The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects:
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016298
Title:
CVE-2012-2137
To manage notifications about this bug go to:
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016298
Title:
CVE-2012-2137
To manage notifications about this
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects:
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** Also affects: linux (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects:
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2
** No longer affects: linux-armadaxp (Ubuntu Hardy)
** No longer affects: linux-armadaxp (Ubuntu Oneiric)
** No longer affects: linux-ec2 (Ubuntu Hardy)
** No longer affects: linux-ec2 (Ubuntu Oneiric)
** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy)
** No longer affects:
** Branch linked: lp:ubuntu/lucid-security/linux-lts-backport-oneiric
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016298
Title:
CVE-2012-2137
To manage notifications about this bug go to:
** Also affects: linux (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Also affects: linux-ec2
** Changed in: linux-armadaxp (Ubuntu Raring)
Status: Fix Released = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016298
Title:
CVE-2012-2137
To manage notifications about this
** Description changed:
- A buffer overflow flaw was found in the setup_routing_entry() function
- in the KVM subsystem of the Linux kernel in the way the Message Signaled
- Interrupts (MSI) routing entry was handled. A local, unprivileged user
- could use this flaw to cause a denial of service
** No longer affects: linux-armadaxp (Ubuntu Natty)
** No longer affects: linux-ec2 (Ubuntu Natty)
** No longer affects: linux-lts-backport-oneiric (Ubuntu Natty)
** No longer affects: linux-lts-backport-natty (Ubuntu Natty)
** No longer affects: linux-lts-quantal (Ubuntu Natty)
** No longer
** Also affects: linux (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Also affects:
** Changed in: linux-lts-quantal (Ubuntu Natty)
Status: New = Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Importance: Undecided = Medium
** Changed in: linux-lts-quantal (Ubuntu Oneiric)
** Changed in: linux-ti-omap4 (Ubuntu Natty)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016298
Title:
CVE-2012-2137
To manage notifications about this bug go to:
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1216.29
---
linux-ti-omap4 (3.0.0-1216.29) oneiric-proposed; urgency=low
* Release Tracking Bug
- LP: #1056605
[ Paolo Pisati ]
* rebased on Ubuntu-3.0.0-26.43
[ Ubuntu: 3.0.0-26.43 ]
* Release Tracking Bug
This bug was fixed in the package linux - 2.6.32-44.98
---
linux (2.6.32-44.98) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1055438
[ Dave Airlie ]
* SAUCE: drm/vmwgfx: add MODULE_DEVICE_TABLE so vmwgfx loads at boot
- LP: #1039157
This bug was fixed in the package linux - 3.0.0-26.43
---
linux (3.0.0-26.43) oneiric-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1055532
[ Dave Airlie ]
* SAUCE: drm/vmwgfx: add MODULE_DEVICE_TABLE so vmwgfx loads at boot
- LP: #1039157
This bug was fixed in the package linux-ec2 - 2.6.32-349.55
---
linux-ec2 (2.6.32-349.55) lucid-proposed; urgency=low
[ Stefan Bader ]
* Revert SAUCE: EC2: Backport changes to limit GSO segments
- LP: #1037456
- CVE-2012-3412
* Rebased to Ubuntu-2.6.32-44.98
*
Patch 46e624b95c36d729bdf24010fff11d16f6fe94fa
f2ebd422f71cda9c791f76f85d2ca102ae34a1ed already in upstream 3.5
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-26.43~lucid1
---
linux-lts-backport-oneiric (3.0.0-26.43~lucid1) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #1056607
[ Dave Airlie ]
* SAUCE: drm/vmwgfx: add
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016298
Title:
CVE-2012-2137
To manage notifications about this bug go to:
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016298
Title:
CVE-2012-2137
To manage notifications about this bug go to:
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Oneiric)
Status: In Progress = Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
Status: New = Fix Committed
--
You received this bug notification
** Changed in: linux (Ubuntu Lucid)
Status: In Progress = Fix Committed
** Changed in: linux (Ubuntu Natty)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016298
** Changed in: linux (Ubuntu Oneiric)
Status: New = In Progress
** Changed in: linux (Ubuntu Oneiric)
Assignee: (unassigned) = Tim Gardner (timg-tpi)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu Lucid)
Status: Invalid = In Progress
** Changed in: linux (Ubuntu Lucid)
Assignee: (unassigned) = Tim Gardner (timg-tpi)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016298
Title:
CVE-2012-2137
To manage notifications about
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New = Fix Committed
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux (Ubuntu Precise)
Status: New = Fix
** Description changed:
A buffer overflow flaw was found in the setup_routing_entry() function
in the KVM subsystem of the Linux kernel in the way the Message Signaled
Interrupts (MSI) routing entry was handled. A local, unprivileged user
could use this flaw to cause a denial of service
CVE-2012-2137
** Also affects: linux (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also
40 matches
Mail list logo