[Bug 827685] Re: CVE-2011-2699
This was already applied upstream. ** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
** Changed in: linux (Ubuntu Oneiric) Status: Fix Committed => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: Fix Committed => Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-ti-omap4 (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux - 2.6.32-35.78 --- linux (2.6.32-35.78) lucid-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #871899 [ Andrew Dickinson ] * SAUCE: sched: Prevent divide by zero when cpu_power is 0 - LP: #614853 [ Stefan Bader ] * [Config] Force perf to use libiberty for demangling - LP: #783660 [ Tim Gardner ] * [Config] Simplify binary-udebs dependencies - LP: #832352 * [Config] kernel preparation cannot be parallelized - LP: #832352 * [Config] Linearize module/abi checks - LP: #832352 * [Config] Linearize and simplify tree preparation rules - LP: #832352 * [Config] Build kernel image in parallel with modules - LP: #832352 * [Config] Set concurrency for kmake invocations - LP: #832352 * [Config] Improve install-arch-headers speed - LP: #832352 * [Config] Fix binary-perarch dependencies - LP: #832352 * [Config] Removed stamp-flavours target - LP: #832352 * [Config] Serialize binary indep targets - LP: #832352 * [Config] Use build stamp directly - LP: #832352 * [Config] Restore prepare-% target - LP: #832352 * [Config] Fix binary-% build target * [Config] Fix install-headers target - LP: #832352 * SAUCE: igb: Protect stats update - LP: #829566 * SAUCE: rtl8192se spams log - LP: #859702 [ Upstream Kernel Changes ] * Add mount option to check uid of device being mounted = expect uid, CVE-2011-1833 - LP: #732628 - CVE-2011-1833 * crypto: Move md5_transform to lib/md5.c - LP: #827462 * net: Compute protocol sequence numbers and fragment IDs using MD5. - LP: #827462 * ALSA: timer - Fix Oops at closing slave timer - LP: #827462 * ALSA: snd-usb-caiaq: Fix keymap for RigKontrol3 - LP: #827462 * powerpc: Fix device tree claim code - LP: #827462 * powerpc: pseries: Fix kexec on machines with more than 4TB of RAM - LP: #827462 * Linux 2.6.32.45+drm33.19 - LP: #827462 * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * tunnels: fix netns vs proto registration ordering - LP: #823296 * Fix broken backport for IPv6 tunnels in 2.6.32-longterm kernels. * USB: xhci: fix OS want to own HC - LP: #837669 * USB: assign instead of equal in usbtmc.c - LP: #837669 * USB: usb-storage: unusual_devs entry for ARM V2M motherboard. - LP: #837669 * USB: Serial: Added device ID for Qualcomm Modem in Sagemcom's HiLo3G - LP: #837669 * atm: br2864: sent packets truncated in VC routed mode - LP: #837669 * hwmon: (ibmaem) add missing kfree - LP: #837669 * ALSA: snd-usb-caiaq: Correct offset fields of outbound iso_frame_desc - LP: #837669 * mm: fix wrong vmap address calculations with odd NR_CPUS values - LP: #837669 * perf tools: do not look at ./config for configuration - LP: #837669 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #837669 * befs: Validate length of long symbolic links. - LP: #837669 * ALSA: snd_usb_caiaq: track submitted output urbs - LP: #837669 * ALSA: ac97: Add HP Compaq dc5100 SFF(PT003AW) to Headphone Jack Sense whitelist - LP: #826081, #837669 * futex: Fix regression with read only mappings - LP: #837669 * x86-32, vdso: On system call restart after SYSENTER, use int $0x80 - LP: #837669 * x86, UV: Remove UV delay in starting slave cpus - LP: #837669 * drm/ttm: fix ttm_bo_add_ttm(user) failure path - LP: #837669 * fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message - LP: #837669 * igb: Fix lack of flush after register write and before delay - LP: #837669 * Linux 2.6.32.46 - LP: #837669 * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191 - LP: #834135 - CVE-2011-3191 * Bluetooth: Prevent buffer overflow in l2cap config request, CVE-2011-2497 - LP: #838423 - CVE-2011-2497 * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576 - LP: #844361 - CVE-2011-1576 * ext4: Fix max file size and logical block counting of extent format file, CVE-2011-2695 - LP: #819574 - CVE-2011-2695 * drm/i915: prepare for fair lru eviction - LP: #843904 * drm/i915: Move the eviction logic to its own file. - LP: #843904 * drm/i915: Implement fair lru eviction across both rings. (v2) - LP: #843904 * drm/i915: Maintain LRU order of inactive objects upon access by CPU (v2) - LP: #843904 * drm/i915/evict: Ensure we completely cleanup on failure - LP: #843904 * drm/i915: Periodically flush the active lists and requests - LP: #843904 * Make TASKSTATS require root access, CVE-2011-2494 - LP: #866021 - CVE-2011-2494 * proc: fix a race in do_io_accounting(), CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * drm/i915: Remove BUG_ON from i915_gem_evict_som
[Bug 827685] Re: CVE-2011-2699
** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Oneiric) Importance: Undecided => Low ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Importance: Undecided => Low ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Precise) Importance: Undecided => Low ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Hardy) Importance: Undecided => Low ** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Maverick) Importance: Undecided => Low ** Changed in: linux-lts-backport-oneiric (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-lts-backport-oneiric (Ubuntu Natty) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux-mvl-dove - 2.6.32-219.37 --- linux-mvl-dove (2.6.32-219.37) lucid-proposed; urgency=low * Release Tracking Bug - LP: #873062 [ Paolo Pisati ] * Rebased to 2.6.32-35.78 [ Ubuntu: 2.6.32-35.78 ] * Release Tracking Bug - LP: #871899 * SAUCE: sched: Prevent divide by zero when cpu_power is 0 - LP: #614853 * [Config] Force perf to use libiberty for demangling - LP: #783660 * [Config] Simplify binary-udebs dependencies - LP: #832352 * [Config] kernel preparation cannot be parallelized - LP: #832352 * [Config] Linearize module/abi checks - LP: #832352 * [Config] Linearize and simplify tree preparation rules - LP: #832352 * [Config] Build kernel image in parallel with modules - LP: #832352 * [Config] Set concurrency for kmake invocations - LP: #832352 * [Config] Improve install-arch-headers speed - LP: #832352 * [Config] Fix binary-perarch dependencies - LP: #832352 * [Config] Removed stamp-flavours target - LP: #832352 * [Config] Serialize binary indep targets - LP: #832352 * [Config] Use build stamp directly - LP: #832352 * [Config] Restore prepare-% target - LP: #832352 * [Config] Fix binary-% build target * [Config] Fix install-headers target - LP: #832352 * SAUCE: igb: Protect stats update - LP: #829566 * SAUCE: rtl8192se spams log - LP: #859702 * Add mount option to check uid of device being mounted = expect uid, CVE-2011-1833 - LP: #732628 - CVE-2011-1833 * crypto: Move md5_transform to lib/md5.c - LP: #827462 * net: Compute protocol sequence numbers and fragment IDs using MD5. - LP: #827462 * ALSA: timer - Fix Oops at closing slave timer - LP: #827462 * ALSA: snd-usb-caiaq: Fix keymap for RigKontrol3 - LP: #827462 * powerpc: Fix device tree claim code - LP: #827462 * powerpc: pseries: Fix kexec on machines with more than 4TB of RAM - LP: #827462 * Linux 2.6.32.45+drm33.19 - LP: #827462 * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * tunnels: fix netns vs proto registration ordering - LP: #823296 * Fix broken backport for IPv6 tunnels in 2.6.32-longterm kernels. * USB: xhci: fix OS want to own HC - LP: #837669 * USB: assign instead of equal in usbtmc.c - LP: #837669 * USB: usb-storage: unusual_devs entry for ARM V2M motherboard. - LP: #837669 * USB: Serial: Added device ID for Qualcomm Modem in Sagemcom's HiLo3G - LP: #837669 * atm: br2864: sent packets truncated in VC routed mode - LP: #837669 * hwmon: (ibmaem) add missing kfree - LP: #837669 * ALSA: snd-usb-caiaq: Correct offset fields of outbound iso_frame_desc - LP: #837669 * mm: fix wrong vmap address calculations with odd NR_CPUS values - LP: #837669 * perf tools: do not look at ./config for configuration - LP: #837669 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #837669 * befs: Validate length of long symbolic links. - LP: #837669 * ALSA: snd_usb_caiaq: track submitted output urbs - LP: #837669 * ALSA: ac97: Add HP Compaq dc5100 SFF(PT003AW) to Headphone Jack Sense whitelist - LP: #826081, #837669 * futex: Fix regression with read only mappings - LP: #837669 * x86-32, vdso: On system call restart after SYSENTER, use int $0x80 - LP: #837669 * x86, UV: Remove UV delay in starting slave cpus - LP: #837669 * drm/ttm: fix ttm_bo_add_ttm(user) failure path - LP: #837669 * fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message - LP: #837669 * igb: Fix lack of flush after register write and before delay - LP: #837669 * Linux 2.6.32.46 - LP: #837669 * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191 - LP: #834135 - CVE-2011-3191 * Bluetooth: Prevent buffer overflow in l2cap config request, CVE-2011-2497 - LP: #838423 - CVE-2011-2497 * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576 - LP: #844361 - CVE-2011-1576 * ext4: Fix max file size and logical block counting of extent format file, CVE-2011-2695 - LP: #819574 - CVE-2011-2695 * drm/i915: prepare for fair lru eviction - LP: #843904 * drm/i915: Move the eviction logic to its own file. - LP: #843904 * drm/i915: Implement fair lru eviction across both rings. (v2) - LP: #843904 * drm/i915: Maintain LRU order of inactive objects upon access by CPU (v2) - LP: #843904 * drm/i915/evict: Ensure we completely cleanup on failure - LP: #843904 * drm/i915: Periodically flush the active lists and requests - LP: #843904 * Make TASKSTATS require root access, CVE-2011-2494 - LP: #866021 - CVE-2011-2494 * proc: fix a race in do_io_accounting(), CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * drm/i915: Remove BUG_ON from i
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux-ec2 - 2.6.32-319.39 --- linux-ec2 (2.6.32-319.39) lucid-proposed; urgency=low [ Stefan Bader ] * Rebased to 2.6.32-35.78 * Release Tracking Bug - LP: #873063 [ Ubuntu: 2.6.32-35.78 ] * [Config] Force perf to use libiberty for demangling - LP: #783660 * [Config] Simplify binary-udebs dependencies - LP: #832352 * [Config] kernel preparation cannot be parallelized - LP: #832352 * [Config] Linearize module/abi checks - LP: #832352 * [Config] Linearize and simplify tree preparation rules - LP: #832352 * [Config] Build kernel image in parallel with modules - LP: #832352 * [Config] Set concurrency for kmake invocations - LP: #832352 * [Config] Improve install-arch-headers speed - LP: #832352 * [Config] Fix binary-perarch dependencies - LP: #832352 * [Config] Removed stamp-flavours target - LP: #832352 * [Config] Serialize binary indep targets - LP: #832352 * [Config] Use build stamp directly - LP: #832352 * [Config] Restore prepare-% target - LP: #832352 * [Config] Fix binary-% build target * [Config] Fix install-headers target - LP: #832352 * SAUCE: igb: Protect stats update - LP: #829566 * SAUCE: rtl8192se spams log - LP: #859702 * Add mount option to check uid of device being mounted = expect uid, CVE-2011-1833 - LP: #732628 - CVE-2011-1833 * crypto: Move md5_transform to lib/md5.c - LP: #827462 * net: Compute protocol sequence numbers and fragment IDs using MD5. - LP: #827462 * ALSA: timer - Fix Oops at closing slave timer - LP: #827462 * ALSA: snd-usb-caiaq: Fix keymap for RigKontrol3 - LP: #827462 * powerpc: Fix device tree claim code - LP: #827462 * powerpc: pseries: Fix kexec on machines with more than 4TB of RAM - LP: #827462 * Linux 2.6.32.45+drm33.19 - LP: #827462 * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * tunnels: fix netns vs proto registration ordering - LP: #823296 * Fix broken backport for IPv6 tunnels in 2.6.32-longterm kernels. * USB: xhci: fix OS want to own HC - LP: #837669 * USB: assign instead of equal in usbtmc.c - LP: #837669 * USB: usb-storage: unusual_devs entry for ARM V2M motherboard. - LP: #837669 * USB: Serial: Added device ID for Qualcomm Modem in Sagemcom's HiLo3G - LP: #837669 * atm: br2864: sent packets truncated in VC routed mode - LP: #837669 * hwmon: (ibmaem) add missing kfree - LP: #837669 * ALSA: snd-usb-caiaq: Correct offset fields of outbound iso_frame_desc - LP: #837669 * mm: fix wrong vmap address calculations with odd NR_CPUS values - LP: #837669 * perf tools: do not look at ./config for configuration - LP: #837669 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #837669 * befs: Validate length of long symbolic links. - LP: #837669 * ALSA: snd_usb_caiaq: track submitted output urbs - LP: #837669 * ALSA: ac97: Add HP Compaq dc5100 SFF(PT003AW) to Headphone Jack Sense whitelist - LP: #826081, #837669 * futex: Fix regression with read only mappings - LP: #837669 * x86-32, vdso: On system call restart after SYSENTER, use int $0x80 - LP: #837669 * x86, UV: Remove UV delay in starting slave cpus - LP: #837669 * drm/ttm: fix ttm_bo_add_ttm(user) failure path - LP: #837669 * fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message - LP: #837669 * igb: Fix lack of flush after register write and before delay - LP: #837669 * Linux 2.6.32.46 - LP: #837669 * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191 - LP: #834135 - CVE-2011-3191 * Bluetooth: Prevent buffer overflow in l2cap config request, CVE-2011-2497 - LP: #838423 - CVE-2011-2497 * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576 - LP: #844361 - CVE-2011-1576 * ext4: Fix max file size and logical block counting of extent format file, CVE-2011-2695 - LP: #819574 - CVE-2011-2695 * drm/i915: prepare for fair lru eviction - LP: #843904 * drm/i915: Move the eviction logic to its own file. - LP: #843904 * drm/i915: Implement fair lru eviction across both rings. (v2) - LP: #843904 * drm/i915: Maintain LRU order of inactive objects upon access by CPU (v2) - LP: #843904 * drm/i915/evict: Ensure we completely cleanup on failure - LP: #843904 * drm/i915: Periodically flush the active lists and requests - LP: #843904 * Make TASKSTATS require root access, CVE-2011-2494 - LP: #866021 - CVE-2011-2494 * proc: fix a race in do_io_accounting(), CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * drm/i915: Remove BUG_ON from i915_gem_evict_something - LP: #828550 * drm/i915: Hold a reference to the object whilst unbinding the eviction list - L
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux-mvl-dove - 2.6.32-419.37 --- linux-mvl-dove (2.6.32-419.37) maverick-proposed; urgency=low * Release Tracking Bug - LP: #872659 [ Paolo Pisati ] * Rebased to 2.6.32-35.78 [ Ubuntu: 2.6.32-35.78 ] * Release Tracking Bug - LP: #871899 * SAUCE: sched: Prevent divide by zero when cpu_power is 0 - LP: #614853 * [Config] Force perf to use libiberty for demangling - LP: #783660 * [Config] Simplify binary-udebs dependencies - LP: #832352 * [Config] kernel preparation cannot be parallelized - LP: #832352 * [Config] Linearize module/abi checks - LP: #832352 * [Config] Linearize and simplify tree preparation rules - LP: #832352 * [Config] Build kernel image in parallel with modules - LP: #832352 * [Config] Set concurrency for kmake invocations - LP: #832352 * [Config] Improve install-arch-headers speed - LP: #832352 * [Config] Fix binary-perarch dependencies - LP: #832352 * [Config] Removed stamp-flavours target - LP: #832352 * [Config] Serialize binary indep targets - LP: #832352 * [Config] Use build stamp directly - LP: #832352 * [Config] Restore prepare-% target - LP: #832352 * [Config] Fix binary-% build target * [Config] Fix install-headers target - LP: #832352 * SAUCE: igb: Protect stats update - LP: #829566 * SAUCE: rtl8192se spams log - LP: #859702 * Add mount option to check uid of device being mounted = expect uid, CVE-2011-1833 - LP: #732628 - CVE-2011-1833 * crypto: Move md5_transform to lib/md5.c - LP: #827462 * net: Compute protocol sequence numbers and fragment IDs using MD5. - LP: #827462 * ALSA: timer - Fix Oops at closing slave timer - LP: #827462 * ALSA: snd-usb-caiaq: Fix keymap for RigKontrol3 - LP: #827462 * powerpc: Fix device tree claim code - LP: #827462 * powerpc: pseries: Fix kexec on machines with more than 4TB of RAM - LP: #827462 * Linux 2.6.32.45+drm33.19 - LP: #827462 * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * tunnels: fix netns vs proto registration ordering - LP: #823296 * Fix broken backport for IPv6 tunnels in 2.6.32-longterm kernels. * USB: xhci: fix OS want to own HC - LP: #837669 * USB: assign instead of equal in usbtmc.c - LP: #837669 * USB: usb-storage: unusual_devs entry for ARM V2M motherboard. - LP: #837669 * USB: Serial: Added device ID for Qualcomm Modem in Sagemcom's HiLo3G - LP: #837669 * atm: br2864: sent packets truncated in VC routed mode - LP: #837669 * hwmon: (ibmaem) add missing kfree - LP: #837669 * ALSA: snd-usb-caiaq: Correct offset fields of outbound iso_frame_desc - LP: #837669 * mm: fix wrong vmap address calculations with odd NR_CPUS values - LP: #837669 * perf tools: do not look at ./config for configuration - LP: #837669 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #837669 * befs: Validate length of long symbolic links. - LP: #837669 * ALSA: snd_usb_caiaq: track submitted output urbs - LP: #837669 * ALSA: ac97: Add HP Compaq dc5100 SFF(PT003AW) to Headphone Jack Sense whitelist - LP: #826081, #837669 * futex: Fix regression with read only mappings - LP: #837669 * x86-32, vdso: On system call restart after SYSENTER, use int $0x80 - LP: #837669 * x86, UV: Remove UV delay in starting slave cpus - LP: #837669 * drm/ttm: fix ttm_bo_add_ttm(user) failure path - LP: #837669 * fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message - LP: #837669 * igb: Fix lack of flush after register write and before delay - LP: #837669 * Linux 2.6.32.46 - LP: #837669 * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191 - LP: #834135 - CVE-2011-3191 * Bluetooth: Prevent buffer overflow in l2cap config request, CVE-2011-2497 - LP: #838423 - CVE-2011-2497 * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576 - LP: #844361 - CVE-2011-1576 * ext4: Fix max file size and logical block counting of extent format file, CVE-2011-2695 - LP: #819574 - CVE-2011-2695 * drm/i915: prepare for fair lru eviction - LP: #843904 * drm/i915: Move the eviction logic to its own file. - LP: #843904 * drm/i915: Implement fair lru eviction across both rings. (v2) - LP: #843904 * drm/i915: Maintain LRU order of inactive objects upon access by CPU (v2) - LP: #843904 * drm/i915/evict: Ensure we completely cleanup on failure - LP: #843904 * drm/i915: Periodically flush the active lists and requests - LP: #843904 * Make TASKSTATS require root access, CVE-2011-2494 - LP: #866021 - CVE-2011-2494 * proc: fix a race in do_io_accounting(), CVE-2011-2495 - LP: #866025 - CVE-2011-2495 * drm/i915: Remove BUG_ON fro
[Bug 827685] Re: CVE-2011-2699
** Branch linked: lp:ubuntu/lucid-proposed/linux-mvl-dove ** Branch linked: lp:ubuntu/maverick-proposed/linux-mvl-dove -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
** Also affects: linux (Ubuntu Precise) Importance: Low Assignee: Andy Whitcroft (apw) Status: Fix Committed ** Also affects: linux-ec2 (Ubuntu Precise) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Precise) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Precise) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Precise) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Precise) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Low Assignee: Andy Whitcroft (apw) Status: Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux - 2.6.35-30.60 --- linux (2.6.35-30.60) maverick-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #854092 [ Stefan Bader ] * [Config] Force perf to use libiberty for demangling - LP: #783660 [ Tim Gardner ] * [Config] Simplify binary-udebs dependencies * [Config] kernel preparation cannot be parallelized * [Config] Linearize module/abi checks * [Config] Linearize and simplify tree preparation rules * [Config] Build kernel image in parallel with modules * [Config] Set concurrency for kmake invocations * [Config] Improve install-arch-headers speed * [Config] Fix binary-perarch dependencies * [Config] Removed stamp-flavours target * [Config] Serialize binary indep targets * [Config] Use build stamp directly * [Config] Restore prepare-% target * [Config] Fix binary-% build target [ Upstream Kernel Changes ] * Add mount option to check uid of device being mounted = expect uid, CVE-2011-1833 - LP: #732628 - CVE-2011-1833 * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191 - LP: #834135 - CVE-2011-3191 * befs: Validate length of long symbolic links, CVE-2011-2928 - LP: #834124 - CVE-2011-2928 * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723 - LP: #844371 - CVE-2011-2723 * Validate size of EFI GUID partition entries, CVE-2011-1776 - LP: #844365 - CVE-2011-1776 * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213 - LP: #838421 - CVE-2011-2213 * si4713-i2c: avoid potential buffer overflow on si4713, CVE-2011-2700 - LP: #844370 - CVE-2011-2700 * Bluetooth: Prevent buffer overflow in l2cap config request, CVE-2011-2497 - LP: #838423 - CVE-2011-2497 * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576 - LP: #844361 - CVE-2011-1576 -- Herton Ronaldo KrzesinskiMon, 19 Sep 2011 15:10:43 -0300 ** Changed in: linux (Ubuntu Maverick) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux - 2.6.24-29.94 --- linux (2.6.24-29.94) hardy-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #853945 [Upstream Kernel Changes] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * splice: fix infinite loop in generic_file_splice_read() - LP: #790557 * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191 - LP: #834135 - CVE-2011-3191 * befs: ensure fast symlinks are NUL-terminated, CVE-2011-2928 - LP: #834124 - CVE-2011-2928 * befs: Validate length of long symbolic links, CVE-2011-2928 - LP: #834124 - CVE-2011-2928 * Validate size of EFI GUID partition entries, CVE-2011-1776 - LP: #844365 - CVE-2011-1776 * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213 - LP: #838421 - CVE-2011-2213 * Bluetooth: Prevent buffer overflow in l2cap config request, CVE-2011-2497 - LP: #838423 - CVE-2011-2497 -- Herton Ronaldo KrzesinskiMon, 19 Sep 2011 12:24:41 -0300 ** Changed in: linux (Ubuntu Hardy) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux-lts-backport-natty - 2.6.38-11.50~lucid1 --- linux-lts-backport-natty (2.6.38-11.50~lucid1) lucid-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #848588 [ Upstream Kernel Changes ] * Revert "eCryptfs: Handle failed metadata read in lookup" * Revert "KVM: fix kvmclock regression due to missing clock update" * Revert "ath9k: use split rx buffers to get rid of order-1 skb allocations" linux (2.6.38-11.49) natty-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #836903 [ Adam Jackson ] * SAUCE: drm/i915/pch: Fix integer math bugs in panel fitting - LP: #753994 [ Keng-Yu Lin ] * SAUCE: Input: ALPS - Enable Intellimouse mode for Lenovo Zhaoyang E47 - LP: #632884, #803005 [ Stefan Bader ] * [Config] Force perf to use libiberty for demangling - LP: #783660 [ Tim Gardner ] * [Config] Add enic/fnic to udebs - LP: #801610 [ Upstream Kernel Changes ] * eeepc-wmi: add keys found on EeePC 1215T - LP: #812644 * eCryptfs: Handle failed metadata read in lookup - LP: #509180 * pagemap: close races with suid execve, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * report errors in /proc/*/*map* sanely, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * close race in /proc/*/environ, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * auxv: require the target to be tracable (or yourself), CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * vmscan: fix a livelock in kswapd - LP: #813797 * mmc: Add PCI fixup quirks for Ricoh 1180:e823 reader - LP: #773524 * mmc: Added quirks for Ricoh 1180:e823 lower base clock frequency - LP: #773524 * rose: Add length checks to CALL_REQUEST parsing, CVE-2011-1493 - LP: #816550 - CVE-2011-1493 * pata_marvell: Add support for 88SE91A0, 88SE91A4 - LP: #777325 * GFS2: make sure fallocate bytes is a multiple of blksize, CVE-2011-2689 - LP: #819572 - CVE-2011-2689 * Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace. - LP: #819569 - CVE-2011-2492 * drm/nv50-nvc0: work around an evo channel hang that some people see - LP: #583760 * KVM: fix kvmclock regression due to missing clock update - LP: #795717 * Add mount option to check uid of device being mounted = expect uid, CVE-2011-1833 - LP: #732628 - CVE-2011-1833 * proc: fix oops on invalid /proc//maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * ath9k: use split rx buffers to get rid of order-1 skb allocations - LP: #728835 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 linux (2.6.38-11.48) natty-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #818175 [ Upstream Kernel Changes ] * Revert "HID: magicmouse: ignore 'ivalid report id' while switching modes" - LP: #814250 linux (2.6.38-11.47) natty-proposed; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #811180 [ Keng-Yu Lin ] * SAUCE: Revert: "dell-laptop: Toggle the unsupported hardware killswitch" - LP: #775281 [ Ming Lei ] * SAUCE: fix yama_ptracer_del lockdep warning - LP: #791019 [ Stefan Bader ] * SAUCE: Re-enable RODATA for i386 virtual - LP: #809838 [ Tim Gardner ] * [Config] Add grub-efi as a recommended bootloader for server and generic - LP: #800910 * SAUCE: rtl8192se: Force a build for a 2.6/3.0 kernel - LP: #805494 [ Upstream Kernel Changes ] * Revert "bridge: Forward reserved group addresses if !STP" - LP: #793702 * Fix up ABI directory * bonding: Incorrect TX queue offset, CVE-2011-1581 - LP: #792312 - CVE-2011-1581 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * usbnet/cdc_ncm: add missing .reset_resume hook - LP: #793892 * ath5k: Disable fast channel switching by default - LP: #767192 * mm: vmscan: correctly check if reclaimer should schedule during shrink_slab - LP: #755066 * mm: vmscan: correct use of pgdat_balanced in sleeping_prematurely - LP: #755066 * ALSA: hda - Use LPIB for ATI/AMD chipsets as default - LP: #741825 * ALSA: hda - Enable snoop bit for AMD controllers - LP: #741825 * ALSA: hda - Enable sync_write workaround for AMD generically - LP: #741825 * cpuidle: menu: fixed wrapping timers at 4.294 seconds - LP: #774947 * drm/i915: Fix gen6 (SNB) missed BLT ring interrupts. - LP: #761065 * USB: ehci: remove structure packing from ehci_def - LP: #791552 * drm/i915: disable PCH ports if needed when disabl
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux-lts-backport-maverick - 2.6.35-30.60~lucid1 --- linux-lts-backport-maverick (2.6.35-30.60~lucid1) lucid-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #854430 [ Stefan Bader ] * [Config] Force perf to use libiberty for demangling - LP: #783660 [ Tim Gardner ] * [Config] Simplify binary-udebs dependencies * [Config] kernel preparation cannot be parallelized * [Config] Linearize module/abi checks * [Config] Linearize and simplify tree preparation rules * [Config] Build kernel image in parallel with modules * [Config] Set concurrency for kmake invocations * [Config] Improve install-arch-headers speed * [Config] Fix binary-perarch dependencies * [Config] Removed stamp-flavours target * [Config] Serialize binary indep targets * [Config] Use build stamp directly * [Config] Restore prepare-% target * [Config] Fix binary-% build target [ Upstream Kernel Changes ] * Add mount option to check uid of device being mounted = expect uid, CVE-2011-1833 - LP: #732628 - CVE-2011-1833 * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * cifs: fix possible memory corruption in CIFSFindNext, CVE-2011-3191 - LP: #834135 - CVE-2011-3191 * befs: Validate length of long symbolic links, CVE-2011-2928 - LP: #834124 - CVE-2011-2928 * gro: Only reset frag0 when skb can be pulled, CVE-2011-2723 - LP: #844371 - CVE-2011-2723 * Validate size of EFI GUID partition entries, CVE-2011-1776 - LP: #844365 - CVE-2011-1776 * inet_diag: fix inet_diag_bc_audit(), CVE-2011-2213 - LP: #838421 - CVE-2011-2213 * si4713-i2c: avoid potential buffer overflow on si4713, CVE-2011-2700 - LP: #844370 - CVE-2011-2700 * Bluetooth: Prevent buffer overflow in l2cap config request, CVE-2011-2497 - LP: #838423 - CVE-2011-2497 * core: Fix memory leak/corruption on VLAN GRO_DROP, CVE-2011-1576 - LP: #844361 - CVE-2011-1576 linux (2.6.35-30.59) maverick-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #837449 [ Upstream Kernel Changes ] * Revert "drm/nv50-nvc0: work around an evo channel hang that some people see" * Revert "eCryptfs: Handle failed metadata read in lookup" -- Herton Ronaldo KrzesinskiTue, 20 Sep 2011 11:03:51 -0300 ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1576 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1776 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2213 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2497 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2700 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2723 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-2928 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-3191 ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-maverick -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux - 2.6.38-11.50 --- linux (2.6.38-11.50) natty-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #848246 [ Upstream Kernel Changes ] * Revert "eCryptfs: Handle failed metadata read in lookup" * Revert "KVM: fix kvmclock regression due to missing clock update" * Revert "ath9k: use split rx buffers to get rid of order-1 skb allocations" linux (2.6.38-11.49) natty-proposed; urgency=low [Herton R. Krzesinski] * Release Tracking Bug - LP: #836903 [ Adam Jackson ] * SAUCE: drm/i915/pch: Fix integer math bugs in panel fitting - LP: #753994 [ Keng-Yu Lin ] * SAUCE: Input: ALPS - Enable Intellimouse mode for Lenovo Zhaoyang E47 - LP: #632884, #803005 [ Stefan Bader ] * [Config] Force perf to use libiberty for demangling - LP: #783660 [ Tim Gardner ] * [Config] Add enic/fnic to udebs - LP: #801610 [ Upstream Kernel Changes ] * eeepc-wmi: add keys found on EeePC 1215T - LP: #812644 * eCryptfs: Handle failed metadata read in lookup - LP: #509180 * pagemap: close races with suid execve, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * report errors in /proc/*/*map* sanely, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * close race in /proc/*/environ, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * auxv: require the target to be tracable (or yourself), CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * vmscan: fix a livelock in kswapd - LP: #813797 * mmc: Add PCI fixup quirks for Ricoh 1180:e823 reader - LP: #773524 * mmc: Added quirks for Ricoh 1180:e823 lower base clock frequency - LP: #773524 * rose: Add length checks to CALL_REQUEST parsing, CVE-2011-1493 - LP: #816550 - CVE-2011-1493 * pata_marvell: Add support for 88SE91A0, 88SE91A4 - LP: #777325 * GFS2: make sure fallocate bytes is a multiple of blksize, CVE-2011-2689 - LP: #819572 - CVE-2011-2689 * Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace. - LP: #819569 - CVE-2011-2492 * drm/nv50-nvc0: work around an evo channel hang that some people see - LP: #583760 * KVM: fix kvmclock regression due to missing clock update - LP: #795717 * Add mount option to check uid of device being mounted = expect uid, CVE-2011-1833 - LP: #732628 - CVE-2011-1833 * proc: fix oops on invalid /proc//maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * ath9k: use split rx buffers to get rid of order-1 skb allocations - LP: #728835 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 -- Herton Ronaldo KrzesinskiMon, 12 Sep 2011 17:23:38 -0300 ** Changed in: linux (Ubuntu Natty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux-ti-omap4 - 2.6.38-1209.15 --- linux-ti-omap4 (2.6.38-1209.15) natty-proposed; urgency=low * Release tracking bug - LP: #837761 [ Paolo Pisati ] * [Config] Turn on CONFIG_USER_NS and DEVPTS_MULTIPLE_INSTANCES. - LP: #787749 [ Tim Gardner ] * [Config] Add enic/fnic to nic-modules udeb, CVE-2011-1020 - LP: #801610 [ Upstream Kernel Changes ] * mpt2sas: prevent heap overflows and unchecked reads - LP: #780546 * agp: fix arbitrary kernel memory writes - LP: #775809 * can: add missing socket check in can/raw release - LP: #780546 * agp: fix OOM and buffer overflow - LP: #775809 * bonding: Incorrect TX queue offset, CVE-2011-1581 - LP: #792312 - CVE-2011-1581 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * can: Add missing socket check in can/bcm release. - LP: #796502 - CVE-2011-1598 * USB: ehci: remove structure packing from ehci_def - LP: #791552 * taskstats: don't allow duplicate entries in listener mode, CVE-2011-2484 - LP: #806390 - CVE-2011-2484 * ext4: init timer earlier to avoid a kernel panic in __save_error_info, CVE-2011-2493 - LP: #806929 - CVE-2011-2493 * dccp: handle invalid feature options length, CVE-2011-1770 - LP: #806375 - CVE-2011-1770 * pagemap: close races with suid execve, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * report errors in /proc/*/*map* sanely, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * close race in /proc/*/environ, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * auxv: require the target to be tracable (or yourself), CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * rose: Add length checks to CALL_REQUEST parsing, CVE-2011-1493 - LP: #816550 - CVE-2011-1493 * GFS2: make sure fallocate bytes is a multiple of blksize, CVE-2011-2689 - LP: #819572 - CVE-2011-2689 * Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace. - LP: #819569 - CVE-2011-2492 * Add mount option to check uid of device being mounted = expect uid, CVE-2011-1833 - LP: #732628 - CVE-2011-1833 * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc//maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.38-1209.13) natty; urgency=low [ Tim Gardner ] * Release Tracking Bug - LP: #772381 [ Brad Figg ] * Ubuntu-2.6.38-9.43 [ Bryan Wu ] * merge Ubuntu-2.6.38-9.43 * cherry-pick 6 patches from u2 of 'for-ubuntu' branch * [Config] Sync up configs for 2.6.38.4 [ Herton Ronaldo Krzesinski ] * SAUCE: Revert "x86, hibernate: Initialize mmu_cr4_features during boot" - LP: #764758 [ Leann Ogasawara ] * [Config] updateconfigs for 2.6.38.4 [ Paolo Pisati ] * [Config] s/USB_MUSB_TUSB6010/USB_MUSB_OMAP2PLUS/ on omap3 to get musb - LP: #759913 [ Serge E. Hallyn ] * SAUCE: kvm: fix push of wrong eip when doing softint - LP: #747090 [ Tim Gardner ] * [Config] Add cachefiles.ko to virtual flavour - LP: #770430 [ Upstream Kernel Changes ] * Revert "net/sunrpc: Use static const char arrays" - LP: #761134 * Revert "x86: Cleanup highmap after brk is concluded" - LP: #761134 * ALSA: hda - Fix SPDIF out regression on ALC889 - LP: #761134 * ALSA: Fix yet another race in disconnection - LP: #761134 * ALSA: vmalloc buffers should use normal mmap - LP: #761134 * perf: Better fit max unprivileged mlock pages for tools needs - LP: #761134 * myri10ge: fix rmmod crash - LP: #761134 * cciss: fix lost command issue - LP: #761134 * ath9k: Fix kernel panic in AR2427 - LP: #761134 * sound/oss/opl3: validate voice and channel indexes - LP: #761134 * mac80211: initialize sta->last_rx in sta_info_alloc - LP: #761134 * ses: show devices for enclosures with no page 7 - LP: #761134 * ses: Avoid kernel panic when lun 0 is not mapped - LP: #761134 * PCI/ACPI: Report ASPM support to BIOS if not disabled from command line - LP: #761134 * eCryptfs: Unlock page in write_begin error path - LP: #761134 * eCryptfs: ecryptfs_keyring_auth_tok_for_sig() bug fix - LP: #761134 * crypto: aesni-intel - fixed problem with packets that are not multiple of 64bytes - LP: #761134 * staging: usbip: bugfixes related to kthread conversion - LP: #761134 * staging: usbip: bugfix add number of packets for isochronous frames - LP: #761134 * staging: usbip: bugfix for isochronous packets and optimization - LP: #761134 * staging: hv: use syn
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc//maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in can/bcm
[Bug 827685] Re: CVE-2011-2699
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-610.28 --- linux-fsl-imx51 (2.6.31-610.28) lucid-proposed; urgency=low * Release tracking bug - LP: #837802 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc//maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-fsl-imx51 (2.6.31-610.27) lucid-proposed; urgency=low * Release tracking bug - LP: #829160 [ Upstream Kernel Changes ] * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in can/bcm release. - LP: #796502 - CVE-2011-1598 * proc: protect mm start_code/end_code in /proc/pid/stat - LP: #799906 - CVE-2011-0726 * sctp: Fix a race between ICMP protocol unreachable and connect() * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077 - LP: #794034 - CVE-2010-4077 * filter: make sure filters dont read uninitialized memory CVE-2010-4158 - LP: #721282 - CVE-2010-4158 * bio: take care not overflow page count when mapping/copying user data CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * block: check for proper length of iov entries in blk_rq_map_user_iov() - LP: #721504 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * bluetooth: Fix missing NULL check CVE-2010-4242 - LP: #714846 - CVE-2010-4242 * IB/uverbs: Handle large number of entries in poll CQ CVE-2010-4649 - LP: #800121 - CVE-2010-4649 * epoll: prevent creating circular epoll structures CVE-2011-1082 - LP: #800758 - CVE-2011-1082 * nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab (v3) CVE-2011-1090 - LP: #800775 * ldm: corrupted partition table can cause kernel oops CVE-2011-1012 - LP: #801083 - CVE-2011-1012 * netfilter: ipt_CLUSTERIP: fix buffer overflow CVE-2011-2534 - LP: #801473 - CVE-2011-2534 * netfilter: arp_tables: fix infoleak to userspace CVE-2011-1170 - LP: #801480 - CVE-2011-1170 * netfilter: ip_tables: fix infoleak to userspace CVE-2011-1171 - LP: #801482 - CVE-2011-1171 * ipv6: netfilter: ip6_tables: fix infoleak to userspace CVE-2011-1172 - LP: #801483 - CVE-2011-1172 * econet: 4 byte infoleak to the network CVE-2011-1173 - LP: #801484 - CVE-2011-1173 * net: Limit socket I/O iovec total length to INT_MAX. - LP: #708839 * fs/partitions: Validate map_count in Mac partition tables - CVE-2011-1010 - LP: #804225 - CVE-2011-1010 * drm: fix unsigned vs signed comparison issue in modeset ctl ioctl, CVE-2011-1013 - LP: #804229 - CVE-2011-1013 * exec: copy-and-paste the fixes into compat_do_execve() paths - CVE-2010-4243 - LP: #804234 - CVE-2010-4243 * taskstats: don't allow duplicate entries in listener mode, CVE-2011-2484 - LP: #806390 - CVE-2011-2484 * dccp: handle invalid feature options length, CVE-2011-1770 - LP: #806375 - CVE-2011-1770 * pagemap: close races with suid execve, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * report errors in /proc/*/*map* sanely, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * close race in /proc/*/environ, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * auxv: require the target to be tracable (or yourself), CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * dccp: fix oops on Reset after close, CVE-2011-1093 - LP: #814087 - CVE-2011-1093 * net: add limit for socket backlog CVE-2010-4251 - LP: #807462 * tcp: use limited socket backlog CVE-2010-4251 - LP: #807462 * ipv6: udp: Optimise multicast reception - LP: #807462 * ipv4: udp: Optimise multicast reception - LP: #807462 * udp: multicast RX should increment SNMP/sk_drops counter in allocation failures CVE-2010-4251 - LP: #807462 * udp: use limited socket backlog CVE-2010-4251 - LP: #807462 * llc: use limited socket backlog CVE-2010-4251 - LP: #807462 * sctp: use limited socket backlog CVE-2010-4251 - LP: #807462 * tipc: use limited socket backlog CVE-2010-4251 - LP: #807462 * x25: use limited socket backlog CVE-2010-4251 - LP: #807462 * net: backlog functions rename CVE-2010-4251 - LP: #807462 * net: sk_add_backlog() take rmem_alloc into account CVE-2010-4805 - L
[Bug 827685] Re: CVE-2011-2699
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
** Branch linked: lp:ubuntu/lucid-proposed/linux-lts-backport-natty ** Branch linked: lp:ubuntu/natty-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
** Changed in: linux-ec2 (Ubuntu Lucid) Status: In Progress => Fix Committed ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: In Progress => Fix Committed ** Changed in: linux-mvl-dove (Ubuntu Lucid) Status: In Progress => Fix Committed ** Changed in: linux-mvl-dove (Ubuntu Maverick) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Oneiric) Status: In Progress => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
** Changed in: linux (Ubuntu Lucid) Status: In Progress => Fix Committed ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Hardy) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
** Changed in: linux (Ubuntu Natty) Status: In Progress => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Maverick) Status: In Progress => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
** Changed in: linux (Ubuntu Hardy) Status: New => In Progress ** Changed in: linux (Ubuntu Hardy) Assignee: (unassigned) => Andy Whitcroft (apw) ** Changed in: linux (Ubuntu Lucid) Status: New => In Progress ** Changed in: linux (Ubuntu Lucid) Assignee: (unassigned) => Andy Whitcroft (apw) ** Changed in: linux (Ubuntu Maverick) Status: New => In Progress ** Changed in: linux (Ubuntu Maverick) Assignee: (unassigned) => Andy Whitcroft (apw) ** Changed in: linux (Ubuntu Natty) Status: New => In Progress ** Changed in: linux (Ubuntu Natty) Assignee: (unassigned) => Andy Whitcroft (apw) ** Changed in: linux (Ubuntu Oneiric) Status: New => In Progress ** Changed in: linux (Ubuntu Oneiric) Assignee: (unassigned) => Andy Whitcroft (apw) ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New => In Progress ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: New => In Progress ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Assignee: (unassigned) => Andy Whitcroft (apw) ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New => In Progress ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New => In Progress ** Changed in: linux-mvl-dove (Ubuntu Lucid) Status: New => In Progress ** Changed in: linux-mvl-dove (Ubuntu Maverick) Status: New => In Progress ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: New => In Progress ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Assignee: (unassigned) => Andy Whitcroft (apw) ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: New => In Progress ** Changed in: linux-ti-omap4 (Ubuntu Natty) Assignee: (unassigned) => Andy Whitcroft (apw) ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: New => In Progress ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Assignee: (unassigned) => Andy Whitcroft (apw) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 827685] Re: CVE-2011-2699
** Changed in: linux-ec2 (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-lts-backport-natty (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-mvl-dove (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-lts-backport-maverick (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Oneiric) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Natty) Status: New => Invalid ** Description changed: - Placeholder + Fernando Gont discovered that the IPv6 stack used predictable fragment + identification numbers. A remote attacker could exploit this to exhaust + network resources, leading to a denial of service. + + Break-Fix: - 87c48fa3b4630905f98268dde838ee43626a060c ** Changed in: linux-ec2 (Ubuntu Lucid) Importance: Undecided => Low ** Changed in: linux-ec2 (Ubuntu Oneiric) Importance: Undecided => Low ** Changed in: linux-ec2 (Ubuntu Hardy) Importance: Undecided => Low ** Changed in: linux-ec2 (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Maverick) Importance: Undecided => Low ** Changed in: linux-ec2 (Ubuntu Natty) Importance: Undecided => Low ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided => Low ** Changed in: linux-lts-backport-natty (Ubuntu Oneiric) Importance: Undecided => Low ** Changed in: linux-lts-backport-natty (Ubuntu Hardy) Importance: Undecided => Low ** Changed in: linux-lts-backport-natty (Ubuntu Maverick) Importance: Undecided => Low ** Changed in: linux-lts-backport-natty (Ubuntu Natty) Importance: Undecided => Low ** Changed in: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided => Low ** Changed in: linux-mvl-dove (Ubuntu Oneiric) Importance: Undecided => Low ** Changed in: linux-mvl-dove (Ubuntu Hardy) Importance: Undecided => Low ** Changed in: linux-mvl-dove (Ubuntu Maverick) Importance: Undecided => Low ** Changed in: linux-mvl-dove (Ubuntu Natty) Importance: Undecided => Low ** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided => Low ** Changed in: linux-lts-backport-maverick (Ubuntu Oneiric) Importance: Undecided => Low ** Changed in: linux-lts-backport-maverick (Ubuntu Hardy) Importance: Undecided => Low ** Changed in: linux-lts-backport-maverick (Ubuntu Maverick) Importance: Undecided => Low ** Changed in: linux-lts-backport-maverick (Ubuntu Natty) Importance: Undecided => Low ** Changed in: linux (Ubuntu Lucid) Importance: Undecided => Low ** Changed in: linux (Ubuntu Oneiric) Importance: Undecided => Low ** Changed in: linux (Ubuntu Hardy) Importance: Undecided => Low ** Changed in: linux (Ubuntu Maverick) Importance: Undecided => Low ** Changed in: linux (Ubuntu Natty) Importance: Undecided => Low ** Changed in: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided => Low ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Importance: Undecided => Low ** Changed in: linux-ti-omap4 (Ubuntu Hardy) Importance: Undecided => Low ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Importance: Undecided => Low ** Changed in: linux-ti-omap4 (Ubuntu Natty) Importance: Undecided => Low ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided => Low ** Changed in: linux-fsl-imx51 (Ubuntu Oneiric) Importance: Undecided => Low ** Changed in: linux-fsl-imx51 (Ubuntu Hardy) Importance: Undecided => Low ** Changed in: linux-fsl-imx51 (Ubuntu Maverick) Importance: Undecided => Low ** Changed in: linux-fsl-imx51 (Ubuntu Natty) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifi
[Bug 827685] Re: CVE-2011-2699
CVE-2011-2699 ** Also affects: linux (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Oneiric) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Natty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Maverick) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Lucid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-fsl-imx51 (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-maverick (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-lts-backport-natty (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-mvl-dove (Ubuntu Hardy) Importance: Undecided Status: New ** Also affects: linux-ti-omap4 (Ubuntu Hardy) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/827685 Title: CVE-2011-2699 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/827685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs