[Bug 721504] Re: CVE-2010-4163
** Changed in: linux (Ubuntu Dapper) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
This bug was fixed in the package linux-ti-omap4 - 2.6.35-903.24 --- linux-ti-omap4 (2.6.35-903.24) maverick-proposed; urgency=low * Release tracking bug - LP: #838037 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc//maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-ti-omap4 (2.6.35-903.23) maverick-proposed; urgency=low * Release tracking bug - LP: #829655 [ Upstream Kernel Changes ] * drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argument size - CVE-2010-3858 - LP: #672664 - CVE-2010-3858 * net: Truncate recvfrom and sendto length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * net: Limit socket I/O iovec total length to INT_MAX - CVE-2010-3859 - LP: #690730 - CVE-2010-3859 * ipc: initialize structure memory to zero for compat functions - CVE-2010-4073 - LP: #690730 - CVE-2010-4073 * ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - CVE-2010-4080, CVE-2010-4081 - LP: #672664 - CVE-2010-4080, CVE-2010-4081 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - CVE-2010-4082 - CVE-2010-4082 * sys_semctl: fix kernel stack leakage, CVE-2010-4083 - LP: #712749 - CVE-2010-4083 * gdth: integer overflow in ioctl - CVE-2010-4157 - LP: #686158 - CVE-2010-4157 * bio: take care not overflow page count when mapping/copying user data - CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * bluetooth: Fix missing NULL check - CVE-2010-4242 - LP: #686158 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * perf_events: Fix perf_counter_mmap() hook in mprotect() - CVE-2010-4169 - LP: #690730 - CVE-2010-4169 * block: check for proper length of iov entries in blk_rq_map_user_iov() - CVE-2010-4163 - LP: #690730 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in can/bcm
[Bug 721504] Re: CVE-2010-4163
This bug was fixed in the package linux-fsl-imx51 - 2.6.31-610.28 --- linux-fsl-imx51 (2.6.31-610.28) lucid-proposed; urgency=low * Release tracking bug - LP: #837802 [ Upstream Kernel Changes ] * ipv6: make fragment identifications less predictable, CVE-2011-2699 - LP: #827685 - CVE-2011-2699 * perf: Fix software event overflow, CVE-2011-2918 - LP: #834121 - CVE-2011-2918 * proc: fix oops on invalid /proc//maps access, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 linux-fsl-imx51 (2.6.31-610.27) lucid-proposed; urgency=low * Release tracking bug - LP: #829160 [ Upstream Kernel Changes ] * fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops - LP: #795418 - CVE-2011-1577 * Fix corrupted OSF partition table parsing - LP: #796606 - CVE-2011-1163 * can: Add missing socket check in can/bcm release. - LP: #796502 - CVE-2011-1598 * proc: protect mm start_code/end_code in /proc/pid/stat - LP: #799906 - CVE-2011-0726 * sctp: Fix a race between ICMP protocol unreachable and connect() * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077 - LP: #794034 - CVE-2010-4077 * filter: make sure filters dont read uninitialized memory CVE-2010-4158 - LP: #721282 - CVE-2010-4158 * bio: take care not overflow page count when mapping/copying user data CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * block: check for proper length of iov entries in blk_rq_map_user_iov() - LP: #721504 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 * bluetooth: Fix missing NULL check CVE-2010-4242 - LP: #714846 - CVE-2010-4242 * IB/uverbs: Handle large number of entries in poll CQ CVE-2010-4649 - LP: #800121 - CVE-2010-4649 * epoll: prevent creating circular epoll structures CVE-2011-1082 - LP: #800758 - CVE-2011-1082 * nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab (v3) CVE-2011-1090 - LP: #800775 * ldm: corrupted partition table can cause kernel oops CVE-2011-1012 - LP: #801083 - CVE-2011-1012 * netfilter: ipt_CLUSTERIP: fix buffer overflow CVE-2011-2534 - LP: #801473 - CVE-2011-2534 * netfilter: arp_tables: fix infoleak to userspace CVE-2011-1170 - LP: #801480 - CVE-2011-1170 * netfilter: ip_tables: fix infoleak to userspace CVE-2011-1171 - LP: #801482 - CVE-2011-1171 * ipv6: netfilter: ip6_tables: fix infoleak to userspace CVE-2011-1172 - LP: #801483 - CVE-2011-1172 * econet: 4 byte infoleak to the network CVE-2011-1173 - LP: #801484 - CVE-2011-1173 * net: Limit socket I/O iovec total length to INT_MAX. - LP: #708839 * fs/partitions: Validate map_count in Mac partition tables - CVE-2011-1010 - LP: #804225 - CVE-2011-1010 * drm: fix unsigned vs signed comparison issue in modeset ctl ioctl, CVE-2011-1013 - LP: #804229 - CVE-2011-1013 * exec: copy-and-paste the fixes into compat_do_execve() paths - CVE-2010-4243 - LP: #804234 - CVE-2010-4243 * taskstats: don't allow duplicate entries in listener mode, CVE-2011-2484 - LP: #806390 - CVE-2011-2484 * dccp: handle invalid feature options length, CVE-2011-1770 - LP: #806375 - CVE-2011-1770 * pagemap: close races with suid execve, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * report errors in /proc/*/*map* sanely, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * close race in /proc/*/environ, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * auxv: require the target to be tracable (or yourself), CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * deal with races in /proc/*/{syscall, stack, personality}, CVE-2011-1020 - LP: #813026 - CVE-2011-1020 * dccp: fix oops on Reset after close, CVE-2011-1093 - LP: #814087 - CVE-2011-1093 * net: add limit for socket backlog CVE-2010-4251 - LP: #807462 * tcp: use limited socket backlog CVE-2010-4251 - LP: #807462 * ipv6: udp: Optimise multicast reception - LP: #807462 * ipv4: udp: Optimise multicast reception - LP: #807462 * udp: multicast RX should increment SNMP/sk_drops counter in allocation failures CVE-2010-4251 - LP: #807462 * udp: use limited socket backlog CVE-2010-4251 - LP: #807462 * llc: use limited socket backlog CVE-2010-4251 - LP: #807462 * sctp: use limited socket backlog CVE-2010-4251 - LP: #807462 * tipc: use limited socket backlog CVE-2010-4251 - LP: #807462 * x25: use limited socket backlog CVE-2010-4251 - LP: #807462 * net: backlog functions rename CVE-2010-4251 - LP: #807462 * net: sk_add_backlog() take rmem_alloc into account CVE-2010-4805 - L
[Bug 721504] Re: CVE-2010-4163
** Branch linked: lp:ubuntu/maverick-proposed/linux-ti-omap4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Tags added: kernel-cve-tracking-bug ** Tags removed: kernel-cve-tracker -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Also affects: linux-fsl-imx51 (Ubuntu) Importance: Undecided Status: New ** Changed in: linux-fsl-imx51 (Ubuntu) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Dapper) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Karmic) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Maverick) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Natty) Status: New => Invalid ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Status: New => In Progress ** Changed in: linux-fsl-imx51 (Ubuntu Lucid) Assignee: (unassigned) => Paolo Pisati (p-pisati) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Changed in: linux-ti-omap4 (Ubuntu) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Dapper) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Hardy) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Karmic) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Lucid) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: New => Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Status: New => In Progress ** Changed in: linux-ti-omap4 (Ubuntu Maverick) Assignee: (unassigned) => Paolo Pisati (p-pisati) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Also affects: linux-ti-omap4 (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/721504/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
This bug was fixed in the package linux - 2.6.24-29.88 --- linux (2.6.24-29.88) hardy-proposed; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #736290 [Steve Conklin] * Ubuntu-2.6.24-29.87 * [Config] Allow insertchanges to work in later version chroots [Upstream Kernel Changes] * do_exit(): make sure that we run with get_fs() == USER_DS, CVE-2010-4258 - LP: #723945 - CVE-2010-4258 * Make the bulkstat_one compat ioctl handling more sane - LP: #692848 * Fix xfs_bulkstat_one size checks & error handling - LP: #692848 * xfs: always use iget in bulkstat - LP: #692848 * x25: Prevent crashing when parsing bad X.25 facilities CVE-2010-4164 - LP: #731199 - CVE-2010-4164 * Revised [CVE-2010-4346 Hardy] install_special_mapping skips security_file_mmap check. CVE-2010-4346 - LP: #731971 - CVE-2010-4346 linux (2.6.24-29.87) hardy-proposed; urgency=low [ Steve Conklin ] * Release Tracking Bug - LP: #725138 [Upstream Kernel Changes] * bluetooth: Fix missing NULL check, CVE-2010-4242 - LP: #714846 - CVE-2010-4242 * NFS: fix the return value of nfs_file_fsync() - LP: #585657 * bio: take care not overflow page count when mapping/copying user data, CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * filter: make sure filters dont read uninitialized memory - LP: #721282 - CVE-2010-4158 * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077 - LP: #720189 - CVE-2010-4077 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 -- Brad FiggWed, 16 Mar 2011 09:43:35 -0700 ** Changed in: linux (Ubuntu Hardy) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4164 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4258 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4346 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Branch linked: lp:ubuntu/dapper-updates/linux-source-2.6.15 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Branch linked: lp:ubuntu/maverick-proposed/linux-mvl-dove ** Branch linked: lp:ubuntu/lucid-proposed/linux-mvl-dove -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
This bug was fixed in the package linux - 2.6.35-28.49 --- linux (2.6.35-28.49) maverick-proposed; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #726796 [ Colin Ian King ] * SAUCE: Dell All-In-One: Remove need for Dell module alias [ Manoj Iyer ] * SAUCE: add ricoh 0xe823 pci id. - LP: #717435 [ Upstream Kernel Changes ] * virtio_net: Add schedule check to napi_enable call - LP: #579276 * mmc: make sdhci work with ricoh mmc controller - LP: #717435 * NFS: fix the return value of nfs_file_fsync() - LP: #585657 * rt2x00: Pad beacon to multiple of 32 bits. - LP: #659143 * rt2x00: Fix firmware loading regression on x86_64. - LP: #659143 * rt2x00: Check for errors from skb_pad() calls - LP: #659143 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077 - LP: #720189 - CVE-2010-4077 - CVE-2010-4076 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 -- Brad FiggMon, 28 Feb 2011 13:02:53 -0800 ** Changed in: linux (Ubuntu Maverick) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
This bug was fixed in the package linux - 2.6.32-30.59 --- linux (2.6.32-30.59) lucid-proposed; urgency=low [ Steve Conklin ] * Release Tracking Bug - LP: #727336 [ Tim Gardner ] * [Config] CONFIG_IRQ_TIME_ACCOUNTING=n - LP: #723819 [ Upstream Kernel Changes ] * virtio_net: Add schedule check to napi_enable call - LP: #579276 * NFS: fix the return value of nfs_file_fsync() - LP: #585657 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * filter: make sure filters dont read uninitialized memory - LP: #721282 - CVE-2010-4158 * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077 - LP: #720189 - CVE-2010-4077 * staging: usbip: remove double giveback of URB - LP: #723819 * USB: EHCI: ASPM quirk of ISOC on AMD SB800 - LP: #723819 * rt2x00: add device id for windy31 usb device - LP: #723819 * ALSA: snd-usb-us122l: Fix missing NULL checks - LP: #723819 * hwmon: (via686a) Initialize fan_div values - LP: #723819 * USB: serial: handle Data Carrier Detect changes - LP: #723819 * USB: CP210x Add two device IDs - LP: #723819 * USB: CP210x Removed incorrect device ID - LP: #723819 * USB: usb-storage: unusual_devs update for Cypress ATACB - LP: #723819 * USB: usb-storage: unusual_devs update for TrekStor DataStation maxi g.u external hard drive enclosure - LP: #723819 * USB: usb-storage: unusual_devs entry for CamSport Evo - LP: #723819 * USB: usb-storage: unusual_devs entry for Coby MP3 player - LP: #723819 * USB: serial: Updated support for ICOM devices - LP: #723819 * USB: adding USB support for Cinterion's HC2x, EU3 and PH8 products - LP: #723819 * USB: EHCI: ASPM quirk of ISOC on AMD Hudson - LP: #723819 * USB: EHCI: fix DMA deallocation bug - LP: #723819 * USB: g_printer: fix bug in module parameter definitions - LP: #723819 * USB: io_edgeport: fix the reported firmware major and minor - LP: #723819 * USB: ti_usb: fix module removal - LP: #723819 * USB: Storage: Add unusual_devs entry for VTech Kidizoom - LP: #723819 * USB: ftdi_sio: add ST Micro Connect Lite uart support - LP: #723819 * USB: cdc-acm: Adding second ACM channel support for Nokia N8 - LP: #723819 * USB: ftdi_sio: Add VID=0x0647, PID=0x0100 for Acton Research spectrograph - LP: #723819 * USB: prevent buggy hubs from crashing the USB stack - LP: #723819 * staging: comedi: add support for newer jr3 1-channel pci board - LP: #723819 * staging: comedi: ni_labpc: Use shared IRQ for PCMCIA card - LP: #723819 * Staging: hv: fix sysfs symlink on hv block device - LP: #723819 * staging: hv: Enable sending GARP packet after live migration - LP: #723819 * hvc_iucv: allocate memory buffers for IUCV in zone DMA - LP: #723819 * iwlagn: enable only rfkill interrupt when device is down - LP: #723819 * ath9k: Fix bug in delimiter padding computation - LP: #723819 * correct vdso version string - LP: #723819 * fix medium error problems with some arrays which can cause data corruption - LP: #723819 * libsas: fix runaway error handler problem - LP: #723819 * mpt2sas: Fix device removal handshake for zoned devices - LP: #723819 * mpt2sas: Correct resizing calculation for max_queue_depth - LP: #723819 * mpt2sas: Kernel Panic during Large Topology discovery - LP: #723819 * radio-aimslab.c: Fix gcc 4.5+ bug - LP: #723819 * em28xx: Fix audio input for Terratec Grabby - LP: #723819 * ALSA : au88x0 - Limit number of channels to fix Oops via OSS emu - LP: #723819 * ALSA: HDA: Fix dmesg output of HDMI supported bits - LP: #723819 * ALSA: hda - Fix memory leaks in conexant jack arrays - LP: #723819 * input: bcm5974: Add support for MacBookAir3 - LP: #723819 * ALSA: hrtimer: handle delayed timer interrupts - LP: #723819 * ASoC: WM8990: msleep() takes milliseconds not jiffies - LP: #723819 * ASoC: Blackfin AC97: fix build error after multi-component update - LP: #723819 * NFS: Fix "kernel BUG at fs/aio.c:554!" - LP: #723819 * rtc-cmos: fix suspend/resume - LP: #723819 * iwlagn: Re-enable RF_KILL interrupt when down - LP: #723819 * rapidio: fix hang on RapidIO doorbell queue full condition - LP: #723819 * PCI: pci-stub: ignore zero-length id parameters - LP: #723819 * virtio: remove virtio-pci root device - LP: #723819 * ds2760_battery: Fix calculation of time_to_empty_now - LP: #723819 * p54: fix sequence no. accounting off-by-one error - LP: #723819 * i2c: Unregister dummy devices last on adapter removal - LP: #723819 * serial: unbreak billionton CF card - LP: #723819 * ptrace: use safer wake up on ptrace_detach() - LP: #723819 * x86, mtrr: Avoid MTRR reprogramming on
[Bug 721504] Re: CVE-2010-4163
This bug was fixed in the package linux - 2.6.31-23.74 --- linux (2.6.31-23.74) karmic-proposed; urgency=low [ Steve Conklin ] * Release Tracking Bug - LP: #725232 [ Upstream Kernel Changes ] * bluetooth: Fix missing NULL check, CVE-2010-4242 - LP: #714846 - CVE-2010-4242 * bio: take care not overflow page count when mapping/copying user data, CVE-2010-4162 - LP: #721441 - CVE-2010-4162 * filter: make sure filters dont read uninitialized memory - LP: #721282 - CVE-2010-4158 * tty: Make tiocgicount a handler, CVE-2010-4076, CVE-2010-4077 - LP: #720189 - CVE-2010-4077 * block: check for proper length of iov entries in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * block: check for proper length of iov entries earlier in blk_rq_map_user_iov(), CVE-2010-4163 - LP: #721504 - CVE-2010-4163 * rds: Integer overflow in RDS cmsg handling, CVE-2010-4175 - LP: #721455 - CVE-2010-4175 -- Steve ConklinFri, 25 Feb 2011 14:20:16 -0600 ** Changed in: linux (Ubuntu Karmic) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4076 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4077 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4158 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4162 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4175 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4242 ** Changed in: linux (Ubuntu Lucid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Branch linked: lp:ubuntu/dapper-proposed/linux-source-2.6.15 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Tags added: kernel-cve-tracker -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Branch linked: lp:ubuntu/karmic-proposed/linux-ec2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Changed in: linux (Ubuntu Hardy) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Karmic) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Changed in: linux (Ubuntu Dapper) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Changed in: linux (Ubuntu Lucid) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Changed in: linux (Ubuntu Maverick) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 721504] Re: CVE-2010-4163
** Changed in: linux (Ubuntu Natty) Status: New => Fix Released ** Changed in: linux (Ubuntu Maverick) Status: New => In Progress ** Changed in: linux (Ubuntu Maverick) Assignee: (unassigned) => Tim Gardner (timg-tpi) ** Changed in: linux (Ubuntu Lucid) Status: New => In Progress ** Changed in: linux (Ubuntu Lucid) Assignee: (unassigned) => Tim Gardner (timg-tpi) ** Changed in: linux (Ubuntu Karmic) Status: New => In Progress ** Changed in: linux (Ubuntu Karmic) Assignee: (unassigned) => Tim Gardner (timg-tpi) ** Changed in: linux (Ubuntu Hardy) Status: New => In Progress ** Changed in: linux (Ubuntu Hardy) Assignee: (unassigned) => Tim Gardner (timg-tpi) ** Changed in: linux (Ubuntu Dapper) Status: New => In Progress ** Changed in: linux (Ubuntu Dapper) Assignee: (unassigned) => Tim Gardner (timg-tpi) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/721504 Title: CVE-2010-4163 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs