[Bug 1386395] Re: CVE-2014-8369
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-natty (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
The Precise Pangolin has reached end of life, so this bug will not be fixed for that release ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic) Status: New => Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Utopic) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
** Also affects: linux (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-mako (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-manta (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Medium Status: Invalid ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
** No longer affects: linux-lts-trusty (Ubuntu Utopic) ** No longer affects: linux-armadaxp (Ubuntu Utopic) ** No longer affects: linux-ec2 (Ubuntu Utopic) ** No longer affects: linux-goldfish (Ubuntu Utopic) ** No longer affects: linux-lts-saucy (Ubuntu Utopic) ** No longer affects: linux-lts-quantal (Ubuntu Utopic) ** No longer affects: linux-raspi2 (Ubuntu Utopic) ** No longer affects: linux-mvl-dove (Ubuntu Utopic) ** No longer affects: linux-ti-omap4 (Ubuntu Utopic) ** No longer affects: linux-lts-vivid (Ubuntu Utopic) ** No longer affects: linux (Ubuntu Utopic) ** No longer affects: linux-mako (Ubuntu Utopic) ** No longer affects: linux-fsl-imx51 (Ubuntu Utopic) ** No longer affects: linux-lts-utopic (Ubuntu Utopic) ** No longer affects: linux-flo (Ubuntu Utopic) ** No longer affects: linux-lts-raring (Ubuntu Utopic) ** No longer affects: linux-manta (Ubuntu Utopic) ** Changed in: linux-raspi2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-raspi2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Trusty) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
lucid has seen the end of its life and is no longer receiving any updates. Marking the lucid task for this ticket as "Won't Fix". ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
lucid has seen the end of its life and is no longer receiving any updates. Marking the lucid task for this ticket as "Won't Fix". ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
** Also affects: linux (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ec2 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: linux-armadaxp (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Wily) Importance: Medium Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Wily) Importance: Medium Status: Invalid ** No longer affects: linux-lts-trusty (Ubuntu Lucid) ** No longer affects: linux-armadaxp (Ubuntu Lucid) ** No longer affects: linux-ec2 (Ubuntu Lucid) ** No longer affects: linux-goldfish (Ubuntu Lucid) ** No longer affects: linux-lts-saucy (Ubuntu Lucid) ** No longer affects: linux-lts-quantal (Ubuntu Lucid) ** No longer affects: linux-mvl-dove (Ubuntu Lucid) ** No longer affects: linux-ti-omap4 (Ubuntu Lucid) ** No longer affects: linux-lts-vivid (Ubuntu Lucid) ** No longer affects: linux (Ubuntu Lucid) ** No longer affects: linux-mako (Ubuntu Lucid) ** No longer affects: linux-fsl-imx51 (Ubuntu Lucid) ** No longer affects: linux-lts-utopic (Ubuntu Lucid) ** No longer affects: linux-flo (Ubuntu Lucid) ** No longer affects: linux-lts-raring (Ubuntu Lucid) ** No longer affects: linux-manta (Ubuntu Lucid) ** Changed in: linux-manta (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-manta (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-manta (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-vivid (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-vivid (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-mako (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-mako (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-goldfish (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-goldfish (Ubuntu Utopic) Importance: Undecided => Medium
[Bug 1386395] Re: CVE-2014-8369
** Changed in: linux (Ubuntu Vivid) Status: Fix Committed => Invalid ** Changed in: linux-lts-quantal (Ubuntu Precise) Status: Fix Committed => Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1458.78 --- linux-ti-omap4 (3.2.0-1458.78) precise; urgency=low * Release Tracking Bug - LP: #1403239 [ Luis Henriques ] * rebased on Ubuntu-3.2.0-75.110 [ Ubuntu: 3.2.0-75.110 ] * Release Tracking Bug - LP: #1403154 * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 [ Ubuntu: 3.2.0-74.109 ] * Release Tracking Bug - LP: #1400709 * x86_64, traps: Stop using IST for #SS - LP: #1398795 - CVE-2014-9090 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1398795 - CVE-2014-9090 * x86_64, traps: Rework bad_iret - LP: #1398795 - CVE-2014-9090 * x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit - LP: #1400314 - CVE-2014-8134 -- Luis HenriquesThu, 18 Dec 2014 10:59:10 + -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1458.78 --- linux-ti-omap4 (3.2.0-1458.78) precise; urgency=low * Release Tracking Bug - LP: #1403239 [ Luis Henriques ] * rebased on Ubuntu-3.2.0-75.110 [ Ubuntu: 3.2.0-75.110 ] * Release Tracking Bug - LP: #1403154 * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 [ Ubuntu: 3.2.0-74.109 ] * Release Tracking Bug - LP: #1400709 * x86_64, traps: Stop using IST for #SS - LP: #1398795 - CVE-2014-9090 * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C - LP: #1398795 - CVE-2014-9090 * x86_64, traps: Rework bad_iret - LP: #1398795 - CVE-2014-9090 * x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit - LP: #1400314 - CVE-2014-8134 -- Luis HenriquesThu, 18 Dec 2014 10:59:10 + ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8134 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-9090 ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
This bug was fixed in the package linux-armadaxp - 3.2.0-1643.62 --- linux-armadaxp (3.2.0-1643.62) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1403240 * Rebase to Ubuntu-3.2.0-75.110 [ Ubuntu: 3.2.0-75.110 ] * Release Tracking Bug - LP: #1403154 * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 -- Ike PanhcWed, 17 Dec 2014 10:39:21 +0800 ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-armadaxp (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
This bug was fixed in the package linux-armadaxp - 3.2.0-1643.62 --- linux-armadaxp (3.2.0-1643.62) precise; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1403240 * Rebase to Ubuntu-3.2.0-75.110 [ Ubuntu: 3.2.0-75.110 ] * Release Tracking Bug - LP: #1403154 * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 -- Ike PanhcWed, 17 Dec 2014 10:39:21 +0800 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
This bug was fixed in the package linux - 3.2.0-75.110 --- linux (3.2.0-75.110) precise; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1403154 [ Upstream Kernel Changes ] * kvm: fix excessive pages un-pinning in kvm_iommu_map error path. - LP: #1386395 - CVE-2014-8369 * KVM: x86: Don't report guest userspace emulation error to userspace - LP: #1392823 - CVE-2014-7842 * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that may result in I/O freeze - LP: #1400289 * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. - LP: #1335478 -- Kamal MostafaTue, 16 Dec 2014 10:00:12 -0800 ** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-7842 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Utopic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-trusty (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-trusty (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-trusty (Ubuntu Utopic) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Lucid) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Vivid) Importance: Undecided => Medium ** Changed in: linux-lts-utopic (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-utopic (Ubuntu Utopic) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux (Ubuntu Utopic) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New => Fix Committed ** Description changed: - Linux kernel iommu.c excessive unpinning + The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel + through 3.17.2 miscalculates the number of pages during the handling of + a mapping failure, which allows guest OS users to cause a denial of + service (host OS page unpinning) or possibly have unspecified other + impact by leveraging guest OS privileges. NOTE: this vulnerability + exists because of an incorrect fix for CVE-2014-3601. Break-Fix: 350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7 3d32e4dbe71374a6780eaf51d719d76f9a9bf22f -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
** Changed in: linux-ec2 (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed ** Changed in: linux-lts-raring (Ubuntu Precise) Status: New => Invalid ** Description changed: Linux kernel iommu.c excessive unpinning - Break-Fix: - 3d32e4dbe71374a6780eaf51d719d76f9a9bf22f + Break-Fix: 350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7 + 3d32e4dbe71374a6780eaf51d719d76f9a9bf22f -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386395 Title: CVE-2014-8369 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386395] Re: CVE-2014-8369
CVE-2014-8369 ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ec2 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Changed in: linux-armadaxp (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-quantal (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Vivid) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Utopic) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Lucid) Status: New => Invalid **