[Bug 1312984] Re: CVE-2014-0077

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2016-04-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Yakkety)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mako (Ubuntu Yakkety)
   Importance: Medium
   Status: New

** Also affects: linux-manta (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Yakkety)
   Importance: Medium
   Status: New

** Also affects: linux-flo (Ubuntu Yakkety)
   Importance: Medium
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

** Also affects: linux-raspi2 (Ubuntu Yakkety)
   Importance: Medium
   Status: Fix Committed

** Also affects: linux-lts-xenial (Ubuntu Yakkety)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2016-04-18 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2015-10-28 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Medium
   Status: New

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Medium
   Status: New

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Medium
   Status: New

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Medium
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mako (Ubuntu Wily)
   Importance: Medium
   Status: New

** Also affects: linux-manta (Ubuntu Wily)
   Importance: Medium
   Status: New

** Also affects: linux-goldfish (Ubuntu Wily)
   Importance: Medium
   Status: New

** Also affects: linux-flo (Ubuntu Wily)
   Importance: Medium
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Importance: Undecided = Medium

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New = Fix Committed

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-ec2 (Ubuntu Lucid)

** No longer affects: linux-goldfish (Ubuntu Lucid)

** No longer affects: linux-lts-saucy (Ubuntu Lucid)

** No longer affects: linux-lts-quantal (Ubuntu Lucid)

** No longer affects: linux-mvl-dove (Ubuntu Lucid)

** No longer affects: linux-ti-omap4 (Ubuntu Lucid)

** No longer affects: linux (Ubuntu Lucid)

** No longer affects: linux-mako (Ubuntu Lucid)

** No longer affects: linux-fsl-imx51 (Ubuntu Lucid)

** No longer affects: linux-lts-utopic (Ubuntu Lucid)

** No longer affects: linux-flo (Ubuntu Lucid)

** No longer affects: linux-lts-raring (Ubuntu Lucid)

** No longer affects: linux-manta (Ubuntu Lucid)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2015-03-29 Thread Mathew Hodson
** Changed in: linux (Ubuntu Utopic)
   Status: Fix Committed = Invalid

** Changed in: linux (Ubuntu Vivid)
   Status: Fix Committed = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Vivid)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2015-01-28 Thread John Johansen
** Changed in: linux-flo (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Utopic)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2014-12-06 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New = Fix Released

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2014-10-27 Thread John Johansen
** Also affects: linux (Ubuntu Vivid)
   Importance: Medium
   Status: Fix Committed

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2014-07-23 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Saucy)

** No longer affects: linux-ec2 (Ubuntu Saucy)

** No longer affects: linux-lts-saucy (Ubuntu Saucy)

** No longer affects: linux-lts-quantal (Ubuntu Saucy)

** No longer affects: linux-mvl-dove (Ubuntu Saucy)

** No longer affects: linux (Ubuntu Saucy)

** No longer affects: linux-fsl-imx51 (Ubuntu Saucy)

** No longer affects: linux-ti-omap4 (Ubuntu Saucy)

** No longer affects: linux-lts-raring (Ubuntu Saucy)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2014-06-26 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-maverick (Ubuntu Quantal)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-maverick (Ubuntu Saucy)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Saucy)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-maverick (Ubuntu Trusty)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Trusty)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
   Status: New = Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2014-06-03 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-242.58

---
linux-ti-omap4 (3.5.0-242.58) quantal; urgency=low

  * Release Tracking Bug
- LP: #1317330

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.5.0-51.75

  [ Ubuntu: 3.5.0-51.75 ]

  * Merged back Ubuntu-3.5.0-49.74 security release
  * Revert n_tty: Fix n_tty_write crash when echoing in raw mode
- LP: #1314762
  * Release Tracking Bug
- LP: #1317227
  * ipv6: don't set DST_NOCOUNT for remotely added routes
- LP: #1293726
- CVE-2014-2309
  * vhost: fix total length when packets are too short
- LP: #1312984
- CVE-2014-0077
  * n_tty: Fix n_tty_write crash when echoing in raw mode
- LP: #1314762
- CVE-2014-0196
  * floppy: ignore kernel-only members in FDRAWCMD ioctl input
- LP: #1316729
- CVE-2014-1737
  * floppy: don't write kernel-only members to FDRAWCMD ioctl output
- LP: #1316735
- CVE-2014-1738

  [ Ubuntu: 3.5.0-50.74 ]

  * Release Tracking Bug
- LP: #1313852
  * rds: prevent dereference of a NULL device in rds_iw_laddr_check
- LP: #130
- CVE-2014-2678
  * vhost: validate vhost_get_vq_desc return value
- LP: #1298117
- CVE-2014-0055
  * netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
- LP: #1295090
- CVE-2014-2523
  * ALSA: oxygen: Xonar DG(X): capture from I2S channel 1, not 2
- LP: #1310783
  * ALSA: oxygen: Xonar DG(X): modify DAC routing
- LP: #1310783
  * mac80211: fix AP powersave TX vs. wakeup race
- LP: #1310783
  * iwlwifi: dvm: clear IWL_STA_UCODE_INPROGRESS when assoc fails
- LP: #1310783
  * ath9k: protect tid-sched check
- LP: #1310783
  * ath9k: Fix ETSI compliance for AR9462 2.0
- LP: #1310783
  * genirq: Remove racy waitqueue_active check
- LP: #1310783
  * sched: Fix double normalization of vruntime
- LP: #1310783
  * cpuset: fix a race condition in __cpuset_node_allowed_softwall()
- LP: #1310783
  * firewire: net: fix use after free
- LP: #1310783
  * mwifiex: do not advertise usb autosuspend support
- LP: #1310783
  * NFS: Fix a delegation callback race
- LP: #1310783
  * can: flexcan: fix shutdown: first disable chip, then all interrupts
- LP: #1310783
  * can: flexcan: flexcan_open(): fix error path if flexcan_chip_start()
fails
- LP: #1310783
  * tracing: Do not add event files for modules that fail tracepoints
- LP: #1310783
  * ocfs2: fix quota file corruption
- LP: #1310783
  * rapidio/tsi721: fix tasklet termination in dma channel release
- LP: #1310783
  * ALSA: usb-audio: Add quirk for Logitech Webcam C500
- LP: #1310783
  * drm/radeon: TTM must be init with cpu-visible VRAM, v2
- LP: #1310783
  * drm/radeon/atom: select the proper number of lanes in transmitter setup
- LP: #1310783
  * powerpc: Align p_dyn, p_rela and p_st symbols
- LP: #1310783
  * libata: add ATA_HORKAGE_BROKEN_FPDMA_AA quirk for Seagate Momentus
SpinPoint M8 (2BA30001)
- LP: #1310783
  * usb: Add device quirk for Logitech HD Pro Webcams C920 and C930e
- LP: #1310783
  * usb: Make DELAY_INIT quirk wait 100ms between Get Configuration
requests
- LP: #1310783
  * ARM: 7991/1: sa1100: fix compile problem on Collie
- LP: #1310783
  * firewire: don't use PREPARE_DELAYED_WORK
- LP: #1310783
  * x86: Ignore NMIs that come in during early boot
- LP: #1310783
  * x86: fix compile error due to X86_TRAP_NMI use in asm files
- LP: #1310783
  * virtio-net: alloc big buffers also when guest can receive UFO
- LP: #1310783
  * tg3: Don't check undefined error bits in RXBD
- LP: #1310783
  * net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable
- LP: #1310783
  * usb: dwc3: add support for Merrifield
- LP: #1310783
  * mac80211: clear sequence/fragment number in QoS-null frames
- LP: #1310783
  * mwifiex: copy AP's HT capability info correctly
- LP: #1310783
  * net: unix socket code abuses csum_partial
- LP: #1310783
  * ibmveth: Fix endian issues with MAC addresses
- LP: #1310783
  * [SCSI] isci: fix reset timeout handling
- LP: #1310783
  * [SCSI] isci: correct erroneous for_each_isci_host macro
- LP: #1310783
  * [SCSI] qla2xxx: Poll during initialization for ISP25xx and ISP83xx
- LP: #1310783
  * ocfs2 syncs the wrong range...
- LP: #1310783
  * fs/proc/base.c: fix GPF in /proc/$PID/map_files
- LP: #1310783
  * vmxnet3: fix netpoll race condition
- LP: #1310783
  * [SCSI] storvsc: NULL pointer dereference fix
- LP: #1310783
  * PCI: Enable INTx in pci_reenable_device() only when MSI/MSI-X not
enabled
- LP: #1310783
  * KVM: SVM: fix cr8 intercept window
- LP: #1310783
  * drm/ttm: don't oops if no invalidate_caches()
- LP: #1310783
  * vmxnet3: fix building without CONFIG_PCI_MSI
- LP: #1310783
  * x86/amd/numa: Fix northbridge quirk to assign correct NUMA node
- LP: #1310783
  * Btrfs: fix data corruption when 

[Bug 1312984] Re: CVE-2014-0077

2014-05-28 Thread John Johansen
** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** Changed in: linux (Ubuntu Saucy)
   Status: Fix Committed = Fix Released

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed = Fix Released

** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2014-05-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1446.65

---
linux-ti-omap4 (3.2.0-1446.65) precise; urgency=low

  * Release Tracking Bug
- LP: #1317327

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.2.0-63.94

  [ Ubuntu: 3.2.0-63.94 ]

  * Merged back Ubuntu-3.2.0-61.93 security release
  * Revert n_tty: Fix n_tty_write crash when echoing in raw mode
- LP: #1314762
  * Release Tracking Bug
- LP: #1316703
  * SAUCE: net/ipv4: Always flush route cache on unregister batch call
- LP: #1021471
  * ipv6: don't set DST_NOCOUNT for remotely added routes
- LP: #1293726
- CVE-2014-2309
  * vhost: fix total length when packets are too short
- LP: #1312984
- CVE-2014-0077
  * n_tty: Fix n_tty_write crash when echoing in raw mode
- LP: #1314762
- CVE-2014-0196
  * floppy: ignore kernel-only members in FDRAWCMD ioctl input
- LP: #1316729
- CVE-2014-1737
  * floppy: don't write kernel-only members to FDRAWCMD ioctl output
- LP: #1316735
- CVE-2014-1738

  [ Ubuntu: 3.2.0-62.93 ]

  * Release Tracking Bug
- LP: #1313807
  * [Config] updateconfigs after Linux v3.2.57 update
  * rds: prevent dereference of a NULL device in rds_iw_laddr_check
- LP: #130
- CVE-2014-2678
  * rtlwifi: Set the link state
- LP: #1310763
  * rtlwifi: rtl8192cu: Fix some code in RF handling
- LP: #1310763
  * NFSv4: OPEN must handle the NFS4ERR_IO return code correctly
- LP: #1310763
  * selinux: process labeled IPsec TCP SYN-ACK packets properly in
selinux_ip_postroute()
- LP: #1310763
  * parport: parport_pc: remove double PCI ID for NetMos
- LP: #1310763
  * staging: vt6656: [BUG] BBvUpdatePreEDThreshold Always set sensitivity
on bScanning
- LP: #1310763
  * bfa: Chinook quad port 16G FC HBA claim issue
- LP: #1310763
  * usb: option: add new zte 3g modem pids to option driver
- LP: #1310763
  * dib8000: make 32 bits read atomic
- LP: #1310763
  * serial: add support for 400 and 800 v3 series Titan cards
- LP: #1310763
  * serial: add support for 200 v3 series Titan card
- LP: #1310763
  * x86/efi: Fix off-by-one bug in EFI Boot Services reservation
- LP: #1310763
  * rtc-cmos: Add an alarm disable quirk
- LP: #1310763
  * slub: Fix calculation of cpu slabs
- LP: #1310763
  * mtd: mxc_nand: remove duplicated ecc_stats counting
- LP: #1310763
  * USB: pl2303: fix data corruption on termios updates
- LP: #1310763
  * USB: serial: add support for iBall 3.5G connect usb modem
- LP: #1310763
  * USB: Nokia 502 is an unusual device
- LP: #1310763
  * USB: cypress_m8: fix ring-indicator detection and reporting
- LP: #1310763
  * ALSA: rme9652: fix a missing comma in channel_map_9636_ds[]
- LP: #1310763
  * sunrpc: Fix infinite loop in RPC state machine
- LP: #1310763
  * SELinux: Fix memory leak upon loading policy
- LP: #1310763
  * drm/radeon: warn users when hw_i2c is enabled (v2)
- LP: #1310763
  * USB: ftdi_sio: added CS5 quirk for broken smartcard readers
- LP: #1310763
  * serial: 8250: enable UART_BUG_NOMSR for Tegra
- LP: #1310763
  * dm: wait until embedded kobject is released before destroying a device
- LP: #1310763
  * dm space map common: make sure new space is used during extend
- LP: #1310763
  * ASoC: adau1701: Fix ADAU1701_SEROCTL_WORD_LEN_16 constant
- LP: #1310763
  * radeon/pm: Guard access to rdev-pm.power_state array
- LP: #1310763
  * staging: r8712u: Set device type to wlan
- LP: #1310763
  * ALSA: Enable CONFIG_ZONE_DMA for smaller PCI DMA masks
- LP: #1310763
  * staging:iio:ad799x fix error_free_irq which was freeing an irq that may
not have been requested
- LP: #1310763
  * mmc: atmel-mci: fix timeout errors in SDIO mode when using DMA
- LP: #1310763
  * ftrace: Use schedule_on_each_cpu() as a heavy synchronize_sched()
- LP: #1310763
  * ftrace: Fix synchronization location disabling and freeing ftrace_ops
- LP: #1310763
  * rtlwifi: rtl8192cu: Add new device ID
- LP: #1310763
  * nfs4.1: properly handle ENOTSUP in SECINFO_NO_NAME
- LP: #1310763
  * usb: ehci: add freescale imx28 special write register method
- LP: #1310763
  * dm sysfs: fix a module unload race
- LP: #1310763
  * KVM: x86: limit PIT timer frequency
- LP: #1310763
  * md/raid5: fix long-standing problem with bitmap handling on write
failure.
- LP: #1310763
  * x86: Add check for number of available vectors before CPU down
- LP: #1310763
  * libata: disable LPM for some WD SATA-I devices
- LP: #1310763
  * mmc: sdhci: fix lockdep error in tuning routine
- LP: #1310763
  * turbostat: Use GCC's CPUID functions to support PIC
- LP: #1310763
  * drm/radeon: disable ss on DP for DCE3.x
- LP: #1310763
  * drm/radeon: set the full cache bit for fences on r7xx+
- LP: #1310763
  * hp_accel: Add a new PnP ID HPQ6007 for new HP laptops
- LP: #1310763
  * intel-iommu: fix 

[Bug 1312984] Re: CVE-2014-0077

2014-05-26 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1633.47

---
linux-armadaxp (3.2.0-1633.47) precise-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1320044
  * Rebase to Ubuntu-3.2.0-63.95

  [ Ubuntu: 3.2.0-63.95 ]

  * Revert rtlwifi: Set the link state
- LP: #1319735
  * Release Tracking Bug
- re-used previous tracking bug
 -- Ike Panhc ike@canonical.com   Fri, 16 May 2014 11:46:55 +0800

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2014-05-26 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-63.95

---
linux (3.2.0-63.95) precise; urgency=low

  [ Kamal Mostafa ]

  * Revert rtlwifi: Set the link state
- LP: #1319735
  * Release Tracking Bug
- re-used previous tracking bug

linux (3.2.0-63.94) precise; urgency=low

  [ Kamal Mostafa ]

  * Merged back Ubuntu-3.2.0-61.93 security release
  * Revert n_tty: Fix n_tty_write crash when echoing in raw mode
- LP: #1314762
  * Release Tracking Bug
- LP: #1316703

  [ Stefan Bader ]

  * SAUCE: net/ipv4: Always flush route cache on unregister batch call
- LP: #1021471

  [ Upstream Kernel Changes ]

  * ipv6: don't set DST_NOCOUNT for remotely added routes
- LP: #1293726
- CVE-2014-2309
  * vhost: fix total length when packets are too short
- LP: #1312984
- CVE-2014-0077
  * n_tty: Fix n_tty_write crash when echoing in raw mode
- LP: #1314762
- CVE-2014-0196
  * floppy: ignore kernel-only members in FDRAWCMD ioctl input
- LP: #1316729
- CVE-2014-1737
  * floppy: don't write kernel-only members to FDRAWCMD ioctl output
- LP: #1316735
- CVE-2014-1738

linux (3.2.0-62.93) precise; urgency=low

  [ Joseph Salisbury ]

  * Release Tracking Bug
- LP: #1313807

  [ Joseph Salisbury ]

  * [Config] updateconfigs after Linux v3.2.57 update

  [ Upstream Kernel Changes ]

  * rds: prevent dereference of a NULL device in rds_iw_laddr_check
- LP: #130
- CVE-2014-2678
  * rtlwifi: Set the link state
- LP: #1310763
  * rtlwifi: rtl8192cu: Fix some code in RF handling
- LP: #1310763
  * NFSv4: OPEN must handle the NFS4ERR_IO return code correctly
- LP: #1310763
  * selinux: process labeled IPsec TCP SYN-ACK packets properly in
selinux_ip_postroute()
- LP: #1310763
  * parport: parport_pc: remove double PCI ID for NetMos
- LP: #1310763
  * staging: vt6656: [BUG] BBvUpdatePreEDThreshold Always set sensitivity
on bScanning
- LP: #1310763
  * bfa: Chinook quad port 16G FC HBA claim issue
- LP: #1310763
  * usb: option: add new zte 3g modem pids to option driver
- LP: #1310763
  * dib8000: make 32 bits read atomic
- LP: #1310763
  * serial: add support for 400 and 800 v3 series Titan cards
- LP: #1310763
  * serial: add support for 200 v3 series Titan card
- LP: #1310763
  * x86/efi: Fix off-by-one bug in EFI Boot Services reservation
- LP: #1310763
  * rtc-cmos: Add an alarm disable quirk
- LP: #1310763
  * slub: Fix calculation of cpu slabs
- LP: #1310763
  * mtd: mxc_nand: remove duplicated ecc_stats counting
- LP: #1310763
  * USB: pl2303: fix data corruption on termios updates
- LP: #1310763
  * USB: serial: add support for iBall 3.5G connect usb modem
- LP: #1310763
  * USB: Nokia 502 is an unusual device
- LP: #1310763
  * USB: cypress_m8: fix ring-indicator detection and reporting
- LP: #1310763
  * ALSA: rme9652: fix a missing comma in channel_map_9636_ds[]
- LP: #1310763
  * sunrpc: Fix infinite loop in RPC state machine
- LP: #1310763
  * SELinux: Fix memory leak upon loading policy
- LP: #1310763
  * drm/radeon: warn users when hw_i2c is enabled (v2)
- LP: #1310763
  * USB: ftdi_sio: added CS5 quirk for broken smartcard readers
- LP: #1310763
  * serial: 8250: enable UART_BUG_NOMSR for Tegra
- LP: #1310763
  * dm: wait until embedded kobject is released before destroying a device
- LP: #1310763
  * dm space map common: make sure new space is used during extend
- LP: #1310763
  * ASoC: adau1701: Fix ADAU1701_SEROCTL_WORD_LEN_16 constant
- LP: #1310763
  * radeon/pm: Guard access to rdev-pm.power_state array
- LP: #1310763
  * staging: r8712u: Set device type to wlan
- LP: #1310763
  * ALSA: Enable CONFIG_ZONE_DMA for smaller PCI DMA masks
- LP: #1310763
  * staging:iio:ad799x fix error_free_irq which was freeing an irq that may
not have been requested
- LP: #1310763
  * mmc: atmel-mci: fix timeout errors in SDIO mode when using DMA
- LP: #1310763
  * ftrace: Use schedule_on_each_cpu() as a heavy synchronize_sched()
- LP: #1310763
  * ftrace: Fix synchronization location disabling and freeing ftrace_ops
- LP: #1310763
  * rtlwifi: rtl8192cu: Add new device ID
- LP: #1310763
  * nfs4.1: properly handle ENOTSUP in SECINFO_NO_NAME
- LP: #1310763
  * usb: ehci: add freescale imx28 special write register method
- LP: #1310763
  * dm sysfs: fix a module unload race
- LP: #1310763
  * KVM: x86: limit PIT timer frequency
- LP: #1310763
  * md/raid5: fix long-standing problem with bitmap handling on write
failure.
- LP: #1310763
  * x86: Add check for number of available vectors before CPU down
- LP: #1310763
  * libata: disable LPM for some WD SATA-I devices
- LP: #1310763
  * mmc: sdhci: fix lockdep error in tuning routine
- LP: #1310763
  * turbostat: Use GCC's CPUID functions to support PIC
- LP: #1310763
  * drm/radeon: disable ss on DP 

[Bug 1312984] Re: CVE-2014-0077

2014-05-26 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-quantal -
3.5.0-51.76~precise1

---
linux-lts-quantal (3.5.0-51.76~precise1) precise; urgency=low

  [ Brad Figg ]

  * Revert rtlwifi: Set the link state

  [ Kamal Mostafa ]

  * Release Tracking Bug
- re-used previous tracking bug

linux (3.5.0-51.75) quantal; urgency=low

  [ Kamal Mostafa ]

  * Merged back Ubuntu-3.5.0-49.74 security release
  * Revert n_tty: Fix n_tty_write crash when echoing in raw mode
- LP: #1314762
  * Release Tracking Bug
- LP: #1317333

  [ Upstream Kernel Changes ]

  * ipv6: don't set DST_NOCOUNT for remotely added routes
- LP: #1293726
- CVE-2014-2309
  * vhost: fix total length when packets are too short
- LP: #1312984
- CVE-2014-0077
  * n_tty: Fix n_tty_write crash when echoing in raw mode
- LP: #1314762
- CVE-2014-0196
  * floppy: ignore kernel-only members in FDRAWCMD ioctl input
- LP: #1316729
- CVE-2014-1737
  * floppy: don't write kernel-only members to FDRAWCMD ioctl output
- LP: #1316735
- CVE-2014-1738

linux (3.5.0-50.74) quantal; urgency=low

  [ Joseph Salisbury ]

  * Release Tracking Bug
- LP: #1313852

  [ Upstream Kernel Changes ]

  * rds: prevent dereference of a NULL device in rds_iw_laddr_check
- LP: #130
- CVE-2014-2678
  * vhost: validate vhost_get_vq_desc return value
- LP: #1298117
- CVE-2014-0055
  * netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
- LP: #1295090
- CVE-2014-2523
  * ALSA: oxygen: Xonar DG(X): capture from I2S channel 1, not 2
- LP: #1310783
  * ALSA: oxygen: Xonar DG(X): modify DAC routing
- LP: #1310783
  * mac80211: fix AP powersave TX vs. wakeup race
- LP: #1310783
  * iwlwifi: dvm: clear IWL_STA_UCODE_INPROGRESS when assoc fails
- LP: #1310783
  * ath9k: protect tid-sched check
- LP: #1310783
  * ath9k: Fix ETSI compliance for AR9462 2.0
- LP: #1310783
  * genirq: Remove racy waitqueue_active check
- LP: #1310783
  * sched: Fix double normalization of vruntime
- LP: #1310783
  * cpuset: fix a race condition in __cpuset_node_allowed_softwall()
- LP: #1310783
  * firewire: net: fix use after free
- LP: #1310783
  * mwifiex: do not advertise usb autosuspend support
- LP: #1310783
  * NFS: Fix a delegation callback race
- LP: #1310783
  * can: flexcan: fix shutdown: first disable chip, then all interrupts
- LP: #1310783
  * can: flexcan: flexcan_open(): fix error path if flexcan_chip_start()
fails
- LP: #1310783
  * tracing: Do not add event files for modules that fail tracepoints
- LP: #1310783
  * ocfs2: fix quota file corruption
- LP: #1310783
  * rapidio/tsi721: fix tasklet termination in dma channel release
- LP: #1310783
  * ALSA: usb-audio: Add quirk for Logitech Webcam C500
- LP: #1310783
  * drm/radeon: TTM must be init with cpu-visible VRAM, v2
- LP: #1310783
  * drm/radeon/atom: select the proper number of lanes in transmitter setup
- LP: #1310783
  * powerpc: Align p_dyn, p_rela and p_st symbols
- LP: #1310783
  * libata: add ATA_HORKAGE_BROKEN_FPDMA_AA quirk for Seagate Momentus
SpinPoint M8 (2BA30001)
- LP: #1310783
  * usb: Add device quirk for Logitech HD Pro Webcams C920 and C930e
- LP: #1310783
  * usb: Make DELAY_INIT quirk wait 100ms between Get Configuration
requests
- LP: #1310783
  * ARM: 7991/1: sa1100: fix compile problem on Collie
- LP: #1310783
  * firewire: don't use PREPARE_DELAYED_WORK
- LP: #1310783
  * x86: Ignore NMIs that come in during early boot
- LP: #1310783
  * x86: fix compile error due to X86_TRAP_NMI use in asm files
- LP: #1310783
  * virtio-net: alloc big buffers also when guest can receive UFO
- LP: #1310783
  * tg3: Don't check undefined error bits in RXBD
- LP: #1310783
  * net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable
- LP: #1310783
  * usb: dwc3: add support for Merrifield
- LP: #1310783
  * mac80211: clear sequence/fragment number in QoS-null frames
- LP: #1310783
  * mwifiex: copy AP's HT capability info correctly
- LP: #1310783
  * net: unix socket code abuses csum_partial
- LP: #1310783
  * ibmveth: Fix endian issues with MAC addresses
- LP: #1310783
  * [SCSI] isci: fix reset timeout handling
- LP: #1310783
  * [SCSI] isci: correct erroneous for_each_isci_host macro
- LP: #1310783
  * [SCSI] qla2xxx: Poll during initialization for ISP25xx and ISP83xx
- LP: #1310783
  * ocfs2 syncs the wrong range...
- LP: #1310783
  * fs/proc/base.c: fix GPF in /proc/$PID/map_files
- LP: #1310783
  * vmxnet3: fix netpoll race condition
- LP: #1310783
  * [SCSI] storvsc: NULL pointer dereference fix
- LP: #1310783
  * PCI: Enable INTx in pci_reenable_device() only when MSI/MSI-X not
enabled
- LP: #1310783
  * KVM: SVM: fix cr8 intercept window
- LP: #1310783
  * drm/ttm: don't oops if no invalidate_caches()
- LP: #1310783

[Bug 1312984] Re: CVE-2014-0077

2014-05-20 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Quantal)

** No longer affects: linux-ec2 (Ubuntu Quantal)

** No longer affects: linux-lts-saucy (Ubuntu Quantal)

** No longer affects: linux-lts-quantal (Ubuntu Quantal)

** No longer affects: linux-mvl-dove (Ubuntu Quantal)

** No longer affects: linux (Ubuntu Quantal)

** No longer affects: linux-fsl-imx51 (Ubuntu Quantal)

** No longer affects: linux-ti-omap4 (Ubuntu Quantal)

** No longer affects: linux-lts-raring (Ubuntu Quantal)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2014-05-05 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: New = Fix Committed

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux (Ubuntu Quantal)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Saucy)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: New = Fix Committed

** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: New = Fix Committed

** Description changed:

  drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable
  buffers are disabled, does not properly validate packet lengths, which
  allows guest OS users to cause a denial of service (memory corruption
  and host OS crash) or possibly gain privileges on the host OS via
  crafted packets, related to the handle_rx and get_rx_bufs functions.
+ 
+ Break-Fix: 8dd014adfea6f173c1ef6378f7e5e7924866c923
+ d8316f3991d207fe32881a9ac20241be8fa2bad0

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2014-05-01 Thread John Johansen
** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Saucy)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Utopic)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312984

Title:
  CVE-2014-0077

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1312984] Re: CVE-2014-0077

2014-04-25 Thread John Johansen
CVE-2014-0077

** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Changed in: linux-armadaxp (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu