The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Assignee: Andy Whitcroft (apw)
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-lts-wily (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects:
** Changed in: linux (Ubuntu Precise)
Status: Fix Released => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Released => Invalid
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: Fix Committed => Invalid
--
You received this bug notification
** Changed in: linux (Ubuntu Wily)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115
Title:
CVE-2012-0056
To manage notifications about this bug go to:
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1406.8
---
linux-ti-omap4 (3.2.0-1406.8) precise; urgency=low
[ Paolo Pisati ]
* [Config] updateconfigs after CMA revert
* [Config] Turn on all LIRC modules
- LP: #927526
* rebased on 3.2.0-16.25
[ Upstream
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1207.16
---
linux-ti-omap4 (3.0.0-1207.16) oneiric-proposed; urgency=low
* Release Tracking Bug
- LP: #922006
[ Upstream Kernel Changes ]
* omap4: add 4430 ES2.3 support
- LP: #917264
[ Ubuntu: 3.0.0-16.27 ]
** Description changed:
- incorrect /proc/pid/mem permission handling
+ The mem_write function in Linux kernel 2.6.39 and other versions, when
+ ASLR is disabled, does not properly check permissions when writing to
+ /proc/pid/mem, which allows local users to gain privileges by
+ modifying
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115
Title:
CVE-2012-0056
To manage notifications about this bug go to:
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-15.26~lucid1
---
linux-lts-backport-oneiric (3.0.0-15.26~lucid1) lucid-security; urgency=low
[ Upstream Kernel Changes ]
* Revert proc: enable writing to /proc/pid/mem
- LP: #919115
- CVE-2012-0056
--
** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
Status: New = Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Branch linked: lp:ubuntu/lucid-security/linux-lts-backport-oneiric
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115
Title:
CVE-2012-0056
To manage notifications about this bug go to:
Sigh. I think it's about time for this:
http://en.wikipedia.org/wiki/Capability-based_security
...when will they ever learn [2x].
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115
Title:
This bug was fixed in the package linux - 3.2.0-10.18
---
linux (3.2.0-10.18) precise; urgency=low
[ Tim Gardner ]
* SAUCE: ecryptfs: Print inode on metadata error
[ Upstream Kernel Changes ]
* Revert proc: enable writing to /proc/pid/mem
- LP: #919115
-
any progress on linux-lts-backport-oneiric for lucid? when can the fix
be expected?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115
Title:
CVE-2012-0056
To manage notifications about this bug
This bug was fixed in the package linux - 3.0.0-15.26
---
linux (3.0.0-15.26) oneiric-security; urgency=low
[ Upstream Kernel Changes ]
* Revert proc: enable writing to /proc/pid/mem
- LP: #919115
- CVE-2012-0056
-- Andy Whitcroft a...@canonical.com Fri, 20 Jan 2012
Mempodipper exploit doesn't work anymore with this update (on Ubuntu
11.10). I guess I can confirm that the bug is fixed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115
Title:
CVE-2012-0056
** Changed in: linux (Ubuntu Oneiric)
Status: Fix Released = Fix Committed
** Changed in: linux (Ubuntu Oneiric)
Assignee: (unassigned) = Andy Whitcroft (apw)
** Changed in: linux (Ubuntu Precise)
Status: New = In Progress
** Changed in: linux (Ubuntu Precise)
Assignee:
** Changed in: linux-ec2 (Ubuntu Oneiric)
Status: New = Invalid
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux-ec2 (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-ec2 (Ubuntu Hardy)
Status: New = Invalid
** Changed in:
CVE-2012-0056
** Also affects: linux (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also
26 matches
Mail list logo