CVE-2013-4591
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
*** This bug is a security vulnerability ***
Public security bug reported:
Memory leak in the __kvm_set_memory_region function in
virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to
cause a denial of service (memory consumption) by leveraging certain
device access to trigger
CVE-2013-4592
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
*** This bug is a security vulnerability ***
Public security bug reported:
The (1) get_user and (2) put_user API functions in the Linux kernel
before 3.5.5 on the v6k and v7 ARM platforms do not validate certain
addresses, which allows attackers to read or modify the contents of
arbitrary kernel
CVE-2013-6282
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
The precise kernel is not supported on Lucid. As such I am closing this
bug as won't fix.
However you can fix the apparmor issue in this bug by installing the
apparmor package from precise on Lucid. The precise apparmor package
will work with the Lucid kernel as well as the precise kernel and has
This can be worked around by splitting large directory includes into
multiple directories, or increasing the processes open fd limit.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1255424
Title:
inc
Public bug reported:
The apparmor parser handles directory includes in an odd way, where each
file in the directory is opened and the pushed as a flex buffer state
before any files in the directory are actually processed. The flex
buffers and associated fds are then processed one by one and the
h
** Description changed:
Buffer overflow in the __nfs4_get_acl_uncached function in
fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to
cause a denial of service (memory corruption and system crash) or
possibly have unspecified other impact via a getxattr system call fo
hrmmm, well thats not good. There is nothing in the apparmor package
that requires libc6 but because of how library deps get generated ...
You could try force installing it (I've never tried this) and it might
work. Or you could build the package or just the parser from scratch.
apt-get source
Sigh all the little niggles that I forget about. So that is an error
around the version of gcc in Lucid and the c++0x standard which does
allow for what is throwing the error. I will poke at this tonight and
see if there isn't a simple patch that will allow for this to build on
Lucid.
--
You rece
** Description changed:
- ath9k_htc improperly updates MAC address
+ The ath9k_htc_set_bssid_mask function in
+ drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel
+ through 3.12 uses a BSSID masking approach to determine the set of MAC
+ addresses on which a Wi-Fi device is listenin
** Description changed:
- Linux kernel built with the IP Virtual Server(CONFIG_IP_VS) support is
- vulnerable to a buffer overflow flaw. It could occur while setting or
- retrieving socket options via setsockopt(2) or getsockopt(2) calls.
- Though a user needs to have CAP_NET_ADMIN privileges to p
*** This bug is a security vulnerability ***
Public security bug reported:
The lbs_debugfs_write function in
drivers/net/wireless/libertas/debugfs.c in the Linux kernel through
3.12.1 allows local users to cause a denial of service (OOPS) by
leveraging root privileges for a zero-length write oper
CVE-2013-6378
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
CVE-2013-6380
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
*** This bug is a security vulnerability ***
Public security bug reported:
The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the
Linux kernel through 3.12.1 does not properly validate a certain size
value, which allows local users to cause a denial of service (invalid
pointer de
*** This bug is a security vulnerability ***
Public security bug reported:
Buffer overflow in the qeth_snmp_command function in
drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1
allows local users to cause a denial of service or possibly have
unspecified other impact via an SNM
CVE-2013-6381
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
*** This bug is a security vulnerability ***
Public security bug reported:
Multiple buffer underflows in the XFS implementation in the Linux kernel
through 3.12.1 allow local users to cause a denial of service (memory
corruption) or possibly have unspecified other impact by leveraging the
CAP_SYS
CVE-2013-6382
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
*** This bug is a security vulnerability ***
Public security bug reported:
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the
Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO
capability, which allows local users to bypass intended access
restrictions via a crafted i
CVE-2013-6383
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
*** This bug is a security vulnerability ***
Public security bug reported:
information disclosure
** Affects: linux (Ubuntu)
Importance: Low
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: Low
Status: Invalid
** Affects: linux-ec2 (Ubuntu)
Importanc
CVE-2013-6392
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New =>
** Changed in: linux (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1256094
Title:
CVE-2013-6383
To manage notifications about this bug go to:
https://b
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1131331
Title:
CVE-2012-4542
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/912231
Title:
CVE-2011-4917
To manage notifications about this bug go to:
h
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/912230
Title:
CVE-2011-4916
To manage notifications about this bug go to:
h
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Importance: Undecided => Low
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/899463
Title:
CVE-2011-1162
To manage notifications about this bug
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/912227
Title:
CVE-2011-4915
To manage notifications about this bug go to:
h
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/894369
Title:
CVE-2011-4110
To manage notifications about this bug
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/887299
Title:
CVE-2011-4081
To manage notifications about this bug
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/894374
Title:
CVE-2011-4330
To manage notifications about this bug
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/899466
Title:
CVE-2011-2203
To manage notifications about this bug
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/880890
Title:
CVE-2011-3209
To manage notifications about this bug
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893147
Title:
CVE-2011-4131
To manage notifications about this bug
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/893148
Title:
CVE-2011-4132
To manage notifications about this bug
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/887298
Title:
CVE-2011-4077
To manage notifications about this bug
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1254894
Title:
CVE-2013-4563
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1252424
Title:
CVE-2013-4588
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1252422
Title:
CVE-2013-4579
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1249281
Title:
CVE-2013-4516
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1249276
Title:
CVE-2013-4515
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1252419
Title:
CVE-2013-4511
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1248700
Title:
CVE-2013-4348
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1248703
Title:
CVE-2013-4470
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1249274
Title:
CVE-2013-4514
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1241769
Title:
CVE-2013-4299
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1226497
Title:
CVE-2013-4350
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1248713
Title:
CVE-2013-4483
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1229981
Title:
CVE-2013-4345
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1249272
Title:
CVE-2013-4513
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1235136
Title:
CVE-2013-4387
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1220209
Title:
CVE-2013-2899
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1220190
Title:
CVE-2013-2889
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1220200
Title:
CVE-2013-2895
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1220196
Title:
CVE-2013-2892
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1220202
Title:
CVE-2013-2896
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1198296
Title:
CVE-2013-2237
To manage notifications about this b
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1220185
Title:
CVE-2013-2888
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1220205
Title:
CVE-2013-2897
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1220198
Title:
CVE-2013-2893
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1091187
Title:
CVE-2012-5374
To manage notifications about this bu
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1097680
Title:
CVE-2013-0160
To manage notifications about this b
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1188351
Title:
CVE-2013-2140
To manage notifications about this b
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1091188
Title:
CVE-2012-5375
To manage notifications about this bu
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1188355
Title:
CVE-2013-2147
To manage notifications about this b
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143800
Title:
CVE-2013-0343
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1158258
Title:
CVE-2013-1797
To manage notifications about this bu
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1256094
Title:
CVE-2013-6383
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1256083
Title:
CVE-2013-6380
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1256095
Title:
CVE-2013-6392
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1256088
Title:
CVE-2013-6381
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1256091
Title:
CVE-2013-6382
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1256080
Title:
CVE-2013-6378
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1254901
Title:
CVE-2013-6282
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1254900
Title:
CVE-2013-4592
To manage notifications about this bug go to:
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1252417
Title:
CVE-2013-4270
To manage notifications about this bug go to:
*** This bug is a security vulnerability ***
Public security bug reported:
net: uninitialised memory leakage
Break-Fix: - bceaa90240b6019ed73b49965eac7d167610be69
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: Medium
CVE-2013-6405
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1252426
Title:
CVE-2013-6763
To manage notifications about this bug go to:
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you
** Description changed:
Multiple buffer underflows in the XFS implementation in the Linux kernel
through 3.12.1 allow local users to cause a denial of service (memory
corruption) or possibly have unspecified other impact by leveraging the
CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST
** Description changed:
- The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
- subsystem in the Linux kernel through 3.12.5 allows guest OS users to
- cause a denial of service (host OS crash) via a crafted ICR write
- operation in x2apic mode.
+ kvm: BUG_ON() in apic_cluster_id(
I no longer have access to this hardware to get the full computer model,
but the referenced test programs should be able to reproduce the issue
on most, if not all machines (it's worked on everyone I've tried it on
to date).
--
You received this bug notification because you are a member of Ubuntu
I no longer have access to this hardware to get the full computer model,
but the referenced test programs should be able to reproduce the issue
on most, if not all machines (it's worked on everyone I've tried it on
to date).
--
You received this bug notification because you are a member of Ubuntu
** Description changed:
- kvm: rtc_status.dest_map out-of-bounds access
+ Array index error in the kvm_vm_ioctl_create_vcpu function in
+ virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through
+ 3.12.5 allows local users to gain privileges via a large id value.
Break-Fix: - 338c
** Description changed:
- Array index error in the kvm_vm_ioctl_create_vcpu function in
- virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through
- 3.12.5 allows local users to gain privileges via a large id value.
+ kvm: rtc_status.dest_map out-of-bounds access
Break-Fix: - 338c
** Description changed:
- kvm: cross page vapic_addr access
+ The KVM subsystem in the Linux kernel through 3.12.5 allows local users
+ to gain privileges or cause a denial of service (system crash) via a
+ VAPIC synchronization operation involving a page-end address.
Break-Fix: - fda4e2e8558
** Description changed:
- The KVM subsystem in the Linux kernel through 3.12.5 allows local users
- to gain privileges or cause a denial of service (system crash) via a
- VAPIC synchronization operation involving a page-end address.
+ kvm: cross page vapic_addr access
Break-Fix: - fda4e2e8558
** Description changed:
- kvm: BUG_ON() in apic_cluster_id()
+ The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
+ subsystem in the Linux kernel through 3.12.5 allows guest OS users to
+ cause a denial of service (host OS crash) via a crafted ICR write
+ operation in x2apic mode
** Description changed:
- The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
- subsystem in the Linux kernel through 3.12.5 allows guest OS users to
- cause a denial of service (host OS crash) via a crafted ICR write
- operation in x2apic mode.
+ kvm: BUG_ON() in apic_cluster_id(
EOL, no USN for this update
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1317330
Title:
linux-ti-omap4: 3.
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1320979
Title:
linux: 3.13.0-27.50 -proposed
501 - 600 of 8478 matches
Mail list logo