[Bug 919115] Re: CVE-2012-0056

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 919115] Re: CVE-2012-0056

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 919115] Re: CVE-2012-0056

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 919115] Re: CVE-2012-0056

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 919115] Re: CVE-2012-0056

2016-04-24 Thread Rolf Leggewie
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
   Status: New => Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
   Status: New => Won't Fix

** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2016-02-09 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2015-12-03 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Medium
 Assignee: Andy Whitcroft (apw)
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Fix Committed

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2015-12-02 Thread Steve Beattie
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-lts-wily (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-raspi2 (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2015-10-23 Thread Mathew Hodson
** Changed in: linux (Ubuntu Precise)
   Status: Fix Released => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Released => Invalid

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: Fix Committed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2015-09-27 Thread Mathew Hodson
** Changed in: linux (Ubuntu Wily)
   Status: Fix Released => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Wily)
   Importance: Medium
 Assignee: Andy Whitcroft (apw)
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Medium
   Status: Fix Released

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: Undecided
   Status: New

** No longer affects: linux-lts-trusty (Ubuntu Hardy)

** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-lts-trusty (Ubuntu Maverick)

** No longer affects: linux-lts-trusty (Ubuntu Natty)

** No longer affects: linux-lts-trusty (Ubuntu Oneiric)

** No longer affects: linux-armadaxp (Ubuntu Hardy)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Maverick)

** No longer affects: linux-armadaxp (Ubuntu Natty)

** No longer affects: linux-armadaxp (Ubuntu Oneiric)

** No longer affects: linux-ec2 (Ubuntu Hardy)

** No longer affects: linux-ec2 (Ubuntu Lucid)

** No longer affects: linux-ec2 (Ubuntu Maverick)

** No longer affects: linux-ec2 (Ubuntu Natty)

** No longer affects: linux-ec2 (Ubuntu Oneiric)

** No longer affects: linux-goldfish (Ubuntu Hardy)

** No longer affects: linux-goldfish (Ubuntu Lucid)

** No longer affects: linux-goldfish (Ubuntu Maverick)

** No longer affects: linux-goldfish (Ubuntu Natty)

** No longer affects: linux-goldfish (Ubuntu Oneiric)

** No longer affects: linux-lts-saucy (Ubuntu Hardy)

** No longer affects: linux-lts-saucy 

[Bug 919115] Re: CVE-2012-0056

2012-02-14 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1406.8

---
linux-ti-omap4 (3.2.0-1406.8) precise; urgency=low

  [ Paolo Pisati ]

  * [Config] updateconfigs after CMA revert
  * [Config] Turn on all LIRC modules
- LP: #927526
  * rebased on 3.2.0-16.25

  [ Upstream Kernel Changes ]

  * ASoC: ABE: disable 16bits support on MM_UL path
  * ASoC: ABE - Fix L3 abort with Pulseaudio device capabilities check

  [ Ubuntu: 3.2.0-16.25 ]

  * d-i -- include the Hyper-V drivers in the virtio udeb
- LP: #917135
  * (pre-stable): ath9k_hw: fix a RTS/CTS timeout regression
- LP: #925602
  * SAUCE: drm/i915: Force explicit bpp selection for
intel_dp_link_required
- LP: #745112, #912387, #917330
  * Fix typo in generic-pae description
- LP: #928448
  * Rebase to v3.2.6
  * procfs: parse mount options
- CVE-2011-4917
  * procfs: add hidepid= and gid= mount options
- CVE-2011-4917
  * proc: fix null pointer deref in proc_pid_permission()
- CVE-2011-4917
  * xhci: Remove warnings about MSI and MSI-X capabilities.
- LP: #929656
  * xhci: Remove scary warnings about transfer issues.
- LP: #929656
  * x86, mce, therm_throt: Don't report power limit and package level
thermal throttle events in mcelog
- LP: #930288
  * rebase to v3.2.6
- LP: #924320
- LP: #918254

  [ Ubuntu: 3.2.0-15.24 ]

  * Add CONFIG_THERM_ADT746X=y to config enforcer for powerpc and
powerpc-smp flavours
- LP: #923094
  * SAUCE: acer-wmi: support for P key on TM8372
- LP: #865807
  * [Config] Rebase to v3.2.5
  * [Config] CONFIG_THERM_ADT746X=y
- LP: #923094
  * rebase to v3.2.5

  [ Ubuntu: 3.2.0-14.23 ]

  * debian -- add usage help to insert-mainline-changes
  * [Config] Rebase to v3.2.3
  * Revert ASoC: Don't go through cache when applying WM5100 rev A
updates
  * Revert ASoC: Mark WM5100 register map cache only when going into
BIAS_OFF
  * rebase to v3.2.3

  [ Ubuntu: 3.2.0-13.22 ]

  * (pre-stable): drm/radeon/kms: move panel mode setup into encoder mode
set
- LP: #925538
  * (pre-stable): drm/radeon/kms: rework modeset sequence for DCE41 and
DCE5
- LP: #925538
  * [Config] review IPv6 configuration options and enable
  * SAUCE: ALSA: HDA: Remove quirk for Toshiba Qosmio G50
- LP: #923316
  * SAUCE: ALSA: HDA: Fix jack creation for codecs with front and rear Line
In
- LP: #923409
  * SAUCE: Bluetooth: Add support for BCM20702A0 [0a5c:21e6]
- LP: #906832
  * SAUCE: Bluetooth: Add support for BCM20702A0 [0a5c:21e1]
- LP: #906832
  * SAUCE: Add vendor specific ID (0a5c 21f3) for BCM20702A0.
- LP: #925552
  * (pre-stable): drm/radeon/kms: disable output polling when suspended
- LP: #925570
  * [Config] CONFIG_BLK_DEV_PCIESSD_MTIP32XX=m
- LP: #91
  * [Config] Add mtip32xx to d-i block modules
- LP: #91
  * [Config] Enable USB3.0 in d-i
  * block: Add driver for Micron RealSSD pcie flash cards
- LP: #91
  * mtip32xx: fix warnings/errors on 32-bit compiles
- LP: #91
  * mtip32xx: cleanup compat ioctl handling
- LP: #91
  * mtip32xx: ensure that all local functions are static
- LP: #91
  * mtip32xx: mark a few more items static
- LP: #91
  * mtip32xx: add module.h include to avoid conflict with moduleh tree
- LP: #91
  * mtip32xx: update to new -make_request() API
- LP: #91
  * mtip32xx: updates based on feedback
- LP: #91
  * mtip32xx: uninitialized variable in mtip_quiesce_io()
- LP: #91
  * mtip32xx: do rebuild monitoring asynchronously
- LP: #91
  * watchdog: iTCO_wdt: add Intel Lynx Point DeviceIDs
- LP: #900119
  * drm/i915: mask transcoder select bits before setting them on LVDS
- LP: #924989
  * (pre-stable) USB: Realtek cr: fix autopm scheduling while atomic
- LP: #917962
  * nouveau: properly check for _DSM function support
- LP: #925608
  * nouveau: Support Optimus models for vga_switcheroo
- LP: #925608

  [ Ubuntu: 3.2.0-12.21 ]

  * Revert ath9k_hw: fix interpretation of the rx KeyMiss flag
- LP: #923512

  [ Ubuntu: 3.2.0-12.20 ]

  * switch to new style rebase marker with bug number
  * Add CONFIG_GPIO_TWL4030=y for arm[el|hf] to the config enforcer
- LP: #921934
  * [Config] Switch CONFIG_GPIO_TWL4030=y back on arm[el|hf].
- LP: #921934
  * Rebase to v3.2.2, CONFIG_SND_KCTL_JACK=y
  * [Config] Add Hyper-V modules to virtual inclusion list
- LP: #922063
  * Revert CHROMIUM: enable CONFIG_SECCOMP_FILTER and
CONFIG_HAVE_SECCOMP_FILTER
  * Revert CHROMIUM: Fix kref usage
  * Revert CHROMIUM: Fix seccomp_t compile error
  * Revert CHROMIUM: seccomp_filter: make inherited filters composable
  * Revert CHROMIUM: seccomp_filter: inheritance documentation
  * Revert CHROMIUM: seccomp_filter: allow CAP_SYS_ADMIN management of
execve
  * Revert CHROMIUM: seccomp_filter: remove skip from copy and add drop
helper
  * Revert CHROMIUM: seccomp_filters: clean up 

[Bug 919115] Re: CVE-2012-0056

2012-02-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1207.16

---
linux-ti-omap4 (3.0.0-1207.16) oneiric-proposed; urgency=low

  * Release Tracking Bug
- LP: #922006

  [ Upstream Kernel Changes ]

  * omap4: add 4430 ES2.3 support
- LP: #917264

  [ Ubuntu: 3.0.0-16.27 ]

