The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
I will create a patch accordance to the work.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubu
I will create a patch accordance to the work.
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Aaron Farias (timido)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug n
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importance
** Also affects: linux (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: High
Status: Invalid
** Also affects: linux-ec2 (Ubu
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-lts-wily (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (
** Changed in: linux (Ubuntu Quantal)
Status: Fix Committed => Won't Fix
** Changed in: linux-ti-omap4 (Ubuntu Quantal)
Status: Fix Committed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.laun
** Changed in: linux-ti-omap4 (Ubuntu Raring)
Status: Fix Committed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Released
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
St
** Description changed:
The scm_set_cred function in include/net/scm.h in the Linux kernel
before 3.8.11 uses incorrect uid and gid values during credentials
passing, which allows local users to gain privileges via a crafted
application.
Break-Fix: 257b5358b32f17e0603b6ff57b13610b0e02
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this bug
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this
** Changed in: linux-lts-backport-natty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-lts-backport-natty (Ubuntu Raring)
Status: New => Invalid
** Changed in: linux-lts-backport-na
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this
** Branch linked: lp:ubuntu/raring-proposed/linux-ppc
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this bug go to:
https://bugs.launchpad
This bug was fixed in the package linux-lts-raring -
3.8.0-21.32~precise1
---
linux-lts-raring (3.8.0-21.32~precise1) precise-proposed; urgency=low
[Steve Conklin]
* Release Tracking Bug
- LP: #11800201
[ Upstream Kernel Changes ]
* perf: Treat attr.config as u64 in per
** No longer affects: linux-armadaxp (Ubuntu Hardy)
** No longer affects: linux-armadaxp (Ubuntu Oneiric)
** No longer affects: linux-ec2 (Ubuntu Hardy)
** No longer affects: linux-ec2 (Ubuntu Oneiric)
** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy)
** No longer affects: linux-
** Changed in: linux (Ubuntu Raring)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this bug g
** Branch linked: lp:~ubuntu-branches/ubuntu/precise/linux-lts-raring
/precise-proposed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this
** Branch linked: lp:~ubuntu-branches/ubuntu/precise/linux-lts-raring
/precise-security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: New => Invalid
**
** Changed in: linux (Ubuntu Raring)
Status: Fix Released => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1174827
Title:
CVE-2013-1979
To manage notifications about this bug go to:
http
This bug was fixed in the package linux - 3.8.0-19.30
---
linux (3.8.0-19.30) raring-proposed; urgency=low
[ Upstream Kernel Changes ]
* Add file_ns_capable() helper function for open-time capability checking
(CVE-2013-1959)
- LP: #1174590
- CVE-2013-1959
* userns:
** Description changed:
Writes to unix sockets capture euid instead of uid.
- Break-Fix: - 83f1b4ba917db5dc5a061a44b3403ddb6e783494
- Break-Fix: - 41c21e351e79004dbb4efa4bc14a53a7e0af38c5
+ Break-Fix: 257b5358b32f17e0603b6ff57b13610b0e02348f
83f1b4ba917db5dc5a061a44b3403ddb6e783494
+ Break-F
** Changed in: linux-armadaxp (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Saucy)
Importance: Undecided => High
** Changed in: linux-ec2 (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Saucy)
Importance: Undecided => High
** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
Status: New => Invalid
** Changed in: linux-fsl-imx51 (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-fsl-imx51 (Ubuntu Raring)
Status: New => Invalid
** Description changed:
- Placeholder
+ Writes to unix sockets c
CVE-2013-1979
** Also affects: linux (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Undecided
Status: New
** Also affects:
30 matches
Mail list logo