This bug was fixed in the package linux - 3.2.0-56.86
---------------
linux (3.2.0-56.86) precise; urgency=low
[Steve Conklin]
* Release Tracking Bug
- LP: #1242901
[ Upstream Kernel Changes ]
* Revert "xfs: fix _xfs_buf_find oops on blocks beyond the filesystem
end"
- LP: #1236041
- CVE-2013-1819 fix backport:
* cciss: fix info leak in cciss_ioctl32_passthru()
- LP: #1188355
- CVE-2013-2147
* cpqarray: fix info leak in ida_locked_ioctl()
- LP: #1188355
- CVE-2013-2147
* SAUCE: (no-up) Only let characters through when there are active
readers.
- LP: #1208740
* Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
-- Steve Conklin <[email protected]> Mon, 21 Oct 2013 15:11:01 -0500
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5375
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1819
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2147
** Changed in: linux (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2888
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2889
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2892
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2893
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2895
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2896
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2897
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2899
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1208740
Title:
Large pastes into readline enabled programs causes breakage from
kernels v2.6.31 onwards
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1208740/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs