[Bug 1370046] Re: CVE-2014-6417

2021-10-14 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1370046] Re: CVE-2014-6417

2021-10-14 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1370046] Re: CVE-2014-6417

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1370046] Re: CVE-2014-6417

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: Fix Committed => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1370046] Re: CVE-2014-6417

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2016-04-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Yakkety)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-mako (Ubuntu Yakkety)
   Importance: Low
   Status: New

** Also affects: linux-manta (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Yakkety)
   Importance: Low
   Status: New

** Also affects: linux-flo (Ubuntu Yakkety)
   Importance: Low
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-raspi2 (Ubuntu Yakkety)
   Importance: Low
   Status: Fix Committed

** Also affects: linux-lts-xenial (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2016-04-24 Thread Rolf Leggewie
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
   Status: New => Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2016-04-18 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2015-10-28 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Low
   Status: New

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Low
   Status: New

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Low
   Status: New

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Low
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as Won't Fix.

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: New = Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as Won't Fix.

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-mako (Ubuntu Wily)
   Importance: Low
   Status: New

** Also affects: linux-manta (Ubuntu Wily)
   Importance: Low
   Status: New

** Also affects: linux-goldfish (Ubuntu Wily)
   Importance: Low
   Status: New

** Also affects: linux-flo (Ubuntu Wily)
   Importance: Low
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New = Fix Committed

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-ec2 (Ubuntu Lucid)

** No longer affects: linux-goldfish (Ubuntu Lucid)

** No longer affects: linux-lts-saucy (Ubuntu Lucid)

** No longer affects: linux-lts-quantal (Ubuntu Lucid)

** No longer affects: linux-mvl-dove (Ubuntu Lucid)

** No longer affects: linux-ti-omap4 (Ubuntu Lucid)

** No longer affects: linux (Ubuntu Lucid)

** No longer affects: linux-mako (Ubuntu Lucid)

** No longer affects: linux-fsl-imx51 (Ubuntu Lucid)

** No longer affects: linux-lts-utopic (Ubuntu Lucid)

** No longer affects: linux-flo (Ubuntu Lucid)

** No longer affects: linux-lts-raring (Ubuntu Lucid)

** No longer affects: linux-manta (Ubuntu Lucid)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2015-01-28 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New = Fix Released

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-goldfish (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-goldfish (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-goldfish (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-goldfish (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-goldfish (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-flo (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-flo (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-flo (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-flo (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-flo (Ubuntu Utopic)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2014-10-27 Thread John Johansen
** Also affects: linux (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2014-10-20 Thread John Johansen
** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2014-10-08 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-70.105

---
linux (3.2.0-70.105) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- re-used previous tracking bug

  [ Upstream Kernel Changes ]

  * udf: Avoid infinite loop when processing indirect ICBs
- LP: #1370042
- CVE-2014-6410

linux (3.2.0-70.104) precise; urgency=low

  [ Joseph Salisbury ]

  * Release Tracking Bug
- LP: #1372522

  [ Tim Gardner ]

  * SAUCE: Fix nfs oops stable regression
- LP: #1348670
  * [Config] updateconfigs
- LP: #1369711

  [ Upstream Kernel Changes ]

  * Revert x86-64, modify_ldt: Make support for 16-bit segments a runtime
option
- LP: #1369711
  * KVM: x86: Inter-privilege level ret emulation is not implemeneted
- LP: #1369711
  * ASoC: samsung: Correct I2S DAI suspend/resume ops
- LP: #1369711
  * block: don't assume last put of shared tags is for the host
- LP: #1369711
  * stable_kernel_rules: Add pointer to netdev-FAQ for network patches
- LP: #1369711
  * debugfs: Fix corrupted loop in debugfs_remove_recursive
- LP: #1369711
  * serial: core: Preserve termios c_cflag for console resume
- LP: #1369711
  * tda10071: force modulation to QPSK on DVB-S
- LP: #1369711
  * gspca_pac7302: Add new usb-id for Genius i-Look 317
- LP: #1369711
  * mtd/ftl: fix the double free of the buffers allocated in build_maps()
- LP: #1369711
  * x86: don't exclude low BIOS area when allocating address space for
non-PCI cards
- LP: #1369711
  * Bluetooth: never linger on process exit
- LP: #1369711
  * scsi: handle flush errors properly
- LP: #1369711
  * USB: OHCI: don't lose track of EDs when a controller dies
- LP: #1369711
  * ahci: add support for the Promise FastTrak TX8660 SATA HBA (ahci mode)
- LP: #1369711
  * usbcore: don't log on consecutive debounce failures of the same port
- LP: #1369711
  * USB: Fix persist resume of some SS USB devices
- LP: #1369711
  * drm/radeon: fix irq ring buffer overflow handling
- LP: #1369711
  * hwmon: (smsc47m192) Fix temperature limit and vrm write operations
- LP: #1369711
  * staging: vt6655: Fix Warning on boot handle_irq_event_percpu.
- LP: #1369711
  * staging: vt6655: Fix disassociated messages every 10 seconds
- LP: #1369711
  * bfa: Fix undefined bit shift on big-endian architectures with 32-bit
DMA address
- LP: #1369711
  * hpsa: fix bad -ENOMEM return value in hpsa_big_passthru_ioctl
- LP: #1369711
  * Drivers: scsi: storvsc: Implement a eh_timed_out handler
- LP: #1369711
  * Fix gcc-4.9.0 miscompilation of load_balance() in scheduler
- LP: #1369711
  * iommu/vt-d: Exclude devices using RMRRs from IOMMU API domains
- LP: #1369711
  * net: sendmsg: fix NULL pointer dereference
- LP: #1369711
  * tpm: Provide a generic means to override the chip returned timeouts
- LP: #1369711
  * hwmon: (ads1015) Fix off-by-one for valid channel index checking
- LP: #1369711
  * MIPS: tlbex: Fix a missing statement for HUGETLB
- LP: #1369711
  * MIPS: Prevent user from setting FCSR cause bits
- LP: #1369711
  * mm, thp: do not allow thp faults to avoid cpuset restrictions
- LP: #1369711
  * md/raid1,raid10: always abort recover on write error.
- LP: #1369711
  * ext4: cleanup in ext4_discard_allocated_blocks()
- LP: #1369711
  * ext4: fix ext4_discard_allocated_blocks() if we can't allocate the pa
struct
- LP: #1369711
  * hwmon: (lm85) Fix various errors on attribute writes
- LP: #1369711
  * hwmon: (lm78) Fix overflow problems seen when writing large temperature
limits
- LP: #1369711
  * hwmon: (amc6821) Fix return value
- LP: #1369711
  * hwmon: (amc6821) Fix possible race condition bug
- LP: #1369711
  * MIPS: GIC: Prevent array overrun
- LP: #1369711
  * crypto: af_alg - properly label AF_ALG socket
- LP: #1369711
  * mnt: Change the default remount atime from relatime to the existing
value
- LP: #1369711
  * ARM: OMAP3: Fix choice of omap3_restore_es function in OMAP34XX
rev3.1.2 case.
- LP: #1369711
  * netlabel: use GFP flags from caller instead of GFP_ATOMIC
- LP: #1369711
  * netlabel: fix a problem when setting bits below the previously lowest
bit
- LP: #1369711
  * USB: serial: ftdi_sio: Annotate the current Xsens PID assignments
- LP: #1369711
  * USB: serial: ftdi_sio: Add support for new Xsens devices
- LP: #1369711
  * ALSA: virtuoso: Xonar DSX support
- LP: #1369711
  * ALSA: virtuoso: add Xonar Essence STX II support
- LP: #1369711
  * hwmon: (gpio-fan) Prevent overflow problem when writing large limits
- LP: #1369711
  * hwmon: (sis5595) Prevent overflow problem when writing large limits
- LP: #1369711
  * drm/ttm: Fix possible stack overflow by recursive shrinker calls.
- LP: #1369711
  * powerpc/mm/numa: Fix break placement
- LP: #1369711
  * drm/radeon: load the lm63 driver for an 

[Bug 1370046] Re: CVE-2014-6417

2014-10-08 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-37.64

---
linux (3.13.0-37.64) trusty; urgency=low

  [ Joseph Salisbury ]

  * Release Tracking Bug
- LP: #1372576

  [ dann frazier ]

  * [Config] CONFIG_HW_RANDOM_XGENE=m on arm64

  [ Edward Lin ]

  * SAUCE: Add use_native_backlight quirk for Dell Inspiron 5721/3521
- LP: #1354253, #1354313

  [ Tim Gardner ]

  * SAUCE: Fix nfs oops stable regression
- LP: #1348670
  * [Config] Add mpt3sas to d-i
- LP: #1368907
  * [Config] CONFIG_X86_16BIT=y
- LP: #1371601

  [ Timo Aaltonen ]

  * SAUCE: i915_bdw: Rebase to v3.15.8
- LP: #1359213

  [ Upstream Kernel Changes ]

  * Revert x86-64, modify_ldt: Make support for 16-bit segments a runtime
option
- LP: #1371601
  * mmc: rtsx: add R1-no-CRC mmc command type handle
- LP: #1365378
  * rpc_pipe: remove the clntXX dir if creating the pipe fails
- LP: #1365869
  * sunrpc: add an info file for the dummy gssd pipe
- LP: #1365869
  * rpc_pipe: fix cleanup of dummy gssd directory when notification fails
- LP: #1365869
  * hwrng: xgene - add support for APM X-Gene SoC RNG support
- LP: #1365593
  * Documentation: rng: Add X-Gene SoC RNG driver documentation
- LP: #1365593
  * arm64: dts: add random number generator dts node to APM X-Gene
platform.
- LP: #1365593
  * xen/balloon: cancel ballooning if adding new memory failed
- LP: #1304001
  * x86/xen: resume timer irqs early
- LP: #1368724
  * xen/manage: Always freeze/thaw processes when suspend/resuming
- LP: #1368724
  * scsi_transport_sas: move bsg destructor into sas_rphy_remove
- LP: #1368991
  * drm/i915: Enable 5.4Ghz (HBR2) link rate for Displayport 1.2-capable
devices
- LP: #1369633
  * bnx2x: Fix link for KR with swapped polarity lane
- LP: #1370716
  * drm: add DRM_CAPs for cursor size
- LP: #1359213
  * drm/dp: Add AUX channel infrastructure
- LP: #1359213
  * drm/dp: Add drm_dp_dpcd_read_link_status()
- LP: #1359213
  * drm/dp: Add DisplayPort link helpers
- LP: #1359213
  * drm/dp: Allow registering AUX channels as I2C busses
- LP: #1359213
  * drm/dp: let drivers specify the name of the I2C-over-AUX adapter
- LP: #1359213
  * drm/dp: make aux retries less chatty
- LP: #1359213
  * Bluetooth: Enable Atheros 0cf3:311e for firmware upload
- LP: #1371477
  * bnx2x: fix crash during TSO tunneling
- LP: #1371601
  * inetpeer: get rid of ip_id_count
- LP: #1371601
  * ip: make IP identifiers less predictable
- LP: #1371601
  * tcp: Fix integer-overflows in TCP veno
- LP: #1371601
  * tcp: Fix integer-overflow in TCP vegas
- LP: #1371601
  * macvlan: Initialize vlan_features to turn on offload support.
- LP: #1371601
  * net: Correctly set segment mac_len in skb_segment().
- LP: #1371601
  * iovec: make sure the caller actually wants anything in
memcpy_fromiovecend
- LP: #1371601
  * batman-adv: Fix out-of-order fragmentation support
- LP: #1371601
  * sctp: fix possible seqlock seadlock in sctp_packet_transmit()
- LP: #1371601
  * sparc64: Fix argument sign extension for compat_sys_futex().
- LP: #1371601
  * sparc64: Make itc_sync_lock raw
- LP: #1371601
  * sparc64: Fix executable bit testing in set_pmd_at() paths.
- LP: #1371601
  * sparc64: Fix huge PMD invalidation.
- LP: #1371601
  * sparc64: Fix bugs in get_user_pages_fast() wrt. THP.
- LP: #1371601
  * sparc64: Fix hex values in comment above pte_modify().
- LP: #1371601
  * sparc64: Don't use _PAGE_PRESENT in pte_modify() mask.
- LP: #1371601
  * sparc64: Handle 32-bit tasks properly in compute_effective_address().
- LP: #1371601
  * sparc64: Fix top-level fault handling bugs.
- LP: #1371601
  * sparc64: Fix range check in kern_addr_valid().
- LP: #1371601
  * sparc64: Use 'ILOG2_4MB' instead of constant '22'.
- LP: #1371601
  * sparc64: Add basic validations to {pud,pmd}_bad().
- LP: #1371601
  * sparc64: Give more detailed information in {pgd,pmd}_ERROR() and kill
pte_ERROR().
- LP: #1371601
  * sparc64: Don't bark so loudly about 32-bit tasks generating 64-bit
fault addresses.
- LP: #1371601
  * sparc64: Fix huge TSB mapping on pre-UltraSPARC-III cpus.
- LP: #1371601
  * sparc64: Add membar to Niagara2 memcpy code.
- LP: #1371601
  * sparc64: Do not insert non-valid PTEs into the TSB hash table.
- LP: #1371601
  * sparc64: Guard against flushing openfirmware mappings.
- LP: #1371601
  * bbc-i2c: Fix BBC I2C envctrl on SunBlade 2000
- LP: #1371601
  * sunsab: Fix detection of BREAK on sunsab serial console
- LP: #1371601
  * sparc64: ldc_connect() should not return EINVAL when handshake is in
progress.
- LP: #1371601
  * arch/sparc/math-emu/math_32.c: drop stray break operator
- LP: #1371601
  * x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack
- LP: #1371601
  * x86, espfix: Move espfix 

[Bug 1370046] Re: CVE-2014-6417

2014-10-08 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1455.75

---
linux-ti-omap4 (3.2.0-1455.75) precise; urgency=low

  * Release Tracking Bug
- LP: #1372683

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.2.0-70.105

  [ Ubuntu: 3.2.0-70.105 ]

  * Release Tracking Bug
- re-used previous tracking bug
  * udf: Avoid infinite loop when processing indirect ICBs
- LP: #1370042
- CVE-2014-6410

linux-ti-omap4 (3.2.0-1454.74) precise; urgency=low

  * Release Tracking Bug
- LP: #1372683

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.2.0-70.104

  [ Ubuntu: 3.2.0-70.104 ]

  * Release Tracking Bug
- LP: #1372522
  * SAUCE: Fix nfs oops stable regression
- LP: #1348670
  * [Config] updateconfigs
- LP: #1369711
  * Revert x86-64, modify_ldt: Make support for 16-bit segments a runtime
option
- LP: #1369711
  * KVM: x86: Inter-privilege level ret emulation is not implemeneted
- LP: #1369711
  * ASoC: samsung: Correct I2S DAI suspend/resume ops
- LP: #1369711
  * block: don't assume last put of shared tags is for the host
- LP: #1369711
  * stable_kernel_rules: Add pointer to netdev-FAQ for network patches
- LP: #1369711
  * debugfs: Fix corrupted loop in debugfs_remove_recursive
- LP: #1369711
  * serial: core: Preserve termios c_cflag for console resume
- LP: #1369711
  * tda10071: force modulation to QPSK on DVB-S
- LP: #1369711
  * gspca_pac7302: Add new usb-id for Genius i-Look 317
- LP: #1369711
  * mtd/ftl: fix the double free of the buffers allocated in build_maps()
- LP: #1369711
  * x86: don't exclude low BIOS area when allocating address space for
non-PCI cards
- LP: #1369711
  * Bluetooth: never linger on process exit
- LP: #1369711
  * scsi: handle flush errors properly
- LP: #1369711
  * USB: OHCI: don't lose track of EDs when a controller dies
- LP: #1369711
  * ahci: add support for the Promise FastTrak TX8660 SATA HBA (ahci mode)
- LP: #1369711
  * usbcore: don't log on consecutive debounce failures of the same port
- LP: #1369711
  * USB: Fix persist resume of some SS USB devices
- LP: #1369711
  * drm/radeon: fix irq ring buffer overflow handling
- LP: #1369711
  * hwmon: (smsc47m192) Fix temperature limit and vrm write operations
- LP: #1369711
  * staging: vt6655: Fix Warning on boot handle_irq_event_percpu.
- LP: #1369711
  * staging: vt6655: Fix disassociated messages every 10 seconds
- LP: #1369711
  * bfa: Fix undefined bit shift on big-endian architectures with 32-bit
DMA address
- LP: #1369711
  * hpsa: fix bad -ENOMEM return value in hpsa_big_passthru_ioctl
- LP: #1369711
  * Drivers: scsi: storvsc: Implement a eh_timed_out handler
- LP: #1369711
  * Fix gcc-4.9.0 miscompilation of load_balance() in scheduler
- LP: #1369711
  * iommu/vt-d: Exclude devices using RMRRs from IOMMU API domains
- LP: #1369711
  * net: sendmsg: fix NULL pointer dereference
- LP: #1369711
  * tpm: Provide a generic means to override the chip returned timeouts
- LP: #1369711
  * hwmon: (ads1015) Fix off-by-one for valid channel index checking
- LP: #1369711
  * MIPS: tlbex: Fix a missing statement for HUGETLB
- LP: #1369711
  * MIPS: Prevent user from setting FCSR cause bits
- LP: #1369711
  * mm, thp: do not allow thp faults to avoid cpuset restrictions
- LP: #1369711
  * md/raid1,raid10: always abort recover on write error.
- LP: #1369711
  * ext4: cleanup in ext4_discard_allocated_blocks()
- LP: #1369711
  * ext4: fix ext4_discard_allocated_blocks() if we can't allocate the pa
struct
- LP: #1369711
  * hwmon: (lm85) Fix various errors on attribute writes
- LP: #1369711
  * hwmon: (lm78) Fix overflow problems seen when writing large temperature
limits
- LP: #1369711
  * hwmon: (amc6821) Fix return value
- LP: #1369711
  * hwmon: (amc6821) Fix possible race condition bug
- LP: #1369711
  * MIPS: GIC: Prevent array overrun
- LP: #1369711
  * crypto: af_alg - properly label AF_ALG socket
- LP: #1369711
  * mnt: Change the default remount atime from relatime to the existing
value
- LP: #1369711
  * ARM: OMAP3: Fix choice of omap3_restore_es function in OMAP34XX
rev3.1.2 case.
- LP: #1369711
  * netlabel: use GFP flags from caller instead of GFP_ATOMIC
- LP: #1369711
  * netlabel: fix a problem when setting bits below the previously lowest
bit
- LP: #1369711
  * USB: serial: ftdi_sio: Annotate the current Xsens PID assignments
- LP: #1369711
  * USB: serial: ftdi_sio: Add support for new Xsens devices
- LP: #1369711
  * ALSA: virtuoso: Xonar DSX support
- LP: #1369711
  * ALSA: virtuoso: add Xonar Essence STX II support
- LP: #1369711
  * hwmon: (gpio-fan) Prevent overflow problem when writing large limits
- LP: #1369711
  * hwmon: (sis5595) Prevent overflow problem when writing large limits
- LP: #1369711
  * drm/ttm: Fix possible stack 

[Bug 1370046] Re: CVE-2014-6417

2014-10-08 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1639.57

---
linux-armadaxp (3.2.0-1639.57) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1373656
  * Rebase to Ubuntu-3.2.0-70.105

  [ Ubuntu: 3.2.0-70.105 ]

  * Release Tracking Bug
- re-used previous tracking bug
  * udf: Avoid infinite loop when processing indirect ICBs
- LP: #1370042
- CVE-2014-6410
 -- Ike Panhc ike@canonical.com   Thu, 25 Sep 2014 13:34:49 +0800

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2014-10-08 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2014-10-03 Thread John Johansen
** Description changed:

- [libceph: issue of incorrect handling of kmalloc failures]
+ net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3,
+ does not properly consider the possibility of kmalloc failure, which
+ allows remote attackers to cause a denial of service (system crash) or
+ possibly have unspecified other impact via a long unencrypted auth
+ ticket.
  
  Break-Fix: ec0994e48ea2aebf62ff08376227f3a9ccf46262
  c27a3e4d667fdcad3db7b104f75659478e0c68d8

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2014-10-02 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2014-09-29 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2014-09-25 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2014-09-23 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux (Ubuntu Utopic)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2014-09-22 Thread Andy Whitcroft
** Changed in: linux (Ubuntu Trusty)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Precise)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2014-09-22 Thread John Johansen
** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: New = Invalid

** Description changed:

  [libceph: issue of incorrect handling of kmalloc failures]
  
- Break-Fix: - c27a3e4d667fdcad3db7b104f75659478e0c68d8
+ Break-Fix: ec0994e48ea2aebf62ff08376227f3a9ccf46262
+ c27a3e4d667fdcad3db7b104f75659478e0c68d8

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370046

Title:
  CVE-2014-6417

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1370046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370046] Re: CVE-2014-6417

2014-09-16 Thread John Johansen
CVE-2014-6417

** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Trusty)
   Status: New = Invalid

** Description changed:

- Placeholder
+ [libceph: issue of incorrect handling of kmalloc failures]
+ 
+ Break-Fix: - c27a3e4d667fdcad3db7b104f75659478e0c68d8

** Changed in: linux-armadaxp (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-armadaxp (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-armadaxp (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-ec2 (Ubuntu