Also tracked as Bug #1316835, can we can mark one of these as a
duplicate
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1320979
Title:
linux: 3.13.0-27.50 -proposed tracker
To manage notifications
Also tracked in Bugs Bug #1320979, can we mark one of them as a
duplicate
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1316835
Title:
linux: 3.13.0-27.50 -proposed tracker
To manage notifications
nstantly.
This patch fix the issue by always calling {get,put}_buffers() since
preempt_{disable,enable}() functions are nestable.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: John Johansen (jjohansen)
Status: Confirmed
** Affects: linux (Ubuntu Trusty)
Im
Johansen (jjohansen)
Status: Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1323528
Title:
apparmor3 patches not available on 3.15 kernel
To manage notifications about this bug go
: John Johansen (jjohansen)
Status: Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1323529
Title:
apparmor spam log with warning on none SMP kernels
To manage notifications about
: John Johansen (jjohansen)
Status: Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1323530
Title:
apparmor spam log with warning on none SMP kernels
To manage notifications about
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Assignee: John Johansen (jjohansen)
Status: Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1323530
Title
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Assignee: John Johansen (jjohansen)
Status: Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1323528
Title
** Description changed:
- [forbid uaddr == uaddr2 in futex_wait_requeue_pi() to avoid null
- dereference]
+ The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel
+ before 3.5.1 does not ensure that calls have two different futex
+ addresses, which allows local users to cause a d
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubu
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Saucy)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-raring (Ubuntu
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubu
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bug
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Saucy)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu P
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Saucy)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: Won't Fix => Fix Released
--
You received this bug notifi
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubu
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Saucy)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: Won't Fix => Fix Released
--
You received this bug notifi
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubu
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubunt
tail -f /var/log/syslog
while playing dropping letters
May 29 11:56:06 ubuntu-phablet whoopsie[1471]: offline
May 29 11:56:06 ubuntu-phablet rtkit-daemon[1462]: Successfully made thread
1460 of process 1460 (n/a) owned by '32011' high priority at nice level -11.
May 29 11:56:06 ubuntu-phablet rt
top (sorted by mem) after system crashes
top - 12:21:49 up 4 min, 1 user, load average: 1.20, 0.97, 0.48
Tasks: 129 total, 1 running, 128 sleeping, 0 stopped, 0 zombie
%Cpu(s): 18.0 us, 19.1 sy, 0.0 ni, 50.6 id, 12.4 wa, 0.0 hi, 0.0 si, 0.0 st
KiB Mem:508716 total, 503628 used,
you can watch qmlscene memory consumption increase with each letter
dropped
It appears that the oom killer is firing but the emulator isn't
recovering
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/132
top (sorted by mem) before running dropping letters
top - 12:18:28 up 0 min, 1 user, load average: 3.96, 1.35, 0.47
Tasks: 131 total, 1 running, 130 sleeping, 0 stopped, 0 zombie
%Cpu(s): 0.0 us, 25.0 sy, 0.0 ni, 75.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
KiB Mem:508716 total, 502
another back trace
May 29 12:23:00 ubuntu-phablet NetworkManager[2200]:
/sys/devices/virtual/net/lo: couldn't determine device driver; ignoring...
May 29 12:23:00 ubuntu-phablet NetworkManager[2200]:
/sys/devices/virtual/net/lo: couldn't determine device driver; ignoring...
May 29 12:23:00 ub
Also after multiple runs it does come back some times, eventually.
So this looks like 2 bugs, the dropping letters mem leak, and oom killer
killing the wrong tasks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad
The path resolution fn is not properly prepending the '/' character to
disconnected paths that don't disconnect at a device/fs. This is
generally the case for bind mounts.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.la
This is a bug in the apparmor_parsers handling of escape sequences in
the rule encoding. It was fixed in upstream commit r2456
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1324533
Title:
ptrace rea
The syntax allows for spaces or commas to separate items, because people
kept using them. However list of items must be inside of parenthesis.
mount options in (rw, slave),
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
** Changed in: linux (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1241769
Title:
CVE-2013-4299
To manage notifications about this bug go to:
https://b
*** This bug is a security vulnerability ***
Public security bug reported:
net: deadloop path in skb_flow_dissect()
Break-Fix: f9e42b853523cda0732022c2e0473c183f7aec65
7926c1d5be0b7cbe5b8d5c788d7d39237e7b212c
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: l
CVE-2013-4348
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
CVE-2013-4470
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
*** This bug is a security vulnerability ***
Public security bug reported:
memory corruption with UDP_CORK and UFO
Break-Fix: e89e9cf539a28df7d0eb1d0a545368e9920b34ac
c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
Break-Fix: e89e9cf539a28df7d0eb1d0a545368e9920b34ac
e93b7d748be887cd7639b113ba7d7ef792
*** This bug is a security vulnerability ***
Public security bug reported:
ipc: ipc_rcu_putref refcount races
Break-Fix: - 6062a8dc0517bce23e3c2f7d2fea5e22411269a3
** Affects: linux (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-armadaxp (Ubuntu)
Importance: M
CVE-2013-4483
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1243944
Title:
linux-ti-omap4: 3.5.0-235.51 -
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1243951
Title:
linux-ti-omap4: 3.2.0-1440.59
I have traced this down to how the cred is being handled in a couple
hooks. So dependent on program access patterns the new profile may or
may not be used. I have placed a test kernel that passes serge's aa_exec
test (for me) on people. Please test and confirm this kernel is working
http://people.
** Description changed:
- dm data corruption
+ Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux
+ kernel through 3.11.6 allows remote authenticated users to obtain
+ sensitive information or modify data via a crafted mapping to a snapshot
+ block device.
Break-Fix: - e9
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New =>
** Description changed:
- memory corruption with UDP_CORK and UFO
+ The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is
+ enabled, does not properly initialize certain data structures, which
+ allows local users to cause a denial of service (memory corruption and
+ system crash)
** Description changed:
- ipc: ipc_rcu_putref refcount races
+ The ipc_rcu_putref function in ipc/util.c in the Linux kernel before
+ 3.10 does not properly manage a reference count, which allows local
+ users to cause a denial of service (memory consumption or system crash)
+ via a crafted applic
*** This bug is a security vulnerability ***
Public security bug reported:
[buffer overflow in proc code]
Break-Fix: - 201f99f170df14ba52ea4c52847779042b7a623b
** Affects: linux (Ubuntu)
Importance: Low
Status: Invalid
** Affects: linux-armadaxp (Ubuntu)
Importance: Low
CVE-2013-4512
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
CVE-2013-4513
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
*** This bug is a security vulnerability ***
Public security bug reported:
[ozwpan: buffer overflow in write syscall]
Break-Fix: - c2c65cd2e14ada6de44cb527e7f1990bede24e15
** Affects: linux (Ubuntu)
Importance: Low
Status: Invalid
** Affects: linux-armadaxp (Ubuntu)
Importan
*** This bug is a security vulnerability ***
Public security bug reported:
[buffer overflow when setting station name]
Break-Fix: - b5e2f339865fb443107e5b10603e53bbc92dc054
** Affects: linux (Ubuntu)
Importance: Low
Status: Invalid
** Affects: linux-armadaxp (Ubuntu)
Importa
CVE-2013-4514
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
*** This bug is a security vulnerability ***
Public security bug reported:
[bcm: kernel memory disclosure via uninitialized structure members]
Break-Fix: - 8d1e72250c847fa96498ec029891de4dc638a5ba
** Affects: linux (Ubuntu)
Importance: Low
Status: Invalid
** Affects: linux-armada
CVE-2013-4515
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
*** This bug is a security vulnerability ***
Public security bug reported:
[kernel memory disclosure via uninitialized structure members]
Break-Fix: - a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
** Affects: linux (Ubuntu)
Importance: Low
Status: Invalid
** Affects: linux-armadaxp (U
CVE-2013-4516
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
** Patch added: "absolute minimum patch to support block_suspend in this
version of the parser"
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1199933/+attachment/3903529/+files/foo.diff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscrib
Public bug reported:
The Dash search bar still uses the text "Search your computer and online
sources", when the privacy setting "Include online search results" is
off.
This is confusing to users as the explicitly disable online search but
unity is still telling them it is searching online when i
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance: U
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance: Undecided => Low
** Changed in: linux-lts-saucy (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Lucid)
Importance: Undec
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance: U
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance: U
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance: U
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance: U
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Low
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance: U
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance: Undecided => Low
** Changed in: linux-lts-saucy (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Lucid)
Importance: Undec
** Description changed:
The ipv6_create_tempaddr function in net/ipv6/addrconf.c in the Linux
kernel through 3.8 does not properly handle problems with the generation
of IPv6 temporary addresses, which allows remote attackers to cause a
denial of service (excessive retries and address-gene
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
S
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215005
Title:
linux: 2.6.32-51.113 -proposed
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215129
Title:
linux: 3.5.0-40.62 -proposed t
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215173
Title:
linux: 3.2.0-53.81 -proposed t
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215239
Title:
linux-ec2: 2.6.32-356.69 -prop
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215276
Title:
linux-ti-omap4: 3.5.0-232.48 -
Looks good
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215280
Title:
linux-lts-quantal: 3.5.0-40.62~precise1 -proposed tracker
To manage notifications about this bug go to:
https://bugs.launchpa
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215596
Title:
linux: 3.8.0-30.44 -proposed t
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215689
Title:
linux-ti-omap4: 3.2.0-1437.56
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215280
Title:
linux-lts-quantal: 3.5.0-40.62
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215677
Title:
linux-lts-raring: 3.8.0-30.44~
** Changed in: linux (Ubuntu Saucy)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1143800
Title:
CVE-2013-0343
To manage notifications about this bug go to:
https://bu
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Description changed:
ne
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Raring)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Q
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug not
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux (Ubuntu Lucid)
Status: New => Invalid
** Description changed:
The _xfs_buf_find function in fs/xfs/xfs_buf.c in the Linux kernel
before 3.7.6 does not validate block numbers, which allows local
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
S
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1188351
Title:
CVE-2013-2140
To manage notifications abo
** Description changed:
Memory write via arbitrary heap array index. This is the most serious,
IMO, as it allows (on 32-bit) access to the entire memory range (the
index is unsigned 32 bit). This is mitigated slightly by the fact that
the starting address is at an "unknown" location on the
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux (Ubuntu Lucid)
Status: New => Invalid
** Description changed:
Triggers NULL deref Oops DoS
+
+ Break-Fix: 7b2a64c96ad53c4299f7e6ddf8c2f99cb48940a9
+ 875b4e3763dbc941f15143dd1a18d10bb0be303b
--
601 - 700 of 8478 matches
Mail list logo