The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Assignee: Luis Henriques (henrix)
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-lts-wily (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects:
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2
** Changed in: linux (Ubuntu)
Status: Fix Committed = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1117325
Title:
CVE-2013-0216
To manage notifications about this bug go to:
** Changed in: linux (Ubuntu Raring)
Status: Fix Committed = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1117325
Title:
CVE-2013-0216
To manage notifications about this bug go
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-oneiric
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1117325
Title:
CVE-2013-0216
To manage notifications about this bug go to:
** Branch linked: lp:ubuntu/lucid-updates/linux-lts-backport-oneiric
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1117325
Title:
CVE-2013-0216
To manage notifications about this bug go to:
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1117325
Title:
CVE-2013-0216
To manage notifications about this
** Changed in: linux-lts-backport-natty (Ubuntu Oneiric)
Status: New = Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
Status: New = Invalid
** Changed in:
** Changed in: linux-lts-backport-natty (Ubuntu)
Status: New = Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: Won't Fix = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Branch linked: lp:ubuntu/lucid-security/linux-lts-backport-oneiric
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1117325
Title:
CVE-2013-0216
To manage notifications about this bug go to:
** Branch linked: lp:ubuntu/oneiric-security/linux-ti-omap4
** Branch linked: lp:ubuntu/precise-security/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1117325
Title:
CVE-2013-0216
This bug was fixed in the package linux-armadaxp - 3.5.0-1611.17
---
linux-armadaxp (3.5.0-1611.17) quantal-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1160181
* Rebase onto Ubuntu-3.5.0-27.46
[ Ubuntu: 3.5.0-27.46 ]
* Release Tracking Bug
-
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1427.36
---
linux-ti-omap4 (3.2.0-1427.36) precise-proposed; urgency=low
* Release Tracking Bug
- LP: #1135174
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-39.62
[ Ubuntu: 3.2.0-39.62 ]
* Release Tracking Bug
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1222.36
---
linux-ti-omap4 (3.0.0-1222.36) oneiric-proposed; urgency=low
* Release Tracking Bug
- LP: #1137045
[ Paolo Pisati ]
* rebased on Ubuntu-3.0.0-32.50
[ Ubuntu: 3.0.0-32.50 ]
* Release Tracking Bug
This bug was fixed in the package linux-ti-omap4 - 3.5.0-221.31
---
linux-ti-omap4 (3.5.0-221.31) quantal-proposed; urgency=low
* Release Tracking Bug
- LP: #1153648
[ Paolo Pisati ]
* rebased on Ubuntu-3.5.0-26.42
[ Ubuntu: 3.5.0-26.42 ]
* Release Tracking Bug
This bug was fixed in the package linux-ti-omap4 - 3.5.0-221.31
---
linux-ti-omap4 (3.5.0-221.31) quantal-proposed; urgency=low
* Release Tracking Bug
- LP: #1153648
[ Paolo Pisati ]
* rebased on Ubuntu-3.5.0-26.42
[ Ubuntu: 3.5.0-26.42 ]
* Release Tracking Bug
This bug was fixed in the package linux-armadaxp - 3.2.0-1615.23
---
linux-armadaxp (3.2.0-1615.23) precise-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1135175
* Rebase onto Ubuntu-3.2.0-39.62
[ Ubuntu: 3.2.0-39.62 ]
* Release Tracking Bug
-
This bug was fixed in the package linux - 3.2.0-39.62
---
linux (3.2.0-39.62) precise-proposed; urgency=low
[Brad Figg]
* Release Tracking Bug
- LP: #1134424
[ Herton Ronaldo Krzesinski ]
* Revert SAUCE: samsung-laptop: disable in UEFI mode
- LP: #1117693
* d-i:
This bug was fixed in the package linux-lts-quantal -
3.5.0-26.42~precise1
---
linux-lts-quantal (3.5.0-26.42~precise1) precise-proposed; urgency=low
[Steve Conklin]
* Release Tracking Bug
- LP: #1153655
[ Andy Whitcroft ]
* ubuntu: overlayfs -- fix missmerge of
This bug was fixed in the package linux - 3.5.0-26.42
---
linux (3.5.0-26.42) quantal-proposed; urgency=low
[Steve Conklin]
* Release Tracking Bug
- LP: #1152715
[ Andy Whitcroft ]
* ubuntu: overlayfs -- fix missmerge of vfs_open changes
- LP: #1122094, #1147678
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-32.50~lucid1
---
linux-lts-backport-oneiric (3.0.0-32.50~lucid1) lucid-proposed; urgency=low
[Brad Figg]
* Release Tracking Bug
- LP: #1137047
[ Ian Campbell ]
* SAUCE: xen/netback: shutdown the ring
This bug was fixed in the package linux - 3.0.0-32.50
---
linux (3.0.0-32.50) oneiric-proposed; urgency=low
[Brad Figg]
* Release Tracking Bug
- LP: #1136175
[ Ian Campbell ]
* SAUCE: xen/netback: shutdown the ring if it contains garbage.
- LP: #1117325
-
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed'
to 'verification-done'.
If verification is not done by one week from today, this fix will
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-quantal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1117325
Title:
CVE-2013-0216
To manage notifications about this bug go to:
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: New = Fix Committed
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Description changed:
- The Xen netback implementation contains a couple of flaws which can
- allow a guest to cause a DoS in the backend domain, potentially
- affecting other domains in the system. CVE-2013-0216 is a failure to
- sanity check the ring producer/consumer pointers which can allow
** Description changed:
The Xen netback implementation contains a couple of flaws which can
allow a guest to cause a DoS in the backend domain, potentially
affecting other domains in the system. CVE-2013-0216 is a failure to
sanity check the ring producer/consumer pointers which can allow
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-armadaxp (Ubuntu Raring)
Status: New = Invalid
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New = Invalid
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux (Ubuntu Oneiric)
Status: In Progress = Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: In Progress = Fix Committed
** Changed in: linux (Ubuntu Quantal)
Status: In Progress = Fix Committed
** Changed in: linux (Ubuntu Raring)
Status:
** Changed in: linux (Ubuntu Oneiric)
Status: New = In Progress
** Changed in: linux (Ubuntu Oneiric)
Assignee: (unassigned) = Luis Henriques (henrix)
** Changed in: linux (Ubuntu Precise)
Status: New = In Progress
** Changed in: linux (Ubuntu Precise)
Assignee:
CVE-2013-0216
** Also affects: linux (Ubuntu Raring)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Raring)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Raring)
Importance: Undecided
Status: New
** Also
36 matches
Mail list logo