[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Yakkety) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Yakkety) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Also affects: linux (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Yakkety) Importance: Undecided Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-manta (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-flo (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-lts-trusty (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Medium Status: Fix Committed ** Also affects: linux-lts-xenial (Ubuntu Yakkety) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Also affects: linux (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Undecided Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Xenial) Importance: Medium Status: New ** Also affects: linux-manta (Ubuntu Xenial) Importance: Medium Status: New ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Medium Status: New ** Also affects: linux-flo (Ubuntu Xenial) Importance: Medium Status: New ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Also affects: linux (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Undecided Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Wily) Importance: Medium Status: New ** Also affects: linux-manta (Ubuntu Wily) Importance: Medium Status: New ** Also affects: linux-goldfish (Ubuntu Wily) Importance: Medium Status: New ** Also affects: linux-flo (Ubuntu Wily) Importance: Medium Status: New ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Wily) Importance: Medium Status: Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-vivid (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Importance: Undecided = Medium ** Changed in: linux-lts-vivid (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quantal (Ubuntu Lucid) ** No longer affects: linux-mvl-dove (Ubuntu Lucid) ** No longer affects: linux-ti-omap4 (Ubuntu Lucid) ** No longer affects: linux (Ubuntu Lucid) ** No longer affects: linux-mako (Ubuntu Lucid) ** No longer affects: linux-fsl-imx51 (Ubuntu Lucid) ** No longer affects: linux-lts-utopic (Ubuntu Lucid) ** No longer affects: linux-flo (Ubuntu Lucid) ** No longer affects: linux-lts-raring (Ubuntu Lucid) ** No longer affects: linux-manta (Ubuntu Lucid) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux (Ubuntu Utopic) Status: Fix Committed = Invalid ** Changed in: linux (Ubuntu Vivid) Status: Fix Committed = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Vivid) Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux-flo (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-flo (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-flo (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-flo (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-flo (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-goldfish (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-goldfish (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-goldfish (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-goldfish (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-goldfish (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-mako (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-mako (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-mako (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-mako (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-mako (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-manta (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-manta (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-manta (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-manta (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-manta (Ubuntu Utopic) Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Released ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-lts-utopic (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-lts-utopic (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-lts-utopic (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Utopic) Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Also affects: linux (Ubuntu Vivid) Importance: Medium Status: Fix Committed ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Vivid) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** No longer affects: linux-armadaxp (Ubuntu Saucy) ** No longer affects: linux-ec2 (Ubuntu Saucy) ** No longer affects: linux-lts-saucy (Ubuntu Saucy) ** No longer affects: linux-lts-quantal (Ubuntu Saucy) ** No longer affects: linux-mvl-dove (Ubuntu Saucy) ** No longer affects: linux (Ubuntu Saucy) ** No longer affects: linux-fsl-imx51 (Ubuntu Saucy) ** No longer affects: linux-ti-omap4 (Ubuntu Saucy) ** No longer affects: linux-lts-raring (Ubuntu Saucy) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Quantal) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Quantal) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Saucy) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Saucy) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Trusty) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Trusty) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New = Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
This bug was fixed in the package linux-ti-omap4 - 3.5.0-242.58 --- linux-ti-omap4 (3.5.0-242.58) quantal; urgency=low * Release Tracking Bug - LP: #1317330 [ Paolo Pisati ] * rebased on Ubuntu-3.5.0-51.75 [ Ubuntu: 3.5.0-51.75 ] * Merged back Ubuntu-3.5.0-49.74 security release * Revert n_tty: Fix n_tty_write crash when echoing in raw mode - LP: #1314762 * Release Tracking Bug - LP: #1317227 * ipv6: don't set DST_NOCOUNT for remotely added routes - LP: #1293726 - CVE-2014-2309 * vhost: fix total length when packets are too short - LP: #1312984 - CVE-2014-0077 * n_tty: Fix n_tty_write crash when echoing in raw mode - LP: #1314762 - CVE-2014-0196 * floppy: ignore kernel-only members in FDRAWCMD ioctl input - LP: #1316729 - CVE-2014-1737 * floppy: don't write kernel-only members to FDRAWCMD ioctl output - LP: #1316735 - CVE-2014-1738 [ Ubuntu: 3.5.0-50.74 ] * Release Tracking Bug - LP: #1313852 * rds: prevent dereference of a NULL device in rds_iw_laddr_check - LP: #130 - CVE-2014-2678 * vhost: validate vhost_get_vq_desc return value - LP: #1298117 - CVE-2014-0055 * netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages - LP: #1295090 - CVE-2014-2523 * ALSA: oxygen: Xonar DG(X): capture from I2S channel 1, not 2 - LP: #1310783 * ALSA: oxygen: Xonar DG(X): modify DAC routing - LP: #1310783 * mac80211: fix AP powersave TX vs. wakeup race - LP: #1310783 * iwlwifi: dvm: clear IWL_STA_UCODE_INPROGRESS when assoc fails - LP: #1310783 * ath9k: protect tid-sched check - LP: #1310783 * ath9k: Fix ETSI compliance for AR9462 2.0 - LP: #1310783 * genirq: Remove racy waitqueue_active check - LP: #1310783 * sched: Fix double normalization of vruntime - LP: #1310783 * cpuset: fix a race condition in __cpuset_node_allowed_softwall() - LP: #1310783 * firewire: net: fix use after free - LP: #1310783 * mwifiex: do not advertise usb autosuspend support - LP: #1310783 * NFS: Fix a delegation callback race - LP: #1310783 * can: flexcan: fix shutdown: first disable chip, then all interrupts - LP: #1310783 * can: flexcan: flexcan_open(): fix error path if flexcan_chip_start() fails - LP: #1310783 * tracing: Do not add event files for modules that fail tracepoints - LP: #1310783 * ocfs2: fix quota file corruption - LP: #1310783 * rapidio/tsi721: fix tasklet termination in dma channel release - LP: #1310783 * ALSA: usb-audio: Add quirk for Logitech Webcam C500 - LP: #1310783 * drm/radeon: TTM must be init with cpu-visible VRAM, v2 - LP: #1310783 * drm/radeon/atom: select the proper number of lanes in transmitter setup - LP: #1310783 * powerpc: Align p_dyn, p_rela and p_st symbols - LP: #1310783 * libata: add ATA_HORKAGE_BROKEN_FPDMA_AA quirk for Seagate Momentus SpinPoint M8 (2BA30001) - LP: #1310783 * usb: Add device quirk for Logitech HD Pro Webcams C920 and C930e - LP: #1310783 * usb: Make DELAY_INIT quirk wait 100ms between Get Configuration requests - LP: #1310783 * ARM: 7991/1: sa1100: fix compile problem on Collie - LP: #1310783 * firewire: don't use PREPARE_DELAYED_WORK - LP: #1310783 * x86: Ignore NMIs that come in during early boot - LP: #1310783 * x86: fix compile error due to X86_TRAP_NMI use in asm files - LP: #1310783 * virtio-net: alloc big buffers also when guest can receive UFO - LP: #1310783 * tg3: Don't check undefined error bits in RXBD - LP: #1310783 * net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable - LP: #1310783 * usb: dwc3: add support for Merrifield - LP: #1310783 * mac80211: clear sequence/fragment number in QoS-null frames - LP: #1310783 * mwifiex: copy AP's HT capability info correctly - LP: #1310783 * net: unix socket code abuses csum_partial - LP: #1310783 * ibmveth: Fix endian issues with MAC addresses - LP: #1310783 * [SCSI] isci: fix reset timeout handling - LP: #1310783 * [SCSI] isci: correct erroneous for_each_isci_host macro - LP: #1310783 * [SCSI] qla2xxx: Poll during initialization for ISP25xx and ISP83xx - LP: #1310783 * ocfs2 syncs the wrong range... - LP: #1310783 * fs/proc/base.c: fix GPF in /proc/$PID/map_files - LP: #1310783 * vmxnet3: fix netpoll race condition - LP: #1310783 * [SCSI] storvsc: NULL pointer dereference fix - LP: #1310783 * PCI: Enable INTx in pci_reenable_device() only when MSI/MSI-X not enabled - LP: #1310783 * KVM: SVM: fix cr8 intercept window - LP: #1310783 * drm/ttm: don't oops if no invalidate_caches() - LP: #1310783 * vmxnet3: fix building without CONFIG_PCI_MSI - LP: #1310783 * x86/amd/numa: Fix northbridge quirk to assign correct NUMA node - LP: #1310783 * Btrfs: fix data corruption when
[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux-lts-saucy (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Saucy) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed = Fix Released ** Changed in: linux-lts-raring (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1446.65 --- linux-ti-omap4 (3.2.0-1446.65) precise; urgency=low * Release Tracking Bug - LP: #1317327 [ Paolo Pisati ] * rebased on Ubuntu-3.2.0-63.94 [ Ubuntu: 3.2.0-63.94 ] * Merged back Ubuntu-3.2.0-61.93 security release * Revert n_tty: Fix n_tty_write crash when echoing in raw mode - LP: #1314762 * Release Tracking Bug - LP: #1316703 * SAUCE: net/ipv4: Always flush route cache on unregister batch call - LP: #1021471 * ipv6: don't set DST_NOCOUNT for remotely added routes - LP: #1293726 - CVE-2014-2309 * vhost: fix total length when packets are too short - LP: #1312984 - CVE-2014-0077 * n_tty: Fix n_tty_write crash when echoing in raw mode - LP: #1314762 - CVE-2014-0196 * floppy: ignore kernel-only members in FDRAWCMD ioctl input - LP: #1316729 - CVE-2014-1737 * floppy: don't write kernel-only members to FDRAWCMD ioctl output - LP: #1316735 - CVE-2014-1738 [ Ubuntu: 3.2.0-62.93 ] * Release Tracking Bug - LP: #1313807 * [Config] updateconfigs after Linux v3.2.57 update * rds: prevent dereference of a NULL device in rds_iw_laddr_check - LP: #130 - CVE-2014-2678 * rtlwifi: Set the link state - LP: #1310763 * rtlwifi: rtl8192cu: Fix some code in RF handling - LP: #1310763 * NFSv4: OPEN must handle the NFS4ERR_IO return code correctly - LP: #1310763 * selinux: process labeled IPsec TCP SYN-ACK packets properly in selinux_ip_postroute() - LP: #1310763 * parport: parport_pc: remove double PCI ID for NetMos - LP: #1310763 * staging: vt6656: [BUG] BBvUpdatePreEDThreshold Always set sensitivity on bScanning - LP: #1310763 * bfa: Chinook quad port 16G FC HBA claim issue - LP: #1310763 * usb: option: add new zte 3g modem pids to option driver - LP: #1310763 * dib8000: make 32 bits read atomic - LP: #1310763 * serial: add support for 400 and 800 v3 series Titan cards - LP: #1310763 * serial: add support for 200 v3 series Titan card - LP: #1310763 * x86/efi: Fix off-by-one bug in EFI Boot Services reservation - LP: #1310763 * rtc-cmos: Add an alarm disable quirk - LP: #1310763 * slub: Fix calculation of cpu slabs - LP: #1310763 * mtd: mxc_nand: remove duplicated ecc_stats counting - LP: #1310763 * USB: pl2303: fix data corruption on termios updates - LP: #1310763 * USB: serial: add support for iBall 3.5G connect usb modem - LP: #1310763 * USB: Nokia 502 is an unusual device - LP: #1310763 * USB: cypress_m8: fix ring-indicator detection and reporting - LP: #1310763 * ALSA: rme9652: fix a missing comma in channel_map_9636_ds[] - LP: #1310763 * sunrpc: Fix infinite loop in RPC state machine - LP: #1310763 * SELinux: Fix memory leak upon loading policy - LP: #1310763 * drm/radeon: warn users when hw_i2c is enabled (v2) - LP: #1310763 * USB: ftdi_sio: added CS5 quirk for broken smartcard readers - LP: #1310763 * serial: 8250: enable UART_BUG_NOMSR for Tegra - LP: #1310763 * dm: wait until embedded kobject is released before destroying a device - LP: #1310763 * dm space map common: make sure new space is used during extend - LP: #1310763 * ASoC: adau1701: Fix ADAU1701_SEROCTL_WORD_LEN_16 constant - LP: #1310763 * radeon/pm: Guard access to rdev-pm.power_state array - LP: #1310763 * staging: r8712u: Set device type to wlan - LP: #1310763 * ALSA: Enable CONFIG_ZONE_DMA for smaller PCI DMA masks - LP: #1310763 * staging:iio:ad799x fix error_free_irq which was freeing an irq that may not have been requested - LP: #1310763 * mmc: atmel-mci: fix timeout errors in SDIO mode when using DMA - LP: #1310763 * ftrace: Use schedule_on_each_cpu() as a heavy synchronize_sched() - LP: #1310763 * ftrace: Fix synchronization location disabling and freeing ftrace_ops - LP: #1310763 * rtlwifi: rtl8192cu: Add new device ID - LP: #1310763 * nfs4.1: properly handle ENOTSUP in SECINFO_NO_NAME - LP: #1310763 * usb: ehci: add freescale imx28 special write register method - LP: #1310763 * dm sysfs: fix a module unload race - LP: #1310763 * KVM: x86: limit PIT timer frequency - LP: #1310763 * md/raid5: fix long-standing problem with bitmap handling on write failure. - LP: #1310763 * x86: Add check for number of available vectors before CPU down - LP: #1310763 * libata: disable LPM for some WD SATA-I devices - LP: #1310763 * mmc: sdhci: fix lockdep error in tuning routine - LP: #1310763 * turbostat: Use GCC's CPUID functions to support PIC - LP: #1310763 * drm/radeon: disable ss on DP for DCE3.x - LP: #1310763 * drm/radeon: set the full cache bit for fences on r7xx+ - LP: #1310763 * hp_accel: Add a new PnP ID HPQ6007 for new HP laptops - LP: #1310763 * intel-iommu: fix
[Bug 1312984] Re: CVE-2014-0077
This bug was fixed in the package linux-armadaxp - 3.2.0-1633.47 --- linux-armadaxp (3.2.0-1633.47) precise-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1320044 * Rebase to Ubuntu-3.2.0-63.95 [ Ubuntu: 3.2.0-63.95 ] * Revert rtlwifi: Set the link state - LP: #1319735 * Release Tracking Bug - re-used previous tracking bug -- Ike Panhc ike@canonical.com Fri, 16 May 2014 11:46:55 +0800 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
This bug was fixed in the package linux - 3.2.0-63.95 --- linux (3.2.0-63.95) precise; urgency=low [ Kamal Mostafa ] * Revert rtlwifi: Set the link state - LP: #1319735 * Release Tracking Bug - re-used previous tracking bug linux (3.2.0-63.94) precise; urgency=low [ Kamal Mostafa ] * Merged back Ubuntu-3.2.0-61.93 security release * Revert n_tty: Fix n_tty_write crash when echoing in raw mode - LP: #1314762 * Release Tracking Bug - LP: #1316703 [ Stefan Bader ] * SAUCE: net/ipv4: Always flush route cache on unregister batch call - LP: #1021471 [ Upstream Kernel Changes ] * ipv6: don't set DST_NOCOUNT for remotely added routes - LP: #1293726 - CVE-2014-2309 * vhost: fix total length when packets are too short - LP: #1312984 - CVE-2014-0077 * n_tty: Fix n_tty_write crash when echoing in raw mode - LP: #1314762 - CVE-2014-0196 * floppy: ignore kernel-only members in FDRAWCMD ioctl input - LP: #1316729 - CVE-2014-1737 * floppy: don't write kernel-only members to FDRAWCMD ioctl output - LP: #1316735 - CVE-2014-1738 linux (3.2.0-62.93) precise; urgency=low [ Joseph Salisbury ] * Release Tracking Bug - LP: #1313807 [ Joseph Salisbury ] * [Config] updateconfigs after Linux v3.2.57 update [ Upstream Kernel Changes ] * rds: prevent dereference of a NULL device in rds_iw_laddr_check - LP: #130 - CVE-2014-2678 * rtlwifi: Set the link state - LP: #1310763 * rtlwifi: rtl8192cu: Fix some code in RF handling - LP: #1310763 * NFSv4: OPEN must handle the NFS4ERR_IO return code correctly - LP: #1310763 * selinux: process labeled IPsec TCP SYN-ACK packets properly in selinux_ip_postroute() - LP: #1310763 * parport: parport_pc: remove double PCI ID for NetMos - LP: #1310763 * staging: vt6656: [BUG] BBvUpdatePreEDThreshold Always set sensitivity on bScanning - LP: #1310763 * bfa: Chinook quad port 16G FC HBA claim issue - LP: #1310763 * usb: option: add new zte 3g modem pids to option driver - LP: #1310763 * dib8000: make 32 bits read atomic - LP: #1310763 * serial: add support for 400 and 800 v3 series Titan cards - LP: #1310763 * serial: add support for 200 v3 series Titan card - LP: #1310763 * x86/efi: Fix off-by-one bug in EFI Boot Services reservation - LP: #1310763 * rtc-cmos: Add an alarm disable quirk - LP: #1310763 * slub: Fix calculation of cpu slabs - LP: #1310763 * mtd: mxc_nand: remove duplicated ecc_stats counting - LP: #1310763 * USB: pl2303: fix data corruption on termios updates - LP: #1310763 * USB: serial: add support for iBall 3.5G connect usb modem - LP: #1310763 * USB: Nokia 502 is an unusual device - LP: #1310763 * USB: cypress_m8: fix ring-indicator detection and reporting - LP: #1310763 * ALSA: rme9652: fix a missing comma in channel_map_9636_ds[] - LP: #1310763 * sunrpc: Fix infinite loop in RPC state machine - LP: #1310763 * SELinux: Fix memory leak upon loading policy - LP: #1310763 * drm/radeon: warn users when hw_i2c is enabled (v2) - LP: #1310763 * USB: ftdi_sio: added CS5 quirk for broken smartcard readers - LP: #1310763 * serial: 8250: enable UART_BUG_NOMSR for Tegra - LP: #1310763 * dm: wait until embedded kobject is released before destroying a device - LP: #1310763 * dm space map common: make sure new space is used during extend - LP: #1310763 * ASoC: adau1701: Fix ADAU1701_SEROCTL_WORD_LEN_16 constant - LP: #1310763 * radeon/pm: Guard access to rdev-pm.power_state array - LP: #1310763 * staging: r8712u: Set device type to wlan - LP: #1310763 * ALSA: Enable CONFIG_ZONE_DMA for smaller PCI DMA masks - LP: #1310763 * staging:iio:ad799x fix error_free_irq which was freeing an irq that may not have been requested - LP: #1310763 * mmc: atmel-mci: fix timeout errors in SDIO mode when using DMA - LP: #1310763 * ftrace: Use schedule_on_each_cpu() as a heavy synchronize_sched() - LP: #1310763 * ftrace: Fix synchronization location disabling and freeing ftrace_ops - LP: #1310763 * rtlwifi: rtl8192cu: Add new device ID - LP: #1310763 * nfs4.1: properly handle ENOTSUP in SECINFO_NO_NAME - LP: #1310763 * usb: ehci: add freescale imx28 special write register method - LP: #1310763 * dm sysfs: fix a module unload race - LP: #1310763 * KVM: x86: limit PIT timer frequency - LP: #1310763 * md/raid5: fix long-standing problem with bitmap handling on write failure. - LP: #1310763 * x86: Add check for number of available vectors before CPU down - LP: #1310763 * libata: disable LPM for some WD SATA-I devices - LP: #1310763 * mmc: sdhci: fix lockdep error in tuning routine - LP: #1310763 * turbostat: Use GCC's CPUID functions to support PIC - LP: #1310763 * drm/radeon: disable ss on DP
[Bug 1312984] Re: CVE-2014-0077
This bug was fixed in the package linux-lts-quantal - 3.5.0-51.76~precise1 --- linux-lts-quantal (3.5.0-51.76~precise1) precise; urgency=low [ Brad Figg ] * Revert rtlwifi: Set the link state [ Kamal Mostafa ] * Release Tracking Bug - re-used previous tracking bug linux (3.5.0-51.75) quantal; urgency=low [ Kamal Mostafa ] * Merged back Ubuntu-3.5.0-49.74 security release * Revert n_tty: Fix n_tty_write crash when echoing in raw mode - LP: #1314762 * Release Tracking Bug - LP: #1317333 [ Upstream Kernel Changes ] * ipv6: don't set DST_NOCOUNT for remotely added routes - LP: #1293726 - CVE-2014-2309 * vhost: fix total length when packets are too short - LP: #1312984 - CVE-2014-0077 * n_tty: Fix n_tty_write crash when echoing in raw mode - LP: #1314762 - CVE-2014-0196 * floppy: ignore kernel-only members in FDRAWCMD ioctl input - LP: #1316729 - CVE-2014-1737 * floppy: don't write kernel-only members to FDRAWCMD ioctl output - LP: #1316735 - CVE-2014-1738 linux (3.5.0-50.74) quantal; urgency=low [ Joseph Salisbury ] * Release Tracking Bug - LP: #1313852 [ Upstream Kernel Changes ] * rds: prevent dereference of a NULL device in rds_iw_laddr_check - LP: #130 - CVE-2014-2678 * vhost: validate vhost_get_vq_desc return value - LP: #1298117 - CVE-2014-0055 * netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages - LP: #1295090 - CVE-2014-2523 * ALSA: oxygen: Xonar DG(X): capture from I2S channel 1, not 2 - LP: #1310783 * ALSA: oxygen: Xonar DG(X): modify DAC routing - LP: #1310783 * mac80211: fix AP powersave TX vs. wakeup race - LP: #1310783 * iwlwifi: dvm: clear IWL_STA_UCODE_INPROGRESS when assoc fails - LP: #1310783 * ath9k: protect tid-sched check - LP: #1310783 * ath9k: Fix ETSI compliance for AR9462 2.0 - LP: #1310783 * genirq: Remove racy waitqueue_active check - LP: #1310783 * sched: Fix double normalization of vruntime - LP: #1310783 * cpuset: fix a race condition in __cpuset_node_allowed_softwall() - LP: #1310783 * firewire: net: fix use after free - LP: #1310783 * mwifiex: do not advertise usb autosuspend support - LP: #1310783 * NFS: Fix a delegation callback race - LP: #1310783 * can: flexcan: fix shutdown: first disable chip, then all interrupts - LP: #1310783 * can: flexcan: flexcan_open(): fix error path if flexcan_chip_start() fails - LP: #1310783 * tracing: Do not add event files for modules that fail tracepoints - LP: #1310783 * ocfs2: fix quota file corruption - LP: #1310783 * rapidio/tsi721: fix tasklet termination in dma channel release - LP: #1310783 * ALSA: usb-audio: Add quirk for Logitech Webcam C500 - LP: #1310783 * drm/radeon: TTM must be init with cpu-visible VRAM, v2 - LP: #1310783 * drm/radeon/atom: select the proper number of lanes in transmitter setup - LP: #1310783 * powerpc: Align p_dyn, p_rela and p_st symbols - LP: #1310783 * libata: add ATA_HORKAGE_BROKEN_FPDMA_AA quirk for Seagate Momentus SpinPoint M8 (2BA30001) - LP: #1310783 * usb: Add device quirk for Logitech HD Pro Webcams C920 and C930e - LP: #1310783 * usb: Make DELAY_INIT quirk wait 100ms between Get Configuration requests - LP: #1310783 * ARM: 7991/1: sa1100: fix compile problem on Collie - LP: #1310783 * firewire: don't use PREPARE_DELAYED_WORK - LP: #1310783 * x86: Ignore NMIs that come in during early boot - LP: #1310783 * x86: fix compile error due to X86_TRAP_NMI use in asm files - LP: #1310783 * virtio-net: alloc big buffers also when guest can receive UFO - LP: #1310783 * tg3: Don't check undefined error bits in RXBD - LP: #1310783 * net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable - LP: #1310783 * usb: dwc3: add support for Merrifield - LP: #1310783 * mac80211: clear sequence/fragment number in QoS-null frames - LP: #1310783 * mwifiex: copy AP's HT capability info correctly - LP: #1310783 * net: unix socket code abuses csum_partial - LP: #1310783 * ibmveth: Fix endian issues with MAC addresses - LP: #1310783 * [SCSI] isci: fix reset timeout handling - LP: #1310783 * [SCSI] isci: correct erroneous for_each_isci_host macro - LP: #1310783 * [SCSI] qla2xxx: Poll during initialization for ISP25xx and ISP83xx - LP: #1310783 * ocfs2 syncs the wrong range... - LP: #1310783 * fs/proc/base.c: fix GPF in /proc/$PID/map_files - LP: #1310783 * vmxnet3: fix netpoll race condition - LP: #1310783 * [SCSI] storvsc: NULL pointer dereference fix - LP: #1310783 * PCI: Enable INTx in pci_reenable_device() only when MSI/MSI-X not enabled - LP: #1310783 * KVM: SVM: fix cr8 intercept window - LP: #1310783 * drm/ttm: don't oops if no invalidate_caches() - LP: #1310783
[Bug 1312984] Re: CVE-2014-0077
** No longer affects: linux-armadaxp (Ubuntu Quantal) ** No longer affects: linux-ec2 (Ubuntu Quantal) ** No longer affects: linux-lts-saucy (Ubuntu Quantal) ** No longer affects: linux-lts-quantal (Ubuntu Quantal) ** No longer affects: linux-mvl-dove (Ubuntu Quantal) ** No longer affects: linux (Ubuntu Quantal) ** No longer affects: linux-fsl-imx51 (Ubuntu Quantal) ** No longer affects: linux-ti-omap4 (Ubuntu Quantal) ** No longer affects: linux-lts-raring (Ubuntu Quantal) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New = Fix Committed ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux (Ubuntu Quantal) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Saucy) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: New = Fix Committed ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Fix Committed ** Description changed: drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. + + Break-Fix: 8dd014adfea6f173c1ef6378f7e5e7924866c923 + d8316f3991d207fe32881a9ac20241be8fa2bad0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Saucy) Status: New = Fix Committed ** Changed in: linux (Ubuntu Utopic) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1312984 Title: CVE-2014-0077 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1312984] Re: CVE-2014-0077
CVE-2014-0077 ** Also affects: linux (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Changed in: linux-armadaxp (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu