** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Yakkety)
Importance: Low
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-ec
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
htt
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance:
** Changed in: linux (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
** Changed in: linux (Ubuntu Wily)
Status: Fix Committed => Invalid
** Changed in: linux (Ubuntu Xenial)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/10
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided => Lo
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Undecid
** Also affects: linux (Ubuntu Xenial)
Importance: Low
Status: Fix Committed
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (
** Changed in: linux (Ubuntu Wily)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
h
** Description changed:
The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram
- Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier
- allows local users to cause a denial of service (BUG_ON and kernel panic)
- by establishing an RDS connection with the so
** Changed in: linux (Ubuntu Vivid)
Status: Fix Released => Invalid
** Changed in: linux (Ubuntu Vivid)
Assignee: Andy Whitcroft (apw) => (unassigned)
** Changed in: linux (Ubuntu Wily)
Status: Fix Released => Invalid
** Changed in: linux (Ubuntu Wily)
Assignee: Andy Whit
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
Trusty, Utopic, Vivid, and Wily are not affected according to
http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-2372.html
I think those tasks should be changed to Invalid.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
h
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: Invalid => Fix Committed
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: Invalid => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: Invalid => Fix Committed
--
You received this bug notification bec
** Also affects: linux (Ubuntu Wily)
Importance: Low
Assignee: Andy Whitcroft (apw)
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Low
Status: Invalid
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
** Also affects: linux (Ubuntu Vivid)
Importance: Low
Assignee: Andy Whitcroft (apw)
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Low
Status: Inval
** Changed in: linux-lts-backport-maverick (Ubuntu Saucy)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Saucy)
Status: New => Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Saucy)
Status: New => Won't Fix
** Changed in: linux-lts-backp
** Also affects: linux (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (Ubu
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-25.41~lucid1
---
linux-lts-backport-oneiric (3.0.0-25.41~lucid1) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1036577
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1215.27
---
linux-ti-omap4 (3.0.0-1215.27) oneiric-proposed; urgency=low
* Release Tracking Bug
- LP: #1036576
[ Paolo Pisati ]
* rebased on Ubuntu-3.0.0-25.41
[ Ubuntu: 3.0.0-25.41 ]
* Release Tracking Bug
This bug was fixed in the package linux-ec2 - 2.6.32-347.53
---
linux-ec2 (2.6.32-347.53) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-42.96
* Release Tracking Bug
- LP: #1038971
[ Ubuntu: 2.6.32-42.96 ]
* SAUCE: rds_ib_send() -- prevent lo
This bug was fixed in the package linux - 2.6.32-42.96
---
linux (2.6.32-42.96) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1036553
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
This bug was fixed in the package linux - 3.0.0-25.41
---
linux (3.0.0-25.41) oneiric-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1036178
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
https://bugs.launchpad.
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
https://bugs.lau
unsubscribe
At 2012-08-20 23:49:15,"Launchpad Bug Tracker" <1016...@bugs.launchpad.net>
wrote:
>This bug was fixed in the package linux-ti-omap4 - 3.5.0-207.13
>
>---
>linux-ti-omap4 (3.5.0-207.13) quantal-proposed; urgency=low
>
> [ Paolo Pisati ]
>
> * Start new release
>
> [ Stef
This bug was fixed in the package linux-ti-omap4 - 3.5.0-207.13
---
linux-ti-omap4 (3.5.0-207.13) quantal-proposed; urgency=low
[ Paolo Pisati ]
* Start new release
[ Stefan Bader ]
* (config) Enable getabis to use local package copies
[ Upstream Kernel Changes ]
* fi
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-15.65~lucid1
---
linux-lts-backport-natty (2.6.38-15.65~lucid1) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1029786
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent lo
** Branch linked: lp:ubuntu/natty-security/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
https://bugs.launc
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1417.23
---
linux-ti-omap4 (3.2.0-1417.23) precise-proposed; urgency=low
* Release Tracking Bug
- LP: #1030306
[ Paolo Pisati ]
* rebased on 3.2.0-29.46
[ Ubuntu: 3.2.0-29.46 ]
* No change upload to fix armel/a
This bug was fixed in the package linux-armadaxp - 3.2.0-1606.9
---
linux-armadaxp (3.2.0-1606.9) precise-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1030308
* Rebase onto Ubuntu-3.2.0-29.46
[ Ubuntu: 3.2.0-29.46 ]
* No change upload to fix armel
This bug was fixed in the package linux-armadaxp - 3.2.0-1606.9
---
linux-armadaxp (3.2.0-1606.9) precise-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1030308
* Rebase onto Ubuntu-3.2.0-29.46
[ Ubuntu: 3.2.0-29.46 ]
* No change upload to fix armel
This bug was fixed in the package linux - 3.2.0-29.46
---
linux (3.2.0-29.46) precise-proposed; urgency=low
[ Tim Gardner ]
* No change upload to fix armel/armhf FTBS caused by
'UBUNTU: [Config] SND_OMAP_SOC, SND_OMAP_SOC_MCBSP and
SND_OMAP_SOC_OMAP3_BEAGLE =y'
Added ign
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.25
---
linux-ti-omap4 (2.6.38-1209.25) natty-proposed; urgency=low
* Release Tracking Bug
- LP: #1029784
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
This bug was fixed in the package linux - 2.6.38-15.65
---
linux (2.6.38-15.65) natty-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1027821
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
** Branch linked: lp:ubuntu/precise-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
https://bugs.lau
This bug was fixed in the package linux - 3.5.0-7.7
---
linux (3.5.0-7.7) quantal-proposed; urgency=low
[ Andy Whitcroft ]
* [Config] CONFIG_X86_POWERNOW_K6=m
* [Config] CONFIG_X86_POWERNOW_K7=m
* [Config] CONFIG_X86_LONGHAUL=m
* [Config] CONFIG_X86_LONGRUN=m
* [Config] C
** Branch linked: lp:ubuntu/quantal-proposed/linux-lowlatency
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
https://bugs.l
** Branch linked: lp:ubuntu/precise-proposed/linux-armadaxp
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
https://bugs.lau
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299
Title:
CVE-2012-2372
To manage notifications about this bug go to:
https://
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux-lts-backport-oneiric (Ubuntu Luci
** Description changed:
A flaw was found in the Linux kernel's Reliable Datagram Sockets (RDS)
protocol implementation. A local, unprivileged user could use this flaw
to cause a denial of service.
+
+ Break-Fix: - local-2012-2372
--
You received this bug notification because you are a mem
** Changed in: linux (Ubuntu Quantal)
Status: New => In Progress
** Changed in: linux (Ubuntu Quantal)
Assignee: (unassigned) => Andy Whitcroft (apw)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
CVE-2012-2372
** Also affects: linux (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also af
48 matches
Mail list logo