The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bug
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importan
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug n
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importan
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1006622
Title:
CVE-2012-2136
To manage notifications about this bug
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided =>
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Unde
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-ec
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
** Also affects: linux (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2 (Ubu
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (
This bug was fixed in the package linux - 2.6.24-32.105
---
linux (2.6.24-32.105) hardy-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1055388
[Upstream Kernel Changes]
* net: sock: validate data_len before allocating skb in
sock_alloc_send_psk
** Changed in: linux (Ubuntu Hardy)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1006622
Title:
CVE-2012-2136
To manage notifications about this bug go
** Changed in: linux (Ubuntu Hardy)
Status: Fix Committed => In Progress
** Changed in: linux (Ubuntu Hardy)
Assignee: Brad Figg (brad-figg) => Tim Gardner (timg-tpi)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:/
** Description changed:
- Data_len paremeter of sock_alloc_send_pskb() function is not validated
- before setting frags of allocated skb, which can lead to heap overflow.
+ The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel
+ before 3.4.5 does not properly validate a certain
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-24.40~lucid1
---
linux-lts-backport-oneiric (3.0.0-24.40~lucid1) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1028834
[ Andy Whitcroft ]
* [Packaging] getabis should be ex
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-15.65~lucid1
---
linux-lts-backport-natty (2.6.38-15.65~lucid1) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1029786
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent lo
** Branch linked: lp:ubuntu/natty-security/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1006622
Title:
CVE-2012-2136
To manage notifications about this bug go to:
https://bugs.launc
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1417.23
---
linux-ti-omap4 (3.2.0-1417.23) precise-proposed; urgency=low
* Release Tracking Bug
- LP: #1030306
[ Paolo Pisati ]
* rebased on 3.2.0-29.46
[ Ubuntu: 3.2.0-29.46 ]
* No change upload to fix armel/a
This bug was fixed in the package linux-armadaxp - 3.2.0-1606.9
---
linux-armadaxp (3.2.0-1606.9) precise-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1030308
* Rebase onto Ubuntu-3.2.0-29.46
[ Ubuntu: 3.2.0-29.46 ]
* No change upload to fix armel
This bug was fixed in the package linux-armadaxp - 3.2.0-1606.9
---
linux-armadaxp (3.2.0-1606.9) precise-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1030308
* Rebase onto Ubuntu-3.2.0-29.46
[ Ubuntu: 3.2.0-29.46 ]
* No change upload to fix armel
This bug was fixed in the package linux - 3.2.0-29.46
---
linux (3.2.0-29.46) precise-proposed; urgency=low
[ Tim Gardner ]
* No change upload to fix armel/armhf FTBS caused by
'UBUNTU: [Config] SND_OMAP_SOC, SND_OMAP_SOC_MCBSP and
SND_OMAP_SOC_OMAP3_BEAGLE =y'
Added ign
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1214.26
---
linux-ti-omap4 (3.0.0-1214.26) oneiric-proposed; urgency=low
* Release Tracking Bug
- LP: #1028832
[ Paolo Pisati ]
* rebased on Ubuntu-3.0.0-24.40
[ Ubuntu: 3.0.0-24.40 ]
* Release Tracking Bug
This bug was fixed in the package linux - 3.0.0-24.40
---
linux (3.0.0-24.40) oneiric-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1027841
[ Andy Whitcroft ]
* [Packaging] getabis should be extracting all packages
- LP: #1021174
* [Config]
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.25
---
linux-ti-omap4 (2.6.38-1209.25) natty-proposed; urgency=low
* Release Tracking Bug
- LP: #1029784
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
This bug was fixed in the package linux - 2.6.38-15.65
---
linux (2.6.38-15.65) natty-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1027821
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
This bug was fixed in the package linux-ec2 - 2.6.32-347.52
---
linux-ec2 (2.6.32-347.52) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebase to Ubuntu-2.6.32-42.95
* Release Tracking Bug
- LP: #1029177
[ Ubuntu: 2.6.32-42.95 ]
* hugetlb: fix resv_map leak in error
This bug was fixed in the package linux - 2.6.32-42.95
---
linux (2.6.32-42.95) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1027831
[ Upstream Kernel Changes ]
* hugetlb: fix resv_map leak in error path
- LP: #1004621
- CVE-2012-23
** Branch linked: lp:ubuntu/precise-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1006622
Title:
CVE-2012-2136
To manage notifications about this bug go to:
https://bugs.lau
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1006622
Title:
CVE-2012-2136
To manage notifications about this bug go to:
https://bugs.lau
** Branch linked: lp:ubuntu/precise-proposed/linux-armadaxp
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1006622
Title:
CVE-2012-2136
To manage notifications about this bug go to:
https://bugs.lau
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1006622
Title:
CVE-2012-2136
To manage notifications about this bug go to:
https://
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1006622
Title:
CVE-2012-2136
To manage notifications about this bug go to:
https://bugs.launchpad.
** Changed in: linux (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Natty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubu
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-oneiric
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1006622
Title:
CVE-2012-2136
To manage notifications about this bug go to:
https:
** Description changed:
Data_len paremeter of sock_alloc_send_pskb() function is not validated
before setting frags of allocated skb, which can lead to heap overflow.
+
+ Break-Fix: - cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc
--
You received this bug notification because you are a member of
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux-lts-backport-oneiric (Ubuntu Luci
** Changed in: linux (Ubuntu Quantal)
Status: Fix Released => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1006622
Title:
CVE-2012-2136
To manage notifications about this bug go to:
htt
** Changed in: linux (Ubuntu Quantal)
Status: New => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: New => In Progress
** Changed in: linux (Ubuntu Precise)
Assignee: (unassigned) => Brad Figg (brad-figg)
** Changed in: linux (Ubuntu Oneiric)
Status: New =>
CVE-2012-2136
** Also affects: linux (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also af
44 matches
Mail list logo