  * Release Tracking Bug
- LP: #920735
  * Revert SAUCE: omap3: beagle: if rev unknown, assume xM revision C
- LP: #912199
  * Revert SAUCE: omap3: beagle: detect new xM revision C
- LP: #912199
  * Revert SAUCE: omap3: beagle: detect new xM revision B
- LP: #912199
  * Revert SAUCE: omap3: beaglexm: fix DVI initialization
- LP: #912199
  * [Config] DEFAULT_MMAP_MIN_ADDR=32k on arm
- LP: #903346
  * Revert rtc: Disable the alarm in the hardware
- LP: #913373
  * Support for Terratec G1
- LP: #821061
  * drm/radeon/kms: fix DP detect and EDID fetch for DP bridges
- LP: #825777
  * drm/radeon/kms/DCE4.1: fix Select_CrtcSource EncodeMode setting for DP
bridges (v2)
- LP: #825777
  * drm/radeon/kms: cleanup atombios_adjust_pll()
- LP: #825777
  * drm/radeon/kms/atom: rework encoder dpms
- LP: #825777
  * drm/radeon/kms: check for DP MST mode in a few more places (v2)
- LP: #825777
  * drm/radeon/kms: rework DP bridge checks
- LP: #825777
  * drm/radeon/kms: fix DP setup on TRAVIS bridges
- LP: #825777
  * ALSA: sis7019 - give slow codecs more time to reset
- LP: #907778
  * ALSA: hda/realtek - Fix Oops in alc_mux_select()
- LP: #907778
  * alarmtimers: Fix time comparison
- LP: #907778
  * ARM: davinci: da850 evm: change audio edma event queue to EVENTQ_0
- LP: #907778
  * arm: mx23: recognise stmp378x as mx23
- LP: #907778
  * ARM: at91: fix clock conid for atmel_tcb.1 on 9260/9g20
- LP: #907778
  * ARM: davinci: dm646x evm: wrong register used in
setup_vpif_input_channel_mode
- LP: #907778
  * ASoC: Provide a more complete DMA driver stub
- LP: #907778
  * fs/proc/meminfo.c: fix compilation error
- LP: #907778
  * thp: add compound tail page _mapcount when mapped
- LP: #907778
  * thp: set compound tail page _count to zero
- LP: #907778
  * ptp: Fix clock_getres() implementation
- LP: #907778
  * mm: Ensure that pfn_valid() is called once per pageblock when reserving
pageblocks
- LP: #907778
  * mm: vmalloc: check for page allocation failure before vmlist insertion
- LP: #907778
  * fix apparmor dereferencing potentially freed dentry, sanitize
__d_path() API
- LP: #907778
  * target: Handle 0 correctly in transport_get_sectors_6()
- LP: #907778
  * intel-iommu: fix return value of iommu_unmap() API
- LP: #907778
  * intel-iommu: set iommu_superpage on VM domains to lowest common
denominator
- LP: #907778
  * intel-iommu: fix superpage support in pfn_to_dma_pte()
- LP: #907778
  * percpu: fix chunk range calculation
- LP: #907778
  * iwlwifi: do not re-configure HT40 after associated
- LP: #907778
  * mac80211: fix race condition caused by late addBA response
- LP: #907778
  * linux/log2.h: Fix rounddown_pow_of_two(1)
- LP: #907778
  * hwmon: (jz4740) fix signedness bug
- LP: #907778
  * mmc: mxcmmc: fix falling back to PIO
- LP: #907778
  * x86, hpet: Immediately disable HPET timer 1 if rtc irq is masked
- LP: #907778
  * jbd/jbd2: validate sb-s_first in journal_get_superblock()
- LP: #907778
  * hfs: fix hfs_find_init() sb-ext_tree NULL ptr oops
- LP: #907778
  * hwmon: (coretemp) Fix oops on CPU offlining
- LP: #907778
  * xfs: fix nfs export of 64-bit inodes numbers on 32-bit kernels
- LP: #907778
  * xfs: avoid synchronous transactions when deleting attr blocks
- LP: #907778
  * md/raid5: fix bug that could result in reads from a failed device.
- LP: #907778
  * xen: only limit memory map to maximum reservation for domain 0.
- LP: #907778
  * ext4: display the correct mount option in /proc/mounts for
[no]init_itable
- LP: #907778
  * ext4: avoid hangs in ext4_da_should_update_i_disksize()
- LP: #907778
  * ext4: avoid potential hang in mpage_submit_io() when blocksize 
pagesize
- LP: #907778
  * ext4: handle EOF correctly in ext4_bio_write_page()
- LP: #907778
  * fuse: fix fuse_retrieve
- LP: #907778
  * staging: r8712u: Add new USB ID
- LP: #907778
  * drm/radeon/kms: add some new pci ids
- LP: #907778
  * ibft: Fix finding IBFT ACPI table on UEFI
- LP: #907778
  * USB: cdc-acm: add IDs for Motorola H24 HSPA USB module.
- LP: #907778
  * usb: option: Add Huawei E398 controlling interfaces
- LP: #907778
  * USB: option: Removing one bogus and adding some new Huawei combinations
- LP: #907778
  * ASoC: core: Don't schedule deferred_resume_work twice
- LP: #907778
  * Linux 3.0.14
- LP: #907778
  * drm/i915: Fix PCH port pipe select in CPT disable paths
- LP: #906756
  * KVM: x86: Prevent starting PIT timers in the absence of irqchip 

[Bug 919115] Re: CVE-2012-0056

2012-02-01 Thread John Johansen
** Description changed:

- incorrect /proc/pid/mem permission handling
+ The mem_write function in Linux kernel 2.6.39 and other versions, when
+ ASLR is disabled, does not properly check permissions when writing to
+ /proc/pid/mem, which allows local users to gain privileges by
+ modifying process memory, as demonstrated by Mempodipper.
  
  Break-Fix: 198214a7ee50375fa71a65e518341980cfd4b2f0
  e268337dfe26dfc7efd422a804dbb27977a3

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2012-01-31 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2012-01-25 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-15.26~lucid1

---
linux-lts-backport-oneiric (3.0.0-15.26~lucid1) lucid-security; urgency=low

  [ Upstream Kernel Changes ]

  * Revert proc: enable writing to /proc/pid/mem
- LP: #919115
- CVE-2012-0056
 -- Andy Whitcroft a...@canonical.com   Fri, 20 Jan 2012 10:19:07 +

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2012-01-25 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2012-01-25 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-security/linux-lts-backport-oneiric

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2012-01-25 Thread Alain Kalker
Sigh. I think it's about time for this: 
http://en.wikipedia.org/wiki/Capability-based_security
...when will they ever learn [2x].

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2012-01-24 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-10.18

---
linux (3.2.0-10.18) precise; urgency=low

  [ Tim Gardner ]

  * SAUCE: ecryptfs: Print inode on metadata error

  [ Upstream Kernel Changes ]

  * Revert proc: enable writing to /proc/pid/mem
- LP: #919115
- CVE-2012-0056
  * (pre-stable) ALSA: HDA: Use LPIB position fix for Macbook Pro 7, 1
- LP: #909419
 -- Andy Whitcroft a...@canonical.com   Tue, 24 Jan 2012 10:15:12 +

** Changed in: linux (Ubuntu Precise)
   Status: In Progress = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2012-01-24 Thread Markus
any progress on linux-lts-backport-oneiric for lucid? when can the fix
be expected?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2012-01-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.0.0-15.26

---
linux (3.0.0-15.26) oneiric-security; urgency=low

  [ Upstream Kernel Changes ]

  * Revert proc: enable writing to /proc/pid/mem
- LP: #919115
- CVE-2012-0056
 -- Andy Whitcroft a...@canonical.com   Fri, 20 Jan 2012 10:19:07 +

** Changed in: linux (Ubuntu Oneiric)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2012-01-23 Thread Matteo Rapone
Mempodipper exploit doesn't work anymore with this update (on Ubuntu
11.10). I guess I can confirm that the bug is fixed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2012-01-23 Thread Andy Whitcroft
** Changed in: linux (Ubuntu Oneiric)
   Status: Fix Released = Fix Committed

** Changed in: linux (Ubuntu Oneiric)
 Assignee: (unassigned) = Andy Whitcroft (apw)

** Changed in: linux (Ubuntu Precise)
   Status: New = In Progress

** Changed in: linux (Ubuntu Precise)
 Assignee: (unassigned) = Andy Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 919115] Re: CVE-2012-0056

2012-01-23 Thread John Johansen
** Changed in: linux-ec2 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Natty)
   Status: New = Invalid

** Description changed:

- Placeholder
+ incorrect /proc/pid/mem permission handling
+ 
+ Break-Fix: 198214a7ee50375fa71a65e518341980cfd4b2f0
+ e268337dfe26dfc7efd422a804dbb27977a3

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided = Medium

** Changed in: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-ec2 (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided = Medium

** Changed in: linux-ec2 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Maverick)
   Importance: Undecided = Medium

** Changed in: linux-ec2 (Ubuntu Natty)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Natty)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided = Medium

** Changed in: 

[Bug 919115] Re: CVE-2012-0056

2012-01-20 Thread Andy Whitcroft
CVE-2012-0056

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115

Title:
  CVE-2012-0056

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/919115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs