The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bug
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug n
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-lts-wily (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1023535
Title:
CVE-2012-2745
To manage notificati
This bug was fixed in the package linux - 2.6.32-44.98
---
linux (2.6.32-44.98) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1055438
[ Dave Airlie ]
* SAUCE: drm/vmwgfx: add MODULE_DEVICE_TABLE so vmwgfx loads at boot
- LP: #1039157
This bug was fixed in the package linux-ec2 - 2.6.32-349.55
---
linux-ec2 (2.6.32-349.55) lucid-proposed; urgency=low
[ Stefan Bader ]
* Revert "SAUCE: EC2: Backport changes to limit GSO segments"
- LP: #1037456
- CVE-2012-3412
* Rebased to Ubuntu-2.6.32-44.98
* Relea
Patch ee18d64c1f632043a02e6f5ba5e045bb26a5465f and
79549c6dfda0603dba9a70a53467ce62d9335c33 already in upstream 3.5
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1023535
Title:
CVE-2012-2745
To manage notifications about this bug go to:
https://bugs.launchpad.
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Oneiric)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-16.67~lucid1
---
linux-lts-backport-natty (2.6.38-16.67~lucid1) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1047350
[ Upstream Kernel Changes ]
* rds: set correct msg_name
This bug was fixed in the package linux - 2.6.38-16.67
---
linux (2.6.38-16.67) natty-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1045383
[ Upstream Kernel Changes ]
* rds: set correct msg_namelen
- LP: #1031112
- CVE-2012-3430
* eCryp
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1023535
Title:
CVE-2012-2745
To manage notifications about this bug go to:
https://
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launch
** Changed in: linux (Ubuntu Lucid)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Natty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
** Changed in: linux (Ubuntu Lucid)
Status: New => In Progress
** Changed in: linux (Ubuntu Lucid)
Assignee: (unassigned) => Tim Gardner (timg-tpi)
** Changed in: linux (Ubuntu Natty)
Status: New => In Progress
** Changed in: linux (Ubuntu Natty)
Assignee: (unassigned) =>
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1023535
Title:
CVE-2012-2745
To manage notifications about
** Description changed:
- A flaw was found in the way the Linux kernel's key management facility
- handled replacement session keyrings on process forks. A local,
- unprivileged user could use this flaw to cause a denial of service.
+ The copy_creds function in kernel/cred.c in the Linux kernel be
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
** Description changed:
A flaw was found in the way the Linux kernel's key management facility
handled replacement session keyrings on process forks. A local,
unprivileged user could use this flaw to cause a denial of service.
+
+ Break-Fix: ee18d64c1f632043a02e6f5ba5e045bb26a5465f
+ 79549c
CVE-2012-2745
** Also affects: linux (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also af
25 matches
Mail list logo