[Bug 837803] Re: linux-mvl-dove: 2.6.32-218.36 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/837803 Title: linux-mvl-dove: 2.6.32-218.36 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/837803/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 837803] Package Released!
The package has been published and the bug is being set to Fix Released ** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-prepare-start:Wednesday, 31. August 2011 02:47 UTC kernel-stable-certification-end:Wednesday, 31. August 2011 03:01 UTC kernel-stable-Certification-testing-end:Wednesday, 31. August 2011 14:17 UTC kernel-stable-Prepare-package-start:Wednesday, 31. August 2011 02:47 UTC kernel-stable-Prepare-package-end:Friday, 02. September 2011 03:16 UTC kernel-stable-Promote-to-proposed-start:Friday, 02. September 2011 03:16 UTC kernel-stable-Promote-to-proposed-end:Friday, 02. September 2011 07:31 UTC kernel-stable-Verification-testing-start:Friday, 02. September 2011 07:31 UTC kernel-stable-Security-signoff-start:Monday, 05. September 2011 17:01 UTC kernel-stable-Verification-testing-end:Monday, 05. September 2011 17:01 UTC kernel-stable-Regression-testing-start:Monday, 05. September 2011 17:01 UTC kernel-stable-Security-signoff-end:Tuesday, 06. September 2011 05:31 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Wednesday, 07. September 2011 23:01 UTC kernel-stable-Promote-to-updates-start:Wednesday, 07. September 2011 23:01 UTC kernel-stable-Regression-testing-end:Wednesday, 07. September 2011 23:01 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Tuesday, 13. September 2011 10:46 UTC + kernel-stable-Promote-to-updates-end:Tuesday, 13. September 2011 10:46 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/837803 Title: linux-mvl-dove: 2.6.32-218.36 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/837803/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 837802] Re: linux-fsl-imx51: 2.6.31-610.28 -proposed tracker
Released to -security and -updates, including -meta. ** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/837802 Title: linux-fsl-imx51: 2.6.31-610.28 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/837802/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 837802] Re: linux-fsl-imx51: 2.6.31-610.28 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/837802 Title: linux-fsl-imx51: 2.6.31-610.28 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/837802/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 837802] Package Released!
The package has been published and the bug is being set to Fix Released ** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-prepare-start:Wednesday, 31. August 2011 02:46 UTC kernel-stable-certification-end:Wednesday, 31. August 2011 03:01 UTC kernel-stable-Certification-testing-end:Wednesday, 31. August 2011 14:16 UTC kernel-stable-Prepare-package-start:Wednesday, 31. August 2011 02:46 UTC kernel-stable-Prepare-package-end:Friday, 02. September 2011 03:16 UTC kernel-stable-Promote-to-proposed-start:Friday, 02. September 2011 03:16 UTC kernel-stable-Promote-to-proposed-end:Friday, 02. September 2011 07:31 UTC kernel-stable-Verification-testing-start:Friday, 02. September 2011 07:31 UTC kernel-stable-Security-signoff-start:Monday, 05. September 2011 16:46 UTC kernel-stable-Verification-testing-end:Monday, 05. September 2011 16:46 UTC kernel-stable-Regression-testing-start:Monday, 05. September 2011 16:46 UTC kernel-stable-Security-signoff-end:Tuesday, 06. September 2011 05:30 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Tuesday, 06. September 2011 21:16 UTC kernel-stable-Promote-to-updates-start:Tuesday, 06. September 2011 21:16 UTC kernel-stable-Regression-testing-end:Tuesday, 06. September 2011 21:15 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Tuesday, 13. September 2011 10:45 UTC + kernel-stable-Promote-to-updates-end:Tuesday, 13. September 2011 10:45 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/837802 Title: linux-fsl-imx51: 2.6.31-610.28 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/837802/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 836866] Re: bamfdaemon crashed with SIGSEGV in sn_xcb_display_new()
** Also affects: bamf Importance: Undecided Status: New ** Also affects: unity Importance: Undecided Status: New ** Visibility changed to: Public ** Changed in: bamf Importance: Undecided = Critical ** Changed in: unity Importance: Undecided = Critical ** Changed in: unity Milestone: None = 4.16.0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/836866 Title: bamfdaemon crashed with SIGSEGV in sn_xcb_display_new() To manage notifications about this bug go to: https://bugs.launchpad.net/bamf/+bug/836866/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 832857] Re: ssldump version 0.9b3-4build1 failed to build in oneiric
This bug was fixed in the package ssldump - 0.9b3-4ubuntu1 --- ssldump (0.9b3-4ubuntu1) oneiric; urgency=low * Configure --with-pcap-lib=/usr/lib/$(DEB_HOST_MULTIARCH). Closes: #634526. LP: #832857. -- Matthias Klose d...@ubuntu.com Tue, 13 Sep 2011 12:27:59 +0200 ** Changed in: ssldump (Ubuntu Oneiric) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/832857 Title: ssldump version 0.9b3-4build1 failed to build in oneiric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ssldump/+bug/832857/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 832844] Re: splat version 1.3.0-1 failed to build in oneiric
This bug was fixed in the package splat - 1.3.0-1ubuntu1 --- splat (1.3.0-1ubuntu1) oneiric; urgency=low * Fix FTBFS with ld --as-needed. LP: #832844. -- Matthias Klose d...@ubuntu.com Tue, 13 Sep 2011 12:36:50 +0200 ** Changed in: splat (Ubuntu Oneiric) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/832844 Title: splat version 1.3.0-1 failed to build in oneiric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/splat/+bug/832844/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 829161] Re: linux-mvl-dove: 2.6.32-218.35 -proposed tracker
*** This bug is a duplicate of bug 837803 *** https://bugs.launchpad.net/bugs/837803 This bug was fixed in the package linux-mvl-dove - 2.6.32-218.36 --- linux-mvl-dove (2.6.32-218.36) lucid-proposed; urgency=low * Release tracking bug - LP: #837803 [ Paolo Pisati ] * Rebased to 2.6.32-34.76 [ Ubuntu: 2.6.32-34.76 ] * Release Tracking Bug - LP: #836914 * Revert drm/nv50-nvc0: work around an evo channel hang that some people see * Revert eCryptfs: Handle failed metadata read in lookup * Revert tunnels: fix netns vs proto registration ordering [ Ubuntu: 2.6.32-34.75 ] * Release Tracking Bug - LP: #832332 * drm/i915: Remove BUG_ON from i915_gem_evict_something - LP: #828550 linux-mvl-dove (2.6.32-218.35) lucid-proposed; urgency=low [ Paolo Pisati ] * Release Tracking Bug - LP: #829161 * Rebased to 2.6.32-34.74 [ Ubuntu: 2.6.32-34.74 ] * Release Tracking Bug - LP: #828375 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 [ Ubuntu: 2.6.32-34.73 ] * Release Tracking Bug - LP: #824148 * SAUCE: rtl8192se: Force a build for a 2.6/3.0 kernel - LP: #805494 * [Config] Add enic/fnic to udebs - LP: #801610 * tty: icount changeover for other main devices, CVE-2010-4076, CVE-2010-4077 - LP: #720189 - CVE-2010-4077 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * ftrace: Only update the function code on write to filter files - LP: #802383 * kmemleak: Do not return a pointer to an object that kmemleak did not get - LP: #802383 * CPU hotplug, re-create sysfs directory and symlinks - LP: #802383 * Fix memory leak in cpufreq_stat - LP: #802383 * powerpc/kexec: Fix memory corruption from unallocated slaves - LP: #802383 * powerpc/oprofile: Handle events that raise an exception without overflowing - LP: #802383 * mtd: mtdconcat: fix NAND OOB write - LP: #802383 * x86, 64-bit: Fix copy_[to/from]_user() checks for the userspace address limit - LP: #802383 * ext3: Fix fs corruption when make_indexed_dir() fails - LP: #802383 * jbd: Fix forever sleeping process in do_get_write_access() - LP: #802383 * jbd: fix fsync() tid wraparound bug - LP: #802383 * ext4: release page cache in ext4_mb_load_buddy error path - LP: #802383 * Fix Ultrastor asm snippet - LP: #802383 * x86, amd: Do not enable ARAT feature on AMD processors below family 0x12 - LP: #802383 * x86, amd: Use _safe() msr access for GartTlbWlk disable code - LP: #802383 * rcu: Fix unpaired rcu_irq_enter() from locking selftests - LP: #802383 * staging: usbip: fix wrong endian conversion - LP: #802383 * Fix for buffer overflow in ldm_frag_add not sufficient - LP: #802383 * seqlock: Don't smp_rmb in seqlock reader spin loop - LP: #802383 * ALSA: HDA: Use one dmic only for Dell Studio 1558 - LP: #731706, #802383 * ASoC: Ensure output PGA is enabled for line outputs in wm_hubs - LP: #802383 * ASoC: Add some missing volume update bit sets for wm_hubs devices - LP: #802383 * mm/page_alloc.c: prevent unending loop in __alloc_pages_slowpath() - LP: #802383 * loop: limit 'max_part' module param to DISK_MAX_PARTS - LP: #802383 * loop: handle on-demand devices correctly - LP: #802383 * USB: CP210x Add 4 Device IDs for AC-Services Devices - LP: #802383 * USB: moto_modem: Add USB identifier for the Motorola VE240. - LP: #802383 * USB: serial: ftdi_sio: adding support for TavIR STK500 - LP: #802383 * USB: gamin_gps: Fix for data transfer problems in native mode - LP: #802383 * usb/gadget: at91sam9g20 fix end point max packet size - LP: #802383 * usb: gadget: rndis: don't test against req-length - LP: #802383 * OHCI: fix regression caused by nVidia shutdown workaround - LP: #802383 * p54usb: add zoom 4410 usbid - LP: #802383 * eCryptfs: Allow 2 scatterlist entries for encrypted filenames - LP: #802383 * UBIFS: fix a rare memory leak in ro to rw remounting path - LP: #802383 * i8k: Avoid lahf in 64-bit code - LP: #802383 * cpuidle: menu: fixed wrapping timers at 4.294 seconds - LP: #802383 * dm table: reject devices without request fns - LP: #802383 * atm: expose ATM device index in sysfs - LP: #802383 * brd: limit 'max_part' module param to DISK_MAX_PARTS - LP: #802383 * brd: handle on-demand devices correctly - LP: #802383 * SUNRPC: Deal with the lack of a SYN_SENT sk-sk_state_change callback... - LP: #802383 * PCI: Add quirk for setting valid class for TI816X Endpoint - LP: #802383 * xen mmu: fix a race window causing leave_mm BUG() - LP: #802383 * netfilter: nf_conntrack_reasm: properly handle packets fragmented into a single fragment - LP: #802383
[Bug 819569] Re: CVE-2011-2492
This bug was fixed in the package linux-mvl-dove - 2.6.32-218.36 --- linux-mvl-dove (2.6.32-218.36) lucid-proposed; urgency=low * Release tracking bug - LP: #837803 [ Paolo Pisati ] * Rebased to 2.6.32-34.76 [ Ubuntu: 2.6.32-34.76 ] * Release Tracking Bug - LP: #836914 * Revert drm/nv50-nvc0: work around an evo channel hang that some people see * Revert eCryptfs: Handle failed metadata read in lookup * Revert tunnels: fix netns vs proto registration ordering [ Ubuntu: 2.6.32-34.75 ] * Release Tracking Bug - LP: #832332 * drm/i915: Remove BUG_ON from i915_gem_evict_something - LP: #828550 linux-mvl-dove (2.6.32-218.35) lucid-proposed; urgency=low [ Paolo Pisati ] * Release Tracking Bug - LP: #829161 * Rebased to 2.6.32-34.74 [ Ubuntu: 2.6.32-34.74 ] * Release Tracking Bug - LP: #828375 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 [ Ubuntu: 2.6.32-34.73 ] * Release Tracking Bug - LP: #824148 * SAUCE: rtl8192se: Force a build for a 2.6/3.0 kernel - LP: #805494 * [Config] Add enic/fnic to udebs - LP: #801610 * tty: icount changeover for other main devices, CVE-2010-4076, CVE-2010-4077 - LP: #720189 - CVE-2010-4077 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * ftrace: Only update the function code on write to filter files - LP: #802383 * kmemleak: Do not return a pointer to an object that kmemleak did not get - LP: #802383 * CPU hotplug, re-create sysfs directory and symlinks - LP: #802383 * Fix memory leak in cpufreq_stat - LP: #802383 * powerpc/kexec: Fix memory corruption from unallocated slaves - LP: #802383 * powerpc/oprofile: Handle events that raise an exception without overflowing - LP: #802383 * mtd: mtdconcat: fix NAND OOB write - LP: #802383 * x86, 64-bit: Fix copy_[to/from]_user() checks for the userspace address limit - LP: #802383 * ext3: Fix fs corruption when make_indexed_dir() fails - LP: #802383 * jbd: Fix forever sleeping process in do_get_write_access() - LP: #802383 * jbd: fix fsync() tid wraparound bug - LP: #802383 * ext4: release page cache in ext4_mb_load_buddy error path - LP: #802383 * Fix Ultrastor asm snippet - LP: #802383 * x86, amd: Do not enable ARAT feature on AMD processors below family 0x12 - LP: #802383 * x86, amd: Use _safe() msr access for GartTlbWlk disable code - LP: #802383 * rcu: Fix unpaired rcu_irq_enter() from locking selftests - LP: #802383 * staging: usbip: fix wrong endian conversion - LP: #802383 * Fix for buffer overflow in ldm_frag_add not sufficient - LP: #802383 * seqlock: Don't smp_rmb in seqlock reader spin loop - LP: #802383 * ALSA: HDA: Use one dmic only for Dell Studio 1558 - LP: #731706, #802383 * ASoC: Ensure output PGA is enabled for line outputs in wm_hubs - LP: #802383 * ASoC: Add some missing volume update bit sets for wm_hubs devices - LP: #802383 * mm/page_alloc.c: prevent unending loop in __alloc_pages_slowpath() - LP: #802383 * loop: limit 'max_part' module param to DISK_MAX_PARTS - LP: #802383 * loop: handle on-demand devices correctly - LP: #802383 * USB: CP210x Add 4 Device IDs for AC-Services Devices - LP: #802383 * USB: moto_modem: Add USB identifier for the Motorola VE240. - LP: #802383 * USB: serial: ftdi_sio: adding support for TavIR STK500 - LP: #802383 * USB: gamin_gps: Fix for data transfer problems in native mode - LP: #802383 * usb/gadget: at91sam9g20 fix end point max packet size - LP: #802383 * usb: gadget: rndis: don't test against req-length - LP: #802383 * OHCI: fix regression caused by nVidia shutdown workaround - LP: #802383 * p54usb: add zoom 4410 usbid - LP: #802383 * eCryptfs: Allow 2 scatterlist entries for encrypted filenames - LP: #802383 * UBIFS: fix a rare memory leak in ro to rw remounting path - LP: #802383 * i8k: Avoid lahf in 64-bit code - LP: #802383 * cpuidle: menu: fixed wrapping timers at 4.294 seconds - LP: #802383 * dm table: reject devices without request fns - LP: #802383 * atm: expose ATM device index in sysfs - LP: #802383 * brd: limit 'max_part' module param to DISK_MAX_PARTS - LP: #802383 * brd: handle on-demand devices correctly - LP: #802383 * SUNRPC: Deal with the lack of a SYN_SENT sk-sk_state_change callback... - LP: #802383 * PCI: Add quirk for setting valid class for TI816X Endpoint - LP: #802383 * xen mmu: fix a race window causing leave_mm BUG() - LP: #802383 * netfilter: nf_conntrack_reasm: properly handle packets fragmented into a single fragment - LP: #802383 * fix memory leak in scsi_report_lun_scan - LP: #802383 * fix refcounting bug in
[Bug 818177] Re: HP DL380G5 root disk mounted read-only on boot and boot fails
I've now got a setup similar to Adams, but even with the 3.0.0-11.17 kernel, I'm still seeing the problem. Took 14 good boots to get a bad one though :) I'm testing with oneiric server. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/818177 Title: HP DL380G5 root disk mounted read-only on boot and boot fails To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/818177/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 814911] Re: arista-gtk crashed with GError in setup_source(): Icon 'camera-video' not present in theme
Confirming bug on Oneiric. Workaround is to use the arista-transcode CLI. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/814911 Title: arista-gtk crashed with GError in setup_source(): Icon 'camera-video' not present in theme To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/arista/+bug/814911/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 816550] Re: CVE-2011-1493
This bug was fixed in the package linux-mvl-dove - 2.6.32-218.36 --- linux-mvl-dove (2.6.32-218.36) lucid-proposed; urgency=low * Release tracking bug - LP: #837803 [ Paolo Pisati ] * Rebased to 2.6.32-34.76 [ Ubuntu: 2.6.32-34.76 ] * Release Tracking Bug - LP: #836914 * Revert drm/nv50-nvc0: work around an evo channel hang that some people see * Revert eCryptfs: Handle failed metadata read in lookup * Revert tunnels: fix netns vs proto registration ordering [ Ubuntu: 2.6.32-34.75 ] * Release Tracking Bug - LP: #832332 * drm/i915: Remove BUG_ON from i915_gem_evict_something - LP: #828550 linux-mvl-dove (2.6.32-218.35) lucid-proposed; urgency=low [ Paolo Pisati ] * Release Tracking Bug - LP: #829161 * Rebased to 2.6.32-34.74 [ Ubuntu: 2.6.32-34.74 ] * Release Tracking Bug - LP: #828375 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 [ Ubuntu: 2.6.32-34.73 ] * Release Tracking Bug - LP: #824148 * SAUCE: rtl8192se: Force a build for a 2.6/3.0 kernel - LP: #805494 * [Config] Add enic/fnic to udebs - LP: #801610 * tty: icount changeover for other main devices, CVE-2010-4076, CVE-2010-4077 - LP: #720189 - CVE-2010-4077 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * ftrace: Only update the function code on write to filter files - LP: #802383 * kmemleak: Do not return a pointer to an object that kmemleak did not get - LP: #802383 * CPU hotplug, re-create sysfs directory and symlinks - LP: #802383 * Fix memory leak in cpufreq_stat - LP: #802383 * powerpc/kexec: Fix memory corruption from unallocated slaves - LP: #802383 * powerpc/oprofile: Handle events that raise an exception without overflowing - LP: #802383 * mtd: mtdconcat: fix NAND OOB write - LP: #802383 * x86, 64-bit: Fix copy_[to/from]_user() checks for the userspace address limit - LP: #802383 * ext3: Fix fs corruption when make_indexed_dir() fails - LP: #802383 * jbd: Fix forever sleeping process in do_get_write_access() - LP: #802383 * jbd: fix fsync() tid wraparound bug - LP: #802383 * ext4: release page cache in ext4_mb_load_buddy error path - LP: #802383 * Fix Ultrastor asm snippet - LP: #802383 * x86, amd: Do not enable ARAT feature on AMD processors below family 0x12 - LP: #802383 * x86, amd: Use _safe() msr access for GartTlbWlk disable code - LP: #802383 * rcu: Fix unpaired rcu_irq_enter() from locking selftests - LP: #802383 * staging: usbip: fix wrong endian conversion - LP: #802383 * Fix for buffer overflow in ldm_frag_add not sufficient - LP: #802383 * seqlock: Don't smp_rmb in seqlock reader spin loop - LP: #802383 * ALSA: HDA: Use one dmic only for Dell Studio 1558 - LP: #731706, #802383 * ASoC: Ensure output PGA is enabled for line outputs in wm_hubs - LP: #802383 * ASoC: Add some missing volume update bit sets for wm_hubs devices - LP: #802383 * mm/page_alloc.c: prevent unending loop in __alloc_pages_slowpath() - LP: #802383 * loop: limit 'max_part' module param to DISK_MAX_PARTS - LP: #802383 * loop: handle on-demand devices correctly - LP: #802383 * USB: CP210x Add 4 Device IDs for AC-Services Devices - LP: #802383 * USB: moto_modem: Add USB identifier for the Motorola VE240. - LP: #802383 * USB: serial: ftdi_sio: adding support for TavIR STK500 - LP: #802383 * USB: gamin_gps: Fix for data transfer problems in native mode - LP: #802383 * usb/gadget: at91sam9g20 fix end point max packet size - LP: #802383 * usb: gadget: rndis: don't test against req-length - LP: #802383 * OHCI: fix regression caused by nVidia shutdown workaround - LP: #802383 * p54usb: add zoom 4410 usbid - LP: #802383 * eCryptfs: Allow 2 scatterlist entries for encrypted filenames - LP: #802383 * UBIFS: fix a rare memory leak in ro to rw remounting path - LP: #802383 * i8k: Avoid lahf in 64-bit code - LP: #802383 * cpuidle: menu: fixed wrapping timers at 4.294 seconds - LP: #802383 * dm table: reject devices without request fns - LP: #802383 * atm: expose ATM device index in sysfs - LP: #802383 * brd: limit 'max_part' module param to DISK_MAX_PARTS - LP: #802383 * brd: handle on-demand devices correctly - LP: #802383 * SUNRPC: Deal with the lack of a SYN_SENT sk-sk_state_change callback... - LP: #802383 * PCI: Add quirk for setting valid class for TI816X Endpoint - LP: #802383 * xen mmu: fix a race window causing leave_mm BUG() - LP: #802383 * netfilter: nf_conntrack_reasm: properly handle packets fragmented into a single fragment - LP: #802383 * fix memory leak in scsi_report_lun_scan - LP: #802383 * fix refcounting bug in
[Bug 842198] Re: oneconf-service crashed with IOError in update(): [Errno 2] No such file or directory: u'/home/mandj/.cache/oneconf/511b8f54f57a6b95c13bb6740000000a/package_list_511b8f54f57a6b95c13bb
** Visibility changed to: Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/842198 Title: oneconf-service crashed with IOError in update(): [Errno 2] No such file or directory: u'/home/mandj/.cache/oneconf/511b8f54f57a6b95c13bb674000a/package_list_511b8f54f57a6b95c13bb674000a' To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/oneconf/+bug/842198/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 848853] Re: update-manager crashed with TypeError in confirmChanges(): glib.markup_escape_text() takes at most 1 argument (2 given)
*** This bug is a duplicate of bug 848783 *** https://bugs.launchpad.net/bugs/848783 Thank you for taking the time to report this crash and helping to make Ubuntu better. This particular crash has already been reported and is a duplicate of bug #848783, so is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Please continue to report any other bugs you may find. ** Tags removed: need-duplicate-check ** Attachment removed: Dependencies.txt https://bugs.launchpad.net/bugs/848853/+attachment/2396615/+files/Dependencies.txt ** Attachment removed: ProcMaps.txt https://bugs.launchpad.net/bugs/848853/+attachment/2396616/+files/ProcMaps.txt ** Attachment removed: ProcStatus.txt https://bugs.launchpad.net/bugs/848853/+attachment/2396617/+files/ProcStatus.txt ** This bug has been marked a duplicate of private bug 848783 ** Visibility changed to: Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848853 Title: update-manager crashed with TypeError in confirmChanges(): glib.markup_escape_text() takes at most 1 argument (2 given) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/848853/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 848796] Re: Ubuntu test page gives error when printing using hp
WhyteHorse, can you run the following commands in a terminal window: sudo /usr/lib/cups/backend/dnssd sudo /usr/lib/cups/backend/snmp hp-makeuri 192.168.2.89 hp-probe -bnet -mmdns hp-probe -bnet -mslp If a command does not exit by itself, stop it with Ctrl + C, post the output of all commands here in this bug report. ** Changed in: hplip Status: New = Incomplete ** Changed in: hplip (Ubuntu) Status: New = Incomplete ** Changed in: hplip (Ubuntu) Importance: Undecided = Medium ** Summary changed: - Ubuntu test page gives error when printing using hp + Printing on HP LJ MP2727 only works with socket backend, not with hp backend -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848796 Title: Printing on HP LJ MP2727 only works with socket backend, not with hp backend To manage notifications about this bug go to: https://bugs.launchpad.net/hplip/+bug/848796/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 846900] Re: Empathy crashes on startup
Actually a problem in libfolks, reassigning ** Bug watch added: GNOME Bug Tracker #658631 https://bugzilla.gnome.org/show_bug.cgi?id=658631 ** Also affects: empathy via https://bugzilla.gnome.org/show_bug.cgi?id=658631 Importance: Unknown Status: Unknown ** Project changed: empathy = folks ** Package changed: empathy (Ubuntu) = folks (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/846900 Title: Empathy crashes on startup To manage notifications about this bug go to: https://bugs.launchpad.net/folks/+bug/846900/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 832850] Re: xsensors version 0.70-1.1ubuntu2 failed to build in oneiric
** Changed in: xsensors (Debian) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/832850 Title: xsensors version 0.70-1.1ubuntu2 failed to build in oneiric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xsensors/+bug/832850/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 805947] Re: SRU: hand-picked packaging fixes for Lucid, Maverick, and Natty
Thanks for the advice on where to insert cupsenable and cupsaccept steps. As for encryption, I still don't see why we need to force its usage, especially given how we'll be manipulating localhost at all steps. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/805947 Title: SRU: hand-picked packaging fixes for Lucid, Maverick, and Natty To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cups-pdf/+bug/805947/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 765060] Re: compiz crashed with SIGSEGV in bamf_factory_view_for_path()
** Changed in: unity Status: Confirmed = Invalid ** Changed in: unity (Ubuntu) Status: Confirmed = Invalid ** Changed in: bamf Status: Confirmed = Won't Fix ** Changed in: bamf Status: Won't Fix = Fix Released ** Changed in: bamf (Ubuntu) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/765060 Title: compiz crashed with SIGSEGV in bamf_factory_view_for_path() To manage notifications about this bug go to: https://bugs.launchpad.net/bamf/+bug/765060/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 795418] Re: CVE-2011-1577
This bug was fixed in the package linux-mvl-dove - 2.6.32-218.36 --- linux-mvl-dove (2.6.32-218.36) lucid-proposed; urgency=low * Release tracking bug - LP: #837803 [ Paolo Pisati ] * Rebased to 2.6.32-34.76 [ Ubuntu: 2.6.32-34.76 ] * Release Tracking Bug - LP: #836914 * Revert drm/nv50-nvc0: work around an evo channel hang that some people see * Revert eCryptfs: Handle failed metadata read in lookup * Revert tunnels: fix netns vs proto registration ordering [ Ubuntu: 2.6.32-34.75 ] * Release Tracking Bug - LP: #832332 * drm/i915: Remove BUG_ON from i915_gem_evict_something - LP: #828550 linux-mvl-dove (2.6.32-218.35) lucid-proposed; urgency=low [ Paolo Pisati ] * Release Tracking Bug - LP: #829161 * Rebased to 2.6.32-34.74 [ Ubuntu: 2.6.32-34.74 ] * Release Tracking Bug - LP: #828375 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 [ Ubuntu: 2.6.32-34.73 ] * Release Tracking Bug - LP: #824148 * SAUCE: rtl8192se: Force a build for a 2.6/3.0 kernel - LP: #805494 * [Config] Add enic/fnic to udebs - LP: #801610 * tty: icount changeover for other main devices, CVE-2010-4076, CVE-2010-4077 - LP: #720189 - CVE-2010-4077 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * ftrace: Only update the function code on write to filter files - LP: #802383 * kmemleak: Do not return a pointer to an object that kmemleak did not get - LP: #802383 * CPU hotplug, re-create sysfs directory and symlinks - LP: #802383 * Fix memory leak in cpufreq_stat - LP: #802383 * powerpc/kexec: Fix memory corruption from unallocated slaves - LP: #802383 * powerpc/oprofile: Handle events that raise an exception without overflowing - LP: #802383 * mtd: mtdconcat: fix NAND OOB write - LP: #802383 * x86, 64-bit: Fix copy_[to/from]_user() checks for the userspace address limit - LP: #802383 * ext3: Fix fs corruption when make_indexed_dir() fails - LP: #802383 * jbd: Fix forever sleeping process in do_get_write_access() - LP: #802383 * jbd: fix fsync() tid wraparound bug - LP: #802383 * ext4: release page cache in ext4_mb_load_buddy error path - LP: #802383 * Fix Ultrastor asm snippet - LP: #802383 * x86, amd: Do not enable ARAT feature on AMD processors below family 0x12 - LP: #802383 * x86, amd: Use _safe() msr access for GartTlbWlk disable code - LP: #802383 * rcu: Fix unpaired rcu_irq_enter() from locking selftests - LP: #802383 * staging: usbip: fix wrong endian conversion - LP: #802383 * Fix for buffer overflow in ldm_frag_add not sufficient - LP: #802383 * seqlock: Don't smp_rmb in seqlock reader spin loop - LP: #802383 * ALSA: HDA: Use one dmic only for Dell Studio 1558 - LP: #731706, #802383 * ASoC: Ensure output PGA is enabled for line outputs in wm_hubs - LP: #802383 * ASoC: Add some missing volume update bit sets for wm_hubs devices - LP: #802383 * mm/page_alloc.c: prevent unending loop in __alloc_pages_slowpath() - LP: #802383 * loop: limit 'max_part' module param to DISK_MAX_PARTS - LP: #802383 * loop: handle on-demand devices correctly - LP: #802383 * USB: CP210x Add 4 Device IDs for AC-Services Devices - LP: #802383 * USB: moto_modem: Add USB identifier for the Motorola VE240. - LP: #802383 * USB: serial: ftdi_sio: adding support for TavIR STK500 - LP: #802383 * USB: gamin_gps: Fix for data transfer problems in native mode - LP: #802383 * usb/gadget: at91sam9g20 fix end point max packet size - LP: #802383 * usb: gadget: rndis: don't test against req-length - LP: #802383 * OHCI: fix regression caused by nVidia shutdown workaround - LP: #802383 * p54usb: add zoom 4410 usbid - LP: #802383 * eCryptfs: Allow 2 scatterlist entries for encrypted filenames - LP: #802383 * UBIFS: fix a rare memory leak in ro to rw remounting path - LP: #802383 * i8k: Avoid lahf in 64-bit code - LP: #802383 * cpuidle: menu: fixed wrapping timers at 4.294 seconds - LP: #802383 * dm table: reject devices without request fns - LP: #802383 * atm: expose ATM device index in sysfs - LP: #802383 * brd: limit 'max_part' module param to DISK_MAX_PARTS - LP: #802383 * brd: handle on-demand devices correctly - LP: #802383 * SUNRPC: Deal with the lack of a SYN_SENT sk-sk_state_change callback... - LP: #802383 * PCI: Add quirk for setting valid class for TI816X Endpoint - LP: #802383 * xen mmu: fix a race window causing leave_mm BUG() - LP: #802383 * netfilter: nf_conntrack_reasm: properly handle packets fragmented into a single fragment - LP: #802383 * fix memory leak in scsi_report_lun_scan - LP: #802383 * fix refcounting bug in
[Bug 807564] Re: [ALSA] [cs5535] PCM channel's 0db lowered since 2.6.39
I am unable to verify this, because kernel 3.0 is extremely unstable on my ubuntu+1 host and it seems to be going from bad to worse with each new kernel package uploaded to Oneiric. Since the kernel only manages to remain on for a very short amount of time, I am unable to launch ubuntu-bug linux because a kernel vm paging bug makes every application that gets launched (including Firefox, which is needed to complete the bug report) crash, which further fills up /var/crash with tons of Apport reports ready to send. Instructions on how to circumvent this issue and successfully file a bug report about those VM paging issues using ubuntu-bug linux would be extremely welcome, so that I can return to providing more info on this ALSA issue later. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/807564 Title: [ALSA] [cs5535] PCM channel's 0db lowered since 2.6.39 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/807564/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 433651] Re: Chat window grows beyond screen bounds - no text wrap when typing in the message entry
** Changed in: empathy (Ubuntu) Status: Fix Released = Triaged ** Description changed: Binary package hint: empathy + + Issue still present in Oneiric. In Karmic, Lucid Maverick, the text ~does not~ wrap when typing text in a chat window. Instead, the window grows. This has been noticed in both IRC and XMPP (Jabber), possibly others. It would be nice if the text wrapped. :-) POSSIBLE WORKAROUNDS: * Resizing the contact list to a big enough size to prevent the expansion. * Text wrap may work if the room contact list is disabled (uncheck Conversation Show contactlist). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/433651 Title: Chat window grows beyond screen bounds - no text wrap when typing in the message entry To manage notifications about this bug go to: https://bugs.launchpad.net/empathy/+bug/433651/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 846441] Re: Repeated indicators in unity-2d panel when second screen added
Ok, so now (after that my branch has been merged) this should have been fixed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/846441 Title: Repeated indicators in unity-2d panel when second screen added To manage notifications about this bug go to: https://bugs.launchpad.net/unity-2d/+bug/846441/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 414806] Re: Evince crashes when printing PDF file
In Oneiric (and maybe previous releases) this doesn't happen anymore, closing. ** Changed in: cairo (Ubuntu) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/414806 Title: Evince crashes when printing PDF file To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cairo/+bug/414806/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 848855] Re: unity-2d-panel crashed with SIGSEGV in malloc()
*** This bug is a duplicate of bug 845896 *** https://bugs.launchpad.net/bugs/845896 Thank you for taking the time to report this crash and helping to make Ubuntu better. This particular crash has already been reported and is a duplicate of bug #845896, so is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Please continue to report any other bugs you may find. ** Attachment removed: CoreDump.gz https://bugs.launchpad.net/bugs/848855/+attachment/2396628/+files/CoreDump.gz ** Attachment removed: Dependencies.txt https://bugs.launchpad.net/bugs/848855/+attachment/2396629/+files/Dependencies.txt ** Attachment removed: Disassembly.txt https://bugs.launchpad.net/bugs/848855/+attachment/2396630/+files/Disassembly.txt ** Attachment removed: ProcMaps.txt https://bugs.launchpad.net/bugs/848855/+attachment/2396631/+files/ProcMaps.txt ** Attachment removed: ProcStatus.txt https://bugs.launchpad.net/bugs/848855/+attachment/2396632/+files/ProcStatus.txt ** Attachment removed: Registers.txt https://bugs.launchpad.net/bugs/848855/+attachment/2396633/+files/Registers.txt ** Attachment removed: Stacktrace.txt https://bugs.launchpad.net/bugs/848855/+attachment/2396634/+files/Stacktrace.txt ** Attachment removed: ThreadStacktrace.txt https://bugs.launchpad.net/bugs/848855/+attachment/2396635/+files/ThreadStacktrace.txt ** This bug has been marked a duplicate of private bug 845896 ** Visibility changed to: Public ** Tags removed: need-i386-retrace -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848855 Title: unity-2d-panel crashed with SIGSEGV in malloc() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unity-2d/+bug/848855/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 379382] Re: gnome-screenshot (Alt-Printscreen) black/blanks out top of windows in multi monitor xinerama
Can somebody please verify whether or not this affects oneiric as well so that we can move on? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/379382 Title: gnome-screenshot (Alt-Printscreen) black/blanks out top of windows in multi monitor xinerama To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-utils/+bug/379382/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 848856] [NEW] Sync lptools 0.0.1~bzr29-1 (universe) from Debian unstable (main)
Public bug reported: Please sync lptools 0.0.1~bzr29-1 (universe) from Debian unstable (main) Changelog entries since current oneiric version 0.0.1~bzr28-1: lptools (0.0.1~bzr29-1) unstable; urgency=medium * New upstream snapshot. + Fixes typo which broke lp-project-upload. LP: #845170 -- Jelmer Vernooij jel...@debian.org Fri, 09 Sep 2011 02:11:23 +0200 ** Affects: lptools (Ubuntu) Importance: Wishlist Status: New ** Changed in: lptools (Ubuntu) Importance: Undecided = Wishlist -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848856 Title: Sync lptools 0.0.1~bzr29-1 (universe) from Debian unstable (main) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lptools/+bug/848856/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 848773] Re: please cherry-pick savagefb regression fix for 3.0
** Tags added: oneiric -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848773 Title: please cherry-pick savagefb regression fix for 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/848773/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 838037] Re: linux-ti-omap4: 2.6.35-903.24 -proposed tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 834121] Re: CVE-2011-2918
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 831285] Re: splashy version 0.3.13-5.1 failed to build in oneiric
This bug was fixed in the package splashy - 0.3.13-5.1ubuntu1 --- splashy (0.3.13-5.1ubuntu1) oneiric; urgency=low * Remove the Debian hack for #297741. LP: #831285. * Don't build with -Werror. Closes: #625406. -- Matthias Klose d...@ubuntu.com Tue, 13 Sep 2011 12:41:01 +0200 ** Changed in: splashy (Ubuntu Oneiric) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/831285 Title: splashy version 0.3.13-5.1 failed to build in oneiric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/splashy/+bug/831285/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 834079] Re: files written as root to user-controlled folders
I can replicate the bug with creating a root owned /rootfile and ln -s /rootfile ~/.Xauthority. lightdm changes /rootfile then. Writing ~/.dmrc uses g_file_set_contents() which is safe against symlink attacks. However, it's still more robust to drop privileges instead of chown()ing. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/834079 Title: files written as root to user-controlled folders To manage notifications about this bug go to: https://bugs.launchpad.net/lightdm/+bug/834079/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 829655] Re: linux-ti-omap4: 2.6.35-903.23 -proposed tracker
*** This bug is a duplicate of bug 838037 *** https://bugs.launchpad.net/bugs/838037 This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition
[Bug 828701] Re: empathy crashed with SIGABRT in g_assertion_message()
Upstream was a dupe, reassigning to actual issue ** Bug watch added: GNOME Bug Tracker #653599 https://bugzilla.gnome.org/show_bug.cgi?id=653599 ** Changed in: empathy Importance: Medium = Unknown ** Changed in: empathy Status: Invalid = Unknown ** Changed in: empathy Remote watch: GNOME Bug Tracker #656654 = GNOME Bug Tracker #653599 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/828701 Title: empathy crashed with SIGABRT in g_assertion_message() To manage notifications about this bug go to: https://bugs.launchpad.net/empathy/+bug/828701/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 820225] Re: gnome-volume-control crashed with SIGABRT in __kernel_vsyscall()
** Description changed: gnome-volume-control crashed while testing speakers. I have the gdm welcome sound and login sound but after that, unable to play any sound (gstreamer, aplay, ...) the volume control crashes while testing speakers - user@ubuntu:~$ aplay -l + user@ubuntu:~$ aplay -l Liste des Périphériques Matériels PLAYBACK - carte 0: Intel [HDA Intel], périphérique 0: AD198x Analog [AD198x Analog] - Sous-périphériques: 1/1 - Sous-périphérique #0: subdevice #0 - carte 0: Intel [HDA Intel], périphérique 1: AD198x Digital [AD198x Digital] - Sous-périphériques: 1/1 - Sous-périphérique #0: subdevice #0 + Détection de vos périphériques audio : + 0 [SI7012 ]: ICH - SiS SI7012 + SiS SI7012 with AD1888 at irq 18 ProblemType: Crash DistroRelease: Ubuntu 11.04 Package: gnome-media 2.32.0-0ubuntu7 ProcVersionSignature: Ubuntu 2.6.38-10.46-generic 2.6.38.7 Uname: Linux 2.6.38-10-generic i686 Architecture: i386 CrashCounter: 1 Date: Wed Aug 3 09:35:12 2011 ExecutablePath: /usr/bin/gnome-volume-control InstallationMedia: Ubuntu 11.04 Natty Narwhal - Release i386 (20110427.1) ProcCmdline: gnome-volume-control ProcEnviron: - SHELL=/bin/bash - LANG=fr_FR.UTF-8 - LANGUAGE=fr_FR:en + SHELL=/bin/bash + LANG=fr_FR.UTF-8 + LANGUAGE=fr_FR:en Signal: 6 SourcePackage: gnome-media StacktraceTop: - __kernel_vsyscall () - raise () from /lib/i386-linux-gnu/libc.so.6 - abort () from /lib/i386-linux-gnu/libc.so.6 - g_assertion_message () from /lib/i386-linux-gnu/libglib-2.0.so.0 - g_assertion_message_expr () from /lib/i386-linux-gnu/libglib-2.0.so.0 + __kernel_vsyscall () + raise () from /lib/i386-linux-gnu/libc.so.6 + abort () from /lib/i386-linux-gnu/libc.so.6 + g_assertion_message () from /lib/i386-linux-gnu/libglib-2.0.so.0 + g_assertion_message_expr () from /lib/i386-linux-gnu/libglib-2.0.so.0 Title: gnome-volume-control crashed with SIGABRT in __kernel_vsyscall() UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm admin cdrom dialout lpadmin plugdev sambashare -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/820225 Title: gnome-volume-control crashed with SIGABRT in __kernel_vsyscall() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-media/+bug/820225/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 819569] Re: CVE-2011-2492
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 816550] Re: CVE-2011-1493
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 816549] Re: CVE-2011-1478
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 816547] Re: CVE-2011-1180
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 816546] Re: CVE-2011-1160
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 816545] Re: CVE-2011-1080
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 816544] Re: CVE-2011-1079
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 816542] Re: CVE-2011-1078
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 814087] Re: CVE-2011-1093
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 813026] Re: CVE-2011-1020
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 806390] Re: CVE-2011-2484
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 806375] Re: CVE-2011-1770
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 804366] Re: CVE-2011-1019
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 804234] Re: CVE-2010-NNN3
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 804229] Re: CVE-2011-1013
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 804225] Re: CVE-2011-1010
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 801484] Re: CVE-2011-1173
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 848854] [NEW] Update to 0.9.7
*** This bug is a duplicate of bug 833092 *** https://bugs.launchpad.net/bugs/833092 Public bug reported: Update request from 0.9.6 to 0.9.7. The newer release has a ~ 20% speed increase for typical encoder settings, especially the real-time setting used for videoconferencing. ProblemType: Bug DistroRelease: Ubuntu 11.10 Package: libvpx0 0.9.6-1 ProcVersionSignature: Ubuntu 3.0.0-11.17-generic 3.0.4 Uname: Linux 3.0.0-11-generic x86_64 ApportVersion: 1.22.1-0ubuntu2 Architecture: amd64 Date: Tue Sep 13 12:43:22 2011 InstallationMedia: Ubuntu 10.04 LTS Lucid Lynx - Release amd64 (20100429) SourcePackage: libvpx UpgradeStatus: Upgraded to oneiric on 2011-09-12 (0 days ago) ** Affects: libvpx (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug oneiric -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848854 Title: Update to 0.9.7 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvpx/+bug/848854/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 848828] Re: bamfdaemon crashed with SIGSEGV in dbus_connection_get_dispatch_status()
** Also affects: bamf Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848828 Title: bamfdaemon crashed with SIGSEGV in dbus_connection_get_dispatch_status() To manage notifications about this bug go to: https://bugs.launchpad.net/bamf/+bug/848828/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 713346] Re: gnome-language-selector crashed with NotAuthorizedError in _run(): org.freedesktop.PolicyKit.Error.NotAuthorized: ('system-bus-name', {'name': ':1.164'}): org.debian.apt.install-or-r
** Changed in: language-selector (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/713346 Title: gnome-language-selector crashed with NotAuthorizedError in _run(): org.freedesktop.PolicyKit.Error.NotAuthorized: ('system-bus-name', {'name': ':1.164'}): org.debian.apt.install-or-remove-packages To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/language-selector/+bug/713346/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 833092] Re: [FFe] please sync libvpx (0.9.7.p1-1) from debian sid
** Changed in: libvpx (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/833092 Title: [FFe] please sync libvpx (0.9.7.p1-1) from debian sid To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvpx/+bug/833092/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 103010] Re: qemu no tun/tap networking
Did this ever get fixed? The upstream patch with the helper was posted to the mailing list in November 2009 and in the same thread it is mentioned that the Ubuntu packaging would enable this by the time Lucid/qemu-0.12-rc1 was released. http://www.mail-archive.com/qemu-devel@nongnu.org/msg17772.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/103010 Title: qemu no tun/tap networking To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/103010/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 801483] Re: CVE-2011-1172
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 735205] Re: [window management] Alt tab does not switch to the desired application but instead set the urgency flag on the window
Okay, so... if I understand what you mean, that's what you did: Index: metacity-2.34.1/src/core/window.c === --- metacity-2.34.1.orig/src/core/window.c 2011-09-13 12:37:46.240667605 +0200 +++ metacity-2.34.1/src/core/window.c 2011-09-13 12:39:41.850668035 +0200 @@ -3043,7 +3043,7 @@ * honor 0 timestamps for pagers. */ can_ignore_outdated_timestamps = -(timestamp != 0 || (FALSE source_indication != META_CLIENT_TYPE_PAGER)); +(FALSE source_indication != META_CLIENT_TYPE_PAGER); if (XSERVER_TIME_IS_BEFORE (timestamp, window-display-last_user_time) can_ignore_outdated_timestamps) { That does solve the urgent instead of switch after alt+tab issue, but for me it doesn't solve the more important one - window gets raised but doesn't get focus. After that change the behavior is: post-3. firefox is raised, but focus remains with terminal post-4. only now you get switched to firefox post-5. then works as expected It does solve the Alt+Tab for chromium, 'cause the chromium window already holds focus and is active. Try executing `chromium-browser http://google.pl/` in a terminal to see what I mean. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/735205 Title: [window management] Alt tab does not switch to the desired application but instead set the urgency flag on the window To manage notifications about this bug go to: https://bugs.launchpad.net/unity-2d/+bug/735205/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 848246] Re: linux: 2.6.38-11.50 -proposed tracker
** Changed in: kernel-sru-workflow/verification-testing Status: New = In Progress ** Description changed: This bug is for tracking the 2.6.38-11.50 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 12. September 2011 20:18 UTC - kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Tuesday, 13. September 2011 04:34 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 13. September 2011 04:34 UTC - kernel-stable-phase-changed:Tuesday, 13. September 2011 04:34 UTC + kernel-stable-phase:Verification + kernel-stable-phase-changed:Tuesday, 13. September 2011 10:47 UTC + kernel-stable-Promote-to-proposed-end:Tuesday, 13. September 2011 10:47 UTC + kernel-stable-Verification-testing-start:Tuesday, 13. September 2011 10:47 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848246 Title: linux: 2.6.38-11.50 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/848246/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 801482] Re: CVE-2011-1171
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 801480] Re: CVE-2011-1170
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 801473] Re: CVE-2011-2534
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 801083] Re: CVE-2011-1012
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 800775] Re: CVE-2011-1090
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 800758] Re: CVE-2011-1082
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 800121] Re: CVE 2010-4649
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 799906] Re: CVE-2011-0726
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 799805] Re: CVE-2010-4256
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 796606] Re: CVE-2011-1163
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 796502] Re: CVE-2011-1598
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 795418] Re: CVE-2011-1577
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 794034] Re: CVE-2010-4076 CVE-2010-4077
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 788700] Re: CVE-2011-1747
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 788694] Re: CVE-2011-1748
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 788684] Re: CVE-2011-2022
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 785331] Re: CVE-2011-1169
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 771125] Re: packeth version 1.6.5-1 failed to build on amd64 with GCC-4.6/oneiric
This bug was fixed in the package packeth - 1.6.5-1ubuntu1 --- packeth (1.6.5-1ubuntu1) oneiric; urgency=low * Fix link order to list libraries after the objects that require them (LP: #771125). -- Colin Watson cjwat...@ubuntu.com Tue, 13 Sep 2011 11:46:02 +0100 ** Changed in: packeth (Ubuntu Oneiric) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/771125 Title: packeth version 1.6.5-1 failed to build on amd64 with GCC-4.6/oneiric To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/packeth/+bug/771125/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 813026] Re: CVE-2011-1020
This bug was fixed in the package linux-mvl-dove - 2.6.32-218.36 --- linux-mvl-dove (2.6.32-218.36) lucid-proposed; urgency=low * Release tracking bug - LP: #837803 [ Paolo Pisati ] * Rebased to 2.6.32-34.76 [ Ubuntu: 2.6.32-34.76 ] * Release Tracking Bug - LP: #836914 * Revert drm/nv50-nvc0: work around an evo channel hang that some people see * Revert eCryptfs: Handle failed metadata read in lookup * Revert tunnels: fix netns vs proto registration ordering [ Ubuntu: 2.6.32-34.75 ] * Release Tracking Bug - LP: #832332 * drm/i915: Remove BUG_ON from i915_gem_evict_something - LP: #828550 linux-mvl-dove (2.6.32-218.35) lucid-proposed; urgency=low [ Paolo Pisati ] * Release Tracking Bug - LP: #829161 * Rebased to 2.6.32-34.74 [ Ubuntu: 2.6.32-34.74 ] * Release Tracking Bug - LP: #828375 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 [ Ubuntu: 2.6.32-34.73 ] * Release Tracking Bug - LP: #824148 * SAUCE: rtl8192se: Force a build for a 2.6/3.0 kernel - LP: #805494 * [Config] Add enic/fnic to udebs - LP: #801610 * tty: icount changeover for other main devices, CVE-2010-4076, CVE-2010-4077 - LP: #720189 - CVE-2010-4077 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * ftrace: Only update the function code on write to filter files - LP: #802383 * kmemleak: Do not return a pointer to an object that kmemleak did not get - LP: #802383 * CPU hotplug, re-create sysfs directory and symlinks - LP: #802383 * Fix memory leak in cpufreq_stat - LP: #802383 * powerpc/kexec: Fix memory corruption from unallocated slaves - LP: #802383 * powerpc/oprofile: Handle events that raise an exception without overflowing - LP: #802383 * mtd: mtdconcat: fix NAND OOB write - LP: #802383 * x86, 64-bit: Fix copy_[to/from]_user() checks for the userspace address limit - LP: #802383 * ext3: Fix fs corruption when make_indexed_dir() fails - LP: #802383 * jbd: Fix forever sleeping process in do_get_write_access() - LP: #802383 * jbd: fix fsync() tid wraparound bug - LP: #802383 * ext4: release page cache in ext4_mb_load_buddy error path - LP: #802383 * Fix Ultrastor asm snippet - LP: #802383 * x86, amd: Do not enable ARAT feature on AMD processors below family 0x12 - LP: #802383 * x86, amd: Use _safe() msr access for GartTlbWlk disable code - LP: #802383 * rcu: Fix unpaired rcu_irq_enter() from locking selftests - LP: #802383 * staging: usbip: fix wrong endian conversion - LP: #802383 * Fix for buffer overflow in ldm_frag_add not sufficient - LP: #802383 * seqlock: Don't smp_rmb in seqlock reader spin loop - LP: #802383 * ALSA: HDA: Use one dmic only for Dell Studio 1558 - LP: #731706, #802383 * ASoC: Ensure output PGA is enabled for line outputs in wm_hubs - LP: #802383 * ASoC: Add some missing volume update bit sets for wm_hubs devices - LP: #802383 * mm/page_alloc.c: prevent unending loop in __alloc_pages_slowpath() - LP: #802383 * loop: limit 'max_part' module param to DISK_MAX_PARTS - LP: #802383 * loop: handle on-demand devices correctly - LP: #802383 * USB: CP210x Add 4 Device IDs for AC-Services Devices - LP: #802383 * USB: moto_modem: Add USB identifier for the Motorola VE240. - LP: #802383 * USB: serial: ftdi_sio: adding support for TavIR STK500 - LP: #802383 * USB: gamin_gps: Fix for data transfer problems in native mode - LP: #802383 * usb/gadget: at91sam9g20 fix end point max packet size - LP: #802383 * usb: gadget: rndis: don't test against req-length - LP: #802383 * OHCI: fix regression caused by nVidia shutdown workaround - LP: #802383 * p54usb: add zoom 4410 usbid - LP: #802383 * eCryptfs: Allow 2 scatterlist entries for encrypted filenames - LP: #802383 * UBIFS: fix a rare memory leak in ro to rw remounting path - LP: #802383 * i8k: Avoid lahf in 64-bit code - LP: #802383 * cpuidle: menu: fixed wrapping timers at 4.294 seconds - LP: #802383 * dm table: reject devices without request fns - LP: #802383 * atm: expose ATM device index in sysfs - LP: #802383 * brd: limit 'max_part' module param to DISK_MAX_PARTS - LP: #802383 * brd: handle on-demand devices correctly - LP: #802383 * SUNRPC: Deal with the lack of a SYN_SENT sk-sk_state_change callback... - LP: #802383 * PCI: Add quirk for setting valid class for TI816X Endpoint - LP: #802383 * xen mmu: fix a race window causing leave_mm BUG() - LP: #802383 * netfilter: nf_conntrack_reasm: properly handle packets fragmented into a single fragment - LP: #802383 * fix memory leak in scsi_report_lun_scan - LP: #802383 * fix refcounting bug in
[Bug 806390] Re: CVE-2011-2484
This bug was fixed in the package linux-mvl-dove - 2.6.32-218.36 --- linux-mvl-dove (2.6.32-218.36) lucid-proposed; urgency=low * Release tracking bug - LP: #837803 [ Paolo Pisati ] * Rebased to 2.6.32-34.76 [ Ubuntu: 2.6.32-34.76 ] * Release Tracking Bug - LP: #836914 * Revert drm/nv50-nvc0: work around an evo channel hang that some people see * Revert eCryptfs: Handle failed metadata read in lookup * Revert tunnels: fix netns vs proto registration ordering [ Ubuntu: 2.6.32-34.75 ] * Release Tracking Bug - LP: #832332 * drm/i915: Remove BUG_ON from i915_gem_evict_something - LP: #828550 linux-mvl-dove (2.6.32-218.35) lucid-proposed; urgency=low [ Paolo Pisati ] * Release Tracking Bug - LP: #829161 * Rebased to 2.6.32-34.74 [ Ubuntu: 2.6.32-34.74 ] * Release Tracking Bug - LP: #828375 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 [ Ubuntu: 2.6.32-34.73 ] * Release Tracking Bug - LP: #824148 * SAUCE: rtl8192se: Force a build for a 2.6/3.0 kernel - LP: #805494 * [Config] Add enic/fnic to udebs - LP: #801610 * tty: icount changeover for other main devices, CVE-2010-4076, CVE-2010-4077 - LP: #720189 - CVE-2010-4077 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * ftrace: Only update the function code on write to filter files - LP: #802383 * kmemleak: Do not return a pointer to an object that kmemleak did not get - LP: #802383 * CPU hotplug, re-create sysfs directory and symlinks - LP: #802383 * Fix memory leak in cpufreq_stat - LP: #802383 * powerpc/kexec: Fix memory corruption from unallocated slaves - LP: #802383 * powerpc/oprofile: Handle events that raise an exception without overflowing - LP: #802383 * mtd: mtdconcat: fix NAND OOB write - LP: #802383 * x86, 64-bit: Fix copy_[to/from]_user() checks for the userspace address limit - LP: #802383 * ext3: Fix fs corruption when make_indexed_dir() fails - LP: #802383 * jbd: Fix forever sleeping process in do_get_write_access() - LP: #802383 * jbd: fix fsync() tid wraparound bug - LP: #802383 * ext4: release page cache in ext4_mb_load_buddy error path - LP: #802383 * Fix Ultrastor asm snippet - LP: #802383 * x86, amd: Do not enable ARAT feature on AMD processors below family 0x12 - LP: #802383 * x86, amd: Use _safe() msr access for GartTlbWlk disable code - LP: #802383 * rcu: Fix unpaired rcu_irq_enter() from locking selftests - LP: #802383 * staging: usbip: fix wrong endian conversion - LP: #802383 * Fix for buffer overflow in ldm_frag_add not sufficient - LP: #802383 * seqlock: Don't smp_rmb in seqlock reader spin loop - LP: #802383 * ALSA: HDA: Use one dmic only for Dell Studio 1558 - LP: #731706, #802383 * ASoC: Ensure output PGA is enabled for line outputs in wm_hubs - LP: #802383 * ASoC: Add some missing volume update bit sets for wm_hubs devices - LP: #802383 * mm/page_alloc.c: prevent unending loop in __alloc_pages_slowpath() - LP: #802383 * loop: limit 'max_part' module param to DISK_MAX_PARTS - LP: #802383 * loop: handle on-demand devices correctly - LP: #802383 * USB: CP210x Add 4 Device IDs for AC-Services Devices - LP: #802383 * USB: moto_modem: Add USB identifier for the Motorola VE240. - LP: #802383 * USB: serial: ftdi_sio: adding support for TavIR STK500 - LP: #802383 * USB: gamin_gps: Fix for data transfer problems in native mode - LP: #802383 * usb/gadget: at91sam9g20 fix end point max packet size - LP: #802383 * usb: gadget: rndis: don't test against req-length - LP: #802383 * OHCI: fix regression caused by nVidia shutdown workaround - LP: #802383 * p54usb: add zoom 4410 usbid - LP: #802383 * eCryptfs: Allow 2 scatterlist entries for encrypted filenames - LP: #802383 * UBIFS: fix a rare memory leak in ro to rw remounting path - LP: #802383 * i8k: Avoid lahf in 64-bit code - LP: #802383 * cpuidle: menu: fixed wrapping timers at 4.294 seconds - LP: #802383 * dm table: reject devices without request fns - LP: #802383 * atm: expose ATM device index in sysfs - LP: #802383 * brd: limit 'max_part' module param to DISK_MAX_PARTS - LP: #802383 * brd: handle on-demand devices correctly - LP: #802383 * SUNRPC: Deal with the lack of a SYN_SENT sk-sk_state_change callback... - LP: #802383 * PCI: Add quirk for setting valid class for TI816X Endpoint - LP: #802383 * xen mmu: fix a race window causing leave_mm BUG() - LP: #802383 * netfilter: nf_conntrack_reasm: properly handle packets fragmented into a single fragment - LP: #802383 * fix memory leak in scsi_report_lun_scan - LP: #802383 * fix refcounting bug in
[Bug 770483] Re: CVE-2011-0463
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 770369] Re: CVE-2011-0695
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 767740] Re: CVE-2011-0711
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 765007] Re: CVE-2010-4565
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 745686] Re: CVE-2011-1016
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 732628] Re: TOCTOU in mount.ecryptfs_private
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 730116] Re: review-notifier crashed with TypeError in __init__(): __init__() takes at least 4 arguments (3 given)
** Changed in: lptools Status: New = Fix Released ** Changed in: lptools (Ubuntu) Status: Confirmed = Fix Released ** Changed in: lptools Assignee: (unassigned) = Jelmer Vernooij (jelmer) ** Changed in: lptools (Ubuntu) Assignee: (unassigned) = Jelmer Vernooij (jelmer) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/730116 Title: review-notifier crashed with TypeError in __init__(): __init__() takes at least 4 arguments (3 given) To manage notifications about this bug go to: https://bugs.launchpad.net/lptools/+bug/730116/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 721455] Re: CVE-2010-4175
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 721441] Re: CVE-2010-4162
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 720189] Re: CVE-2010-4076, CVE-2010-4077
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 712749] Re: CVE-2010-4083
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 712609] Re: CVE-2010-4248
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc/pid/maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in
[Bug 848872] [NEW] chromium-browser crashed with SIGSEGV in _XSend()
Public bug reported: hromium-browser crashed ProblemType: Crash DistroRelease: Ubuntu 11.10 Package: chromium-browser 15.0.871.0~svn20110904r99583-0ubuntu1~ucd1 ProcVersionSignature: Ubuntu 3.0.0-11.17-generic-pae 3.0.4 Uname: Linux 3.0.0-11-generic-pae i686 ApportVersion: 1.22.1-0ubuntu2 Architecture: i386 CrashCounter: 1 CrashDB: ubuntu Date: Tue Sep 13 13:15:33 2011 Desktop-Session: DESKTOP_SESSION = default XDG_CONFIG_DIRS = /etc/xdg/xdg-default:/etc/xdg XDG_DATA_DIRS = /usr/share/default:/usr/local/share/:/usr/share/ Env: MOZ_PLUGIN_PATH = None LD_LIBRARY_PATH = None ExecutablePath: /usr/lib/chromium-browser/chromium-browser InstallationMedia: Kubuntu 11.10 Oneiric Ocelot - Beta i386 (20110901) ProcCmdline: /usr/lib/chromium-browser/chromium-browser\ --type=gpu-process\ --channel=1773.0xbb404b00.38505649\ --disable-gl-multisampling ProcEnviron: SegvAnalysis: Segfault happened at: 0xb3d80f65 _XSend+37: mov0x0(%ebp),%esi PC (0xb3d80f65) ok source 0x0(%ebp) (0x) not located in a known VMA region (needed readable region)! destination %esi ok SegvReason: reading NULL VMA Signal: 11 SourcePackage: chromium-browser StacktraceTop: _XSend () from /usr/lib/i386-linux-gnu/libX11.so.6 _XFlush () from /usr/lib/i386-linux-gnu/libX11.so.6 XQueryExtension () from /usr/lib/i386-linux-gnu/libX11.so.6 XInitExtension () from /usr/lib/i386-linux-gnu/libX11.so.6 ?? () from /usr/lib/i386-linux-gnu/mesa/libGL.so.1 ThirdParty: True Title: chromium-browser crashed with SIGSEGV in _XSend() UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm admin cdrom dialout lpadmin plugdev sambashare chromium-default: CHROMIUM_FLAGS= ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New ** Tags: apport-crash i386 oneiric -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848872 Title: chromium-browser crashed with SIGSEGV in _XSend() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/848872/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 848872] Re: chromium-browser crashed with SIGSEGV in _XSend()
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848872 Title: chromium-browser crashed with SIGSEGV in _XSend() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/848872/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 848869] Re: Gtk-Warning on shell
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848869 Title: Gtk-Warning on shell To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pavucontrol/+bug/848869/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 848869] [NEW] Gtk-Warning on shell
Public bug reported: Running pavucontrol from the terminal exposes a number of warnings when the locale is de_DE.UTF-8: $ echo $LANG de_DE.UTF-8 $ pavucontrol (pavucontrol:20040): Gtk-WARNING **: Failed to set text from markup due to error parsing markup: Fehler in Zeile 1, Zeichen 25: »« ist kein gültiges Zeichen, wenn es auf die Zeichen »/« folgt; »« darf keinen Elementnamen beginnen (pavucontrol:20040): Gtk-WARNING **: Failed to set text from markup due to error parsing markup: Fehler in Zeile 1, Zeichen 25: »« ist kein gültiges Zeichen, wenn es auf die Zeichen »/« folgt; »« darf keinen Elementnamen beginnen ProblemType: Bug DistroRelease: Ubuntu 11.04 Package: pavucontrol 0.9.9-1 ProcVersionSignature: Ubuntu 2.6.38-11.48-generic 2.6.38.8 Uname: Linux 2.6.38-11-generic x86_64 NonfreeKernelModules: fglrx Architecture: amd64 CheckboxSubmission: 3bb4de8f28bd05a6f739b1bf834a35cd CheckboxSystem: 533a8038ef5a55601694b49142442fa7 Date: Tue Sep 13 13:14:00 2011 InstallationMedia: Ubuntu 11.04 Natty Narwhal - Release amd64 (20110427.1) ProcEnviron: LANGUAGE=de_DE:en PATH=(custom, user) LANG=de_DE.UTF-8 SHELL=/bin/bash SourcePackage: pavucontrol UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: pavucontrol (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug natty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848869 Title: Gtk-Warning on shell To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pavucontrol/+bug/848869/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 848866] Re: update-manager crashed with TypeError in confirmChanges(): glib.markup_escape_text() takes at most 1 argument (2 given)
*** This bug is a duplicate of bug 848873 *** https://bugs.launchpad.net/bugs/848873 Thank you for taking the time to report this crash and helping to make Ubuntu better. This particular crash has already been reported and is a duplicate of bug #848873, so is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Please continue to report any other bugs you may find. ** Tags removed: need-duplicate-check ** Attachment removed: Dependencies.txt https://bugs.launchpad.net/bugs/848866/+attachment/2396672/+files/Dependencies.txt ** Attachment removed: ProcMaps.txt https://bugs.launchpad.net/bugs/848866/+attachment/2396673/+files/ProcMaps.txt ** Attachment removed: ProcStatus.txt https://bugs.launchpad.net/bugs/848866/+attachment/2396674/+files/ProcStatus.txt ** This bug has been marked a duplicate of private bug 848873 ** Visibility changed to: Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/848866 Title: update-manager crashed with TypeError in confirmChanges(): glib.markup_escape_text() takes at most 1 argument (2 given) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/848866/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs