[Bug 721504] Re: CVE-2010-4163

2011-10-06 Thread Tim Gardner
** Changed in: linux (Ubuntu Dapper)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-09-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24

---
linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low

  * Release tracking bug
- LP: #838037

  [ Upstream Kernel Changes ]

  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * proc: fix oops on invalid /proc//maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020

linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low

  * Release tracking bug
- LP: #829655

  [ Upstream Kernel Changes ]

  * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016
- LP: #745686
- CVE-2011-1016
  * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016
- LP: #745686
- CVE-2011-1016
  * can-bcm: fix minor heap overflow
- LP: #690730
  * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565
- LP: #765007
- CVE-2010-4565
  * av7110: check for negative array offset
- LP: #747520
  * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1,
CVE-2011-0711
- LP: #767740
- CVE-2011-0711
  * ALSA: caiaq - Fix possible string-buffer overflow
- LP: #747520
  * IB/cm: Bump reference count on cm_id before invoking callback,
CVE-2011-0695
- LP: #770369
- CVE-2011-0695
  * RDMA/cma: Fix crash in request handlers, CVE-2011-0695
- LP: #770369
- CVE-2011-0695
  * Treat writes as new when holes span across page boundaries,
CVE-2011-0463
- LP: #770483
- CVE-2011-0463
  * net: clear heap allocations for privileged ethtool actions
- LP: #686158
  * usb: iowarrior: don't trust report_size for buffer size
- LP: #747520
  * fs/partitions/ldm.c: fix oops caused by corrupted partition table,
CVE-2011-1017
- LP: #771382
- CVE-2011-1017
  * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal
code
- LP: #747520
  * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo
- LP: #747520
  * exec: make argv/envp memory visible to oom-killer
- LP: #690730
  * next_pidmap: fix overflow condition
- LP: #772560
  * proc: do proper range check on readdir offset
- LP: #772560
  * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169
- LP: #785331
- CVE-2011-1169
  * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494
- LP: #787145
- CVE-2011-1494
  * agp: fix arbitrary kernel memory writes, CVE-1011-2022
- LP: #788684
- CVE-1011-2022
  * can: add missing socket check in can/raw release, CVE-2011-1748
- LP: #788694
- CVE-2011-1748
  * agp: fix OOM and buffer overflow
- LP: #788700
  * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack
memory - CVE-2010-3296
- CVE-2010-3296
  * drivers/net/eql.c: prevent reading uninitialized stack memory -
CVE-2010-3297
- CVE-2010-3297
  * inet_diag: Make sure we actually run the same bytecode we audited,
CVE-2010-3880
- LP: #711865
- CVE-2010-3880
  * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858
- LP: #672664
- CVE-2010-3858
  * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859
- LP: #690730
- CVE-2010-3859
  * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859
- LP: #690730
- CVE-2010-3859
  * ipc: initialize structure memory to zero for compat functions -
CVE-2010-4073
- LP: #690730
- CVE-2010-4073
  * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory -
CVE-2010-4080, CVE-2010-4081
- LP: #672664
- CVE-2010-4080, CVE-2010-4081
  * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory -
CVE-2010-4082
- CVE-2010-4082
  * sys_semctl: fix kernel stack leakage, CVE-2010-4083
- LP: #712749
- CVE-2010-4083
  * gdth: integer overflow in ioctl - CVE-2010-4157
- LP: #686158
- CVE-2010-4157
  * bio: take care not overflow page count when mapping/copying user data -
CVE-2010-4162
- LP: #721441
- CVE-2010-4162
  * bluetooth: Fix missing NULL check - CVE-2010-4242
- LP: #686158
  * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175
- LP: #721455
- CVE-2010-4175
  * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169
- LP: #690730
- CVE-2010-4169
  * block: check for proper length of iov entries in blk_rq_map_user_iov()
- CVE-2010-4163
- LP: #690730
- CVE-2010-4163
  * block: check for proper length of iov entries earlier in
blk_rq_map_user_iov(), CVE-2010-4163
- LP: #721504
- CVE-2010-4163
  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #795418
- CVE-2011-1577
  * Fix corrupted OSF partition table parsing
- LP: #796606
- CVE-2011-1163
  * can: Add missing socket check in can/bcm

[Bug 721504] Re: CVE-2010-4163

2011-09-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-610.28

---
linux-fsl-imx51 (2.6.31-610.28) lucid-proposed; urgency=low

  * Release tracking bug
- LP: #837802

  [ Upstream Kernel Changes ]

  * ipv6: make fragment identifications less predictable, CVE-2011-2699
- LP: #827685
- CVE-2011-2699
  * perf: Fix software event overflow, CVE-2011-2918
- LP: #834121
- CVE-2011-2918
  * proc: fix oops on invalid /proc//maps access, CVE-2011-1020
- LP: #813026
- CVE-2011-1020

linux-fsl-imx51 (2.6.31-610.27) lucid-proposed; urgency=low

  * Release tracking bug
- LP: #829160

  [ Upstream Kernel Changes ]

  * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel
oops
- LP: #795418
- CVE-2011-1577
  * Fix corrupted OSF partition table parsing
- LP: #796606
- CVE-2011-1163
  * can: Add missing socket check in can/bcm release.
- LP: #796502
- CVE-2011-1598
  * proc: protect mm start_code/end_code in /proc/pid/stat
- LP: #799906
- CVE-2011-0726
  * sctp: Fix a race between ICMP protocol unreachable and connect()
  * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077
- LP: #794034
- CVE-2010-4077
  * filter: make sure filters dont read uninitialized memory CVE-2010-4158
- LP: #721282
- CVE-2010-4158
  * bio: take care not overflow page count when mapping/copying user data
CVE-2010-4162
- LP: #721441
- CVE-2010-4162
  * block: check for proper length of iov entries in blk_rq_map_user_iov()
- LP: #721504
- CVE-2010-4163
  * block: check for proper length of iov entries earlier in
blk_rq_map_user_iov(), CVE-2010-4163
- LP: #721504
- CVE-2010-4163
  * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175
- LP: #721455
- CVE-2010-4175
  * bluetooth: Fix missing NULL check CVE-2010-4242
- LP: #714846
- CVE-2010-4242
  * IB/uverbs: Handle large number of entries in poll CQ CVE-2010-4649
- LP: #800121
- CVE-2010-4649
  * epoll: prevent creating circular epoll structures CVE-2011-1082
- LP: #800758
- CVE-2011-1082
  * nfs4: Ensure that ACL pages sent over NFS were not allocated from the
slab (v3) CVE-2011-1090
- LP: #800775
  * ldm: corrupted partition table can cause kernel oops CVE-2011-1012
- LP: #801083
- CVE-2011-1012
  * netfilter: ipt_CLUSTERIP: fix buffer overflow CVE-2011-2534
- LP: #801473
- CVE-2011-2534
  * netfilter: arp_tables: fix infoleak to userspace CVE-2011-1170
- LP: #801480
- CVE-2011-1170
  * netfilter: ip_tables: fix infoleak to userspace CVE-2011-1171
- LP: #801482
- CVE-2011-1171
  * ipv6: netfilter: ip6_tables: fix infoleak to userspace CVE-2011-1172
- LP: #801483
- CVE-2011-1172
  * econet: 4 byte infoleak to the network CVE-2011-1173
- LP: #801484
- CVE-2011-1173
  * net: Limit socket I/O iovec total length to INT_MAX.
- LP: #708839
  * fs/partitions: Validate map_count in Mac partition tables -
CVE-2011-1010
- LP: #804225
- CVE-2011-1010
  * drm: fix unsigned vs signed comparison issue in modeset ctl ioctl,
CVE-2011-1013
- LP: #804229
- CVE-2011-1013
  * exec: copy-and-paste the fixes into compat_do_execve() paths -
CVE-2010-4243
- LP: #804234
- CVE-2010-4243
  * taskstats: don't allow duplicate entries in listener mode,
CVE-2011-2484
- LP: #806390
- CVE-2011-2484
  * dccp: handle invalid feature options length, CVE-2011-1770
- LP: #806375
- CVE-2011-1770
  * pagemap: close races with suid execve, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * report errors in /proc/*/*map* sanely, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * close race in /proc/*/environ, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * auxv: require the target to be tracable (or yourself), CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020
- LP: #813026
- CVE-2011-1020
  * dccp: fix oops on Reset after close, CVE-2011-1093
- LP: #814087
- CVE-2011-1093
  * net: add limit for socket backlog CVE-2010-4251
- LP: #807462
  * tcp: use limited socket backlog CVE-2010-4251
- LP: #807462
  * ipv6: udp: Optimise multicast reception
- LP: #807462
  * ipv4: udp: Optimise multicast reception
- LP: #807462
  * udp: multicast RX should increment SNMP/sk_drops counter in allocation
failures CVE-2010-4251
- LP: #807462
  * udp: use limited socket backlog CVE-2010-4251
- LP: #807462
  * llc: use limited socket backlog CVE-2010-4251
- LP: #807462
  * sctp: use limited socket backlog CVE-2010-4251
- LP: #807462
  * tipc: use limited socket backlog CVE-2010-4251
- LP: #807462
  * x25: use limited socket backlog CVE-2010-4251
- LP: #807462
  * net: backlog functions rename CVE-2010-4251
- LP: #807462
  * net: sk_add_backlog() take rmem_alloc into account CVE-2010-4805
- L

[Bug 721504] Re: CVE-2010-4163

2011-08-24 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-07-07 Thread Andy Whitcroft
** Tags added: kernel-cve-tracking-bug
** Tags removed: kernel-cve-tracker

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-06-22 Thread Tim Gardner
** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-06-22 Thread Tim Gardner
** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-06-20 Thread Paolo Pisati
** Also affects: linux-fsl-imx51 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-fsl-imx51 (Ubuntu)
   Status: New => Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Dapper)
   Status: New => Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Karmic)
   Status: New => Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Maverick)
   Status: New => Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Natty)
   Status: New => Invalid

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
   Status: New => In Progress

** Changed in: linux-fsl-imx51 (Ubuntu Lucid)
 Assignee: (unassigned) => Paolo Pisati (p-pisati)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-06-10 Thread Paolo Pisati
** Changed in: linux-ti-omap4 (Ubuntu)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Dapper)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Hardy)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Karmic)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Lucid)
   Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Natty)
   Status: New => Fix Released

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
   Status: New => In Progress

** Changed in: linux-ti-omap4 (Ubuntu Maverick)
 Assignee: (unassigned) => Paolo Pisati (p-pisati)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-06-10 Thread Paolo Pisati
** Also affects: linux-ti-omap4 (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-04-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.24-29.88

---
linux (2.6.24-29.88) hardy-proposed; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #736290

  [Steve Conklin]

  * Ubuntu-2.6.24-29.87
  * [Config] Allow insertchanges to work in later version chroots

  [Upstream Kernel Changes]

  * do_exit(): make sure that we run with get_fs() == USER_DS,
CVE-2010-4258
- LP: #723945
- CVE-2010-4258
  * Make the bulkstat_one compat ioctl handling more sane
- LP: #692848
  * Fix xfs_bulkstat_one size checks & error handling
- LP: #692848
  * xfs: always use iget in bulkstat
- LP: #692848
  * x25: Prevent crashing when parsing bad X.25 facilities CVE-2010-4164
- LP: #731199
- CVE-2010-4164
  * Revised [CVE-2010-4346 Hardy] install_special_mapping skips
security_file_mmap check. CVE-2010-4346
- LP: #731971
- CVE-2010-4346

linux (2.6.24-29.87) hardy-proposed; urgency=low

  [ Steve Conklin ]

  * Release Tracking Bug
- LP: #725138

  [Upstream Kernel Changes]

  * bluetooth: Fix missing NULL check, CVE-2010-4242
- LP: #714846
- CVE-2010-4242
  * NFS: fix the return value of nfs_file_fsync()
- LP: #585657
  * bio: take care not overflow page count when mapping/copying user data,
CVE-2010-4162
- LP: #721441
- CVE-2010-4162
  * filter: make sure filters dont read uninitialized memory
- LP: #721282
- CVE-2010-4158
  * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077
- LP: #720189
- CVE-2010-4077
  * block: check for proper length of iov entries earlier in
blk_rq_map_user_iov(), CVE-2010-4163
- LP: #721504
- CVE-2010-4163
 -- Brad FiggWed, 16 Mar 2011 09:43:35 -0700

** Changed in: linux (Ubuntu Hardy)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4164

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4258

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4346

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-03-22 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/dapper-updates/linux-source-2.6.15

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-03-22 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/maverick-proposed/linux-mvl-dove

** Branch linked: lp:ubuntu/lucid-proposed/linux-mvl-dove

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-03-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.35-28.49

---
linux (2.6.35-28.49) maverick-proposed; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #726796

  [ Colin Ian King ]

  * SAUCE: Dell All-In-One: Remove need for Dell module alias

  [ Manoj Iyer ]

  * SAUCE: add ricoh 0xe823 pci id.
- LP: #717435

  [ Upstream Kernel Changes ]

  * virtio_net: Add schedule check to napi_enable call
- LP: #579276
  * mmc: make sdhci work with ricoh mmc controller
- LP: #717435
  * NFS: fix the return value of nfs_file_fsync()
- LP: #585657
  * rt2x00: Pad beacon to multiple of 32 bits.
- LP: #659143
  * rt2x00: Fix firmware loading regression on x86_64.
- LP: #659143
  * rt2x00: Check for errors from skb_pad() calls
- LP: #659143
  * block: check for proper length of iov entries earlier in
blk_rq_map_user_iov(), CVE-2010-4163
- LP: #721504
- CVE-2010-4163
  * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077
- LP: #720189
- CVE-2010-4077
- CVE-2010-4076
  * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175
- LP: #721455
- CVE-2010-4175
 -- Brad FiggMon, 28 Feb 2011 13:02:53 -0800

** Changed in: linux (Ubuntu Maverick)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-03-17 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.32-30.59

---
linux (2.6.32-30.59) lucid-proposed; urgency=low

  [ Steve Conklin ]

  * Release Tracking Bug
- LP: #727336

  [ Tim Gardner ]

  * [Config] CONFIG_IRQ_TIME_ACCOUNTING=n
- LP: #723819

  [ Upstream Kernel Changes ]

  * virtio_net: Add schedule check to napi_enable call
- LP: #579276
  * NFS: fix the return value of nfs_file_fsync()
- LP: #585657
  * block: check for proper length of iov entries earlier in
blk_rq_map_user_iov(), CVE-2010-4163
- LP: #721504
- CVE-2010-4163
  * filter: make sure filters dont read uninitialized memory
- LP: #721282
- CVE-2010-4158
  * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077
- LP: #720189
- CVE-2010-4077
  * staging: usbip: remove double giveback of URB
- LP: #723819
  * USB: EHCI: ASPM quirk of ISOC on AMD SB800
- LP: #723819
  * rt2x00: add device id for windy31 usb device
- LP: #723819
  * ALSA: snd-usb-us122l: Fix missing NULL checks
- LP: #723819
  * hwmon: (via686a) Initialize fan_div values
- LP: #723819
  * USB: serial: handle Data Carrier Detect changes
- LP: #723819
  * USB: CP210x Add two device IDs
- LP: #723819
  * USB: CP210x Removed incorrect device ID
- LP: #723819
  * USB: usb-storage: unusual_devs update for Cypress ATACB
- LP: #723819
  * USB: usb-storage: unusual_devs update for TrekStor DataStation maxi g.u
external hard drive enclosure
- LP: #723819
  * USB: usb-storage: unusual_devs entry for CamSport Evo
- LP: #723819
  * USB: usb-storage: unusual_devs entry for Coby MP3 player
- LP: #723819
  * USB: serial: Updated support for ICOM devices
- LP: #723819
  * USB: adding USB support for Cinterion's HC2x, EU3 and PH8 products
- LP: #723819
  * USB: EHCI: ASPM quirk of ISOC on AMD Hudson
- LP: #723819
  * USB: EHCI: fix DMA deallocation bug
- LP: #723819
  * USB: g_printer: fix bug in module parameter definitions
- LP: #723819
  * USB: io_edgeport: fix the reported firmware major and minor
- LP: #723819
  * USB: ti_usb: fix module removal
- LP: #723819
  * USB: Storage: Add unusual_devs entry for VTech Kidizoom
- LP: #723819
  * USB: ftdi_sio: add ST Micro Connect Lite uart support
- LP: #723819
  * USB: cdc-acm: Adding second ACM channel support for Nokia N8
- LP: #723819
  * USB: ftdi_sio: Add VID=0x0647, PID=0x0100 for Acton Research
spectrograph
- LP: #723819
  * USB: prevent buggy hubs from crashing the USB stack
- LP: #723819
  * staging: comedi: add support for newer jr3 1-channel pci board
- LP: #723819
  * staging: comedi: ni_labpc: Use shared IRQ for PCMCIA card
- LP: #723819
  * Staging: hv: fix sysfs symlink on hv block device
- LP: #723819
  * staging: hv: Enable sending GARP packet after live migration
- LP: #723819
  * hvc_iucv: allocate memory buffers for IUCV in zone DMA
- LP: #723819
  * iwlagn: enable only rfkill interrupt when device is down
- LP: #723819
  * ath9k: Fix bug in delimiter padding computation
- LP: #723819
  * correct vdso version string
- LP: #723819
  * fix medium error problems with some arrays which can cause data
corruption
- LP: #723819
  * libsas: fix runaway error handler problem
- LP: #723819
  * mpt2sas: Fix device removal handshake for zoned devices
- LP: #723819
  * mpt2sas: Correct resizing calculation for max_queue_depth
- LP: #723819
  * mpt2sas: Kernel Panic during Large Topology discovery
- LP: #723819
  * radio-aimslab.c: Fix gcc 4.5+ bug
- LP: #723819
  * em28xx: Fix audio input for Terratec Grabby
- LP: #723819
  * ALSA : au88x0 - Limit number of channels to fix Oops via OSS emu
- LP: #723819
  * ALSA: HDA: Fix dmesg output of HDMI supported bits
- LP: #723819
  * ALSA: hda - Fix memory leaks in conexant jack arrays
- LP: #723819
  * input: bcm5974: Add support for MacBookAir3
- LP: #723819
  * ALSA: hrtimer: handle delayed timer interrupts
- LP: #723819
  * ASoC: WM8990: msleep() takes milliseconds not jiffies
- LP: #723819
  * ASoC: Blackfin AC97: fix build error after multi-component update
- LP: #723819
  * NFS: Fix "kernel BUG at fs/aio.c:554!"
- LP: #723819
  * rtc-cmos: fix suspend/resume
- LP: #723819
  * iwlagn: Re-enable RF_KILL interrupt when down
- LP: #723819
  * rapidio: fix hang on RapidIO doorbell queue full condition
- LP: #723819
  * PCI: pci-stub: ignore zero-length id parameters
- LP: #723819
  * virtio: remove virtio-pci root device
- LP: #723819
  * ds2760_battery: Fix calculation of time_to_empty_now
- LP: #723819
  * p54: fix sequence no. accounting off-by-one error
- LP: #723819
  * i2c: Unregister dummy devices last on adapter removal
- LP: #723819
  * serial: unbreak billionton CF card
- LP: #723819
  * ptrace: use safer wake up on ptrace_detach()
- LP: #723819
  * x86, mtrr: Avoid MTRR reprogramming on 

[Bug 721504] Re: CVE-2010-4163

2011-03-17 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.31-23.74

---
linux (2.6.31-23.74) karmic-proposed; urgency=low

  [ Steve Conklin ]

  * Release Tracking Bug
- LP: #725232

  [ Upstream Kernel Changes ]

  * bluetooth: Fix missing NULL check, CVE-2010-4242
- LP: #714846
- CVE-2010-4242
  * bio: take care not overflow page count when mapping/copying user data,
CVE-2010-4162
- LP: #721441
- CVE-2010-4162
  * filter: make sure filters dont read uninitialized memory
- LP: #721282
- CVE-2010-4158
  * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077
- LP: #720189
- CVE-2010-4077
  * block: check for proper length of iov entries in blk_rq_map_user_iov(),
CVE-2010-4163
- LP: #721504
- CVE-2010-4163
  * block: check for proper length of iov entries earlier in
blk_rq_map_user_iov(), CVE-2010-4163
- LP: #721504
- CVE-2010-4163
  * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175
- LP: #721455
- CVE-2010-4175
 -- Steve ConklinFri, 25 Feb 2011 14:20:16 -0600

** Changed in: linux (Ubuntu Karmic)
   Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4076

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4077

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4158

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4162

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4175

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4242

** Changed in: linux (Ubuntu Lucid)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-03-05 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/dapper-proposed/linux-source-2.6.15

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-03-03 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-03-03 Thread Brad Figg
** Tags added: kernel-cve-tracker

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-03-02 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/karmic-proposed/linux-ec2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-02-22 Thread Tim Gardner
** Changed in: linux (Ubuntu Hardy)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Karmic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-02-22 Thread Tim Gardner
** Changed in: linux (Ubuntu Dapper)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-02-19 Thread Tim Gardner
** Changed in: linux (Ubuntu Lucid)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-02-19 Thread Tim Gardner
** Changed in: linux (Ubuntu Maverick)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 721504] Re: CVE-2010-4163

2011-02-18 Thread Tim Gardner
** Changed in: linux (Ubuntu Natty)
   Status: New => Fix Released

** Changed in: linux (Ubuntu Maverick)
   Status: New => In Progress

** Changed in: linux (Ubuntu Maverick)
 Assignee: (unassigned) => Tim Gardner (timg-tpi)

** Changed in: linux (Ubuntu Lucid)
   Status: New => In Progress

** Changed in: linux (Ubuntu Lucid)
 Assignee: (unassigned) => Tim Gardner (timg-tpi)

** Changed in: linux (Ubuntu Karmic)
   Status: New => In Progress

** Changed in: linux (Ubuntu Karmic)
 Assignee: (unassigned) => Tim Gardner (timg-tpi)

** Changed in: linux (Ubuntu Hardy)
   Status: New => In Progress

** Changed in: linux (Ubuntu Hardy)
 Assignee: (unassigned) => Tim Gardner (timg-tpi)

** Changed in: linux (Ubuntu Dapper)
   Status: New => In Progress

** Changed in: linux (Ubuntu Dapper)
 Assignee: (unassigned) => Tim Gardner (timg-tpi)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721504

Title:
  CVE-2010-4163

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs