The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubu
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance:
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1024497
Title:
CVE-2012-3400
To manage notifications about this bug
** Changed in: linux-raspi2 (Ubuntu Vivid)
Importance: Undecided => Low
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1024497
Title:
CVE-2012-3400
To manage notifications about this bug go to:
h
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided => Lo
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Undecid
** Also affects: linux (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
** Also affects: linux (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu Wily)
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
** Changed in: linux-manta (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-manta (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-manta (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-manta (Ubuntu Trusty)
Importance: Undecided => Lo
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Importa
** Also affects: linux (Ubuntu Vivid)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu Vi
** No longer affects: linux-armadaxp (Ubuntu Saucy)
** No longer affects: linux-ec2 (Ubuntu Saucy)
** No longer affects: linux-lts-saucy (Ubuntu Saucy)
** No longer affects: linux-lts-quantal (Ubuntu Saucy)
** No longer affects: linux-mvl-dove (Ubuntu Saucy)
** No longer affects: linux (Ubuntu
** No longer affects: linux-armadaxp (Ubuntu Quantal)
** No longer affects: linux-ec2 (Ubuntu Quantal)
** No longer affects: linux-lts-saucy (Ubuntu Quantal)
** No longer affects: linux-lts-quantal (Ubuntu Quantal)
** No longer affects: linux-mvl-dove (Ubuntu Quantal)
** No longer affects: lin
** Also affects: linux (Ubuntu Utopic)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu
** Also affects: linux (Ubuntu Trusty)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu
** Also affects: linux (Ubuntu Saucy)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu Sa
** Changed in: linux-armadaxp (Ubuntu Raring)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1024497
Title:
CVE-2012-3400
To manage notifications about this bu
** Also affects: linux (Ubuntu Raring)
Importance: Low
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Raring)
Importance: Low
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Raring)
Importance: Low
Status: Invalid
** Also affects: linux-ec2 (Ubuntu
** No longer affects: linux-armadaxp (Ubuntu Natty)
** No longer affects: linux-ec2 (Ubuntu Natty)
** No longer affects: linux-lts-backport-oneiric (Ubuntu Natty)
** No longer affects: linux-lts-backport-natty (Ubuntu Natty)
** No longer affects: linux-lts-quantal (Ubuntu Natty)
** No longer a
** Changed in: linux-lts-quantal (Ubuntu Natty)
Status: New => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-quantal (Ubuntu Oneiric)
** Changed in: linux-ti-omap4 (Ubuntu Natty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1024497
Title:
CVE-2012-3400
To manage notifications about this bug go to:
h
** Description changed:
- Stability fixes in UDF Logical Volume Descriptor handling
+ Heap-based buffer overflow in the udf_load_logicalvol function in
+ fs/udf/super.c in the Linux kernel before 3.4.5 allows remote attackers
+ to cause a denial of service (system crash) or possibly have unspecifi
Patch 1df2ae31c724e57be9d7ac00d78db8a5dabdd050 and
adee11b2085bee90bd8f4f52123ffb07882d6256 already in upstream 3.5
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-15.66~lucid1
---
linux-lts-backport-natty (2.6.38-15.66~lucid1) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1036914
[ Upstream Kernel Changes ]
* udf: Fortify loading of s
This bug was fixed in the package linux-ec2 - 2.6.32-347.53
---
linux-ec2 (2.6.32-347.53) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-42.96
* Release Tracking Bug
- LP: #1038971
[ Ubuntu: 2.6.32-42.96 ]
* SAUCE: rds_ib_send() -- prevent lo
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launch
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1024497
Title:
CVE-2012-3400
To manage notifications about this bug go to:
https://
This bug was fixed in the package linux - 2.6.32-42.96
---
linux (2.6.32-42.96) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1036553
[ Andy Whitcroft ]
* SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
Its possible that Hardy is vulnerable to the same condition, but the
code is so different that its difficult to tell. In any event, the
backport is likely to cause more problems then its worth.
** Changed in: linux (Ubuntu Hardy)
Status: New => Invalid
--
You received this bug notificatio
** Changed in: linux (Ubuntu Lucid)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1024497
Title:
CVE-2012-3400
To manage notifications about this bug go to:
http
This bug was fixed in the package linux - 2.6.38-15.66
---
linux (2.6.38-15.66) natty-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1036250
[ Upstream Kernel Changes ]
* udf: Fortify loading of sparing table
- LP: #1024497
- CVE-2012-3400
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1024497
Title:
CVE-2012-3400
To manage notifications about
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1024497
Title:
CVE-2012-3400
To manage notifications about this bug go to:
https://bugs.launchpad.
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Oneiric)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Oneiric)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
Status: New => Fix Committed
--
You received this bug notification because
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Quantal)
Status: New
CVE-2012-3400
** Also affects: linux (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also af
41 matches
Mail list logo