[Bug 1185990] Re: CVE-2013-2850

2021-10-13 Thread Steve Langasek
The Precise Pangolin has reached end of life, so this bug will not be
fixed for that release

** Changed in: linux-lts-saucy (Ubuntu Precise)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1185990] Re: CVE-2013-2850

2016-04-24 Thread Rolf Leggewie
** Changed in: linux-lts-backport-maverick (Ubuntu Utopic)
   Status: New => Won't Fix

** Changed in: linux-lts-backport-natty (Ubuntu Utopic)
   Status: New => Won't Fix

** Changed in: linux-lts-backport-oneiric (Ubuntu Utopic)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2016-02-10 Thread Steve Beattie
** Changed in: linux-lts-xenial (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Precise)
   Importance: Undecided => High

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Wily)
   Importance: Undecided => High

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-xenial (Ubuntu Xenial)
   Importance: Undecided => High

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2015-12-04 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: High
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => High

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Fix Committed

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2015-12-03 Thread Steve Beattie
** No longer affects: linux-lts-trusty (Ubuntu Utopic)

** No longer affects: linux-armadaxp (Ubuntu Utopic)

** No longer affects: linux-ec2 (Ubuntu Utopic)

** No longer affects: linux-lts-wily (Ubuntu Utopic)

** No longer affects: linux-goldfish (Ubuntu Utopic)

** No longer affects: linux-lts-saucy (Ubuntu Utopic)

** No longer affects: linux-lts-quantal (Ubuntu Utopic)

** No longer affects: linux-raspi2 (Ubuntu Utopic)

** No longer affects: linux-mvl-dove (Ubuntu Utopic)

** No longer affects: linux-ti-omap4 (Ubuntu Utopic)

** No longer affects: linux-lts-vivid (Ubuntu Utopic)

** No longer affects: linux (Ubuntu Utopic)

** No longer affects: linux-mako (Ubuntu Utopic)

** No longer affects: linux-fsl-imx51 (Ubuntu Utopic)

** No longer affects: linux-lts-utopic (Ubuntu Utopic)

** No longer affects: linux-flo (Ubuntu Utopic)

** No longer affects: linux-lts-raring (Ubuntu Utopic)

** No longer affects: linux-manta (Ubuntu Utopic)

** Changed in: linux-lts-wily (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Precise)
   Importance: Undecided => High

** Changed in: linux-lts-wily (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Wily)
   Importance: Undecided => High

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Importance: Undecided => High

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Vivid)
   Importance: Undecided => High

** Changed in: linux-raspi2 (Ubuntu Precise)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Precise)
   Importance: Undecided => High

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
   Importance: Undecided => High

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Trusty)
   Importance: Undecided => High

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Vivid)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2015-05-08 Thread John Johansen
** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-quantal (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-raring (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-quantal (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-raring (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-oneiric (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-armadaxp (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-quantal (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-raring (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-trusty (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Wily)
   Importance: High
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Wily)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Wily)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Wily)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Wily)
   Importance: Undecided
   Status: New

** No longer affects: linux-lts-trusty (Ubuntu Lucid)

** No longer affects: linux-lts-trusty (Ubuntu Quantal)

** No longer affects: linux-lts-trusty (Ubuntu Raring)

** No longer affects: linux-lts-trusty (Ubuntu Saucy)

** No longer affects: linux-armadaxp (Ubuntu Lucid)

** No longer affects: linux-armadaxp (Ubuntu Quantal)

** No longer affects: linux-armadaxp (Ubuntu Raring)

** No longer affects: linux-armadaxp (Ubuntu Saucy)

** No longer 

[Bug 1185990] Re: CVE-2013-2850

2015-03-05 Thread Mathew Hodson
http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-2850.html
says that this was fixed in precise for linux-ti-omap4.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2015-03-05 Thread Mathew Hodson
** Changed in: linux (Ubuntu)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2015-03-05 Thread Mathew Hodson
** Changed in: linux-ti-omap4 (Ubuntu)
   Status: Fix Committed = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2014-12-04 Thread Rolf Leggewie
saucy has seen the end of its life and is no longer receiving any
updates. Marking the saucy task for this ticket as Won't Fix.

** Changed in: linux-ti-omap4 (Ubuntu Saucy)
   Status: Fix Committed = Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2014-06-26 Thread Tim Gardner
** Description changed:

  Heap-based buffer overflow in the iscsi_add_notunderstood_response
  function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI
  target subsystem in the Linux kernel through 3.9.4 allows remote
  attackers to cause a denial of service (memory corruption and OOPS) or
  possibly execute arbitrary code via a long key that is not properly
  handled during construction of an error-response packet. A reproduction
  case requires patching open-iscsi to send overly large keys. Performing
  discovery in a loop will Oops the remote server. Attached is a proposed
  fix, and the patch I used in open-iscsi to trigger it. Thanks in advance
  for your cooperation in coordinating a fix for this issue,
  
- Break-Fix: e48354ce078c079996f89d715dfa44814b4eba01 local-2013-2850
+ Break-Fix: e48354ce078c079996f89d715dfa44814b4eba01
+ cea4dcfdad926a27a18e188720efe0f2c9403456

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2014-06-26 Thread Jamie Strandboge
** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: Fix Committed = Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2014-04-17 Thread Jamie Strandboge
** Changed in: linux-ti-omap4 (Ubuntu Raring)
   Status: Fix Committed = Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2013-07-12 Thread Jamie Strandboge
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-backport-natty (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-backport-oneiric (Ubuntu Saucy)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2013-06-13 Thread John Johansen
** Description changed:

- The flaw is an unauthenticated remote heap buffer overflow in the Linux
- iSCSI target subsystem. If there is a target configured and listening on
- the network, a remote attacker can corrupt heap memory, and almost
- certainly gain kernel execution control. I only got as far as proving it
- would Oops the server. A reproduction case requires patching open-iscsi
- to send overly large keys. Performing discovery in a loop will Oops the
- remote server. Attached is a proposed fix, and the patch I used in open-
- iscsi to trigger it. Thanks in advance for your cooperation in
- coordinating a fix for this issue,
+ Heap-based buffer overflow in the iscsi_add_notunderstood_response
+ function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI
+ target subsystem in the Linux kernel through 3.9.4 allows remote
+ attackers to cause a denial of service (memory corruption and OOPS) or
+ possibly execute arbitrary code via a long key that is not properly
+ handled during construction of an error-response packet. A reproduction
+ case requires patching open-iscsi to send overly large keys. Performing
+ discovery in a loop will Oops the remote server. Attached is a proposed
+ fix, and the patch I used in open-iscsi to trigger it. Thanks in advance
+ for your cooperation in coordinating a fix for this issue,
  
  Break-Fix: e48354ce078c079996f89d715dfa44814b4eba01 local-2013-2850

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2013-06-05 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2013-06-03 Thread John Johansen
** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-armadaxp (Ubuntu Quantal)
   Status: New = Fix Released

** Changed in: linux-ec2 (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Saucy)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Quantal)
   Status: New = Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Raring)
   Status: New = Fix Committed

** Changed in: linux-lts-raring (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** Description changed:

  The flaw is an unauthenticated remote heap buffer overflow in the Linux
  iSCSI target subsystem. If there is a target configured and listening on
  the network, a remote attacker can corrupt heap memory, and almost
  certainly gain kernel execution control. I only got as far as proving it
  would Oops the server. A reproduction case requires patching open-iscsi
  to send overly large keys. Performing discovery in a loop will Oops the
  remote server. Attached is a proposed fix, and the patch I used in open-
  iscsi to trigger it. Thanks in advance for your cooperation in
  coordinating a fix for this issue,
+ 
+ Break-Fix: e48354ce078c079996f89d715dfa44814b4eba01 local-2013-2850

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2013-06-02 Thread Taowa
** Changed in: linux (Ubuntu Saucy)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2013-05-31 Thread John Johansen
** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed = Fix Released

** Changed in: linux (Ubuntu Quantal)
   Status: Fix Committed = Fix Released

** Changed in: linux (Ubuntu Raring)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1185990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1185990] Re: CVE-2013-2850

2013-05-30 Thread John Johansen
CVE-2013-2850

** Also affects: linux (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Saucy)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Raring)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Quantal)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-fsl-imx51 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-mvl-dove (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ec2 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-ti-omap4 (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-maverick (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-backport-natty (Ubuntu Lucid)
   Importance: Undecided
   Status: New

** Changed in: linux-armadaxp (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-armadaxp (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-ec2 (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux-lts-quantal (Ubuntu Lucid)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-quantal (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-mvl-dove (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Precise)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Saucy)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Quantal)
   Status: New = Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu Raring)
   Status: New = Invalid

** Changed in: linux (Ubuntu Precise)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu