[Bug 919115] Re: CVE-2012-0056
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
** Also affects: linux (Ubuntu Xenial) Importance: Medium Assignee: Andy Whitcroft (apw) Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-mako (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-manta (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-lts-wily (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-raspi2 (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) ** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
** Changed in: linux (Ubuntu Precise) Status: Fix Released => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Released => Invalid ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
** Changed in: linux (Ubuntu Wily) Status: Fix Released => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Wily) Importance: Medium Assignee: Andy Whitcroft (apw) Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Medium Status: Fix Released ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: Undecided Status: New ** No longer affects: linux-lts-trusty (Ubuntu Hardy) ** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-lts-trusty (Ubuntu Maverick) ** No longer affects: linux-lts-trusty (Ubuntu Natty) ** No longer affects: linux-lts-trusty (Ubuntu Oneiric) ** No longer affects: linux-armadaxp (Ubuntu Hardy) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Maverick) ** No longer affects: linux-armadaxp (Ubuntu Natty) ** No longer affects: linux-armadaxp (Ubuntu Oneiric) ** No longer affects: linux-ec2 (Ubuntu Hardy) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Maverick) ** No longer affects: linux-ec2 (Ubuntu Natty) ** No longer affects: linux-ec2 (Ubuntu Oneiric) ** No longer affects: linux-goldfish (Ubuntu Hardy) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Maverick) ** No longer affects: linux-goldfish (Ubuntu Natty) ** No longer affects: linux-goldfish (Ubuntu Oneiric) ** No longer affects: linux-lts-saucy (Ubuntu Hardy) ** No longer affects: linux-lts-saucy
[Bug 919115] Re: CVE-2012-0056
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1406.8 --- linux-ti-omap4 (3.2.0-1406.8) precise; urgency=low [ Paolo Pisati ] * [Config] updateconfigs after CMA revert * [Config] Turn on all LIRC modules - LP: #927526 * rebased on 3.2.0-16.25 [ Upstream Kernel Changes ] * ASoC: ABE: disable 16bits support on MM_UL path * ASoC: ABE - Fix L3 abort with Pulseaudio device capabilities check [ Ubuntu: 3.2.0-16.25 ] * d-i -- include the Hyper-V drivers in the virtio udeb - LP: #917135 * (pre-stable): ath9k_hw: fix a RTS/CTS timeout regression - LP: #925602 * SAUCE: drm/i915: Force explicit bpp selection for intel_dp_link_required - LP: #745112, #912387, #917330 * Fix typo in generic-pae description - LP: #928448 * Rebase to v3.2.6 * procfs: parse mount options - CVE-2011-4917 * procfs: add hidepid= and gid= mount options - CVE-2011-4917 * proc: fix null pointer deref in proc_pid_permission() - CVE-2011-4917 * xhci: Remove warnings about MSI and MSI-X capabilities. - LP: #929656 * xhci: Remove scary warnings about transfer issues. - LP: #929656 * x86, mce, therm_throt: Don't report power limit and package level thermal throttle events in mcelog - LP: #930288 * rebase to v3.2.6 - LP: #924320 - LP: #918254 [ Ubuntu: 3.2.0-15.24 ] * Add CONFIG_THERM_ADT746X=y to config enforcer for powerpc and powerpc-smp flavours - LP: #923094 * SAUCE: acer-wmi: support for P key on TM8372 - LP: #865807 * [Config] Rebase to v3.2.5 * [Config] CONFIG_THERM_ADT746X=y - LP: #923094 * rebase to v3.2.5 [ Ubuntu: 3.2.0-14.23 ] * debian -- add usage help to insert-mainline-changes * [Config] Rebase to v3.2.3 * Revert ASoC: Don't go through cache when applying WM5100 rev A updates * Revert ASoC: Mark WM5100 register map cache only when going into BIAS_OFF * rebase to v3.2.3 [ Ubuntu: 3.2.0-13.22 ] * (pre-stable): drm/radeon/kms: move panel mode setup into encoder mode set - LP: #925538 * (pre-stable): drm/radeon/kms: rework modeset sequence for DCE41 and DCE5 - LP: #925538 * [Config] review IPv6 configuration options and enable * SAUCE: ALSA: HDA: Remove quirk for Toshiba Qosmio G50 - LP: #923316 * SAUCE: ALSA: HDA: Fix jack creation for codecs with front and rear Line In - LP: #923409 * SAUCE: Bluetooth: Add support for BCM20702A0 [0a5c:21e6] - LP: #906832 * SAUCE: Bluetooth: Add support for BCM20702A0 [0a5c:21e1] - LP: #906832 * SAUCE: Add vendor specific ID (0a5c 21f3) for BCM20702A0. - LP: #925552 * (pre-stable): drm/radeon/kms: disable output polling when suspended - LP: #925570 * [Config] CONFIG_BLK_DEV_PCIESSD_MTIP32XX=m - LP: #91 * [Config] Add mtip32xx to d-i block modules - LP: #91 * [Config] Enable USB3.0 in d-i * block: Add driver for Micron RealSSD pcie flash cards - LP: #91 * mtip32xx: fix warnings/errors on 32-bit compiles - LP: #91 * mtip32xx: cleanup compat ioctl handling - LP: #91 * mtip32xx: ensure that all local functions are static - LP: #91 * mtip32xx: mark a few more items static - LP: #91 * mtip32xx: add module.h include to avoid conflict with moduleh tree - LP: #91 * mtip32xx: update to new -make_request() API - LP: #91 * mtip32xx: updates based on feedback - LP: #91 * mtip32xx: uninitialized variable in mtip_quiesce_io() - LP: #91 * mtip32xx: do rebuild monitoring asynchronously - LP: #91 * watchdog: iTCO_wdt: add Intel Lynx Point DeviceIDs - LP: #900119 * drm/i915: mask transcoder select bits before setting them on LVDS - LP: #924989 * (pre-stable) USB: Realtek cr: fix autopm scheduling while atomic - LP: #917962 * nouveau: properly check for _DSM function support - LP: #925608 * nouveau: Support Optimus models for vga_switcheroo - LP: #925608 [ Ubuntu: 3.2.0-12.21 ] * Revert ath9k_hw: fix interpretation of the rx KeyMiss flag - LP: #923512 [ Ubuntu: 3.2.0-12.20 ] * switch to new style rebase marker with bug number * Add CONFIG_GPIO_TWL4030=y for arm[el|hf] to the config enforcer - LP: #921934 * [Config] Switch CONFIG_GPIO_TWL4030=y back on arm[el|hf]. - LP: #921934 * Rebase to v3.2.2, CONFIG_SND_KCTL_JACK=y * [Config] Add Hyper-V modules to virtual inclusion list - LP: #922063 * Revert CHROMIUM: enable CONFIG_SECCOMP_FILTER and CONFIG_HAVE_SECCOMP_FILTER * Revert CHROMIUM: Fix kref usage * Revert CHROMIUM: Fix seccomp_t compile error * Revert CHROMIUM: seccomp_filter: make inherited filters composable * Revert CHROMIUM: seccomp_filter: inheritance documentation * Revert CHROMIUM: seccomp_filter: allow CAP_SYS_ADMIN management of execve * Revert CHROMIUM: seccomp_filter: remove skip from copy and add drop helper * Revert CHROMIUM: seccomp_filters: clean up
[Bug 919115] Re: CVE-2012-0056
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1207.16 --- linux-ti-omap4 (3.0.0-1207.16) oneiric-proposed; urgency=low * Release Tracking Bug - LP: #922006 [ Upstream Kernel Changes ] * omap4: add 4430 ES2.3 support - LP: #917264 [ Ubuntu: 3.0.0-16.27 ] * Release Tracking Bug - LP: #920735 * Revert SAUCE: omap3: beagle: if rev unknown, assume xM revision C - LP: #912199 * Revert SAUCE: omap3: beagle: detect new xM revision C - LP: #912199 * Revert SAUCE: omap3: beagle: detect new xM revision B - LP: #912199 * Revert SAUCE: omap3: beaglexm: fix DVI initialization - LP: #912199 * [Config] DEFAULT_MMAP_MIN_ADDR=32k on arm - LP: #903346 * Revert rtc: Disable the alarm in the hardware - LP: #913373 * Support for Terratec G1 - LP: #821061 * drm/radeon/kms: fix DP detect and EDID fetch for DP bridges - LP: #825777 * drm/radeon/kms/DCE4.1: fix Select_CrtcSource EncodeMode setting for DP bridges (v2) - LP: #825777 * drm/radeon/kms: cleanup atombios_adjust_pll() - LP: #825777 * drm/radeon/kms/atom: rework encoder dpms - LP: #825777 * drm/radeon/kms: check for DP MST mode in a few more places (v2) - LP: #825777 * drm/radeon/kms: rework DP bridge checks - LP: #825777 * drm/radeon/kms: fix DP setup on TRAVIS bridges - LP: #825777 * ALSA: sis7019 - give slow codecs more time to reset - LP: #907778 * ALSA: hda/realtek - Fix Oops in alc_mux_select() - LP: #907778 * alarmtimers: Fix time comparison - LP: #907778 * ARM: davinci: da850 evm: change audio edma event queue to EVENTQ_0 - LP: #907778 * arm: mx23: recognise stmp378x as mx23 - LP: #907778 * ARM: at91: fix clock conid for atmel_tcb.1 on 9260/9g20 - LP: #907778 * ARM: davinci: dm646x evm: wrong register used in setup_vpif_input_channel_mode - LP: #907778 * ASoC: Provide a more complete DMA driver stub - LP: #907778 * fs/proc/meminfo.c: fix compilation error - LP: #907778 * thp: add compound tail page _mapcount when mapped - LP: #907778 * thp: set compound tail page _count to zero - LP: #907778 * ptp: Fix clock_getres() implementation - LP: #907778 * mm: Ensure that pfn_valid() is called once per pageblock when reserving pageblocks - LP: #907778 * mm: vmalloc: check for page allocation failure before vmlist insertion - LP: #907778 * fix apparmor dereferencing potentially freed dentry, sanitize __d_path() API - LP: #907778 * target: Handle 0 correctly in transport_get_sectors_6() - LP: #907778 * intel-iommu: fix return value of iommu_unmap() API - LP: #907778 * intel-iommu: set iommu_superpage on VM domains to lowest common denominator - LP: #907778 * intel-iommu: fix superpage support in pfn_to_dma_pte() - LP: #907778 * percpu: fix chunk range calculation - LP: #907778 * iwlwifi: do not re-configure HT40 after associated - LP: #907778 * mac80211: fix race condition caused by late addBA response - LP: #907778 * linux/log2.h: Fix rounddown_pow_of_two(1) - LP: #907778 * hwmon: (jz4740) fix signedness bug - LP: #907778 * mmc: mxcmmc: fix falling back to PIO - LP: #907778 * x86, hpet: Immediately disable HPET timer 1 if rtc irq is masked - LP: #907778 * jbd/jbd2: validate sb-s_first in journal_get_superblock() - LP: #907778 * hfs: fix hfs_find_init() sb-ext_tree NULL ptr oops - LP: #907778 * hwmon: (coretemp) Fix oops on CPU offlining - LP: #907778 * xfs: fix nfs export of 64-bit inodes numbers on 32-bit kernels - LP: #907778 * xfs: avoid synchronous transactions when deleting attr blocks - LP: #907778 * md/raid5: fix bug that could result in reads from a failed device. - LP: #907778 * xen: only limit memory map to maximum reservation for domain 0. - LP: #907778 * ext4: display the correct mount option in /proc/mounts for [no]init_itable - LP: #907778 * ext4: avoid hangs in ext4_da_should_update_i_disksize() - LP: #907778 * ext4: avoid potential hang in mpage_submit_io() when blocksize pagesize - LP: #907778 * ext4: handle EOF correctly in ext4_bio_write_page() - LP: #907778 * fuse: fix fuse_retrieve - LP: #907778 * staging: r8712u: Add new USB ID - LP: #907778 * drm/radeon/kms: add some new pci ids - LP: #907778 * ibft: Fix finding IBFT ACPI table on UEFI - LP: #907778 * USB: cdc-acm: add IDs for Motorola H24 HSPA USB module. - LP: #907778 * usb: option: Add Huawei E398 controlling interfaces - LP: #907778 * USB: option: Removing one bogus and adding some new Huawei combinations - LP: #907778 * ASoC: core: Don't schedule deferred_resume_work twice - LP: #907778 * Linux 3.0.14 - LP: #907778 * drm/i915: Fix PCH port pipe select in CPT disable paths - LP: #906756 * KVM: x86: Prevent starting PIT timers in the absence of irqchip
[Bug 919115] Re: CVE-2012-0056
** Description changed: - incorrect /proc/pid/mem permission handling + The mem_write function in Linux kernel 2.6.39 and other versions, when + ASLR is disabled, does not properly check permissions when writing to + /proc/pid/mem, which allows local users to gain privileges by + modifying process memory, as demonstrated by Mempodipper. Break-Fix: 198214a7ee50375fa71a65e518341980cfd4b2f0 e268337dfe26dfc7efd422a804dbb27977a3 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
This bug was fixed in the package linux-lts-backport-oneiric - 3.0.0-15.26~lucid1 --- linux-lts-backport-oneiric (3.0.0-15.26~lucid1) lucid-security; urgency=low [ Upstream Kernel Changes ] * Revert proc: enable writing to /proc/pid/mem - LP: #919115 - CVE-2012-0056 -- Andy Whitcroft a...@canonical.com Fri, 20 Jan 2012 10:19:07 + ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
** Branch linked: lp:ubuntu/lucid-security/linux-lts-backport-oneiric -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
Sigh. I think it's about time for this: http://en.wikipedia.org/wiki/Capability-based_security ...when will they ever learn [2x]. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
This bug was fixed in the package linux - 3.2.0-10.18 --- linux (3.2.0-10.18) precise; urgency=low [ Tim Gardner ] * SAUCE: ecryptfs: Print inode on metadata error [ Upstream Kernel Changes ] * Revert proc: enable writing to /proc/pid/mem - LP: #919115 - CVE-2012-0056 * (pre-stable) ALSA: HDA: Use LPIB position fix for Macbook Pro 7, 1 - LP: #909419 -- Andy Whitcroft a...@canonical.com Tue, 24 Jan 2012 10:15:12 + ** Changed in: linux (Ubuntu Precise) Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
any progress on linux-lts-backport-oneiric for lucid? when can the fix be expected? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
This bug was fixed in the package linux - 3.0.0-15.26 --- linux (3.0.0-15.26) oneiric-security; urgency=low [ Upstream Kernel Changes ] * Revert proc: enable writing to /proc/pid/mem - LP: #919115 - CVE-2012-0056 -- Andy Whitcroft a...@canonical.com Fri, 20 Jan 2012 10:19:07 + ** Changed in: linux (Ubuntu Oneiric) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
Mempodipper exploit doesn't work anymore with this update (on Ubuntu 11.10). I guess I can confirm that the bug is fixed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
** Changed in: linux (Ubuntu Oneiric) Status: Fix Released = Fix Committed ** Changed in: linux (Ubuntu Oneiric) Assignee: (unassigned) = Andy Whitcroft (apw) ** Changed in: linux (Ubuntu Precise) Status: New = In Progress ** Changed in: linux (Ubuntu Precise) Assignee: (unassigned) = Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 919115] Re: CVE-2012-0056
** Changed in: linux-ec2 (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Maverick) Status: New = Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Maverick) Status: New = Invalid ** Changed in: linux-mvl-dove (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Maverick) Status: New = Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Natty) Status: New = Invalid ** Changed in: linux (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux (Ubuntu Maverick) Status: New = Invalid ** Changed in: linux (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-ti-omap4 (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-ti-omap4 (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: New = Invalid ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Maverick) Status: New = Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Natty) Status: New = Invalid ** Description changed: - Placeholder + incorrect /proc/pid/mem permission handling + + Break-Fix: 198214a7ee50375fa71a65e518341980cfd4b2f0 + e268337dfe26dfc7efd422a804dbb27977a3 ** Changed in: linux-ec2 (Ubuntu Oneiric) Importance: Undecided = Medium ** Changed in: linux-ec2 (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-ec2 (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-ec2 (Ubuntu Hardy) Importance: Undecided = Medium ** Changed in: linux-ec2 (Ubuntu Maverick) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Maverick) Importance: Undecided = Medium ** Changed in: linux-ec2 (Ubuntu Natty) Importance: Undecided = Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Importance: Undecided = Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Importance: Undecided = Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick) Importance: Undecided = Medium ** Changed in: linux-lts-backport-oneiric (Ubuntu Natty) Importance: Undecided = Medium ** Changed in: linux-lts-backport-natty (Ubuntu Oneiric) Importance: Undecided = Medium ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-backport-natty (Ubuntu Hardy) Importance: Undecided = Medium ** Changed in:
[Bug 919115] Re: CVE-2012-0056
CVE-2012-0056 ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Hardy) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/919115 Title: CVE-2012-0056 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs