[Bug 949905] Re: CVE-2012-1097

2016-07-22 Thread Mathew Hodson
** Changed in: linux (Ubuntu)
   Status: Fix Released => Invalid

** Changed in: linux (Ubuntu Precise)
   Status: Fix Released => Invalid

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Released => Invalid

** Changed in: linux (Ubuntu Vivid)
   Status: Fix Released => Invalid

** Changed in: linux (Ubuntu Wily)
   Status: Fix Released => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: Fix Released => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2016-02-09 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2015-11-15 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2015-10-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Medium
 Assignee: Andy Whitcroft (apw)
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily)
   Importance: Medium
 Assignee: Andy Whitcroft (apw)
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mako (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-manta (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-flo (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Importance: Undecided = Medium

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New = Fix Committed

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-ec2 (Ubuntu Lucid)

** No longer affects: linux-goldfish (Ubuntu Lucid)

** No longer affects: linux-lts-saucy (Ubuntu Lucid)

** No longer affects: linux-lts-quantal (Ubuntu Lucid)

** No longer affects: linux-mvl-dove (Ubuntu Lucid)

** No longer affects: linux-ti-omap4 (Ubuntu Lucid)

** No longer affects: linux (Ubuntu Lucid)

** No longer affects: linux-mako (Ubuntu Lucid)

** No longer affects: linux-fsl-imx51 (Ubuntu Lucid)

** No longer affects: linux-lts-utopic (Ubuntu Lucid)

** No longer affects: linux-flo (Ubuntu Lucid)

** No longer affects: linux-lts-raring (Ubuntu Lucid)

** No longer affects: linux-manta (Ubuntu Lucid)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2015-01-27 Thread John Johansen
** Changed in: linux-goldfish (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-goldfish (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-flo (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-flo (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-mako (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-manta (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Utopic)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2014-12-05 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Importance: Undecided = Medium

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2014-10-27 Thread John Johansen
** Also affects: linux (Ubuntu Vivid)
   Importance: Medium
 Assignee: Andy Whitcroft (apw)
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Vivid)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2014-07-22 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Saucy)

** No longer affects: linux-ec2 (Ubuntu Saucy)

** No longer affects: linux-lts-saucy (Ubuntu Saucy)

** No longer affects: linux-lts-quantal (Ubuntu Saucy)

** No longer affects: linux-mvl-dove (Ubuntu Saucy)

** No longer affects: linux (Ubuntu Saucy)

** No longer affects: linux-fsl-imx51 (Ubuntu Saucy)

** No longer affects: linux-ti-omap4 (Ubuntu Saucy)

** No longer affects: linux-lts-raring (Ubuntu Saucy)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2014-05-19 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Quantal)

** No longer affects: linux-ec2 (Ubuntu Quantal)

** No longer affects: linux-lts-saucy (Ubuntu Quantal)

** No longer affects: linux-lts-quantal (Ubuntu Quantal)

** No longer affects: linux-mvl-dove (Ubuntu Quantal)

** No longer affects: linux (Ubuntu Quantal)

** No longer affects: linux-fsl-imx51 (Ubuntu Quantal)

** No longer affects: linux-ti-omap4 (Ubuntu Quantal)

** No longer affects: linux-lts-raring (Ubuntu Quantal)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2014-04-25 Thread John Johansen
** Also affects: linux (Ubuntu Utopic)
   Importance: Medium
 Assignee: Andy Whitcroft (apw)
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Utopic)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2014-01-28 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Raring)

** No longer affects: linux-ec2 (Ubuntu Raring)

** No longer affects: linux-lts-saucy (Ubuntu Raring)

** No longer affects: linux-lts-quantal (Ubuntu Raring)

** No longer affects: linux-mvl-dove (Ubuntu Raring)

** No longer affects: linux (Ubuntu Raring)

** No longer affects: linux-fsl-imx51 (Ubuntu Raring)

** No longer affects: linux-ti-omap4 (Ubuntu Raring)

** No longer affects: linux-lts-raring (Ubuntu Raring)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2013-12-02 Thread John Johansen
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
   Status: Fix Released = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2013-11-14 Thread John Johansen
** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-saucy (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Saucy)
   Importance: Undecided = Medium

** Changed in: linux-lts-saucy (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-saucy (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux-lts-saucy (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Quantal)
   Importance: Undecided = Medium

** Changed in: linux-lts-saucy (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-saucy (Ubuntu Raring)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2013-10-25 Thread John Johansen
** Also affects: linux (Ubuntu Trusty)
   Importance: Medium
 Assignee: Andy Whitcroft (apw)
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Medium
   Status: Fix Released

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Trusty)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2013-05-10 Thread John Johansen
** No longer affects: linux-armadaxp (Ubuntu Hardy)

** No longer affects: linux-armadaxp (Ubuntu Oneiric)

** No longer affects: linux-ec2 (Ubuntu Hardy)

** No longer affects: linux-ec2 (Ubuntu Oneiric)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Oneiric)

** No longer affects: linux-lts-backport-natty (Ubuntu Hardy)

** No longer affects: linux-lts-backport-natty (Ubuntu Oneiric)

** No longer affects: linux-lts-quantal (Ubuntu Hardy)

** No longer affects: linux-lts-quantal (Ubuntu Oneiric)

** No longer affects: linux-mvl-dove (Ubuntu Hardy)

** No longer affects: linux-mvl-dove (Ubuntu Oneiric)

** No longer affects: linux-lts-backport-maverick (Ubuntu Hardy)

** No longer affects: linux-lts-backport-maverick (Ubuntu Oneiric)

** No longer affects: linux (Ubuntu Hardy)

** No longer affects: linux (Ubuntu Oneiric)

** No longer affects: linux-fsl-imx51 (Ubuntu Hardy)

** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric)

** No longer affects: linux-ti-omap4 (Ubuntu Hardy)

** No longer affects: linux-ti-omap4 (Ubuntu Oneiric)

** No longer affects: linux-lts-raring (Ubuntu Hardy)

** No longer affects: linux-lts-raring (Ubuntu Oneiric)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2013-05-09 Thread John Johansen
** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-raring (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Oneiric)
   Importance: Undecided = Medium

** Changed in: linux-lts-raring (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-raring (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Saucy)
   Importance: Undecided = Medium

** Changed in: linux-lts-raring (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Hardy)
   Importance: Undecided = Medium

** Changed in: linux-lts-raring (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Quantal)
   Importance: Undecided = Medium

** Changed in: linux-lts-raring (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-raring (Ubuntu Raring)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2013-04-30 Thread John Johansen
** Also affects: linux (Ubuntu Saucy)
   Importance: Medium
 Assignee: Andy Whitcroft (apw)
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Saucy)
   Importance: Medium
   Status: Fix Released

** Also affects: linux-lts-backport-maverick (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Saucy)
   Importance: Medium
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2013-04-09 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Raring)
   Status: Fix Released = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-11-09 Thread Marc Deslauriers
** No longer affects: linux-armadaxp (Ubuntu Maverick)

** No longer affects: linux-armadaxp (Ubuntu Natty)

** No longer affects: linux-ec2 (Ubuntu Maverick)

** No longer affects: linux-ec2 (Ubuntu Natty)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Maverick)

** No longer affects: linux-lts-backport-oneiric (Ubuntu Natty)

** No longer affects: linux-lts-backport-natty (Ubuntu Maverick)

** No longer affects: linux-lts-backport-natty (Ubuntu Natty)

** No longer affects: linux-lts-quantal (Ubuntu Maverick)

** No longer affects: linux-lts-quantal (Ubuntu Natty)

** No longer affects: linux-mvl-dove (Ubuntu Maverick)

** No longer affects: linux-mvl-dove (Ubuntu Natty)

** No longer affects: linux-lts-backport-maverick (Ubuntu Maverick)

** No longer affects: linux-lts-backport-maverick (Ubuntu Natty)

** No longer affects: linux (Ubuntu Maverick)

** No longer affects: linux (Ubuntu Natty)

** No longer affects: linux-fsl-imx51 (Ubuntu Maverick)

** No longer affects: linux-fsl-imx51 (Ubuntu Natty)

** No longer affects: linux-ti-omap4 (Ubuntu Maverick)

** No longer affects: linux-ti-omap4 (Ubuntu Natty)

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-quantal (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Oneiric)
   Importance: Undecided = Medium

** Changed in: linux-lts-quantal (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-quantal (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Hardy)
   Importance: Undecided = Medium

** Changed in: linux-lts-quantal (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Quantal)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-11-09 Thread Marc Deslauriers
** Also affects: linux (Ubuntu Raring)
   Importance: Medium
 Assignee: Andy Whitcroft (apw)
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Raring)
   Importance: Medium
   Status: Fix Released

** Also affects: linux-lts-backport-maverick (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Raring)
   Importance: Medium
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Raring)
   Importance: Medium
   Status: Fix Released

** Also affects: linux-lts-quantal (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Changed in: linux-lts-quantal (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Raring)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-07-17 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1605.8

---
linux-armadaxp (3.2.0-1605.8) precise-proposed; urgency=low

  * Release Tracking Bug
   -LP: #1020888

  [ Jani Monoses ]

  * Fix warnings.
  * Adapt to new sched_clock API

  [ Ubuntu: 3.2.0-27.43 ]

  * No change upload to fix .ddeb generation in the PPA.
  * Release Tracking Bug
- LP: #1020016

  [ Ubuntu: 3.2.0-27.42 ]

  * Release Tracking Bug
- LP: #1020016
  * PACKAGING: add .gnu_debuglink sections to .ko files
- LP: #669641
  * [Config] Updateconfigs
- LP: #1008345
  * SAUCE: (upstreamed) [media] ene_ir: Fix driver initialisation
- LP: #1014800
  * SAUCE: ocfs2: Fix NULL pointer dereferrence in
__ocfs2_change_file_space
- LP: #1006012
  * SAUCE: net: calxedaxgmac: enable rx cut-thru mode
- LP: #1008345
  * SAUCE: EDAC: Add support for the highbank platform memory
- LP: #1008345
  * SAUCE: EDAC: add support for highbank platform L2 cache ecc
- LP: #1008345
  * (pre-stable): bcma: add ext PA workaround for BCM4331 and BCM43431
- LP: #925577
  * SAUCE: ALSA: hda - Fix power-map regression for HP dv6  co
- LP: #1013183
  * [Config] Enable CONFIG_CGROUPS for highbank
- LP: #1014692
  * Revert net: maintain namespace isolation between vlan and real device
- LP: #1013723
  * x86/amd: Re-enable CPU topology extensions in case BIOS has disabled it
- LP: #1009087
  * hwmon: (k10temp) Add support for AMD Trinity CPUs
- LP: #1009086
  * hwmon: (fam15h_power) Increase output resolution
- LP: #1009086
  * Input: wacom - use BTN_TOOL_FINGER to indicate touch device type
- LP: #1009435
  * Input: wacom - use switch statement for wacom_tpc_irq()
- LP: #1009435
  * Input: wacom - isolate input registration
- LP: #1009435
  * Input: wacom - wireless monitor framework
- LP: #1009435
  * Input: wacom - create inputs when wireless connect
- LP: #1009435
  * Input: wacom - wireless battery status
- LP: #1009435
  * Input: wacom - check for allocation failure in probe()
- LP: #1009435
  * Input: wacom - add basic Intuos5 support
- LP: #1009435
  * Input: wacom - add Intuos5 Touch Ring/ExpressKey support
- LP: #1009435
  * Input: wacom - add Intuos5 Touch Ring LED support
- LP: #1009435
  * Input: wacom - add Intuos5 multitouch sensor support
- LP: #1009435
  * iommu/amd: Add workaround for event log erratum
- LP: #1013723
  * MIPS: BCM63XX: Add missing include for bcm63xx_gpio.h
- LP: #1013723
  * cifs: Include backup intent search flags during searches {try #2)
- LP: #1013723
  * sunrpc: fix loss of task-tk_status after rpc_delay call in
xprt_alloc_slot
- LP: #1013723
  * exofs: Fix CRASH on very early IO errors.
- LP: #1013723
  * cifs: fix oops while traversing open file list (try #4)
- LP: #1013723
  * Fix dm-multipath starvation when scsi host is busy
- LP: #1013723
  * ixp4xx: fix compilation by adding gpiolib support
- LP: #1013723
  * drm/i915: properly handle interlaced bit for sdvo dtd conversion
- LP: #1013723
  * drm/i915: enable vdd when switching off the eDP panel
- LP: #1013723
  * drm/i915: Ignore LVDS on hp t5745 and hp st5747 thin client
- LP: #1013723
  * drm/i915: no lvds quirk for HP t5740e Thin Client
- LP: #1013723
  * drm/i915: wait for a vblank to pass after tv detect
- LP: #1013723
  * drm/i915: Update GEN6_RP_CONTROL definitions
- LP: #1013723
  * drm/i915: always use RPNSWREQ for turbo change requests
- LP: #1013723
  * solos-pci: Fix DMA support
- LP: #1013723
  * microblaze: Do not select GENERIC_GPIO by default
- LP: #1013723
  * fix boot failure on 32-bit systems caused by branch stubs placed before
.text
- LP: #1013723
  * fix TLB fault path on PA2.0 narrow systems
- LP: #1013723
  * iwlwifi: update BT traffic load states correctly
- LP: #1013723
  * iwlwifi: do not use shadow registers by default
- LP: #1013723
  * wl1251: fix oops on early interrupt
- LP: #1013723
  * NFSv4: Map NFS4ERR_SHARE_DENIED into an EACCES error instead of EIO
- LP: #1013723
  * drm/radeon: fix XFX quirk
- LP: #1013723
  * ath9k: fix a use-after-free-bug when ath_tx_setup_buffer() fails
- LP: #1013723
  * mac80211: fix ADDBA declined after suspend with wowlan
- LP: #1013723
  * mm/fork: fix overflow in vma length when copying mmap on clone
- LP: #1013723
  * mm: consider all swapped back pages in used-once logic
- LP: #1013723
  * hugetlb: fix resv_map leak in error path
- LP: #1013723
  * mm/vmalloc.c: change void* into explict vm_struct*
- LP: #1013723
  * mm: fix faulty initialization in vmalloc_init()
- LP: #1013723
  * fix scsi_wait_scan
- LP: #1013723
  * mm: fix vma_resv_map() NULL pointer
- LP: #1013723
  * x86, amd, xen: Avoid NULL pointer paravirt references
- LP: #1013723
  * slub: fix a memory leak in get_partial_node()
- LP: #1013723
  * ext4: force ro mount if 

[Bug 949905] Re: CVE-2012-1097

2012-06-25 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1603.6

---
linux-armadaxp (3.2.0-1603.6) precise-proposed; urgency=low

  [ Jani Monoses ]

  * SAUCE: Add CONFIG_SHEEVA_ERRATA_ARM_CPU_6409
- LP: #1006217

  [ Ubuntu: 3.2.0-24.39 ]

  * Release Tracking Bug
- LP: #1002329
  * SAUCE: ata_piix: add a disable_driver option
- LP: #994870

  [ Ubuntu: 3.2.0-24.38 ]

  * Release Tracking Bug
- LP: #991925
  * linux: add Build-Depends for libnewt-dev, to enable perf TUI support
- LP: #981717
  * SAUCE: Allow filtering of cpufreq drivers
- LP: #984288
  * x86 bpf_jit: fix a bug in emitting the 16-bit immediate operand of AND
- LP: #981162
  * tg3: Fix 5717 serdes powerdown problem
- LP: #981162
  * sky2: dont overwrite settings for PHY Quick link
- LP: #981162
  * rose_dev: fix memcpy-bug in rose_set_mac_address
- LP: #981162
  * net: usb: cdc_eem: fix mtu
- LP: #981162
  * Fix non TBI PHY access; a bad merge undid bug fix in a previous commit.
- LP: #981162
  * ASoC: wm8994: Update WM8994 DCS calibration
- LP: #981162
  * mtd: ixp4xx: oops in ixp4xx_flash_probe
- LP: #981162
  * mtd: mips: lantiq: reintroduce support for cmdline partitions
- LP: #981162
  * mtd: nand: gpmi: use correct member for checking NAND_BBT_USE_FLASH
- LP: #981162
  * mtd: sst25l: initialize writebufsize
- LP: #981162
  * mtd: block2mtd: initialize writebufsize
- LP: #981162
  * mtd: lart: initialize writebufsize
- LP: #981162
  * mtd: m25p80: set writebufsize
- LP: #981162
  * ACPI: Do cpufreq clamping for throttling per package v2
- LP: #981162
  * PNPACPI: Fix device ref leaking in acpi_pnp_match
- LP: #981162
  * modpost: fix ALL_INIT_DATA_SECTIONS
- LP: #981162
  * genirq: Adjust irq thread affinity on IRQ_SET_MASK_OK_NOCOPY return
value
- LP: #981162
  * tracing: Fix ftrace stack trace entries
- LP: #981162
  * tracing: Fix ent_size in trace output
- LP: #981162
  * m68k/mac: Add missing platform check before registering platform
devices
- LP: #981162
  * mac80211: fix possible tid_rx-reorder_timer use after free
- LP: #981162
  * rtlwifi: rtl8192ce: rtl8192cu: rtl8192de: Fix low-gain setting when
scanning
- LP: #981162
  * drm: Validate requested virtual size against allocated fb size
- LP: #981162
  * drm/radeon/kms: fix fans after resume
- LP: #981162
  * drm/i915: no-lvds quirk on MSI DC500
- LP: #981162
  * drm/i915: Add lock on drm_helper_resume_force_mode
- LP: #981162
  * drm/i915: quirk away broken OpRegion VBT
- LP: #981162
  * r8169: runtime resume before shutdown.
- LP: #981162
  * target: Fix unsupported WRITE_SAME sense payload
- LP: #981162
  * kgdb,debug_core: pass the breakpoint struct instead of address and
memory
- LP: #981162
  * kgdbts: Fix kernel oops with CONFIG_DEBUG_RODATA
- LP: #981162
  * kgdbts: (1 of 2) fix single step awareness to work correctly with SMP
- LP: #981162
  * kgdbts: (2 of 2) fix single step awareness to work correctly with SMP
- LP: #981162
  * x86,kgdb: Fix DEBUG_RODATA limitation using text_poke()
- LP: #981162
  * CIFS: Fix VFS lock usage for oplocked files
- LP: #981162
  * ARM: tegra: remove Tegra30 errata from MACH_TEGRA_DT
- LP: #981162
  * mmc: sdhci-dove: Fix compile error by including module.h
- LP: #981162
  * mmc: atmel-mci: correct data timeout computation
- LP: #981162
  * tcm_fc: Add abort flag for gracefully handling exchange timeout
- LP: #981162
  * tcm_fc: Do not free tpg structure during wq allocation failure
- LP: #981162
  * sysctl: fix write access to dmesg_restrict/kptr_restrict
- LP: #981162
  * modpost: Fix modpost license checking of vmlinux.o
- LP: #981162
  * x86/PCI: use host bridge _CRS info on MSI MS-7253
- LP: #981162
  * x86/PCI: do not tie MSI MS-7253 use_crs quirk to BIOS version
- LP: #981162
  * TOMOYO: Fix mount flags checking order.
- LP: #981162
  * acer-wmi: No wifi rfkill on Sony machines
- LP: #981162
  * Fix length of buffer copied in __nfs4_get_acl_uncached
- LP: #981162
  * sched/x86: Fix overflow in cyc2ns_offset
- LP: #981162
  * mfd: Clear twl6030 IRQ status register only once
- LP: #981162
  * USB: Add Motorola Rokr E6 Id to the USBNet driver zaurus
- LP: #981162
  * ioat: fix size of 'completion' for Xen
- LP: #981162
  * ASoC: ak4642: fixup: mute needs +1 step
- LP: #981162
  * cred: copy_process() should clear child-replacement_session_keyring
- LP: #981162
  * iommu/amd: Make sure IOMMU interrupts are re-enabled on resume
- LP: #981162
  * Linux 3.2.15
- LP: #981162
  * drm/radeon/kms: fix DVO setup on some r4xx chips
- LP: #987337
  * drm/i915/ringbuffer: Exclude last 2 cachlines of ring on 845g
- LP: #987337
  * drm/radeon: only add the mm i2c bus if the hw_i2c module param is set
- LP: #987337
  * drm/i915: properly compute dp dithering for 

[Bug 949905] Re: CVE-2012-1097

2012-06-08 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-proposed/linux-armadaxp

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-05-23 Thread John Johansen
** Description changed:

- regset: Prevent null pointer reference on readonly regsets
+ The regset (aka register set) feature in the Linux kernel before 3.2.10
+ does not properly handle the absence of .get and .set methods, which
+ allows local users to cause a denial of service (NULL pointer
+ dereference) or possibly have unspecified other impact via a (1)
+ PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.
  
  Break-Fix: bdf88217b70dbb18c4ee27a6c497286e040a6705 
c8e252586f8d5de906385d8cf6385fee289a825e
  Break-Fix: bdf88217b70dbb18c4ee27a6c497286e040a6705 
5189fa19a4b2b4c3bec37c3a019d446148827717

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-05-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1209.21

---
linux-ti-omap4 (3.0.0-1209.21) oneiric-proposed; urgency=low

  * Release Tracking Bug
- LP: #985999

  [ Paolo Pisati ]

  * rebased on 3.0.0-19.33

  [ Ubuntu: 3.0.0-19.33 ]

  * Release Tracking Bug
- LP: #985736
  * SAUCE: ite-cir: postpone ISR registration
- LP: #984387

linux-ti-omap4 (3.0.0-1209.20) oneiric-proposed; urgency=low

  * Release Tracking Bug
- LP: #975060

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.0.0-19.32

  [ Ubuntu: 3.0.0-19.32 ]

  * Release Tracking Bug
- LP: #974368
  * SAUCE (no-up) Provide a param for allowing the BIOS to handle changing
the brightness on AC/battery status changes.
- LP: #949311
  * SAUCE (no-up) Quirk for enabling backlight hotkeys on Samsung N150P
- LP: #875893
  * SAUCE: (drop after 3.5) drm/i915: reinstate GM45 TV detection fix
- LP: #638939
  * SAUCE: (no-up) Reinstate missing hunk from nx emulation
- LP: #972821
  * SAUCE: ubuntu drivers: use UMH_WAIT_PROC consistently
- LP: #963685
  * SAUCE: disable_nx should not be in __cpuinitdata section for X86_32
- LP: #968233
  * SAUCE: (no-up) remove __initdata from vesafb_fix
- LP: #969309
  * usermodehelper: use UMH_WAIT_PROC consistently
- LP: #963685
  * usermodehelper: introduce umh_complete(sub_info)
- LP: #963685
  * usermodehelper: implement UMH_KILLABLE
- LP: #963685
  * usermodehelper: kill umh_wait, renumber UMH_* constants
- LP: #963685
  * usermodehelper: call_usermodehelper() doesn't need do_exit()
- LP: #963685
  * kmod: introduce call_modprobe() helper
- LP: #963685
  * kmod: make __request_module() killable
- LP: #963685
  * x86, tsc: Fix SMI induced variation in quick_pit_calibrate()
- LP: #965586
  * ata_piix: Add Toshiba Satellite Pro A120 to the quirks list due to
broken suspend functionality.
- LP: #886850
  * ACPICA: Fix regression in FADT revision checks
- LP: #883441
  * ASPM: Fix pcie devices with non-pcie children
- LP: #961482
  * USB: option: Add MediaTek MT6276M modemapp interfaces
- LP: #971808
  * USB: option driver: adding support for Telit CC864-SINGLE, CC864-DUAL
and DE910-DUAL modems
- LP: #971808
  * USB: option: make interface blacklist work again
- LP: #971808
  * USB: option: add ZTE MF820D
- LP: #971808
  * USB: ftdi_sio: fix problem when the manufacture is a NULL string
- LP: #971808
  * USB: ftdi_sio: add support for BeagleBone rev A5+
- LP: #971808
  * USB: Microchip VID mislabeled as Hornby VID in ftdi_sio.
- LP: #971808
  * USB: ftdi_sio: new PID: Distortec JTAG-lock-pick
- LP: #971808
  * USB: ftdi_sio: add support for FT-X series devices
- LP: #971808
  * USB: ftdi_sio: new PID: LUMEL PD12
- LP: #971808
  * powerpc/usb: fix bug of kernel hang when initializing usb
- LP: #971808
  * usb: musb: Reselect index reg in interrupt context
- LP: #971808
  * usb: gadgetfs: return number of bytes on ep0 read request
- LP: #971808
  * USB: gadget: Make g_hid device class conform to spec.
- LP: #971808
  * futex: Cover all PI opcodes with cmpxchg enabled check
- LP: #971808
  * sysfs: Fix memory leak in sysfs_sd_setsecdata().
- LP: #971808
  * tty: moxa: fix bit test in moxa_start()
- LP: #971808
  * TTY: Wrong unicode value copied in con_set_unimap()
- LP: #971808
  * USB: serial: fix console error reporting
- LP: #971808
  * cdc-wdm: Fix more races on the read path
- LP: #971808
  * cdc-wdm: Don't clear WDM_READ unless entire read buffer is emptied
- LP: #971808
  * usb: fsl_udc_core: Fix scheduling while atomic dump message
- LP: #971808
  * usb: Fix build error due to dma_mask is not at pdev_archdata at ARM
- LP: #971808
  * USB: qcserial: add several new serial devices
- LP: #971808
  * USB: qcserial: don't grab QMI port on Gobi 1000 devices
- LP: #971808
  * usb-serial: Add support for the Sealevel SeaLINK+8 2038-ROHS device
- LP: #971808
  * usb: cp210x: Update to support CP2105 and multiple interface devices
- LP: #971808
  * USB: serial: mos7840: Fixed MCS7820 device attach problem
- LP: #971808
  * rt2x00: Add support for D-Link DWA-127 to rt2800usb.
- LP: #971808
  * rtlwifi: Handle previous allocation failures when freeing device memory
- LP: #971808
  * rtlwifi: rtl8192c: Prevent sleeping from invalid context in rtl8192cu
- LP: #971808
  * rtlwifi: rtl8192ce: Fix loss of receive performance
- LP: #971808
  * math: Introduce div64_long
- LP: #971808
  * ntp: Fix integer overflow when setting time
- LP: #971808
  * uevent: send events in correct order according to seqnum (v3)
- LP: #971808
  * genirq: Fix long-term regression in genirq irq_set_irq_type() handling
- LP: #971808
  * genirq: Fix incorrect check for forced IRQ thread handler
- LP: #971808
  * rtc: Disable the alarm in the hardware (v2)
- LP: #971808
  * p54spi: 

[Bug 949905] Re: CVE-2012-1097

2012-05-07 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.23

---
linux-ti-omap4 (2.6.38-1209.23) natty-proposed; urgency=low

  * Release Tracking Bug
- LP: #967822

  [ Upstream Kernel Changes ]

  * regset: Prevent null pointer reference on readonly regsets
- LP: #949905
- CVE-2012-1097
  * regset: Return -EFAULT, not -EIO, on host-side memory fault
- LP: #949905
- CVE-2012-1097
  * mm: memcg: Correct unregistring of events attached to the same eventfd
- LP: #952828
- CVE-2012-1146
  * eCryptfs: Copy up lower inode attrs after setting lower xattr
 -- Paolo Pisati paolo.pis...@canonical.com   Fri, 30 Mar 2012 12:06:33 +0200

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-05-04 Thread John Johansen
** Also affects: linux (Ubuntu Quantal)
   Importance: Medium
 Assignee: Andy Whitcroft (apw)
   Status: Fix Released

** Also affects: linux-armadaxp (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Quantal)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Quantal)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Quantal)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Quantal)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Quantal)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Quantal)
   Importance: Medium
   Status: Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-05-04 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: New = Fix Committed

** Changed in: linux-armadaxp (Ubuntu Quantal)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-05-03 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-05-01 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-armadaxp (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Oneiric)
   Importance: Undecided = Medium

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-armadaxp (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Hardy)
   Importance: Undecided = Medium

** Changed in: linux-armadaxp (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Natty)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-04-30 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-19.33~lucid1

---
linux-lts-backport-oneiric (3.0.0-19.33~lucid1) lucid-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #986000

  [ Luis Henriques ]

  * SAUCE: ite-cir: postpone ISR registration
- LP: #984387

linux (3.0.0-19.32) oneiric-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #974368

  [ Brad Figg ]

  * SAUCE (no-up) Provide a param for allowing the BIOS to handle changing
the brightness on AC/battery status changes.
- LP: #949311
  * SAUCE (no-up) Quirk for enabling backlight hotkeys on Samsung N150P
- LP: #875893

  [ Daniel Vetter ]

  * SAUCE: (drop after 3.5) drm/i915: reinstate GM45 TV detection fix
- LP: #638939

  [ Herton Ronaldo Krzesinski ]

  * SAUCE: (no-up) Reinstate missing hunk from nx emulation
- LP: #972821

  [ Tim Gardner ]

  * SAUCE: ubuntu drivers: use UMH_WAIT_PROC consistently
- LP: #963685
  * SAUCE: disable_nx should not be in __cpuinitdata section for X86_32
- LP: #968233
  * SAUCE: (no-up) remove __initdata from vesafb_fix
- LP: #969309

  [ Upstream Kernel Changes ]

  * usermodehelper: use UMH_WAIT_PROC consistently
- LP: #963685
  * usermodehelper: introduce umh_complete(sub_info)
- LP: #963685
  * usermodehelper: implement UMH_KILLABLE
- LP: #963685
  * usermodehelper: kill umh_wait, renumber UMH_* constants
- LP: #963685
  * usermodehelper: call_usermodehelper() doesn't need do_exit()
- LP: #963685
  * kmod: introduce call_modprobe() helper
- LP: #963685
  * kmod: make __request_module() killable
- LP: #963685
  * x86, tsc: Fix SMI induced variation in quick_pit_calibrate()
- LP: #965586
  * ata_piix: Add Toshiba Satellite Pro A120 to the quirks list due to
broken suspend functionality.
- LP: #886850
  * ACPICA: Fix regression in FADT revision checks
- LP: #883441
  * ASPM: Fix pcie devices with non-pcie children
- LP: #961482
  * USB: option: Add MediaTek MT6276M modemapp interfaces
- LP: #971808
  * USB: option driver: adding support for Telit CC864-SINGLE, CC864-DUAL
and DE910-DUAL modems
- LP: #971808
  * USB: option: make interface blacklist work again
- LP: #971808
  * USB: option: add ZTE MF820D
- LP: #971808
  * USB: ftdi_sio: fix problem when the manufacture is a NULL string
- LP: #971808
  * USB: ftdi_sio: add support for BeagleBone rev A5+
- LP: #971808
  * USB: Microchip VID mislabeled as Hornby VID in ftdi_sio.
- LP: #971808
  * USB: ftdi_sio: new PID: Distortec JTAG-lock-pick
- LP: #971808
  * USB: ftdi_sio: add support for FT-X series devices
- LP: #971808
  * USB: ftdi_sio: new PID: LUMEL PD12
- LP: #971808
  * powerpc/usb: fix bug of kernel hang when initializing usb
- LP: #971808
  * usb: musb: Reselect index reg in interrupt context
- LP: #971808
  * usb: gadgetfs: return number of bytes on ep0 read request
- LP: #971808
  * USB: gadget: Make g_hid device class conform to spec.
- LP: #971808
  * futex: Cover all PI opcodes with cmpxchg enabled check
- LP: #971808
  * sysfs: Fix memory leak in sysfs_sd_setsecdata().
- LP: #971808
  * tty: moxa: fix bit test in moxa_start()
- LP: #971808
  * TTY: Wrong unicode value copied in con_set_unimap()
- LP: #971808
  * USB: serial: fix console error reporting
- LP: #971808
  * cdc-wdm: Fix more races on the read path
- LP: #971808
  * cdc-wdm: Don't clear WDM_READ unless entire read buffer is emptied
- LP: #971808
  * usb: fsl_udc_core: Fix scheduling while atomic dump message
- LP: #971808
  * usb: Fix build error due to dma_mask is not at pdev_archdata at ARM
- LP: #971808
  * USB: qcserial: add several new serial devices
- LP: #971808
  * USB: qcserial: don't grab QMI port on Gobi 1000 devices
- LP: #971808
  * usb-serial: Add support for the Sealevel SeaLINK+8 2038-ROHS device
- LP: #971808
  * usb: cp210x: Update to support CP2105 and multiple interface devices
- LP: #971808
  * USB: serial: mos7840: Fixed MCS7820 device attach problem
- LP: #971808
  * rt2x00: Add support for D-Link DWA-127 to rt2800usb.
- LP: #971808
  * rtlwifi: Handle previous allocation failures when freeing device memory
- LP: #971808
  * rtlwifi: rtl8192c: Prevent sleeping from invalid context in rtl8192cu
- LP: #971808
  * rtlwifi: rtl8192ce: Fix loss of receive performance
- LP: #971808
  * math: Introduce div64_long
- LP: #971808
  * ntp: Fix integer overflow when setting time
- LP: #971808
  * uevent: send events in correct order according to seqnum (v3)
- LP: #971808
  * genirq: Fix long-term regression in genirq irq_set_irq_type() handling
- LP: #971808
  * genirq: Fix incorrect check for forced IRQ thread handler
- LP: #971808
  * rtc: Disable the alarm in the hardware (v2)
- LP: #971808
  * p54spi: Release GPIO lines and IRQ on error in 

[Bug 949905] Re: CVE-2012-1097

2012-04-30 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Maverick)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-04-23 Thread John Johansen
** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Status: Fix Committed = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: Fix Committed = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-04-22 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-41.88

---
linux (2.6.32-41.88) lucid-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #966443

  [ Andy Whitcroft ]

  * [Config] restore build-% shortcut

  [ Tim Gardner ]

  * SAUCE: ubuntu drivers: use UMH_WAIT_PROC consistently
- LP: #963685

  [ Upstream Kernel Changes ]

  * Revert Revert USB: xhci - fix unsafe macro definitions
- LP: #948139
  * Revert Revert USB: xhci - fix math in xhci_get_endpoint_interval()
- LP: #948139
  * Revert Revert xhci: Fix full speed bInterval encoding.
- LP: #948139
  * bsg: fix sysfs link remove warning
- LP: #946928
  * hwmon: (f75375s) Fix bit shifting in f75375_write16
- LP: #948139
  * lib: proportion: lower PROP_MAX_SHIFT to 32 on 64-bit kernel
- LP: #948139
  * relay: prevent integer overflow in relay_open()
- LP: #948139
  * mac80211: timeout a single frame in the rx reorder buffer
- LP: #948139
  * kernel.h: fix wrong usage of __ratelimit()
- LP: #948139
  * printk_ratelimited(): fix uninitialized spinlock
- LP: #948139
  * hwmon: (f75375s) Fix automatic pwm mode setting for F75373  F75375
- LP: #948139
  * crypto: sha512 - Use binary and instead of modulus
- LP: #948139
  * crypto: sha512 - Avoid stack bloat on i386
- LP: #948139
  * crypto: sha512 - use standard ror64()
- LP: #948139
  * SCSI: 3w-9xxx fix bug in sgl loading
- LP: #948139
  * ARM: 7321/1: cache-v7: Disable preemption when reading CCSIDR
- LP: #948139
  * ARM: 7325/1: fix v7 boot with lockdep enabled
- LP: #948139
  * USB: Added Kamstrup VID/PIDs to cp210x serial driver.
- LP: #948139
  * USB: Fix handoff when BIOS disables host PCI device.
- LP: #948139
  * xhci: Fix encoding for HS bulk/control NAK rate.
- LP: #948139
  * hdpvr: fix race conditon during start of streaming
- LP: #948139
  * cdrom: use copy_to_user() without the underscores
- LP: #948139
  * autofs: work around unhappy compat problem on x86-64
- LP: #948139
  * Fix autofs compile without CONFIG_COMPAT
- LP: #948139
  * compat: fix compile breakage on s390
- LP: #948139
  * PM: Print a warning if firmware is requested when tasks are frozen
- LP: #948139
  * firmware loader: allow builtin firmware load even if usermodehelper is
disabled
- LP: #948139
  * PM / Sleep: Fix freezer failures due to racy
usermodehelper_is_disabled()
- LP: #948139
  * PM / Sleep: Fix read_unlock_usermodehelper() call.
- LP: #948139
  * Linux 2.6.32.58
- LP: #948139
  * regset: Prevent null pointer reference on readonly regsets
- LP: #949905
- CVE-2012-1097
  * regset: Return -EFAULT, not -EIO, on host-side memory fault
- LP: #949905
- CVE-2012-1097
  * KVM: Remove ability to assign a device without iommu support
- LP: #897812
- CVE-2011-4347
  * eCryptfs: Copy up lower inode attrs after setting lower xattr
  * eCryptfs: Improve statfs reporting
- LP: #885744
  * drm/i915: no lvds quirk for AOpen MP45
- LP: #955078
  * drm/radeon/kms: fix MSI re-arm on rv370+
- LP: #955078
  * Linux 2.6.32.58+drm33.24
- LP: #955078
  * KVM: x86: extend struct x86_emulate_ops with get_cpuid
- LP: #917842
- CVE-2012-0045
  * KVM: x86: fix missing checks in syscall emulation
- LP: #917842
- CVE-2012-0045
  * eCryptfs: Clear ECRYPTFS_NEW_FILE flag during truncate
- LP: #745836
  * compat: Re-add missing asm/compat.h include to fix compile breakage on
s390
- LP: #959252
  * IA64: Remove COMPAT_IA32 support
- LP: #959252
  * writeback: fixups for !dirty_writeback_centisecs
- LP: #959252
  * KEYS: Enable the compat keyctl wrapper on s390x
- LP: #959252
  * cifs: fix dentry refcount leak when opening a FIFO on lookup
- LP: #959252
  * net/usbnet: avoid recursive locking in usbnet_stop()
- LP: #959252
  * watchdog: hpwdt: clean up set_memory_x call for 32 bit
- LP: #959252
  * blkfront: Fix backtrace in del_gendisk
- LP: #959252
  * Linux 2.6.32.59
- LP: #959252
  * USB: EHCI: go back to using the system clock for QH unlinks
- LP: #624510
  * kmod: fix resource leak in call_usermodehelper_pipe()
- LP: #963685
  * kmod: add init function to usermodehelper
- LP: #963685
  * usermodehelper: use UMH_WAIT_PROC consistently
- LP: #963685
  * usermodehelper: introduce umh_complete(sub_info)
- LP: #963685
  * usermodehelper: implement UMH_KILLABLE
- LP: #963685
  * usermodehelper: kill umh_wait, renumber UMH_* constants
- LP: #963685
  * usermodehelper: call_usermodehelper() doesn't need do_exit()
- LP: #963685
  * kmod: introduce call_modprobe() helper
- LP: #963685
  * kmod: make __request_module() killable
- LP: #963685
 -- Luis Henriques luis.henriq...@canonical.com   Tue, 27 Mar 2012 19:44:59 
+0100

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification 

[Bug 949905] Re: CVE-2012-1097

2012-04-22 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-345.47

---
linux-ec2 (2.6.32-345.47) lucid-proposed; urgency=low

  [ Stefan Bader ]

  * Rebase to Ubuntu-2.6.32-41.88
  * Release Tracking Bug
- LP: #968780

  [ Ubuntu: 2.6.32-41.88 ]

  * [Config] restore build-% shortcut
  * SAUCE: ubuntu drivers: use UMH_WAIT_PROC consistently
- LP: #963685
  * Revert Revert USB: xhci - fix unsafe macro definitions
- LP: #948139
  * Revert Revert USB: xhci - fix math in xhci_get_endpoint_interval()
- LP: #948139
  * Revert Revert xhci: Fix full speed bInterval encoding.
- LP: #948139
  * bsg: fix sysfs link remove warning
- LP: #946928
  * hwmon: (f75375s) Fix bit shifting in f75375_write16
- LP: #948139
  * lib: proportion: lower PROP_MAX_SHIFT to 32 on 64-bit kernel
- LP: #948139
  * relay: prevent integer overflow in relay_open()
- LP: #948139
  * mac80211: timeout a single frame in the rx reorder buffer
- LP: #948139
  * kernel.h: fix wrong usage of __ratelimit()
- LP: #948139
  * printk_ratelimited(): fix uninitialized spinlock
- LP: #948139
  * hwmon: (f75375s) Fix automatic pwm mode setting for F75373  F75375
- LP: #948139
  * crypto: sha512 - Use binary and instead of modulus
- LP: #948139
  * crypto: sha512 - Avoid stack bloat on i386
- LP: #948139
  * crypto: sha512 - use standard ror64()
- LP: #948139
  * SCSI: 3w-9xxx fix bug in sgl loading
- LP: #948139
  * ARM: 7321/1: cache-v7: Disable preemption when reading CCSIDR
- LP: #948139
  * ARM: 7325/1: fix v7 boot with lockdep enabled
- LP: #948139
  * USB: Added Kamstrup VID/PIDs to cp210x serial driver.
- LP: #948139
  * USB: Fix handoff when BIOS disables host PCI device.
- LP: #948139
  * xhci: Fix encoding for HS bulk/control NAK rate.
- LP: #948139
  * hdpvr: fix race conditon during start of streaming
- LP: #948139
  * cdrom: use copy_to_user() without the underscores
- LP: #948139
  * autofs: work around unhappy compat problem on x86-64
- LP: #948139
  * Fix autofs compile without CONFIG_COMPAT
- LP: #948139
  * compat: fix compile breakage on s390
- LP: #948139
  * PM: Print a warning if firmware is requested when tasks are frozen
- LP: #948139
  * firmware loader: allow builtin firmware load even if usermodehelper is
disabled
- LP: #948139
  * PM / Sleep: Fix freezer failures due to racy
usermodehelper_is_disabled()
- LP: #948139
  * PM / Sleep: Fix read_unlock_usermodehelper() call.
- LP: #948139
  * Linux 2.6.32.58
- LP: #948139
  * regset: Prevent null pointer reference on readonly regsets
- LP: #949905
- CVE-2012-1097
  * regset: Return -EFAULT, not -EIO, on host-side memory fault
- LP: #949905
- CVE-2012-1097
  * KVM: Remove ability to assign a device without iommu support
- LP: #897812
- CVE-2011-4347
  * eCryptfs: Copy up lower inode attrs after setting lower xattr
  * eCryptfs: Improve statfs reporting
- LP: #885744
  * drm/i915: no lvds quirk for AOpen MP45
- LP: #955078
  * drm/radeon/kms: fix MSI re-arm on rv370+
- LP: #955078
  * Linux 2.6.32.58+drm33.24
- LP: #955078
  * KVM: x86: extend struct x86_emulate_ops with get_cpuid
- LP: #917842
- CVE-2012-0045
  * KVM: x86: fix missing checks in syscall emulation
- LP: #917842
- CVE-2012-0045
  * eCryptfs: Clear ECRYPTFS_NEW_FILE flag during truncate
- LP: #745836
  * compat: Re-add missing asm/compat.h include to fix compile breakage on
s390
- LP: #959252
  * IA64: Remove COMPAT_IA32 support
- LP: #959252
  * writeback: fixups for !dirty_writeback_centisecs
- LP: #959252
  * KEYS: Enable the compat keyctl wrapper on s390x
- LP: #959252
  * cifs: fix dentry refcount leak when opening a FIFO on lookup
- LP: #959252
  * net/usbnet: avoid recursive locking in usbnet_stop()
- LP: #959252
  * watchdog: hpwdt: clean up set_memory_x call for 32 bit
- LP: #959252
  * blkfront: Fix backtrace in del_gendisk
- LP: #959252
  * Linux 2.6.32.59
- LP: #959252
  * USB: EHCI: go back to using the system clock for QH unlinks
- LP: #624510
  * kmod: fix resource leak in call_usermodehelper_pipe()
- LP: #963685
  * kmod: add init function to usermodehelper
- LP: #963685
  * usermodehelper: use UMH_WAIT_PROC consistently
- LP: #963685
  * usermodehelper: introduce umh_complete(sub_info)
- LP: #963685
  * usermodehelper: implement UMH_KILLABLE
- LP: #963685
  * usermodehelper: kill umh_wait, renumber UMH_* constants
- LP: #963685
  * usermodehelper: call_usermodehelper() doesn't need do_exit()
- LP: #963685
  * kmod: introduce call_modprobe() helper
- LP: #963685
  * kmod: make __request_module() killable
- LP: #963685
 -- Stefan Bader stefan.ba...@canonical.com   Fri, 30 Mar 2012 13:34:20 +0200

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification 

[Bug 949905] Re: CVE-2012-1097

2012-04-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-maverick -
2.6.35-32.68~lucid1

---
linux-lts-backport-maverick (2.6.35-32.68~lucid1) lucid-proposed; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #967068

  [ Andy Whitcroft ]

  * [Config] restore build-% shortcut

  [ Upstream Kernel Changes ]

  * bsg: fix sysfs link remove warning
- LP: #946928
  * regset: Prevent null pointer reference on readonly regsets
- LP: #949905
- CVE-2012-1097
  * regset: Return -EFAULT, not -EIO, on host-side memory fault
- LP: #949905
- CVE-2012-1097
  * mm: memcg: Correct unregistring of events attached to the same eventfd
- LP: #952828
- CVE-2012-1146
  * KVM: Remove ability to assign a device without iommu support
- LP: #897812
- CVE-2011-4347
  * KVM: x86: extend struct x86_emulate_ops with get_cpuid
- LP: #917842
- CVE-2012-0045
  * KVM: x86: fix missing checks in syscall emulation
- LP: #917842
- CVE-2012-0045
  * eCryptfs: Clear ECRYPTFS_NEW_FILE flag during truncate
- LP: #745836
 -- Luis Henriques luis.henriq...@canonical.com   Wed, 28 Mar 2012 16:24:53 
+0100

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-4347

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-0045

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-1146

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-04-11 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-14.58~lucid1

---
linux-lts-backport-natty (2.6.38-14.58~lucid1) lucid-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #967823

  [ Andy Whitcroft ]

  * [Config] restore build-% shortcut

  [ Upstream Kernel Changes ]

  * eCryptfs: Make truncate path killable
- LP: #947270
  * bsg: fix sysfs link remove warning
- LP: #946928
  * regset: Prevent null pointer reference on readonly regsets
- LP: #949905
- CVE-2012-1097
  * regset: Return -EFAULT, not -EIO, on host-side memory fault
- LP: #949905
- CVE-2012-1097
  * mm: memcg: Correct unregistring of events attached to the same eventfd
- LP: #952828
- CVE-2012-1146
  * KVM: Remove ability to assign a device without iommu support
- LP: #897812
- CVE-2011-4347
  * eCryptfs: Copy up lower inode attrs after setting lower xattr
  * eCryptfs: Handle failed metadata read in lookup
- LP: #509180
  * eCryptfs: Improve statfs reporting
- LP: #885744
  * KVM: x86: extend struct x86_emulate_ops with get_cpuid
- LP: #917842
- CVE-2012-0045
  * KVM: x86: fix missing checks in syscall emulation
- LP: #917842
- CVE-2012-0045
 -- Luis Henriques luis.henriq...@canonical.com   Thu, 29 Mar 2012 12:04:36 
+0100

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-04-10 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/maverick-proposed/linux-mvl-dove

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-04-09 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-04-08 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-oneiric

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-04-07 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4

** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4

** Branch linked: lp:ubuntu/natty-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-04-04 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-03-29 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-maverick

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-03-27 Thread John Johansen
** Changed in: linux (Ubuntu Oneiric)
   Status: Fix Committed = Fix Released

** Changed in: linux (Ubuntu Maverick)
   Status: Fix Committed = Fix Released

** Changed in: linux (Ubuntu Natty)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-03-21 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/linux-lowlatency

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-03-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1408.11

---
linux-ti-omap4 (3.2.0-1408.11) precise; urgency=low

  [ Paolo Pisati ]

  * rebased on 3.2.0-18.29
  * [Config] drop SECURITY_APPARMOR_COMPAT_24 (updateconfigs)

  [ Ubuntu: 3.2.0-18.29 ]

  * [Config] restore build-% shortcut
  * SAUCE: ata_piix: defer disks to the Hyper-V drivers by default
- LP: #929545, #942316
  * SAUCE: drm: give up on edid retries when i2c bus is not responding
- LP: #855124
  * SAUCE: (drop after 3.3) platform/x86: Add driver for Apple gmux device
- LP: #925544
  * bsg: fix sysfs link remove warning
- LP: #946928
  * regset: Prevent null pointer reference on readonly regsets
- LP: #949905
- CVE-2012-1097
  * regset: Return -EFAULT, not -EIO, on host-side memory fault
- LP: #949905
- CVE-2012-1097
  * SAUCE: (drop after 3.4) ALSA: hda - add id for Atom Cedar Trail HDMI
codec

  [ Ubuntu: 3.2.0-18.28 ]

  * ubuntu: AUFS -- adapt to the new changelog handling
  * ubuntu: AUFS -- sort out the relative header paths
  * ubuntu: AUFS -- update to d266b0c5d0693d6383976ee54b9e2c0fa9a3f5b0
  * SAUCE: (drop after 3.3) HID: hid-magicmouse: Add pointer and buttonpad
properties for Magic Trackpad
  * SAUCE: Input: synaptics - add second variant of two-button clickpad
  * SAUCE: Input: synapticss - Set buttonpad property for all clickpads
  * SAUCE: iwlwifi: fix key removal
- LP: #911059
  * Revert SAUCE: AppArmor: Fix unpack of network tables.
  * Revert SAUCE: AppArmor: Allow dfa backward compatibility with broken
userspace
  * SAUCE: AppArmor: Add mising end of structure test to caps unpacking
  * SAUCE: AppArmor: Fix dropping of allowed operations that are force
audited
  * SAUCE: AppArmor: Fix underflow in xindex calculation
  * SAUCE: AppArmor: fix mapping of META_READ to audit and quiet flags
  * SAUCE: AppArmor: Fix the error case for chroot relative path name
lookup
- LP: #925028
  * SAUCE: AppArmor: Retrieve the dentry_path for error reporting when path
lookup fails
- LP: #925028
  * SAUCE: AppArmor: Minor cleanup of d_namespace_path to consolidate error
handling
  * SAUCE: AppArmor: Update dfa matching routines.
  * SAUCE: AppArmor: Move path failure information into aa_get_name and
rename
  * SAUCE: AppArmor: Make chroot relative the default path lookup type
  * SAUCE: AppArmor: Add ability to load extended policy
  * SAUCE: AppArmor: basic networking rules
  * SAUCE: AppArmor: Add profile introspection file to interface
  * SAUCE: AppArmor: Add the ability to mediate mount
  * SAUCE: AppArmor: Add mount information to apparmorfs
  * SAUCE: AppArmor: refactor securityfs to use structures
  * SAUCE: AppArmor: add initial features directory to securityfs
  * SAUCE: AppArmor: add file details to securityfs
  * SAUCE: AppArmor: export known rlimit names/value mappings in securityfs
  * Revert [Config] Enable CONFIG_NVRAM=m
- LP: #942193
  * Rebase to v3.2.7
  * [Config] Enable CONFIG_USB_SERIAL_QUATECH2=m on arm and powerpc
  * [Config] Enable CONFIG_USB_SERIAL_QUATECH_USB2=m on arm and powerpc
  * [Config] Add CONFIG_NVRAM to config enforcer
- LP: #942193
  * [Config] Enable CONFIG_SCSI_IBMVSCSI=m for powerpc
- LP: #943090
  * [Config] Enable CONFIG_SCSI_IPR=m for powerpc
- LP: #943090
  * provide ipmi udeb
- LP: #942926
  * Rebase to v3.2.9
  * Add ibmveth to d-i/modules-powerpc/nic-modules
- LP: #712188
  * [Config] Enable CONFIG_SCSI_IBMVFC=m for powerpc
- LP: #712188
  * Add ibmvfc and ibmvscsic to d-i/modules-powerpc/nic-modules
- LP: #712188
  * SAUCE: ALSA: hda - Add Lynx Point HD Audio Controller DeviceIDs
- LP: #900119
  * SAUCE: ahci: AHCI-mode SATA patch for Intel Lynx Point DeviceIDs
- LP: #900119
  * SAUCE: ata_piix: IDE-mode SATA patch for Intel Lynx Point DeviceIDs
- LP: #900119
  * SAUCE: i2c-i801: Add device IDs for Intel Lynx Point
- LP: #900119
  * [Config] updateconfigs after apparmor patches
  * [Config] Added hv_netvsc and hv_storvsc to -virtual
- LP: #942256
  * [Config] Enable aufs
- LP: #943119
  * Revert Revert ath9k_hw: fix interpretation of the rx KeyMiss flag
  * Revert AppArmor: compatibility patch for v5 interface
  * Revert AppArmor: compatibility patch for v5 network controll
  * ACPI / PM: Do not save/restore NVS on Asus K54C/K54HR
- LP: #898503
  * rebase to v3.2.9
- LP: #900802
  * rebase to v3.2.8
  * rebase to v3.2.7
- LP: #930842
 -- Paolo Pisati paolo.pis...@canonical.com   Mon, 12 Mar 2012 11:18:37 +0100

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list

[Bug 949905] Re: CVE-2012-1097

2012-03-13 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-03-12 Thread John Johansen
** Changed in: linux-ec2 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Maverick)
   Status: New = Fix Committed

** Changed in: linux-mvl-dove (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux (Ubuntu Oneiric)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux (Ubuntu Maverick)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Natty)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: New = Fix Committed

** Changed in: linux-fsl-imx51 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-fsl-imx51 (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Natty)
   Status: New = Invalid

** Description changed:

- Placeholder
+ regset: Prevent null pointer reference on readonly regsets
+ 
+ Break-Fix: bdf88217b70dbb18c4ee27a6c497286e040a6705 
c8e252586f8d5de906385d8cf6385fee289a825e
+ Break-Fix: bdf88217b70dbb18c4ee27a6c497286e040a6705 
5189fa19a4b2b4c3bec37c3a019d446148827717

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided = Medium

** Changed in: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-ec2 (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided = Medium

** Changed in: linux-ec2 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Maverick)
   Importance: Undecided = Medium

** Changed in: linux-ec2 (Ubuntu Natty)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick)
   Importance: Undecided = Medium

** Changed in: linux-lts-backport-oneiric (Ubuntu 

[Bug 949905] Re: CVE-2012-1097

2012-03-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-18.29

---
linux (3.2.0-18.29) precise; urgency=low

  [ Andy Whitcroft ]

  * [Config] restore build-% shortcut
  * SAUCE: ata_piix: defer disks to the Hyper-V drivers by default
- LP: #929545, #942316

  [ Eugeni Dodonov ]

  * SAUCE: drm: give up on edid retries when i2c bus is not responding
- LP: #855124

  [ Seth Forshee ]

  * SAUCE: (drop after 3.3) platform/x86: Add driver for Apple gmux device
- LP: #925544

  [ Upstream Kernel Changes ]

  * bsg: fix sysfs link remove warning
- LP: #946928
  * regset: Prevent null pointer reference on readonly regsets
- LP: #949905
- CVE-2012-1097
  * regset: Return -EFAULT, not -EIO, on host-side memory fault
- LP: #949905
- CVE-2012-1097

  [ Wu Fengguang ]

  * SAUCE: (drop after 3.4) ALSA: hda - add id for Atom Cedar Trail HDMI
codec
 -- Leann Ogasawara leann.ogasaw...@canonical.com   Fri, 09 Mar 2012 07:56:11 
-0800

** Changed in: linux (Ubuntu Precise)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 949905] Re: CVE-2012-1097

2012-03-08 Thread Andy Whitcroft
CVE-2012-1097

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Maverick)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Precise)
 Assignee: (unassigned) = Andy Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905

Title:
  CVE-2012-1097

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/949905/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs