[Bug 1188356] Re: CVE-2013-2148

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.

[Bug 1188356] Re: CVE-2013-2148

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance:

[Bug 1188356] Re: CVE-2013-2148

2016-04-26 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubu

[Bug 1188356] Re: CVE-2013-2148

2016-04-24 Thread Rolf Leggewie
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic) Status: New => Won't Fix -- You received this bug n

[Bug 1188356] Re: CVE-2013-2148

2016-04-18 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1188356 Title: CVE-2013-2148 To manage notifications about this bug go to: htt

[Bug 1188356] Re: CVE-2013-2148

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance:

[Bug 1188356] Re: CVE-2013-2148

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1188356 Title: CVE-2013-2148 To manage notifications about this bug

[Bug 1188356] Re: CVE-2013-2148

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Lo

[Bug 1188356] Re: CVE-2013-2148

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecid

[Bug 1188356] Re: CVE-2013-2148

2015-10-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu

[Bug 1188356] Re: CVE-2013-2148

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts

[Bug 1188356] Re: CVE-2013-2148

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily)

[Bug 1188356] Re: CVE-2013-2148

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quan

[Bug 1188356] Re: CVE-2013-2148

2015-01-27 Thread John Johansen
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2 (

[Bug 1188356] Re: CVE-2013-2148

2013-08-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-raring - 3.8.0-29.42~precise1 --- linux-lts-raring (3.8.0-29.42~precise1) precise; urgency=low [Brad Figg] * Release Tracking Bug - LP: #1212057 [ Upstream Kernel Changes ] * Revert "veth: avoid a NULL deref in veth_stats_one"

[Bug 1188356] Re: CVE-2013-2148

2013-08-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-raring - 3.8.0-29.42~precise1 --- linux-lts-raring (3.8.0-29.42~precise1) precise; urgency=low [Brad Figg] * Release Tracking Bug - LP: #1212057 [ Upstream Kernel Changes ] * Revert "veth: avoid a NULL deref in veth_stats_one"

[Bug 1188356] Re: CVE-2013-2148

2013-08-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.8.0-29.42 --- linux (3.8.0-29.42) raring; urgency=low [Brad Figg] * Release Tracking Bug - LP: #1211934 [ Upstream Kernel Changes ] * Revert "veth: avoid a NULL deref in veth_stats_one" * Revert "veth: extend device features

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-231.47 --- linux-ti-omap4 (3.5.0-231.47) quantal; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1212046 [ Paolo Pisati ] * rebased on Ubuntu-3.5.0-39.60 [ Upstream Kernel Changes ] * Revert "veth:

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-231.47 --- linux-ti-omap4 (3.5.0-231.47) quantal; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1212046 [ Paolo Pisati ] * rebased on Ubuntu-3.5.0-39.60 [ Upstream Kernel Changes ] * Revert "veth:

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.5.0-1620.28 --- linux-armadaxp (3.5.0-1620.28) quantal-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1212047 * Rebase onto Ubuntu-3.5.0-39.60 [ Ubuntu: 3.5.0-39.60 ] * Release Tracking Bug -

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.5.0-39.60 --- linux (3.5.0-39.60) quantal; urgency=low [Brad Figg] * Release Tracking Bug - LP: #1211872 [ Upstream Kernel Changes ] * Revert "veth: avoid a NULL deref in veth_stats_one" * Revert "veth: extend device feature

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.5.0-1620.28 --- linux-armadaxp (3.5.0-1620.28) quantal-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1212047 * Rebase onto Ubuntu-3.5.0-39.60 [ Ubuntu: 3.5.0-39.60 ] * Release Tracking Bug -

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-quantal - 3.5.0-39.60~precise1 --- linux-lts-quantal (3.5.0-39.60~precise1) precise; urgency=low [Brad Figg] * Release Tracking Bug - LP: #1212049 [ Upstream Kernel Changes ] * Revert "veth: avoid a NULL deref in veth_stats_on

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-231.47 --- linux-ti-omap4 (3.5.0-231.47) quantal; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1212046 [ Paolo Pisati ] * rebased on Ubuntu-3.5.0-39.60 [ Upstream Kernel Changes ] * Revert "veth:

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-231.47 --- linux-ti-omap4 (3.5.0-231.47) quantal; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1212046 [ Paolo Pisati ] * rebased on Ubuntu-3.5.0-39.60 [ Upstream Kernel Changes ] * Revert "veth:

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1436.55 --- linux-ti-omap4 (3.2.0-1436.55) precise; urgency=low * Release Tracking Bug - LP: #1205540 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-52.78 [ Ubuntu: 3.2.0-52.78 ] * Release Tracking Bug - LP: #1

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-quantal - 3.5.0-39.60~precise1 --- linux-lts-quantal (3.5.0-39.60~precise1) precise; urgency=low [Brad Figg] * Release Tracking Bug - LP: #1212049 [ Upstream Kernel Changes ] * Revert "veth: avoid a NULL deref in veth_stats_on

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1623.35 --- linux-armadaxp (3.2.0-1623.35) precise-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1205541 * Rebase onto Ubuntu-3.2.0-52.78 [ Ubuntu: 3.2.0-52.78 ] * Release Tracking Bug -

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-52.78 --- linux (3.2.0-52.78) precise; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1205381 [ Upstream Kernel Changes ] * Input: elantech - fix for newer hardware versions (v7) - LP: #1166442 * fanotify:

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1436.55 --- linux-ti-omap4 (3.2.0-1436.55) precise; urgency=low * Release Tracking Bug - LP: #1205540 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-52.78 [ Ubuntu: 3.2.0-52.78 ] * Release Tracking Bug - LP: #1

[Bug 1188356] Re: CVE-2013-2148

2013-08-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1623.35 --- linux-armadaxp (3.2.0-1623.35) precise-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1205541 * Rebase onto Ubuntu-3.2.0-52.78 [ Ubuntu: 3.2.0-52.78 ] * Release Tracking Bug -

[Bug 1188356] Re: CVE-2013-2148

2013-08-17 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-231.47 --- linux-ti-omap4 (3.5.0-231.47) quantal; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1212046 [ Paolo Pisati ] * rebased on Ubuntu-3.5.0-39.60 [ Upstream Kernel Changes ] * Revert "veth:

[Bug 1188356] Re: CVE-2013-2148

2013-08-16 Thread John Johansen
** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are

[Bug 1188356] Re: CVE-2013-2148

2013-08-13 Thread John Johansen
** Changed in: linux (Ubuntu Saucy) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1188356 Title: CVE-2013-2148 To manage notifications about this bug go to: https://bu

[Bug 1188356] Re: CVE-2013-2148

2013-08-10 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/quantal-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1188356 Title: CVE-2013-2148 To manage notifications about this bug go to: https://bugs.lau

[Bug 1188356] Re: CVE-2013-2148

2013-08-10 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1188356 Title: CVE-2013-2148 To manage notifications about this bug go to: https://bugs.lau

[Bug 1188356] Re: CVE-2013-2148

2013-08-01 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New => Fix Committed ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Sta

[Bug 1188356] Re: CVE-2013-2148

2013-07-24 Thread John Johansen
** Description changed: The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel through 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify

[Bug 1188356] Re: CVE-2013-2148

2013-07-15 Thread John Johansen
** Description changed: The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel through 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify

[Bug 1188356] Re: CVE-2013-2148

2013-07-12 Thread Jamie Strandboge
** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-lts-backport-nat

[Bug 1188356] Re: CVE-2013-2148

2013-06-13 Thread John Johansen
** Description changed: - One-byte information leak to userspace via metadata->reserved + The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c + in the Linux kernel through 3.9.4 does not initialize a certain + structure member, which allows local users to obtain sensitive + info

[Bug 1188356] Re: CVE-2013-2148

2013-06-06 Thread John Johansen
CVE-2013-2148 ** Also affects: linux (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: