[Bug 1384545] Re: CVE-2014-3647
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: Fix Committed => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => High ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => High ** Changed in: linux-snapdragon (Ubuntu Yakkety) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Yakkety) Importance: Undecided => High ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Also affects: linux (Ubuntu Yakkety) Importance: High Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-ec2 (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Yakkety) Importance: Undecided Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-mako (Ubuntu Yakkety) Importance: High Status: New ** Also affects: linux-manta (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-goldfish (Ubuntu Yakkety) Importance: High Status: New ** Also affects: linux-flo (Ubuntu Yakkety) Importance: High Status: New ** Also affects: linux-lts-trusty (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Yakkety) Importance: High Status: Invalid ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: High Status: Fix Committed ** Also affects: linux-lts-xenial (Ubuntu Yakkety) Importance: High Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => High ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => High ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => High ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => High ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => High ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => High ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => High ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => High ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Also affects: linux (Ubuntu Xenial) Importance: High Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Undecided Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-mako (Ubuntu Xenial) Importance: High Status: New ** Also affects: linux-manta (Ubuntu Xenial) Importance: High Status: New ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: High Status: New ** Also affects: linux-flo (Ubuntu Xenial) Importance: High Status: New ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: High Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Invalid = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Also affects: linux (Ubuntu Wily) Importance: High Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Undecided Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-mako (Ubuntu Wily) Importance: High Status: New ** Also affects: linux-manta (Ubuntu Wily) Importance: High Status: New ** Also affects: linux-goldfish (Ubuntu Wily) Importance: High Status: New ** Also affects: linux-flo (Ubuntu Wily) Importance: High Status: New ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: High Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Wily) Importance: High Status: Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Importance: Undecided = High ** Changed in: linux-lts-vivid (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Vivid) Importance: Undecided = High ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Importance: Undecided = High ** Changed in: linux-lts-vivid (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Utopic) Importance: Undecided = High ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Importance: Undecided = High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quantal (Ubuntu Lucid) ** No longer affects: linux-mvl-dove (Ubuntu Lucid) ** No longer affects: linux-ti-omap4 (Ubuntu Lucid) ** No longer affects: linux (Ubuntu Lucid) ** No longer affects: linux-mako (Ubuntu Lucid) ** No longer affects: linux-fsl-imx51 (Ubuntu Lucid) ** No longer affects: linux-lts-utopic (Ubuntu Lucid) ** No longer affects: linux-flo (Ubuntu Lucid) ** No longer affects: linux-lts-raring (Ubuntu Lucid) ** No longer affects: linux-manta (Ubuntu Lucid) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-flo (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Precise) Importance: Undecided = High ** Changed in: linux-flo (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Trusty) Importance: Undecided = High ** Changed in: linux-flo (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-flo (Ubuntu Lucid) Importance: Undecided = High ** Changed in: linux-flo (Ubuntu Vivid) Importance: Undecided = High ** Changed in: linux-flo (Ubuntu Utopic) Importance: Undecided = High ** Changed in: linux-goldfish (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Importance: Undecided = High ** Changed in: linux-goldfish (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Trusty) Importance: Undecided = High ** Changed in: linux-goldfish (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Lucid) Importance: Undecided = High ** Changed in: linux-goldfish (Ubuntu Vivid) Importance: Undecided = High ** Changed in: linux-goldfish (Ubuntu Utopic) Importance: Undecided = High ** Changed in: linux-mako (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Precise) Importance: Undecided = High ** Changed in: linux-mako (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Trusty) Importance: Undecided = High ** Changed in: linux-mako (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Lucid) Importance: Undecided = High ** Changed in: linux-mako (Ubuntu Vivid) Importance: Undecided = High ** Changed in: linux-mako (Ubuntu Utopic) Importance: Undecided = High ** Changed in: linux-manta (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Precise) Importance: Undecided = High ** Changed in: linux-manta (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Trusty) Importance: Undecided = High ** Changed in: linux-manta (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Lucid) Importance: Undecided = High ** Changed in: linux-manta (Ubuntu Vivid) Importance: Undecided = High ** Changed in: linux-manta (Ubuntu Utopic) Importance: Undecided = High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Fix Released ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided = High ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided = High ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Importance: Undecided = High ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided = High ** Changed in: linux-lts-trusty (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided = High ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Importance: Undecided = High ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Trusty) Importance: Undecided = High ** Changed in: linux-lts-utopic (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Lucid) Importance: Undecided = High ** Changed in: linux-lts-utopic (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Vivid) Importance: Undecided = High ** Changed in: linux-lts-utopic (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Utopic) Importance: Undecided = High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Description changed: - kvm currently mishandles noncanonical addresses when emulating - instructions that change rip (eg branches, calls), potentially causing a - failed VM-entry. A guest user with access to I/O or MMIO region can use - this flaw to crash the guest. + arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through + 3.17.2 does not properly perform RIP changes, which allows guest OS + users to cause a denial of service (guest OS crash) via a crafted + application. A guest user with access to I/O or MMIO region can use this + flaw to crash the guest. Break-Fix: - 234f3ce485d54017f15cf5e0699cff4100121601 Break-Fix: - d1442d85cc30ea75f7d399474ca738e0bc96f715 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
This bug was fixed in the package linux - 3.16.0-24.32 --- linux (3.16.0-24.32) utopic; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1386635 [ Upstream Kernel Changes ] * KVM: x86: Check non-canonical addresses upon WRMSR - LP: #1384539 - CVE-2014-3610 * KVM: x86: Prevent host from panicking on shared MSR writes. - LP: #1384539 - CVE-2014-3610 * KVM: x86: Improve thread safety in pit - LP: #1384540 - CVE-2014-3611 * KVM: x86: Fix wrong masking on relative jump/call - LP: #1384545 - CVE-2014-3647 * KVM: x86: Warn if guest virtual address space is not 48-bits - LP: #1384545 - CVE-2014-3647 * KVM: x86: Emulator fixes for eip canonical checks on near branches - LP: #1384545 - CVE-2014-3647 * KVM: x86: emulating descriptor load misses long-mode case - LP: #1384545 - CVE-2014-3647 * KVM: x86: Handle errors when RIP is set during far jumps - LP: #1384545 - CVE-2014-3647 * kvm: vmx: handle invvpid vm exit gracefully - LP: #1384544 - CVE-2014-3646 -- Luis Henriques luis.henriq...@canonical.com Tue, 28 Oct 2014 10:40:55 + ** Changed in: linux (Ubuntu Vivid) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty ** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
This bug was fixed in the package linux - 3.13.0-39.66 --- linux (3.13.0-39.66) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1386629 [ Upstream Kernel Changes ] * KVM: x86: Check non-canonical addresses upon WRMSR - LP: #1384539 - CVE-2014-3610 * KVM: x86: Prevent host from panicking on shared MSR writes. - LP: #1384539 - CVE-2014-3610 * KVM: x86: Improve thread safety in pit - LP: #1384540 - CVE-2014-3611 * KVM: x86: Fix wrong masking on relative jump/call - LP: #1384545 - CVE-2014-3647 * KVM: x86: Warn if guest virtual address space is not 48-bits - LP: #1384545 - CVE-2014-3647 * KVM: x86: Emulator fixes for eip canonical checks on near branches - LP: #1384545 - CVE-2014-3647 * KVM: x86: emulating descriptor load misses long-mode case - LP: #1384545 - CVE-2014-3647 * KVM: x86: Handle errors when RIP is set during far jumps - LP: #1384545 - CVE-2014-3647 * kvm: vmx: handle invvpid vm exit gracefully - LP: #1384544 - CVE-2014-3646 * Input: synaptics - gate forcepad support by DMI check - LP: #1381815 linux (3.13.0-38.65) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1379244 [ Andy Whitcroft ] * Revert SAUCE: scsi: hyper-v storsvc switch up to SPC-3 - LP: #1354397 * [Config] linux-image-extra is additive to linux-image - LP: #1375310 * [Config] linux-image-extra postrm is not needed on purge - LP: #1375310 [ Upstream Kernel Changes ] * Revert KVM: x86: Increase the number of fixed MTRR regs to 10 - LP: #1377564 * Revert USB: option,zte_ev: move most ZTE CDMA devices to zte_ev - LP: #1377564 * aufs: bugfix, stop calling security_mmap_file() again - LP: #1371316 * ipvs: fix ipv6 hook registration for local replies - LP: #1349768 * Drivers: add blist flags - LP: #1354397 * sd: fix a bug in deriving the FLUSH_TIMEOUT from the basic I/O timeout - LP: #1354397 * drm/i915/bdw: Add 42ms delay for IPS disable - LP: #1374389 * drm/i915: add null render states for gen6, gen7 and gen8 - LP: #1374389 * drm/i915/bdw: 3D_CHICKEN3 has write mask bits - LP: #1374389 * drm/i915/bdw: Disable idle DOP clock gating - LP: #1374389 * drm/i915: call lpt_init_clock_gating on BDW too - LP: #1374389 * drm/i915: shuffle panel code - LP: #1374389 * drm/i915: extract backlight minimum brightness from VBT - LP: #1374389 * drm/i915: respect the VBT minimum backlight brightness - LP: #1374389 * drm/i915/bdw: Apply workarounds in render ring init function - LP: #1374389 * drm/i915/bdw: Cleanup pre prod workarounds - LP: #1374389 * drm/i915: Replace hardcoded cacheline size with macro - LP: #1374389 * drm/i915: Refactor Broadwell PIPE_CONTROL emission into a helper. - LP: #1374389 * drm/i915: Add the WaCsStallBeforeStateCacheInvalidate:bdw workaround. - LP: #1374389 * drm/i915/bdw: Remove BDW preproduction W/As until C stepping. - LP: #1374389 * mptfusion: enable no_write_same for vmware scsi disks - LP: #1371591 * iommu/amd: Fix cleanup_domain for mass device removal - LP: #1375266 * cifs: mask off top byte in get_rfc1002_length() - LP: #1372482 * Input: synaptics - add support for ForcePads - LP: #1377564 * ASoC: pxa-ssp: drop SNDRV_PCM_FMTBIT_S24_LE - LP: #1377564 * drm/radeon: add bapm module parameter - LP: #1377564 * drm/radeon: Add missing lines to ci_set_thermal_temperature_range - LP: #1377564 * drm/radeon: Add ability to get and change dpm state when radeon PX card is turned off - LP: #1377564 * ALSA: hda/realtek - Avoid setting wrong COEF on ALC269 co - LP: #1377564 * of/irq: Fix lookup to use 'interrupts-extended' property first - LP: #1377564 * Possible null ptr deref in SMB2_tcon - LP: #1377564 * CIFS: Fix SMB2 readdir error handling - LP: #1377564 * CIFS: Fix wrong directory attributes after rename - LP: #1377564 * md/raid6: avoid data corruption during recovery of double-degraded RAID6 - LP: #1377564 * ARM: dts: i.MX53: fix apparent bug in VPU clks - LP: #1377564 * pata_scc: propagate return value of scc_wait_after_reset - LP: #1377564 * libata: widen Crucial M550 blacklist matching - LP: #1377564 * ALSA: hda - restore the gpio led after resume - LP: #1358116, #1377564 * md/raid10: fix memory leak when reshaping a RAID10. - LP: #1377564 * md/raid10: Fix memory leak when raid10 reshape completes. - LP: #1377564 * MIPS: OCTEON: make get_system_type() thread-safe - LP: #1377564 * can: c_can: checking IS_ERR() instead of NULL - LP: #1377564 * HID: logitech: perform bounds checking on device_id early enough - LP: #1377564 * firmware: Do not use WARN_ON(!spin_is_locked()) - LP: #1377564 * drm/radeon: add new KV pci id - LP: #1377564 * drm/radeon: add
[Bug 1384545] Re: CVE-2014-3647
This bug was fixed in the package linux - 3.16.0-24.32 --- linux (3.16.0-24.32) utopic; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1386635 [ Upstream Kernel Changes ] * KVM: x86: Check non-canonical addresses upon WRMSR - LP: #1384539 - CVE-2014-3610 * KVM: x86: Prevent host from panicking on shared MSR writes. - LP: #1384539 - CVE-2014-3610 * KVM: x86: Improve thread safety in pit - LP: #1384540 - CVE-2014-3611 * KVM: x86: Fix wrong masking on relative jump/call - LP: #1384545 - CVE-2014-3647 * KVM: x86: Warn if guest virtual address space is not 48-bits - LP: #1384545 - CVE-2014-3647 * KVM: x86: Emulator fixes for eip canonical checks on near branches - LP: #1384545 - CVE-2014-3647 * KVM: x86: emulating descriptor load misses long-mode case - LP: #1384545 - CVE-2014-3647 * KVM: x86: Handle errors when RIP is set during far jumps - LP: #1384545 - CVE-2014-3647 * kvm: vmx: handle invvpid vm exit gracefully - LP: #1384544 - CVE-2014-3646 -- Luis Henriques luis.henriq...@canonical.com Tue, 28 Oct 2014 10:40:55 + ** Changed in: linux (Ubuntu Utopic) Status: New = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3610 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3611 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3646 ** Changed in: linux (Ubuntu Trusty) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384545] Re: CVE-2014-3647
CVE-2014-3647 ** Also affects: linux (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Information type changed from Public Security to Private Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384545 Title: CVE-2014-3647 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs