The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bug
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.l
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
Status: New => Won't Fix
** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
Status: New => Won't Fix
--
You received this bug n
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importan
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Assignee: Andy Whitcroft (apw)
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-lts-wily (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-
** Changed in: linux (Ubuntu Precise)
Status: Fix Released => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Released => Invalid
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: Fix Committed => Invalid
--
You received this bug notification because
** Changed in: linux (Ubuntu Wily)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115
Title:
CVE-2012-0056
To manage notifications about this bug go to:
htt
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1406.8
---
linux-ti-omap4 (3.2.0-1406.8) precise; urgency=low
[ Paolo Pisati ]
* [Config] updateconfigs after CMA revert
* [Config] Turn on all LIRC modules
- LP: #927526
* rebased on 3.2.0-16.25
[ Upstream Kerne
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1207.16
---
linux-ti-omap4 (3.0.0-1207.16) oneiric-proposed; urgency=low
* Release Tracking Bug
- LP: #922006
[ Upstream Kernel Changes ]
* omap4: add 4430 ES2.3 support
- LP: #917264
[ Ubuntu: 3.0.0-16.27 ]
** Description changed:
- incorrect /proc//mem permission handling
+ The mem_write function in Linux kernel 2.6.39 and other versions, when
+ ASLR is disabled, does not properly check permissions when writing to
+ /proc//mem, which allows local users to gain privileges by
+ modifying process memor
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115
Title:
CVE-2012-0056
To manage notifications about this bug go to:
https://bugs.laun
** Branch linked: lp:ubuntu/lucid-security/linux-lts-backport-oneiric
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115
Title:
CVE-2012-0056
To manage notifications about this bug go to:
https:/
** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchp
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-15.26~lucid1
---
linux-lts-backport-oneiric (3.0.0-15.26~lucid1) lucid-security; urgency=low
[ Upstream Kernel Changes ]
* Revert "proc: enable writing to /proc/pid/mem"
- LP: #919115
- CVE-2012-0056
--
Sigh. I think it's about time for this:
http://en.wikipedia.org/wiki/Capability-based_security
...when will they ever learn [2x].
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115
Title:
CVE-201
any progress on linux-lts-backport-oneiric for lucid? when can the fix
be expected?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115
Title:
CVE-2012-0056
To manage notifications about this bug
This bug was fixed in the package linux - 3.2.0-10.18
---
linux (3.2.0-10.18) precise; urgency=low
[ Tim Gardner ]
* SAUCE: ecryptfs: Print inode on metadata error
[ Upstream Kernel Changes ]
* Revert "proc: enable writing to /proc/pid/mem"
- LP: #919115
- CVE-2012-
** Changed in: linux-ec2 (Ubuntu Oneiric)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Hardy)
Status: New => Invalid
** Changed
** Changed in: linux (Ubuntu Oneiric)
Status: Fix Released => Fix Committed
** Changed in: linux (Ubuntu Oneiric)
Assignee: (unassigned) => Andy Whitcroft (apw)
** Changed in: linux (Ubuntu Precise)
Status: New => In Progress
** Changed in: linux (Ubuntu Precise)
Assignee
Mempodipper exploit doesn't work anymore with this update (on Ubuntu
11.10). I guess I can confirm that the bug is fixed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/919115
Title:
CVE-2012-0056
T
This bug was fixed in the package linux - 3.0.0-15.26
---
linux (3.0.0-15.26) oneiric-security; urgency=low
[ Upstream Kernel Changes ]
* Revert "proc: enable writing to /proc/pid/mem"
- LP: #919115
- CVE-2012-0056
-- Andy WhitcroftFri, 20 Jan 2012 10:19:07 +
**
CVE-2012-0056
** Also affects: linux (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects
26 matches
Mail list logo