[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Yakkety) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Yakkety) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Also affects: linux (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Yakkety) Importance: Undecided Status: Won't Fix ** Also affects: linux-lts-backport-natty (Ubuntu Yakkety) Importance: Undecided Status: Won't Fix ** Also affects: linux-armadaxp (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-manta (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-flo (Ubuntu Yakkety) Importance: Medium Status: New ** Also affects: linux-lts-trusty (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Yakkety) Importance: Medium Status: Invalid ** Also affects: linux-raspi2 (Ubuntu Yakkety) Importance: Medium Status: Fix Committed ** Also affects: linux-lts-xenial (Ubuntu Yakkety) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-manta (Ubuntu Xenial) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-lts-xenial (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-xenial (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-raspi2 (Ubuntu Xenial) Status: Invalid => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-lts-wily (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-wily (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Vivid) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Also affects: linux (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Undecided Status: Won't Fix ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Undecided Status: Won't Fix ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Xenial) Importance: Medium Status: New ** Also affects: linux-manta (Ubuntu Xenial) Importance: Medium Status: New ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Medium Status: New ** Also affects: linux-flo (Ubuntu Xenial) Importance: Medium Status: New ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Medium Status: Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Also affects: linux (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Undecided Status: Won't Fix ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Undecided Status: Won't Fix ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Wily) Importance: Medium Status: New ** Also affects: linux-manta (Ubuntu Wily) Importance: Medium Status: New ** Also affects: linux-goldfish (Ubuntu Wily) Importance: Medium Status: New ** Also affects: linux-flo (Ubuntu Wily) Importance: Medium Status: New ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Wily) Importance: Medium Status: Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-vivid (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Importance: Undecided = Medium ** Changed in: linux-lts-vivid (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-vivid (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New = Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quantal (Ubuntu Lucid) ** No longer affects: linux-mvl-dove (Ubuntu Lucid) ** No longer affects: linux-ti-omap4 (Ubuntu Lucid) ** No longer affects: linux (Ubuntu Lucid) ** No longer affects: linux-mako (Ubuntu Lucid) ** No longer affects: linux-fsl-imx51 (Ubuntu Lucid) ** No longer affects: linux-lts-utopic (Ubuntu Lucid) ** No longer affects: linux-flo (Ubuntu Lucid) ** No longer affects: linux-lts-raring (Ubuntu Lucid) ** No longer affects: linux-manta (Ubuntu Lucid) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Also affects: linux (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-quantal (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-raring (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-saucy (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Undecided Status: Won't Fix ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Undecided Status: Won't Fix ** Also affects: linux-armadaxp (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Vivid) Importance: Medium Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided Status: New ** No longer affects: linux-lts-trusty (Ubuntu Quantal) ** No longer affects: linux-lts-trusty (Ubuntu Saucy) ** No longer affects: linux-armadaxp (Ubuntu Quantal) ** No longer affects: linux-armadaxp (Ubuntu Saucy) ** No longer affects: linux-ec2 (Ubuntu Quantal) ** No longer affects: linux-ec2 (Ubuntu Saucy) ** No longer affects: linux-goldfish (Ubuntu Quantal) ** No longer affects: linux-goldfish (Ubuntu Saucy) ** No longer affects: linux-lts-saucy (Ubuntu Quantal) ** No longer affects: linux-lts-saucy (Ubuntu Saucy) ** No longer affects: linux-lts-quantal (Ubuntu Quantal) ** No longer affects: linux-lts-quantal (Ubuntu Saucy) ** No longer affects: linux-mvl-dove (Ubuntu Quantal) ** No longer affects: linux-mvl-dove (Ubuntu Saucy) ** No longer affects: linux-ti-omap4 (Ubuntu Quantal) ** No longer affects: linux-ti-omap4 (Ubuntu Saucy) ** No longer affects: linux (Ubuntu Quantal) ** No longer affects: linux (Ubuntu Saucy) ** No longer affects: linux-mako (Ubuntu Quantal) ** No longer affects: linux-mako (Ubuntu Saucy) ** No longer affects: linux-fsl-imx51 (Ubuntu Quantal) ** No longer affects: linux-fsl-imx51 (Ubuntu Saucy) ** No longer affects: linux-lts-utopic (Ubuntu Quantal) ** No longer affects: linux-lts-utopic (Ubuntu Saucy) ** No longer affects: linux-flo (Ubuntu Quantal) ** No longer affects: linux-flo (Ubuntu Saucy) ** No longer affects: linux-lts-raring (Ubuntu Quantal) ** No longer affects: linux-lts-raring (Ubuntu Saucy) ** No longer affects: linux-manta (Ubuntu Quantal) ** No longer affects: linux-manta (Ubuntu Saucy) ** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided = Medium ** Changed in: linux-lts-trusty (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-armadaxp (Ubuntu Utopic) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Utopic) Importance: Undecided = Medium ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Importance: Undecided = Medium **
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-armadaxp (Ubuntu Quantal) Status: Fix Committed = Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Quantal) Status: Fix Committed = Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Saucy) Status: Fix Committed = Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: Fix Committed = Fix Released ** Changed in: linux-lts-raring (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux (Ubuntu Lucid) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
This bug was fixed in the package linux-ec2 - 2.6.32-362.75 --- linux-ec2 (2.6.32-362.75) lucid-proposed; urgency=low [ Stefan Bader ] * Rebased to Ubuntu-2.6.32-57.119 * Release Tracking Bug - LP: #1281942 [ Ubuntu: 2.6.32-57.119 ] * ubuntu: AUFS: fsnotify_open() now receives a file - LP: #1097680 - CVE-2013-0160 * KVM: Improve create VCPU parameter (CVE-2013-4587) - LP: #1261564 - CVE-2013-4587 * KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367) - LP: #1261566 - CVE-2013-6367 * xfs: underflow bug in xfs_attrlist_by_handle() - LP: #1256091 - CVE-2013-6382 * aacraid: prevent invalid pointer dereference - LP: #1256083 - CVE-2013-6380 * wireless: radiotap: fix parsing buffer overrun - LP: #1260622 - CVE-2013-7027 * net: rework recvmsg handler msg_name and msg_namelen logic - LP: #1267081 - CVE-2013-7266 * net: rose: restore old recvmsg behavior - LP: #1267081 - CVE-2013-7266 * fsnotify: pass a file instead of an inode to open, read, and write - LP: #1097680 - CVE-2013-0160 * vfs: introduce FMODE_NONOTIFY - LP: #1097680 - CVE-2013-0160 * fanotify: FMODE_NONOTIFY and __O_SYNC in sparc conflict - LP: #1097680 - CVE-2013-0160 * TTY: do not update atime/mtime on read/write - LP: #1097680 - CVE-2013-0160 * TTY: fix atime/mtime regression - LP: #1097680 - CVE-2013-0160 * tty: fix up atime/mtime mess, take three - LP: #1097680 - CVE-2013-0160 * farsync: fix info leak in ioctl - LP: #1271442 - CVE-2014-1444 * wanxl: fix info leak in ioctl - LP: #1271444 - CVE-2014-1445 * hamradio/yam: fix info leak in ioctl - LP: #1271445 - CVE-2014-1446 * SELinux: Fix kernel BUG on empty security contexts. - CVE-2014-1874 * exec/ptrace: fix get_dumpable() incorrect tests - LP: #1260610 - CVE-2013-2929 -- Stefan Bader stefan.ba...@canonical.com Wed, 19 Feb 2014 16:51:53 +0100 ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0160 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2929 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-4587 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-6380 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-6382 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-7027 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-7266 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1444 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1445 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1446 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1874 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-lts-saucy (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Precise) Status: Fix Committed = Fix Released ** Changed in: linux (Ubuntu Saucy) Status: Fix Committed = Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-lts-raring (Ubuntu Precise) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New = Fix Committed ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Quantal) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Saucy) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** No longer affects: linux-armadaxp (Ubuntu Raring) ** No longer affects: linux-ec2 (Ubuntu Raring) ** No longer affects: linux-lts-saucy (Ubuntu Raring) ** No longer affects: linux-lts-quantal (Ubuntu Raring) ** No longer affects: linux-mvl-dove (Ubuntu Raring) ** No longer affects: linux (Ubuntu Raring) ** No longer affects: linux-fsl-imx51 (Ubuntu Raring) ** No longer affects: linux-ti-omap4 (Ubuntu Raring) ** No longer affects: linux-lts-raring (Ubuntu Raring) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Saucy) Status: New = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Description changed: - kvm: division by zero in apic_get_tmcct() + The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem + in the Linux kernel through 3.12.5 allows guest OS users to cause a + denial of service (divide-by-zero error and host OS crash) via crafted + modifications of the TMICT value. Break-Fix: - b963a22e6d1a266a67e9eecc88134713fd54775c -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Description changed: - kvm: division by zero in apic_get_tmcct() + The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem + in the Linux kernel through 3.12.5 allows guest OS users to cause a + denial of service (divide-by-zero error and host OS crash) via crafted + modifications of the TMICT value. Break-Fix: - b963a22e6d1a266a67e9eecc88134713fd54775c -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = New ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed = New ** Changed in: linux (Ubuntu Precise) Status: Fix Committed = New ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed = New ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed = New ** Description changed: - The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem - in the Linux kernel through 3.12.5 allows guest OS users to cause a - denial of service (divide-by-zero error and host OS crash) via crafted - modifications of the TMICT value. + kvm: division by zero in apic_get_tmcct() Break-Fix: - b963a22e6d1a266a67e9eecc88134713fd54775c -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux (Ubuntu Lucid) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New = Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New = Invalid ** Description changed: - kvm: division by zero in apic_get_tmcct() + The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem + in the Linux kernel through 3.12.5 allows guest OS users to cause a + denial of service (divide-by-zero error and host OS crash) via crafted + modifications of the TMICT value. Break-Fix: - b963a22e6d1a266a67e9eecc88134713fd54775c -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed = New ** Changed in: linux-ec2 (Ubuntu Lucid) Status: Fix Committed = New ** Changed in: linux (Ubuntu Precise) Status: Fix Committed = New ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed = New ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed = New ** Description changed: - The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem - in the Linux kernel through 3.12.5 allows guest OS users to cause a - denial of service (divide-by-zero error and host OS crash) via crafted - modifications of the TMICT value. + kvm: division by zero in apic_get_tmcct() Break-Fix: - b963a22e6d1a266a67e9eecc88134713fd54775c -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux (Ubuntu Trusty) Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Description changed: - kvm: division by zero in apic_get_tmcct() + The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem + in the Linux kernel through 3.12.5 allows guest OS users to cause a + denial of service (divide-by-zero error and host OS crash) via crafted + modifications of the TMICT value. + + Break-Fix: - b963a22e6d1a266a67e9eecc88134713fd54775c -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Description changed: - The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem - in the Linux kernel through 3.12.5 allows guest OS users to cause a - denial of service (divide-by-zero error and host OS crash) via crafted - modifications of the TMICT value. + kvm: division by zero in apic_get_tmcct() Break-Fix: - b963a22e6d1a266a67e9eecc88134713fd54775c -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Quantal) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Quantal) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Raring) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Raring) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Saucy) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Saucy) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Trusty) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Trusty) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu) Status: New = Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1261566 Title: CVE-2013-6367 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1261566] Re: CVE-2013-6367
CVE-2013-6367 ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Saucy) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Raring) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Quantal) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Changed in: linux-armadaxp (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-armadaxp (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Precise) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-ec2 (Ubuntu Raring) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Saucy) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Lucid) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Trusty) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu Quantal) Status: New = Invalid ** Changed in: linux-lts-quantal (Ubuntu