** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux (Ubuntu Lucid)
Status: New = Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
** No longer affects: linux-armadaxp (Ubuntu Saucy)
** No longer affects: linux-ec2 (Ubuntu Saucy)
** No longer affects: linux-lts-saucy (Ubuntu Saucy)
** No longer affects: linux-lts-quantal (Ubuntu Saucy)
** No longer affects: linux-mvl-dove (Ubuntu Saucy)
** No longer affects: linux
** No longer affects: linux-armadaxp (Ubuntu Quantal)
** No longer affects: linux-ec2 (Ubuntu Quantal)
** No longer affects: linux-lts-saucy (Ubuntu Quantal)
** No longer affects: linux-lts-quantal (Ubuntu Quantal)
** No longer affects: linux-mvl-dove (Ubuntu Quantal)
** No longer affects:
** Also affects: linux (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects:
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Quantal)
Status: Fix Committed = Fix Released
** Changed in: linux-ti-omap4 (Ubuntu
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Saucy)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1261568
Title:
CVE-2013-6368
Status in
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New = Fix Committed
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Quantal)
Status: New = Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
** No longer affects: linux-armadaxp (Ubuntu Raring)
** No longer affects: linux-ec2 (Ubuntu Raring)
** No longer affects: linux-lts-saucy (Ubuntu Raring)
** No longer affects: linux-lts-quantal (Ubuntu Raring)
** No longer affects: linux-mvl-dove (Ubuntu Raring)
** No longer affects: linux
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Saucy)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
** Description changed:
- kvm: cross page vapic_addr access
+ The KVM subsystem in the Linux kernel through 3.12.5 allows local users
+ to gain privileges or cause a denial of service (system crash) via a
+ VAPIC synchronization operation involving a page-end address.
Break-Fix: -
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: New = Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1261568
Title:
CVE-2013-6368
Status in “linux”
** Changed in: linux (Ubuntu Trusty)
Status: New = Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1261568
Title:
CVE-2013-6368
Status in “linux” package in
** Description changed:
- kvm: cross page vapic_addr access
+ The KVM subsystem in the Linux kernel through 3.12.5 allows local users
+ to gain privileges or cause a denial of service (system crash) via a
+ VAPIC synchronization operation involving a page-end address.
Break-Fix: -
** Description changed:
- The KVM subsystem in the Linux kernel through 3.12.5 allows local users
- to gain privileges or cause a denial of service (system crash) via a
- VAPIC synchronization operation involving a page-end address.
+ kvm: cross page vapic_addr access
Break-Fix: -
** Description changed:
- kvm: cross page vapic_addr access
+ The KVM subsystem in the Linux kernel through 3.12.5 allows local users
+ to gain privileges or cause a denial of service (system crash) via a
+ VAPIC synchronization operation involving a page-end address.
+
+ Break-Fix: -
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New = Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New = Won't Fix
** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
Status: New = Won't Fix
** Changed in:
CVE-2013-6368
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also
20 matches
Mail list logo