** Changed in: linux (Ubuntu)
Status: Fix Released => Invalid
** Changed in: linux (Ubuntu Precise)
Status: Fix Released => Invalid
** Changed in: linux (Ubuntu Trusty)
Status: Fix Released => Invalid
** Changed in: linux (Ubuntu Vivid)
Status: Fix Released => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importan
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
Importan
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided =>
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance: Unde
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Assignee: Andy Whitcroft (apw)
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
S
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects: linux-lts
** Also affects: linux (Ubuntu Wily)
Importance: Medium
Assignee: Andy Whitcroft (apw)
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Medium
Status:
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects: linux-lts-quan
** Changed in: linux-goldfish (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-goldfish (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-goldfish (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-goldfish (Ubuntu Trusty)
Importance:
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Impo
** Also affects: linux (Ubuntu Vivid)
Importance: Medium
Assignee: Andy Whitcroft (apw)
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Medium
Stat
** No longer affects: linux-armadaxp (Ubuntu Saucy)
** No longer affects: linux-ec2 (Ubuntu Saucy)
** No longer affects: linux-lts-saucy (Ubuntu Saucy)
** No longer affects: linux-lts-quantal (Ubuntu Saucy)
** No longer affects: linux-mvl-dove (Ubuntu Saucy)
** No longer affects: linux (Ubuntu
** No longer affects: linux-armadaxp (Ubuntu Quantal)
** No longer affects: linux-ec2 (Ubuntu Quantal)
** No longer affects: linux-lts-saucy (Ubuntu Quantal)
** No longer affects: linux-lts-quantal (Ubuntu Quantal)
** No longer affects: linux-mvl-dove (Ubuntu Quantal)
** No longer affects: lin
** Also affects: linux (Ubuntu Utopic)
Importance: Medium
Assignee: Andy Whitcroft (apw)
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Medium
S
** No longer affects: linux-armadaxp (Ubuntu Raring)
** No longer affects: linux-ec2 (Ubuntu Raring)
** No longer affects: linux-lts-saucy (Ubuntu Raring)
** No longer affects: linux-lts-quantal (Ubuntu Raring)
** No longer affects: linux-mvl-dove (Ubuntu Raring)
** No longer affects: linux (U
** Changed in: linux-ti-omap4 (Ubuntu Trusty)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Saucy)
Importance
** Also affects: linux (Ubuntu Trusty)
Importance: Medium
Assignee: Andy Whitcroft (apw)
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Medium
S
** No longer affects: linux-armadaxp (Ubuntu Hardy)
** No longer affects: linux-armadaxp (Ubuntu Oneiric)
** No longer affects: linux-ec2 (Ubuntu Hardy)
** No longer affects: linux-ec2 (Ubuntu Oneiric)
** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy)
** No longer affects: linux-
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-raring (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-raring (Ubuntu Oneiric)
Status: New => Invalid
** Changed in: linux-lts-raring (Ubuntu Oneiric)
Im
** Also affects: linux (Ubuntu Saucy)
Importance: Medium
Assignee: Andy Whitcroft (apw)
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Medium
Stat
** Changed in: linux-armadaxp (Ubuntu Raring)
Status: Fix Released => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug
** Also affects: linux (Ubuntu Raring)
Importance: Medium
Assignee: Andy Whitcroft (apw)
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Raring)
Importance: Medium
S
** No longer affects: linux-armadaxp (Ubuntu Maverick)
** No longer affects: linux-armadaxp (Ubuntu Natty)
** No longer affects: linux-ec2 (Ubuntu Maverick)
** No longer affects: linux-ec2 (Ubuntu Natty)
** No longer affects: linux-lts-backport-oneiric (Ubuntu Maverick)
** No longer affects: l
This bug was fixed in the package linux-armadaxp - 3.2.0-1605.8
---
linux-armadaxp (3.2.0-1605.8) precise-proposed; urgency=low
* Release Tracking Bug
-LP: #1020888
[ Jani Monoses ]
* Fix warnings.
* Adapt to new sched_clock API
[ Ubuntu: 3.2.0-27.43 ]
* No change u
This bug was fixed in the package linux-armadaxp - 3.2.0-1603.6
---
linux-armadaxp (3.2.0-1603.6) precise-proposed; urgency=low
[ Jani Monoses ]
* SAUCE: Add CONFIG_SHEEVA_ERRATA_ARM_CPU_6409
- LP: #1006217
[ Ubuntu: 3.2.0-24.39 ]
* Release Tracking Bug
- LP: #10023
** Branch linked: lp:ubuntu/precise-proposed/linux-armadaxp
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug go to:
https://bugs.laun
** Description changed:
- regset: Prevent null pointer reference on readonly regsets
+ The regset (aka register set) feature in the Linux kernel before 3.2.10
+ does not properly handle the absence of .get and .set methods, which
+ allows local users to cause a denial of service (NULL pointer
+ de
This bug was fixed in the package linux-ti-omap4 - 3.0.0-1209.21
---
linux-ti-omap4 (3.0.0-1209.21) oneiric-proposed; urgency=low
* Release Tracking Bug
- LP: #985999
[ Paolo Pisati ]
* rebased on 3.0.0-19.33
[ Ubuntu: 3.0.0-19.33 ]
* Release Tracking Bug
- LP: #
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.23
---
linux-ti-omap4 (2.6.38-1209.23) natty-proposed; urgency=low
* Release Tracking Bug
- LP: #967822
[ Upstream Kernel Changes ]
* regset: Prevent null pointer reference on readonly regsets
- LP: #949905
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Quantal)
Importance: Undecided => Medium
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
** Also affects: linux (Ubuntu Quantal)
Importance: Medium
Assignee: Andy Whitcroft (apw)
Status: Fix Released
** Also affects: linux-armadaxp (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (Ubuntu Quantal)
Importance: Medium
Statu
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug g
** Changed in: linux-armadaxp (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-armadaxp (Ubuntu Oneiric)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Oneiric)
Importance: Undecided => Medium
** Changed in: linux-armadaxp (Ubuntu Lucid)
Sta
** Changed in: linux-armadaxp (Ubuntu Maverick)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug go to:
This bug was fixed in the package linux-lts-backport-oneiric -
3.0.0-19.33~lucid1
---
linux-lts-backport-oneiric (3.0.0-19.33~lucid1) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #986000
[ Luis Henriques ]
* SAUCE: ite-cir: postpone ISR regi
** Changed in: linux-mvl-dove (Ubuntu Maverick)
Status: Fix Committed => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Maverick)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bu
This bug was fixed in the package linux-ec2 - 2.6.32-345.47
---
linux-ec2 (2.6.32-345.47) lucid-proposed; urgency=low
[ Stefan Bader ]
* Rebase to Ubuntu-2.6.32-41.88
* Release Tracking Bug
- LP: #968780
[ Ubuntu: 2.6.32-41.88 ]
* [Config] restore build-% shortcut
*
This bug was fixed in the package linux - 2.6.32-41.88
---
linux (2.6.32-41.88) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #966443
[ Andy Whitcroft ]
* [Config] restore build-% shortcut
[ Tim Gardner ]
* SAUCE: ubuntu drivers: use UM
This bug was fixed in the package linux-lts-backport-natty -
2.6.38-14.58~lucid1
---
linux-lts-backport-natty (2.6.38-14.58~lucid1) lucid-proposed; urgency=low
[Luis Henriques]
* Release Tracking Bug
- LP: #967823
[ Andy Whitcroft ]
* [Config] restore build-% shortcut
This bug was fixed in the package linux-lts-backport-maverick -
2.6.35-32.68~lucid1
---
linux-lts-backport-maverick (2.6.35-32.68~lucid1) lucid-proposed; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #967068
[ Andy Whitcroft ]
* [Config] restore build-% sh
** Branch linked: lp:ubuntu/maverick-proposed/linux-mvl-dove
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug go to:
https://bugs.lau
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug go to:
https://b
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-oneiric
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug go to:
https:/
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4
** Branch linked: lp:ubuntu/oneiric-proposed/linux-ti-omap4
** Branch linked: lp:ubuntu/natty-proposed/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug go to:
https://bugs.launchpad.n
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-maverick
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug go to:
https:
** Changed in: linux (Ubuntu Oneiric)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Maverick)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Natty)
Status: Fix Committed => Fix Released
--
You received this bug notification because y
** Branch linked: lp:ubuntu/linux-lowlatency
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubunt
** Branch linked: lp:ubuntu/linux-ti-omap4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/949905
Title:
CVE-2012-1097
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1408.11
---
linux-ti-omap4 (3.2.0-1408.11) precise; urgency=low
[ Paolo Pisati ]
* rebased on 3.2.0-18.29
* [Config] drop SECURITY_APPARMOR_COMPAT_24 (updateconfigs)
[ Ubuntu: 3.2.0-18.29 ]
* [Config] restore build-
** Changed in: linux-ec2 (Ubuntu Oneiric)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Fix Committed
** Changed in: linux-ec2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Hardy)
Status: New => Invalid
** Ch
This bug was fixed in the package linux - 3.2.0-18.29
---
linux (3.2.0-18.29) precise; urgency=low
[ Andy Whitcroft ]
* [Config] restore build-% shortcut
* SAUCE: ata_piix: defer disks to the Hyper-V drivers by default
- LP: #929545, #942316
[ Eugeni Dodonov ]
* SAUCE
CVE-2012-1097
** Also affects: linux (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects
56 matches
Mail list logo