[Bug 1254897] Re: CVE-2013-4591

2013-11-25 Thread John Johansen
CVE-2013-4591 ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affec

[Bug 1254900] [NEW] CVE-2013-4592

2013-11-25 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger

[Bug 1254900] Re: CVE-2013-4592

2013-11-25 Thread John Johansen
CVE-2013-4592 ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affec

[Bug 1254901] [NEW] CVE-2013-6282

2013-11-25 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel

[Bug 1254901] Re: CVE-2013-6282

2013-11-25 Thread John Johansen
CVE-2013-6282 ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affec

[Bug 1255341] Re: apparmor="DENIED" with precise kernel 3.2.0 on lucid

2013-11-26 Thread John Johansen
The precise kernel is not supported on Lucid. As such I am closing this bug as won't fix. However you can fix the apparmor issue in this bug by installing the apparmor package from precise on Lucid. The precise apparmor package will work with the Lucid kernel as well as the precise kernel and has

[Bug 1255424] Re: include of dir fails when the number of files in the dir approaches or exceeds the processes fd limit

2013-11-26 Thread John Johansen
This can be worked around by splitting large directory includes into multiple directories, or increasing the processes open fd limit. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1255424 Title: inc

[Bug 1255424] [NEW] include of dir fails when the number of files in the dir approaches or exceeds the processes fd limit

2013-11-26 Thread John Johansen
Public bug reported: The apparmor parser handles directory includes in an odd way, where each file in the directory is opened and the pushed as a flex buffer state before any files in the directory are actually processed. The flex buffers and associated fds are then processed one by one and the h

[Bug 1254897] Re: CVE-2013-4591

2013-11-26 Thread John Johansen
** Description changed: Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call fo

[Bug 1255341] Re: apparmor="DENIED" with precise kernel 3.2.0 on lucid

2013-11-27 Thread John Johansen
hrmmm, well thats not good. There is nothing in the apparmor package that requires libc6 but because of how library deps get generated ... You could try force installing it (I've never tried this) and it might work. Or you could build the package or just the parser from scratch. apt-get source

[Bug 1255341] Re: apparmor="DENIED" with precise kernel 3.2.0 on lucid

2013-11-27 Thread John Johansen
Sigh all the little niggles that I forget about. So that is an error around the version of gcc in Lucid and the c++0x standard which does allow for what is throwing the error. I will poke at this tonight and see if there isn't a simple patch that will allow for this to build on Lucid. -- You rece

[Bug 1252422] Re: CVE-2013-4579

2013-11-28 Thread John Johansen
** Description changed: - ath9k_htc improperly updates MAC address + The ath9k_htc_set_bssid_mask function in + drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel + through 3.12 uses a BSSID masking approach to determine the set of MAC + addresses on which a Wi-Fi device is listenin

[Bug 1252424] Re: CVE-2013-4588

2013-11-28 Thread John Johansen
** Description changed: - Linux kernel built with the IP Virtual Server(CONFIG_IP_VS) support is - vulnerable to a buffer overflow flaw. It could occur while setting or - retrieving socket options via setsockopt(2) or getsockopt(2) calls. - Though a user needs to have CAP_NET_ADMIN privileges to p

[Bug 1256080] [NEW] CVE-2013-6378

2013-11-28 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write oper

[Bug 1256080] Re: CVE-2013-6378

2013-11-28 Thread John Johansen
CVE-2013-6378 ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affec

[Bug 1256083] Re: CVE-2013-6380

2013-11-28 Thread John Johansen
CVE-2013-6380 ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affec

[Bug 1256083] [NEW] CVE-2013-6380

2013-11-28 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer de

[Bug 1256088] [NEW] CVE-2013-6381

2013-11-28 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNM

[Bug 1256088] Re: CVE-2013-6381

2013-11-28 Thread John Johansen
CVE-2013-6381 ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affec

[Bug 1256091] [NEW] CVE-2013-6382

2013-11-28 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS

[Bug 1256091] Re: CVE-2013-6382

2013-11-28 Thread John Johansen
CVE-2013-6382 ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affec

[Bug 1256094] [NEW] CVE-2013-6383

2013-11-28 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted i

[Bug 1256094] Re: CVE-2013-6383

2013-11-28 Thread John Johansen
CVE-2013-6383 ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affec

[Bug 1256095] [NEW] CVE-2013-6392

2013-11-28 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: information disclosure ** Affects: linux (Ubuntu) Importance: Low Status: New ** Affects: linux-armadaxp (Ubuntu) Importance: Low Status: Invalid ** Affects: linux-ec2 (Ubuntu) Importanc

[Bug 1256095] Re: CVE-2013-6392

2013-11-28 Thread John Johansen
CVE-2013-6392 ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affec

[Bug 1254897] Re: CVE-2013-4591

2013-12-02 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New =>

[Bug 1256094] Re: CVE-2013-6383

2013-12-02 Thread John Johansen
** Changed in: linux (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1256094 Title: CVE-2013-6383 To manage notifications about this bug go to: https://b

[Bug 1131331] Re: CVE-2012-4542

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1131331 Title: CVE-2012-4542 To manage notifications about this bug go to:

[Bug 912231] Re: CVE-2011-4917

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/912231 Title: CVE-2011-4917 To manage notifications about this bug go to: h

[Bug 949905] Re: CVE-2012-1097

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/949905 Title: CVE-2012-1097 To manage notifications about this bug

[Bug 912230] Re: CVE-2011-4916

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/912230 Title: CVE-2011-4916 To manage notifications about this bug go to: h

[Bug 927885] Re: CVE-2011-2393

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/

[Bug 899463] Re: CVE-2011-1162

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/899463 Title: CVE-2011-1162 To manage notifications about this bug

[Bug 912227] Re: CVE-2011-4915

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/912227 Title: CVE-2011-4915 To manage notifications about this bug go to: h

[Bug 894369] Re: CVE-2011-4110

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/894369 Title: CVE-2011-4110 To manage notifications about this bug

[Bug 887299] Re: CVE-2011-4081

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/887299 Title: CVE-2011-4081 To manage notifications about this bug

[Bug 894374] Re: CVE-2011-4330

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/894374 Title: CVE-2011-4330 To manage notifications about this bug

[Bug 899466] Re: CVE-2011-2203

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/899466 Title: CVE-2011-2203 To manage notifications about this bug

[Bug 880890] Re: CVE-2011-3209

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/880890 Title: CVE-2011-3209 To manage notifications about this bug

[Bug 893147] Re: CVE-2011-4131

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893147 Title: CVE-2011-4131 To manage notifications about this bug

[Bug 893148] Re: CVE-2011-4132

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/893148 Title: CVE-2011-4132 To manage notifications about this bug

[Bug 887298] Re: CVE-2011-4077

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/887298 Title: CVE-2011-4077 To manage notifications about this bug

[Bug 1254894] Re: CVE-2013-4563

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1254894 Title: CVE-2013-4563 To manage notifications about this bug go to:

[Bug 1252424] Re: CVE-2013-4588

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1252424 Title: CVE-2013-4588 To manage notifications about this bug go to:

[Bug 1252422] Re: CVE-2013-4579

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1252422 Title: CVE-2013-4579 To manage notifications about this bug go to:

[Bug 1249281] Re: CVE-2013-4516

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1249281 Title: CVE-2013-4516 To manage notifications about this bug go to:

[Bug 1249276] Re: CVE-2013-4515

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1249276 Title: CVE-2013-4515 To manage notifications about this bug go to:

[Bug 1252419] Re: CVE-2013-4511

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1252419 Title: CVE-2013-4511 To manage notifications about this bug go to:

[Bug 1248700] Re: CVE-2013-4348

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1248700 Title: CVE-2013-4348 To manage notifications about this bug go to:

[Bug 1248703] Re: CVE-2013-4470

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1248703 Title: CVE-2013-4470 To manage notifications about this bug go to:

[Bug 1249274] Re: CVE-2013-4514

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1249274 Title: CVE-2013-4514 To manage notifications about this bug go to:

[Bug 1241769] Re: CVE-2013-4299

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1241769 Title: CVE-2013-4299 To manage notifications about this bug go to:

[Bug 1226497] Re: CVE-2013-4350

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1226497 Title: CVE-2013-4350 To manage notifications about this bug go to:

[Bug 1248713] Re: CVE-2013-4483

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1248713 Title: CVE-2013-4483 To manage notifications about this bug go to:

[Bug 1229981] Re: CVE-2013-4345

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1229981 Title: CVE-2013-4345 To manage notifications about this bug go to:

[Bug 1249272] Re: CVE-2013-4513

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1249272 Title: CVE-2013-4513 To manage notifications about this bug go to:

[Bug 1235136] Re: CVE-2013-4387

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1235136 Title: CVE-2013-4387 To manage notifications about this bug go to:

[Bug 1220209] Re: CVE-2013-2899

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1220209 Title: CVE-2013-2899 To manage notifications about this bug go to:

[Bug 1220190] Re: CVE-2013-2889

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1220190 Title: CVE-2013-2889 To manage notifications about this bug go to:

[Bug 1220200] Re: CVE-2013-2895

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1220200 Title: CVE-2013-2895 To manage notifications about this bug go to:

[Bug 1220196] Re: CVE-2013-2892

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1220196 Title: CVE-2013-2892 To manage notifications about this bug go to:

[Bug 1220202] Re: CVE-2013-2896

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1220202 Title: CVE-2013-2896 To manage notifications about this bug go to:

[Bug 1198296] Re: CVE-2013-2237

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1198296 Title: CVE-2013-2237 To manage notifications about this b

[Bug 1220185] Re: CVE-2013-2888

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1220185 Title: CVE-2013-2888 To manage notifications about this bug go to:

[Bug 1220205] Re: CVE-2013-2897

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1220205 Title: CVE-2013-2897 To manage notifications about this bug go to:

[Bug 1220198] Re: CVE-2013-2893

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1220198 Title: CVE-2013-2893 To manage notifications about this bug go to:

[Bug 1091187] Re: CVE-2012-5374

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1091187 Title: CVE-2012-5374 To manage notifications about this bu

[Bug 1097680] Re: CVE-2013-0160

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1097680 Title: CVE-2013-0160 To manage notifications about this b

[Bug 1188351] Re: CVE-2013-2140

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1188351 Title: CVE-2013-2140 To manage notifications about this b

[Bug 1091188] Re: CVE-2012-5375

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1091188 Title: CVE-2012-5375 To manage notifications about this bu

[Bug 1188355] Re: CVE-2013-2147

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1188355 Title: CVE-2013-2147 To manage notifications about this b

[Bug 1143800] Re: CVE-2013-0343

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1143800 Title: CVE-2013-0343 To manage notifications about this bug go to:

[Bug 1158258] Re: CVE-2013-1797

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1158258 Title: CVE-2013-1797 To manage notifications about this bu

[Bug 1256094] Re: CVE-2013-6383

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1256094 Title: CVE-2013-6383 To manage notifications about this bug go to:

[Bug 1256083] Re: CVE-2013-6380

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1256083 Title: CVE-2013-6380 To manage notifications about this bug go to:

[Bug 1256095] Re: CVE-2013-6392

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1256095 Title: CVE-2013-6392 To manage notifications about this bug go to:

[Bug 1256088] Re: CVE-2013-6381

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1256088 Title: CVE-2013-6381 To manage notifications about this bug go to:

[Bug 1256091] Re: CVE-2013-6382

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1256091 Title: CVE-2013-6382 To manage notifications about this bug go to:

[Bug 1256080] Re: CVE-2013-6378

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1256080 Title: CVE-2013-6378 To manage notifications about this bug go to:

[Bug 1254901] Re: CVE-2013-6282

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1254901 Title: CVE-2013-6282 To manage notifications about this bug go to:

[Bug 1254900] Re: CVE-2013-4592

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1254900 Title: CVE-2013-4592 To manage notifications about this bug go to:

[Bug 1252417] Re: CVE-2013-4270

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1252417 Title: CVE-2013-4270 To manage notifications about this bug go to:

[Bug 1256919] [NEW] CVE-2013-6405

2013-12-02 Thread John Johansen
*** This bug is a security vulnerability *** Public security bug reported: net: uninitialised memory leakage Break-Fix: - bceaa90240b6019ed73b49965eac7d167610be69 ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu) Importance: Medium

[Bug 1256919] Re: CVE-2013-6405

2013-12-02 Thread John Johansen
CVE-2013-6405 ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affec

[Bug 1252426] Re: CVE-2013-6763

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1252426 Title: CVE-2013-6763 To manage notifications about this bug go to:

[Bug 1257092] Re: linux: 3.11.0-15.22 -proposed tracker

2013-12-03 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) => John Johansen (jjohansen) -- You received this bug notification because you

[Bug 1257035] Re: linux: 3.5.0-45.68 -proposed tracker

2013-12-03 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) => John Johansen (jjohansen) -- You received this bug notification because you

[Bug 1257102] Re: linux: 3.8.0-35.50 -proposed tracker

2013-12-03 Thread John Johansen
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) => John Johansen (jjohansen) -- You received this bug notification because you

[Bug 1256091] Re: CVE-2013-6382

2013-12-24 Thread John Johansen
** Description changed: Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST

[Bug 1261570] Re: CVE-2013-6376

2013-12-24 Thread John Johansen
** Description changed: - The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM - subsystem in the Linux kernel through 3.12.5 allows guest OS users to - cause a denial of service (host OS crash) via a crafted ICR write - operation in x2apic mode. + kvm: BUG_ON() in apic_cluster_id(

[Bug 1058854] Re: High CPU usage of CFS

2014-01-02 Thread Dave Johansen
I no longer have access to this hardware to get the full computer model, but the referenced test programs should be able to reproduce the issue on most, if not all machines (it's worked on everyone I've tried it on to date). -- You received this bug notification because you are a member of Ubuntu

[Bug 1058864] Re: Poor mutex and semaphore performance

2014-01-02 Thread Dave Johansen
I no longer have access to this hardware to get the full computer model, but the referenced test programs should be able to reproduce the issue on most, if not all machines (it's worked on everyone I've tried it on to date). -- You received this bug notification because you are a member of Ubuntu

[Bug 1261564] Re: CVE-2013-4587

2014-01-03 Thread John Johansen
** Description changed: - kvm: rtc_status.dest_map out-of-bounds access + Array index error in the kvm_vm_ioctl_create_vcpu function in + virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through + 3.12.5 allows local users to gain privileges via a large id value. Break-Fix: - 338c

[Bug 1261564] Re: CVE-2013-4587

2014-01-03 Thread John Johansen
** Description changed: - Array index error in the kvm_vm_ioctl_create_vcpu function in - virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through - 3.12.5 allows local users to gain privileges via a large id value. + kvm: rtc_status.dest_map out-of-bounds access Break-Fix: - 338c

[Bug 1261568] Re: CVE-2013-6368

2014-01-03 Thread John Johansen
** Description changed: - kvm: cross page vapic_addr access + The KVM subsystem in the Linux kernel through 3.12.5 allows local users + to gain privileges or cause a denial of service (system crash) via a + VAPIC synchronization operation involving a page-end address. Break-Fix: - fda4e2e8558

[Bug 1261568] Re: CVE-2013-6368

2014-01-03 Thread John Johansen
** Description changed: - The KVM subsystem in the Linux kernel through 3.12.5 allows local users - to gain privileges or cause a denial of service (system crash) via a - VAPIC synchronization operation involving a page-end address. + kvm: cross page vapic_addr access Break-Fix: - fda4e2e8558

[Bug 1261570] Re: CVE-2013-6376

2014-01-03 Thread John Johansen
** Description changed: - kvm: BUG_ON() in apic_cluster_id() + The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM + subsystem in the Linux kernel through 3.12.5 allows guest OS users to + cause a denial of service (host OS crash) via a crafted ICR write + operation in x2apic mode

[Bug 1261570] Re: CVE-2013-6376

2014-01-03 Thread John Johansen
** Description changed: - The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM - subsystem in the Linux kernel through 3.12.5 allows guest OS users to - cause a denial of service (host OS crash) via a crafted ICR write - operation in x2apic mode. + kvm: BUG_ON() in apic_cluster_id(

[Bug 1317330] Re: linux-ti-omap4: 3.5.0-242.58 -proposed tracker

2014-05-26 Thread John Johansen
EOL, no USN for this update ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1317330 Title: linux-ti-omap4: 3.

[Bug 1320979] Re: linux: 3.13.0-27.50 -proposed tracker

2014-05-26 Thread John Johansen
Looks good ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1320979 Title: linux: 3.13.0-27.50 -proposed

<    1   2   3   4   5   6   7   8   9   10   >