[Bug 708839] Re: CVE-2010-3859

2015-02-11 Thread Mathew Hodson
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/708839/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-10-06 Thread Tim Gardner
** Changed in: linux (Ubuntu Dapper)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/708839/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-07-07 Thread Andy Whitcroft
** Tags added: kernel-cve-tracking-bug
** Tags removed: kernel-cve-tracker

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/708839/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-07-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-609.26

---
linux-fsl-imx51 (2.6.31-609.26) lucid; urgency=low

  [ Paolo Pisati ]

  * Tracking bug
- LP: #795219
  * [Config] Disable parport_pc on fsl-imx51
- LP: #601226

  [ Upstream Kernel Changes ]

  * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory
- LP: #712723, #712737
  * can-bcm: fix minor heap overflow
- LP: #710680
  * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory
- LP: #712744
  * gdth: integer overflow in ioctl
- LP: #711797
  * inet_diag: Make sure we actually run the same bytecode we audited, 
CVE-2010-3880
- LP: #711865
- CVE-2010-3880
  * net: fix rds_iovec page count overflow, CVE-2010-3865
- LP: #709153
- CVE-2010-3865
  * net: packet: fix information leak to userland, CVE-2010-3876
- LP: #711045
- CVE-2010-3876
  * net: tipc: fix information leak to userland, CVE-2010-3877
- LP: #711291
- CVE-2010-3877
  * net: Truncate recvfrom and sendto length to INT_MAX.
- LP: #708839
  * posix-cpu-timers: workaround to suppress the problems with mt exec
- LP: #712609
  * sys_semctl: fix kernel stack leakage
- LP: #712749
  * x25: Patch to fix bug 15678 - x25 accesses fields beyond end of packet.
- LP: #709372
  * memory corruption in X.25 facilities parsing
- LP: #709372
  * net: ax25: fix information leak to userland, CVE-2010-3875
- LP: #710714
- CVE-2010-3875
  * net: ax25: fix information leak to userland harder, CVE-2010-3875
- LP: #710714
- CVE-2010-3875
  * fs/partitions/ldm.c: fix oops caused by corrupted partition table, 
CVE-2011-1017
- LP: #771382
- CVE-2011-1017
  * net: clear heap allocations for privileged ethtool actions
- LP: #771445
  * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code
- LP: #772543
  * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo
- LP: #772543
  * exec: make argv/envp memory visible to oom-killer
- LP: #768408
  * next_pidmap: fix overflow condition
- LP: #784727
  * proc: do proper range check on readdir offset
- LP: #784727
  * mpt2sas: prevent heap overflows and unchecked reads
- LP: #787145
  * agp: fix arbitrary kernel memory writes
- LP: #788684
  * can: add missing socket check in can/raw release
- LP: #788694
  * agp: fix OOM and buffer overflow
- LP: #788700
  * do_exit(): make sure that we run with get_fs() == USER_DS - CVE-2010-4258
- LP: #723945
- CVE-2010-4258
  * x25: Prevent crashing when parsing bad X.25 facilities - CVE-2010-4164
- LP: #731199
- CVE-2010-4164
  * install_special_mapping skips security_file_mmap check - CVE-2010-4346
- LP: #731971
- CVE-2010-4346
  * econet: Fix crash in aun_incoming() - CVE-2010-4342
- LP: #736394
- CVE-2010-4342
  * sound: Prevent buffer overflow in OSS load_mixer_volumes - CVE-2010-4527
- LP: #737073
- CVE-2010-4527
  * irda: prevent integer underflow in IRLMP_ENUMDEVICES, CVE-2010-4529
- LP: #737823
- CVE-2010-4529
  * CAN: Use inode instead of kernel address for /proc file - CVE-2010-4565
- LP: #765007
- CVE-2010-4565
  * av7110: check for negative array offset - CVE-2011-0521
- LP: #767526
- CVE-2011-0521
  * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1 - 
CVE-2011-0711
- LP: #767740
- CVE-2011-0711
  * xfs: zero proper structure size for geometry calls - CVE-2011-0711
- LP: #767740
- CVE-2011-0711
  * ALSA: caiaq - Fix possible string-buffer overflow - CVE-2011-0712
- LP: #768448
- CVE-2011-0712
  * RDMA/cma: Fix crash in request handlers - CVE-2011-0695
- LP: #770369
- CVE-2011-0695
  * IB/cm: Bump reference count on cm_id before invoking callback - 
CVE-2011-0695
- LP: #770369
- CVE-2011-0695
  * Treat writes as new when holes span across page boundaries - CVE-2011-0463
- LP: #770483
- CVE-2011-0463
  * usb: iowarrior: don't trust report_size for buffer size - CVE-2010-4656
- LP: #771484
- CVE-2010-4656
  * tty: icount changeover for other main devices, CVE-2010-4076, CVE-2010-4077
- LP: #720189
- CVE-2010-4077
 -- Paolo Pisati paolo.pis...@canonical.com   Fri, 27 May 2011 18:09:53 +0200

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4076

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4077

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4164

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4258

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4342

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4346

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4527

** CVE added: http://www.cve.mitre.org/cgi-

[Bug 708839] Re: CVE-2010-3859

2011-06-30 Thread Tim Gardner
tim.gard...@canonical.com

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/708839/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-05-26 Thread Paolo Pisati
karmic is EOL

** Also affects: linux-fsl-imx51 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-fsl-imx51 (Ubuntu)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Dapper)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Natty)
   Status: New = Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Karmic)
   Status: New = Won't Fix

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: New = In Progress

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
 Assignee: (unassigned) = Paolo Pisati (p-pisati)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-02-23 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/dapper-updates/linux-source-2.6.15

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-02-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.24-28.86

---
linux (2.6.24-28.86) hardy-proposed; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #716166

  [Tim Gardner]

  * xen unified block-device I/O interface back end can orphan devices,
CVE-2010-3699
- LP: #708019
- CVE-2010-3699

  [Upstream Kernel Changes]

  * Hardy SRU: thinkpad-acpi: lock down video output state access,
CVE-2010-3448
- LP: #706999
- CVE-2010-3448
  * net: Limit socket I/O iovec total length to INT_MAX., CVE-2010-3859
- LP: #711855, #708839
- CVE-2010-4160
  * net: Truncate recvfrom and sendto length to INT_MAX., CVE-2010-3859
- LP: #711855, #708839
- CVE-2010-4160
  * net: ax25: fix information leak to userland, CVE-2010-3875
- LP: #710714
- CVE-2010-3875
  * net: ax25: fix information leak to userland harder, CVE-2010-3875
- LP: #710714
- CVE-2010-3875
  * memory corruption in X.25 facilities parsing, CVE-2010-3873
- LP: #709372
- CVE-2010-3873
  * net: packet: fix information leak to userland, CVE-2010-3876
- LP: #710714
- CVE-2010-3876
  * net: tipc: fix information leak to userland, CVE-2010-3877
- LP: #711291
- CVE-2010-3877
  * KVM: VMX: fix vmx null pointer dereference on debug register access,
CVE-2010-0435
- LP: #712615
- CVE-2010-0435
  * gdth: integer overflow in ioctl, CVE-2010-4157
- LP: #711797
- CVE-2010-4157
  * posix-cpu-timers: workaround to suppress the problems with mt exec,
CVE-2010-4248
- LP: #712609
- CVE-2010-4248
  * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory,
CVE-2010-4080, CVE-2010-4081
- LP: #712723, #712737
- CVE-2010-4081
  * sys_semctl: fix kernel stack leakage, CVE-2010-4083
- LP: #712749
- CVE-2010-4083
  * inet_diag: Make sure we actually run the same bytecode we audited,
CVE-2010-3880
- LP: #711865
- CVE-2010-3880

linux (2.6.24-28.85) hardy-proposed; urgency=low

  [ Brad Figg ]

  * Tracking Bug
- LP: #708315

  [Upstream Kernel Changes]

  * ata_piix: IDE mode SATA patch for Intel ICH10 DeviceID's
- LP: #693401
  * USB: serial/mos*: prevent reading uninitialized stack memory,
CVE-2010-4074
- LP: #706149
- CVE-2010-4074
  * KVM: Fix fs/gs reload oops with invalid ldt
- LP: #707000
- CVE-2010-3698
  * drivers/video/sis/sis_main.c: prevent reading uninitialized stack
memory, CVE-2010-4078
- LP: #707579
- CVE-2010-4078
  * V4L/DVB: ivtvfb: prevent reading uninitialized stack memory,
CVE-2010-4079
- LP: #707649
- CVE-2010-4079

linux (2.6.24-28.84) hardy-proposed; urgency=low

  [ Steve Conklin ]

  * Tracking Bug
- LP: #698185

linux (2.6.24-28.83) hardy-proposed; urgency=low

  [ Steve Conklin ]
  * tracking bug moved from here to latest entry

linux (2.6.24-28.82) hardy-proposed; urgency=low

  [ Leann Ogasawara ]

  * Revert SAUCE: AF_ECONET saddr-cookie prevent NULL pointer
dereference
  * Revert SAUCE: AF_ECONET SIOCSIFADDR ioctl does not check privileges
  * Revert SAUCE: AF_ECONET prevent kernel stack overflow

  [Upstream Kernel Changes]

  * xfs: validate untrusted inode numbers during lookup
- CVE-2010-2943
  * xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED
- CVE-2010-2943
  * xfs: remove block number from inode lookup code
- CVE-2010-2943
  * xfs: fix untrusted inode number lookup
- CVE-2010-2943
  * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack
memory
- CVE-2010-3296
  * drivers/net/eql.c: prevent reading uninitialized stack memory
- CVE-2010-3297
  * setup_arg_pages: diagnose excessive argument size
- CVE-2010-3858
  * ipc: shm: fix information leak to userland
- CVE-2010-4072
  * econet: disallow NULL remote addr for sendmsg(), fixes CVE-2010-3849
- CVE-2010-3849
  * econet: fix CVE-2010-3850
- CVE-2010-3850
  * econet: fix CVE-2010-3848
- CVE-2010-3848
 -- Brad Figg brad.f...@canonical.com   Wed, 09 Feb 2011 15:14:25 -0800

** Changed in: linux (Ubuntu Hardy)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0435

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2943

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3296

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3297

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3448

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3698

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3699

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3848

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3849

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3850

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3858

** CVE added: 

[Bug 708839] Re: CVE-2010-3859

2011-02-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.31-22.73

---
linux (2.6.31-22.73) karmic-proposed; urgency=low

  [ Steve Conklin ]

  * Release Tracking Bug
- LP: #716648

  [ Upstream Kernel Changes ]

  * copied ABI directory
  * net: Limit socket I/O iovec total length to INT_MAX., CVE-2010-3859
- LP: #708839, #711855
- CVE-2010-4160
  * net: Truncate recvfrom and sendto length to INT_MAX., CVE-2010-3859
- LP: #708839, #711855
- CVE-2010-4160
  * net: fix rds_iovec page count overflow, CVE-2010-3865
- LP: #709153
- CVE-2010-3865
  * net: ax25: fix information leak to userland, CVE-2010-3875
- LP: #710714
- CVE-2010-3875
  * net: ax25: fix information leak to userland harder, CVE-2010-3875
- LP: #710714
- CVE-2010-3875
  * can-bcm: fix minor heap overflow
- LP: #710680
- CVE-2010-3874
  * memory corruption in X.25 facilities parsing, CVE-2010-3873
- LP: #709372
- CVE-2010-3873
  * net: packet: fix information leak to userland, CVE-2010-3876
- LP: #710714
- CVE-2010-3876
  * net: tipc: fix information leak to userland, CVE-2010-3877
- LP: #711291
- CVE-2010-3877
  * KVM: VMX: fix vmx null pointer dereference on debug register access,
CVE-2010-0435
- LP: #712615
- CVE-2010-0435
  * gdth: integer overflow in ioctl, CVE-2010-4157
- LP: #711797
- CVE-2010-4157
  * posix-cpu-timers: workaround to suppress the problems with mt exec,
CVE-2010-4248
- LP: #712609
- CVE-2010-4248
  * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory,
CVE-2010-4080, CVE-2010-4081
- LP: #712723, #712737
- CVE-2010-4081
  * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory,
CVE-2010-4082
- LP: #712744
- CVE-2010-4082
  * sys_semctl: fix kernel stack leakage, CVE-2010-4083
- LP: #712749
- CVE-2010-4083
  * inet_diag: Make sure we actually run the same bytecode we audited,
CVE-2010-3880
- LP: #711865
- CVE-2010-3880

linux (2.6.31-22.72) karmic-proposed; urgency=low

  [ Brad Figg ]

  * Tracking Bug
- LP: #708860

  [ Upstream Kernel Changes ]

  * Karmic SRU: thinkpad-acpi: lock down video output state access, 
CVE-2010-3448
- LP: #706999
- CVE-2010-3448
  * USB: serial/mos*: prevent reading uninitialized stack memory,
CVE-2010-4074
- LP: #706149
- CVE-2010-4074
  * KVM: Fix fs/gs reload oops with invalid ldt
- LP: #707000
- CVE-2010-3698
  * drivers/video/sis/sis_main.c: prevent reading uninitialized stack
memory, CVE-2010-4078
- LP: #707579
- CVE-2010-4078
  * V4L/DVB: ivtvfb: prevent reading uninitialized stack memory,
CVE-2010-4079
- LP: #707649
- CVE-2010-4079

linux (2.6.31-22.71) karmic-proposed; urgency=low

  [ Brad Figg ]

  - LP: #698214

  [ Upstream Kernel Changes ]

  * ipc: initialize structure memory to zero for compat functions
  * tcp: Increase TCP_MAXSEG socket option minimum.
- CVE-2010-4165
  * perf_events: Fix perf_counter_mmap() hook in mprotect()
- CVE-2010-4169
  * af_unix: limit unix_tot_inflight
- CVE-2010-4249
 -- Steve Conklin sconk...@canonical.com   Thu, 10 Feb 2011 13:49:49 -0600

** Changed in: linux (Ubuntu Karmic)
   Status: Fix Committed = Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3865

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-3874

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4082

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4165

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4169

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-02-15 Thread Brad Figg
** Tags added: kernel-cve-tracker

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-02-15 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/dapper-proposed/linux-source-2.6.15

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-02-15 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/karmic-proposed/linux-ec2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-01-28 Thread Tim Gardner
** Changed in: linux (Ubuntu Dapper)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Dapper)
 Assignee: (unassigned) = Tim Gardner (timg-tpi)

** Changed in: linux (Ubuntu Hardy)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Hardy)
 Assignee: (unassigned) = Tim Gardner (timg-tpi)

** Changed in: linux (Ubuntu Karmic)
   Status: New = Fix Committed

** Changed in: linux (Ubuntu Karmic)
 Assignee: (unassigned) = Tim Gardner (timg-tpi)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-01-27 Thread Tim Gardner
The 2 upstream patches for this vulnerability have been published in 2.6.35.9 
and 2.6.32.26
8acfe468b0384e834a303f08ebc4953d72fb690a
253eacc070b114c2ec1f81b067d2fed7305467b0

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-01-27 Thread Tim Gardner
Maverick released in 2.6.35-25.43

** Changed in: linux (Ubuntu Maverick)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 708839] Re: CVE-2010-3859

2011-01-27 Thread Tim Gardner
Lucid released in 2.6.32-27.49

** Changed in: linux (Ubuntu Lucid)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs