[Bug 1172403] Re: CVE-2013-3235

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1172403] Re: CVE-2013-3235

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2016-04-26 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Yakkety)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Yakkety)
   Importance: Undecided
   Status: New

** Also affects: linux-mako (Ubuntu Yakkety)
   Importance: Low
   Status: New

** Also affects: linux-manta (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-flo (Ubuntu Yakkety)
   Importance: Low
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-raspi2 (Ubuntu Yakkety)
   Importance: Low
   Status: Fix Committed

** Also affects: linux-lts-xenial (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2016-04-24 Thread Rolf Leggewie
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
   Status: New => Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
   Status: New => Won't Fix

** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2016-04-18 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2015-10-28 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Low
   Status: New

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Low
   Status: New

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Low
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-mako (Ubuntu Wily)
   Importance: Low
   Status: New

** Also affects: linux-manta (Ubuntu Wily)
   Importance: Low
   Status: New

** Also affects: linux-goldfish (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-flo (Ubuntu Wily)
   Importance: Low
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New = Fix Committed

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-ec2 (Ubuntu Lucid)

** No longer affects: linux-goldfish (Ubuntu Lucid)

** No longer affects: linux-lts-saucy (Ubuntu Lucid)

** No longer affects: linux-lts-quantal (Ubuntu Lucid)

** No longer affects: linux-mvl-dove (Ubuntu Lucid)

** No longer affects: linux-ti-omap4 (Ubuntu Lucid)

** No longer affects: linux (Ubuntu Lucid)

** No longer affects: linux-mako (Ubuntu Lucid)

** No longer affects: linux-fsl-imx51 (Ubuntu Lucid)

** No longer affects: linux-lts-utopic (Ubuntu Lucid)

** No longer affects: linux-flo (Ubuntu Lucid)

** No longer affects: linux-lts-raring (Ubuntu Lucid)

** No longer affects: linux-manta (Ubuntu Lucid)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2015-01-28 Thread John Johansen
** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-quantal (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-raring (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-quantal (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-raring (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Low
   Status: Fix Released

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** No longer affects: linux-lts-trusty (Ubuntu Quantal)

** No longer affects: linux-lts-trusty (Ubuntu Raring)

** No longer affects: linux-lts-trusty (Ubuntu Saucy)

** No longer affects: linux-armadaxp (Ubuntu Quantal)

** No longer affects: linux-armadaxp (Ubuntu Raring)

** No longer affects: linux-armadaxp (Ubuntu Saucy)

** No longer affects: linux-ec2 (Ubuntu Quantal)

** No longer affects: linux-ec2 (Ubuntu Raring)

** No longer affects: linux-ec2 (Ubuntu Saucy)

** No longer affects: linux-goldfish (Ubuntu Quantal)

** No longer affects: linux-goldfish (Ubuntu Raring)

** No longer affects: linux-goldfish (Ubuntu Saucy)

** No longer affects: linux-lts-saucy (Ubuntu Quantal)

** No longer affects: linux-lts-saucy (Ubuntu Raring)

** No longer affects: linux-lts-saucy (Ubuntu Saucy)

** No longer affects: linux-lts-quantal (Ubuntu Quantal)

** No longer affects: linux-lts-quantal (Ubuntu Raring)

** No longer affects: linux-lts-quantal (Ubuntu Saucy)

** No longer affects: linux-mvl-dove (Ubuntu Quantal)

** No longer affects: linux-mvl-dove (Ubuntu Raring)

** No longer affects: linux-mvl-dove (Ubuntu Saucy)

** No longer affects: linux-ti-omap4 (Ubuntu Quantal)

** No longer affects: linux-ti-omap4 (Ubuntu Raring)

** No longer affects: linux-ti-omap4 (Ubuntu Saucy)

** No longer affects: linux (Ubuntu Quantal)

** No longer affects: linux (Ubuntu Raring)

** No longer affects: linux (Ubuntu Saucy)

** No longer affects: linux-mako (Ubuntu Quantal)

** No longer affects: linux-mako (Ubuntu Raring)

** No longer affects: linux-mako (Ubuntu Saucy)

** 

[Bug 1172403] Re: CVE-2013-3235

2013-06-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-48.110

---
linux (2.6.32-48.110) lucid; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1186340

  [ Stefan Bader ]

  * (config) Import Xen specific config options from ec2
- LP: #1177431
  * SAUCE: xen: Send spinlock IPI to all waiters
- LP: #1011792, #1177431

  [ Upstream Kernel Changes ]

  * ax25: fix info leak via msg_name in ax25_recvmsg()
- LP: #1172366
- CVE-2013-3223
  * Bluetooth: fix possible info leak in bt_sock_recvmsg()
- LP: #1172368
- CVE-2013-3224
  * tipc: fix info leaks via msg_name in recv_msg/recv_stream
- LP: #1172403
- CVE-2013-3235
  * rose: fix info leak via msg_name in rose_recvmsg()
- LP: #1172394
- CVE-2013-3234
  * Bluetooth: RFCOMM - Fix missing msg_namelen update in
rfcomm_sock_recvmsg()
- LP: #1172369
- CVE-2013-3225
  * atm: update msg_namelen in vcc_recvmsg()
- LP: #1172365
- CVE-2013-3222
  * KVM: Fix bounds checking in ioapic indirect register reads
(CVE-2013-1798)
- LP: #1158262
- CVE-2013-1798
  * llc: Fix missing msg_namelen update in llc_ui_recvmsg()
- LP: #1172385
- CVE-2013-3231
  * netrom: fix info leak via msg_name in nr_recvmsg()
- LP: #1172386
- CVE-2013-3232
  * irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
- LP: #1172380
- CVE-2013-3228
  * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()
- LP: #1172381
- CVE-2013-3229
 -- Steve Conklin sconk...@canonical.com   Fri, 31 May 2013 12:03:46 -0500

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1798

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-3228

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-3229

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-3231

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-3232

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-06-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-48.74

---
linux (3.2.0-48.74) precise; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1188206

  [ Upstream Kernel Changes ]

  * iwlwifi: dvm: fix zero LQ CMD sending avoidance
- LP: #1186932

linux (3.2.0-47.72) precise; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1187066

  [ Upstream Kernel Changes ]

  * Revert drm/i915: Fix detection of base of stolen memory
- LP: #1186572
  * mmc: at91/avr32/atmel-mci: fix DMA-channel leak on module unload
- LP: #1186572
  * mmc: core: Fix bit width test failing on old eMMC cards
- LP: #1186572
  * mfd: adp5520: Restore mode bits on resume
- LP: #1186572
  * mmc: atmel-mci: pio hang on block errors
- LP: #1186572
  * x86: Eliminate irq_mis_count counted in arch_irq_stat
- LP: #1186572
  * ASoC: wm8994: missing break in wm8994_aif3_hw_params()
- LP: #1186572
  * ath9k: fix key allocation error handling for powersave keys
- LP: #1186572
  * nfsd4: don't allow owner override on 4.1 CLAIM_FH opens
- LP: #1186572
  * net/eth/ibmveth: Fixup retrieval of MAC address
- LP: #1186572
  * ext4: limit group search loop for non-extent files
- LP: #1186572
  * xen/vcpu/pvhvm: Fix vcpu hotplugging hanging.
- LP: #1186572
  * autofs - remove autofs dentry mount check
- LP: #1186572
  * ALSA: HDA: Fix Oops caused by dereference NULL pointer
- LP: #1186572
  * iscsi-target: Fix processing of OOO commands
- LP: #1186572
  * ACPICA: Fix possible buffer overflow during a field unit read operation
- LP: #1186572
  * B43: Handle DMA RX descriptor underrun
- LP: #1186572
  * mwifiex: clear is_suspended flag when interrupt is received early
- LP: #1186572
  * mwifiex: fix memory leak issue when driver unload
- LP: #1186572
  * mwifiex: fix setting of multicast filter
- LP: #1186572
  * cifs: only set ops for inodes in I_NEW state
- LP: #1186572
  * hp_accel: Ignore the error from lis3lv02d_poweron() at resume
- LP: #1186572
  * KVM: VMX: fix halt emulation while emulating invalid guest sate
- LP: #1186572
  * dm snapshot: fix error return code in snapshot_ctr
- LP: #1186572
  * dm bufio: avoid a possible __vmalloc deadlock
- LP: #1186572
  * tick: Cleanup NOHZ per cpu data on cpu down
- LP: #1186572
  * ACPI / EC: Restart transaction even when the IBF flag set
- LP: #1186572
  * drm/radeon: check incoming cliprects pointer
- LP: #1186572
  * staging: vt6656: use free_netdev instead of kfree
- LP: #1186572
  * hwmon: fix error return code in abituguru_probe()
- LP: #1186572
  * Kirkwood: Enable PCIe port 1 on QNAP TS-11x/TS-21x
- LP: #1186572
  * avr32: fix relocation check for signed 18-bit offset
- LP: #1186572
  * powerpc/pseries: Fix partition migration hang in stop_topology_update
- LP: #1186572
  * powerpc: Bring all threads online prior to migration/hibernation
- LP: #1186572
  * timer: Don't reinitialize the cpu base lock during CPU_UP_PREPARE
- LP: #1186572
  * tg3: Skip powering down function 0 on certain serdes devices
- LP: #1186572
  * USB: xHCI: override bogus bulk wMaxPacketSize values
- LP: #1186572
  * USB: UHCI: fix for suspend of virtual HP controller
- LP: #1186572
  * tracing: Fix leaks of filter preds
- LP: #1186572
  * usermodehelper: check subprocess_info-path != NULL
- LP: #1186572
  * drivers/char/ipmi: memcpy, need additional 2 bytes to avoid memory
overflow
- LP: #1186572
  * ipmi: ipmi_devintf: compat_ioctl method fails to take ipmi_mutex
- LP: #1186572
  * USB: reset resume quirk needed by a hub
- LP: #1186572
  * usb: option: Add Telewell TW-LTE 4G
- LP: #1186572
  * USB: Blacklisted Cinterion's PLxx WWAN Interface
- LP: #1186572
  * USB: option: add device IDs for Dell 5804 (Novatel E371) WWAN card
- LP: #1186572
  * i2c: designware: always clear interrupts before enabling them
- LP: #1186572
  * USB: ftdi_sio: Add support for Newport CONEX motor drivers
- LP: #1186572
  * btrfs: don't stop searching after encountering the wrong item
- LP: #1186572
  * virtio_console: fix uapi header
- LP: #1186572
  * ARM: plat-orion: Fix num_resources and id for ge10 and ge11
- LP: #1186572
  * USB: cxacru: potential underflow in cxacru_cm_get_array()
- LP: #1186572
  * TTY: Fix tty miss restart after we turn off flow-control
- LP: #1186572
  * sunrpc: clarify comments on rpc_make_runnable
- LP: #1186572
  * SUNRPC: Prevent an rpc_task wakeup race
- LP: #1186572
  * perf: net_dropmonitor: Fix trace parameter order
- LP: #1186572
  * perf: net_dropmonitor: Fix symbol-relative addresses
- LP: #1186572
  * ACPI / video: Add Asus UL30A to ACPI video detect blacklist
- LP: #1186572
  * fat: fix possible overflow for fat_clusters
- LP: #1186572
  * wait: fix false timeouts when using wait_event_timeout()
- LP: #1186572
  * mm: 

[Bug 1172403] Re: CVE-2013-3235

2013-06-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-quantal -
3.5.0-34.55~precise1

---
linux-lts-quantal (3.5.0-34.55~precise1) precise; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1188496

  [ Upstream Kernel Changes ]

  * iwlwifi: dvm: fix zero LQ CMD sending avoidance
- LP: #1186932

linux (3.5.0-33.54) quantal; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1186271

  [ Upstream Kernel Changes ]

  * crypto: algif - suppress sending source address information in recvmsg
- LP: #1172363
- CVE-2013-3076
  * ax25: fix info leak via msg_name in ax25_recvmsg()
- LP: #1172366
- CVE-2013-3223
  * Bluetooth: fix possible info leak in bt_sock_recvmsg()
- LP: #1172368
- CVE-2013-3224
  * tipc: fix info leaks via msg_name in recv_msg/recv_stream
- LP: #1172403
- CVE-2013-3235
  * rose: fix info leak via msg_name in rose_recvmsg()
- LP: #1172394
- CVE-2013-3234
  * Bluetooth: RFCOMM - Fix missing msg_namelen update in
rfcomm_sock_recvmsg()
- LP: #1172369
- CVE-2013-3225
  * atm: update msg_namelen in vcc_recvmsg()
- LP: #1172365
- CVE-2013-3222
  * iwlwifi: add new pci id for 6x35 series
- LP: #1180256
  * ath9k_htc: accept 1.x firmware newer than 1.3
- LP: #1186062
  * ssb: implement spurious tone avoidance
- LP: #1186062
  * can: mcp251x: add missing IRQF_ONESHOT to request_threaded_irq
- LP: #1186062
  * can: sja1000: fix handling on dt properties on little endian systems
- LP: #1186062
  * ath9k_hw: change AR9580 initvals to fix a stability issue
- LP: #1186062
  * ARM: 7696/1: Fix kexec by setting outer_cache.inv_all for Feroceon
- LP: #1186062
  * ARM: 7698/1: perf: fix group validation when using enable_on_exec
- LP: #1186062
  * hugetlbfs: add swap entry check in follow_hugetlb_page()
- LP: #1186062
  * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls
- LP: #1186062
  * hfsplus: fix potential overflow in hfsplus_file_truncate()
- LP: #1186062
  * sched: Convert BUG_ON()s in try_to_wake_up_local() to WARN_ON_ONCE()s
- LP: #1186062
  * perf/x86: Fix offcore_rsp valid mask for SNB/IVB
- LP: #1186062
  * vm: add vm_iomap_memory() helper function
- LP: #1186062
  * vm: convert HPET mmap to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert fb_mmap to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert snd_pcm_lib_mmap_iomem() to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert mtdchar mmap to vm_iomap_memory() helper
- LP: #1186062
  * regulator: fixed regulator_bulk_enable unwinding code
- LP: #1186062
  * perf: Fix error return code
- LP: #1186062
  * xen/smp: Fix leakage of timer interrupt line for every CPU
online/offline.
- LP: #1186062
  * xen/smp/spinlock: Fix leakage of the spinlock interrupt line for every
CPU online/offline
- LP: #1186062
  * xen/time: Fix kasprintf splat when allocating timer%d IRQ line.
- LP: #1186062
  * s390/memory hotplug: prevent offline of active memory increments
- LP: #1186062
  * aio: fix possible invalid memory access when DEBUG is enabled
- LP: #1186062
  * TTY: do not update atime/mtime on read/write
- LP: #1186062
  * TTY: fix atime/mtime regression
- LP: #1186062
  * caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg()
- LP: #1186062
  * irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
- LP: #1186062
  * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()
- LP: #1186062
  * llc: Fix missing msg_namelen update in llc_ui_recvmsg()
- LP: #1186062
  * netrom: fix info leak via msg_name in nr_recvmsg()
- LP: #1186062
  * netrom: fix invalid use of sizeof in nr_recvmsg()
- LP: #1186062
  * NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg()
- LP: #1186062
  * cbq: incorrect processing of high limits
- LP: #1186062
  * net IPv6 : Fix broken IPv6 routing table after loopback down-up
- LP: #1186062
  * net: count hw_addr syncs so that unsync works properly.
- LP: #1186062
  * atl1e: limit gso segment size to prevent generation of wrong ip length
fields
- LP: #1186062
  * bonding: fix bonding_masters race condition in bond unloading
- LP: #1186062
  * bonding: IFF_BONDING is not stripped on enslave failure
- LP: #1186062
  * af_unix: If we don't care about credentials coallesce all messages
- LP: #1186062
  * netfilter: don't reset nf_trace in nf_reset()
- LP: #1186062
  * rtnetlink: Call nlmsg_parse() with correct header length
- LP: #1186062
  * tcp: incoming connections might use wrong route under synflood
- LP: #1186062
  * tcp: Reallocate headroom if it would overflow csum_start
- LP: #1186062
  * esp4: fix error return code in esp_output()
- LP: #1186062
  * net: sctp: sctp_auth_key_put: use kzfree instead of kfree
- LP: #1186062
  * tcp: call tcp_replace_ts_recent() from tcp_ack()
- 

[Bug 1172403] Re: CVE-2013-3235

2013-06-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1621.32

---
linux-armadaxp (3.2.0-1621.32) precise-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1188465
  * Rebase onto Ubuntu-3.2.0-48.74

  [ Ubuntu: 3.2.0-48.74 ]

  * Release Tracking Bug
- LP: #1188206
  * iwlwifi: dvm: fix zero LQ CMD sending avoidance
- LP: #1186932
 -- Ike Panhc ike@canonical.com   Mon, 10 Jun 2013 12:59:55 +0800

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-06-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1433.44

---
linux-ti-omap4 (3.2.0-1433.44) precise; urgency=low

  * Release Tracking Bug
- LP: #1188464

  [ Brad Figg ]

  * UBUNTU: Fixup missing abi files causing FTBS

linux-ti-omap4 (3.2.0-1433.43) precise; urgency=low

  * Release Tracking Bug
- LP: #1188464

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.2.0-48.74

  [ Ubuntu: 3.2.0-48.74 ]

  * Release Tracking Bug
- LP: #1188206
  * iwlwifi: dvm: fix zero LQ CMD sending avoidance
- LP: #1186932

linux-ti-omap4 (3.2.0-1433.42) precise-proposed; urgency=low

  * Release Tracking Bug
- LP: #1187228

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.2.0-47.72

  [ Ubuntu: 3.2.0-47.72 ]

  * Release Tracking Bug
- LP: #1187066
  * Revert drm/i915: Fix detection of base of stolen memory
- LP: #1186572
  * mmc: at91/avr32/atmel-mci: fix DMA-channel leak on module unload
- LP: #1186572
  * mmc: core: Fix bit width test failing on old eMMC cards
- LP: #1186572
  * mfd: adp5520: Restore mode bits on resume
- LP: #1186572
  * mmc: atmel-mci: pio hang on block errors
- LP: #1186572
  * x86: Eliminate irq_mis_count counted in arch_irq_stat
- LP: #1186572
  * ASoC: wm8994: missing break in wm8994_aif3_hw_params()
- LP: #1186572
  * ath9k: fix key allocation error handling for powersave keys
- LP: #1186572
  * nfsd4: don't allow owner override on 4.1 CLAIM_FH opens
- LP: #1186572
  * net/eth/ibmveth: Fixup retrieval of MAC address
- LP: #1186572
  * ext4: limit group search loop for non-extent files
- LP: #1186572
  * xen/vcpu/pvhvm: Fix vcpu hotplugging hanging.
- LP: #1186572
  * autofs - remove autofs dentry mount check
- LP: #1186572
  * ALSA: HDA: Fix Oops caused by dereference NULL pointer
- LP: #1186572
  * iscsi-target: Fix processing of OOO commands
- LP: #1186572
  * ACPICA: Fix possible buffer overflow during a field unit read operation
- LP: #1186572
  * B43: Handle DMA RX descriptor underrun
- LP: #1186572
  * mwifiex: clear is_suspended flag when interrupt is received early
- LP: #1186572
  * mwifiex: fix memory leak issue when driver unload
- LP: #1186572
  * mwifiex: fix setting of multicast filter
- LP: #1186572
  * cifs: only set ops for inodes in I_NEW state
- LP: #1186572
  * hp_accel: Ignore the error from lis3lv02d_poweron() at resume
- LP: #1186572
  * KVM: VMX: fix halt emulation while emulating invalid guest sate
- LP: #1186572
  * dm snapshot: fix error return code in snapshot_ctr
- LP: #1186572
  * dm bufio: avoid a possible __vmalloc deadlock
- LP: #1186572
  * tick: Cleanup NOHZ per cpu data on cpu down
- LP: #1186572
  * ACPI / EC: Restart transaction even when the IBF flag set
- LP: #1186572
  * drm/radeon: check incoming cliprects pointer
- LP: #1186572
  * staging: vt6656: use free_netdev instead of kfree
- LP: #1186572
  * hwmon: fix error return code in abituguru_probe()
- LP: #1186572
  * Kirkwood: Enable PCIe port 1 on QNAP TS-11x/TS-21x
- LP: #1186572
  * avr32: fix relocation check for signed 18-bit offset
- LP: #1186572
  * powerpc/pseries: Fix partition migration hang in stop_topology_update
- LP: #1186572
  * powerpc: Bring all threads online prior to migration/hibernation
- LP: #1186572
  * timer: Don't reinitialize the cpu base lock during CPU_UP_PREPARE
- LP: #1186572
  * tg3: Skip powering down function 0 on certain serdes devices
- LP: #1186572
  * USB: xHCI: override bogus bulk wMaxPacketSize values
- LP: #1186572
  * USB: UHCI: fix for suspend of virtual HP controller
- LP: #1186572
  * tracing: Fix leaks of filter preds
- LP: #1186572
  * usermodehelper: check subprocess_info-path != NULL
- LP: #1186572
  * drivers/char/ipmi: memcpy, need additional 2 bytes to avoid memory
overflow
- LP: #1186572
  * ipmi: ipmi_devintf: compat_ioctl method fails to take ipmi_mutex
- LP: #1186572
  * USB: reset resume quirk needed by a hub
- LP: #1186572
  * usb: option: Add Telewell TW-LTE 4G
- LP: #1186572
  * USB: Blacklisted Cinterion's PLxx WWAN Interface
- LP: #1186572
  * USB: option: add device IDs for Dell 5804 (Novatel E371) WWAN card
- LP: #1186572
  * i2c: designware: always clear interrupts before enabling them
- LP: #1186572
  * USB: ftdi_sio: Add support for Newport CONEX motor drivers
- LP: #1186572
  * btrfs: don't stop searching after encountering the wrong item
- LP: #1186572
  * virtio_console: fix uapi header
- LP: #1186572
  * ARM: plat-orion: Fix num_resources and id for ge10 and ge11
- LP: #1186572
  * USB: cxacru: potential underflow in cxacru_cm_get_array()
- LP: #1186572
  * TTY: Fix tty miss restart after we turn off flow-control
- LP: #1186572
  * sunrpc: clarify comments on rpc_make_runnable
- LP: #1186572
  * SUNRPC: Prevent an rpc_task wakeup race
- LP: #1186572
  * perf: net_dropmonitor: Fix 

[Bug 1172403] Re: CVE-2013-3235

2013-06-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-226.39

---
linux-ti-omap4 (3.5.0-226.39) quantal; urgency=low

  [ Brad Figg ]

  * UBUNTU: Fixup missing abi files causing FTBS

linux-ti-omap4 (3.5.0-226.38) quantal; urgency=low

  * Release Tracking Bug
- LP: #1188492

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.5.0-34.55

  [ Ubuntu: 3.5.0-34.55 ]

  * Release Tracking Bug
- LP: #1187926
  * iwlwifi: dvm: fix zero LQ CMD sending avoidance
- LP: #1186932

linux-ti-omap4 (3.5.0-226.37) quantal-proposed; urgency=low

  * Release Tracking Bug
- LP: #1186475

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.5.0-33.54

  [ Ubuntu: 3.5.0-33.54 ]

  * Release Tracking Bug
- LP: #1186271
  * crypto: algif - suppress sending source address information in recvmsg
- LP: #1172363
- CVE-2013-3076
  * ax25: fix info leak via msg_name in ax25_recvmsg()
- LP: #1172366
- CVE-2013-3223
  * Bluetooth: fix possible info leak in bt_sock_recvmsg()
- LP: #1172368
- CVE-2013-3224
  * tipc: fix info leaks via msg_name in recv_msg/recv_stream
- LP: #1172403
- CVE-2013-3235
  * rose: fix info leak via msg_name in rose_recvmsg()
- LP: #1172394
- CVE-2013-3234
  * Bluetooth: RFCOMM - Fix missing msg_namelen update in
rfcomm_sock_recvmsg()
- LP: #1172369
- CVE-2013-3225
  * atm: update msg_namelen in vcc_recvmsg()
- LP: #1172365
- CVE-2013-3222
  * iwlwifi: add new pci id for 6x35 series
- LP: #1180256
  * ath9k_htc: accept 1.x firmware newer than 1.3
- LP: #1186062
  * ssb: implement spurious tone avoidance
- LP: #1186062
  * can: mcp251x: add missing IRQF_ONESHOT to request_threaded_irq
- LP: #1186062
  * can: sja1000: fix handling on dt properties on little endian systems
- LP: #1186062
  * ath9k_hw: change AR9580 initvals to fix a stability issue
- LP: #1186062
  * ARM: 7696/1: Fix kexec by setting outer_cache.inv_all for Feroceon
- LP: #1186062
  * ARM: 7698/1: perf: fix group validation when using enable_on_exec
- LP: #1186062
  * hugetlbfs: add swap entry check in follow_hugetlb_page()
- LP: #1186062
  * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls
- LP: #1186062
  * hfsplus: fix potential overflow in hfsplus_file_truncate()
- LP: #1186062
  * sched: Convert BUG_ON()s in try_to_wake_up_local() to WARN_ON_ONCE()s
- LP: #1186062
  * perf/x86: Fix offcore_rsp valid mask for SNB/IVB
- LP: #1186062
  * vm: add vm_iomap_memory() helper function
- LP: #1186062
  * vm: convert HPET mmap to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert fb_mmap to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert snd_pcm_lib_mmap_iomem() to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert mtdchar mmap to vm_iomap_memory() helper
- LP: #1186062
  * regulator: fixed regulator_bulk_enable unwinding code
- LP: #1186062
  * perf: Fix error return code
- LP: #1186062
  * xen/smp: Fix leakage of timer interrupt line for every CPU
online/offline.
- LP: #1186062
  * xen/smp/spinlock: Fix leakage of the spinlock interrupt line for every
CPU online/offline
- LP: #1186062
  * xen/time: Fix kasprintf splat when allocating timer%d IRQ line.
- LP: #1186062
  * s390/memory hotplug: prevent offline of active memory increments
- LP: #1186062
  * aio: fix possible invalid memory access when DEBUG is enabled
- LP: #1186062
  * TTY: do not update atime/mtime on read/write
- LP: #1186062
  * TTY: fix atime/mtime regression
- LP: #1186062
  * caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg()
- LP: #1186062
  * irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
- LP: #1186062
  * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()
- LP: #1186062
  * llc: Fix missing msg_namelen update in llc_ui_recvmsg()
- LP: #1186062
  * netrom: fix info leak via msg_name in nr_recvmsg()
- LP: #1186062
  * netrom: fix invalid use of sizeof in nr_recvmsg()
- LP: #1186062
  * NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg()
- LP: #1186062
  * cbq: incorrect processing of high limits
- LP: #1186062
  * net IPv6 : Fix broken IPv6 routing table after loopback down-up
- LP: #1186062
  * net: count hw_addr syncs so that unsync works properly.
- LP: #1186062
  * atl1e: limit gso segment size to prevent generation of wrong ip length
fields
- LP: #1186062
  * bonding: fix bonding_masters race condition in bond unloading
- LP: #1186062
  * bonding: IFF_BONDING is not stripped on enslave failure
- LP: #1186062
  * af_unix: If we don't care about credentials coallesce all messages
- LP: #1186062
  * netfilter: don't reset nf_trace in nf_reset()
- LP: #1186062
  * rtnetlink: Call nlmsg_parse() with correct header length
- LP: #1186062
  * tcp: incoming connections might use wrong route under synflood
- LP: #1186062
  * tcp: Reallocate 

[Bug 1172403] Re: CVE-2013-3235

2013-06-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.5.0-34.55

---
linux (3.5.0-34.55) quantal; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1187926

  [ Upstream Kernel Changes ]

  * iwlwifi: dvm: fix zero LQ CMD sending avoidance
- LP: #1186932

linux (3.5.0-33.54) quantal; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1186271

  [ Upstream Kernel Changes ]

  * crypto: algif - suppress sending source address information in recvmsg
- LP: #1172363
- CVE-2013-3076
  * ax25: fix info leak via msg_name in ax25_recvmsg()
- LP: #1172366
- CVE-2013-3223
  * Bluetooth: fix possible info leak in bt_sock_recvmsg()
- LP: #1172368
- CVE-2013-3224
  * tipc: fix info leaks via msg_name in recv_msg/recv_stream
- LP: #1172403
- CVE-2013-3235
  * rose: fix info leak via msg_name in rose_recvmsg()
- LP: #1172394
- CVE-2013-3234
  * Bluetooth: RFCOMM - Fix missing msg_namelen update in
rfcomm_sock_recvmsg()
- LP: #1172369
- CVE-2013-3225
  * atm: update msg_namelen in vcc_recvmsg()
- LP: #1172365
- CVE-2013-3222
  * iwlwifi: add new pci id for 6x35 series
- LP: #1180256
  * ath9k_htc: accept 1.x firmware newer than 1.3
- LP: #1186062
  * ssb: implement spurious tone avoidance
- LP: #1186062
  * can: mcp251x: add missing IRQF_ONESHOT to request_threaded_irq
- LP: #1186062
  * can: sja1000: fix handling on dt properties on little endian systems
- LP: #1186062
  * ath9k_hw: change AR9580 initvals to fix a stability issue
- LP: #1186062
  * ARM: 7696/1: Fix kexec by setting outer_cache.inv_all for Feroceon
- LP: #1186062
  * ARM: 7698/1: perf: fix group validation when using enable_on_exec
- LP: #1186062
  * hugetlbfs: add swap entry check in follow_hugetlb_page()
- LP: #1186062
  * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls
- LP: #1186062
  * hfsplus: fix potential overflow in hfsplus_file_truncate()
- LP: #1186062
  * sched: Convert BUG_ON()s in try_to_wake_up_local() to WARN_ON_ONCE()s
- LP: #1186062
  * perf/x86: Fix offcore_rsp valid mask for SNB/IVB
- LP: #1186062
  * vm: add vm_iomap_memory() helper function
- LP: #1186062
  * vm: convert HPET mmap to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert fb_mmap to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert snd_pcm_lib_mmap_iomem() to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert mtdchar mmap to vm_iomap_memory() helper
- LP: #1186062
  * regulator: fixed regulator_bulk_enable unwinding code
- LP: #1186062
  * perf: Fix error return code
- LP: #1186062
  * xen/smp: Fix leakage of timer interrupt line for every CPU
online/offline.
- LP: #1186062
  * xen/smp/spinlock: Fix leakage of the spinlock interrupt line for every
CPU online/offline
- LP: #1186062
  * xen/time: Fix kasprintf splat when allocating timer%d IRQ line.
- LP: #1186062
  * s390/memory hotplug: prevent offline of active memory increments
- LP: #1186062
  * aio: fix possible invalid memory access when DEBUG is enabled
- LP: #1186062
  * TTY: do not update atime/mtime on read/write
- LP: #1186062
  * TTY: fix atime/mtime regression
- LP: #1186062
  * caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg()
- LP: #1186062
  * irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
- LP: #1186062
  * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()
- LP: #1186062
  * llc: Fix missing msg_namelen update in llc_ui_recvmsg()
- LP: #1186062
  * netrom: fix info leak via msg_name in nr_recvmsg()
- LP: #1186062
  * netrom: fix invalid use of sizeof in nr_recvmsg()
- LP: #1186062
  * NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg()
- LP: #1186062
  * cbq: incorrect processing of high limits
- LP: #1186062
  * net IPv6 : Fix broken IPv6 routing table after loopback down-up
- LP: #1186062
  * net: count hw_addr syncs so that unsync works properly.
- LP: #1186062
  * atl1e: limit gso segment size to prevent generation of wrong ip length
fields
- LP: #1186062
  * bonding: fix bonding_masters race condition in bond unloading
- LP: #1186062
  * bonding: IFF_BONDING is not stripped on enslave failure
- LP: #1186062
  * af_unix: If we don't care about credentials coallesce all messages
- LP: #1186062
  * netfilter: don't reset nf_trace in nf_reset()
- LP: #1186062
  * rtnetlink: Call nlmsg_parse() with correct header length
- LP: #1186062
  * tcp: incoming connections might use wrong route under synflood
- LP: #1186062
  * tcp: Reallocate headroom if it would overflow csum_start
- LP: #1186062
  * esp4: fix error return code in esp_output()
- LP: #1186062
  * net: sctp: sctp_auth_key_put: use kzfree instead of kfree
- LP: #1186062
  * tcp: call tcp_replace_ts_recent() from tcp_ack()
- LP: #1186062
  * net: rate-limit 

[Bug 1172403] Re: CVE-2013-3235

2013-06-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.5.0-1616.24

---
linux-armadaxp (3.5.0-1616.24) quantal-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1188493
  * Rebase onto Ubuntu-3.5.0-34.55

  [ Ubuntu: 3.5.0-34.55 ]

  * Release Tracking Bug
- LP: #1187926
  * iwlwifi: dvm: fix zero LQ CMD sending avoidance
- LP: #1186932
 -- Ike Panhc ike@canonical.com   Mon, 10 Jun 2013 13:42:34 +0800

** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: Fix Committed = Fix Released

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-06-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-353.66

---
linux-ec2 (2.6.32-353.66) lucid-proposed; urgency=low

  [ Stefan Bader ]

  * Rebased to Ubuntu-2.6.32-48.110
  * Release Tracking Bug
- LP: #1186479

  [ Ubuntu: 2.6.32-48.110 ]

  * (config) Import Xen specific config options from ec2
- LP: #1177431
  * SAUCE: xen: Send spinlock IPI to all waiters
- LP: #1011792, #1177431
  * ax25: fix info leak via msg_name in ax25_recvmsg()
- LP: #1172366
- CVE-2013-3223
  * Bluetooth: fix possible info leak in bt_sock_recvmsg()
- LP: #1172368
- CVE-2013-3224
  * tipc: fix info leaks via msg_name in recv_msg/recv_stream
- LP: #1172403
- CVE-2013-3235
  * rose: fix info leak via msg_name in rose_recvmsg()
- LP: #1172394
- CVE-2013-3234
  * Bluetooth: RFCOMM - Fix missing msg_namelen update in
rfcomm_sock_recvmsg()
- LP: #1172369
- CVE-2013-3225
  * atm: update msg_namelen in vcc_recvmsg()
- LP: #1172365
- CVE-2013-3222
  * KVM: Fix bounds checking in ioapic indirect register reads
(CVE-2013-1798)
- LP: #1158262
- CVE-2013-1798
  * llc: Fix missing msg_namelen update in llc_ui_recvmsg()
- LP: #1172385
- CVE-2013-3231
  * netrom: fix info leak via msg_name in nr_recvmsg()
- LP: #1172386
- CVE-2013-3232
  * irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
- LP: #1172380
- CVE-2013-3228
  * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()
- LP: #1172381
- CVE-2013-3229
 -- Stefan Bader stefan.ba...@canonical.com   Tue, 04 Jun 2013 10:12:05 +0200

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-06-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-226.39

---
linux-ti-omap4 (3.5.0-226.39) quantal; urgency=low

  [ Brad Figg ]

  * UBUNTU: Fixup missing abi files causing FTBS

linux-ti-omap4 (3.5.0-226.38) quantal; urgency=low

  * Release Tracking Bug
- LP: #1188492

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.5.0-34.55

  [ Ubuntu: 3.5.0-34.55 ]

  * Release Tracking Bug
- LP: #1187926
  * iwlwifi: dvm: fix zero LQ CMD sending avoidance
- LP: #1186932

linux-ti-omap4 (3.5.0-226.37) quantal-proposed; urgency=low

  * Release Tracking Bug
- LP: #1186475

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.5.0-33.54

  [ Ubuntu: 3.5.0-33.54 ]

  * Release Tracking Bug
- LP: #1186271
  * crypto: algif - suppress sending source address information in recvmsg
- LP: #1172363
- CVE-2013-3076
  * ax25: fix info leak via msg_name in ax25_recvmsg()
- LP: #1172366
- CVE-2013-3223
  * Bluetooth: fix possible info leak in bt_sock_recvmsg()
- LP: #1172368
- CVE-2013-3224
  * tipc: fix info leaks via msg_name in recv_msg/recv_stream
- LP: #1172403
- CVE-2013-3235
  * rose: fix info leak via msg_name in rose_recvmsg()
- LP: #1172394
- CVE-2013-3234
  * Bluetooth: RFCOMM - Fix missing msg_namelen update in
rfcomm_sock_recvmsg()
- LP: #1172369
- CVE-2013-3225
  * atm: update msg_namelen in vcc_recvmsg()
- LP: #1172365
- CVE-2013-3222
  * iwlwifi: add new pci id for 6x35 series
- LP: #1180256
  * ath9k_htc: accept 1.x firmware newer than 1.3
- LP: #1186062
  * ssb: implement spurious tone avoidance
- LP: #1186062
  * can: mcp251x: add missing IRQF_ONESHOT to request_threaded_irq
- LP: #1186062
  * can: sja1000: fix handling on dt properties on little endian systems
- LP: #1186062
  * ath9k_hw: change AR9580 initvals to fix a stability issue
- LP: #1186062
  * ARM: 7696/1: Fix kexec by setting outer_cache.inv_all for Feroceon
- LP: #1186062
  * ARM: 7698/1: perf: fix group validation when using enable_on_exec
- LP: #1186062
  * hugetlbfs: add swap entry check in follow_hugetlb_page()
- LP: #1186062
  * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls
- LP: #1186062
  * hfsplus: fix potential overflow in hfsplus_file_truncate()
- LP: #1186062
  * sched: Convert BUG_ON()s in try_to_wake_up_local() to WARN_ON_ONCE()s
- LP: #1186062
  * perf/x86: Fix offcore_rsp valid mask for SNB/IVB
- LP: #1186062
  * vm: add vm_iomap_memory() helper function
- LP: #1186062
  * vm: convert HPET mmap to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert fb_mmap to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert snd_pcm_lib_mmap_iomem() to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert mtdchar mmap to vm_iomap_memory() helper
- LP: #1186062
  * regulator: fixed regulator_bulk_enable unwinding code
- LP: #1186062
  * perf: Fix error return code
- LP: #1186062
  * xen/smp: Fix leakage of timer interrupt line for every CPU
online/offline.
- LP: #1186062
  * xen/smp/spinlock: Fix leakage of the spinlock interrupt line for every
CPU online/offline
- LP: #1186062
  * xen/time: Fix kasprintf splat when allocating timer%d IRQ line.
- LP: #1186062
  * s390/memory hotplug: prevent offline of active memory increments
- LP: #1186062
  * aio: fix possible invalid memory access when DEBUG is enabled
- LP: #1186062
  * TTY: do not update atime/mtime on read/write
- LP: #1186062
  * TTY: fix atime/mtime regression
- LP: #1186062
  * caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg()
- LP: #1186062
  * irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
- LP: #1186062
  * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()
- LP: #1186062
  * llc: Fix missing msg_namelen update in llc_ui_recvmsg()
- LP: #1186062
  * netrom: fix info leak via msg_name in nr_recvmsg()
- LP: #1186062
  * netrom: fix invalid use of sizeof in nr_recvmsg()
- LP: #1186062
  * NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg()
- LP: #1186062
  * cbq: incorrect processing of high limits
- LP: #1186062
  * net IPv6 : Fix broken IPv6 routing table after loopback down-up
- LP: #1186062
  * net: count hw_addr syncs so that unsync works properly.
- LP: #1186062
  * atl1e: limit gso segment size to prevent generation of wrong ip length
fields
- LP: #1186062
  * bonding: fix bonding_masters race condition in bond unloading
- LP: #1186062
  * bonding: IFF_BONDING is not stripped on enslave failure
- LP: #1186062
  * af_unix: If we don't care about credentials coallesce all messages
- LP: #1186062
  * netfilter: don't reset nf_trace in nf_reset()
- LP: #1186062
  * rtnetlink: Call nlmsg_parse() with correct header length
- LP: #1186062
  * tcp: incoming connections might use wrong route under synflood
- LP: #1186062
  * tcp: Reallocate 

[Bug 1172403] Re: CVE-2013-3235

2013-06-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-226.39

---
linux-ti-omap4 (3.5.0-226.39) quantal; urgency=low

  [ Brad Figg ]

  * UBUNTU: Fixup missing abi files causing FTBS

linux-ti-omap4 (3.5.0-226.38) quantal; urgency=low

  * Release Tracking Bug
- LP: #1188492

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.5.0-34.55

  [ Ubuntu: 3.5.0-34.55 ]

  * Release Tracking Bug
- LP: #1187926
  * iwlwifi: dvm: fix zero LQ CMD sending avoidance
- LP: #1186932

linux-ti-omap4 (3.5.0-226.37) quantal-proposed; urgency=low

  * Release Tracking Bug
- LP: #1186475

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.5.0-33.54

  [ Ubuntu: 3.5.0-33.54 ]

  * Release Tracking Bug
- LP: #1186271
  * crypto: algif - suppress sending source address information in recvmsg
- LP: #1172363
- CVE-2013-3076
  * ax25: fix info leak via msg_name in ax25_recvmsg()
- LP: #1172366
- CVE-2013-3223
  * Bluetooth: fix possible info leak in bt_sock_recvmsg()
- LP: #1172368
- CVE-2013-3224
  * tipc: fix info leaks via msg_name in recv_msg/recv_stream
- LP: #1172403
- CVE-2013-3235
  * rose: fix info leak via msg_name in rose_recvmsg()
- LP: #1172394
- CVE-2013-3234
  * Bluetooth: RFCOMM - Fix missing msg_namelen update in
rfcomm_sock_recvmsg()
- LP: #1172369
- CVE-2013-3225
  * atm: update msg_namelen in vcc_recvmsg()
- LP: #1172365
- CVE-2013-3222
  * iwlwifi: add new pci id for 6x35 series
- LP: #1180256
  * ath9k_htc: accept 1.x firmware newer than 1.3
- LP: #1186062
  * ssb: implement spurious tone avoidance
- LP: #1186062
  * can: mcp251x: add missing IRQF_ONESHOT to request_threaded_irq
- LP: #1186062
  * can: sja1000: fix handling on dt properties on little endian systems
- LP: #1186062
  * ath9k_hw: change AR9580 initvals to fix a stability issue
- LP: #1186062
  * ARM: 7696/1: Fix kexec by setting outer_cache.inv_all for Feroceon
- LP: #1186062
  * ARM: 7698/1: perf: fix group validation when using enable_on_exec
- LP: #1186062
  * hugetlbfs: add swap entry check in follow_hugetlb_page()
- LP: #1186062
  * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls
- LP: #1186062
  * hfsplus: fix potential overflow in hfsplus_file_truncate()
- LP: #1186062
  * sched: Convert BUG_ON()s in try_to_wake_up_local() to WARN_ON_ONCE()s
- LP: #1186062
  * perf/x86: Fix offcore_rsp valid mask for SNB/IVB
- LP: #1186062
  * vm: add vm_iomap_memory() helper function
- LP: #1186062
  * vm: convert HPET mmap to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert fb_mmap to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert snd_pcm_lib_mmap_iomem() to vm_iomap_memory() helper
- LP: #1186062
  * vm: convert mtdchar mmap to vm_iomap_memory() helper
- LP: #1186062
  * regulator: fixed regulator_bulk_enable unwinding code
- LP: #1186062
  * perf: Fix error return code
- LP: #1186062
  * xen/smp: Fix leakage of timer interrupt line for every CPU
online/offline.
- LP: #1186062
  * xen/smp/spinlock: Fix leakage of the spinlock interrupt line for every
CPU online/offline
- LP: #1186062
  * xen/time: Fix kasprintf splat when allocating timer%d IRQ line.
- LP: #1186062
  * s390/memory hotplug: prevent offline of active memory increments
- LP: #1186062
  * aio: fix possible invalid memory access when DEBUG is enabled
- LP: #1186062
  * TTY: do not update atime/mtime on read/write
- LP: #1186062
  * TTY: fix atime/mtime regression
- LP: #1186062
  * caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg()
- LP: #1186062
  * irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
- LP: #1186062
  * iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()
- LP: #1186062
  * llc: Fix missing msg_namelen update in llc_ui_recvmsg()
- LP: #1186062
  * netrom: fix info leak via msg_name in nr_recvmsg()
- LP: #1186062
  * netrom: fix invalid use of sizeof in nr_recvmsg()
- LP: #1186062
  * NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg()
- LP: #1186062
  * cbq: incorrect processing of high limits
- LP: #1186062
  * net IPv6 : Fix broken IPv6 routing table after loopback down-up
- LP: #1186062
  * net: count hw_addr syncs so that unsync works properly.
- LP: #1186062
  * atl1e: limit gso segment size to prevent generation of wrong ip length
fields
- LP: #1186062
  * bonding: fix bonding_masters race condition in bond unloading
- LP: #1186062
  * bonding: IFF_BONDING is not stripped on enslave failure
- LP: #1186062
  * af_unix: If we don't care about credentials coallesce all messages
- LP: #1186062
  * netfilter: don't reset nf_trace in nf_reset()
- LP: #1186062
  * rtnetlink: Call nlmsg_parse() with correct header length
- LP: #1186062
  * tcp: incoming connections might use wrong route under synflood
- LP: #1186062
  * tcp: Reallocate 

[Bug 1172403] Re: CVE-2013-3235

2013-06-04 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-06-03 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-quantal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-05-31 Thread John Johansen
** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-05-28 Thread John Johansen
** Changed in: linux (Ubuntu Raring)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-05-23 Thread John Johansen
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-05-22 Thread Jamie Strandboge
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-05-22 Thread Jamie Strandboge
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Saucy)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-05-10 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Hardy)

** No longer affects: linux-armadaxp (Ubuntu Oneiric)

** No longer affects: linux-ec2 (Ubuntu Hardy)

** No longer affects: linux-ec2 (Ubuntu Oneiric)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Oneiric)

** No longer affects: linux-lts-backport-natty (Ubuntu Hardy)

** No longer affects: linux-lts-backport-natty (Ubuntu Oneiric)

** No longer affects: linux-lts-quantal (Ubuntu Hardy)

** No longer affects: linux-lts-quantal (Ubuntu Oneiric)

** No longer affects: linux-mvl-dove (Ubuntu Hardy)

** No longer affects: linux-mvl-dove (Ubuntu Oneiric)

** No longer affects: linux-lts-backport-maverick (Ubuntu Hardy)

** No longer affects: linux-lts-backport-maverick (Ubuntu Oneiric)

** No longer affects: linux (Ubuntu Hardy)

** No longer affects: linux (Ubuntu Oneiric)

** No longer affects: linux-fsl-imx51 (Ubuntu Hardy)

** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric)

** No longer affects: linux-ti-omap4 (Ubuntu Hardy)

** No longer affects: linux-ti-omap4 (Ubuntu Oneiric)

** No longer affects: linux-lts-raring (Ubuntu Hardy)

** No longer affects: linux-lts-raring (Ubuntu Oneiric)

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: New = Fix Committed

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Precise)
   Status: In Progress = Fix Committed

** Changed in: linux (Ubuntu Lucid)
   Status: In Progress = Fix Committed

** Changed in: linux (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux (Ubuntu Quantal)
   Status: In Progress = Fix Committed

** Changed in: linux (Ubuntu Raring)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Saucy)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Raring)
   Status: New = Fix Committed

** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-lts-raring (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-raring (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-raring (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Saucy)
   Importance: Undecided = Low

** Changed in: linux-lts-raring (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Quantal)
   Importance: Undecided = Low

** Changed in: linux-lts-raring (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Raring)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-05-09 Thread Luis Henriques
** Changed in: linux (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux (Ubuntu Lucid)
 Assignee: (unassigned) = Luis Henriques (henrix)

** Changed in: linux (Ubuntu Precise)
   Status: New = In Progress

** Changed in: linux (Ubuntu Precise)
 Assignee: (unassigned) = Luis Henriques (henrix)

** Changed in: linux (Ubuntu Quantal)
   Status: New = In Progress

** Changed in: linux (Ubuntu Quantal)
 Assignee: (unassigned) = Luis Henriques (henrix)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-04-30 Thread John Johansen
** Also affects: linux (Ubuntu Saucy)
   Importance: Low
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Saucy)
   Importance: Low
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Saucy)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1172403

Title:
  CVE-2013-3235

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1172403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1172403] Re: CVE-2013-3235

2013-04-24 Thread John Johansen
CVE-2013-3235

** Also affects: linux (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Changed in: linux-armadaxp (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Status: New =