[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Yakkety) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Yakkety) Importance: Undecided => Low ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Also affects: linux (Ubuntu Yakkety) Importance: Low Status: Fix Committed ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-mako (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-manta (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-goldfish (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-flo (Ubuntu Yakkety) Importance: Low Status: New ** Also affects: linux-lts-trusty (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Yakkety) Importance: Low Status: Invalid ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Low Status: Fix Committed ** Also affects: linux-lts-xenial (Ubuntu Yakkety) Importance: Low Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux (Ubuntu Wily) Status: Fix Committed => Invalid ** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Low ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Also affects: linux (Ubuntu Xenial) Importance: Low Status: Fix Committed ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-mako (Ubuntu Xenial) Importance: Low Status: New ** Also affects: linux-manta (Ubuntu Xenial) Importance: Low Status: New ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Low Status: New ** Also affects: linux-flo (Ubuntu Xenial) Importance: Low Status: New ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Low Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux (Ubuntu Wily) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Description changed: The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram - Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier - allows local users to cause a denial of service (BUG_ON and kernel panic) - by establishing an RDS connection with the source IP address equal to the - IPoIB interface's own IP address, as demonstrated by rds-ping. + Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and + earlier allows local users to cause a denial of service (BUG_ON and + kernel panic) by establishing an RDS connection with the source IP + address equal to the IPoIB interface's own IP address, as demonstrated + by rds-ping. Break-Fix: 639b321b4d8f4e412bfbb2a4a19bfebc1e68ace4 local-2012-2372 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux (Ubuntu Vivid) Status: Fix Released = Invalid ** Changed in: linux (Ubuntu Vivid) Assignee: Andy Whitcroft (apw) = (unassigned) ** Changed in: linux (Ubuntu Wily) Status: Fix Released = Invalid ** Changed in: linux (Ubuntu Wily) Assignee: Andy Whitcroft (apw) = (unassigned) ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed = Invalid ** Changed in: linux-lts-raring (Ubuntu Precise) Status: Fix Committed = Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: Fix Committed = Invalid ** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed = Invalid ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Fix Committed = Invalid ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed = Invalid ** Description changed: The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram - Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and - earlier allows local users to cause a denial of service (BUG_ON and - kernel panic) by establishing an RDS connection with the source IP - address equal to the IPoIB interface's own IP address, as demonstrated - by rds-ping. + Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier + allows local users to cause a denial of service (BUG_ON and kernel panic) + by establishing an RDS connection with the source IP address equal to the + IPoIB interface's own IP address, as demonstrated by rds-ping. Break-Fix: 639b321b4d8f4e412bfbb2a4a19bfebc1e68ace4 local-2012-2372 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux (Ubuntu Trusty) Status: Fix Committed = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
Trusty, Utopic, Vivid, and Wily are not affected according to http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-2372.html I think those tasks should be changed to Invalid. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Invalid = Fix Committed ** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Invalid = Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: Invalid = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Also affects: linux (Ubuntu Wily) Importance: Low Assignee: Andy Whitcroft (apw) Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-mako (Ubuntu Wily) Importance: Low Status: New ** Also affects: linux-manta (Ubuntu Wily) Importance: Low Status: New ** Also affects: linux-goldfish (Ubuntu Wily) Importance: Low Status: New ** Also affects: linux-flo (Ubuntu Wily) Importance: Low Status: New ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Wily) Importance: Low Status: Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-lts-vivid (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Vivid) Importance: Undecided = Low ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Importance: Undecided = Low ** Changed in: linux-lts-vivid (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Utopic) Importance: Undecided = Low ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Importance: Undecided = Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quantal (Ubuntu Lucid) ** No longer affects: linux-mvl-dove (Ubuntu Lucid) ** No longer affects: linux-ti-omap4 (Ubuntu Lucid) ** No longer affects: linux (Ubuntu Lucid) ** No longer affects: linux-mako (Ubuntu Lucid) ** No longer affects: linux-fsl-imx51 (Ubuntu Lucid) ** No longer affects: linux-lts-utopic (Ubuntu Lucid) ** No longer affects: linux-flo (Ubuntu Lucid) ** No longer affects: linux-lts-raring (Ubuntu Lucid) ** No longer affects: linux-manta (Ubuntu Lucid) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Also affects: linux (Ubuntu Vivid) Importance: Low Assignee: Andy Whitcroft (apw) Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Vivid) Importance: Low Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided Status: New ** No longer affects: linux-lts-trusty (Ubuntu Saucy) ** No longer affects: linux-armadaxp (Ubuntu Saucy) ** No longer affects: linux-ec2 (Ubuntu Saucy) ** No longer affects: linux-goldfish (Ubuntu Saucy) ** No longer affects: linux-lts-saucy (Ubuntu Saucy) ** No longer affects: linux-lts-quantal (Ubuntu Saucy) ** No longer affects: linux-mvl-dove (Ubuntu Saucy) ** No longer affects: linux-ti-omap4 (Ubuntu Saucy) ** No longer affects: linux (Ubuntu Saucy) ** No longer affects: linux-mako (Ubuntu Saucy) ** No longer affects: linux-fsl-imx51 (Ubuntu Saucy) ** No longer affects: linux-lts-utopic (Ubuntu Saucy) ** No longer affects: linux-flo (Ubuntu Saucy) ** No longer affects: linux-lts-raring (Ubuntu Saucy) ** No longer affects: linux-manta (Ubuntu Saucy) ** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided = Low ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided = Low ** Changed in: linux-lts-trusty (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided = Low ** Changed in: linux-manta (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-manta (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Trusty) Importance: Undecided = Low ** Changed in: linux-manta (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-manta (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-manta (Ubuntu Vivid) Importance: Undecided = Low ** Changed in: linux-manta (Ubuntu Utopic) Importance: Undecided = Low ** Changed in: linux-mako (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-mako (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Trusty) Importance: Undecided = Low ** Changed in: linux-mako (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-mako (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-mako (Ubuntu Vivid) Importance: Undecided = Low ** Changed in: linux-mako (Ubuntu Utopic) Importance: Undecided = Low ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Trusty) Importance: Undecided = Low ** Changed in: linux-lts-utopic (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Lucid) Importance: Undecided = Low ** Changed in: linux-lts-utopic (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Vivid) Importance: Undecided = Low ** Changed in: linux-lts-utopic (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Utopic) Importance: Undecided = Low ** Changed in: linux-goldfish (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-goldfish (Ubuntu Trusty) Status: New
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux-lts-backport-maverick (Ubuntu Saucy) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Saucy) Status: New = Won't Fix ** Changed in: linux-lts-backport-oneiric (Ubuntu Saucy) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Trusty) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Trusty) Status: New = Won't Fix ** Changed in: linux-lts-backport-oneiric (Ubuntu Trusty) Status: New = Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Also affects: linux (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Utopic) Importance: Low Assignee: Andy Whitcroft (apw) Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Low Status: Fix Released ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic) Importance: Low Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Utopic) Importance: Low Status: Fix Released ** No longer affects: linux-armadaxp (Ubuntu Hardy) ** No longer affects: linux-armadaxp (Ubuntu Natty) ** No longer affects: linux-armadaxp (Ubuntu Oneiric) ** No longer affects: linux-armadaxp (Ubuntu Quantal) ** No longer affects: linux-ec2 (Ubuntu Hardy) ** No longer affects: linux-ec2 (Ubuntu Natty) ** No longer affects: linux-ec2 (Ubuntu Oneiric) ** No longer affects: linux-ec2 (Ubuntu Quantal) ** No longer affects: linux-lts-saucy (Ubuntu Hardy) ** No longer affects: linux-lts-saucy (Ubuntu Natty) ** No longer affects: linux-lts-saucy (Ubuntu Oneiric) ** No longer affects: linux-lts-saucy (Ubuntu Quantal) ** No longer affects: linux-lts-quantal (Ubuntu Hardy) ** No longer affects: linux-lts-quantal (Ubuntu Natty) ** No longer affects: linux-lts-quantal (Ubuntu Oneiric) ** No longer affects: linux-lts-quantal (Ubuntu Quantal) ** No longer affects: linux-mvl-dove (Ubuntu Hardy) ** No longer affects: linux-mvl-dove (Ubuntu Natty) ** No longer affects: linux-mvl-dove (Ubuntu Oneiric) ** No longer affects: linux-mvl-dove (Ubuntu Quantal) ** No longer affects: linux (Ubuntu Hardy) ** No longer affects: linux (Ubuntu Natty) ** No longer affects: linux (Ubuntu Oneiric) ** No longer affects: linux (Ubuntu Quantal) ** No longer affects: linux-fsl-imx51 (Ubuntu Hardy) ** No longer affects: linux-fsl-imx51 (Ubuntu Natty) ** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric) ** No longer affects: linux-fsl-imx51 (Ubuntu Quantal) ** No longer affects: linux-ti-omap4 (Ubuntu Hardy) ** No longer affects: linux-ti-omap4 (Ubuntu Natty) ** No longer affects: linux-ti-omap4 (Ubuntu Oneiric) ** No longer affects: linux-ti-omap4 (Ubuntu Quantal) ** No longer affects: linux-lts-raring (Ubuntu Hardy) ** No longer affects: linux-lts-raring (Ubuntu Natty) ** No longer affects: linux-lts-raring (Ubuntu Oneiric) ** No longer affects: linux-lts-raring (Ubuntu Quantal) ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-lts-quantal (Ubuntu Precise) Importance: Undecided = Low ** Changed in: linux-lts-quantal (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Saucy) Importance: Undecided = Low ** Changed in: linux-lts-quantal (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Trusty) Importance: Undecided =
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux-lts-backport-oneiric - 3.0.0-25.41~lucid1 --- linux-lts-backport-oneiric (3.0.0-25.41~lucid1) lucid-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1036577 [ Andy Whitcroft ] * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 [ Douglas Bagnall ] * SAUCE: Unlock the rc_dev lock when the raw device is missing - LP: #1015836 [ Upstream Kernel Changes ] * cifs: always update the inode cache with the results from a FIND_* - LP: #1031926 * ntp: Fix STA_INS/DEL clearing bug - LP: #1031926 * mm: fix lost kswapd wakeup in kswapd_stop() - LP: #1031926 * MIPS: Properly align the .data..init_task section. - LP: #1031926 * UBIFS: fix a bug in empty space fix-up - LP: #1031926 * dm raid1: fix crash with mirror recovery and discard - LP: #1031926 * mm/vmstat.c: cache align vm_stat - LP: #1031926 * mm: memory hotplug: Check if pages are correctly reserved on a per-section basis - LP: #1031926 * mm: reduce the amount of work done when updating min_free_kbytes - LP: #1031926 * mm: vmscan: fix force-scanning small targets without swap - LP: #1031926 * vmscan: clear ZONE_CONGESTED for zone with good watermark - LP: #1031926 * vmscan: add shrink_slab tracepoints - LP: #1031926 * vmscan: shrinker-nr updates race and go wrong - LP: #1031926 * vmscan: reduce wind up shrinker-nr when shrinker can't do work - LP: #1031926 * vmscan: limit direct reclaim for higher order allocations - LP: #1031926 * vmscan: abort reclaim/compaction if compaction can proceed - LP: #1031926 * mm: compaction: trivial clean up in acct_isolated() - LP: #1031926 * mm: change isolate mode from #define to bitwise type - LP: #1031926 * mm: compaction: make isolate_lru_page() filter-aware - LP: #1031926 * mm: zone_reclaim: make isolate_lru_page() filter-aware - LP: #1031926 * mm: migration: clean up unmap_and_move() - LP: #1031926 * mm: compaction: allow compaction to isolate dirty pages - LP: #1031926 * mm: compaction: determine if dirty pages can be migrated without blocking within -migratepage - LP: #1031926 * mm: page allocator: do not call direct reclaim for THP allocations while compaction is deferred - LP: #1031926 * mm: compaction: make isolate_lru_page() filter-aware again - LP: #1031926 * kswapd: avoid unnecessary rebalance after an unsuccessful balancing - LP: #1031926 * kswapd: assign new_order and new_classzone_idx after wakeup in sleeping - LP: #1031926 * mm: compaction: introduce sync-light migration for use by compaction - LP: #1031926 * mm: vmscan: when reclaiming for compaction, ensure there are sufficient free pages available - LP: #1031926 * mm: vmscan: do not OOM if aborting reclaim to start compaction - LP: #1031926 * mm: vmscan: check if reclaim should really abort even if compaction_ready() is true for one zone - LP: #1031926 * vmscan: promote shared file mapped pages - LP: #1031926 * vmscan: activate executable pages after first usage - LP: #1031926 * mm/vmscan.c: consider swap space when deciding whether to continue reclaim - LP: #1031926 * mm: test PageSwapBacked in lumpy reclaim - LP: #1031926 * mm: vmscan: convert global reclaim to per-memcg LRU lists - LP: #1031926 * cpusets: avoid looping when storing to mems_allowed if one node remains set - LP: #1031926 * cpusets: stall when updating mems_allowed for mempolicy or disjoint nodemask - LP: #1031926 * cpuset: mm: reduce large amounts of memory barrier related damage v3 - LP: #1031926 * mm/hugetlb: fix warning in alloc_huge_page/dequeue_huge_page_vma - LP: #1031926 * vmscan: fix initial shrinker size handling - LP: #1031926 * Linux 3.0.39 - LP: #1031926 * rt2x00: Add support for BUFFALO WLI-UC-GNM2 to rt2800usb. - LP: #871904 * Avoid sysfs oops when an rc_dev's raw device is absent - LP: #1015836 * eCryptfs: Copy up POSIX ACL and read-only flags from lower mount - LP: #1009207 * eCryptfs: Initialize empty lower files when opening them - LP: #911507 * mmc: sdhci-pci: CaFe has broken card detection - LP: #1034988 * powerpc/ftrace: Fix assembly trampoline register usage - LP: #1034988 * powerpc: Add memory attribute for mfmsr() - LP: #1034988 * powerpc: Fix wrong divisor in usecs_to_cputime - LP: #1034988 * SCSI: libsas: continue revalidation - LP: #1034988 * SCSI: libsas: fix sas_discover_devices return code handling - LP: #1034988 * SCSI: fix eh wakeup (scsi_schedule_eh vs scsi_restart_operations) - LP: #1034988 * SCSI: fix hot unplug vs async scan race - LP: #1034988 * SCSI: Avoid dangling pointer in scsi_requeue_command() - LP: #1034988 * ARM: OMAP2+: OPP: Fix to
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux-ec2 - 2.6.32-347.53 --- linux-ec2 (2.6.32-347.53) lucid-proposed; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-42.96 * Release Tracking Bug - LP: #1038971 [ Ubuntu: 2.6.32-42.96 ] * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 * udf: Fortify loading of sparing table - LP: #1024497 - CVE-2012-3400 * udf: Avoid run away loop when partition table length is corrupted - LP: #1024497 - CVE-2012-3400 * eCryptfs: Gracefully refuse miscdev file ops on inherited/passed files - LP: #994247 * eCryptfs: Copy up POSIX ACL and read-only flags from lower mount - LP: #1009207 * drm: integer overflow in drm_mode_dirtyfb_ioctl() - LP: #917838 - CVE-2012-0044 -- Stefan Bader stefan.ba...@canonical.com Mon, 20 Aug 2012 18:32:20 +0200 ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed = Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1215.27 --- linux-ti-omap4 (3.0.0-1215.27) oneiric-proposed; urgency=low * Release Tracking Bug - LP: #1036576 [ Paolo Pisati ] * rebased on Ubuntu-3.0.0-25.41 [ Ubuntu: 3.0.0-25.41 ] * Release Tracking Bug - LP: #1036178 * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 * SAUCE: Unlock the rc_dev lock when the raw device is missing - LP: #1015836 * cifs: always update the inode cache with the results from a FIND_* - LP: #1031926 * ntp: Fix STA_INS/DEL clearing bug - LP: #1031926 * mm: fix lost kswapd wakeup in kswapd_stop() - LP: #1031926 * MIPS: Properly align the .data..init_task section. - LP: #1031926 * UBIFS: fix a bug in empty space fix-up - LP: #1031926 * dm raid1: fix crash with mirror recovery and discard - LP: #1031926 * mm/vmstat.c: cache align vm_stat - LP: #1031926 * mm: memory hotplug: Check if pages are correctly reserved on a per-section basis - LP: #1031926 * mm: reduce the amount of work done when updating min_free_kbytes - LP: #1031926 * mm: vmscan: fix force-scanning small targets without swap - LP: #1031926 * vmscan: clear ZONE_CONGESTED for zone with good watermark - LP: #1031926 * vmscan: add shrink_slab tracepoints - LP: #1031926 * vmscan: shrinker-nr updates race and go wrong - LP: #1031926 * vmscan: reduce wind up shrinker-nr when shrinker can't do work - LP: #1031926 * vmscan: limit direct reclaim for higher order allocations - LP: #1031926 * vmscan: abort reclaim/compaction if compaction can proceed - LP: #1031926 * mm: compaction: trivial clean up in acct_isolated() - LP: #1031926 * mm: change isolate mode from #define to bitwise type - LP: #1031926 * mm: compaction: make isolate_lru_page() filter-aware - LP: #1031926 * mm: zone_reclaim: make isolate_lru_page() filter-aware - LP: #1031926 * mm: migration: clean up unmap_and_move() - LP: #1031926 * mm: compaction: allow compaction to isolate dirty pages - LP: #1031926 * mm: compaction: determine if dirty pages can be migrated without blocking within -migratepage - LP: #1031926 * mm: page allocator: do not call direct reclaim for THP allocations while compaction is deferred - LP: #1031926 * mm: compaction: make isolate_lru_page() filter-aware again - LP: #1031926 * kswapd: avoid unnecessary rebalance after an unsuccessful balancing - LP: #1031926 * kswapd: assign new_order and new_classzone_idx after wakeup in sleeping - LP: #1031926 * mm: compaction: introduce sync-light migration for use by compaction - LP: #1031926 * mm: vmscan: when reclaiming for compaction, ensure there are sufficient free pages available - LP: #1031926 * mm: vmscan: do not OOM if aborting reclaim to start compaction - LP: #1031926 * mm: vmscan: check if reclaim should really abort even if compaction_ready() is true for one zone - LP: #1031926 * vmscan: promote shared file mapped pages - LP: #1031926 * vmscan: activate executable pages after first usage - LP: #1031926 * mm/vmscan.c: consider swap space when deciding whether to continue reclaim - LP: #1031926 * mm: test PageSwapBacked in lumpy reclaim - LP: #1031926 * mm: vmscan: convert global reclaim to per-memcg LRU lists - LP: #1031926 * cpusets: avoid looping when storing to mems_allowed if one node remains set - LP: #1031926 * cpusets: stall when updating mems_allowed for mempolicy or disjoint nodemask - LP: #1031926 * cpuset: mm: reduce large amounts of memory barrier related damage v3 - LP: #1031926 * mm/hugetlb: fix warning in alloc_huge_page/dequeue_huge_page_vma - LP: #1031926 * vmscan: fix initial shrinker size handling - LP: #1031926 * Linux 3.0.39 - LP: #1031926 * rt2x00: Add support for BUFFALO WLI-UC-GNM2 to rt2800usb. - LP: #871904 * Avoid sysfs oops when an rc_dev's raw device is absent - LP: #1015836 * eCryptfs: Copy up POSIX ACL and read-only flags from lower mount - LP: #1009207 * eCryptfs: Initialize empty lower files when opening them - LP: #911507 * mmc: sdhci-pci: CaFe has broken card detection - LP: #1034988 * powerpc/ftrace: Fix assembly trampoline register usage - LP: #1034988 * powerpc: Add memory attribute for mfmsr() - LP: #1034988 * powerpc: Fix wrong divisor in usecs_to_cputime - LP: #1034988 * SCSI: libsas: continue revalidation - LP: #1034988 * SCSI: libsas: fix sas_discover_devices return code handling - LP: #1034988 * SCSI: fix eh wakeup (scsi_schedule_eh vs scsi_restart_operations) - LP: #1034988 * SCSI: fix hot unplug vs async scan race - LP: #1034988 * SCSI: Avoid dangling pointer in scsi_requeue_command() - LP: #1034988 * ARM: OMAP2+: OPP: Fix to ensure
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux - 3.0.0-25.41 --- linux (3.0.0-25.41) oneiric-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1036178 [ Andy Whitcroft ] * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 [ Douglas Bagnall ] * SAUCE: Unlock the rc_dev lock when the raw device is missing - LP: #1015836 [ Upstream Kernel Changes ] * cifs: always update the inode cache with the results from a FIND_* - LP: #1031926 * ntp: Fix STA_INS/DEL clearing bug - LP: #1031926 * mm: fix lost kswapd wakeup in kswapd_stop() - LP: #1031926 * MIPS: Properly align the .data..init_task section. - LP: #1031926 * UBIFS: fix a bug in empty space fix-up - LP: #1031926 * dm raid1: fix crash with mirror recovery and discard - LP: #1031926 * mm/vmstat.c: cache align vm_stat - LP: #1031926 * mm: memory hotplug: Check if pages are correctly reserved on a per-section basis - LP: #1031926 * mm: reduce the amount of work done when updating min_free_kbytes - LP: #1031926 * mm: vmscan: fix force-scanning small targets without swap - LP: #1031926 * vmscan: clear ZONE_CONGESTED for zone with good watermark - LP: #1031926 * vmscan: add shrink_slab tracepoints - LP: #1031926 * vmscan: shrinker-nr updates race and go wrong - LP: #1031926 * vmscan: reduce wind up shrinker-nr when shrinker can't do work - LP: #1031926 * vmscan: limit direct reclaim for higher order allocations - LP: #1031926 * vmscan: abort reclaim/compaction if compaction can proceed - LP: #1031926 * mm: compaction: trivial clean up in acct_isolated() - LP: #1031926 * mm: change isolate mode from #define to bitwise type - LP: #1031926 * mm: compaction: make isolate_lru_page() filter-aware - LP: #1031926 * mm: zone_reclaim: make isolate_lru_page() filter-aware - LP: #1031926 * mm: migration: clean up unmap_and_move() - LP: #1031926 * mm: compaction: allow compaction to isolate dirty pages - LP: #1031926 * mm: compaction: determine if dirty pages can be migrated without blocking within -migratepage - LP: #1031926 * mm: page allocator: do not call direct reclaim for THP allocations while compaction is deferred - LP: #1031926 * mm: compaction: make isolate_lru_page() filter-aware again - LP: #1031926 * kswapd: avoid unnecessary rebalance after an unsuccessful balancing - LP: #1031926 * kswapd: assign new_order and new_classzone_idx after wakeup in sleeping - LP: #1031926 * mm: compaction: introduce sync-light migration for use by compaction - LP: #1031926 * mm: vmscan: when reclaiming for compaction, ensure there are sufficient free pages available - LP: #1031926 * mm: vmscan: do not OOM if aborting reclaim to start compaction - LP: #1031926 * mm: vmscan: check if reclaim should really abort even if compaction_ready() is true for one zone - LP: #1031926 * vmscan: promote shared file mapped pages - LP: #1031926 * vmscan: activate executable pages after first usage - LP: #1031926 * mm/vmscan.c: consider swap space when deciding whether to continue reclaim - LP: #1031926 * mm: test PageSwapBacked in lumpy reclaim - LP: #1031926 * mm: vmscan: convert global reclaim to per-memcg LRU lists - LP: #1031926 * cpusets: avoid looping when storing to mems_allowed if one node remains set - LP: #1031926 * cpusets: stall when updating mems_allowed for mempolicy or disjoint nodemask - LP: #1031926 * cpuset: mm: reduce large amounts of memory barrier related damage v3 - LP: #1031926 * mm/hugetlb: fix warning in alloc_huge_page/dequeue_huge_page_vma - LP: #1031926 * vmscan: fix initial shrinker size handling - LP: #1031926 * Linux 3.0.39 - LP: #1031926 * rt2x00: Add support for BUFFALO WLI-UC-GNM2 to rt2800usb. - LP: #871904 * Avoid sysfs oops when an rc_dev's raw device is absent - LP: #1015836 * eCryptfs: Copy up POSIX ACL and read-only flags from lower mount - LP: #1009207 * eCryptfs: Initialize empty lower files when opening them - LP: #911507 * mmc: sdhci-pci: CaFe has broken card detection - LP: #1034988 * powerpc/ftrace: Fix assembly trampoline register usage - LP: #1034988 * powerpc: Add memory attribute for mfmsr() - LP: #1034988 * powerpc: Fix wrong divisor in usecs_to_cputime - LP: #1034988 * SCSI: libsas: continue revalidation - LP: #1034988 * SCSI: libsas: fix sas_discover_devices return code handling - LP: #1034988 * SCSI: fix eh wakeup (scsi_schedule_eh vs scsi_restart_operations) - LP: #1034988 * SCSI: fix hot unplug vs async scan race - LP: #1034988 * SCSI: Avoid dangling pointer in scsi_requeue_command() - LP: #1034988 * ARM: OMAP2+: OPP: Fix to ensure check of right oppdef after bad one - LP:
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux - 2.6.32-42.96 --- linux (2.6.32-42.96) lucid-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1036553 [ Andy Whitcroft ] * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 [ Upstream Kernel Changes ] * udf: Fortify loading of sparing table - LP: #1024497 - CVE-2012-3400 * udf: Avoid run away loop when partition table length is corrupted - LP: #1024497 - CVE-2012-3400 * eCryptfs: Gracefully refuse miscdev file ops on inherited/passed files - LP: #994247 * eCryptfs: Copy up POSIX ACL and read-only flags from lower mount - LP: #1009207 * drm: integer overflow in drm_mode_dirtyfb_ioctl() - LP: #917838 - CVE-2012-0044 -- Luis Henriques luis.henriq...@canonical.com Tue, 14 Aug 2012 09:51:58 +0100 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux-ti-omap4 - 3.5.0-207.13 --- linux-ti-omap4 (3.5.0-207.13) quantal-proposed; urgency=low [ Paolo Pisati ] * Start new release [ Stefan Bader ] * (config) Enable getabis to use local package copies [ Upstream Kernel Changes ] * fixup: gargabe collect iva_seq[0|1] init * [Config] enable all SND_OMAP_SOC_*s * fixup: cm2xxx_3xxx.o is needed for omap2_cm_read|write_reg * fixup: add some snd_soc_dai* helper functions * fixup: s/snd_soc_dpcm_params/snd_soc_dpcm/g * fixup: typo, no_host_mode and useless SDP4430 init * fixup: enable again aess hwmod -- Paolo Pisati paolo.pis...@canonical.com Wed, 15 Aug 2012 17:17:43 +0200 ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re:[Bug 1016299] Re: CVE-2012-2372
unsubscribe At 2012-08-20 23:49:15,Launchpad Bug Tracker 1016...@bugs.launchpad.net wrote: This bug was fixed in the package linux-ti-omap4 - 3.5.0-207.13 --- linux-ti-omap4 (3.5.0-207.13) quantal-proposed; urgency=low [ Paolo Pisati ] * Start new release [ Stefan Bader ] * (config) Enable getabis to use local package copies [ Upstream Kernel Changes ] * fixup: gargabe collect iva_seq[0|1] init * [Config] enable all SND_OMAP_SOC_*s * fixup: cm2xxx_3xxx.o is needed for omap2_cm_read|write_reg * fixup: add some snd_soc_dai* helper functions * fixup: s/snd_soc_dpcm_params/snd_soc_dpcm/g * fixup: typo, no_host_mode and useless SDP4430 init * fixup: enable again aess hwmod -- Paolo Pisati paolo.pis...@canonical.com Wed, 15 Aug 2012 17:17:43 +0200 ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: Fix Committed = Fix Released -- You received this bug notification because you are subscribed to linux- ti-omap4 in Ubuntu. Matching subscriptions: yuanrui https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 Status in “linux” package in Ubuntu: Fix Released Status in “linux-armadaxp” package in Ubuntu: Fix Released Status in “linux-ec2” package in Ubuntu: Invalid Status in “linux-fsl-imx51” package in Ubuntu: Invalid Status in “linux-lts-backport-maverick” package in Ubuntu: Invalid Status in “linux-lts-backport-natty” package in Ubuntu: Invalid Status in “linux-lts-backport-oneiric” package in Ubuntu: Invalid Status in “linux-mvl-dove” package in Ubuntu: Invalid Status in “linux-ti-omap4” package in Ubuntu: Fix Released Status in “linux” source package in Lucid: Fix Committed Status in “linux-armadaxp” source package in Lucid: Invalid Status in “linux-ec2” source package in Lucid: Fix Committed Status in “linux-fsl-imx51” source package in Lucid: Invalid Status in “linux-lts-backport-maverick” source package in Lucid: Invalid Status in “linux-lts-backport-natty” source package in Lucid: Fix Released Status in “linux-lts-backport-oneiric” source package in Lucid: Fix Committed Status in “linux-mvl-dove” source package in Lucid: Invalid Status in “linux-ti-omap4” source package in Lucid: Invalid Status in “linux” source package in Natty: Fix Released Status in “linux-armadaxp” source package in Natty: Invalid Status in “linux-ec2” source package in Natty: Invalid Status in “linux-fsl-imx51” source package in Natty: Invalid Status in “linux-lts-backport-maverick” source package in Natty: Invalid Status in “linux-lts-backport-natty” source package in Natty: Invalid Status in “linux-lts-backport-oneiric” source package in Natty: Invalid Status in “linux-mvl-dove” source package in Natty: Invalid Status in “linux-ti-omap4” source package in Natty: Fix Released Status in “linux” source package in Oneiric: Fix Committed Status in “linux-armadaxp” source package in Oneiric: Invalid Status in “linux-ec2” source package in Oneiric: Invalid Status in “linux-fsl-imx51” source package in Oneiric: Invalid Status in “linux-lts-backport-maverick” source package in Oneiric: Invalid Status in “linux-lts-backport-natty” source package in Oneiric: Invalid Status in “linux-lts-backport-oneiric” source package in Oneiric: Invalid Status in “linux-mvl-dove” source package in Oneiric: Invalid Status in “linux-ti-omap4” source package in Oneiric: Fix Committed Status in “linux” source package in Precise: Fix Released Status in “linux-armadaxp” source package in Precise: Fix Released Status in “linux-ec2” source package in Precise: Invalid Status in “linux-fsl-imx51” source package in Precise: Invalid Status in “linux-lts-backport-maverick” source package in Precise: Invalid Status in “linux-lts-backport-natty” source package in Precise: Invalid Status in “linux-lts-backport-oneiric” source package in Precise: Invalid Status in “linux-mvl-dove” source package in Precise: Invalid Status in “linux-ti-omap4” source package in Precise: Fix Released Status in “linux” source package in Quantal: Fix Released Status in “linux-armadaxp” source package in Quantal: Fix Released Status in “linux-ec2” source package in Quantal: Invalid Status in “linux-fsl-imx51” source package in Quantal: Invalid Status in “linux-lts-backport-maverick” source package in Quantal: Invalid Status in “linux-lts-backport-natty” source package in Quantal: Invalid Status in “linux-lts-backport-oneiric” source package in Quantal: Invalid Status in “linux-mvl-dove” source package in Quantal: Invalid Status in “linux-ti-omap4” source package in Quantal: Fix Released Status in “linux” source package in Hardy: Invalid Status in “linux-armadaxp” source package in Hardy: Invalid Status in “linux-ec2” source package in Hardy: Invalid Status in “linux-fsl-imx51” source package in Hardy: Invalid Status in “linux-lts-backport-maverick” source package in Hardy: Invalid Status in
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux-lts-backport-natty - 2.6.38-15.65~lucid1 --- linux-lts-backport-natty (2.6.38-15.65~lucid1) lucid-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1029786 [ Andy Whitcroft ] * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 [ Upstream Kernel Changes ] * hugetlb: fix resv_map leak in error path - LP: #1004621 - CVE-2012-2390 * mm: fix vma_resv_map() NULL pointer - LP: #1004621 - CVE-2012-2390 * net: sock: validate data_len before allocating skb in sock_alloc_send_pskb() - LP: #1006622 - CVE-2012-2136 -- Luis Henriques luis.henriq...@canonical.com Fri, 27 Jul 2012 14:13:12 +0100 ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Branch linked: lp:ubuntu/natty-security/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux - 2.6.38-15.65 --- linux (2.6.38-15.65) natty-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1027821 [ Andy Whitcroft ] * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 [ Upstream Kernel Changes ] * hugetlb: fix resv_map leak in error path - LP: #1004621 - CVE-2012-2390 * mm: fix vma_resv_map() NULL pointer - LP: #1004621 - CVE-2012-2390 * net: sock: validate data_len before allocating skb in sock_alloc_send_pskb() - LP: #1006622 - CVE-2012-2136 -- Luis Henriques luis.henriq...@canonical.com Thu, 26 Jul 2012 14:37:28 +0100 ** Changed in: linux (Ubuntu Natty) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-2136 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-2390 ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-4131 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-2123 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-2313 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-2319 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-2375 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.25 --- linux-ti-omap4 (2.6.38-1209.25) natty-proposed; urgency=low * Release Tracking Bug - LP: #1029784 [ Andy Whitcroft ] * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 [ Upstream Kernel Changes ] * fcaps: clear the same personality flags as suid when fcaps are used - LP: #987571 - CVE-2012-2123 * security: fix compile error in commoncap.c - LP: #987571 - CVE-2012-2123 * net: sock: validate data_len before allocating skb in sock_alloc_send_pskb() - LP: #1006622 - CVE-2012-2136 * dl2k: Clean up rio_ioctl - CVE-2012-2313 * hfsplus: Fix potential buffer overflows - CVE-2012-2319 * nfs: don't lose MS_SYNCHRONOUS on remount of noac mount - LP: #775809 * NFSv4.1: Ensure state manager thread dies on last umount - LP: #775809 * NFSv4: Handle expired stateids when the lease is still valid - LP: #793702 * NFSv4.1: Fix the handling of NFS4ERR_SEQ_MISORDERED errors - LP: #793702 * NFSv4: include bitmap in nfsv4 get acl data - LP: #893147 - CVE-2011-4131 * Avoid reading past buffer when calling GETACL - LP: #1002505 - CVE-2012-2375 * Avoid beyond bounds copy while caching ACL - LP: #1002505 - CVE-2012-2375 * Fix length of buffer copied in __nfs4_get_acl_uncached - LP: #1002505 - CVE-2012-2375 -- Paolo Pisati paolo.pis...@canonical.com Fri, 27 Jul 2012 15:54:18 +0200 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux - 3.2.0-29.46 --- linux (3.2.0-29.46) precise-proposed; urgency=low [ Tim Gardner ] * No change upload to fix armel/armhf FTBS caused by 'UBUNTU: [Config] SND_OMAP_SOC, SND_OMAP_SOC_MCBSP and SND_OMAP_SOC_OMAP3_BEAGLE =y' Added ignore and ignore.module files to ABI directories. [Luis Henriques] * Release Tracking Bug - LP: #1029507 linux (3.2.0-29.45) precise-proposed; urgency=low [Luis Henriques] * Release Tracking Bug - LP: #1029507 [ Andy Whitcroft ] * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 [ Upstream Kernel Changes ] * Revert samsung-laptop: make the dmi check less strict - LP: #1029431 * samsung-laptop: make the dmi check less strict - LP: #1029431 * raid5: delayed stripe fix - LP: #1029431 * tcp: drop SYN+FIN messages - LP: #1029431 * tg3: Apply short DMA frag workaround to 5906 - LP: #1029431 * rtl8187: -brightness_set can not sleep - LP: #1029431 * net/wireless: ipw2x00: add supported cipher suites to wiphy initialization - LP: #1029431 * kbuild: do not check for ancient modutils tools - LP: #1029431 * brcmsmac: INTERMEDIATE but not AMPDU only when tracing - LP: #1029431 * ext4: Report max_batch_time option correctly - LP: #1029431 * NFSv4: Reduce the footprint of the idmapper - LP: #1029431 * NFSv4: Further reduce the footprint of the idmapper - LP: #1029431 * macvtap: zerocopy: fix offset calculation when building skb - LP: #1029431 * macvtap: zerocopy: fix truesize underestimation - LP: #1029431 * macvtap: zerocopy: put page when fail to get all requested user pages - LP: #1029431 * macvtap: zerocopy: set SKBTX_DEV_ZEROCOPY only when skb is built successfully - LP: #1029431 * macvtap: zerocopy: validate vectors before building skb - LP: #1029431 * KVM: Fix buffer overflow in kvm_set_irq() - LP: #1029431 * scsi: Silence unnecessary warnings about ioctl to partition - LP: #1029431 * iommu/amd: Fix missing iommu_shutdown initialization in passthrough mode - LP: #1029431 * iommu/amd: Initialize dma_ops for hotplug and sriov devices - LP: #1029431 * usb: Add support for root hub port status CAS - LP: #1029431 * gpiolib: wm8994: Pay attention to the value set when enabling as output - LP: #1029431 * sched/nohz: Rewrite and fix load-avg computation -- again - LP: #1029431 * USB: option: add ZTE MF60 - LP: #1029431 * USB: option: Add MEDIATEK product ids - LP: #1029431 * USB: cdc-wdm: fix lockup on error in wdm_read - LP: #1029431 * mtd: nandsim: don't open code a do_div helper - LP: #1029431 * dvb-core: Release semaphore on error path dvb_register_device() - LP: #1029431 * hwspinlock/core: use global ID to register hwspinlocks on multiple devices - LP: #1029431 * libsas: fix taskfile corruption in sas_ata_qc_fill_rtf - LP: #1029431 * md/raid1: fix use-after-free bug in RAID1 data-check code. - LP: #1029431 * PCI: EHCI: fix crash during suspend on ASUS computers - LP: #1029431 * memory hotplug: fix invalid memory access caused by stale kswapd pointer - LP: #1029431 * mm, thp: abort compaction if migration page cannot be charged to memcg - LP: #1029431 * drivers/rtc/rtc-mxc.c: fix irq enabled interrupts warning - LP: #1029431 * fs: ramfs: file-nommu: add SetPageUptodate() - LP: #1029431 * cpufreq / ACPI: Fix not loading acpi-cpufreq driver regression - LP: #1029431 * hwmon: (it87) Preserve configuration register bits on init - LP: #1029431 * ARM: SAMSUNG: fix race in s3c_adc_start for ADC - LP: #1029431 * block: fix infinite loop in __getblk_slow - LP: #1029431 * Remove easily user-triggerable BUG from generic_setlease - LP: #1029431 * NFC: Export nfc.h to userland - LP: #1029431 * PM / Hibernate: Hibernate/thaw fixes/improvements - LP: #1029431 * cfg80211: check iface combinations only when iface is running - LP: #1029431 * intel_ips: blacklist HP ProBook laptops - LP: #1029431 * atl1c: fix issue of transmit queue 0 timed out - LP: #1029431 * rt2x00usb: fix indexes ordering on RX queue kick - LP: #1029431 * iwlegacy: always monitor for stuck queues - LP: #1029431 * iwlegacy: don't mess up the SCD when removing a key - LP: #1029431 * e1000e: Correct link check logic for 82571 serdes - LP: #1029431 * tcm_fc: Fix crash seen with aborts and large reads - LP: #1029431 * fifo: Do not restart open() if it already found a partner - LP: #1029431 * target: Clean up returning errors in PR handling code - LP: #1029431 * target: Fix range calculation in WRITE SAME emulation when num blocks == 0 - LP: #1029431 * cifs: on CONFIG_HIGHMEM machines, limit the rsize/wsize to the kmap space - LP: #1029431
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux-armadaxp - 3.2.0-1606.9 --- linux-armadaxp (3.2.0-1606.9) precise-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1030308 * Rebase onto Ubuntu-3.2.0-29.46 [ Ubuntu: 3.2.0-29.46 ] * No change upload to fix armel/armhf FTBS caused by 'UBUNTU: [Config] SND_OMAP_SOC, SND_OMAP_SOC_MCBSP and SND_OMAP_SOC_OMAP3_BEAGLE =y' Added ignore and ignore.module files to ABI directories. * Release Tracking Bug - LP: #1029507 [ Ubuntu: 3.2.0-29.45 ] * Release Tracking Bug - LP: #1029507 * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 * Revert samsung-laptop: make the dmi check less strict - LP: #1029431 * samsung-laptop: make the dmi check less strict - LP: #1029431 * raid5: delayed stripe fix - LP: #1029431 * tcp: drop SYN+FIN messages - LP: #1029431 * tg3: Apply short DMA frag workaround to 5906 - LP: #1029431 * rtl8187: -brightness_set can not sleep - LP: #1029431 * net/wireless: ipw2x00: add supported cipher suites to wiphy initialization - LP: #1029431 * kbuild: do not check for ancient modutils tools - LP: #1029431 * brcmsmac: INTERMEDIATE but not AMPDU only when tracing - LP: #1029431 * ext4: Report max_batch_time option correctly - LP: #1029431 * NFSv4: Reduce the footprint of the idmapper - LP: #1029431 * NFSv4: Further reduce the footprint of the idmapper - LP: #1029431 * macvtap: zerocopy: fix offset calculation when building skb - LP: #1029431 * macvtap: zerocopy: fix truesize underestimation - LP: #1029431 * macvtap: zerocopy: put page when fail to get all requested user pages - LP: #1029431 * macvtap: zerocopy: set SKBTX_DEV_ZEROCOPY only when skb is built successfully - LP: #1029431 * macvtap: zerocopy: validate vectors before building skb - LP: #1029431 * KVM: Fix buffer overflow in kvm_set_irq() - LP: #1029431 * scsi: Silence unnecessary warnings about ioctl to partition - LP: #1029431 * iommu/amd: Fix missing iommu_shutdown initialization in passthrough mode - LP: #1029431 * iommu/amd: Initialize dma_ops for hotplug and sriov devices - LP: #1029431 * usb: Add support for root hub port status CAS - LP: #1029431 * gpiolib: wm8994: Pay attention to the value set when enabling as output - LP: #1029431 * sched/nohz: Rewrite and fix load-avg computation -- again - LP: #1029431 * USB: option: add ZTE MF60 - LP: #1029431 * USB: option: Add MEDIATEK product ids - LP: #1029431 * USB: cdc-wdm: fix lockup on error in wdm_read - LP: #1029431 * mtd: nandsim: don't open code a do_div helper - LP: #1029431 * dvb-core: Release semaphore on error path dvb_register_device() - LP: #1029431 * hwspinlock/core: use global ID to register hwspinlocks on multiple devices - LP: #1029431 * libsas: fix taskfile corruption in sas_ata_qc_fill_rtf - LP: #1029431 * md/raid1: fix use-after-free bug in RAID1 data-check code. - LP: #1029431 * PCI: EHCI: fix crash during suspend on ASUS computers - LP: #1029431 * memory hotplug: fix invalid memory access caused by stale kswapd pointer - LP: #1029431 * mm, thp: abort compaction if migration page cannot be charged to memcg - LP: #1029431 * drivers/rtc/rtc-mxc.c: fix irq enabled interrupts warning - LP: #1029431 * fs: ramfs: file-nommu: add SetPageUptodate() - LP: #1029431 * cpufreq / ACPI: Fix not loading acpi-cpufreq driver regression - LP: #1029431 * hwmon: (it87) Preserve configuration register bits on init - LP: #1029431 * ARM: SAMSUNG: fix race in s3c_adc_start for ADC - LP: #1029431 * block: fix infinite loop in __getblk_slow - LP: #1029431 * Remove easily user-triggerable BUG from generic_setlease - LP: #1029431 * NFC: Export nfc.h to userland - LP: #1029431 * PM / Hibernate: Hibernate/thaw fixes/improvements - LP: #1029431 * cfg80211: check iface combinations only when iface is running - LP: #1029431 * intel_ips: blacklist HP ProBook laptops - LP: #1029431 * atl1c: fix issue of transmit queue 0 timed out - LP: #1029431 * rt2x00usb: fix indexes ordering on RX queue kick - LP: #1029431 * iwlegacy: always monitor for stuck queues - LP: #1029431 * iwlegacy: don't mess up the SCD when removing a key - LP: #1029431 * e1000e: Correct link check logic for 82571 serdes - LP: #1029431 * tcm_fc: Fix crash seen with aborts and large reads - LP: #1029431 * fifo: Do not restart open() if it already found a partner - LP: #1029431 * target: Clean up returning errors in PR handling code - LP: #1029431 * target: Fix range calculation in WRITE SAME emulation when num blocks == 0 - LP: #1029431 * cifs: on CONFIG_HIGHMEM machines, limit the rsize/wsize to the kmap space - LP:
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux-armadaxp - 3.2.0-1606.9 --- linux-armadaxp (3.2.0-1606.9) precise-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1030308 * Rebase onto Ubuntu-3.2.0-29.46 [ Ubuntu: 3.2.0-29.46 ] * No change upload to fix armel/armhf FTBS caused by 'UBUNTU: [Config] SND_OMAP_SOC, SND_OMAP_SOC_MCBSP and SND_OMAP_SOC_OMAP3_BEAGLE =y' Added ignore and ignore.module files to ABI directories. * Release Tracking Bug - LP: #1029507 [ Ubuntu: 3.2.0-29.45 ] * Release Tracking Bug - LP: #1029507 * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 * Revert samsung-laptop: make the dmi check less strict - LP: #1029431 * samsung-laptop: make the dmi check less strict - LP: #1029431 * raid5: delayed stripe fix - LP: #1029431 * tcp: drop SYN+FIN messages - LP: #1029431 * tg3: Apply short DMA frag workaround to 5906 - LP: #1029431 * rtl8187: -brightness_set can not sleep - LP: #1029431 * net/wireless: ipw2x00: add supported cipher suites to wiphy initialization - LP: #1029431 * kbuild: do not check for ancient modutils tools - LP: #1029431 * brcmsmac: INTERMEDIATE but not AMPDU only when tracing - LP: #1029431 * ext4: Report max_batch_time option correctly - LP: #1029431 * NFSv4: Reduce the footprint of the idmapper - LP: #1029431 * NFSv4: Further reduce the footprint of the idmapper - LP: #1029431 * macvtap: zerocopy: fix offset calculation when building skb - LP: #1029431 * macvtap: zerocopy: fix truesize underestimation - LP: #1029431 * macvtap: zerocopy: put page when fail to get all requested user pages - LP: #1029431 * macvtap: zerocopy: set SKBTX_DEV_ZEROCOPY only when skb is built successfully - LP: #1029431 * macvtap: zerocopy: validate vectors before building skb - LP: #1029431 * KVM: Fix buffer overflow in kvm_set_irq() - LP: #1029431 * scsi: Silence unnecessary warnings about ioctl to partition - LP: #1029431 * iommu/amd: Fix missing iommu_shutdown initialization in passthrough mode - LP: #1029431 * iommu/amd: Initialize dma_ops for hotplug and sriov devices - LP: #1029431 * usb: Add support for root hub port status CAS - LP: #1029431 * gpiolib: wm8994: Pay attention to the value set when enabling as output - LP: #1029431 * sched/nohz: Rewrite and fix load-avg computation -- again - LP: #1029431 * USB: option: add ZTE MF60 - LP: #1029431 * USB: option: Add MEDIATEK product ids - LP: #1029431 * USB: cdc-wdm: fix lockup on error in wdm_read - LP: #1029431 * mtd: nandsim: don't open code a do_div helper - LP: #1029431 * dvb-core: Release semaphore on error path dvb_register_device() - LP: #1029431 * hwspinlock/core: use global ID to register hwspinlocks on multiple devices - LP: #1029431 * libsas: fix taskfile corruption in sas_ata_qc_fill_rtf - LP: #1029431 * md/raid1: fix use-after-free bug in RAID1 data-check code. - LP: #1029431 * PCI: EHCI: fix crash during suspend on ASUS computers - LP: #1029431 * memory hotplug: fix invalid memory access caused by stale kswapd pointer - LP: #1029431 * mm, thp: abort compaction if migration page cannot be charged to memcg - LP: #1029431 * drivers/rtc/rtc-mxc.c: fix irq enabled interrupts warning - LP: #1029431 * fs: ramfs: file-nommu: add SetPageUptodate() - LP: #1029431 * cpufreq / ACPI: Fix not loading acpi-cpufreq driver regression - LP: #1029431 * hwmon: (it87) Preserve configuration register bits on init - LP: #1029431 * ARM: SAMSUNG: fix race in s3c_adc_start for ADC - LP: #1029431 * block: fix infinite loop in __getblk_slow - LP: #1029431 * Remove easily user-triggerable BUG from generic_setlease - LP: #1029431 * NFC: Export nfc.h to userland - LP: #1029431 * PM / Hibernate: Hibernate/thaw fixes/improvements - LP: #1029431 * cfg80211: check iface combinations only when iface is running - LP: #1029431 * intel_ips: blacklist HP ProBook laptops - LP: #1029431 * atl1c: fix issue of transmit queue 0 timed out - LP: #1029431 * rt2x00usb: fix indexes ordering on RX queue kick - LP: #1029431 * iwlegacy: always monitor for stuck queues - LP: #1029431 * iwlegacy: don't mess up the SCD when removing a key - LP: #1029431 * e1000e: Correct link check logic for 82571 serdes - LP: #1029431 * tcm_fc: Fix crash seen with aborts and large reads - LP: #1029431 * fifo: Do not restart open() if it already found a partner - LP: #1029431 * target: Clean up returning errors in PR handling code - LP: #1029431 * target: Fix range calculation in WRITE SAME emulation when num blocks == 0 - LP: #1029431 * cifs: on CONFIG_HIGHMEM machines, limit the rsize/wsize to the kmap space - LP:
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1417.23 --- linux-ti-omap4 (3.2.0-1417.23) precise-proposed; urgency=low * Release Tracking Bug - LP: #1030306 [ Paolo Pisati ] * rebased on 3.2.0-29.46 [ Ubuntu: 3.2.0-29.46 ] * No change upload to fix armel/armhf FTBS caused by 'UBUNTU: [Config] SND_OMAP_SOC, SND_OMAP_SOC_MCBSP and SND_OMAP_SOC_OMAP3_BEAGLE =y' Added ignore and ignore.module files to ABI directories. * Release Tracking Bug - LP: #1029507 [ Ubuntu: 3.2.0-29.45 ] * Release Tracking Bug - LP: #1029507 * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 * Revert samsung-laptop: make the dmi check less strict - LP: #1029431 * samsung-laptop: make the dmi check less strict - LP: #1029431 * raid5: delayed stripe fix - LP: #1029431 * tcp: drop SYN+FIN messages - LP: #1029431 * tg3: Apply short DMA frag workaround to 5906 - LP: #1029431 * rtl8187: -brightness_set can not sleep - LP: #1029431 * net/wireless: ipw2x00: add supported cipher suites to wiphy initialization - LP: #1029431 * kbuild: do not check for ancient modutils tools - LP: #1029431 * brcmsmac: INTERMEDIATE but not AMPDU only when tracing - LP: #1029431 * ext4: Report max_batch_time option correctly - LP: #1029431 * NFSv4: Reduce the footprint of the idmapper - LP: #1029431 * NFSv4: Further reduce the footprint of the idmapper - LP: #1029431 * macvtap: zerocopy: fix offset calculation when building skb - LP: #1029431 * macvtap: zerocopy: fix truesize underestimation - LP: #1029431 * macvtap: zerocopy: put page when fail to get all requested user pages - LP: #1029431 * macvtap: zerocopy: set SKBTX_DEV_ZEROCOPY only when skb is built successfully - LP: #1029431 * macvtap: zerocopy: validate vectors before building skb - LP: #1029431 * KVM: Fix buffer overflow in kvm_set_irq() - LP: #1029431 * scsi: Silence unnecessary warnings about ioctl to partition - LP: #1029431 * iommu/amd: Fix missing iommu_shutdown initialization in passthrough mode - LP: #1029431 * iommu/amd: Initialize dma_ops for hotplug and sriov devices - LP: #1029431 * usb: Add support for root hub port status CAS - LP: #1029431 * gpiolib: wm8994: Pay attention to the value set when enabling as output - LP: #1029431 * sched/nohz: Rewrite and fix load-avg computation -- again - LP: #1029431 * USB: option: add ZTE MF60 - LP: #1029431 * USB: option: Add MEDIATEK product ids - LP: #1029431 * USB: cdc-wdm: fix lockup on error in wdm_read - LP: #1029431 * mtd: nandsim: don't open code a do_div helper - LP: #1029431 * dvb-core: Release semaphore on error path dvb_register_device() - LP: #1029431 * hwspinlock/core: use global ID to register hwspinlocks on multiple devices - LP: #1029431 * libsas: fix taskfile corruption in sas_ata_qc_fill_rtf - LP: #1029431 * md/raid1: fix use-after-free bug in RAID1 data-check code. - LP: #1029431 * PCI: EHCI: fix crash during suspend on ASUS computers - LP: #1029431 * memory hotplug: fix invalid memory access caused by stale kswapd pointer - LP: #1029431 * mm, thp: abort compaction if migration page cannot be charged to memcg - LP: #1029431 * drivers/rtc/rtc-mxc.c: fix irq enabled interrupts warning - LP: #1029431 * fs: ramfs: file-nommu: add SetPageUptodate() - LP: #1029431 * cpufreq / ACPI: Fix not loading acpi-cpufreq driver regression - LP: #1029431 * hwmon: (it87) Preserve configuration register bits on init - LP: #1029431 * ARM: SAMSUNG: fix race in s3c_adc_start for ADC - LP: #1029431 * block: fix infinite loop in __getblk_slow - LP: #1029431 * Remove easily user-triggerable BUG from generic_setlease - LP: #1029431 * NFC: Export nfc.h to userland - LP: #1029431 * PM / Hibernate: Hibernate/thaw fixes/improvements - LP: #1029431 * cfg80211: check iface combinations only when iface is running - LP: #1029431 * intel_ips: blacklist HP ProBook laptops - LP: #1029431 * atl1c: fix issue of transmit queue 0 timed out - LP: #1029431 * rt2x00usb: fix indexes ordering on RX queue kick - LP: #1029431 * iwlegacy: always monitor for stuck queues - LP: #1029431 * iwlegacy: don't mess up the SCD when removing a key - LP: #1029431 * e1000e: Correct link check logic for 82571 serdes - LP: #1029431 * tcm_fc: Fix crash seen with aborts and large reads - LP: #1029431 * fifo: Do not restart open() if it already found a partner - LP: #1029431 * target: Clean up returning errors in PR handling code - LP: #1029431 * target: Fix range calculation in WRITE SAME emulation when num blocks == 0 - LP: #1029431 * cifs: on CONFIG_HIGHMEM machines, limit the rsize/wsize to the kmap space - LP:
[Bug 1016299] Re: CVE-2012-2372
** Branch linked: lp:ubuntu/precise-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Branch linked: lp:ubuntu/quantal-proposed/linux-lowlatency -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
This bug was fixed in the package linux - 3.5.0-7.7 --- linux (3.5.0-7.7) quantal-proposed; urgency=low [ Andy Whitcroft ] * [Config] CONFIG_X86_POWERNOW_K6=m * [Config] CONFIG_X86_POWERNOW_K7=m * [Config] CONFIG_X86_LONGHAUL=m * [Config] CONFIG_X86_LONGRUN=m * [Config] CONFIG_X86_GX_SUSPMOD=m * [Config] CONFIG_X86_CPUFREQ_NFORCE2=m * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON() - LP: #1016299 - CVE-2012-2372 * [Config] enable CONFIG_VFAT_FS=y for EFI systems * [Config] CONFIG_USB_G_MULTI=n on highbank * [Config] annotate: CONFIG_USB_INVENTRA_DMA OMAP2 specific * [Config] CONFIG_WAN_ROUTER disable for arm * add support for generating binary device trees and install them in /lib/firmware - LP: #1030600 * [Config] add dtb_file configuration for highbank - LP: #1030600 [ Tim Gardner ] * SAUCE: ene_ub6250: Use macros for firmware names * SAUCE: s2255drv: Add MODULE_FIRMWARE statement * SAUCE: xc5000: Add MODULE_FIRMWARE statements * SAUCE: firmware: remove computone driver firmware and documentation * SAUCE: lgs8gxx: Declare MODULE_FIRMWARE usage * SAUCE: firmware: Remove obsolete Myricom firmware * SAUCE: staging rtl8192e: Declare MODULE_FIRMWARE usage * SAUCE: tlg2300: Declare MODULE_FIRMWARE usage * SAUCE: ueagle-atm: Declare MODULE_FIRMWARE usage * SAUCE: usbduxfast: Declare MODULE_FIRMWARE usage * SAUCE: usbdux: Declare MODULE_FIRMWARE usage * SAUCE: usbduxsigma: Declare MODULE_FIRMWARE usage * SAUCE: cx25840: Declare MODULE_FIRMWARE usage * SAUCE: cx18: Declare MODULE_FIRMWARE usage * SAUCE: ivtv: Declare MODULE_FIRMWARE usage * SAUCE: cx231xx: Declare MODULE_FIRMWARE usage * SAUCE: cx23885: Declare MODULE_FIRMWARE usage * SAUCE: pvrusb2: Declare MODULE_FIRMWARE usage * SAUCE: vxge: Declare MODULE_FIRMWARE usage [ Upstream Kernel Changes ] * mac80211: fix crash with single-queue drivers - LP: #1022351 -- Leann Ogasawara leann.ogasaw...@canonical.com Mon, 30 Jul 2012 11:11:05 -0700 ** Changed in: linux (Ubuntu Quantal) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Branch linked: lp:ubuntu/precise-proposed/linux-armadaxp -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New = Fix Committed ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Oneiric) Status: New = Fix Committed ** Changed in: linux (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux (Ubuntu Quantal) Status: In Progress = Fix Committed ** Changed in: linux (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux (Ubuntu Natty) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: New = Fix Committed ** Description changed: A flaw was found in the Linux kernel's Reliable Datagram Sockets (RDS) protocol implementation. A local, unprivileged user could use this flaw to cause a denial of service. - Break-Fix: - local-2012-2372 + Break-Fix: 639b321b4d8f4e412bfbb2a4a19bfebc1e68ace4 local-2012-2372 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Changed in: linux (Ubuntu Quantal) Status: New = In Progress ** Changed in: linux (Ubuntu Quantal) Assignee: (unassigned) = Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
** Description changed: A flaw was found in the Linux kernel's Reliable Datagram Sockets (RDS) protocol implementation. A local, unprivileged user could use this flaw to cause a denial of service. + + Break-Fix: - local-2012-2372 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1016299 Title: CVE-2012-2372 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1016299] Re: CVE-2012-2372
CVE-2012-2372 ** Also affects: linux (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Hardy) Importance: Undecided Status: New ** Changed in: linux-armadaxp (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Hardy) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Natty) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Status: New = Invalid **