety)
Importance: High
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armad
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1384539
Title:
CVE-2014-3610
Status in linux package in
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1384539
Title:
CVE-2014-3610
Status in linux
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided => H
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Undeci
** Also affects: linux (Ubuntu Xenial)
Importance: High
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-ec2
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Pac
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as "Won't Fix".
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packag
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1384539
Title:
CVE-2014-3610
Status in li
** Also affects: linux (Ubuntu Wily)
Importance: High
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: High
Status: Invalid
** Also affects: linux-ec2 (Ubun
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
This bug was fixed in the package linux-ec2 - 2.6.32-375.92
---
linux-ec2 (2.6.32-375.92) lucid; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-71.138
* Xen: x86, 64-bit: Move K8 B step iret fixup to fault entry asm
- LP: #1403918
* Xen: x86-64, modify_ldt: Ban 1
This bug was fixed in the package linux-ec2 - 2.6.32-375.92
---
linux-ec2 (2.6.32-375.92) lucid; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-71.138
* Xen: x86, 64-bit: Move K8 B step iret fixup to fault entry asm
- LP: #1403918
* Xen: x86-64, modify_ldt: Ban 1
** Changed in: linux-flo (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-flo (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-flo (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-flo (Ubuntu Trusty)
Importance: Undecided => High
**
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1384539
Title:
CVE-2014-3610
Status in linux package
This bug was fixed in the package linux - 2.6.32-71.138
---
linux (2.6.32-71.138) lucid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1403943
[ Luis Henriques ]
* [Config] updateconfigs CONFIG_X86_16BIT=y after v2.6.32.65 update
[ Upstream Kernel Chan
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux-lts-trusty (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
I
** Changed in: linux (Ubuntu Lucid)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1384539
Title:
CVE-2014-3610
Status in linux package in U
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug not
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a
** Description changed:
- If the guest writes a noncanonical value to certain MSR registers, KVM
- will write that value to the MSR in the host context and a #GP will be
- raised leading to kernel panic. A privileged guest user can use this
- flaw to crash the host. Enabling CONFIG_PARAVIRT when b
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
** Description changed:
If the guest writes a noncanonical value to certain MSR registers, KVM
will write that value to th
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1384539
Title:
CVE-2014-3610
Status in “linux” package in Ubuntu:
Fi
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1384539
Title:
CVE-2014-3610
Status in “linux” pac
This bug was fixed in the package linux - 3.16.0-24.32
---
linux (3.16.0-24.32) utopic; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386635
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1384539
This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
This bug was fixed in the package linux - 3.16.0-24.32
---
linux (3.16.0-24.32) utopic; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386635
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1384539
Title:
CVE-2014-3610
Status in “linux” package in Ub
CVE-2014-3610
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affec
38 matches
Mail list logo