[Bug 1386395] Re: CVE-2014-8369

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1386395] Re: CVE-2014-8369

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1386395] Re: CVE-2014-8369

2016-04-24 Thread Rolf Leggewie
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
   Status: New => Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2016-01-27 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Medium
   Status: Invalid

** Also affects: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2016-01-27 Thread Steve Beattie
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-raspi2 (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as "Won't Fix".

** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2015-06-17 Thread Rolf Leggewie
lucid has seen the end of its life and is no longer receiving any
updates. Marking the lucid task for this ticket as "Won't Fix".

** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Wily)
   Importance: Medium
   Status: Invalid

** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-ec2 (Ubuntu Lucid)

** No longer affects: linux-goldfish (Ubuntu Lucid)

** No longer affects: linux-lts-saucy (Ubuntu Lucid)

** No longer affects: linux-lts-quantal (Ubuntu Lucid)

** No longer affects: linux-mvl-dove (Ubuntu Lucid)

** No longer affects: linux-ti-omap4 (Ubuntu Lucid)

** No longer affects: linux-lts-vivid (Ubuntu Lucid)

** No longer affects: linux (Ubuntu Lucid)

** No longer affects: linux-mako (Ubuntu Lucid)

** No longer affects: linux-fsl-imx51 (Ubuntu Lucid)

** No longer affects: linux-lts-utopic (Ubuntu Lucid)

** No longer affects: linux-flo (Ubuntu Lucid)

** No longer affects: linux-lts-raring (Ubuntu Lucid)

** No longer affects: linux-manta (Ubuntu Lucid)

** Changed in: linux-manta (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-manta (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-manta (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-manta (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Utopic)
   Importance: Undecided => Medium

** Changed in: linux-manta (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-manta (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-vivid (Ubuntu Utopic)
   Importance: Undecided => Medium

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-mako (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-mako (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-mako (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-mako (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-mako (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-mako (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-mako (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-mako (Ubuntu Utopic)
   Importance: Undecided => Medium

** Changed in: linux-mako (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-mako (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-goldfish (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-goldfish (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-goldfish (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-goldfish (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-goldfish (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-goldfish (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: linux-goldfish (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-goldfish (Ubuntu Utopic)
   Importance: Undecided => Medium


[Bug 1386395] Re: CVE-2014-8369

2015-03-28 Thread Mathew Hodson
** Changed in: linux (Ubuntu Vivid)
   Status: Fix Committed => Invalid

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed => Invalid

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: Fix Committed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1458.78

---
linux-ti-omap4 (3.2.0-1458.78) precise; urgency=low

  * Release Tracking Bug
- LP: #1403239

  [ Luis Henriques ]

  * rebased on Ubuntu-3.2.0-75.110

  [ Ubuntu: 3.2.0-75.110 ]

  * Release Tracking Bug
- LP: #1403154
  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478

  [ Ubuntu: 3.2.0-74.109 ]

  * Release Tracking Bug
- LP: #1400709
  * x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
- CVE-2014-9090
  * x86_64, traps: Rework bad_iret
- LP: #1398795
- CVE-2014-9090
  * x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit
- LP: #1400314
- CVE-2014-8134
 -- Luis HenriquesThu, 18 Dec 2014 10:59:10 
+

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1458.78

---
linux-ti-omap4 (3.2.0-1458.78) precise; urgency=low

  * Release Tracking Bug
- LP: #1403239

  [ Luis Henriques ]

  * rebased on Ubuntu-3.2.0-75.110

  [ Ubuntu: 3.2.0-75.110 ]

  * Release Tracking Bug
- LP: #1403154
  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478

  [ Ubuntu: 3.2.0-74.109 ]

  * Release Tracking Bug
- LP: #1400709
  * x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
  * x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
- CVE-2014-9090
  * x86_64, traps: Rework bad_iret
- LP: #1398795
- CVE-2014-9090
  * x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit
- LP: #1400314
- CVE-2014-8134
 -- Luis HenriquesThu, 18 Dec 2014 10:59:10 
+

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8134

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-9090

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1643.62

---
linux-armadaxp (3.2.0-1643.62) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1403240
  * Rebase to Ubuntu-3.2.0-75.110

  [ Ubuntu: 3.2.0-75.110 ]

  * Release Tracking Bug
- LP: #1403154
  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
 -- Ike PanhcWed, 17 Dec 2014 10:39:21 +0800

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.2.0-1643.62

---
linux-armadaxp (3.2.0-1643.62) precise; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1403240
  * Rebase to Ubuntu-3.2.0-75.110

  [ Ubuntu: 3.2.0-75.110 ]

  * Release Tracking Bug
- LP: #1403154
  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
 -- Ike PanhcWed, 17 Dec 2014 10:39:21 +0800

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2015-01-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.2.0-75.110

---
linux (3.2.0-75.110) precise; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1403154

  [ Upstream Kernel Changes ]

  * kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
- LP: #1386395
- CVE-2014-8369
  * KVM: x86: Don't report guest userspace emulation error to userspace
- LP: #1392823
- CVE-2014-7842
  * drivers:scsi:storvsc: Fix a bug in handling ring buffer failures that
may result in I/O freeze
- LP: #1400289
  * net:socket: set msg_namelen to 0 if msg_name is passed as NULL in
msghdr struct from userland.
- LP: #1335478
 -- Kamal MostafaTue, 16 Dec 2014 10:00:12 -0800

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-7842

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2015-01-05 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2014-12-12 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Utopic)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2014-12-08 Thread John Johansen
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Fix Committed

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided => Medium

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Lucid)
   Importance: Undecided => Medium

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Vivid)
   Importance: Undecided => Medium

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-utopic (Ubuntu Utopic)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2014-12-02 Thread Brad Figg
** Changed in: linux (Ubuntu Precise)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2014-11-20 Thread John Johansen
** Changed in: linux (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Utopic)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2014-11-12 Thread John Johansen
** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: New => Fix Committed

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: New => Fix Committed

** Description changed:

- Linux kernel iommu.c excessive unpinning
+ The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel
+ through 3.17.2 miscalculates the number of pages during the handling of
+ a mapping failure, which allows guest OS users to cause a denial of
+ service (host OS page unpinning) or possibly have unspecified other
+ impact by leveraging guest OS privileges.  NOTE: this vulnerability
+ exists because of an incorrect fix for CVE-2014-3601.
  
  Break-Fix: 350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
  3d32e4dbe71374a6780eaf51d719d76f9a9bf22f

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2014-10-30 Thread John Johansen
** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Committed

** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: New => Invalid

** Description changed:

  Linux kernel iommu.c excessive unpinning
  
- Break-Fix: - 3d32e4dbe71374a6780eaf51d719d76f9a9bf22f
+ Break-Fix: 350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
+ 3d32e4dbe71374a6780eaf51d719d76f9a9bf22f

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386395

Title:
  CVE-2014-8369

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1386395/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386395] Re: CVE-2014-8369

2014-10-27 Thread John Johansen
CVE-2014-8369

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Changed in: linux-armadaxp (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-ec2 (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-mvl-dove (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Utopic)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Status: New => Invalid

**