[Bug 1185990] Re: CVE-2013-2850
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => High ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => High ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Also affects: linux (Ubuntu Xenial) Importance: High Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial) Importance: Undecided Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-mako (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-manta (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => High ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-lts-wily (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-raspi2 (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) ** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => High ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => High ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => High ** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => High ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => High ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-quantal (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-raring (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-quantal (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-raring (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-quantal (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-raring (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Wily) Importance: High Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Wily) Importance: Undecided Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: Undecided Status: New ** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-lts-trusty (Ubuntu Quantal) ** No longer affects: linux-lts-trusty (Ubuntu Raring) ** No longer affects: linux-lts-trusty (Ubuntu Saucy) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Quantal) ** No longer affects: linux-armadaxp (Ubuntu Raring) ** No longer affects: linux-armadaxp (Ubuntu Saucy) ** No longer
[Bug 1185990] Re: CVE-2013-2850
http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-2850.html says that this was fixed in precise for linux-ti-omap4. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Changed in: linux (Ubuntu) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Changed in: linux-ti-omap4 (Ubuntu) Status: Fix Committed = Invalid ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
saucy has seen the end of its life and is no longer receiving any updates. Marking the saucy task for this ticket as Won't Fix. ** Changed in: linux-ti-omap4 (Ubuntu Saucy) Status: Fix Committed = Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Description changed: Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet. A reproduction case requires patching open-iscsi to send overly large keys. Performing discovery in a loop will Oops the remote server. Attached is a proposed fix, and the patch I used in open-iscsi to trigger it. Thanks in advance for your cooperation in coordinating a fix for this issue, - Break-Fix: e48354ce078c079996f89d715dfa44814b4eba01 local-2013-2850 + Break-Fix: e48354ce078c079996f89d715dfa44814b4eba01 + cea4dcfdad926a27a18e188720efe0f2c9403456 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: Fix Committed = Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Changed in: linux-ti-omap4 (Ubuntu Raring) Status: Fix Committed = Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Saucy) Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Description changed: - The flaw is an unauthenticated remote heap buffer overflow in the Linux - iSCSI target subsystem. If there is a target configured and listening on - the network, a remote attacker can corrupt heap memory, and almost - certainly gain kernel execution control. I only got as far as proving it - would Oops the server. A reproduction case requires patching open-iscsi - to send overly large keys. Performing discovery in a loop will Oops the - remote server. Attached is a proposed fix, and the patch I used in open- - iscsi to trigger it. Thanks in advance for your cooperation in - coordinating a fix for this issue, + Heap-based buffer overflow in the iscsi_add_notunderstood_response + function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI + target subsystem in the Linux kernel through 3.9.4 allows remote + attackers to cause a denial of service (memory corruption and OOPS) or + possibly execute arbitrary code via a long key that is not properly + handled during construction of an error-response packet. A reproduction + case requires patching open-iscsi to send overly large keys. Performing + discovery in a loop will Oops the remote server. Attached is a proposed + fix, and the patch I used in open-iscsi to trigger it. Thanks in advance + for your cooperation in coordinating a fix for this issue, Break-Fix: e48354ce078c079996f89d715dfa44814b4eba01 local-2013-2850 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New = Fix Released ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Saucy) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Raring) Status: New = Fix Committed ** Changed in: linux-lts-raring (Ubuntu Precise) Status: Fix Committed = Fix Released ** Description changed: The flaw is an unauthenticated remote heap buffer overflow in the Linux iSCSI target subsystem. If there is a target configured and listening on the network, a remote attacker can corrupt heap memory, and almost certainly gain kernel execution control. I only got as far as proving it would Oops the server. A reproduction case requires patching open-iscsi to send overly large keys. Performing discovery in a loop will Oops the remote server. Attached is a proposed fix, and the patch I used in open- iscsi to trigger it. Thanks in advance for your cooperation in coordinating a fix for this issue, + + Break-Fix: e48354ce078c079996f89d715dfa44814b4eba01 local-2013-2850 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Changed in: linux (Ubuntu Saucy) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Quantal) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Raring) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1185990] Re: CVE-2013-2850
CVE-2013-2850 ** Also affects: linux (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-quantal (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Raring) Status: New = Invalid ** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu