[Bug 1016299] Re: CVE-2012-2372

2016-05-05 Thread Steve Beattie
** Changed in: linux-snapdragon (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Yakkety)
   Importance: Undecided => Low

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-snapdragon (Ubuntu Trusty)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2016-04-26 Thread Steve Beattie
** Also affects: linux (Ubuntu Yakkety)
   Importance: Low
   Status: Fix Committed

** Also affects: linux-fsl-imx51 (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-mako (Ubuntu Yakkety)
   Importance: Low
   Status: New

** Also affects: linux-manta (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Yakkety)
   Importance: Low
   Status: New

** Also affects: linux-flo (Ubuntu Yakkety)
   Importance: Low
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

** Also affects: linux-raspi2 (Ubuntu Yakkety)
   Importance: Low
   Status: Fix Committed

** Also affects: linux-lts-xenial (Ubuntu Yakkety)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2016-04-15 Thread Steve Beattie
** Changed in: linux-manta (Ubuntu Xenial)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2016-02-09 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2016-01-11 Thread Andy Whitcroft
** Changed in: linux (Ubuntu Xenial)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2016-01-03 Thread Mathew Hodson
** Changed in: linux (Ubuntu Wily)
   Status: Fix Committed => Invalid

** Changed in: linux (Ubuntu Xenial)
   Status: Fix Committed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-12-03 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-11-16 Thread Steve Beattie
** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-11-10 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => Low

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-10-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Low
   Status: Fix Committed

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Low
   Status: New

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Low
   Status: New

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Low
   Status: New

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Low
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-10-02 Thread Andy Whitcroft
** Changed in: linux (Ubuntu Wily)
   Status: Invalid => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-08-26 Thread John Johansen
** Description changed:

  The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram
- Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier
- allows local users to cause a denial of service (BUG_ON and kernel panic)
- by establishing an RDS connection with the source IP address equal to the
- IPoIB interface's own IP address, as demonstrated by rds-ping.
+ Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and
+ earlier allows local users to cause a denial of service (BUG_ON and
+ kernel panic) by establishing an RDS connection with the source IP
+ address equal to the IPoIB interface's own IP address, as demonstrated
+ by rds-ping.
  
  Break-Fix: 639b321b4d8f4e412bfbb2a4a19bfebc1e68ace4 local-2012-2372

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-08-18 Thread Mathew Hodson
** Changed in: linux (Ubuntu Vivid)
   Status: Fix Released = Invalid

** Changed in: linux (Ubuntu Vivid)
 Assignee: Andy Whitcroft (apw) = (unassigned)

** Changed in: linux (Ubuntu Wily)
   Status: Fix Released = Invalid

** Changed in: linux (Ubuntu Wily)
 Assignee: Andy Whitcroft (apw) = (unassigned)

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed = Invalid

** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: Fix Committed = Invalid

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: Fix Committed = Invalid

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: Fix Committed = Invalid

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Fix Committed = Invalid

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: Fix Committed = Invalid

** Description changed:

  The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram
- Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and
- earlier allows local users to cause a denial of service (BUG_ON and
- kernel panic) by establishing an RDS connection with the source IP
- address equal to the IPoIB interface's own IP address, as demonstrated
- by rds-ping.
+ Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier
+ allows local users to cause a denial of service (BUG_ON and kernel panic)
+ by establishing an RDS connection with the source IP address equal to the
+ IPoIB interface's own IP address, as demonstrated by rds-ping.
  
  Break-Fix: 639b321b4d8f4e412bfbb2a4a19bfebc1e68ace4 local-2012-2372

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-07-28 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-06-09 Thread Mathew Hodson
** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-05-27 Thread Mathew Hodson
Trusty, Utopic, Vivid, and Wily are not affected according to
http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-2372.html

I think those tasks should be changed to Invalid.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-05-21 Thread Andy Whitcroft
** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Invalid = Fix Committed

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: Invalid = Fix Committed

** Changed in: linux (Ubuntu Trusty)
   Status: Invalid = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily)
   Importance: Low
 Assignee: Andy Whitcroft (apw)
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-mako (Ubuntu Wily)
   Importance: Low
   Status: New

** Also affects: linux-manta (Ubuntu Wily)
   Importance: Low
   Status: New

** Also affects: linux-goldfish (Ubuntu Wily)
   Importance: Low
   Status: New

** Also affects: linux-flo (Ubuntu Wily)
   Importance: Low
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Wily)
   Importance: Low
   Status: Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New = Fix Committed

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Importance: Undecided = Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-05-04 Thread John Johansen
** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-ec2 (Ubuntu Lucid)

** No longer affects: linux-goldfish (Ubuntu Lucid)

** No longer affects: linux-lts-saucy (Ubuntu Lucid)

** No longer affects: linux-lts-quantal (Ubuntu Lucid)

** No longer affects: linux-mvl-dove (Ubuntu Lucid)

** No longer affects: linux-ti-omap4 (Ubuntu Lucid)

** No longer affects: linux (Ubuntu Lucid)

** No longer affects: linux-mako (Ubuntu Lucid)

** No longer affects: linux-fsl-imx51 (Ubuntu Lucid)

** No longer affects: linux-lts-utopic (Ubuntu Lucid)

** No longer affects: linux-flo (Ubuntu Lucid)

** No longer affects: linux-lts-raring (Ubuntu Lucid)

** No longer affects: linux-manta (Ubuntu Lucid)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2015-01-27 Thread John Johansen
** Also affects: linux (Ubuntu Vivid)
   Importance: Low
 Assignee: Andy Whitcroft (apw)
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Vivid)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** No longer affects: linux-lts-trusty (Ubuntu Saucy)

** No longer affects: linux-armadaxp (Ubuntu Saucy)

** No longer affects: linux-ec2 (Ubuntu Saucy)

** No longer affects: linux-goldfish (Ubuntu Saucy)

** No longer affects: linux-lts-saucy (Ubuntu Saucy)

** No longer affects: linux-lts-quantal (Ubuntu Saucy)

** No longer affects: linux-mvl-dove (Ubuntu Saucy)

** No longer affects: linux-ti-omap4 (Ubuntu Saucy)

** No longer affects: linux (Ubuntu Saucy)

** No longer affects: linux-mako (Ubuntu Saucy)

** No longer affects: linux-fsl-imx51 (Ubuntu Saucy)

** No longer affects: linux-lts-utopic (Ubuntu Saucy)

** No longer affects: linux-flo (Ubuntu Saucy)

** No longer affects: linux-lts-raring (Ubuntu Saucy)

** No longer affects: linux-manta (Ubuntu Saucy)

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-manta (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-manta (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-mako (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-mako (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Importance: Undecided = Low

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Status: New = Invalid

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Importance: Undecided = Low

** Changed in: linux-goldfish (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-goldfish (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-goldfish (Ubuntu Trusty)
   Status: New 

[Bug 1016299] Re: CVE-2012-2372

2014-06-26 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Saucy)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Saucy)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-oneiric (Ubuntu Saucy)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-maverick (Ubuntu Trusty)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Trusty)
   Status: New = Won't Fix

** Changed in: linux-lts-backport-oneiric (Ubuntu Trusty)
   Status: New = Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2014-06-10 Thread John Johansen
** Also affects: linux (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Utopic)
   Importance: Low
 Assignee: Andy Whitcroft (apw)
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Low
   Status: Fix Released

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic)
   Importance: Low
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Utopic)
   Importance: Low
   Status: Fix Released

** No longer affects: linux-armadaxp (Ubuntu Hardy)

** No longer affects: linux-armadaxp (Ubuntu Natty)

** No longer affects: linux-armadaxp (Ubuntu Oneiric)

** No longer affects: linux-armadaxp (Ubuntu Quantal)

** No longer affects: linux-ec2 (Ubuntu Hardy)

** No longer affects: linux-ec2 (Ubuntu Natty)

** No longer affects: linux-ec2 (Ubuntu Oneiric)

** No longer affects: linux-ec2 (Ubuntu Quantal)

** No longer affects: linux-lts-saucy (Ubuntu Hardy)

** No longer affects: linux-lts-saucy (Ubuntu Natty)

** No longer affects: linux-lts-saucy (Ubuntu Oneiric)

** No longer affects: linux-lts-saucy (Ubuntu Quantal)

** No longer affects: linux-lts-quantal (Ubuntu Hardy)

** No longer affects: linux-lts-quantal (Ubuntu Natty)

** No longer affects: linux-lts-quantal (Ubuntu Oneiric)

** No longer affects: linux-lts-quantal (Ubuntu Quantal)

** No longer affects: linux-mvl-dove (Ubuntu Hardy)

** No longer affects: linux-mvl-dove (Ubuntu Natty)

** No longer affects: linux-mvl-dove (Ubuntu Oneiric)

** No longer affects: linux-mvl-dove (Ubuntu Quantal)

** No longer affects: linux (Ubuntu Hardy)

** No longer affects: linux (Ubuntu Natty)

** No longer affects: linux (Ubuntu Oneiric)

** No longer affects: linux (Ubuntu Quantal)

** No longer affects: linux-fsl-imx51 (Ubuntu Hardy)

** No longer affects: linux-fsl-imx51 (Ubuntu Natty)

** No longer affects: linux-fsl-imx51 (Ubuntu Oneiric)

** No longer affects: linux-fsl-imx51 (Ubuntu Quantal)

** No longer affects: linux-ti-omap4 (Ubuntu Hardy)

** No longer affects: linux-ti-omap4 (Ubuntu Natty)

** No longer affects: linux-ti-omap4 (Ubuntu Oneiric)

** No longer affects: linux-ti-omap4 (Ubuntu Quantal)

** No longer affects: linux-lts-raring (Ubuntu Hardy)

** No longer affects: linux-lts-raring (Ubuntu Natty)

** No longer affects: linux-lts-raring (Ubuntu Oneiric)

** No longer affects: linux-lts-raring (Ubuntu Quantal)

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Importance: Undecided = Low

** Changed in: linux-lts-quantal (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Saucy)
   Importance: Undecided = Low

** Changed in: linux-lts-quantal (Ubuntu Trusty)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Trusty)
   Importance: Undecided = 

[Bug 1016299] Re: CVE-2012-2372

2012-09-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-25.41~lucid1

---
linux-lts-backport-oneiric (3.0.0-25.41~lucid1) lucid-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1036577

  [ Andy Whitcroft ]

  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372

  [ Douglas Bagnall ]

  * SAUCE: Unlock the rc_dev lock when the raw device is missing
- LP: #1015836

  [ Upstream Kernel Changes ]

  * cifs: always update the inode cache with the results from a FIND_*
- LP: #1031926
  * ntp: Fix STA_INS/DEL clearing bug
- LP: #1031926
  * mm: fix lost kswapd wakeup in kswapd_stop()
- LP: #1031926
  * MIPS: Properly align the .data..init_task section.
- LP: #1031926
  * UBIFS: fix a bug in empty space fix-up
- LP: #1031926
  * dm raid1: fix crash with mirror recovery and discard
- LP: #1031926
  * mm/vmstat.c: cache align vm_stat
- LP: #1031926
  * mm: memory hotplug: Check if pages are correctly reserved on a
per-section basis
- LP: #1031926
  * mm: reduce the amount of work done when updating min_free_kbytes
- LP: #1031926
  * mm: vmscan: fix force-scanning small targets without swap
- LP: #1031926
  * vmscan: clear ZONE_CONGESTED for zone with good watermark
- LP: #1031926
  * vmscan: add shrink_slab tracepoints
- LP: #1031926
  * vmscan: shrinker-nr updates race and go wrong
- LP: #1031926
  * vmscan: reduce wind up shrinker-nr when shrinker can't do work
- LP: #1031926
  * vmscan: limit direct reclaim for higher order allocations
- LP: #1031926
  * vmscan: abort reclaim/compaction if compaction can proceed
- LP: #1031926
  * mm: compaction: trivial clean up in acct_isolated()
- LP: #1031926
  * mm: change isolate mode from #define to bitwise type
- LP: #1031926
  * mm: compaction: make isolate_lru_page() filter-aware
- LP: #1031926
  * mm: zone_reclaim: make isolate_lru_page() filter-aware
- LP: #1031926
  * mm: migration: clean up unmap_and_move()
- LP: #1031926
  * mm: compaction: allow compaction to isolate dirty pages
- LP: #1031926
  * mm: compaction: determine if dirty pages can be migrated without
blocking within -migratepage
- LP: #1031926
  * mm: page allocator: do not call direct reclaim for THP allocations
while compaction is deferred
- LP: #1031926
  * mm: compaction: make isolate_lru_page() filter-aware again
- LP: #1031926
  * kswapd: avoid unnecessary rebalance after an unsuccessful balancing
- LP: #1031926
  * kswapd: assign new_order and new_classzone_idx after wakeup in sleeping
- LP: #1031926
  * mm: compaction: introduce sync-light migration for use by compaction
- LP: #1031926
  * mm: vmscan: when reclaiming for compaction, ensure there are sufficient
free pages available
- LP: #1031926
  * mm: vmscan: do not OOM if aborting reclaim to start compaction
- LP: #1031926
  * mm: vmscan: check if reclaim should really abort even if
compaction_ready() is true for one zone
- LP: #1031926
  * vmscan: promote shared file mapped pages
- LP: #1031926
  * vmscan: activate executable pages after first usage
- LP: #1031926
  * mm/vmscan.c: consider swap space when deciding whether to continue
reclaim
- LP: #1031926
  * mm: test PageSwapBacked in lumpy reclaim
- LP: #1031926
  * mm: vmscan: convert global reclaim to per-memcg LRU lists
- LP: #1031926
  * cpusets: avoid looping when storing to mems_allowed if one node remains
set
- LP: #1031926
  * cpusets: stall when updating mems_allowed for mempolicy or disjoint
nodemask
- LP: #1031926
  * cpuset: mm: reduce large amounts of memory barrier related damage v3
- LP: #1031926
  * mm/hugetlb: fix warning in alloc_huge_page/dequeue_huge_page_vma
- LP: #1031926
  * vmscan: fix initial shrinker size handling
- LP: #1031926
  * Linux 3.0.39
- LP: #1031926
  * rt2x00: Add support for BUFFALO WLI-UC-GNM2 to rt2800usb.
- LP: #871904
  * Avoid sysfs oops when an rc_dev's raw device is absent
- LP: #1015836
  * eCryptfs: Copy up POSIX ACL and read-only flags from lower mount
- LP: #1009207
  * eCryptfs: Initialize empty lower files when opening them
- LP: #911507
  * mmc: sdhci-pci: CaFe has broken card detection
- LP: #1034988
  * powerpc/ftrace: Fix assembly trampoline register usage
- LP: #1034988
  * powerpc: Add memory attribute for mfmsr()
- LP: #1034988
  * powerpc: Fix wrong divisor in usecs_to_cputime
- LP: #1034988
  * SCSI: libsas: continue revalidation
- LP: #1034988
  * SCSI: libsas: fix sas_discover_devices return code handling
- LP: #1034988
  * SCSI: fix eh wakeup (scsi_schedule_eh vs scsi_restart_operations)
- LP: #1034988
  * SCSI: fix hot unplug vs async scan race
- LP: #1034988
  * SCSI: Avoid dangling pointer in scsi_requeue_command()
- LP: #1034988
  * ARM: OMAP2+: OPP: Fix to 

[Bug 1016299] Re: CVE-2012-2372

2012-09-05 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ec2 - 2.6.32-347.53

---
linux-ec2 (2.6.32-347.53) lucid-proposed; urgency=low

  [ Stefan Bader ]

  * Rebased to Ubuntu-2.6.32-42.96
  * Release Tracking Bug
- LP: #1038971


  [ Ubuntu: 2.6.32-42.96 ]

  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372
  * udf: Fortify loading of sparing table
- LP: #1024497
- CVE-2012-3400
  * udf: Avoid run away loop when partition table length is corrupted
- LP: #1024497
- CVE-2012-3400
  * eCryptfs: Gracefully refuse miscdev file ops on inherited/passed files
- LP: #994247
  * eCryptfs: Copy up POSIX ACL and read-only flags from lower mount
- LP: #1009207
  * drm: integer overflow in drm_mode_dirtyfb_ioctl()
- LP: #917838
- CVE-2012-0044
 -- Stefan Bader stefan.ba...@canonical.com   Mon, 20 Aug 2012 18:32:20 +0200

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-09-05 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1215.27

---
linux-ti-omap4 (3.0.0-1215.27) oneiric-proposed; urgency=low

  * Release Tracking Bug
- LP: #1036576

  [ Paolo Pisati ]

  * rebased on Ubuntu-3.0.0-25.41

  [ Ubuntu: 3.0.0-25.41 ]

  * Release Tracking Bug
- LP: #1036178
  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372
  * SAUCE: Unlock the rc_dev lock when the raw device is missing
- LP: #1015836
  * cifs: always update the inode cache with the results from a FIND_*
- LP: #1031926
  * ntp: Fix STA_INS/DEL clearing bug
- LP: #1031926
  * mm: fix lost kswapd wakeup in kswapd_stop()
- LP: #1031926
  * MIPS: Properly align the .data..init_task section.
- LP: #1031926
  * UBIFS: fix a bug in empty space fix-up
- LP: #1031926
  * dm raid1: fix crash with mirror recovery and discard
- LP: #1031926
  * mm/vmstat.c: cache align vm_stat
- LP: #1031926
  * mm: memory hotplug: Check if pages are correctly reserved on a
per-section basis
- LP: #1031926
  * mm: reduce the amount of work done when updating min_free_kbytes
- LP: #1031926
  * mm: vmscan: fix force-scanning small targets without swap
- LP: #1031926
  * vmscan: clear ZONE_CONGESTED for zone with good watermark
- LP: #1031926
  * vmscan: add shrink_slab tracepoints
- LP: #1031926
  * vmscan: shrinker-nr updates race and go wrong
- LP: #1031926
  * vmscan: reduce wind up shrinker-nr when shrinker can't do work
- LP: #1031926
  * vmscan: limit direct reclaim for higher order allocations
- LP: #1031926
  * vmscan: abort reclaim/compaction if compaction can proceed
- LP: #1031926
  * mm: compaction: trivial clean up in acct_isolated()
- LP: #1031926
  * mm: change isolate mode from #define to bitwise type
- LP: #1031926
  * mm: compaction: make isolate_lru_page() filter-aware
- LP: #1031926
  * mm: zone_reclaim: make isolate_lru_page() filter-aware
- LP: #1031926
  * mm: migration: clean up unmap_and_move()
- LP: #1031926
  * mm: compaction: allow compaction to isolate dirty pages
- LP: #1031926
  * mm: compaction: determine if dirty pages can be migrated without
blocking within -migratepage
- LP: #1031926
  * mm: page allocator: do not call direct reclaim for THP allocations
while compaction is deferred
- LP: #1031926
  * mm: compaction: make isolate_lru_page() filter-aware again
- LP: #1031926
  * kswapd: avoid unnecessary rebalance after an unsuccessful balancing
- LP: #1031926
  * kswapd: assign new_order and new_classzone_idx after wakeup in sleeping
- LP: #1031926
  * mm: compaction: introduce sync-light migration for use by compaction
- LP: #1031926
  * mm: vmscan: when reclaiming for compaction, ensure there are sufficient
free pages available
- LP: #1031926
  * mm: vmscan: do not OOM if aborting reclaim to start compaction
- LP: #1031926
  * mm: vmscan: check if reclaim should really abort even if
compaction_ready() is true for one zone
- LP: #1031926
  * vmscan: promote shared file mapped pages
- LP: #1031926
  * vmscan: activate executable pages after first usage
- LP: #1031926
  * mm/vmscan.c: consider swap space when deciding whether to continue
reclaim
- LP: #1031926
  * mm: test PageSwapBacked in lumpy reclaim
- LP: #1031926
  * mm: vmscan: convert global reclaim to per-memcg LRU lists
- LP: #1031926
  * cpusets: avoid looping when storing to mems_allowed if one node remains
set
- LP: #1031926
  * cpusets: stall when updating mems_allowed for mempolicy or disjoint
nodemask
- LP: #1031926
  * cpuset: mm: reduce large amounts of memory barrier related damage v3
- LP: #1031926
  * mm/hugetlb: fix warning in alloc_huge_page/dequeue_huge_page_vma
- LP: #1031926
  * vmscan: fix initial shrinker size handling
- LP: #1031926
  * Linux 3.0.39
- LP: #1031926
  * rt2x00: Add support for BUFFALO WLI-UC-GNM2 to rt2800usb.
- LP: #871904
  * Avoid sysfs oops when an rc_dev's raw device is absent
- LP: #1015836
  * eCryptfs: Copy up POSIX ACL and read-only flags from lower mount
- LP: #1009207
  * eCryptfs: Initialize empty lower files when opening them
- LP: #911507
  * mmc: sdhci-pci: CaFe has broken card detection
- LP: #1034988
  * powerpc/ftrace: Fix assembly trampoline register usage
- LP: #1034988
  * powerpc: Add memory attribute for mfmsr()
- LP: #1034988
  * powerpc: Fix wrong divisor in usecs_to_cputime
- LP: #1034988
  * SCSI: libsas: continue revalidation
- LP: #1034988
  * SCSI: libsas: fix sas_discover_devices return code handling
- LP: #1034988
  * SCSI: fix eh wakeup (scsi_schedule_eh vs scsi_restart_operations)
- LP: #1034988
  * SCSI: fix hot unplug vs async scan race
- LP: #1034988
  * SCSI: Avoid dangling pointer in scsi_requeue_command()
- LP: #1034988
  * ARM: OMAP2+: OPP: Fix to ensure 

[Bug 1016299] Re: CVE-2012-2372

2012-09-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.0.0-25.41

---
linux (3.0.0-25.41) oneiric-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1036178

  [ Andy Whitcroft ]

  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372

  [ Douglas Bagnall ]

  * SAUCE: Unlock the rc_dev lock when the raw device is missing
- LP: #1015836

  [ Upstream Kernel Changes ]

  * cifs: always update the inode cache with the results from a FIND_*
- LP: #1031926
  * ntp: Fix STA_INS/DEL clearing bug
- LP: #1031926
  * mm: fix lost kswapd wakeup in kswapd_stop()
- LP: #1031926
  * MIPS: Properly align the .data..init_task section.
- LP: #1031926
  * UBIFS: fix a bug in empty space fix-up
- LP: #1031926
  * dm raid1: fix crash with mirror recovery and discard
- LP: #1031926
  * mm/vmstat.c: cache align vm_stat
- LP: #1031926
  * mm: memory hotplug: Check if pages are correctly reserved on a
per-section basis
- LP: #1031926
  * mm: reduce the amount of work done when updating min_free_kbytes
- LP: #1031926
  * mm: vmscan: fix force-scanning small targets without swap
- LP: #1031926
  * vmscan: clear ZONE_CONGESTED for zone with good watermark
- LP: #1031926
  * vmscan: add shrink_slab tracepoints
- LP: #1031926
  * vmscan: shrinker-nr updates race and go wrong
- LP: #1031926
  * vmscan: reduce wind up shrinker-nr when shrinker can't do work
- LP: #1031926
  * vmscan: limit direct reclaim for higher order allocations
- LP: #1031926
  * vmscan: abort reclaim/compaction if compaction can proceed
- LP: #1031926
  * mm: compaction: trivial clean up in acct_isolated()
- LP: #1031926
  * mm: change isolate mode from #define to bitwise type
- LP: #1031926
  * mm: compaction: make isolate_lru_page() filter-aware
- LP: #1031926
  * mm: zone_reclaim: make isolate_lru_page() filter-aware
- LP: #1031926
  * mm: migration: clean up unmap_and_move()
- LP: #1031926
  * mm: compaction: allow compaction to isolate dirty pages
- LP: #1031926
  * mm: compaction: determine if dirty pages can be migrated without
blocking within -migratepage
- LP: #1031926
  * mm: page allocator: do not call direct reclaim for THP allocations
while compaction is deferred
- LP: #1031926
  * mm: compaction: make isolate_lru_page() filter-aware again
- LP: #1031926
  * kswapd: avoid unnecessary rebalance after an unsuccessful balancing
- LP: #1031926
  * kswapd: assign new_order and new_classzone_idx after wakeup in sleeping
- LP: #1031926
  * mm: compaction: introduce sync-light migration for use by compaction
- LP: #1031926
  * mm: vmscan: when reclaiming for compaction, ensure there are sufficient
free pages available
- LP: #1031926
  * mm: vmscan: do not OOM if aborting reclaim to start compaction
- LP: #1031926
  * mm: vmscan: check if reclaim should really abort even if
compaction_ready() is true for one zone
- LP: #1031926
  * vmscan: promote shared file mapped pages
- LP: #1031926
  * vmscan: activate executable pages after first usage
- LP: #1031926
  * mm/vmscan.c: consider swap space when deciding whether to continue
reclaim
- LP: #1031926
  * mm: test PageSwapBacked in lumpy reclaim
- LP: #1031926
  * mm: vmscan: convert global reclaim to per-memcg LRU lists
- LP: #1031926
  * cpusets: avoid looping when storing to mems_allowed if one node remains
set
- LP: #1031926
  * cpusets: stall when updating mems_allowed for mempolicy or disjoint
nodemask
- LP: #1031926
  * cpuset: mm: reduce large amounts of memory barrier related damage v3
- LP: #1031926
  * mm/hugetlb: fix warning in alloc_huge_page/dequeue_huge_page_vma
- LP: #1031926
  * vmscan: fix initial shrinker size handling
- LP: #1031926
  * Linux 3.0.39
- LP: #1031926
  * rt2x00: Add support for BUFFALO WLI-UC-GNM2 to rt2800usb.
- LP: #871904
  * Avoid sysfs oops when an rc_dev's raw device is absent
- LP: #1015836
  * eCryptfs: Copy up POSIX ACL and read-only flags from lower mount
- LP: #1009207
  * eCryptfs: Initialize empty lower files when opening them
- LP: #911507
  * mmc: sdhci-pci: CaFe has broken card detection
- LP: #1034988
  * powerpc/ftrace: Fix assembly trampoline register usage
- LP: #1034988
  * powerpc: Add memory attribute for mfmsr()
- LP: #1034988
  * powerpc: Fix wrong divisor in usecs_to_cputime
- LP: #1034988
  * SCSI: libsas: continue revalidation
- LP: #1034988
  * SCSI: libsas: fix sas_discover_devices return code handling
- LP: #1034988
  * SCSI: fix eh wakeup (scsi_schedule_eh vs scsi_restart_operations)
- LP: #1034988
  * SCSI: fix hot unplug vs async scan race
- LP: #1034988
  * SCSI: Avoid dangling pointer in scsi_requeue_command()
- LP: #1034988
  * ARM: OMAP2+: OPP: Fix to ensure check of right oppdef after bad one
- LP: 

[Bug 1016299] Re: CVE-2012-2372

2012-09-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-42.96

---
linux (2.6.32-42.96) lucid-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1036553

  [ Andy Whitcroft ]

  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372

  [ Upstream Kernel Changes ]

  * udf: Fortify loading of sparing table
- LP: #1024497
- CVE-2012-3400
  * udf: Avoid run away loop when partition table length is corrupted
- LP: #1024497
- CVE-2012-3400
  * eCryptfs: Gracefully refuse miscdev file ops on inherited/passed files
- LP: #994247
  * eCryptfs: Copy up POSIX ACL and read-only flags from lower mount
- LP: #1009207
  * drm: integer overflow in drm_mode_dirtyfb_ioctl()
- LP: #917838
- CVE-2012-0044
 -- Luis Henriques luis.henriq...@canonical.com   Tue, 14 Aug 2012 09:51:58 
+0100

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-08-21 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-08-21 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-08-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-207.13

---
linux-ti-omap4 (3.5.0-207.13) quantal-proposed; urgency=low

  [ Paolo Pisati ]

  * Start new release

  [ Stefan Bader ]

  * (config) Enable getabis to use local package copies

  [ Upstream Kernel Changes ]

  * fixup: gargabe collect iva_seq[0|1] init
  * [Config] enable all SND_OMAP_SOC_*s
  * fixup: cm2xxx_3xxx.o is needed for omap2_cm_read|write_reg
  * fixup: add some snd_soc_dai* helper functions
  * fixup: s/snd_soc_dpcm_params/snd_soc_dpcm/g
  * fixup: typo, no_host_mode and useless SDP4430 init
  * fixup: enable again aess hwmod
 -- Paolo Pisati paolo.pis...@canonical.com   Wed, 15 Aug 2012 17:17:43 +0200

** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re:[Bug 1016299] Re: CVE-2012-2372

2012-08-20 Thread yuanrui
unsubscribe
At 2012-08-20 23:49:15,Launchpad Bug Tracker 1016...@bugs.launchpad.net 
wrote:
This bug was fixed in the package linux-ti-omap4 - 3.5.0-207.13

---
linux-ti-omap4 (3.5.0-207.13) quantal-proposed; urgency=low

  [ Paolo Pisati ]

  * Start new release

  [ Stefan Bader ]

  * (config) Enable getabis to use local package copies

  [ Upstream Kernel Changes ]

  * fixup: gargabe collect iva_seq[0|1] init
  * [Config] enable all SND_OMAP_SOC_*s
  * fixup: cm2xxx_3xxx.o is needed for omap2_cm_read|write_reg
  * fixup: add some snd_soc_dai* helper functions
  * fixup: s/snd_soc_dpcm_params/snd_soc_dpcm/g
  * fixup: typo, no_host_mode and useless SDP4430 init
  * fixup: enable again aess hwmod
 -- Paolo Pisati paolo.pis...@canonical.com   Wed, 15 Aug 2012 17:17:43 +0200

** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are subscribed to linux-
ti-omap4 in Ubuntu.
Matching subscriptions: yuanrui
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux-armadaxp” package in Ubuntu:
  Fix Released
Status in “linux-ec2” package in Ubuntu:
  Invalid
Status in “linux-fsl-imx51” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-maverick” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-natty” package in Ubuntu:
  Invalid
Status in “linux-lts-backport-oneiric” package in Ubuntu:
  Invalid
Status in “linux-mvl-dove” package in Ubuntu:
  Invalid
Status in “linux-ti-omap4” package in Ubuntu:
  Fix Released
Status in “linux” source package in Lucid:
  Fix Committed
Status in “linux-armadaxp” source package in Lucid:
  Invalid
Status in “linux-ec2” source package in Lucid:
  Fix Committed
Status in “linux-fsl-imx51” source package in Lucid:
  Invalid
Status in “linux-lts-backport-maverick” source package in Lucid:
  Invalid
Status in “linux-lts-backport-natty” source package in Lucid:
  Fix Released
Status in “linux-lts-backport-oneiric” source package in Lucid:
  Fix Committed
Status in “linux-mvl-dove” source package in Lucid:
  Invalid
Status in “linux-ti-omap4” source package in Lucid:
  Invalid
Status in “linux” source package in Natty:
  Fix Released
Status in “linux-armadaxp” source package in Natty:
  Invalid
Status in “linux-ec2” source package in Natty:
  Invalid
Status in “linux-fsl-imx51” source package in Natty:
  Invalid
Status in “linux-lts-backport-maverick” source package in Natty:
  Invalid
Status in “linux-lts-backport-natty” source package in Natty:
  Invalid
Status in “linux-lts-backport-oneiric” source package in Natty:
  Invalid
Status in “linux-mvl-dove” source package in Natty:
  Invalid
Status in “linux-ti-omap4” source package in Natty:
  Fix Released
Status in “linux” source package in Oneiric:
  Fix Committed
Status in “linux-armadaxp” source package in Oneiric:
  Invalid
Status in “linux-ec2” source package in Oneiric:
  Invalid
Status in “linux-fsl-imx51” source package in Oneiric:
  Invalid
Status in “linux-lts-backport-maverick” source package in Oneiric:
  Invalid
Status in “linux-lts-backport-natty” source package in Oneiric:
  Invalid
Status in “linux-lts-backport-oneiric” source package in Oneiric:
  Invalid
Status in “linux-mvl-dove” source package in Oneiric:
  Invalid
Status in “linux-ti-omap4” source package in Oneiric:
  Fix Committed
Status in “linux” source package in Precise:
  Fix Released
Status in “linux-armadaxp” source package in Precise:
  Fix Released
Status in “linux-ec2” source package in Precise:
  Invalid
Status in “linux-fsl-imx51” source package in Precise:
  Invalid
Status in “linux-lts-backport-maverick” source package in Precise:
  Invalid
Status in “linux-lts-backport-natty” source package in Precise:
  Invalid
Status in “linux-lts-backport-oneiric” source package in Precise:
  Invalid
Status in “linux-mvl-dove” source package in Precise:
  Invalid
Status in “linux-ti-omap4” source package in Precise:
  Fix Released
Status in “linux” source package in Quantal:
  Fix Released
Status in “linux-armadaxp” source package in Quantal:
  Fix Released
Status in “linux-ec2” source package in Quantal:
  Invalid
Status in “linux-fsl-imx51” source package in Quantal:
  Invalid
Status in “linux-lts-backport-maverick” source package in Quantal:
  Invalid
Status in “linux-lts-backport-natty” source package in Quantal:
  Invalid
Status in “linux-lts-backport-oneiric” source package in Quantal:
  Invalid
Status in “linux-mvl-dove” source package in Quantal:
  Invalid
Status in “linux-ti-omap4” source package in Quantal:
  Fix Released
Status in “linux” source package in Hardy:
  Invalid
Status in “linux-armadaxp” source package in Hardy:
  Invalid
Status in “linux-ec2” source package in Hardy:
  Invalid
Status in “linux-fsl-imx51” source package in Hardy:
  Invalid
Status in “linux-lts-backport-maverick” source package in Hardy:
  Invalid
Status in 

[Bug 1016299] Re: CVE-2012-2372

2012-08-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-15.65~lucid1

---
linux-lts-backport-natty (2.6.38-15.65~lucid1) lucid-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1029786

  [ Andy Whitcroft ]

  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372

  [ Upstream Kernel Changes ]

  * hugetlb: fix resv_map leak in error path
- LP: #1004621
- CVE-2012-2390
  * mm: fix vma_resv_map() NULL pointer
- LP: #1004621
- CVE-2012-2390
  * net: sock: validate data_len before allocating skb in
sock_alloc_send_pskb()
- LP: #1006622
- CVE-2012-2136
 -- Luis Henriques luis.henriq...@canonical.com   Fri, 27 Jul 2012 14:13:12 
+0100

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-08-10 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/natty-security/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-08-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.38-15.65

---
linux (2.6.38-15.65) natty-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1027821

  [ Andy Whitcroft ]

  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372

  [ Upstream Kernel Changes ]

  * hugetlb: fix resv_map leak in error path
- LP: #1004621
- CVE-2012-2390
  * mm: fix vma_resv_map() NULL pointer
- LP: #1004621
- CVE-2012-2390
  * net: sock: validate data_len before allocating skb in
sock_alloc_send_pskb()
- LP: #1006622
- CVE-2012-2136
 -- Luis Henriques luis.henriq...@canonical.com   Thu, 26 Jul 2012 14:37:28 
+0100

** Changed in: linux (Ubuntu Natty)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2136

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2390

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-4131

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2123

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2313

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2319

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2375

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-08-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.25

---
linux-ti-omap4 (2.6.38-1209.25) natty-proposed; urgency=low

  * Release Tracking Bug
- LP: #1029784

  [ Andy Whitcroft ]

  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372

  [ Upstream Kernel Changes ]

  * fcaps: clear the same personality flags as suid when fcaps are used
- LP: #987571
- CVE-2012-2123
  * security: fix compile error in commoncap.c
- LP: #987571
- CVE-2012-2123
  * net: sock: validate data_len before allocating skb in
sock_alloc_send_pskb()
- LP: #1006622
- CVE-2012-2136
  * dl2k: Clean up rio_ioctl
- CVE-2012-2313
  * hfsplus: Fix potential buffer overflows
- CVE-2012-2319
  * nfs: don't lose MS_SYNCHRONOUS on remount of noac mount
- LP: #775809
  * NFSv4.1: Ensure state manager thread dies on last umount
- LP: #775809
  * NFSv4: Handle expired stateids when the lease is still valid
- LP: #793702
  * NFSv4.1: Fix the handling of NFS4ERR_SEQ_MISORDERED errors
- LP: #793702
  * NFSv4: include bitmap in nfsv4 get acl data
- LP: #893147
- CVE-2011-4131
  * Avoid reading past buffer when calling GETACL
- LP: #1002505
- CVE-2012-2375
  * Avoid beyond bounds copy while caching ACL
- LP: #1002505
- CVE-2012-2375
  * Fix length of buffer copied in __nfs4_get_acl_uncached
- LP: #1002505
- CVE-2012-2375
 -- Paolo Pisati paolo.pis...@canonical.com   Fri, 27 Jul 2012 15:54:18 +0200

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-08-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-29.46

---
linux (3.2.0-29.46) precise-proposed; urgency=low

  [ Tim Gardner ]

  * No change upload to fix armel/armhf FTBS caused by
'UBUNTU: [Config] SND_OMAP_SOC, SND_OMAP_SOC_MCBSP and 
SND_OMAP_SOC_OMAP3_BEAGLE =y'
Added ignore and ignore.module files to ABI directories.

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1029507

linux (3.2.0-29.45) precise-proposed; urgency=low

  [Luis Henriques]

  * Release Tracking Bug
- LP: #1029507

  [ Andy Whitcroft ]

  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372

  [ Upstream Kernel Changes ]

  * Revert samsung-laptop: make the dmi check less strict
- LP: #1029431
  * samsung-laptop: make the dmi check less strict
- LP: #1029431
  * raid5: delayed stripe fix
- LP: #1029431
  * tcp: drop SYN+FIN messages
- LP: #1029431
  * tg3: Apply short DMA frag workaround to 5906
- LP: #1029431
  * rtl8187: -brightness_set can not sleep
- LP: #1029431
  * net/wireless: ipw2x00: add supported cipher suites to wiphy
initialization
- LP: #1029431
  * kbuild: do not check for ancient modutils tools
- LP: #1029431
  * brcmsmac: INTERMEDIATE but not AMPDU only when tracing
- LP: #1029431
  * ext4: Report max_batch_time option correctly
- LP: #1029431
  * NFSv4: Reduce the footprint of the idmapper
- LP: #1029431
  * NFSv4: Further reduce the footprint of the idmapper
- LP: #1029431
  * macvtap: zerocopy: fix offset calculation when building skb
- LP: #1029431
  * macvtap: zerocopy: fix truesize underestimation
- LP: #1029431
  * macvtap: zerocopy: put page when fail to get all requested user pages
- LP: #1029431
  * macvtap: zerocopy: set SKBTX_DEV_ZEROCOPY only when skb is built
successfully
- LP: #1029431
  * macvtap: zerocopy: validate vectors before building skb
- LP: #1029431
  * KVM: Fix buffer overflow in kvm_set_irq()
- LP: #1029431
  * scsi: Silence unnecessary warnings about ioctl to partition
- LP: #1029431
  * iommu/amd: Fix missing iommu_shutdown initialization in passthrough
mode
- LP: #1029431
  * iommu/amd: Initialize dma_ops for hotplug and sriov devices
- LP: #1029431
  * usb: Add support for root hub port status CAS
- LP: #1029431
  * gpiolib: wm8994: Pay attention to the value set when enabling as output
- LP: #1029431
  * sched/nohz: Rewrite and fix load-avg computation -- again
- LP: #1029431
  * USB: option: add ZTE MF60
- LP: #1029431
  * USB: option: Add MEDIATEK product ids
- LP: #1029431
  * USB: cdc-wdm: fix lockup on error in wdm_read
- LP: #1029431
  * mtd: nandsim: don't open code a do_div helper
- LP: #1029431
  * dvb-core: Release semaphore on error path dvb_register_device()
- LP: #1029431
  * hwspinlock/core: use global ID to register hwspinlocks on multiple
devices
- LP: #1029431
  * libsas: fix taskfile corruption in sas_ata_qc_fill_rtf
- LP: #1029431
  * md/raid1: fix use-after-free bug in RAID1 data-check code.
- LP: #1029431
  * PCI: EHCI: fix crash during suspend on ASUS computers
- LP: #1029431
  * memory hotplug: fix invalid memory access caused by stale kswapd
pointer
- LP: #1029431
  * mm, thp: abort compaction if migration page cannot be charged to memcg
- LP: #1029431
  * drivers/rtc/rtc-mxc.c: fix irq enabled interrupts warning
- LP: #1029431
  * fs: ramfs: file-nommu: add SetPageUptodate()
- LP: #1029431
  * cpufreq / ACPI: Fix not loading acpi-cpufreq driver regression
- LP: #1029431
  * hwmon: (it87) Preserve configuration register bits on init
- LP: #1029431
  * ARM: SAMSUNG: fix race in s3c_adc_start for ADC
- LP: #1029431
  * block: fix infinite loop in __getblk_slow
- LP: #1029431
  * Remove easily user-triggerable BUG from generic_setlease
- LP: #1029431
  * NFC: Export nfc.h to userland
- LP: #1029431
  * PM / Hibernate: Hibernate/thaw fixes/improvements
- LP: #1029431
  * cfg80211: check iface combinations only when iface is running
- LP: #1029431
  * intel_ips: blacklist HP ProBook laptops
- LP: #1029431
  * atl1c: fix issue of transmit queue 0 timed out
- LP: #1029431
  * rt2x00usb: fix indexes ordering on RX queue kick
- LP: #1029431
  * iwlegacy: always monitor for stuck queues
- LP: #1029431
  * iwlegacy: don't mess up the SCD when removing a key
- LP: #1029431
  * e1000e: Correct link check logic for 82571 serdes
- LP: #1029431
  * tcm_fc: Fix crash seen with aborts and large reads
- LP: #1029431
  * fifo: Do not restart open() if it already found a partner
- LP: #1029431
  * target: Clean up returning errors in PR handling code
- LP: #1029431
  * target: Fix range calculation in WRITE SAME emulation when num blocks
== 0
- LP: #1029431
  * cifs: on CONFIG_HIGHMEM machines, limit the rsize/wsize to the kmap
space
- LP: #1029431

[Bug 1016299] Re: CVE-2012-2372

2012-08-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1606.9

---
linux-armadaxp (3.2.0-1606.9) precise-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1030308
  * Rebase onto Ubuntu-3.2.0-29.46

  [ Ubuntu: 3.2.0-29.46 ]

  * No change upload to fix armel/armhf FTBS caused by
'UBUNTU: [Config] SND_OMAP_SOC, SND_OMAP_SOC_MCBSP and 
SND_OMAP_SOC_OMAP3_BEAGLE =y'
Added ignore and ignore.module files to ABI directories.
  * Release Tracking Bug
- LP: #1029507

  [ Ubuntu: 3.2.0-29.45 ]

  * Release Tracking Bug
- LP: #1029507
  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372
  * Revert samsung-laptop: make the dmi check less strict
- LP: #1029431
  * samsung-laptop: make the dmi check less strict
- LP: #1029431
  * raid5: delayed stripe fix
- LP: #1029431
  * tcp: drop SYN+FIN messages
- LP: #1029431
  * tg3: Apply short DMA frag workaround to 5906
- LP: #1029431
  * rtl8187: -brightness_set can not sleep
- LP: #1029431
  * net/wireless: ipw2x00: add supported cipher suites to wiphy
initialization
- LP: #1029431
  * kbuild: do not check for ancient modutils tools
- LP: #1029431
  * brcmsmac: INTERMEDIATE but not AMPDU only when tracing
- LP: #1029431
  * ext4: Report max_batch_time option correctly
- LP: #1029431
  * NFSv4: Reduce the footprint of the idmapper
- LP: #1029431
  * NFSv4: Further reduce the footprint of the idmapper
- LP: #1029431
  * macvtap: zerocopy: fix offset calculation when building skb
- LP: #1029431
  * macvtap: zerocopy: fix truesize underestimation
- LP: #1029431
  * macvtap: zerocopy: put page when fail to get all requested user pages
- LP: #1029431
  * macvtap: zerocopy: set SKBTX_DEV_ZEROCOPY only when skb is built
successfully
- LP: #1029431
  * macvtap: zerocopy: validate vectors before building skb
- LP: #1029431
  * KVM: Fix buffer overflow in kvm_set_irq()
- LP: #1029431
  * scsi: Silence unnecessary warnings about ioctl to partition
- LP: #1029431
  * iommu/amd: Fix missing iommu_shutdown initialization in passthrough
mode
- LP: #1029431
  * iommu/amd: Initialize dma_ops for hotplug and sriov devices
- LP: #1029431
  * usb: Add support for root hub port status CAS
- LP: #1029431
  * gpiolib: wm8994: Pay attention to the value set when enabling as output
- LP: #1029431
  * sched/nohz: Rewrite and fix load-avg computation -- again
- LP: #1029431
  * USB: option: add ZTE MF60
- LP: #1029431
  * USB: option: Add MEDIATEK product ids
- LP: #1029431
  * USB: cdc-wdm: fix lockup on error in wdm_read
- LP: #1029431
  * mtd: nandsim: don't open code a do_div helper
- LP: #1029431
  * dvb-core: Release semaphore on error path dvb_register_device()
- LP: #1029431
  * hwspinlock/core: use global ID to register hwspinlocks on multiple
devices
- LP: #1029431
  * libsas: fix taskfile corruption in sas_ata_qc_fill_rtf
- LP: #1029431
  * md/raid1: fix use-after-free bug in RAID1 data-check code.
- LP: #1029431
  * PCI: EHCI: fix crash during suspend on ASUS computers
- LP: #1029431
  * memory hotplug: fix invalid memory access caused by stale kswapd
pointer
- LP: #1029431
  * mm, thp: abort compaction if migration page cannot be charged to memcg
- LP: #1029431
  * drivers/rtc/rtc-mxc.c: fix irq enabled interrupts warning
- LP: #1029431
  * fs: ramfs: file-nommu: add SetPageUptodate()
- LP: #1029431
  * cpufreq / ACPI: Fix not loading acpi-cpufreq driver regression
- LP: #1029431
  * hwmon: (it87) Preserve configuration register bits on init
- LP: #1029431
  * ARM: SAMSUNG: fix race in s3c_adc_start for ADC
- LP: #1029431
  * block: fix infinite loop in __getblk_slow
- LP: #1029431
  * Remove easily user-triggerable BUG from generic_setlease
- LP: #1029431
  * NFC: Export nfc.h to userland
- LP: #1029431
  * PM / Hibernate: Hibernate/thaw fixes/improvements
- LP: #1029431
  * cfg80211: check iface combinations only when iface is running
- LP: #1029431
  * intel_ips: blacklist HP ProBook laptops
- LP: #1029431
  * atl1c: fix issue of transmit queue 0 timed out
- LP: #1029431
  * rt2x00usb: fix indexes ordering on RX queue kick
- LP: #1029431
  * iwlegacy: always monitor for stuck queues
- LP: #1029431
  * iwlegacy: don't mess up the SCD when removing a key
- LP: #1029431
  * e1000e: Correct link check logic for 82571 serdes
- LP: #1029431
  * tcm_fc: Fix crash seen with aborts and large reads
- LP: #1029431
  * fifo: Do not restart open() if it already found a partner
- LP: #1029431
  * target: Clean up returning errors in PR handling code
- LP: #1029431
  * target: Fix range calculation in WRITE SAME emulation when num blocks
== 0
- LP: #1029431
  * cifs: on CONFIG_HIGHMEM machines, limit the rsize/wsize to the kmap
space
- LP: 

[Bug 1016299] Re: CVE-2012-2372

2012-08-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1606.9

---
linux-armadaxp (3.2.0-1606.9) precise-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1030308
  * Rebase onto Ubuntu-3.2.0-29.46

  [ Ubuntu: 3.2.0-29.46 ]

  * No change upload to fix armel/armhf FTBS caused by
'UBUNTU: [Config] SND_OMAP_SOC, SND_OMAP_SOC_MCBSP and 
SND_OMAP_SOC_OMAP3_BEAGLE =y'
Added ignore and ignore.module files to ABI directories.
  * Release Tracking Bug
- LP: #1029507

  [ Ubuntu: 3.2.0-29.45 ]

  * Release Tracking Bug
- LP: #1029507
  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372
  * Revert samsung-laptop: make the dmi check less strict
- LP: #1029431
  * samsung-laptop: make the dmi check less strict
- LP: #1029431
  * raid5: delayed stripe fix
- LP: #1029431
  * tcp: drop SYN+FIN messages
- LP: #1029431
  * tg3: Apply short DMA frag workaround to 5906
- LP: #1029431
  * rtl8187: -brightness_set can not sleep
- LP: #1029431
  * net/wireless: ipw2x00: add supported cipher suites to wiphy
initialization
- LP: #1029431
  * kbuild: do not check for ancient modutils tools
- LP: #1029431
  * brcmsmac: INTERMEDIATE but not AMPDU only when tracing
- LP: #1029431
  * ext4: Report max_batch_time option correctly
- LP: #1029431
  * NFSv4: Reduce the footprint of the idmapper
- LP: #1029431
  * NFSv4: Further reduce the footprint of the idmapper
- LP: #1029431
  * macvtap: zerocopy: fix offset calculation when building skb
- LP: #1029431
  * macvtap: zerocopy: fix truesize underestimation
- LP: #1029431
  * macvtap: zerocopy: put page when fail to get all requested user pages
- LP: #1029431
  * macvtap: zerocopy: set SKBTX_DEV_ZEROCOPY only when skb is built
successfully
- LP: #1029431
  * macvtap: zerocopy: validate vectors before building skb
- LP: #1029431
  * KVM: Fix buffer overflow in kvm_set_irq()
- LP: #1029431
  * scsi: Silence unnecessary warnings about ioctl to partition
- LP: #1029431
  * iommu/amd: Fix missing iommu_shutdown initialization in passthrough
mode
- LP: #1029431
  * iommu/amd: Initialize dma_ops for hotplug and sriov devices
- LP: #1029431
  * usb: Add support for root hub port status CAS
- LP: #1029431
  * gpiolib: wm8994: Pay attention to the value set when enabling as output
- LP: #1029431
  * sched/nohz: Rewrite and fix load-avg computation -- again
- LP: #1029431
  * USB: option: add ZTE MF60
- LP: #1029431
  * USB: option: Add MEDIATEK product ids
- LP: #1029431
  * USB: cdc-wdm: fix lockup on error in wdm_read
- LP: #1029431
  * mtd: nandsim: don't open code a do_div helper
- LP: #1029431
  * dvb-core: Release semaphore on error path dvb_register_device()
- LP: #1029431
  * hwspinlock/core: use global ID to register hwspinlocks on multiple
devices
- LP: #1029431
  * libsas: fix taskfile corruption in sas_ata_qc_fill_rtf
- LP: #1029431
  * md/raid1: fix use-after-free bug in RAID1 data-check code.
- LP: #1029431
  * PCI: EHCI: fix crash during suspend on ASUS computers
- LP: #1029431
  * memory hotplug: fix invalid memory access caused by stale kswapd
pointer
- LP: #1029431
  * mm, thp: abort compaction if migration page cannot be charged to memcg
- LP: #1029431
  * drivers/rtc/rtc-mxc.c: fix irq enabled interrupts warning
- LP: #1029431
  * fs: ramfs: file-nommu: add SetPageUptodate()
- LP: #1029431
  * cpufreq / ACPI: Fix not loading acpi-cpufreq driver regression
- LP: #1029431
  * hwmon: (it87) Preserve configuration register bits on init
- LP: #1029431
  * ARM: SAMSUNG: fix race in s3c_adc_start for ADC
- LP: #1029431
  * block: fix infinite loop in __getblk_slow
- LP: #1029431
  * Remove easily user-triggerable BUG from generic_setlease
- LP: #1029431
  * NFC: Export nfc.h to userland
- LP: #1029431
  * PM / Hibernate: Hibernate/thaw fixes/improvements
- LP: #1029431
  * cfg80211: check iface combinations only when iface is running
- LP: #1029431
  * intel_ips: blacklist HP ProBook laptops
- LP: #1029431
  * atl1c: fix issue of transmit queue 0 timed out
- LP: #1029431
  * rt2x00usb: fix indexes ordering on RX queue kick
- LP: #1029431
  * iwlegacy: always monitor for stuck queues
- LP: #1029431
  * iwlegacy: don't mess up the SCD when removing a key
- LP: #1029431
  * e1000e: Correct link check logic for 82571 serdes
- LP: #1029431
  * tcm_fc: Fix crash seen with aborts and large reads
- LP: #1029431
  * fifo: Do not restart open() if it already found a partner
- LP: #1029431
  * target: Clean up returning errors in PR handling code
- LP: #1029431
  * target: Fix range calculation in WRITE SAME emulation when num blocks
== 0
- LP: #1029431
  * cifs: on CONFIG_HIGHMEM machines, limit the rsize/wsize to the kmap
space
- LP: 

[Bug 1016299] Re: CVE-2012-2372

2012-08-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1417.23

---
linux-ti-omap4 (3.2.0-1417.23) precise-proposed; urgency=low

  * Release Tracking Bug
- LP: #1030306

  [ Paolo Pisati ]

  * rebased on 3.2.0-29.46

  [ Ubuntu: 3.2.0-29.46 ]

  * No change upload to fix armel/armhf FTBS caused by
'UBUNTU: [Config] SND_OMAP_SOC, SND_OMAP_SOC_MCBSP and 
SND_OMAP_SOC_OMAP3_BEAGLE =y'
Added ignore and ignore.module files to ABI directories.
  * Release Tracking Bug
- LP: #1029507

  [ Ubuntu: 3.2.0-29.45 ]

  * Release Tracking Bug
- LP: #1029507
  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372
  * Revert samsung-laptop: make the dmi check less strict
- LP: #1029431
  * samsung-laptop: make the dmi check less strict
- LP: #1029431
  * raid5: delayed stripe fix
- LP: #1029431
  * tcp: drop SYN+FIN messages
- LP: #1029431
  * tg3: Apply short DMA frag workaround to 5906
- LP: #1029431
  * rtl8187: -brightness_set can not sleep
- LP: #1029431
  * net/wireless: ipw2x00: add supported cipher suites to wiphy
initialization
- LP: #1029431
  * kbuild: do not check for ancient modutils tools
- LP: #1029431
  * brcmsmac: INTERMEDIATE but not AMPDU only when tracing
- LP: #1029431
  * ext4: Report max_batch_time option correctly
- LP: #1029431
  * NFSv4: Reduce the footprint of the idmapper
- LP: #1029431
  * NFSv4: Further reduce the footprint of the idmapper
- LP: #1029431
  * macvtap: zerocopy: fix offset calculation when building skb
- LP: #1029431
  * macvtap: zerocopy: fix truesize underestimation
- LP: #1029431
  * macvtap: zerocopy: put page when fail to get all requested user pages
- LP: #1029431
  * macvtap: zerocopy: set SKBTX_DEV_ZEROCOPY only when skb is built
successfully
- LP: #1029431
  * macvtap: zerocopy: validate vectors before building skb
- LP: #1029431
  * KVM: Fix buffer overflow in kvm_set_irq()
- LP: #1029431
  * scsi: Silence unnecessary warnings about ioctl to partition
- LP: #1029431
  * iommu/amd: Fix missing iommu_shutdown initialization in passthrough
mode
- LP: #1029431
  * iommu/amd: Initialize dma_ops for hotplug and sriov devices
- LP: #1029431
  * usb: Add support for root hub port status CAS
- LP: #1029431
  * gpiolib: wm8994: Pay attention to the value set when enabling as output
- LP: #1029431
  * sched/nohz: Rewrite and fix load-avg computation -- again
- LP: #1029431
  * USB: option: add ZTE MF60
- LP: #1029431
  * USB: option: Add MEDIATEK product ids
- LP: #1029431
  * USB: cdc-wdm: fix lockup on error in wdm_read
- LP: #1029431
  * mtd: nandsim: don't open code a do_div helper
- LP: #1029431
  * dvb-core: Release semaphore on error path dvb_register_device()
- LP: #1029431
  * hwspinlock/core: use global ID to register hwspinlocks on multiple
devices
- LP: #1029431
  * libsas: fix taskfile corruption in sas_ata_qc_fill_rtf
- LP: #1029431
  * md/raid1: fix use-after-free bug in RAID1 data-check code.
- LP: #1029431
  * PCI: EHCI: fix crash during suspend on ASUS computers
- LP: #1029431
  * memory hotplug: fix invalid memory access caused by stale kswapd
pointer
- LP: #1029431
  * mm, thp: abort compaction if migration page cannot be charged to memcg
- LP: #1029431
  * drivers/rtc/rtc-mxc.c: fix irq enabled interrupts warning
- LP: #1029431
  * fs: ramfs: file-nommu: add SetPageUptodate()
- LP: #1029431
  * cpufreq / ACPI: Fix not loading acpi-cpufreq driver regression
- LP: #1029431
  * hwmon: (it87) Preserve configuration register bits on init
- LP: #1029431
  * ARM: SAMSUNG: fix race in s3c_adc_start for ADC
- LP: #1029431
  * block: fix infinite loop in __getblk_slow
- LP: #1029431
  * Remove easily user-triggerable BUG from generic_setlease
- LP: #1029431
  * NFC: Export nfc.h to userland
- LP: #1029431
  * PM / Hibernate: Hibernate/thaw fixes/improvements
- LP: #1029431
  * cfg80211: check iface combinations only when iface is running
- LP: #1029431
  * intel_ips: blacklist HP ProBook laptops
- LP: #1029431
  * atl1c: fix issue of transmit queue 0 timed out
- LP: #1029431
  * rt2x00usb: fix indexes ordering on RX queue kick
- LP: #1029431
  * iwlegacy: always monitor for stuck queues
- LP: #1029431
  * iwlegacy: don't mess up the SCD when removing a key
- LP: #1029431
  * e1000e: Correct link check logic for 82571 serdes
- LP: #1029431
  * tcm_fc: Fix crash seen with aborts and large reads
- LP: #1029431
  * fifo: Do not restart open() if it already found a partner
- LP: #1029431
  * target: Clean up returning errors in PR handling code
- LP: #1029431
  * target: Fix range calculation in WRITE SAME emulation when num blocks
== 0
- LP: #1029431
  * cifs: on CONFIG_HIGHMEM machines, limit the rsize/wsize to the kmap
space
- LP: 

[Bug 1016299] Re: CVE-2012-2372

2012-08-01 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-07-31 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/quantal-proposed/linux-lowlatency

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-07-31 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.5.0-7.7

---
linux (3.5.0-7.7) quantal-proposed; urgency=low

  [ Andy Whitcroft ]

  * [Config] CONFIG_X86_POWERNOW_K6=m
  * [Config] CONFIG_X86_POWERNOW_K7=m
  * [Config] CONFIG_X86_LONGHAUL=m
  * [Config] CONFIG_X86_LONGRUN=m
  * [Config] CONFIG_X86_GX_SUSPMOD=m
  * [Config] CONFIG_X86_CPUFREQ_NFORCE2=m
  * SAUCE: rds_ib_send() -- prevent local pings triggering BUG_ON()
- LP: #1016299
- CVE-2012-2372
  * [Config] enable CONFIG_VFAT_FS=y for EFI systems
  * [Config] CONFIG_USB_G_MULTI=n on highbank
  * [Config] annotate: CONFIG_USB_INVENTRA_DMA OMAP2 specific
  * [Config] CONFIG_WAN_ROUTER disable for arm
  * add support for generating binary device trees and install them in
/lib/firmware
- LP: #1030600
  * [Config] add dtb_file configuration for highbank
- LP: #1030600

  [ Tim Gardner ]

  * SAUCE: ene_ub6250: Use macros for firmware names
  * SAUCE: s2255drv: Add MODULE_FIRMWARE statement
  * SAUCE: xc5000: Add MODULE_FIRMWARE statements
  * SAUCE: firmware: remove computone driver firmware and documentation
  * SAUCE: lgs8gxx: Declare MODULE_FIRMWARE usage
  * SAUCE: firmware: Remove obsolete Myricom firmware
  * SAUCE: staging rtl8192e: Declare MODULE_FIRMWARE usage
  * SAUCE: tlg2300: Declare MODULE_FIRMWARE usage
  * SAUCE: ueagle-atm: Declare MODULE_FIRMWARE usage
  * SAUCE: usbduxfast: Declare MODULE_FIRMWARE usage
  * SAUCE: usbdux: Declare MODULE_FIRMWARE usage
  * SAUCE: usbduxsigma: Declare MODULE_FIRMWARE usage
  * SAUCE: cx25840: Declare MODULE_FIRMWARE usage
  * SAUCE: cx18: Declare MODULE_FIRMWARE usage
  * SAUCE: ivtv: Declare MODULE_FIRMWARE usage
  * SAUCE: cx231xx: Declare MODULE_FIRMWARE usage
  * SAUCE: cx23885: Declare MODULE_FIRMWARE usage
  * SAUCE: pvrusb2: Declare MODULE_FIRMWARE usage
  * SAUCE: vxge: Declare MODULE_FIRMWARE usage

  [ Upstream Kernel Changes ]

  * mac80211: fix crash with single-queue drivers
- LP: #1022351
 -- Leann Ogasawara leann.ogasaw...@canonical.com   Mon, 30 Jul 2012 11:11:05 
-0700

** Changed in: linux (Ubuntu Quantal)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-07-30 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-proposed/linux-armadaxp

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-07-28 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-07-26 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: New = Fix Committed

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Oneiric)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Lucid)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Quantal)
   Status: In Progress = Fix Committed

** Changed in: linux (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux (Ubuntu Natty)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: New = Fix Committed

** Description changed:

  A flaw was found in the Linux kernel's Reliable Datagram Sockets (RDS)
  protocol implementation. A local, unprivileged user could use this flaw
  to cause a denial of service.
  
- Break-Fix: - local-2012-2372
+ Break-Fix: 639b321b4d8f4e412bfbb2a4a19bfebc1e68ace4 local-2012-2372

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-07-25 Thread Andy Whitcroft
** Changed in: linux (Ubuntu Quantal)
   Status: New = In Progress

** Changed in: linux (Ubuntu Quantal)
 Assignee: (unassigned) = Andy Whitcroft (apw)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-07-25 Thread John Johansen
** Description changed:

  A flaw was found in the Linux kernel's Reliable Datagram Sockets (RDS)
  protocol implementation. A local, unprivileged user could use this flaw
  to cause a denial of service.
+ 
+ Break-Fix: - local-2012-2372

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1016299

Title:
  CVE-2012-2372

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1016299/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1016299] Re: CVE-2012-2372

2012-06-21 Thread John Johansen
CVE-2012-2372

** Also affects: linux (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Oneiric)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Natty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Hardy)
   Importance: Undecided
   Status: New

** Changed in: linux-armadaxp (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy)
   Status: New = Invalid

**