** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armad
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importan
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-lts-wily (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: Fix Committed => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1261570
Title:
CVE-2013-6376
Status in
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Saucy)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp i
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1261570
Title:
CVE-2013-6376
Status in “linu
** No longer affects: linux-armadaxp (Ubuntu Raring)
** No longer affects: linux-ec2 (Ubuntu Raring)
** No longer affects: linux-lts-saucy (Ubuntu Raring)
** No longer affects: linux-lts-quantal (Ubuntu Raring)
** No longer affects: linux-mvl-dove (Ubuntu Raring)
** No longer affects: linux (U
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Saucy)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://
** Description changed:
- kvm: BUG_ON() in apic_cluster_id()
+ The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
+ subsystem in the Linux kernel through 3.12.5 allows guest OS users to
+ cause a denial of service (host OS crash) via a crafted ICR write
+ operation in x2apic mode
** Description changed:
- The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
- subsystem in the Linux kernel through 3.12.5 allows guest OS users to
- cause a denial of service (host OS crash) via a crafted ICR write
- operation in x2apic mode.
+ kvm: BUG_ON() in apic_cluster_id(
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New =>
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1261570
Title:
CVE-2013-6376
Status in “linux” packag
** Changed in: linux (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1261570
Title:
CVE-2013-6376
Status in “linux” package in Ubun
** Description changed:
- The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
- subsystem in the Linux kernel through 3.12.5 allows guest OS users to
- cause a denial of service (host OS crash) via a crafted ICR write
- operation in x2apic mode.
+ kvm: BUG_ON() in apic_cluster_id(
** Description changed:
- kvm: BUG_ON() in apic_cluster_id()
+ The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
+ subsystem in the Linux kernel through 3.12.5 allows guest OS users to
+ cause a denial of service (host OS crash) via a crafted ICR write
+ operation in x2apic mode
** Description changed:
- The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
- subsystem in the Linux kernel through 3.12.5 allows guest OS users to
- cause a denial of service (host OS crash) via a crafted ICR write
- operation in x2apic mode.
+ kvm: BUG_ON() in apic_cluster_id(
** Description changed:
- kvm: BUG_ON() in apic_cluster_id()
+ The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
+ subsystem in the Linux kernel through 3.12.5 allows guest OS users to
+ cause a denial of service (host OS crash) via a crafted ICR write
+ operation in x2apic mode
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New => Won't Fix
** Changed in: linux-lts-ba
CVE-2013-6376
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affec
20 matches
Mail list logo