[Bug 1384545] Re: CVE-2014-3647

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1384545] Re: CVE-2014-3647

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: Fix Committed => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1384545] Re: CVE-2014-3647

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Precise)
   Importance: Undecided => High

** Changed in: linux-snapdragon (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Wily)
   Importance: Undecided => High

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Importance: Undecided => High

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Importance: Undecided => High

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2016-04-26 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety)
   Importance: High
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Yakkety)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-mako (Ubuntu Yakkety)
   Importance: High
   Status: New

** Also affects: linux-manta (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Yakkety)
   Importance: High
   Status: New

** Also affects: linux-flo (Ubuntu Yakkety)
   Importance: High
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

** Also affects: linux-raspi2 (Ubuntu Yakkety)
   Importance: High
   Status: Fix Committed

** Also affects: linux-lts-xenial (Ubuntu Yakkety)
   Importance: High
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2016-04-18 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => High

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => High

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => High

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => High

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => High

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => High

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => High

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => High

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => High

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => High

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => High

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2015-10-28 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: High
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: High
   Status: New

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: High
   Status: New

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: High
   Status: New

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: High
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: High
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2015-05-21 Thread Andy Whitcroft
** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Invalid = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily)
   Importance: High
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-mako (Ubuntu Wily)
   Importance: High
   Status: New

** Also affects: linux-manta (Ubuntu Wily)
   Importance: High
   Status: New

** Also affects: linux-goldfish (Ubuntu Wily)
   Importance: High
   Status: New

** Also affects: linux-flo (Ubuntu Wily)
   Importance: High
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Importance: Undecided = High

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Importance: Undecided = High

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Importance: Undecided = High

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Importance: Undecided = High

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New = Fix Committed

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Importance: Undecided = High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-ec2 (Ubuntu Lucid)

** No longer affects: linux-goldfish (Ubuntu Lucid)

** No longer affects: linux-lts-saucy (Ubuntu Lucid)

** No longer affects: linux-lts-quantal (Ubuntu Lucid)

** No longer affects: linux-mvl-dove (Ubuntu Lucid)

** No longer affects: linux-ti-omap4 (Ubuntu Lucid)

** No longer affects: linux (Ubuntu Lucid)

** No longer affects: linux-mako (Ubuntu Lucid)

** No longer affects: linux-fsl-imx51 (Ubuntu Lucid)

** No longer affects: linux-lts-utopic (Ubuntu Lucid)

** No longer affects: linux-flo (Ubuntu Lucid)

** No longer affects: linux-lts-raring (Ubuntu Lucid)

** No longer affects: linux-manta (Ubuntu Lucid)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2015-01-28 Thread John Johansen
** Changed in: linux-flo (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Precise)
   Importance: Undecided = High

** Changed in: linux-flo (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Trusty)
   Importance: Undecided = High

** Changed in: linux-flo (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Lucid)
   Importance: Undecided = High

** Changed in: linux-flo (Ubuntu Vivid)
   Importance: Undecided = High

** Changed in: linux-flo (Ubuntu Utopic)
   Importance: Undecided = High

** Changed in: linux-goldfish (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Precise)
   Importance: Undecided = High

** Changed in: linux-goldfish (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Trusty)
   Importance: Undecided = High

** Changed in: linux-goldfish (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Lucid)
   Importance: Undecided = High

** Changed in: linux-goldfish (Ubuntu Vivid)
   Importance: Undecided = High

** Changed in: linux-goldfish (Ubuntu Utopic)
   Importance: Undecided = High

** Changed in: linux-mako (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Precise)
   Importance: Undecided = High

** Changed in: linux-mako (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Trusty)
   Importance: Undecided = High

** Changed in: linux-mako (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Lucid)
   Importance: Undecided = High

** Changed in: linux-mako (Ubuntu Vivid)
   Importance: Undecided = High

** Changed in: linux-mako (Ubuntu Utopic)
   Importance: Undecided = High

** Changed in: linux-manta (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Precise)
   Importance: Undecided = High

** Changed in: linux-manta (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Trusty)
   Importance: Undecided = High

** Changed in: linux-manta (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Lucid)
   Importance: Undecided = High

** Changed in: linux-manta (Ubuntu Vivid)
   Importance: Undecided = High

** Changed in: linux-manta (Ubuntu Utopic)
   Importance: Undecided = High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2014-12-08 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New = Fix Released

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Importance: Undecided = High

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided = High

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Importance: Undecided = High

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided = High

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided = High

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Importance: Undecided = High

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Importance: Undecided = High

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Importance: Undecided = High

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Importance: Undecided = High

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Importance: Undecided = High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2014-12-01 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2014-11-13 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2014-11-12 Thread John Johansen
** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Precise)
   Status: New = Fix Committed

** Description changed:

- kvm currently mishandles noncanonical addresses when emulating
- instructions that change rip (eg branches, calls), potentially causing a
- failed VM-entry. A guest user with access to I/O or MMIO region can use
- this flaw to crash the guest.
+ arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through
+ 3.17.2 does not properly perform RIP changes, which allows guest OS
+ users to cause a denial of service (guest OS crash) via a crafted
+ application. A guest user with access to I/O or MMIO region can use this
+ flaw to crash the guest.
  
  Break-Fix: - 234f3ce485d54017f15cf5e0699cff4100121601
  Break-Fix: - d1442d85cc30ea75f7d399474ca738e0bc96f715

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2014-11-03 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2014-10-30 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.16.0-24.32

---
linux (3.16.0-24.32) utopic; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1386635

  [ Upstream Kernel Changes ]

  * KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Prevent host from panicking on shared MSR writes.
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
- LP: #1384540
- CVE-2014-3611
  * KVM: x86: Fix wrong masking on relative jump/call
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: Warn if guest virtual address space is not 48-bits
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: Emulator fixes for eip canonical checks on near branches
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: emulating descriptor load misses long-mode case
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: Handle errors when RIP is set during far jumps
- LP: #1384545
- CVE-2014-3647
  * kvm: vmx: handle invvpid vm exit gracefully
- LP: #1384544
- CVE-2014-3646
 -- Luis Henriques luis.henriq...@canonical.com   Tue, 28 Oct 2014 10:40:55 
+

** Changed in: linux (Ubuntu Vivid)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2014-10-30 Thread John Johansen
** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2014-10-29 Thread Andy Whitcroft
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2014-10-29 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty

** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2014-10-28 Thread John Johansen
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2014-10-28 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-39.66

---
linux (3.13.0-39.66) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1386629

  [ Upstream Kernel Changes ]

  * KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Prevent host from panicking on shared MSR writes.
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
- LP: #1384540
- CVE-2014-3611
  * KVM: x86: Fix wrong masking on relative jump/call
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: Warn if guest virtual address space is not 48-bits
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: Emulator fixes for eip canonical checks on near branches
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: emulating descriptor load misses long-mode case
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: Handle errors when RIP is set during far jumps
- LP: #1384545
- CVE-2014-3647
  * kvm: vmx: handle invvpid vm exit gracefully
- LP: #1384544
- CVE-2014-3646
  * Input: synaptics - gate forcepad support by DMI check
- LP: #1381815

linux (3.13.0-38.65) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1379244

  [ Andy Whitcroft ]

  * Revert SAUCE: scsi: hyper-v storsvc switch up to SPC-3
- LP: #1354397
  * [Config] linux-image-extra is additive to linux-image
- LP: #1375310
  * [Config] linux-image-extra postrm is not needed on purge
- LP: #1375310

  [ Upstream Kernel Changes ]

  * Revert KVM: x86: Increase the number of fixed MTRR regs to 10
- LP: #1377564
  * Revert USB: option,zte_ev: move most ZTE CDMA devices to zte_ev
- LP: #1377564
  * aufs: bugfix, stop calling security_mmap_file() again
- LP: #1371316
  * ipvs: fix ipv6 hook registration for local replies
- LP: #1349768
  * Drivers: add blist flags
- LP: #1354397
  * sd: fix a bug in deriving the FLUSH_TIMEOUT from the basic I/O timeout
- LP: #1354397
  * drm/i915/bdw: Add 42ms delay for IPS disable
- LP: #1374389
  * drm/i915: add null render states for gen6, gen7 and gen8
- LP: #1374389
  * drm/i915/bdw: 3D_CHICKEN3 has write mask bits
- LP: #1374389
  * drm/i915/bdw: Disable idle DOP clock gating
- LP: #1374389
  * drm/i915: call lpt_init_clock_gating on BDW too
- LP: #1374389
  * drm/i915: shuffle panel code
- LP: #1374389
  * drm/i915: extract backlight minimum brightness from VBT
- LP: #1374389
  * drm/i915: respect the VBT minimum backlight brightness
- LP: #1374389
  * drm/i915/bdw: Apply workarounds in render ring init function
- LP: #1374389
  * drm/i915/bdw: Cleanup pre prod workarounds
- LP: #1374389
  * drm/i915: Replace hardcoded cacheline size with macro
- LP: #1374389
  * drm/i915: Refactor Broadwell PIPE_CONTROL emission into a helper.
- LP: #1374389
  * drm/i915: Add the WaCsStallBeforeStateCacheInvalidate:bdw workaround.
- LP: #1374389
  * drm/i915/bdw: Remove BDW preproduction W/As until C stepping.
- LP: #1374389
  * mptfusion: enable no_write_same for vmware scsi disks
- LP: #1371591
  * iommu/amd: Fix cleanup_domain for mass device removal
- LP: #1375266
  * cifs: mask off top byte in get_rfc1002_length()
- LP: #1372482
  * Input: synaptics - add support for ForcePads
- LP: #1377564
  * ASoC: pxa-ssp: drop SNDRV_PCM_FMTBIT_S24_LE
- LP: #1377564
  * drm/radeon: add bapm module parameter
- LP: #1377564
  * drm/radeon: Add missing lines to ci_set_thermal_temperature_range
- LP: #1377564
  * drm/radeon: Add ability to get and change dpm state when radeon PX card
is turned off
- LP: #1377564
  * ALSA: hda/realtek - Avoid setting wrong COEF on ALC269  co
- LP: #1377564
  * of/irq: Fix lookup to use 'interrupts-extended' property first
- LP: #1377564
  * Possible null ptr deref in SMB2_tcon
- LP: #1377564
  * CIFS: Fix SMB2 readdir error handling
- LP: #1377564
  * CIFS: Fix wrong directory attributes after rename
- LP: #1377564
  * md/raid6: avoid data corruption during recovery of double-degraded
RAID6
- LP: #1377564
  * ARM: dts: i.MX53: fix apparent bug in VPU clks
- LP: #1377564
  * pata_scc: propagate return value of scc_wait_after_reset
- LP: #1377564
  * libata: widen Crucial M550 blacklist matching
- LP: #1377564
  * ALSA: hda - restore the gpio led after resume
- LP: #1358116, #1377564
  * md/raid10: fix memory leak when reshaping a RAID10.
- LP: #1377564
  * md/raid10: Fix memory leak when raid10 reshape completes.
- LP: #1377564
  * MIPS: OCTEON: make get_system_type() thread-safe
- LP: #1377564
  * can: c_can: checking IS_ERR() instead of NULL
- LP: #1377564
  * HID: logitech: perform bounds checking on device_id early enough
- LP: #1377564
  * firmware: Do not use WARN_ON(!spin_is_locked())
- LP: #1377564
  * drm/radeon: add new KV pci id
- LP: #1377564
  * drm/radeon: add 

[Bug 1384545] Re: CVE-2014-3647

2014-10-28 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.16.0-24.32

---
linux (3.16.0-24.32) utopic; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1386635

  [ Upstream Kernel Changes ]

  * KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Prevent host from panicking on shared MSR writes.
- LP: #1384539
- CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
- LP: #1384540
- CVE-2014-3611
  * KVM: x86: Fix wrong masking on relative jump/call
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: Warn if guest virtual address space is not 48-bits
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: Emulator fixes for eip canonical checks on near branches
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: emulating descriptor load misses long-mode case
- LP: #1384545
- CVE-2014-3647
  * KVM: x86: Handle errors when RIP is set during far jumps
- LP: #1384545
- CVE-2014-3647
  * kvm: vmx: handle invvpid vm exit gracefully
- LP: #1384544
- CVE-2014-3646
 -- Luis Henriques luis.henriq...@canonical.com   Tue, 28 Oct 2014 10:40:55 
+

** Changed in: linux (Ubuntu Utopic)
   Status: New = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3610

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3611

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3646

** Changed in: linux (Ubuntu Trusty)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384545] Re: CVE-2014-3647

2014-10-22 Thread John Johansen
CVE-2014-3647

** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Information type changed from Public Security to Private Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs